Automatically Apply For Jobs With Zippi
Upload your resume to get started.
Information Systems Security Officer skills for your resume and career

15 information systems security officer skills for your resume and career
1. RMF
RMF (the Risk Management Framework) refers to a set of criteria used by the federal government and its contractors to improve information security. To be proficient in RMF, in-depth technical experience with core technologies like Digital, Cloud, Data Protection, etc., along with knowledge of FISMA and FedRAMP regulatory compliance requirements.
- Provide quarterly FISMA reporting and supporting Risk Management Framework (RMF) transition and Continuous Monitoring implementation.
- Supported multiple government programs under NISP, JAFAN, and JSIG using the Risk Managed Framework (RMF) approach.
2. DOD
Definition of Done (DoD) is a set of deliverables that are needed to devise software. These deliverables are valuable to the system and can be exemplified by writing code, coding comments, unit testing, integration testing, design documents, release notes, and so on.
- Developed and implemented DOD policies and procedures for the day to day operations and security infrastructure on all departmental computer equipment.
- Provide security guidance to ensure new systems integrate appropriately into the existing security architecture and that it meets DoD security policies.
3. ISSO
- Ensured that all ISSO critical elements were in-line with the requirements mandated by NavajoArea Office and the Office of Information Technology.
- Support the Security Incident Response team in the remediation, documentation and reporting of all incidents for the ISSO assigned system.
4. Windows
Windows is a chain of operating systems that controls a computer and is developed by Microsoft. Every version of Windows consists of GUI (graphical user interface), with a desktop that allows the user to open their files.
- Patch and secure accredited testing laptops weekly for compliance with customer security requirements through Windows registry, and local security policy.
- Perform basic system administration on Information System for Windows utilizing Active Directory and manually for Linux OS.
5. Security Posture
- Engage with both technical and policy stakeholders to maintain and document the security posture of Navy information technology systems.
- Ensured compliant information systems, security infrastructure, design and configurations to deliver dependable information security posture.
6. SCI
SCI stands for "sensitive compartmented information." This program maintains confidential information, often in a military or government capacity, regarding anything from analytical processing, collection methods and systems, and targeting measures. Considering the confidentiality of the information, only qualified individuals are given SCI access.
- Develop SCI systems security policy and procedural guidance.
- Maintained DD254s, clearance and access data files on all SCI, SAP, and Collateral cleared personnel and contracts.
Choose from 10+ customizable information systems security officer resume templates
Build a professional information systems security officer resume in minutes. Our AI resume writing assistant will guide you through every step of the process, and you can choose from 10+ resume templates to create your information systems security officer resume.7. POA
- Experience in writing and executing test cases, POA & M's and policies.
8. Configuration Management
Configuration management is a technical system of management controls that includes decisions, actions, and approvals that are applied throughout the life cycle of a program or system and that maintain the consistency of its performance, functional and physical attributes from the conceptual phase to production and finally to post-production support.
- Perform security assessments using GAO's current processes supporting configuration management, vulnerability scanning, web application security and network monitoring.
- Developed and oversaw developers with the implementation of a secure web-enabled configuration management tool utilizing Microsoft web and database technologies.
9. Linux
Linux is a Unix-like operating system. Just like Windows, Mac OS, and IOS, Linux is an operating system used by millions across the globe. Android itself is powered by the Linux operating system. Linux manages all the hardware resources that are associated with your computer. The software is famous because of the protection it grants from viruses, malware, and crashes. The Linux operating system is entirely free and is an open-source software meaning it can be altered by those equipped with the knowledge to code.
- Developed Linux based log analysis tools.
- Provide system support of applications and services running on Linux servers, and networked storage services.
10. ISSM
- Provided recommendations to the ISSM for developing plans to approach and resolve information system security solutions.
- Work with the ISSM in writing system accreditation/certification documentation.
11. ICD
Instructor-Led Course Descriptions (ICD) includes training reviews SSO obligations as cited in ICD 703, ICS 703-01, and the Tech Spec for ICD/ICS 705. Security Professionals who are qualified for personnel indoctrinated into Classified National Intelligence (CNI), to include SCI, direct or supervise the day-to-day operations of SCIFs or SCI programs are encouraged to attend.
- Support security authorization activities in compliance with ICD 503 requirements.
- Inspect Information systems at contractor sites nationwide to ensure compliance with DCID 6/3, NISPOM and ICD 503 policies.
12. Incident Response
Incident response is defined as the process by which a company or organization handles a cyber attack or a data breach. Along with dealing with the initial attack, this also deals with the possible consequences of the breach. The goal of incident response is to limit the damage caused by the attack.
- Provided company organizations with computer forensic support, including trusted download verification, forensic imaging and incident response and investigations.
- Performed information security officer duties including; intrusion prevention and detection, incident response, investigation, and key-certificate administration.
13. Nessus
- Utilize Tenable NESSUS Vulnerability Management tool to read and manage vulnerabilities for the OCFO financial systems.
- Completed the incorporation of continuous monitoring using Tripwire Enterprise, Tripwire Log Center, Nessus and QualysGuard vulnerability scanners.
14. Computer System
- Direct and verify compliance with operating system security controls, computer system security controls, and application layer security controls.
- Performed senior operator and systems and network administrator duties, unit level maintenance functions on assigned computer systems.
15. System Security
- Monitor and manage information system security programs; report security incidents and formulate and recommend and apply corrective security procedures.
- Implemented and enforced information system security regulation and guidelines according to the Department of Defense and National Security Agency standards.
5 Information Systems Security Officer Resume Examples
Build a professional information systems security officer resume in minutes. Browse through our resume examples to identify the best way to word your resume. Then choose from 5+ resume templates to create your information systems security officer resume.
What skills help Information Systems Security Officers find jobs?
Tell us what job you are looking for, we’ll show you what skills employers want.
What skills stand out on Information Systems Security Officer resumes?
David Garaventa
Director, Computer Information Systems and Cybersecurity Programs, Assistant Professor, CIS, Albertus Magnus College
What Information Systems Security Officer skills would you recommend for someone trying to advance their career?
What type of skills will young Information Systems Security Officers need?
What soft skills should all Information Systems Security Officers possess?
List of information systems security officer skills to add to your resume
The most important skills for an information systems security officer resume and required skills for an information systems security officer to have include:
- RMF
- DOD
- ISSO
- Windows
- Security Posture
- SCI
- POA
- Configuration Management
- Linux
- ISSM
- ICD
- Incident Response
- Nessus
- Computer System
- System Security
- Security Measures
- ACAS
- Risk Assessments
- Security Documentation
- FISMA
- Unix
- ATO
- Encryption
- Vulnerability Assessments
- SSPs
- Security Incidents
- Security Issues
- NISPOM
- AIS
- PC
- DSS
- National Security
- Xacta
- Corrective Measures
- STIG
- DHS
- Cloud Security
- Switches
- Management System
- Fips
- User Accounts
- System Administrators
- Accreditation Process
- Disaster Recovery
- VMware
- Virtualization
- Vulnerability Scans
- Data Loss Prevention
Updated January 8, 2025