Automatically apply for jobs with Zippia
Upload your resume to get started.
Information assurance officer skills for your resume and career
15 information assurance officer skills for your resume and career
1. IAM
IAM policies are specific permissions on the Amazon Web Server (AWS) for an operation or action regardless of the way it is performed. For example, if an IAM policy defines GetUser action, then a user can get user information from any parts of the AWS, such as the AWS Management Console, AWS API, or the AWS CLI.
- Initiated protective or corrective measures, in coordination with the IAM, when an IA incident or vulnerability is discovered.
- Supported the Wing IAM in EMSEC validation duties to ensure classified processing areas are compliant with AF EMSEC program.
2. DOD
Definition of Done (DoD) is a set of deliverables that are needed to devise software. These deliverables are valuable to the system and can be exemplified by writing code, coding comments, unit testing, integration testing, design documents, release notes, and so on.
- Provided sound professional advice to 23 Information System Security Officers on information security resulting in DoD standards compliance and information awareness.
- Implemented and enforced all DoD information system IA policies and procedures, as defined by its security certification and accreditation documentation.
3. RMF
RMF (the Risk Management Framework) refers to a set of criteria used by the federal government and its contractors to improve information security. To be proficient in RMF, in-depth technical experience with core technologies like Digital, Cloud, Data Protection, etc., along with knowledge of FISMA and FedRAMP regulatory compliance requirements.
- Assisted in the completion of the RMF for the unclassified network.
- Supported C&A DIACAP recertification efforts on both networks prior to RMF implementation.
4. Security Policies
- Investigated and reviewed violations of computer security policies, discussed procedures with violators to ensure security incidents were not repeated.
- Ensured user compliance with annual computer security recurring training and user compliance with established computer security policies.
5. Security Procedures
A security procedure is a verification protocol used to check if an electronic signature, record, or performance belongs to that specific person. It is a set of necessary procedures that need to be performed to maintain security. These procedures are step-by-step guidelines on how to implement, enable, or enforce security.
- Assisted in teaching and training users on proper security procedures for file transfers and other activities associated with ISS functions.
- Enforced compliance for Information Assurance measures and security procedures were adhered to by 105 users.
6. Security Posture
- Ensured that established policies and architectures conformed to security standards and provided recommendations on ways to enhance current security posture.
- Implemented IA policies in reference with Navy and Marine Corps IA Policies to improve command and system IA security posture.
Choose from 10+ customizable information assurance officer resume templates
Build a professional information assurance officer resume in minutes. Our AI resume writing assistant will guide you through every step of the process, and you can choose from 10+ resume templates to create your information assurance officer resume.7. ACAS
- Review and interpret logs and scans from Retina, ACAS and HBSS to assure compliance with orders.
- Install and update scanning boxes with ACAS and REDHAT for system compliance.
8. Disa
- Informed government and commercial software developers on DISA s Security Technical Implementation Guides.
- Direct, coordinate, and integrate response actions to computer network attacks and significant intrusions affecting the DISA Theater Information Grid.
9. Unix
UNIX is a computer operating system that was first created in the 1960s and has been constantly updated since then. The operating system refers to the set of programs that enable a machine to function. It is a multi-user, multi-tasking device that works on computers, laptops, and servers. UNIX systems also have a graphical user interface (GUI), similar to Microsoft Windows, that makes it simple to use.
- Maintained the security profile on approximately 700 UNIX servers for the GCSS-AF Framework.
- Maintained all security facets of AFWA's UNIX and Windows based servers.
10. Security Systems
A security system refers to any device that can perform security operations such as surveillance, access control, alarm, or intrusion control in a facility or area through a system of components and multifunctional devices designed to protect people and the property against a variety of hazards including crime, arson, accidents, espionage, sabotage, subversion, and attack. A security system also detects several other threats, including smoke, carbon monoxide poisoning, and water damage.
- Conceptualized and implemented security systems and architectures.
- Assisted with integration of new capabilities with existing and new security systems.
11. STIG
- Improved network STIG compliance; VMS database.
- Configured network security on networking equipment and peripherals on multiple security domains by utilizing DISA STIG's.
12. Network Security
- Conducted monthly vulnerability scans using Retina Network Security Scanner to evaluate systems integrity and ensure 100 percent compliance.
- Conducted risk assessments and collaborate with executives to provide recommendations regarding critical infrastructure and network security operations.
13. Windows Server
- Maintained Active Directory support on user, computer and device objects using Windows Server 2003 and Windows Server 2008.
- Performed System Administration on all windows servers, Cisco Firewalls and Switches, and IDS Systems.
14. Linux
Linux is a Unix-like operating system. Just like Windows, Mac OS, and IOS, Linux is an operating system used by millions across the globe. Android itself is powered by the Linux operating system. Linux manages all the hardware resources that are associated with your computer. The software is famous because of the protection it grants from viruses, malware, and crashes. The Linux operating system is entirely free and is an open-source software meaning it can be altered by those equipped with the knowledge to code.
- Supported Windows 2000, 2003, 2008 R2, Sun, and Linux operating systems and administrators.
- Review weekly event audit logs on Windows and Linux servers for intrusion detection purposes.
15. Assurance Support
- Letter of recommendation from client Army Review Boards Agency for exceptional performance as Information Assurance Support Officer.
- Appointed by the customer to the position of Information Assurance Support Officer.
5 Information Assurance Officer resume examples
Build a professional information assurance officer resume in minutes. Browse through our resume examples to identify the best way to word your resume. Then choose from 5+ resume templates to create your information assurance officer resume.
What skills help Information Assurance Officers find jobs?
Tell us what job you are looking for, we’ll show you what skills employers want.
What skills stand out on information assurance officer resumes?
David Garaventa
Director, Computer Information Systems and Cybersecurity Programs, Assistant Professor, CIS, Albertus Magnus College
List of information assurance officer skills to add to your resume

The most important skills for an information assurance officer resume and required skills for an information assurance officer to have include:
- IAM
- DOD
- RMF
- Security Policies
- Security Procedures
- Security Posture
- ACAS
- Disa
- Unix
- Security Systems
- STIG
- Network Security
- Windows Server
- Linux
- Assurance Support
- FISMA
- System Administrators
- IAO
- Coop
- Risk Assessments
- IAVA
- Digital Forensics
- Retina
- ATO
- Incident Response
- Security Violations
- Accreditation Process
- Security Patches
- National Security
- Configuration Management
- Management System
- Security Incidents
- Computer System
- System Hardening
- Disk
- Vulnerability Scans
- IAVM
- User Accounts
- HBSS
- VMS
- SharePoint
- DCID
- Workstations
- Assurance Vulnerability Alerts
- SSP
- Vulnerability Assessments
- Security Issues
- LAN
- Trouble Tickets
Updated January 8, 2025