How do they match: Information Security Analysts

  • Cyber Policy and Strategy Planner
  • Supervisory Control and Data Acquisition Security Analyst

  • Confer with users to discuss issues such as computer data access needs, security violations, and programming changes.
  • Maintain permanent fleet cryptologic and carry-on direct support systems required in special land, sea surface and subsurface operations.
  • Monitor use of data files and regulate access to safeguard information in computer files.
  • Train users and promote security awareness to ensure system security and to improve server and network efficiency.

  • Train others in computer interface or software use.