How do they match: Information Security Analysts

  • Information Security Analysts

  • Data Security Analyst
  • Data Security Administrator
  • Database Security Expert
  • All-Source Analyst
  • Application Security Analyst
  • Applications Security Analyst
  • Automatic Data Processing Systems Security Specialist
  • Computer Systems Security Analyst
  • Counterespionage Analyst
  • Cyber Defense Analyst
  • Cyber Defense Forensics Analyst
  • Cyber Information Security Analyst
  • Cyber Security Analyst
  • Cybersecurity Analyst
  • Cybersecurity All-Source Analyst
  • Cybersecurity Exploitation Analyst
  • Cybersecurity Multi-Disciplined Language Analyst
  • Cybersecurity Target Network Analyst
  • Cybersecurity Threat Analyst
  • Cybersecurity Warning Analyst
  • Exploitation Analyst
  • IT Analyst
  • IT Security Analyst
  • Information Assurance Analyst
  • Information Security Analyst
  • Information Systems Security Analyst
  • Information Technology Analyst
  • Information Technology Security Analyst
  • Intrusion Detection Analyst
  • Network Security Analyst
  • Network Security Systems Analyst
  • PC Analyst
  • Personal Computer Analyst
  • SCADA Security Analyst
  • SOC Analyst
  • Security Analyst
  • Security Operations Analyst
  • Security Operations Center Analyst
  • Supervisory Control and Data Acquisition Security Analyst
  • Systems Analyst
  • Systems Security Analyst
  • Technology Analyst
  • Threat Monitoring Analyst
  • Warning Analyst

  • Confer with users to discuss issues such as computer data access needs, security violations, and programming changes.
  • Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
  • Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.
  • Monitor use of data files and regulate access to safeguard information in computer files.
  • Perform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures.