How do they match: Information Security Analysts

  • Cyber Intel Planner
  • Cyber Operations Planner
  • Cyber Ops Planner
  • Cyber Policy and Strategy Planner
  • Cybersecurity Partner Integration Planner
  • Partner Integration Planner

  • Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. Assess system vulnerabilities for security risks and propose and implement risk mitigation strategies. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses.

  • Confer with users to discuss issues such as computer data access needs, security violations, and programming changes.
  • Coordinate implementation of computer system plan with establishment personnel and outside vendors.
  • Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
  • Maintain permanent fleet cryptologic and carry-on direct support systems required in special land, sea surface and subsurface operations.
  • Monitor use of data files and regulate access to safeguard information in computer files.
  • Train users and promote security awareness to ensure system security and to improve server and network efficiency.

  • Train others in computer interface or software use.