How do they match: Information Security Analysts

  • Cryptological Technician
  • Cyber Policy and Strategy Planner
  • Supervisory Control and Data Acquisition Security Analyst
  • Virus Technician

  • Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. Assess system vulnerabilities for security risks and propose and implement risk mitigation strategies. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses.

  • Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
  • Monitor use of data files and regulate access to safeguard information in computer files.
  • Train users and promote security awareness to ensure system security and to improve server and network efficiency.