Log In

Log In to Save

Sign Up to Save

Sign Up to Dismiss

or

The email and password you specified are invalid. Please, try again.

Email and password are mandatory

Forgot Password?

Don't have an account? Sign Up

reset password

Enter your email address and we will send you a link to reset your password.

Back to Log In

Become A Cyber Security Analyst

Where do you want to work?

To get started, tell us where you'd like to work.
Sorry, we can't find that. Please try a different city or state.

Working As A Cyber Security Analyst

  • Interacting With Computers
  • Getting Information
  • Analyzing Data or Information
  • Evaluating Information to Determine Compliance with Standards
  • Communicating with Supervisors, Peers, or Subordinates
  • Deal with People

  • Mostly Sitting

  • $107,610

    Average Salary

What Does A Cyber Security Analyst Do At Aecom

* _
* Provide direct support to the Cybersecurity SIT Lead in efforts to complete the design and integration of various Submarine Systems._
* Familiarity with Navy and/or Industry Standard Cybersecurity requirements._
* Technical expertise in cybersecurity engineering as it relates to design, deployment, integration, testing and implementation on/for Navy systems._
* Facilitate timely decisions in the review and adjudication of all design products and written correspondence by the appropriate NAVSEA technical stakeholders, Strategic Systems Programs (SSP), UK, NAVY Field Activities in accordance with Ship Specifications to meet commitment completion dates._
* Interface with stakeholders to generate letters and packages for official release._
* Establish and manage Cybersecurity commitments.
* Track and report status of commitments.
* Attend weekly commitment meetings and other applicable_ _meetings required to support Cybersecurity SIT Lead._
* Other duties as assigned._
*

What Does A Cyber Security Analyst Do At Navy Federal Credit Union

* Perform in-depth analysis, response and remediation on cyber incidents; determine course of action in compliance with the appropriate operational level agreements
* Provide independent thinking and real-time decision making to diagnose and analyze high severity escalated incidents ensuring critical response and remediation
* Perform in-depth analysis, monitoring, research, assessment and recommendations on Intrusion detection and prevention tools, anomaly detection systems, firewalls, antivirus systems and proxy devices
* Develop content to implement countermeasures in response to potential or identified cyber threats and attacks based on incident response activities
* Provide log/network/malware/device analysis and make recommendations for remediation of security vulnerability conditions
* Leverage commercial and open source tools to quickly analyze, detect, and respond to cyber security incidents
* Develop and maintain documentation of more complex threats and incidents to enhance event monitoring and incident response function and cyber tools
* Develop internal documentation, such as detailed procedures, playbooks, and operational metrics reports
* Provide technical guidance and mentoring to junior analysts (as applicable)
* Communicate shift turnover materials (e.g., ongoing incidents) to coworkers
* Execute daily ad-hoc tasks or lead small projects
* Perform other duties as assigned or appropriate

What Does A Cyber Security Analyst Do At Mantech

* Monitoring various security tools (e.g., Splunk, Palo Alto Networks, Source Fire, Cisco ASA) to identify potential incidents, network intrusions, and malware events, etc. to ensure confidentiality, integrity, and availability of VA architecture and information systems are protected
* Reviewing and analyzing log files to report any unusual or suspect activities
* Utilize incident response use-case workflows to follow established and repeatable processes for triaging and escalating
* Generating trouble tickets and performing initial validation and triage to determine whether incidents are security events using open source intelligence (OSINT)
* Following established incident response procedures to ensure proper escalation, analysis and resolution of security incidents
* Reporting incidents to US CERT and providing detailed information for use in after action reports
* Analyzing and correlating incident event data to develop preliminary root cause and corresponding remediation strategy
* Providing technical support for new detection capabilities, recommendations to improve upon existing tools/capabilities to protect the VA network, and assessments for High Value Assets
* Supporting on-site during the following shift times
* Tues – Sat or Sun – Thur, 2:00pm CST to 10:30pm CST

