How do they match: Information Security Analysts

  • Confer with users to discuss issues such as computer data access needs, security violations, and programming changes.
  • Perform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures.

  • Test computer system operations to ensure proper functioning.