Top security manager sections that make the best resume
- Header
- Professional summary
- Experience (with numbers and results)
- Relevant skills
- Education
- Certifications
How to write the perfect security manager resume experience section
Security manager experience section: checklist
- List your positions in chronological or reverse-chronological order;
- Go for 4-6 bullet points;
- Add only relevant work experience;
- Include information about the challenges you’ve faced, the actions you’ve taken, and the results you’ve achieved;
- Use action verbs instead of filler words.
We’ve selected some of the top Security Manager resumes made using the Enhancv platform to illustrate what a great experience section looks like. Use them as inspiration when building your own resume:
- Built rapport with other teams and stakeholders to develop and implement methods of operation for best security practices.
- Created standard and emergency operating procedures and policies including special events featuring celebrities.
- Created new processes, corrected nuisance alarms and cleaned up the GSOC database.
- Organized and on-boarded a new site in London.
- Managed payroll, scheduling, and human resource documents for the company.
- Performed Audit in alignment of architectural principles, goals, objectives and constraints to global technology and security Strategies Standardization of technology.
- Work with different stakeholders and external auditors to maintain up-to-date documentation for scoping, testing and remediation of technology controls.
- Organized a proprietary training program for IT executives and business partners to improve efficiency and remove friction between global IT to operationalize the risk management function.
- Exposure to cross-functional IT Security and IT Compliance functions in close coordination with Legal.Strong communicator and comfortable co-ordinating with colleagues, vendors, and customers, Worked in tandem with the Legal team on GDPR and Compliance.
- Conduct vendor and 3rd party security reviews, identify observations and make recommendations.Defined and realized IT strategy together with the IT Manager for the organization.
- Experience in auditing of Data Protection Regulations ,Service Management process, technology and organization mapping out paths to compliance.
- Formalaise transfer policies, procedures and controls are in place to protect the transfer of information through the use of all types of communication facilities.
- Produced Security Operations operating model and strategy
- Lead a team of Cyber Security professional's
- Developed SOC processes based on threat intelligence
- Introduced Endpoint Detection and Response capability
- Documented and partially automated security incident run-books
- Setup 24x7x365 on call and aligned with key response teams
- Managed stakeholder expectations throughout incidents
- Security Governance
- Policy & procedures review and drafting
- Monitoring of security projects, verifying objectives and deadlines
- Vulnerability management for all platforms
- Planning new security integrations for upcoming year, and align plan with illimity requirements
- Review roles e permission as a starting point for identity and access management
- Drafting and adopting missing policies or reviewing existing ones
- Participation in definition of new features/architectures, to express a possible security evalutation
- CAB member and approver
- Managing pre-sales, sales phases and end-to-end delivery of projects
- Main topics: Cyber Security, Business Continuity, Crisis Management and Data Protection
- Main clients: BPM, AXA, Fieramilano, Snam, ACSM AGAM
- Serve as a Subject Matter Expert regarding security policies to include ICD 503, NIST SP-800 Series, and CNSS Instruction 1253
- Work collaboratively with developers, architects, and Authorizing Official (AO) staff, to ensure customer systems and applications achieve and maintain Authority to Operate (ATO) in accordance with NIST and AO-specified guidance
- As Deputy Program Manager, coordinate resource availability and allocation for the execution of projects to ensure on-time delivery within scope and budget
- Manage relationship with Prime Contractor; assess issues and develop resolutions to ensure client satisfaction
- Support the program manager in making timely and informed decisions by employing Estimate at Completion (EAC) and Estimate to Complete (ETC) forecasting techniques
- Responsible for 15 direct reports on an Air Force subcontract and leading a team of four assistant FSOs
- As FSO, completed the Defense Counterintelligence and Security Agency (DCSA) vulnerability assessments in support of the National Industrial Security Program (NISP) and Department of Defense Security Agreement with no findings
- Develop and implement Security, Awareness, Training and Education and Insider Threat training programs
- Investigate incidents and security violations, conduct administrative inquiries, and submit reports as required
- Execute the Personnel Security Clearance (PSC) process for approximately 275 employees
- Ensure security requirements are incorporated into all phases of the software development lifecycle (SDLC) helping to build highly secure software, address security requirements, reduce costs, and obtain favorable security assessments and Authorizations to Operate (ATO)
- Liaise with senior leaders in top-level organizations such as the DoD CIO down to the software developer; offering strategic direction on information security matters and emerging security risks
- Mentor and train junior colleagues on cyber security and RMF best practices and coordinate security-related activities with architects, developers, system owners, and security control assessors
- Provide security oversight and design guidance to the DevSecOps process, specifically within the CI/CD pipeline
- Conduct application vulnerability assessments utilizing static application security testing (SAST)
- Maintain situational awareness of rapidly changing policies and guidance as they relate to RMF and cyber security
- Provide authentication and authorization implementation guidance and evaluate cyber security resiliency
- Research, analyze, and recommend software solutions, implementation plans, and risk mitigation strategies
- Provide strategic direction for the establishment of new processes to support RMF adoption and software security assessments
- Extensive knowledge and understanding of DoD and IC mandated cybersecurity requirements and guidance (e.g., NIST, CNSS, ICD, DoD, FISMA, etc.)
