How do they match: Information Security Analysts

  • All Source-Collection Manager
  • All Source-Collection Requirements Manager
  • Cyber Intel Planner
  • Cyber Operations Planner
  • Cyber Ops Planner
  • Cyber Policy and Strategy Planner
  • Cybersecurity Manager
  • Cybersecurity Partner Integration Planner
  • IT Manager
  • Information Security Manager
  • Information Technology Manager
  • Information Technology Audit Manager
  • Partner Integration Planner
  • Security Manager
  • Supervisory Control and Data Acquisition Security Analyst

  • Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. Assess system vulnerabilities for security risks and propose and implement risk mitigation strategies. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses.

  • Coordinate implementation of computer system plan with establishment personnel and outside vendors.
  • Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
  • Train users and promote security awareness to ensure system security and to improve server and network efficiency.