How do they match: Information Security Analysts

  • All Source-Collection Manager
  • All Source-Collection Requirements Manager
  • Cyber Policy and Strategy Planner
  • Cybersecurity Manager
  • Cybersecurity Target Developer
  • IT Manager
  • Information Security Manager
  • Information Technology Manager
  • Information Technology Audit Manager
  • Security Manager
  • Supervisory Control and Data Acquisition Security Analyst

  • Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
  • Train users and promote security awareness to ensure system security and to improve server and network efficiency.

  • Develop computer or information security policies or procedures.
  • Train others in computer interface or software use.