- Received first-ever ATO for a software product and worked to enable reciprocity across the DCGS Family of Systems (FoS) which spans seven services and agencies
- Key contributing member of the Assembled Capabilities Working Group (ACWG) led by OUSD(AT&L) Command, Control and Communication (C3), Cyber and Business Systems (C3CB)
- Worked closely with members of DoD CIO and CNSS co-authoring CNSSI 1254, Annex on cybersecurity reciprocity which led to the re-issuance of DoD Cybersecurity Reciprocity policy
- Stood up and lead the DCGS Family of Systems (FoS) Security Working group as a means to ensure DCGS programs of record (PoR) maintain situational awareness of cyber security mandates and changes, provide updates on RMF activities, and obtain feedback and security requirements from the PoR
- Investigated, tailored, recommended, and implemented architectural and procedural cyber security best practices
- Coordinated information security activities between security officers, program managers, engineers, developers, security testers, and compliance regulators
- Multi-state building responsibility with a total square footage of over 500,000 square feet housing over 4,000 employees.
- Physical Security OPEX/CAPEX budget creation, management, and oversight.
- Responsible for conducting corporate investigations in partnerships with HR, Legal, and Compliance.
- Built and managed client's main R&D location's first Floor Warden/ERT Program.
- Executive Protection oversight and responsibility for threat management.
- Technical Surveillance Counter-Measures management and oversight.
- Primary member for Security on the Crisis Management Team (CMT).
- Responsible for implementing the clients first mass notification and crisis management system.
- Responsible for the management and upgrade of the clients mobile Emergency Command Center.
- Responsible for conducting Risk Assessments of both corporate offices and personal residences of senior executives along with routine Security Audits of facilities.
- Member of core teams in charge of developing training and awareness for the company and developing investigation procedures and store Internal Investigator position.
- Personally created all Saks Fifth Avenue OFF 5TH monthly awareness documents, District Manager audit forms, and New Hire Orientation presentation.
- Specialized in the opening all new stores in the Western Region for Saks Fifth Avenue OFF 5TH locations.
- Manage a security team in a 322,996 sq ft Grade A high rise building
- Raised the standards of the existing security team
- Gained the ISO22301 accreditation for the building
- Gained the Building Security Accreditation
- Initiated paperless reporting through the use of technology
- Upgraded the mail room operation with paperless reporting
- Arranging Business continuity awareness sessions and testing
- Managing the improvements of fire testing
- Enhanced the reporting of access control reports
- Improved the access control system
- Writing procedures and updating existing ways of working
- Increased KPI scores from 80% to 96%+
- Merged two shopping mall teams into one
- Responsible for 800,000 sq ft of retail, entertainment space and 150 retailers
- Created a security forum for the retailers to attend and discuss issues
- Developed the emergency and crisis management procedures for the mall
- Working closely with the CTSA and Fire officer
- Involved in recruitment and disciplinary management
- Responsible for the Health and Safety of the site including fire procedures
- Working with the Surrey Youth Support Services with young offenders, (restorative justice) and Mosaic business challenge
- Recommending loss prevention techniques to the retailers
- Responsible for the operational security of Google’’s personnel, properties, assets in Singapore and supports the Cluster Security Manager in other ASEAN and Pakistan region
- Support the development and implementation of country security plans and site standard operating procedures
- Supports new builds and expansion plans
- Support the development of crisis management, resiliency plans and provide travel briefings for ASEAN and Pakistan
- Works cross functionally across multiple stakeholders to understand business directions, identify potential threats and risks that may impact Google and its people
- Responsible for vendor security management
- Responsible for the security management of both internal and external corporate and business events regionally
- Supports end-to-end investigation for security-related incidents
- Building good relationships with governmental agencies and external corporate security groups regionally
- Responsible for the security of Uber’s people, properties, and assets across Southeast, North Asia, Japan, Australia and New Zealand region.
