2017 Information Security Analysts
Median Pay: US$90,120
Entry Level: Bachelor's degree
Summary
Information security analysts plan and carry out security measures to protect an organization's computer networks and systems. Their responsibilities are continually expanding as the number of cyberattacks increases.
Duties

Information security analysts typically do the following:

  • Monitor their organization's networks for security breaches and investigate a violation when one occurs
  • Install and use software, such as firewalls and data encryption programs, to protect sensitive information
  • Prepare reports that document security breaches and the extent of the damage caused by the breaches
  • Conduct penetration testing, which is when analysts simulate attacks to look for vulnerabilities in their systems before they can be exploited
  • Research the latest information technology (IT) security trends
  • Help plan and carry out an organization's way of handling security
  • Develop security standards and best practices for their organization
  • Recommend security enhancements to management or senior IT staff
  • Help computer users when they need to install or learn about new security products and procedures

Information security analysts must continually adapt to stay a step ahead of cyberattackers. They must stay up to date on the latest methods attackers are using to infiltrate computer systems and on IT security. Analysts need to research new security technology to decide what will most effectively protect their organization. This may involve attending cybersecurity conferences to hear firsthand accounts of other professionals who have experienced new types of attacks.

IT security analysts are heavily involved with creating their organization's disaster recovery plan, a procedure that IT employees follow in case of emergency. These plans allow for the continued operation of an organization's IT department. It includes preventive measures such as regularly copying and transferring data to an offsite location. It also involves plans to restore proper IT functioning after a disaster. Analysts continually test the steps in their recovery plans.

Because information security is important, these workers usually report directly to upper management. Many information security analysts work with an organization's computer and information systems manager or chief technology officer (CTO) to design security or disaster recovery systems.

Intelligence Analyst Intern

Type: Internship
Description:Red Five Security has an opportunity for a highly motivated individual currently enrolled in an ongoing bachelor's or graduate degree program in a security-related field (criminal justice, international studies, law, regulatory compliance, homeland security, etc.) for our...
Apply Share

Programmer/Analyst- Campus Recruiting

Type: Full Time, Full Time Alumnus
Programmer/Analyst- Campus RecruitingShare thisFind similar career opportunitiesProgrammer/Analyst- Campus RecruitingCategory: Business Analysis (functional and technical)City: Charleston, South Carolina, United StatesPosition ID: J0319-1686Employment Type: GraduatePosition Description:CGI is...
Apply Share

Undergraduate Internship/Co-op Program - Intelligence Analyst

Type: Internship
As an Intelligence Analyst Intern for the CIA, you will work on teams alongside our full-time analysts, studying and evaluating information from all available sources - classified and unclassified - and then analyzing it to provide timely and objective assessments to customers such as the President...
Apply Share

Undergraduate Internship/Co-op Program - Multi-Discipline Security Officer

Type: Internship
As a Multi-Discipline Security Officer (MDSO) Intern for the CIA, you will work side-by-side with other MDSOs in the collection and analysis of information regarding risks to CIA personnel, facilities, information, and operations. MDSOs recommend and carry out actions to protect the CIA and the...
Apply Share

Data Engineer Grad Intern

Type: Internship
Data Engineer Grad Intern - (00049974)DescriptionDo you want to help analyze data and do the analysis needed to contribute to solving our nation’s most critical problems? Do you want to be mentored by engineers and scientists that are experts in their fields? Do you want to join over 300 other...
Apply Share

Research Coordinator

Type: Full Time, Full Time Alumnus
Apply scientific knowledge to coordinate a significant research project or multiple smaller projects within the Partnerships for Native Health (P4NH) program.Participate in developing research designs, data collection methods, and strategies for data management. Coordinate multiple data collection...
Apply Share

Data Scientist @ Cyence - San Mateo, CA

Type: Full Time, Full Time Alumnus
Guidewire’s Cyence Risk Analytics products help the property & casualty (P&C) industry to model new and evolving risks such as cyber. By combining internet-scale data listening, adaptive machine learning, and insurance risk modeling, Cyence Risk Analytics provides insights that help P&C...
Apply Share

Weapons Development Analyst

Type: Full Time, Full Time Alumnus
Modern Technology Solutions, Inc. (MTSI) is searching for a Weapons Development Analyst to join our team of more than 850 employee owners. MTSI is dedicated to providing high caliber services to defense, aerospace and intelligence customers across the US. We are always looking for the best to join...
Apply Share

Undergraduate Internship/Co-op Program - Intelligence Analyst

Type: Internship
As an Intelligence Analyst Intern for the CIA, you will work on teams alongside our full-time analysts, studying and evaluating information from all available sources—classified and unclassified—and then analyzing it to provide timely and objective assessments to customers such as the President,...
Apply Share

Cybersecurity Technical Staff 2/3

Type: Full Time, Full Time Alumnus
Organization NameNIE-ESS/Engineering & Security ServicesWhat You Will DoThe NIE-ESS Computer Security Incident Response Team (CSIRT) is responsible for cyber incident response, host and network forensics, malware analysis, penetration testing, and the development of countermeasures and advanced...
Apply Share

Cybersecurity Technical Staff (Cybersecurity Techinical Staff 3/4)

Type: Full Time, Full Time Alumnus
Organization NameNIE-ESS / Engineering & Security ServicesWhat You Will DoAs a member of the cybersecurity technical staff at LANL, you will have the opportunity to be on the cutting edge of cyber security, while enjoying the unique opportunities provided by LANL’s location. You will work in...
Apply Share

Engineering Technician

Type: Full Time, Full Time Alumnus
McKean Defense is an employee owned Naval Life Cycle Management, Engineering, Enterprise Transformation and Program Management business headquartered in Philadelphia, PA. McKean’s engineers, developers, technical staff, programmers, analysts, and program managers identify and deploy new shipboard...
Apply Share