Choose from a wide range of CV templates and customize the design with a single click.


Use ATS-optimised CV and resume templates that pass applicant tracking systems. Our CV builder helps recruiters read, scan, and shortlist your CV faster.


Use professional field-tested resume templates that follow the exact CV rules employers look for.
Create CVAn ATS resume for information security analyst roles is screened through security governance alignment, risk management terminology, monitoring tool specificity, and regulatory framework mapping. US hiring systems distinguish Information Security Analyst from SOC Analyst or Ethical Hacker by emphasizing compliance, risk assessment, and security program implementation.
Typical Boolean configurations include:
(Information Security OR Information Security Analyst)
AND (Risk Assessment OR Risk Management)
AND (NIST OR ISO 27001 OR SOC 2 OR HIPAA OR PCI-DSS)
AND (SIEM OR Splunk OR Sentinel)
AND (Vulnerability Management)
If a resume focuses only on incident response without governance or framework language, it may be misclassified or filtered out.
Information security screening is framework-driven. Compliance terminology activates eligibility logic.
ATS ranking differentiates between:
Weak operational-only signal:
Strong governance-aligned signal:
Governance language (controls, audits, assessments, remediation plans) increases ranking weight for Information Security Analyst roles.
US Information Security Analyst requisitions frequently require:
If frameworks appear in the job description but not in the resume, Boolean filters may prevent ranking.
Including both acronym and full framework name improves token recognition.
ATS systems index tools and processes individually:
Generic phrases such as “security tools” or “improved compliance” do not satisfy elimination logic.
Explicit tool and governance terminology strengthens classification accuracy.
Information Security Analysts often include dense compliance language and tool lists:
NIST | ISO 27001 | SOC 2 | Splunk | Risk Assessment | Vulnerability Management
Parsing issues occur when:
Clear separation of frameworks and tools improves Boolean activation reliability.
Information Security Analyst
2020–2024
Skills
Risk Assessment
NIST Cybersecurity Framework
ISO 27001
SOC 2
Splunk
Vulnerability Management
Security Auditing
Why this passes:
IT Security Professional
Why this fails:
The ATS cannot confirm governance-focused information security alignment.
Professional Summary
Information Security Analyst with 7+ years of experience conducting enterprise risk assessments aligned with NIST and ISO 27001 frameworks. Proven expertise in vulnerability management, SOC 2 audit preparation, and SIEM monitoring using Splunk and Microsoft Sentinel. Reduced compliance gaps by 30% and decreased incident response time by 20%. Strong background in security audits, risk register management, and regulatory compliance including HIPAA and PCI-DSS.
Core Skills
Information Security
Risk Assessment
Risk Management
NIST Cybersecurity Framework
ISO 27001
SOC 2
HIPAA
PCI-DSS
Splunk
Microsoft Sentinel
Vulnerability Management
Nessus
Security Auditing
Control Testing
Security Policies
Incident Response
Firewall Management
Compliance Reporting
Data Protection
Security Governance
Professional Experience
Information Security Analyst
SecureTech Solutions, Washington, DC
2019–2024
Security Analyst
DataShield Systems, Atlanta, GA
2016–2019
Certifications
Certified Information Systems Security Professional (CISSP)
Certified Information Security Manager (CISM)
Education
Bachelor of Science in Information Security, University of Maryland, 2016
This structure ensures: