Automatically apply for jobs with Zippia
Upload your resume to get started.
Information systems security manager skills for your resume and career
15 information systems security manager skills for your resume and career
1. RMF
RMF (the Risk Management Framework) refers to a set of criteria used by the federal government and its contractors to improve information security. To be proficient in RMF, in-depth technical experience with core technologies like Digital, Cloud, Data Protection, etc., along with knowledge of FISMA and FedRAMP regulatory compliance requirements.
- Created many of the required security RMF policy/procedure documentation for the four systems maintained.
- Performed risk assessments and validated documentation to enable a seamless transition into RMF.
2. IAM
IAM policies are specific permissions on the Amazon Web Server (AWS) for an operation or action regardless of the way it is performed. For example, if an IAM policy defines GetUser action, then a user can get user information from any parts of the AWS, such as the AWS Management Console, AWS API, or the AWS CLI.
- Lead Information Systems Security Manager (ISSM) / Information Assurance Manager (IAM) for Joint Base Langley-Eustis.
- Certified as a Department of Defense 8570 IAM Level I Complaint as an Information System Security Manager.
3. DOD
Definition of Done (DoD) is a set of deliverables that are needed to devise software. These deliverables are valuable to the system and can be exemplified by writing code, coding comments, unit testing, integration testing, design documents, release notes, and so on.
- Ensured disaster recovery and contingency plans were tested and implemented in accordance with DOD Risk Management Framework policies and procedures.
- Used the DoD Information Technology Security Certification and Accreditation Process (DITSCAP) to certify legacy software government applications.
4. ISSM
- Served as the Information Systems Security Manager (ISSM) for the L-3 Communications (GS&ES) Huntsville facility.
- Serve as ISSM (Information Systems Security Manager) for multiple classified IS computing activities ensuring employee compliance with government policies.
5. Windows
Windows is a chain of operating systems that controls a computer and is developed by Microsoft. Every version of Windows consists of GUI (graphical user interface), with a desktop that allows the user to open their files.
- Installed, configured, and administered Windows 2003 domain, consisting of 5 network servers, supporting 78 client workstations.
- Granted self certification authority by the Defense Security Service for Networks and standalone systems running Windows and Unix Operating Systems.
6. Security Posture
- Utilize assessment methodology to conduct security control/vulnerability site assessments, in order to evaluate internal and external information security postures.
- Illustrated security posture of the application, database, and network environment through accomplishment of security metrics.
Choose from 10+ customizable information systems security manager resume templates
Build a professional information systems security manager resume in minutes. Our AI resume writing assistant will guide you through every step of the process, and you can choose from 10+ resume templates to create your information systems security manager resume.7. Security Program
- Lead a team of less experienced security personnel in monitoring and maintaining security programs to ensure compliance with client security procedures.
- Managed the organization's Industrial Security program that consists of approximately 25 classified systems utilizing approximately 758 Personal Computers and Servers.
8. ICD
Instructor-Led Course Descriptions (ICD) includes training reviews SSO obligations as cited in ICD 703, ICS 703-01, and the Tech Spec for ICD/ICS 705. Security Professionals who are qualified for personnel indoctrinated into Classified National Intelligence (CNI), to include SCI, direct or supervise the day-to-day operations of SCIFs or SCI programs are encouraged to attend.
- Performed Information system security assessments / audits under DCID 6/3, NISPOM CH8, and ICD 503 requirements.
- Perform Computer Systems Security compliance duties, as prescribed in the Intelligence Community Directive (ICD) 503.
9. POA
- Experience in writing and executing test cases, POA & M's and policies.
10. Linux
Linux is a Unix-like operating system. Just like Windows, Mac OS, and IOS, Linux is an operating system used by millions across the globe. Android itself is powered by the Linux operating system. Linux manages all the hardware resources that are associated with your computer. The software is famous because of the protection it grants from viruses, malware, and crashes. The Linux operating system is entirely free and is an open-source software meaning it can be altered by those equipped with the knowledge to code.
- Performed system/software installation, administration, and maintenance of four dual-booting Microsoft and Linux operating systems.
- Created a Linux driven Clustered Server system out of units destined for disposal.
11. SCI
SCI stands for "sensitive compartmented information." This program maintains confidential information, often in a military or government capacity, regarding anything from analytical processing, collection methods and systems, and targeting measures. Considering the confidentiality of the information, only qualified individuals are given SCI access.
- Managed all aspects of Industrial and SCI security, physical, information and program security for multiple security level areas.
- Obtain government accreditation for AUTOMATED INFORMATION SYSTEM systems processing Secret, Top Secret, SCI and Special Access data.
12. Configuration Management
Configuration management is a technical system of management controls that includes decisions, actions, and approvals that are applied throughout the life cycle of a program or system and that maintain the consistency of its performance, functional and physical attributes from the conceptual phase to production and finally to post-production support.
- Defined and documented company processes for Configuration Management, Verification, Validation, and Process and Product Quality Assurance areas.
- Developed the emergency action plan, disaster recovery plan, maintenance/upgrade plan, and Configuration Management plan for multiple programs.
13. System Security
- Developed new positions and recruited / hired staff including: information system security officers and computer security operations center staff.
- Ensured that all System Security accreditation support documentation was developed, submitted and maintained in accordance with established guidelines.
14. Security Measures
- Perform risk assessments and executed tests of data processing system to ensure functioning of data processing activities and security measures.
- Identified the sensitivity level of information prior to utilization of IA and implement proper security measures to protect classified information
15. Risk Assessments
The process of analyzing and identifying the acts or events that have the potential to negatively affect an individual, asset, or business is called risk assessment. Risk assessments are important because they form an integral part of an organization as well as occupational safety plans
- Team Lead tasked with conducting penetration testing; vulnerability and risk assessments; security policy development and risk mitigation procedures.
- Conduct vulnerability and risk assessments on a weekly basis to ensure compliance with continuous monitoring requirements.
5 Information Systems Security Manager resume examples
Build a professional information systems security manager resume in minutes. Browse through our resume examples to identify the best way to word your resume. Then choose from 5+ resume templates to create your information systems security manager resume.
What skills help Information Systems Security Managers find jobs?
Tell us what job you are looking for, we’ll show you what skills employers want.
What soft skills should all information systems security managers possess?
List of information systems security manager skills to add to your resume

The most important skills for an information systems security manager resume and required skills for an information systems security manager to have include:
- RMF
- IAM
- DOD
- ISSM
- Windows
- Security Posture
- Security Program
- ICD
- POA
- Linux
- SCI
- Configuration Management
- System Security
- Security Measures
- Risk Assessments
- Security Incidents
- ISSO
- NISPOM
- STIG
- Security Education
- Nessus
- Computer System
- Vulnerability Assessments
- Unix
- Corrective Action
- Security Issues
- Incident Response
- Network Security
- Security Violations
- National Security
- Intrusion Detection
- Accreditation Process
- Defense Security Service
- FISMA
- ATO
- Encryption
- Data Loss Prevention
- AIS
- System Administrators
- HBSS
- FSO
- SSPs
- Switches
- DCID
- Virtualization
- Physical Security
- DAA
- Security Training
- COMSEC
- Disaster Recovery
Updated January 8, 2025