Information Security Analysts
Also called: Information Technology Specialist, Data Security Administrator, Information Security Analyst, Information Security Officer
In the Air Force: Cyber Surety Apprentice; Cyber Surety Helper; Cyber Systems Operations; Cyber Systems Operations Craftsman; Cyber Systems Operations Journeyman; Cyber Transport Systems Apprentice; Cyber Transport Systems Helper; Cyberspace Defense Operations, Apprentice; Cyberspace Defense Operations, Helper; Cyberspace Manager
In the Army: Cryptologic Network Warfare Specialist; Cyber Network Defender; Information Protection Technician; Information Services Technician; Information Technology Specialist; Signal Support Systems Specialist
In the Coast Guard: CWO - Cyber Warrant Officer; CWO - Information Systems Technician; LDO - Communications, Submarine; LDO - Information Systems; RL - Special Duty Officer - Cyber Warfare Engineer; RL - Special Duty Officer Billet - Information Professional Officer
In the Marine Corps: Cryptologic Network Warfare Specialist; Cryptologic Technician Networks; Cyber Security Technician; Information Protection Technician; Information Security Technician; Information Services Technician; Information Systems Technician Submarines
In the Navy: Basic Cyber Analyst/Operator; CWO - Cyber Warrant Officer; Communication Security Officer; Cryptologic Technician (Network); Digital computer Network Analyst; Information System Security Manager; Information Systems Technician Submarines; LDO - Information Systems; Navy Interactive ON-NET Operator Trainer; RL - Special Duty Officer - Cyber Warfare Engineer; RL - Special Duty Officer Billet - Information Professional Officer
- Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.
- Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
- Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated.
Engineering and Technology
Arts and Humanities
People and Technology Systems
Ideas and Logic
People interested in this work like activities that include data, detail, and regular routines.
They do well at jobs that need:
You might use software like this on the job:
Transaction security and virus protection software
Network monitoring software
Network security or virtual private network VPN management software