Automatically apply for jobs with Zippia
Upload your resume to get started.
Information assurance skills for your resume and career
15 information assurance skills for your resume and career
1. DOD
Definition of Done (DoD) is a set of deliverables that are needed to devise software. These deliverables are valuable to the system and can be exemplified by writing code, coding comments, unit testing, integration testing, design documents, release notes, and so on.
- Provide Information Assurance guidance to DoD and U.S. Navy clients in accordance with Information Security policies and procedures.
- Provided network and system security as part of an information assurance team supporting DoD education systems.
2. RMF
RMF (the Risk Management Framework) refers to a set of criteria used by the federal government and its contractors to improve information security. To be proficient in RMF, in-depth technical experience with core technologies like Digital, Cloud, Data Protection, etc., along with knowledge of FISMA and FedRAMP regulatory compliance requirements.
- Write program-specific documentation using RMF processes and procedures.
- Prepared systems for DoD IA Certification & Accreditation (C&A) Process (DIACAP) to DoD RMF transition.
3. NIST
- Tailored identified security controls as stated in NIST 800-53 REV 4 to fit into the environment.
- Evaluated discovered security findings and provided guidance for bringing information technology systems to NIST security compliance.
4. Windows
Windows is a chain of operating systems that controls a computer and is developed by Microsoft. Every version of Windows consists of GUI (graphical user interface), with a desktop that allows the user to open their files.
- Create Installation and Test Procedures for WAVES Windows 7 software.
- Coordinated Windows vulnerability remediation efforts.
5. ACAS
- Installed, configured, and managing ACAS deployments to assess the current vulnerabilities and security posture for classified networks.
- Experience with generating ACAS reports as needed to verify network security posture and reporting into VRAM.
6. National Security
- Verify that security strategies and architectures meet regulatory, international security standards, audit standards, and business mission requirements.
- Identified military/civilian unit requirement per Command Level, National Security Force (Special Operations) and Cabinet Level Government structures.
7. POA
- Experience in writing and executing test cases, POA & M's and policies.
8. Encryption
- Use encryption technology, penetration, and vulnerability analysis of various security technologies and information technology research.
- Coordinate security compliance and systems security support with Network Encryption Services and Computer System Administrators.
9. Vulnerability Assessments
- Help conduct evaluations such as compliance audits and vulnerability assessments.
- Performed vulnerability assessments with validation via external/internal vulnerability scans.
10. Incident Response
Incident response is defined as the process by which a company or organization handles a cyber attack or a data breach. Along with dealing with the initial attack, this also deals with the possible consequences of the breach. The goal of incident response is to limit the damage caused by the attack.
- Conducted immediate incident response to critical computer network security situations involving Navy networks.
- Monitored internal security controls to determine malicious or unauthorized activity from security devices and coordinated the response to Incident Response Teams.
11. Computer System
- Performed comprehensive security analysis on computer system configurations including procedural and documentation assessments.
- Worked closely with other agencies within organizations to perform detailed analysis for applications, networks, and computer systems.
12. ATO
- Documented the Information Assurance process to be followed in later IATTs and ATOs.
- Applied expertise in writing IATTs and ATOs for the directorate.
13. STIG
- Review and apply Defense Information Systems Agency ( DISA ) Security Technical Implementation Guide ( STIG ) as required.
- Assist in implementing applicable Security Technical Implementation Guides (STIG) and other technology utilized within the enclave environment.
14. ISSO
- Worked with IS auditor and ISSO to remediate all identified security vulnerability detected.
- Approve procurement requests as security ISSO from the directorate security authority.
15. Disa
- Co-authored "Blackberry Enterprise Server Hardening Using DISA STIGs.
- Designed, developed and recommended integrated security system solutions to secure proprietary/confidential voice and data traffic in accordance to DISA regulations.
What skills help Information Assurances find jobs?
Tell us what job you are looking for, we’ll show you what skills employers want.
List of information assurance skills to add to your resume

The most important skills for an information assurance resume and required skills for an information assurance to have include:
- DOD
- RMF
- NIST
- Windows
- ACAS
- National Security
- POA
- Encryption
- Vulnerability Assessments
- Incident Response
- Computer System
- ATO
- STIG
- ISSO
- Disa
- Data Loss Prevention
- Accreditation Process
- IAVA
- IDS
- ISO
- Disk
- Remedy
- Workstations
- Security Assessments
- System Security Plan
- Business Continuity
- Unix
- WSUS
- SOX
- General Controls
- ISS
- Regression
- InfoSec
- Internal Controls
- System Documentation
- ST
- Process Automation
Updated January 8, 2025