How do they match: Information Security Analysts

  • Confer with users to discuss issues such as computer data access needs, security violations, and programming changes.
  • Modify computer security files to incorporate new software, correct errors, or change individual access status.