What Does A Cyber Security Analyst Do At Volt Information Sciences

* Monitors and manages security devices such as network and application **firewalls, Intrusion Prevention Systems, VPN devices, and Security Incident** and
* Event Management systems.
* Provides technical support and consultation as it relates to network and multi-platform systems security configurations.
* Resolves security-related operational issues reported through internal ticketing systems, including fault isolation and resolution for security devices and escalating responses when necessary.
* Ensures compliance with security policies and standards.
* May provide information security awareness training to employees, contractors, and other third parties.
* May be a point of contact with suppliers and vendors.
* Responsible for observing all laws, regulations and other applicable obligations wherever and whenever business is conducted on behalf of the Company.
* Expected to work in a safe manner in accordance with established operating procedures and practices.
* Performs other duties as assigned or required.
* CyberSecurity Analyst IA Information Assurance RMF Risk Management Framework firewalls Intrusion Prevention Systems VPN devices Security Incident Event Management systems DHCP DMZ DNS ICMP IPsec NAT SMTP SNMP TCP/IP PCI DSS PCI
* QSA CISSP CISA CISM CRISC CIP
* Must be able to qualify to obtain a DoD security clearance.
* **_
*

What Does A Cyber Security Analyst Do At Procter & Gamble

* You will conduct deep technical investigations, resulting in successful root cause analysis of intrusions and enhancement in technical controls and other risk reduction methodologies.
* Additionally, you will provide support in evaluation and operational implementation of new analysis tools, processes and vendors and products.
* Duties may include:
* Leading incident investigations
* Conducting incident analysis – data collection, intrusion analysis, forensics, remediation
* Employing advanced forensic tools
* Performing network traffic analysis
* Reviewing threat data from various sources and develops custom signatures for Open Source Intrusion Detection Systems (IDS) or other custom detection capabilities
* Correlating actionable security events from various sources including Security Information Event Management (SIEM) system data and developing unique correlation techniques
* Utilizing understanding of attack signatures, tactics, techniques and procedures associated with advanced threats
* Conducting malware analysis of attacker tools providing indicators for enterprise defensive measures, and reverse engineer attacker encoding protocols
* Interfacing with external entities in an operational environment
* Documenting investigation activities to provide enhanced intelligence to the team and other cyber security activities inside P&G
* Performing full range of standard work described above and applies advanced skills to resolve complex problems.
* Desired Characteristics
* Ability to thrive and effectively prioritize and execute tasks in high-stress environments.
* Strong analytical skills, able to leverage complex data to identify opportunities, recognize problems, and draw logical conclusions.
* Ability to produce and present technical information to both technical and non-technical personnel.
* Good temperament, ability to manage stressful situations.
* Ability to provide customer-facing support in a professional manner.
* Team work; establish and maintain effective and appropriate working relationships with those contacted during the work day.
* Ability to build capability in other analysts through on-the-job training and knowledge sharing.
* Technical Competencies and Experience
* Technical certification, strong knowledge and experience in the following is highly desired:
* Preferred Certifications: CISSP, MCSE, CCNA, Comp TIA Security , GIAC Security Essentials, CERT
* Working experience with Linux/UNIX system administration, along with network (router and switch), Web server, firewall, or DNS administration
* Working experience with various IDS/IPS, NetFlow, and protocol collection and analysis tools such as Snort, Suricata, Bro, Argus, SiLK, tcpdump, WireShark, McAfee IntruShield and ePolicy Orchestrator (EPO)
* Deep technical experience with various log aggregation and SIEM tools such as ArcSight or Splunk
* Working experience with vulnerability assessment and penetration testing tools such as Metasploit, CORE Impact, Immunity Canvas, or Kali Linux
* Working knowledge of entire TCP/IP or OSI network protocol stack, including major protocols such as IP, Internet Control Message Protocol (ICMP), TCP, User Datagram Protocol (UDP), Simple Mail Transfer Protocol (SMTP), Post Office Protocol 3 (POP3), Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), and SSH
* Working knowledge of popular cryptography algorithms and protocols such as Advanced Encryption Standard (AES), Rivest, Shamir, and Adleman (RSA), MessageDigest Algorithm (MD5), Secure Hash Algorithm (SHA), Kerberos, Secure Socket Layer/ Transport Layer Security (SSL/TLS)
* Experience with programming and scripting languages and text manipulation tools such as Perl, Ruby, and Python
* Knowledge of Windows and other Operating Systems and work with media forensics and analysis tools such as AccessData FTK or EnCase Forensics.
* Malware reverse engineering knowledge of assembly code in Intel x86 and other popular architectures, malware analysis frameworks such as ThreatTrack ThreatAnalyzer and FireEye AX, and various utilities that aid in malware analysis, such as SysInternals, and tool suites used to decompile and examine malware
* Bachelor’s degree in Information Systems, Information Technology (IT), Computer Science, Engineering, or other technical/IT field or at least 5 years of relevant experience
* In-depth knowledge and expertise in collecting, analyzing, and escalating security events; responding to computer security incidents, and/or collecting, analyzing, and disseminating cyber threat intelligence.
* Available to work off hours during the evenings and weekends as required, sometimes with little advanced notice.
* The hired applicant must have, or be willing to obtain within 1 year, the Certified Information System Security Professional (CISSP) certification.
* P&G provides study preparation and exam cost coverage
* Must be willing to work from the Cincinnati Procter & Gamble office location
* All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, protected veteran status, disability status, age, sexual orientation, gender identity and expression, marital status, citizenship, HIV/AIDS status or any other legally protected factor.
* Immigration sponsorship is not available for this position.
* Applicants for U
* S. based positions are generally required to be eligible to work in the U
* S. without the need for current or future sponsorship.
* Except in rare situations based on Procter & Gamble's sole discretion.
* Procter & Gamble does not sponsor candidates for permanent residency.
* Any exceptions would be based on the Company's specific business needs at the time and place of recruitment as well as the particular qualifications of the individual.
* Procter & Gamble participates in e-verify as required by law.
* Qualified individuals will not be disadvantaged based on being unemployed

