In the Marine Corps:
Command, Control, Communications, Computers and Intelligence (C4I) Officer; Cyber Network Operations Officer; Data Systems Chief; Information Security Technician; Intelligence Software/Security Engineer; Intelligence Surveillance Reconnaissance (ISR) Systems Engineer; Intelligence Technology and Data Chief; Network Engineering Officer
In the Navy:
ADP Systems Security Officer; Computer Network Capability Development; Cryptologic Infrastructure Maintenance Director; Cyber RandD Specialist; Cyberspace Operations Planner; Electronic Warfare Manager; Information Systems Administrator; Information Systems Technician Submarines; Submarine Carry-On Equipment (COE) Privileged Access Technician; Submarine Carry-On Equipment (COE) Team Leader; Surface Cryptologic Carry-On Program (CCOP) Installer
As persistently as computer hackers work to infiltrate secure networks, information security analysts work that much harder to keep prying eyes out. Information security analysts design and implement security measures to protect an organization’s computer networks and systems. Their creativity and innovation continually expand as the number and complexity of cyberattacks increases. In this field, it’s essential to keep up with new technology and preventive methods. Information security analysts install and operate firewalls, data encryption programs, and other software, monitor their organization for security breaches, and even simulate attacks to look for vulnerabilities in their system. Their work is the opposite of hacking— and security analysts need to know how to break a system’s defenses… just as well as they know how to build them. Information security analysts work for computer companies, consulting firms, or business and financial companies. Most work standard full-time hours but may need to be on call in case of an emergency. Information security analysts typically need at least a bachelor’s degree in computer science, programming, or a related field, though some employers prefer applicants with a Master’s of Business Administration in Information Systems. As the field of information security quickly evolves, new specialized education and training programs are emerging, but having an ingenious streak will continue to be a vital quality for these professionals.
What they do:
Develop and oversee the implementation of information security procedures and policies. Build, maintain and upgrade security technology, such as firewalls, for the safe use of computer networks and the transmission and retrieval of information. Design and implement appropriate security controls to identify vulnerabilities and protect digital files and electronic infrastructures. Monitor and respond to computer security breaches, viruses, and intrusions, and perform forensic investigation. May oversee the assessment of information security systems.
On the job, you would:
Assess the quality of security controls, using performance indicators.
Conduct investigations of information security breaches to identify vulnerabilities and evaluate the damage.
Coordinate documentation of computer security or emergency measure policies, procedures, or tests.
Knowledge information for this career will be available soon.
Skills information for this career will be available soon.
Abilities information for this career will be available soon.
Information for this career will be available soon.
You might use software like this on the job:
Operating system software
Object or component oriented development software
Network monitoring software
IBM QRadar SIEM
New job opportunities are very likely in the future.