Information Security Analysts
Also called: Data Security Administrator, Information Security Analyst, Information Security Officer, Information Technology Specialist
In the Air Force: Client Systems; Client Systems Journeyman; Computer Systems Programming Helper; Cyber Surety Craftsman; Cyber Systems Operations Apprentice; Cyber Transport Systems; Cyber Transport Systems Journeyman; Cyber Warfare Operations Journeyman; Fusion Analyst; Fusion Analyst Craftsman, Digital Network Analyst
In the Army: Cryptologic Network Warfare Specialist; Cyber Network Defender; Cyber Operations Specialist; Information Protection Technician; Information Services Technician; Information Technology Specialist; Military Intelligence (MI) Systems Maintainer/Integrator; Signal Support Systems Specialist
In the Coast Guard: CWO - Cyber Warrant Officer; CWO - Information Systems Technician; Client Systems; Computer Systems Programming; Cyber Surety; Cyberspace Warfare Operations; Fusion Analyst; LDO - Communications, Submarine; LDO - Information Systems; RL - Special Duty Officer - Cyber Warfare Engineer; RL - Special Duty Officer Billet - Information Professional Officer
In the Marine Corps: Aviation Logistics Information Management System (ALIMS) Specialist; Client Systems Journeyman; Computer Systems Programming Helper; Cyber Network Defender; Cyber Security Technician; Cyber Surety Journeyman; Cyber Warfare Operations Journeyman; Fusion Analyst Craftsman, Analysis and Production; Fusion Analyst Journeyman, Analysis and Production; Information Services Technician
In the Navy: Basic Cyber Analyst/Operator; CWO - Information Systems Technician; Computer Network Operations; Cryptologic Technician Networks; Information System Security Manager; Information Systems Technician Submarines; LDO - Information Systems; Navy Interactive ON-NET Operator Trainer; Navy Interactive On-Net (ION) Operator (Unix); Network Security Vulnerability Technician
- Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.
- Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
- Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated.
Engineering and Technology
Arts and Humanities
People and Technology Systems
Ideas and Logic
People interested in this work like activities that include data, detail, and regular routines.
They do well at jobs that need:
You might use software like this on the job:
Transaction security and virus protection software
Network monitoring software
Operating system software