Show More

Show Less

How To Become A Cyber Security Analyst

Most information security analyst positions require a bachelor’s degree in a computer-related field. Employers usually prefer analysts to have experience in a related occupation.

Education

Information security analysts usually need at least a bachelor’s degree in computer science, programming, or a related field. As information security continues to develop as a career field, many schools are responding with information security programs for prospective job seekers. These programs may become a common path for entry into the occupation. Currently, a well-rounded computer education is preferred.

Employers of information security analysts sometimes prefer applicants who have a Master's of Business Administration (MBA) in information systems. Programs offering the MBA in information systems generally require 2 years of study beyond the undergraduate level and include both business and computer-related courses.

Work Experience in a Related Occupation

Information security analysts generally need to have previous experience in a related occupation. Many analysts have experience in an information technology department, often as a network or systems administrator. Some employers look for people who have already worked in fields related to the one in which they are hiring. For example, if the job opening is in database security, they may look for a database administrator. If they are hiring in systems security, a computer systems analyst may be an ideal candidate.

Licenses, Certifications, and Registrations

There are a number of information security certifications available, and many employers prefer job candidates to have one. Certification validates the knowledge and best practices required from information security analysts. Some are general information security certificates, such as the Certified Information Systems Security Professional, and others have a narrow focus, such as penetration testing or systems auditing.

Advancement

Information security analysts can advance to become chief security officers or another type of computer and information systems manager.

Important Qualities

Analytical skills. Information security analysts must carefully study computer systems and networks and assess risks to determine how security policies and protocols can be improved.

Detail oriented. Because cyberattacks can be difficult to detect, information security analysts pay careful attention to their computer systems and watch for minor changes in performance.

Ingenuity. Information security analysts anticipate information security risks and implement new ways to protect their organizations’ computer systems and networks.

Problem-solving skills. Information security analysts respond to security alerts and uncover and fix flaws in computer systems and networks.

