Resume example

Cybersecurity Analyst
Resume: Examples, Tips & Free Template

Build a cybersecurity analyst resume that gets past ATS. Includes a real sample resume, must-have certifications, and tips for highlighting incident response and threat detection.

Build my cybersecurity analyst resume

James Kowalski

Cybersecurity Analyst

james.kowalski@email.com+1 (555) 234-5670Washington, US

Cybersecurity analyst with 5 years of experience in threat detection, incident response, and vulnerability management. Managed security operations for a healthcare network protecting 2M+ patient records. Holds CISSP and CompTIA Security+ certifications.

Experience

Cybersecurity Analyst II · MedStar Health
2022-06 – Present
  • Detected and contained a ransomware attempt within 15 minutes, preventing potential $5M+ in damages and data exposure
  • Reduced mean time to detect (MTTD) threats by 60% through SIEM tuning and custom detection rules
  • Managed vulnerability remediation program reducing critical vulnerabilities from 450 to 38 across 5,000+ endpoints
  • Led HIPAA security risk assessments resulting in zero findings during 2 consecutive annual audits
SplunkCrowdStrikeNessusPalo AltoMITRE ATT&CK
Cybersecurity Analyst · Booz Allen Hamilton
2020-03 – 2022-05
  • Conducted 25+ vulnerability assessments and penetration tests for federal agency clients
  • Developed incident response playbooks adopted by 3 agency SOC teams
  • Implemented a zero-trust network architecture pilot reducing lateral movement risk by 80%
SplunkWiresharkBurp SuiteNmapNIST 800-53
Junior Security Analyst · Northrop Grumman
2019-01 – 2020-02
  • Triaged 200+ security alerts per shift with a 99.5% accurate classification rate
  • Authored 12 technical threat intelligence briefs distributed to leadership and partner organizations
SIEMIDS/IPSFirewall ManagementLinuxPython

Education

George Mason University — B.S., Cybersecurity Engineering
2015-09 – 2019-05

Skills

Security Operations — SIEM (Splunk, Sentinel), EDR (CrowdStrike, Carbon Black), IDS/IPS, Firewall Management, Incident Response, Threat Hunting
Vulnerability Management — Nessus, Qualys, Burp Suite, Nmap, Penetration Testing, OWASP Top 10
Frameworks & Compliance — NIST 800-53, MITRE ATT&CK, HIPAA, SOC 2, PCI DSS, Zero Trust
Technical Skills — Python, Bash, PowerShell, Linux, Windows Server, Wireshark, TCP/IP

Certificates

CISSP (Certified Information Systems Security Professional) \u00b7 ISC22023-03
CompTIA Security+ \u00b7 CompTIA2020-01
CompTIA CySA+ (Cybersecurity Analyst) \u00b7 CompTIA2021-07

Built with the elegant template — use this template

What hiring managers look for in a cybersecurity analyst resume

Cybersecurity hiring is driven by certifications, hands-on tool experience, and evidence of real incident response. Unlike many tech roles where certifications are nice-to-haves, security certifications are often listed as hard requirements in job postings.

Hiring managers scan for three things: security tool proficiency (SIEM, EDR, vulnerability scanners), compliance framework knowledge (NIST, HIPAA, SOC 2, PCI DSS), and incident response experience with measurable outcomes. They also look for a progression from monitoring and triage to analysis and leadership.

The cybersecurity talent gap remains significant — there are far more open roles than qualified candidates. But “qualified” means certifications, hands-on experience, and the ability to communicate security risks to non-technical stakeholders.

Resume sections guide

Professional summary

Lead with experience level, primary security domain (SOC, vulnerability management, incident response), and certifications. Include the scale of systems you’ve protected.

Example: “Cybersecurity analyst with 5 years of experience in threat detection and incident response. CISSP certified. Managed security operations protecting 2M+ patient records across a 10-hospital healthcare network.”

Work experience

Security analyst bullets should describe threats detected or prevented, response times, and the scale of systems protected. Compliance audit results are also strong evidence.

