Data breaches at major U.S. retailers are frequently in the news today. Financial and personal information from tens of millions of consumers has been compromised, and it seems like each week brings a new hacking scandal at a major retailer. But that’s just one problem information security analysts must address as technology continues to make life easier for consumers and information seekers, but also increases opportunities for cybercriminals. Denial of service attacks, malware, viruses, threats from internal sources, and even attacks on computer systems that run critical infrastructure used in oil and gas pipelines and water supply, electric power distribution, and transportation systems, are just a few of the critical threats that information security analysts must identify and address.
Duties for information security analysts vary by job title, type and size of employer, and other factors. The following paragraphs detail the main duties performed by analysts.
Information security analysts install, configure, test, operate, maintain, and manage networks and their firewalls, including hardware and software that permit the sharing and transmission of data. They also perform the same duties in regard to firewalls and data encryption programs to protect sensitive information. Analysts teach organization employees how to install or use new security products and procedures, and they ensure that new or current information technology systems meet their organization’s information assurance and security requirements. Throughout their careers, analysts research the latest information technology security trends and threats so that they can be an asset to their employers.
Each day, analysts test, operate, and maintain systems security; conduct assessments of threats and vulnerabilities to computer systems; and analyze collected data to identify vulnerabilities and the potential for exploitation. They are also responsible for managing user accounts, firewalls, and patches and overseeing user access, passwords, and account creation and administration.
Information security analysts identify, analyze, and report suspicious events and activities that occur or might occur within computer networks and other systems. They respond to crises or urgent situations to mitigate immediate and potential threats. They collect, analyze, and present computer-related evidence in support of network vulnerability mitigation, and/or fraud, criminal, law enforcement, counterintelligence investigations. Analysts engage in surveillance and counter surveillance methods and use surveillance detection strategies and interview and interrogation techniques to gather evidence of security breaches or related issues. They identify and assess the capabilities and activities of foreign intelligence entities or cyber criminals and prepare status reports for their superiors.
- 3-D Printing Specialists
- Accountants
- Agricultural Consultants
- Artificial Intelligence Specialists
- Audit and Assurance Accountants
- Auditors
- Augmented Reality Developers
- Bank Examiners
- Big Data Developers
- Billing Clerks
- Biometrics Systems Specialists
- Blockchain Developers
- Bookkeeping and Accounting Clerks
- Business Continuity Planners
- Business Development Managers and Directors
- Business Intelligence Analysts
- Business Managers
- Chief Customer Officers
- Chief Executive Officers
- Chief Financial Officers
- Chief Information Officers
- Clinical Data Managers
- Compliance Managers
- Computer and Office Machine Service Technicians
- Computer and Video Game Designers
- Computer Network Administrators
- Computer Programmers
- Computer Support Service Owners
- Computer Support Specialists
- Computer Systems Programmer/Analysts
- Computer Trainers
- Computer-Aided Design Drafters and Technicians
- Corporate Climate Strategists
- Credit Analysts
- Customer Service Representatives
- Customer Success Managers
- Data Entry Clerks
- Data Processing Technicians
- Data Scientists
- Data Warehousing Specialists
- Database Specialists
- Digital Agents
- Digital Designers
- Document Management Specialists
- Electrical and Electronics Engineers
- Electrical Engineering Technologists
- Electronics Engineering Technicians
- Electronics Service Technicians
- Embedded Systems Engineers
- Energy Consultants
- Environmental Consultants
- Ergonomists
- Fiber Optics Technicians
- Financial Analysts
- Financial Consultants
- Financial Institution Officers and Managers
- Financial Institution Tellers, Clerks, and Related Workers
- Financial Quantitative Analysts
- Fraud Examiners, Investigators, and Analysts
- Full Stack Developers/Engineers
- Futurists
- Graphic Designers
- Graphics Programmers
- Hardware Engineers
- Health Care Consultants
- Help Desk Representatives
- Human Resources Consultants
- Industrial Designers
- Information Assurance Analysts
- Information Brokers
- Information Technology Consultants
- Information Technology Project Managers
- Information Technology Security Consultants
- Internet Consultants
- Internet Developers
- Internet Executives
- Internet Marketing and Advertising Consultants
- Internet Quality Assurance Specialists
- Internet Security Specialists
- Internet Store Managers and Entrepreneurs
- Internet Transaction Specialists
- Loss Prevention Managers
- Machine Learning Engineers
- Management Analysts and Consultants
- Market Research Analysts
- Marketing Consultants
- Mathematicians
- Microelectronics Technicians
- Mobile Software Developers
- Office Administrators
- Online Journalists
- Online Producers
- Personal Privacy Advisors
- Press Secretaries and Political Consultants
- Product Development Directors
- Product Management Directors
- Product Managers
- Professional Hackers
- Radio Frequency Identification Device Specialists
- Sales Representatives
- Search Engine Optimization Specialists
- Security Consultants and Guards
- Semiconductor Technicians
- Site Reliability Engineers
- Smart Building Systems Designers
- Social Media Workers
- Software Application Developers
- Software Designers
- Software Engineers
- Software Quality Assurance Testers
- Solutions Architects
- Strategy Managers
- Systems Setup Specialists
- Technical Support Specialists
- Technical Writers and Editors
- Unity Developers
- User Experience Designers
- Webmasters
- Wireless Service Technicians