Information Security Analysts
Also called: Information Technology Specialist, Data Security Administrator, Information Security Analyst, Information Security Officer
In the Air Force: Cyber Surety Apprentice; Cyber Surety Helper; Cyber Systems Operations; Cyber Systems Operations Craftsman; Cyber Systems Operations Journeyman; Cyber Transport Systems Apprentice; Cyber Transport Systems Helper; Cyberspace Defense Operations Apprentice; Cyberspace Defense Operations Helper; Cyberspace Manager
In the Army: Cryptologic Network Warfare Specialist; Cyber Network Defender; Information Protection Technician; Information Services Technician; Information Technology Specialist; Signal Support Systems Specialist
In the Coast Guard: CWO - Cyber Warrant Officer; CWO - Information Systems Technician; LDO - Communications, Submarine; LDO - Information Systems; RL - Special Duty Officer - Cyber Warfare Engineer; RL - Special Duty Officer Billet - Information Professional Officer
In the Marine Corps: Aviation Logistics Information Management System (ALIMS) Specialist; Communications Chief; Cryptologic Network Warfare Specialist; Cryptologic Technician Networks; Cyber Network Operator; Cyber Security Technician; Information Protection Technician; Information Security Technician; Information Services Technician; Information Systems Technician Submarines
In the Navy: Basic Cyber Analyst/Operator; CWO - Information Systems Technician; Computer Network Operations; Cryptologic Technician Networks; Electronics Technician; Information Systems Technician; LDO - Information Systems; Navy Interactive ON-NET Operator Trainer; Navy Interactive On-Net (ION) Operator (Unix); Network Security Vulnerability Technician; RL - Special Duty Officer Billet - Information Professional Officer
- Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.
- Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
- Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated.
Engineering and Technology
Arts and Humanities
People and Technology Systems
Ideas and Logic
People interested in this work like activities that include data, detail, and regular routines.
They do well at jobs that need:
You might use software like this on the job:
Transaction security and virus protection software
Network monitoring software
Network security or virtual private network VPN management software