Data breaches at major U.S. retailers are frequently in the news today. Financial and personal information from tens of millions of consumers has been compromised, and it seems like each week brings a new hacking scandal at a major retailer. But that’s just one problem information security analysts must address as technology continues to make life easier for consumers and information seekers, but also increases opportunities for cybercriminals. Denial of service attacks, malware, viruses, threats from internal sources, and even attacks on computer systems that run critical infrastructure used in oil and gas pipelines and water supply, electric power distribution, and transportation systems, are just a few of the critical threats that information security analysts must identify and address.
Duties for information security analysts vary by job title, type and size of employer, and other factors. The following paragraphs detail the main duties performed by analysts.
Information security analysts install, configure, test, operate, maintain, and manage networks and their firewalls, including hardware and software that permit the sharing and transmission of data. They also perform the same duties in regard to firewalls and data encryption programs to protect sensitive information. Analysts teach organization employees how to install or use new security products and procedures, and they ensure that new or current information technology systems meet their organization’s information assurance and security requirements. Throughout their careers, analysts research the latest information technology security trends and threats so that they can be an asset to their employers.
Each day, analysts test, operate, and maintain systems security; conduct assessments of threats and vulnerabilities to computer systems; and analyze collected data to identify vulnerabilities and the potential for exploitation. They are also responsible for managing user accounts, firewalls, and patches and overseeing user access, passwords, and account creation and administration.
Information security analysts identify, analyze, and report suspicious events and activities that occur or might occur within computer networks and other systems. They respond to crises or urgent situations to mitigate immediate and potential threats. They collect, analyze, and present computer-related evidence in support of network vulnerability mitigation, and/or fraud, criminal, law enforcement, counterintelligence investigations. Analysts engage in surveillance and counter surveillance methods and use surveillance detection strategies and interview and interrogation techniques to gather evidence of security breaches or related issues. They identify and assess the capabilities and activities of foreign intelligence entities or cyber criminals and prepare status reports for their superiors.
- 3-D Printing Specialists
- Accountants
- Agile Coaches or Trainers
- Agricultural Consultants
- App Services Workers
- Artificial Intelligence Specialists
- Audit and Assurance Accountants
- Auditors
- Augmented Reality Developers
- Automation Engineers
- Autonomous Vehicle Safety and Test Drivers
- Back-End Developers
- Bank Examiners
- Big Data Developers
- Billing Clerks
- Biometrics Systems Specialists
- Blockchain Developers
- Bookkeeping and Accounting Clerks
- Business Continuity Planners
- Business Development Managers and Directors
- Business Intelligence Analysts
- Business Managers
- Chief Customer Officers
- Chief Executive Officers
- Chief Financial Officers
- Chief Information Officers
- Chief Information Security Officers
- Chief Restructuring Officers
- Chief Robotics Officer
- Chief Trust Officers
- Clinical Data Managers
- Cloud Engineers
- Compliance Managers
- Computer and Office Machine Service Technicians
- Computer and Video Game Designers
- Computer Network Administrators
- Computer Programmers
- Computer Support Service Owners
- Computer Support Specialists
- Computer Systems Programmer/Analysts
- Computer Trainers
- Computer-Aided Design Drafters and Technicians
- Corporate Climate Strategists
- Credit Analysts
- Cryptocurrency Specialists
- Cryptographic Technicians
- Customer Service Representatives
- Customer Success Managers
- Cybersecurity Architects
- Data Entry Clerks
- Data Processing Technicians
- Data Scientists
- Data Warehousing Specialists
- Database Specialists
- Decision Scientists
- Deepfake Professionals
- Digital Agents
- Digital Designers
- Digital Workplace Experience Engineers
- Directors of Security
- Document Management Specialists
- Driverless Car Engineers
- Electrical Engineering Technologists
- Electrical Engineers
- Electronics Engineering Technicians
- Electronics Engineers
- Electronics Service Technicians
- Embedded Systems Engineers
- Energy Consultants
- Enterprise Architects
- Environmental Consultants
- Ergonomists
- ETL Developers
- Fiber Optics Technicians
- Financial Analysts
- Financial Consultants
- Financial Institution Officers and Managers
- Financial Institution Tellers, Clerks, and Related Workers
- Financial Quantitative Analysts
- Fraud Examiners, Investigators, and Analysts
- Full Stack Developers/Engineers
- Futurists
- Geospatial Analytics Specialists
- Graphic Designers
- Graphics Programmers
- Hardware Engineers
- Health Care Consultants
- Health Data Analysts
- Health Informaticists
- Help Desk Representatives
- Human Resources Consultants
- Indoor Environmental Health Specialists
- Industrial Designers
- Information Assurance Analysts
- Information Brokers
- Information Technology Consultants
- Information Technology Infrastructure Engineers
- Information Technology Project Managers
- Information Technology Security Consultants
- Internet Consultants
- Internet Developers
- Internet Executives
- Internet Marketing and Advertising Consultants
- Internet of Things Developers
- Internet Quality Assurance Specialists
- Internet Security Specialists
- Internet Store Managers and Entrepreneurs
- Internet Transaction Specialists
- JavaScript Developers
- Learning Innovations Designers
- Legal Operations Specialists
- Life Coaches
- Loss Prevention Managers
- Machine Learning Engineers
- Management Analysts and Consultants
- Market Research Analysts
- Marketing Consultants
- Mathematicians
- Microelectronics Technicians
- Mobile Software Developers
- Model View Controller Developers
- Network Operations Center Engineers
- Network Operations Center Technicians
- Office Administrators
- Online Gambling Specialists
- Online Journalists
- Online Producers
- Personal Privacy Advisors
- Political Consultants
- Press Secretaries
- Product Development Directors
- Product Management Directors
- Product Managers
- Product Owners
- Professional Hackers
- Project Managers
- Radio Frequency Identification Device Specialists
- Sales Representatives
- Salesforce Developers
- Scrum Masters
- Search Engine Optimization Specialists
- Security Consultants
- Security Guards
- Semiconductor Technicians
- Site Reliability Engineers
- Smart Building Systems Designers
- Social Media Workers
- Software Application Developers
- Software Designers
- Software Engineers
- Software Quality Assurance Testers
- Solutions Architects
- Strategy Managers
- Systems Setup Specialists
- Technical Support Specialists
- Technical Writers and Editors
- Technology Ethicists
- Unity Developers
- User Experience Designers
- Visual Interaction Designers
- Webmasters
- Wireless Service Technicians
- Workplace Diversity Experts