Automatically apply for jobs with Zippia
Upload your resume to get started.
Information security administrator skills for your resume and career
15 information security administrator skills for your resume and career
1. Incident Response
Incident response is defined as the process by which a company or organization handles a cyber attack or a data breach. Along with dealing with the initial attack, this also deals with the possible consequences of the breach. The goal of incident response is to limit the damage caused by the attack.
- Updated company procedures governing corporate security, access control, and incident response.
- Carried out initial incident response and digital forensic analysis of compromised systems.
2. Security Systems
A security system refers to any device that can perform security operations such as surveillance, access control, alarm, or intrusion control in a facility or area through a system of components and multifunctional devices designed to protect people and the property against a variety of hazards including crime, arson, accidents, espionage, sabotage, subversion, and attack. A security system also detects several other threats, including smoke, carbon monoxide poisoning, and water damage.
- Provided technical services for the support of integrated security systems.
- Maintained security on all proprietary and vendor-supplied application security systems.
3. Data Loss Prevention
- Managed acquisition, implementation, deployment and ongoing administration of data loss prevention systems.
- Developed end user education materials for Data Loss Prevention Program.
4. Security Policies
- Migrated, installed, and secured application programs adhering to established and published security policies and audit guidelines enabling rapid productivity.
- Created and fine-tuned security policies facilitating user understanding of policies and procedures, allowing successful audit results.
5. Security Procedures
A security procedure is a verification protocol used to check if an electronic signature, record, or performance belongs to that specific person. It is a set of necessary procedures that need to be performed to maintain security. These procedures are step-by-step guidelines on how to implement, enable, or enforce security.
- Update Information Security procedures manual with changes in procedures and security environment.
- Conducted training on databases, security procedures, and application security.
6. IDS
An IDS (intrusion detection system) stands for a software application or device that monitors a network to identify policy violations or malicious activities.
- Processed system access requests including building new ids, changing existing system access, processing deletes and trouble-shooting password issues.
- Generated intrusion detection reports via SNORT IDS servers and analyzed via BASE Web UI.
Choose from 10+ customizable information security administrator resume templates
Build a professional information security administrator resume in minutes. Our AI resume writing assistant will guide you through every step of the process, and you can choose from 10+ resume templates to create your information security administrator resume.7. IP
An IP - Internet Protocol is a unique number assigned to all devices connected to information technology, such as printers, routers, modems, etc. Each device or domain that connects to the Internet is assigned an IP address, and as packets are directed to the IP address attached to them, the data goes where it is needed. IP addresses are the identifier used to send information between devices on a network. They contain location information and make devices accessible for communication.
- Deactivate and reactivate MAC addresses, network ports and IP addresses.
- Provided support for managed IP security services customers in a 24x7 UNIX operations center.
8. HIPAA
- Led risk assessment and remediation projects to ensure compliance with Health Insurance Portability and Accountability Act (HIPAA) requirements.
- Created and conducted HIPAA training program for executive management and general staff.
9. Access Management
Access management increases productivity while keeping the data of an organization secure. It ensures that the right users have access to appropriate technology resources.
- Experience using Identity Access Management and Remedy request systems.
- Monitor Identity Management activity and issues on the portal and NAM environment and expediting issues to the Identity Access Management team.
10. PCI
- Work with auditors to gather the proper information for PCI and SOX audits and submit the information in timely required manner.
- Minimized PCI scope, and reached University wide PCI compliance which has been sustained for the last 5 years.
11. Security Incidents
- Assisted in the identification, reporting, and investigation and documenting of security incidents in accordance with applicable policies and directives.
- Responded to security incidents, identified & communicated findings.
12. Troubleshoot
Troubleshooting is the process of analyzing and fixing any kind of problem in a system or a machine. Troubleshooting is the detailed yet quick search in the system for the main source of an issue and solving it.
- Review Problem Management type systems to troubleshoot and resolve security related issues.
- Remain on call 24/7 to diagnose and troubleshoot any technical problems in any disaster recovery plans.
13. ISO
- Prepared 2 sites in Chennai for ISO 27001 certification, which were included in the scope in 2008 Audit.2.
- Program lead for successful ISO 27001 certification of US data center.
14. SQL
- Created and manage accounts as necessary for access to SQL, Oracle, FTP and Business Objects access.
- Added Active Directory, Mainframe, Unix, and SQL accounts to various servers and databases.
15. VPN
A Virtual Private Network, VPN encrypts a device's internet access, activity, and identity through a secure server, making data theft and third-party traceability more difficult, and increasing the privacy and security of public and private networks, the internet, and Wi-Fi hotspots. The VPN is designed to protect one's system and network from being compromised.
- Inspect all CISCO PIX / ASA / FortiGate Firewall ACL and VPN configuration setting using CIS-CAT Benchmark Assessment Tool.
- Executed administration and configuration of RSA two factor authentication for VPN, NERC/CIP, Jump Servers and Firewalls.
5 Information Security Administrator resume examples
Build a professional information security administrator resume in minutes. Browse through our resume examples to identify the best way to word your resume. Then choose from 5+ resume templates to create your information security administrator resume.
What skills help Information Security Administrators find jobs?
Tell us what job you are looking for, we’ll show you what skills employers want.
What type of skills will young information security administrators need?
What soft skills should all information security administrators possess?
List of information security administrator skills to add to your resume

The most important skills for an information security administrator resume and required skills for an information security administrator to have include:
- Incident Response
- Security Systems
- Data Loss Prevention
- Security Policies
- Security Procedures
- IDS
- IP
- HIPAA
- Access Management
- PCI
- Security Incidents
- Troubleshoot
- ISO
- SQL
- VPN
- Java
- Linux
- SOX
- Phishing
- Encryption
- Security Administration
- User Accounts
- Security Issues
- Patch Management
- DOD
- Unix
- Provisioning
- Random Audits
- McAfee
- SharePoint
- Tcp Ip
- Database
- Emerging Technologies
- Mainframe
- Windows Server
- Nessus
- Security Awareness
- Sarbanes-Oxley
- Windows XP
- Security Violations
- ISA
- Level Support
- Incident Management
- Network Infrastructure
- Key Management
- Network Devices
- PeopleSoft
Updated January 8, 2025