Information Technology and Security (IT)-Resume Tip Sheet

Resume Tip Sheet for Information Technology and Security


As an information technology graduate, you can create a CHRONOLOGICAL resume if you have relevant work experience through a required internship or other experience in the information technology and computing field. (See the article Easy Steps for a Chronological Resume)


Or you can create a COMBINATION resume if you would rather emphasize your categories of skills, along with your education and your required internship. (See the article Easy Steps for a Combination Resume)

Tips for creating key sections of an information technology graduate’s resume:
A. Heading
Recommended format:

Heath Davis
Street Address, City, MI 00000
(000) 000-0000
hdavisemail@gmail.com                        LinkedIn Profile/Customized URL


B. Key Qualifications
Begin your resume with a summary of your key qualifications. To write the bulleted statements in this section, be sure to use keywords, requirements and preferences mentioned in the job posting. (For more information see the following articles: Developing Your Qualifications Summary and Beating the ATS.) Below is an example:

 

KEY QUALIFICATIONS
• Monitor, review and interpret security alerts and notifications and provide initial response, analysis, and case management
• Proficient in installing firewalls, anti virus software, and removing spyware/malware, as well as troubleshooting problems
• Ability to evaluate and recommend the acquisition of IT security tools, procedures, and practices to protect information assets
• Ability to plan and conduct security accreditation reviews for installed systems or networks, and recommend new or revised security measures

C. Work Experience
Dematic                                                                                      Grand Rapids, MI                                                      01/2021-04/2021
Information Technology Associate
• Proactively identified and troubleshot security infrastructure
• Participated in cyber security incident response as required
• Communicated with technical vulnerability management and cyber threat intelligence teams to validate security events and perform advanced analysis
• Ensured that risk management programs communicate security policies and requirements so people can understand and follow them

 

Your work experience should include your internship. Also, be sure to list other information technology and computer experience which would be desirable to the employer (e.g., computer support and repair technician, electronics store associate, computer classroom aide). Any general work experience can also be included in this section with two to three bullets which highlighting transferable soft skills.

D. Education
You may include any colleges at which you have completed courses or from which you have obtained a degree. See the example below which shows how to list your degree:

 

EDUCATION
Baker College                                                                 Jackson, MI                                                   Expected graduation 05/2022
Bachelor of Science                                                                                                                                Honors: Dean’s List, GPA 3.7
Information Technology and Security
with Concentration in Information Assurance and Cybersecurity


Other optional information can be listed: honors, and GPA if 3.5 +.


E. Relevant Coursework
This section is optional. It should only mention specific coursework required for or desirable for the target job. See examples below:
• Malware and Reverse Engineering
• Network Defense                                         • Network Intrusion

 

F. Technical Skills/Special Projects
List all relevant technical skills for the job you are applying for. Below are examples:

 

Operating Systems: Windows 7, 8, and 10, Mac OS X
Languages: PERL, Python, HTML
Databases: SQL, Microsoft Access, and Microsoft SQL Server
Networks: Local Area Networks (LAN), WAN Wireless Networks (WAN), OSI, Routers
Security: Firewalls, Antivirus, Anti-malware
Projects: (You can include a description of the Senior Project here.)


G. Certifications
List all important certifications granted by a governing body. If they are listed as requirements in the job posting, choose the optimum place on the resume for this information. Below are examples of possible certifications:

 

CERTIFICATIONS
Certified Ethical Hacker, EC Council                                                                                           Obtained 00/0000
Red Hat Certified System Administrator, Red Hat                                                                   Obtained 00/0000

 

H. Optional Sections


STUDENT AND PROFESSIONAL ORGANIZATIONS
Cyber Defense Club Member                                                                                                         2019-2021
Association for Computing Machinery Member                                                                       2020

 

VOLUNTEER EXPERIENCE
CODE Computer Classroom Volunteer                                                                                       2020
Community Church Volunteer Staff, Website Team                                                                2018-Present


• Depending on the length of your resume and your goals, the VOLUNTEER EXPERIENCE section can simply be a list of your titles and the organizations or can include duties/achievements as in the KEY QUALIFICATIONS section.

Revised 9 June 2021

 Request Assistance

 

Details

Article ID: 135883
Created
Wed 12/22/21 3:55 PM
Modified
Wed 1/24/24 4:19 PM