Automatically apply for jobs with Zippia
Upload your resume to get started.
Information assurance security officer skills for your resume and career
15 information assurance security officer skills for your resume and career
1. Security Procedures
A security procedure is a verification protocol used to check if an electronic signature, record, or performance belongs to that specific person. It is a set of necessary procedures that need to be performed to maintain security. These procedures are step-by-step guidelines on how to implement, enable, or enforce security.
- Develop, document and implement data security procedures that enforce information security standards for the unit.
- Trained users on proper insider threat and computer security procedures according to company policy.
2. DOD
Definition of Done (DoD) is a set of deliverables that are needed to devise software. These deliverables are valuable to the system and can be exemplified by writing code, coding comments, unit testing, integration testing, design documents, release notes, and so on.
- Managed one-year project at request of corporate management to identify performance time required to comply with DoD directives.
- Helped ensure users were following DoD and Army network and application policies by periodically inspecting computers.
3. ACAS
- Experience using Retina and Tenable Nessus ACAS Vulnerability Scanner.
- Performed ACAS vulnerability scans and provided reports on IAVM/STIG compliance to leadership.
4. IAM
IAM policies are specific permissions on the Amazon Web Server (AWS) for an operation or action regardless of the way it is performed. For example, if an IAM policy defines GetUser action, then a user can get user information from any parts of the AWS, such as the AWS Management Console, AWS API, or the AWS CLI.
- Provided mitigation recommendations to the IAM and created executive-level presentations for senior leadership.
- Perform and report an array of other duties as assigned by the IA Chief and IAM as needed.
5. Security Policies
- Employed security policies and requirements into an IA configuration implementation and application requirements.
- Authored numerous supplemental Security Policies and Standards documents unique to our network.
6. System Security
- Developed and tested disaster recovery plans, vulnerability management plan, and system security plan; managed information assurance training program.
- Worked as a member of a team of Information System Security Officers to ensure DIACAP compliance of classified information systems post-wide.
Choose from 10+ customizable information assurance security officer resume templates
Build a professional information assurance security officer resume in minutes. Our AI resume writing assistant will guide you through every step of the process, and you can choose from 10+ resume templates to create your information assurance security officer resume.7. Windows Server
- Maintained and managed Windows Server 2003 server that runs Information Assurance REM software.
- Create installation package for quarterly Oracle Critical Security Patch deployable for Windows 7 and Windows Server 2008R2 platforms.
8. Assurance Vulnerability Alerts
- Achieved and maintained 95% or higher compliancy on all information assurance vulnerability alerts, bulletins, and technical tips.
- Maintained 172 computers for the Department of the Army, ensuring compliancy with its Information Assurance Vulnerability Alert System.
9. Compliance Procedures
- Ensured implementation of Information Assurance Vulnerability Management (IAVM) dissemination, reporting, and compliance procedures.
- Implemented the Information Assurance reporting and compliance procedures in accordance with the Information Assurance Vulnerability Alert (IAVA) processes.
10. Computer System
- Monitored all computer systems for unauthorized activity while ensuring the latest anti-virus software was available to all systems.
- Conducted vulnerability and risk analyses of computer systems.
11. Linux
Linux is a Unix-like operating system. Just like Windows, Mac OS, and IOS, Linux is an operating system used by millions across the globe. Android itself is powered by the Linux operating system. Linux manages all the hardware resources that are associated with your computer. The software is famous because of the protection it grants from viruses, malware, and crashes. The Linux operating system is entirely free and is an open-source software meaning it can be altered by those equipped with the knowledge to code.
- Conducted Operating System (OS) audits to include Windows, Unix, and Linux.
- Installed, configured and maintained UNIX, Linux and Microsoft servers and client systems.
12. Retina
- Managed, and consolidated Retina Enterprise Scanner vulnerability assessment reports for over 15,000 information systems distributed throughout Afghanistan.
- Completed Retina Network Security Scans bi-annually and after any new equipment upgrades for software and equipment vulnerability.
13. Network Security
- Audited network security implementation access and violations against policies, procedures, and regulations.
- Reviewed and implemented policy relative to personnel, administrative and network security functions.
14. Security Posture
- Provided scheduled briefing on risk assessments, vulnerabilities and their effects to the organizations overall security posture to agency leadership.
- Provide input to management reference to Security posture of applications and emerging network requirements.
15. Incident Response
Incident response is defined as the process by which a company or organization handles a cyber attack or a data breach. Along with dealing with the initial attack, this also deals with the possible consequences of the breach. The goal of incident response is to limit the damage caused by the attack.
- Served as Information Assurance Security Officer (IASO) performing incident response, change management, and conducting periodic account audits.
- Handled incident responses and spillages including, coordination with RCERT and ACERT as appropriate.
5 Information Assurance Security Officer resume examples
Build a professional information assurance security officer resume in minutes. Browse through our resume examples to identify the best way to word your resume. Then choose from 5+ resume templates to create your information assurance security officer resume.
What skills help Information Assurance Security Officers find jobs?
Tell us what job you are looking for, we’ll show you what skills employers want.
What information assurance security officer skills would you recommend for someone trying to advance their career?
Assistant Professor & IT Program Coordinator, Governors State University
List of information assurance security officer skills to add to your resume

The most important skills for an information assurance security officer resume and required skills for an information assurance security officer to have include:
- Security Procedures
- DOD
- ACAS
- IAM
- Security Policies
- System Security
- Windows Server
- Assurance Vulnerability Alerts
- Compliance Procedures
- Computer System
- Linux
- Retina
- Network Security
- Security Posture
- Incident Response
- Disa
- IAVA
- User Accounts
- LAN
- Configuration Management
- IAVM
- HBSS
- Trouble Tickets
- Security Issues
- Risk Assessments
- Sipr
- Workstations
- ATO
- SharePoint
- Vulnerability Assessments
- Nipr
- Iaso
- FISMA
- OS
- Accreditation Process
- COMSEC
- Management System
- Security Violations
- Security Incidents
- SCCM
- Disk
- System Changes
- Network Operations
- VMS
- McAfee
- Windows XP
- AIS
- Security Measures
- Physical Security
Updated January 8, 2025