Also called:
Information Security Officer, Information Systems Security Officer (ISSO), Information Technology Security Analyst (IT Security Analyst), Network Security Analyst
In the Air Force:
Bomber/Special Electronic Warfare and Radar Surveillance Integrated Avionics; Bomber/Special Electronic Warfare and Radar Surveillance Integrated Avionics Helper, E-8; Cable and Antenna Defense Operations Helper, Cable and Antenna Operations; Cryptologic Analyst and Reporter Helper; Cyber Defense Operations Craftsman, Security Operations; Cyber Defense Operations Journeyman, Software Development Operations; Cyber Systems Operations Craftsman; Cyberspace Effects Operations, Airlift; Cyberspace Warfare Operations Commander; Spectrum Defense Operations Journeyman, Spectrum Operations
In the Army:
Cyber Capabilities Developer Technician; Cyber Network Defender; Cyber Warfare Officer; Cyber and Electronic Warfare Officer; Health Services Systems Management; Information Protection Technician; Information Technology Specialist; Network Systems Engineering; Senior Signal Warrant Officer; Signal Operations Support Specialist
In the Coast Guard:
Electronics Specialty; Electronics Technician; Information System Technician; Information Systems Management; Intelligence Specialist; Intelligence System Specialist; Operations Systems Specialist
In the Marine Corps:
Advanced Information Operations (IO) Planner; Basic Information Operations Staff Officer; Communications Officer; Cyber Network Operations Officer; Cyberspace Warfare Operator; Data Systems Chief; Information Operations Specialist; Intelligence Software/Security Engineer; Marine Air Ground Task Force (MAGTF) Communications Planner; Network Engineering Officer
In the Navy:
ADP Systems Security Officer; Communication Security Officer; Computer Network Operations; Cryptologic Warfare Officer (Coordinator); Cyber Network Defense Infrastructure Specialist (CNDIS); Electronic Warfare Manager; Information Systems Technician; LDO - Information Professional; Radio Officer; Submarine Carry-On Equipment (COE) Supervisor
As persistently as computer hackers work to infiltrate secure networks, information security analysts work that much harder to keep prying eyes out. Information security analysts design and implement security measures to protect an organization’s computer networks and systems. Their creativity and innovation continually expand as the number and complexity of cyberattacks increases. In this field, it’s essential to keep up with new technology and preventive methods. Information security analysts install and operate firewalls, data encryption programs, and other software, monitor their organization for security breaches, and even simulate attacks to look for vulnerabilities in their system. Their work is the opposite of hacking— and security analysts need to know how to break a system’s defenses… just as well as they know how to build them. Information security analysts work for computer companies, consulting firms, or business and financial companies. Most work standard full-time hours but may need to be on call in case of an emergency. Information security analysts typically need at least a bachelor’s degree in computer science, programming, or a related field, though some employers prefer applicants with a Master’s of Business Administration in Information Systems. As the field of information security quickly evolves, new specialized education and training programs are emerging, but having an ingenious streak will continue to be a vital quality for these professionals.
What they do:
Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. Assess system vulnerabilities for security risks and propose and implement risk mitigation strategies. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses.
On the job, you would:
Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
Monitor current reports of computer viruses to determine when to update virus protection systems.
Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.
Engineering and Technology
computers and electronics
product and service development
Arts and Humanities
English language
Business
management
customer service
Communications
telecommunications
Basic Skills
reading work related information
thinking about the pros and cons of different ways to solve a problem
Problem Solving
noticing a problem and figuring out the best way to solve it
People and Technology Systems
figuring out how a system should work and how changes in the future will affect it
thinking about the pros and cons of different options and picking the best one
Verbal
listen and understand what people say
read and understand what is written
Ideas and Logic
make general rules or come up with answers from lots of detailed information
notice when problems happen
Visual Understanding
see hidden patterns
quickly compare groups of letters, numbers, pictures, or other things
People interested in this work like activities that include data, detail, and regular routines.
They do well at jobs that need:
Attention to Detail
Dependability
Integrity
Analytical Thinking
Cooperation
Adaptability/Flexibility
You might use software like this on the job:
Web platform development software
Google Angular
Spring Framework
Data base user interface and query software
Amazon Elastic Compute Cloud EC2
Blackboard software
Transaction security and virus protection software
NortonLifeLock cybersecurity software
Stack smashing protection SSP software
bachelor's degree or certificate after college usually needed
Get started on your career:
New job opportunities are very likely in the future.