You are on page 1of 3

CS Resume

Here’s how to write a cyber-security resume:

 Use the reverse-chronological resume format to make it easy to read and follow.
 Start with a heading summary or resume objective which makes them continue.
 List your work experience with appropriate duties and winning accomplishments.
 Add an education section which plays up any cyber security coursework you had.
 Include IT and security skills using resume keywords from the job ad.
 Improve your chances with extra sections, like clearances and certifications.
 Attach a cyber-security cover letter before you send your resume off.

How to organize a cyber-security engineer resume:

 Start at the top with a compelling IT security resume objective or summary statement.
 List any past experience, including relevant cyber security duties and achievements.
 Write an education section with relevant IT and cyber security coursework.
 Add your cyber cryptography and criminology skills to win them over to your side.
 Include any cyber certifications, security clearances, and other sections to stand out.
Example of a catching pitch
“Persistent, detail-oriented cyber security analyst with 3+ years’ experience with government security
software contractor. DoD security clearance. Identified the 2018 Kluxnet virus, saving over 30,000
computers from destruction.”
“University IT graduate with cyber security background and hundreds of classroom hours in cloud
safety, automation, and digital forensics. Seeking to leverage newly-minted top secret security
clearance and 4.0 GPA to become the next network security engineer at Astoria Tech.”
Pro-tip: On any cybersecurity resume, the resume objective or summary goes at the top. However, it
doesn’t mean you have to write it first! Save it for the end so you have the rest of your resume to help
inform the writing of your heading statement. And always quantify your achievements
Experiences
The right way to do it is to present the experience, its data frame & location followed by the key
realizations/ achievements like following:

Cyber Security Analyst


January 2015–December 2018
Hackers With Ethics, New York, NY
Key Qualifications & Responsibilities
Monitored organization’s networks for security breaches and investigated violations.
Prepared reports which documented security breaches and extent of damage caused by
breaches.
Conducted penetration testing and located vulnerabilities in systems before they could be
exploited.
Website Consultant
January 2016–December 2018
WordPress Workplace, New York, NY
Key Qualifications & Responsibilities
Considered client concerns to determine best method of defending WordPress sites from
attack.
Scanned sites for malware and security risks on a regular basis.
Quarantined and removed any security issues found.
Key Achievement
Successfully secured and monitored over 50 websites with 0 major attacks.

Talking about your background:

Majoring in Cybersecurity (Cyber Operations Concentration)


Excelsior College, Albany, NY
Expected Graduation: 2021
Relevant Coursework: Cyberattacks and Defenses, Computer Forensics, Cryptography, Risk
Management, Web Architecture, Access Control and Intrusion Detection Technology,
Security Defense Countermeasures.

CS Skills: To select and use wisely depending on the job/curricula description


Hard skills are those you study and learn (e.g., detecting intrusions and vulnerabilities), and soft skills
are ones you work on throughout your life (e.g., being a great communicator).
CS-HS CS-SS CS-Domains
Malware Analysis Communication Skills App & Interface Security
Risk Analysis Attention to Detail Audit Assurance & Compliance
Python Scripting Problem Solving Business Continuity Mgmt & Operational Resilience
Intrusion Detection Collaboration & Teamwork Change Control & Configuration
Data Analytics Time Management Data Security & Information Lifecycle Mgmt
Programming Creative Thinking Datacenter Security
Cloud Security Accountability Encryption & Key Mgmt
Encryption Interpersonal Skills Governance & Risk Mgmt
Automation/Devops Works Well Under Pressure Identity & Access Mgmt
Security Analysis Critical Thinking Infrastructure & Virtualization
Risk Mitigation Decision Making Interoperability & Portability
Reverse Engineering Technical Skills Mobile Security
Secure Software Development Analytical and Diagnostic Skills Security Incident Mgmt, E-Discovery & Cloud Forensics
Incident Response Management Skills Supply Chain Mgmt, Transparency & Accountability
SIEM Tools Computer Skills Threat & Vulnerability Mgmt

You might also like