Skip to content

IT and Engineering > Information Security Analyst

Salary National Average

Low Medium High
79440.0000 91650.0000 116360.0000

Change from Previous Year:

+6%

Supply and Demand

Candidate Supply: 7,911 Job Openings: 87,230

0 50 100

More Difficult Less Difficult

Salary Variance

Enter City, State to view local salaries and candidate demand.

Short Description:

Maintain information security throughout the organization. Ensure effective use of security measures and technical solutions to protect data. Develop and implement policies and practices to protect business information regardless of media or delivery mechanism. Ensure the company complies with regulatory requirements and security best practices as defined by industry experts and internal audits.

Duties / Responsibilities:

  • Encrypt data transmissions and erect firewalls to conceal confidential information.
  • Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
  • Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated.
  • Monitor the use of data files and regulate access to safeguard information in computer files.
  • Monitor current reports of computer viruses to determine when to update virus protection systems.
  • Modify computer security files to incorporate new software, correct errors, or change individual access status.
  • Perform risk assessments and execute tests of the data processing systems to ensure the the functioning of data processing activities and security measures.
  • Confer with users to discuss issues such as computer data access needs, security violations, and programming changes.
  • Train users and promote security awareness to ensure system security and improve server and network efficiency.
  • Coordinate implementation of computer system plan with establishment personnel and outside vendors.
  • Document computer security and emergency measures policies, procedures, and tests.
  • Maintain permanent fleet cryptologic and carry-on direct support systems required in special land, sea surface, and subsurface operations.

Skills / Requirements / Qualifications

 

  • Data base user interface and query software: Amazon Elastic Compute Cloud EC2 Amazon Redshift; Amazon Web Services AWS software; Blackboard software
  • Development Environment Software: Apache Kafka; Apache Maven; Go; Microsoft PowerShell 
  • Network Monitoring Software: Nagios; Sniffer Investigator; Symantec Blue Coat Data Loss Prevention; Wireshark
  • Transaction Security and Virus Protection Software: HP WebInspect; NortonLifeLock cybersecurity software; Portswigger BurP Suite; Stack smashing protection SSP software
  • Web Platform Development Software: Django; Google Angular; Microsoft ASP.NET; Spring Framework 

Job Zones

  • Education: Most of these occupations require a four-year bachelor's degree, but some do not.
  • Related Experience: A considerable amount of work-related skill, knowledge, or experience is needed for these occupations.
  • Job Training: Employees in these occupations usually need years of work-related experience, on-the-job training, or vocational training.
  • Job Zone Examples: Many of these occupations involve coordinating, supervising, managing, or training others. Examples include accountants, sales managers, database administrators, teachers, chemists, art directors, and cost estimators.
  • Specific Vocational Preparation in years: 2-4 years of preparation (7.0 to < 8.0)

Share Role Details

Return to job listings