How do they match: Information Security Analysts

  • Systems Administrator
  • Systems Analyst
  • Systems Security Analyst
  • Systems Security Specialist
  • ADP Systems Security
  • All Source-Collection Manager
  • All Source-Collection Requirements Manager
  • Automatic Data Processing Systems Security Specialist
  • Certified Information Systems Security Professional
  • Computer Systems Security Analyst
  • Cyber Intel Planner
  • Cyber Operations Planner
  • Cyber Ops Planner
  • Cyber Policy and Strategy Planner
  • Cybersecurity Manager
  • Cybersecurity Partner Integration Planner
  • IT Manager
  • Information Systems Security Analyst
  • Information Systems Security Officer
  • Information Systems Security Specialist
  • Information Security Manager
  • Information Technology Manager
  • Information Technology Audit Manager
  • Network Security Systems Analyst
  • Partner Integration Planner
  • Security Manager
  • Supervisory Control and Data Acquisition Security Analyst

  • Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. Assess system vulnerabilities for security risks and propose and implement risk mitigation strategies. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses.

  • Coordinate implementation of computer system plan with establishment personnel and outside vendors.
  • Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
  • Maintain permanent fleet cryptologic and carry-on direct support systems required in special land, sea surface and subsurface operations.
  • Monitor current reports of computer viruses to determine when to update virus protection systems.
  • Monitor use of data files and regulate access to safeguard information in computer files.
  • Perform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures.
  • Train users and promote security awareness to ensure system security and to improve server and network efficiency.

  • Implement security measures for computer or information systems.
  • Test computer system operations to ensure proper functioning.
  • Troubleshoot issues with computer applications or systems.