How do they match: Information Security Analysts

  • Information Security Analysts

  • Information Assurance Analyst
  • Information Assurance Engineer
  • Information Security Specialist
  • Information Security Analyst
  • Information Security Director
  • Information Security Engineer
  • Information Security Manager
  • Information Security Officer
  • Information Systems Security Specialist
  • Information Systems Security Analyst
  • Information Systems Security Officer
  • Information Technology Specialist
  • Information Technology Analyst
  • Information Technology Audit Manager
  • Information Technology Auditor
  • Information Technology Consultant
  • Information Technology Manager
  • Information Technology Risk Specialist
  • Information Technology Security Analyst
  • Information Technology Security Architect
  • AI Security Specialist
  • Artificial Intelligence Security Specialist
  • Automatic Data Processing Systems Security Specialist
  • Certified Information Systems Security Professional
  • Computer Specialist
  • Computer Security Information Specialist
  • Computer Security Specialist
  • Cyber Information Security Analyst
  • Cyber Intelligence Specialist
  • Cyber Operations Specialist
  • Cyber Security Specialist
  • Cybersecurity Specialist
  • IIoT Security Specialist
  • IT Specialist
  • IT Risk Specialist
  • Industrial Internet of Things Security Specialist
  • Internet Security Specialist
  • Internet of Things Security Specialist
  • IoT Security Specialist
  • Mission Assessment Specialist
  • Security Specialist
  • Systems Security Specialist

  • Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. Assess system vulnerabilities for security risks and propose and implement risk mitigation strategies. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses.

  • Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.
  • Maintain permanent fleet cryptologic and carry-on direct support systems required in special land, sea surface and subsurface operations.
  • Monitor use of data files and regulate access to safeguard information in computer files.

  • Collaborate with others to resolve information technology issues.
  • Develop computer or information security policies or procedures.
  • Implement security measures for computer or information systems.
  • Monitor the security of digital information.