- Develops and implements physical security strategy in the APACx region in alignment with business goals
- Oversees the security operations and new builds for all Uber locations across APACx
- Leads and manages security incidents and crisis management responses to address threats towards company staff, assets and operations
- Leads end-to-end investigation processes in relation to physical security-related incidents
- Leading company’s internal and external corporate event security regionally including executive protection
- Responsible for security vendor management and relationship building
- Responsible for the hiring and developing performance management of in country security managers across APACx
- Educate key stakeholders on security principles and its implementation in alignment with business goals
- Develop and conduct security awareness and education programs for staff across APACx
- Managed the security requirements for buildings under OCBC properties and handled retail and residential projects and associated operations
- Oversaw and managed security operations programs including but not limited to access control, CCTV and intrusion systems
- Managed a team of security executives, supervisors, officers and outsourced security personnel
- Conducted building security audits, risk assessments and intrusion exercises
- Conduct end-to-end investigation processes in relation to safety and physical security-related incidents
- Managed and coordinated emergency response plans and exercises
- Managed the procurement of security related contracts and responsible for yearly operational budget allocation
- Overall security lead of the company premises and its manufacturing plant
- Managed a group of security personnel including team leads and supervisors
- Responsible for the maintenance and updating of the standard operating procedures in relation to the physical security function
- Responsible for investigating physical security-related incidents
- Conduct internal physical security audits, risk assessments and intrusion exercises
- Managed cross functional projects and expansion plans
- Responsible for the operational budget for enhancement projects
- Built risk management programs to improve overall security posture and achieved level 4 maturity as per NIST Cybersecurity Framework
- Improved detection and prevention of cyber threats with maximum automation and 100% visibility into IT assets, cloud infrastructure
- Defined risk management SLAs and met 95% of them consistently
- Strengthened relationships with IT staff & other stakeholders
- Coached direct reports to improve critical thinking, problem-solving, task execution and reporting to improve day to day operations
- Acquired deep technical skills and architectural expertise in all facets of information security & improved overall security posture
- Evaluated existing capabilities and led implementations of state of the art Cybersecurity technologies, processes and tasks
- Provided oversight for the the USPTO information security program to ensure FISMA compliance.
- Managed over 60 applications in accordance with USPTO security policies and FISMA requirements.
- Worked closely with Technical Leads and software development teams to remediate identified vulnerabilities.
PRO TIP
Include quantitative data throughout your Security Manager resume to impress the hiring manager. Real facts and figures that show off your competency as an audit manager go a long way. Did you reduce the costs of audits? Manage a large team? Boosted efficiency? Show off the real numbers!
Action verbs for your security manager resume
recommended reads:
Security manager resume: How to write a strong skills section
The ultimate security manager skills section checklist:
- Balance between all kinds of hard skills – technical, analytical, etc.
- When it comes to technical skills, match them to the job description;
- Add keywords present in the job advert to pass ATS;
- Don’t forget to list transferable skills such as communication, teamwork, work ethic, and presentation skills.
Top skills for your security manager resume
Jira
Project Management
MS Office
CRM
Negotiation
Strategic Planning
Communication
Attentions to details
Creativity
Empathy
Problem Solving
Listening
PRO TIP
Add a Talent Section to your resume, where you can pick your top 3 soft skills and describe how you used them to complete a project or balance departmental communication.
Recommended reads:
Security manager resume header: tips, red flags, and best practices
Checklist for your security manager resume header
- Your name and surname in a legible and larger resume font
- The job title you’re applying for or your current job title as a subheading to your name
- Link to your portfolio or online profile, such as LinkedIn
- Address (City and State for the US; just your city for rest of the world)
- Email address
- Headshot (required or welcomed in the EU; not required and sometimes frowned upon in the US)
Stick to popular email providers such as Gmail or Outlook. And use these professional formats to create your username:
- first.last@gmail.com
- last.first@gmail.com
- firstlast@gmail.com
- f.last@gmail.com
- first.l@gmail.com
Recommended reads:
PRO TIP
Include a link to your portfolio in your Security Manager resume header. Most companies will require that you include one in your resume, and even if they don’t, it’s an excellent opportunity to directly show them your proudest projects.
Security manager resume summary: things to include and things to avoid
Job-winning security manager resume summary checklist:
- Mention your total years of experience in the field;
- Highlight one or two of your top achievements;
- Avoid getting into too much detail – you’ll do that in the experience section;
- Focus on short sentences that are easy to read and add value to your application.
Resume summary formula:
PRO TIP
You’re not going to get hired simply because of a good summary or objective. However, your recruiter can bump you up in front of similarly experienced candidates who didn’t demonstrate such passion and drive.
Recommended reads:
Highlighting education, courses, and certifications in your security manager resume
Education section checklist:
- What? Where? What’s the result? Answer these questions when mentioning education and courses on your resume;
- Give preference to courses and degrees that are relevant to the job position;
- Be honest! Some recruiters love checking with colleges and universities to see if you’ve really been enrolled in them;
- Share more about certifications that have helped you turn into a professional, and mention the bodies that have issued them.
Top certifications for your security manager resume

Certified Information Security Manager (CISM)
Certified Information Security Manager (CISM)

The Complete Cyber Security Course : Network Security!
Volume 2 : Network Security, WiFi Security, WiFi Hackers, Firewalls, Wireshark, Secure Networking. + Password Managers

SolarWinds Security Event Manager (SIEM) Network Security
Monitor Using SolarWinds Security Event Manager ( SIEM ). Respond To Threats Faster. Full Lab in Course to Practice. SEM

Certified Information Security Manager (CISM) - Domain 2
Certified Information Security Manager (CISM) - Information Risk Management (Domain 2)

CISM Certification: CISM Domain 1 Video Boot Camp 2022
Certified Information Security Manager (CISM) Domain 1 - Get 5 hours of videos and downloadable study guides.
Recommended reads:
PRO TIP
If you hold a certain major and a minor, your majors should be mentioned first.
Security manager resume format 101
If a couple of years ago Security Manager resumes could be text files with no graphic elements, today’s recruiters need a bit more to remember you.
And yet, you can still choose between three basic resume formats:
- Reverse-chronological resume format;
- Functional skills-based resume format;
- Combination (or Hybrid) resume format.
But when it comes to choosing the right format for your Security Manager resume, there are two factors to keep in mind: your experience and whether you’re looking for an industry change.
The reverse-chronological format is the most common one. That being said, it gives recruiters exactly what they’re used to in terms of order and information. However, it’s not suitable for applicants with employment gaps or not enough experience.
We at Enhancv suggest the functional skills-based resume format for people with limited work experience who find reverse-chronological resumes irrelevant. This format showcases the applicant’s most significant accomplishments, skills, and strengths.
Don’t miss our resume format checklist:
- Go for a traditional easy-to-read resume font sized 10-12p;
- Don’t risk it: choose standard 1-inch resume margins;
- Make sure your Security Manager resume fits in one to two pages;
- Save your resume in PDF to avoid having it edited by someone else.
Looking for more tips? Check out our job-winning guide for crafting a resume that gets you remembered!
Recommended reads:
PRO TIP
Test your draft Security Manager resume by sending it out to peers and mentors in your circles. Ask them to review it as if they are hiring you for a project and implement the feedback afterwards.
Other sections for your security manager resume
If the position you’re applying for allows for that, you can include some non-traditional sections in your resume. This will add a bit more depth to your application and will also give the hiring manager a better idea of who you are as a person.
Some ideas include:
A security manager resume recruiters would love
You’ve drafted an amazing Security Manager resume, but are still not sure whether it will make a strong first impression? After all, recruiters go over tens of resumes each day, right?
Right! And the recipe for getting their attention includes a dash of creativity.
What’s more, a creative resume is perfect for adding your personality to the mix. For example, you could mention your favorite books, quotes, movies, or even what your day usually looks like.
Regardless of what you choose, make sure your levels of creativity match the industry, the company, and the position. Otherwise, your resume might look silly and inapt.
What makes a great security manager resume: key takeaways
- Choose a resume layout that sends the right message across and fits your current career situation;
- Create a resume header that shows your desired job title, and easy to find contact numbers;
- Be specific about your experience, accomplishments and future goals in your summary;
- Feature detailed metrics and specific examples that show the impact you made in your previous roles when describing your experience;
- List soft skills backed by examples;
- Add all of your technical skills and certifications that you have and match the job description;
- Show off a dash of personality in your resume that will demonstrate your culture fit and the right mix of hard and soft skills.