How do they match: Information Security Analysts

  • Cybersecurity Target Developer

  • Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
  • Coordinate implementation of computer system plan with establishment personnel and outside vendors.

  • Develop computer or information security policies or procedures.