Automatically Apply For Jobs With Zippi
Upload your resume to get started.
Securities Analyst skills for your resume and career

15 securities analyst skills for your resume and career
1. Incident Response
Incident response is defined as the process by which a company or organization handles a cyber attack or a data breach. Along with dealing with the initial attack, this also deals with the possible consequences of the breach. The goal of incident response is to limit the damage caused by the attack.
- Determine if security events monitored should be escalated to incidents and follow all applicable incident response and reporting processes and procedures.
- Assisted in building a custom Security Incident Response and Management application in Archer that automated tasks incident managers performed.
2. Security Policies
- Participated in developing information security policies and procedures
- Coordinate and monitor sensitive aspects of the industrial security program to ensure compliance with government and company security policies and procedures.
3. NIST
- Apply appropriate information security control for Federal Information Systems based on NIST guidance.
- Developed a manual risk assessment methodology based upon NIST recommendations.
4. Windows
Windows is a chain of operating systems that controls a computer and is developed by Microsoft. Every version of Windows consists of GUI (graphical user interface), with a desktop that allows the user to open their files.
- Monitored activity such as Windows and Linux system administration, AWS network management, and network device configuration.
- Developed hardened servers based on various Linux distributions and Microsoft Windows platforms.
5. SIEM
- Monitored and responded to SIEM generated incidents and other electronic notifications.
- Extracted the logs, Perform real time log analysis using SIEM technologies and Forensics Analysis of logs as per the request.
6. Risk Assessments
The process of analyzing and identifying the acts or events that have the potential to negatively affect an individual, asset, or business is called risk assessment. Risk assessments are important because they form an integral part of an organization as well as occupational safety plans
- Provide security expertise and support across the organization in risk assessments and the implementation of appropriate security procedures and products.
- Performed risk assessments and executed tests of data processing system to ensure functioning of data processing activities and security measures.
Choose from 10+ customizable securities analyst resume templates
Build a professional securities analyst resume in minutes. Our AI resume writing assistant will guide you through every step of the process, and you can choose from 10+ resume templates to create your securities analyst resume.7. Data Loss Prevention
- Work with engineers to develop and tune Data Loss Prevention policies that detect the transmission of restricted information to unauthorized parties.
- Worked as technical security lead for an enterprise wide project to implement a Data Loss Prevention (DLP) solution.
8. Security Systems
A security system refers to any device that can perform security operations such as surveillance, access control, alarm, or intrusion control in a facility or area through a system of components and multifunctional devices designed to protect people and the property against a variety of hazards including crime, arson, accidents, espionage, sabotage, subversion, and attack. A security system also detects several other threats, including smoke, carbon monoxide poisoning, and water damage.
- Engineered, installed, maintained, and repaired security systems, programmable logic controls, or other security-related electronic systems.
- Develop the security of electronic information and establish security systems, policies and procedures to prevent system compromise or infiltration.
9. Security Issues
Security issues can be related to computer-based attacks, unauthorized physical access, and/or third-party breaches to either digital or physical locations. Security issue skills include locating, identifying, and eliminating the danger in time before any damage can be done.
- Participated in the evaluation and implementation of emerging data access control technologies, information systems security issues, safeguards and techniques.
- Provided knowledge of security issues around integrating PeopleSoft with other applications using an integration broker.
10. Database
A database is a collection of data and information which makes it easy to view, access, and manage. Databases save a lot of time and can store huge amounts of data. Databases make sorting data easier and stores it in certain fields which narrows the searching criteria. A database usually contains tables, graphs, and columns to display data.
- Submit suggested changes/improvements for consideration and implement approved changes that would improve the fidelity and responsiveness of the international security database.
- Maintained Information Assurance Vulnerability Alerts/Bulletins /Technical Advisories (IAVA/B/T) database and verify all accredited systems have been updated accordingly.
11. Linux
Linux is a Unix-like operating system. Just like Windows, Mac OS, and IOS, Linux is an operating system used by millions across the globe. Android itself is powered by the Linux operating system. Linux manages all the hardware resources that are associated with your computer. The software is famous because of the protection it grants from viruses, malware, and crashes. The Linux operating system is entirely free and is an open-source software meaning it can be altered by those equipped with the knowledge to code.
- Performed penetration testing on applications and systems using manual and automated testing using tools like Kali Linux, Burp suite.
- Used administration experience with Information Security on WinNT/2000/XP, UNIX and Linux platforms to provide accurate analysis of network activity.
12. DOD
Definition of Done (DoD) is a set of deliverables that are needed to devise software. These deliverables are valuable to the system and can be exemplified by writing code, coding comments, unit testing, integration testing, design documents, release notes, and so on.
- Provided systems engineering, network security requirements specification and analysis, Integration and Test support to DoD and government agencies.
- Coordinated and participated in high-level meetings; with various DoD agencies; discussed facility, personnel and organizational security.
13. Security Events
- Perform information security investigations from initial response to resolution as well as alert customers by composing security event notifications.
- Develop monitoring processes, triage actions, and escalations to provide security event monitoring service to the organization.
14. ISO
- Assisted ISO with developing processes and procedures for information security.
- Perform vendor security assessments for potential and existing SaaS vendors based on ISO 27002 and other information security standards and frameworks.
15. Security Incidents
- Maintained relationships and collaborated with local and federal law enforcement agencies to resolve security incidents such as robberies and physical threats.
- Identified computer security incidents by characterizing the nature and severity of incidents among the Firm's community both internally and externally.
12 Securities Analyst Resume Examples
Build a professional securities analyst resume in minutes. Browse through our resume examples to identify the best way to word your resume. Then choose from 12+ resume templates to create your securities analyst resume.
What skills help Securities Analysts find jobs?
Tell us what job you are looking for, we’ll show you what skills employers want.
What soft skills should all Securities Analysts possess?
List of securities analyst skills to add to your resume
The most important skills for a securities analyst resume and required skills for a securities analyst to have include:
- Incident Response
- Security Policies
- NIST
- Windows
- SIEM
- Risk Assessments
- Data Loss Prevention
- Security Systems
- Security Issues
- Database
- Linux
- DOD
- Security Events
- ISO
- Security Incidents
- Application Security
- Firewall
- Encryption
- HIPAA
- SOC
- Network Security
- Java
- Security Procedures
- Splunk
- Security Audits
- Intrusion Detection
- PCI
- Access Management
- Strong Analytical
- Tcp Ip
- Vulnerability Assessments
- Security Threats
- Switches
- SQL
- Unix
- Troubleshoot
- Technical Support
- Excellent Interpersonal
- Confluence
- DLP
- Azure
- Security Violations
- Cloud Computing
- SOX
- Nessus
- Physical Security
- Security Awareness
Updated January 8, 2025