How do they match: Information Security Analysts

  • Cyber Policy and Strategy Planner
  • Cybersecurity Target Developer
  • Supervisory Control and Data Acquisition Security Analyst

  • Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
  • Confer with users to discuss issues such as computer data access needs, security violations, and programming changes.
  • Modify computer security files to incorporate new software, correct errors, or change individual access status.

  • Develop computer or information security policies or procedures.
  • Train others in computer interface or software use.