Show More

Show Less

Cyber Security Analyst jobs

Add To My Jobs

Cyber Security Analyst Career Paths

Cyber Security Analyst
Senior Analyst Senior Manager Director Of Information
Chief Information Officer
11 Yearsyrs
Cyber Security Engineer
10 Yearsyrs
Information Security Officer Director Of Information Chief Information Officer
Deputy Chief Information Officer
12 Yearsyrs
Senior Analyst Project Manager Program Manager
Deputy Program Manager
11 Yearsyrs
Senior Consultant Senior Manager
Director Of Information
10 Yearsyrs
Subject Matter Expert Information Technology Project Manager Director Of Information
Director Of Information Management
10 Yearsyrs
Information Security Officer Information Security Manager Director Of Information
Director Of Information Technology Security
12 Yearsyrs
Senior Security Engineer Security Architect Senior Manager
Director, Network Operations
10 Yearsyrs
Information Assurance Analyst Information Security Engineer
Information Security Manager
10 Yearsyrs
Senior Security Engineer Securities Consultant Information Security Consultant
Information Security Officer
12 Yearsyrs
Senior Consultant Project Manager
Program Manager
8 Yearsyrs
Security Engineer Network Security Engineer Senior Network Engineer
Project Manager
8 Yearsyrs
Subject Matter Expert Business Analyst Quality Assurance Lead
Quality Assurance Manager
9 Yearsyrs
Cyber Security Engineer Senior Security Engineer
Senior Security Analyst
8 Yearsyrs
Information Assurance Analyst Information Security Analyst Security Engineer
Senior Security Engineer
10 Yearsyrs
Security Engineer Senior Network Engineer Director Of Information
Vice President Of Information Technology
12 Yearsyrs
Show More

Cyber Security Analyst Demographics

Gender

  • Male

    72.6%
  • Female

    24.7%
  • Unknown

    2.6%

Ethnicity

  • White

    76.9%
  • Hispanic or Latino

    9.7%
  • Asian

    9.1%
  • Unknown

    3.0%
  • Black or African American

    1.3%
Show More

Languages Spoken

  • Spanish

    32.0%
  • Chinese

    8.0%
  • Dari

    8.0%
  • Mandarin

    8.0%
  • Korean

    8.0%
  • Russian

    4.0%
  • Portuguese

    4.0%
  • Zulu

    4.0%
  • Turkish

    4.0%
  • Hebrew

    4.0%
  • Japanese

    4.0%
  • Urdu

    4.0%
  • Persian

    4.0%
  • Italian

    4.0%
Show More

Cyber Security Analyst

Unfortunately we don’t have enough data for this section.

Cyber Security Analyst Education

Cyber Security Analyst

Unfortunately we don’t have enough data for this section.

Job type you want
Full Time
Part Time
Internship
Temporary

Real Cyber Security Analyst Salaries

Job Title Company Location Start Date Salary
Cyber Security Analyst Jpmorgan Chase & Co. New York, NY Aug 20, 2016 $92,500
Cyber Security Analyst Schneider Electric USA, Inc. La Vergne, TN Jul 08, 2013 $81,000
Cyber Security Analyst Schneider Electric USA, Inc. La Vergne, TN Jul 09, 2013 $81,000
Cyber Security Analyst Netenrich, Inc. Addison, TX Aug 18, 2016 $77,605 -
$93,413
Cyber Security Analyst Schneider Electric USA, Inc. La Vergne, TN Jul 09, 2016 $74,859 -
$82,260
Cyber Security Analyst Schneider Electric USA, Inc. La Vergne, TN Sep 07, 2016 $74,859 -
$82,260
Analyst, Cyber Security Santander Bank, N.A. MA Aug 19, 2014 $70,000 -
$80,000

No Results

To get more results, try adjusting your search by changing your filters.

Show More

Top Skills for A Cyber Security Analyst

ProceduresSecurityRequirementsVulnerabilityAssessmentsInformationSystemsIncidentResponseAssuranceNistSecurityPoliciesInformationSecurityDODMalwareAnalysisNetworkSecurityIds/IpsIntrusionDetectionSystemAcasSecurityIncidentsWebWindowsSplunkNessusMcafee

Show More

Top Cyber Security Analyst Skills

  1. Procedures
  2. Security Requirements
  3. Vulnerability Assessments
You can check out examples of real life uses of top skills on resumes here:
  • Implemented information protection procedures and ensure compliance to information protection standards.
  • Provided advice and guidance to department personnel on information security requirements, policies, and guidelines.
  • Conducted vulnerability assessments and management for all systems and environments.
  • Provide validation of information systems security performance for the Authorizing Official's review and decisions relative to authority to operate.
  • Handled any support tickets concerning information security matters, including reports of phishing e-mails and infected systems/incident response tickets.

Top Cyber Security Analyst Employers

Cyber Security Analyst Videos

Cybersecurity Careers

A day in the life of IT security

Information Security Expert Shares Career Advice with Rasmussen College

×