Weak: “Monitored security alerts.”

Strong: “Reduced mean time to detect threats by 60% through SIEM tuning and custom detection rules, monitoring 5,000+ endpoints.”

Skills section

Organize into Security Operations, Vulnerability Management, Frameworks/Compliance, and Technical Skills. Include specific tool names — SIEM platform, EDR vendor, and scanner names all matter for ATS matching.

Education

Cybersecurity, computer science, and IT degrees are common. Certifications often carry equal or greater weight. List certifications prominently, ideally in a dedicated section.

Top skills to include

Hard skills: SIEM (Splunk, Sentinel, QRadar), EDR (CrowdStrike, SentinelOne, Carbon Black), vulnerability scanning (Nessus, Qualys), penetration testing (Burp Suite, Metasploit), NIST 800-53, MITRE ATT&CK, HIPAA, SOC 2, PCI DSS, zero trust, Python, Bash, PowerShell, Linux, Windows, TCP/IP, Wireshark, incident response, threat hunting, forensics

Soft skills: Risk communication, stakeholder reporting, documentation, mentoring, cross-functional collaboration, calm under pressure, attention to detail, continuous learning

5 tips for a standout cybersecurity analyst resume

  1. List certifications at the top. CISSP, Security+, CySA+, CEH, and OSCP are the most searched certifications by security recruiters. Make them immediately visible — many recruiters search resume databases by certification name.
  1. Quantify your incident response. Response times (MTTD, MTTR), number of incidents handled, and the financial impact of threats prevented are the strongest metrics for security resumes.
  1. Name your tools. Splunk, CrowdStrike, Nessus, Palo Alto, Wireshark — specific tool names are ATS keywords. “SIEM experience” alone is too vague.
  1. Include compliance frameworks. NIST 800-53, HIPAA, SOC 2, PCI DSS, and MITRE ATT&CK are the most commonly referenced frameworks. Include the ones relevant to your experience.
  1. Show progression from monitoring to analysis. Moving from alert triage to threat hunting to incident response leadership tells a growth story that hiring managers value.

Common mistakes

  • Certifications buried at the bottom: Security certifications should be near the top of your resume, not hidden after education. They’re often the first thing a security hiring manager looks for.
  • No specific tool names: Listing “SIEM” without specifying Splunk, Sentinel, or QRadar is a missed ATS opportunity.
  • Vague incident descriptions: “Handled security incidents” says nothing. Describe the type of threat, your response, and the outcome.
  • Missing compliance knowledge: Even SOC analysts need to understand the regulatory environment. If you’ve worked with HIPAA, PCI, or NIST, include it.
  • No mention of scripting: Python and Bash are increasingly expected for automating security tasks. If you can script, say so.

Frequently asked questions

What certifications should I get first?

CompTIA Security+ is the standard entry point. From there, CySA+ (for analyst roles) or CEH (for penetration testing) are logical next steps. CISSP is the gold standard for mid-senior security professionals but requires 5 years of experience.

Can I break into cybersecurity from IT support?

Yes. Many cybersecurity professionals start in helpdesk or sysadmin roles. Get Security+ certified, build a home lab for practice, and seek internal transfers or SOC analyst positions.

How important is a cybersecurity degree?

Helpful but not required. Certifications and hands-on experience matter more in security than in most tech fields. A CS or IT degree plus security certifications is a strong combination.

Should I include CTF (Capture the Flag) experience?

Yes, especially for early-career analysts and those pursuing penetration testing roles. Include platforms (HackTheBox, TryHackMe) and notable achievements. For senior roles, professional experience outweighs CTF participation.

How do I describe classified work?

Describe your role, tools, and methodologies at a general level without disclosing classified details. “Conducted threat analysis for a federal defense program using SIEM and EDR tools” is appropriate without revealing specifics.

Ready to build your cybersecurity analyst resume?

Pick a template, fill in your details, and download a polished resume in minutes.

Start for free →