How do they match: Information Security Analysts

  • Data Security Administrator
  • Data Security Analyst
  • Database Security Expert
  • AI Security Specialist
  • Artificial Intelligence Security Specialist
  • Automatic Data Processing Systems Security Specialist
  • Computer Specialist
  • Computer Security Specialist
  • Computer Security Information Specialist
  • Cyber Intelligence Specialist
  • Cyber Operations Specialist
  • Cyber Security Specialist
  • Cybersecurity Specialist
  • IIoT Security Specialist
  • IT Specialist
  • IT Risk Specialist
  • Industrial Internet of Things Security Specialist
  • Information Security Specialist
  • Information Systems Security Specialist
  • Information Technology Specialist
  • Information Technology Risk Specialist
  • Internet Security Specialist
  • Internet of Things Security Specialist
  • IoT Security Specialist
  • Mission Assessment Specialist
  • Security Specialist
  • Supervisory Control and Data Acquisition Security Analyst
  • Systems Security Specialist

  • Confer with users to discuss issues such as computer data access needs, security violations, and programming changes.
  • Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
  • Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.
  • Maintain permanent fleet cryptologic and carry-on direct support systems required in special land, sea surface and subsurface operations.
  • Monitor use of data files and regulate access to safeguard information in computer files.
  • Perform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures.