Automatically apply for jobs with Zippia
Upload your resume to get started.
Certified information systems security professional skills for your resume and career
15 certified information systems security professional skills for your resume and career
1. Windows
Windows is a chain of operating systems that controls a computer and is developed by Microsoft. Every version of Windows consists of GUI (graphical user interface), with a desktop that allows the user to open their files.
- Assisted in analyzing Windows Active Directory account provisioning practices.
- Utilize STIG Viewer to perform all manual checklists on IBM AIX, RedHat, Linux, and Windows 7 operating systems.
2. NIST
- Completed NIST modeled Certification and Accreditation project of all database and network facilities at CDC.
- Lead and facilitate interaction between Risk Management and IT specific to the NIST implementation and certification of applications processing DoD data.
3. Linux
Linux is a Unix-like operating system. Just like Windows, Mac OS, and IOS, Linux is an operating system used by millions across the globe. Android itself is powered by the Linux operating system. Linux manages all the hardware resources that are associated with your computer. The software is famous because of the protection it grants from viruses, malware, and crashes. The Linux operating system is entirely free and is an open-source software meaning it can be altered by those equipped with the knowledge to code.
- Supported DIACAP certification and accreditation efforts on primary assigned sub task comprised of geographically dispersed Red Hat Linux Systems.
- Demonstrated excellent skills in performing operating system hardening of Windows and Linux along with their applications.
4. Incident Response
Incident response is defined as the process by which a company or organization handles a cyber attack or a data breach. Along with dealing with the initial attack, this also deals with the possible consequences of the breach. The goal of incident response is to limit the damage caused by the attack.
- Lead incident response and business continuity assessment and testing activities.
- Provided analytics support to the Incident Response team during security events and incidents.
5. ISO
- Established Security Committee offering ISO 27001-certification guidance, while working with external auditors and directing IT security audit procedural policies.
- Created computer systems security processes, developed policies and procedures including ISO 9000 documentation, and ensured compliance to audit requirements.
6. Risk Assessments
The process of analyzing and identifying the acts or events that have the potential to negatively affect an individual, asset, or business is called risk assessment. Risk assessments are important because they form an integral part of an organization as well as occupational safety plans
- Conducted security reviews and risk assessments.
- Protected Mayor -elect during campaign including travel, advance movements and comprehensive risk assessments.
7. Network Security
- Provided Information Assurance, network security, integration and implementation of computer systems and applications, analyzes and defines security requirements.
- Managed and completed complex security projects and technology implementations pertaining to data and network security ensuring a timely and successful outcome.
8. DOD
Definition of Done (DoD) is a set of deliverables that are needed to devise software. These deliverables are valuable to the system and can be exemplified by writing code, coding comments, unit testing, integration testing, design documents, release notes, and so on.
- Ensured DoD contractors complied with security standards, plans and procedures for classified IS areas.
- Perform user account administration, media control, implementation and enforcement of DoD computer security plans/policies/procedures/directives, and system security training.
9. POA
- Experience in writing and executing test cases, POA & M's and policies.
10. Switches
- Coordinated and supervised total overhaul/upgrade of missions unclassified network including all servers, switches, and workstations.
- Managed and configured perimeter Cisco routers and switches.
11. Security Policies
- Assure adherence to clients' information system security policies.
- Reviewed, created, and/or modified Security Policies, Standards, and Guidelines Reviewed all major IT infrastructure changes.
12. Security Solutions
Security Solutions refers to firms/companies whose purpose is to ensure the provision of security services. The companies/organizations or businesses offer several security services, including; intruder alarms, CCTV installation services, cybersecurity services, access control services, and physical security services.
- Created architecture, sold, and implemented high-profile security portfolio solution to implement IBM security solutions at Target Corporation.
- Develop and implement global security solutions to meet business requirements while balancing acceptable risk to the company's client information assets.
13. SOX
- Access recertification assurance for SOX 404 control compliance.
- Ensured operational security controls were implemented in accordance with AXA Group Information Security Standards, SOX legislation and industry best practice.
14. Security Procedures
A security procedure is a verification protocol used to check if an electronic signature, record, or performance belongs to that specific person. It is a set of necessary procedures that need to be performed to maintain security. These procedures are step-by-step guidelines on how to implement, enable, or enforce security.
- Evaluated existing data security procedures and identify new areas of risk.
15. ISSM
- Collaborate with security assessors/auditors and ISSM to develop and generate, review, and update component documentation.
- Provided recommendations to the ISSM for developing plans to approach and resolve information system security solutions.
What skills help Certified Information Systems Security Professionals find jobs?
Tell us what job you are looking for, we’ll show you what skills employers want.
List of certified information systems security professional skills to add to your resume

The most important skills for a certified information systems security professional resume and required skills for a certified information systems security professional to have include:
- Windows
- NIST
- Linux
- Incident Response
- ISO
- Risk Assessments
- Network Security
- DOD
- POA
- Switches
- Security Policies
- Security Solutions
- SOX
- Security Procedures
- ISSM
- Vulnerability Assessments
- National Security
- DHS
- Unix
- Encryption
- ATO
- Disa
- SIEM
- DIACAP
- Security Products
- McAfee
- Provisioning
- Wireshark
Updated January 8, 2025