Information Security Analysts

security software procedure information computer conventional interests computer file electronic infrastructure security analyst document

Information Security Officer, Information Systems Security Officer (ISSO), Information Technology Security Analyst (IT Security Analyst), Network Security Analyst

Where in the military? Select a military branch to see samples.
Cable and Antenna Defense Operations; Cryptologic Analyst and Reporter Helper; Cyber Defense Operations Apprentice, Knowledge Operations; Cyber Defense Operations Craftsman, Expeditionary Communications; Cyber Defense Operations Journeyman, Expeditionary Communications; Cyber Intelligence Journeyman, Analyst; Cyberspace Effects Operations, ABM; Cyberspace Effects Operations, General (if Prefix P); Defense Attache; Spectrum Defense Operations Apprentice, Spectrum Operations
Cyber Capabilities Developer Technician; Cyber Electromagnetic Warfare Officer; Cyber Operations Specialist; Cyber Warfare Technician; Data Network Engineering; Data Systems Engineering; Information Operations Officer; Military Intelligence (MI) Systems Maintainer/Integrator; Senior Signal Warrant Officer; Signal Operations Support Specialist
Cyber; Cyber Effects; Cyber Mission Specialist; Cybersecurity; Electronics Specialty; Electronics Technician; Information System Technician; Information Systems Management; Intelligence Specialist; Intelligence System Specialist
Advanced Information Operations (IO) Planner; Basic Information Operations Staff Officer; Communications Chief; Cyberspace Warfare Chief; Cyberspace Warfare Operator; Data Systems Engineering Officer; Host Analyst; Intelligence Software/Security Engineer; Marine Air Ground Task Force (MAGTF) Communications Planner; Network Engineering Officer
ADP Systems Security Officer; Communications Manager; Crypotologic Subsurface Augmentee Supervisor; Cryptologic Warfare Officer (Staff); Cyber Operations Planner; East Asia Area Specialist; Information Systems Security Manager; LDO - Information Professional; RL - Special Duty Officer Billet - Information Professional Officer; Submarine Carry-On Equipment (COE) Supervisor
Cable and Antennae Defense Operations; Cyber Defense Operations Apprentice; Cyber Defense Operations Apprentice, Networks Operations; Cyber Defense Operations Craftsman, Enterprise Operations; Cyber Defense Operations Helper, Mission Defense Activities; Cyber Defense Operations Manager; Cyber Operations Apprentice, Systems Operations; Cyber Operations Helper, Defensive Cyber Operations; Cyber Operations Journeyman, RF Operations; Cyber Warfare Operations Manager
What they do:
Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. Assess system vulnerabilities for security risks and propose and implement risk mitigation strategies. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses.
On the job, you would:
  • Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
  • Monitor current reports of computer viruses to determine when to update virus protection systems.
  • Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.

Knowledge

Engineering and Technology

  • computers and electronics
  • product and service development

Arts and Humanities

  • English language

Business

  • management
  • customer service

Communications

  • telecommunications

Skills

Basic Skills

  • reading work related information
  • thinking about the pros and cons of different ways to solve a problem

Problem Solving

  • noticing a problem and figuring out the best way to solve it

People and Technology Systems

  • figuring out how a system should work and how changes in the future will affect it
  • thinking about the pros and cons of different options and picking the best one

Abilities

Verbal

  • listen and understand what people say
  • read and understand what is written

Ideas and Logic

  • make general rules or come up with answers from lots of detailed information
  • notice when problems happen

Visual Understanding

  • see hidden patterns
  • quickly compare groups of letters, numbers, pictures, or other things

Personality

People interested in this work like activities that include data, detail, and regular routines.

They do well at jobs that need:

  • Attention to Detail
  • Dependability
  • Integrity
  • Analytical Thinking
  • Cooperation
  • Adaptability/Flexibility

Technology

You might use software like this on the job:

Web platform development software

  • Google Angular Hot Technology
  • Spring Framework Hot Technology

Data base user interface and query software

  • Amazon Elastic Compute Cloud EC2 Hot Technology
  • Blackboard software

Transaction security and virus protection software

  • NortonLifeLock cybersecurity software
  • Stack smashing protection SSP software

Education

Education: (rated 4 of 5)
bachelor's degree or
certificate after college
usually needed

Get started on your career:

Find Training
Apprenticeship.gov

Job Outlook

Bright
New job opportunities are very likely in the future.
Local Salary Info
Find Jobs
See more details at O*NET OnLine about information security analysts.