Tech jobs are booming these days, and few positions are higher valued than those involved in computer security. The information security industry is growing at an alarming rate, and experts expect the jobs available to increase by 18 percent in 2024, from where they were in 2014. That is a lot of opportunity, but employers look for quality every bit as much as quantity in this field. Even if the need is there, do not expect to get the job without demonstrating your ability to perform. To get your foot in the door, the first place you need to shine is on your resume.
Our information assurance analyst resume sample is the perfect guide for nailing that application. If you still find yourself struggling to put together your own version, check out our resume builder to help you get started.
Max Millions
100 Broadway Lane
New Parkland, CA, 91010
Cell: (555) 987-1234
email@example.com
Professional Summary
Information Assurance Analyst excellent at planning, implementing, upgrading and monitoring security measures for protecting computer networks and information. Ensure appropriate security controls are in place. May respond to computer breaches and viruses when necessary.
Core Qualifications
Experience
Information Assurance Analyst, April 2012 – PresentLos Angeles Military Affairs– Los Angeles, CA
- Confer with users to discuss issues pertaining to computer data access trends, programming changes and security violations.
- Train users and promote security awareness to ensure that system security of server and network work efficiently.
- Document all computer security measures taken, including emergency measures, policies, procedures and tests.
- Monitor the usage of all data files and regulate access so that information is safeguarded in computer files.
- Modify any necessary computer files as well as the use of data files.
- Correct errors and incorporate new software to limit individual access to different file types.
Information Assurance Analyst, August 2008 – May 2012
Monterey Army Base– Monterey, CA
- Performed risk assessments and executed tests of data processing systems to ensure the proper functioning of activities.
- Maintained carry-on direct support systems required in specialized operations and reviewed any violations of computer security.
- Ensured that any violations of security were not repeated by discussing procedures to prevent maintenance with security team.
- Encrypted data transmissions and erected firewalls to conceal confidential information.
Education
2008 Bachelor of Science, Computer ScienceUniversity of California – Los Angeles, CA