Log In

Log In to Save

Sign Up to Save

Sign Up to Dismiss

or

The email and password you specified are invalid. Please, try again.

Email and password are mandatory

Forgot Password?

Don't have an account? Sign Up

reset password

Enter your email address and we will send you a link to reset your password.

Back to Log In

Become An Information Assurance Analyst

Where do you want to work?

To get started, tell us where you'd like to work.
Sorry, we can't find that. Please try a different city or state.

Working As An Information Assurance Analyst

  • Interacting With Computers
  • Getting Information
  • Analyzing Data or Information
  • Evaluating Information to Determine Compliance with Standards
  • Communicating with Supervisors, Peers, or Subordinates
  • Deal with People

  • Mostly Sitting

  • $90,120

    Average Salary

What Does An Information Assurance Analyst Do At Dollar Tree

* Lead the development, update and compliance of Information Security standards, Baseline Security Configurations in accordance with industry standards, best practices and information security standard operating procedures
* Conduct information security assessments of third party vendors to determine their ability to protect data
* Assist in the formal risk assessment process for all departmental and enterprise systems and work closely with system owners to align risks identified with established risk tolerances
* Work with technical teams to ensure baseline configurations are kept current and configurations for new technologies are designed and built prior to integration into the company environment
* Develop the comprehensive information security awareness program and run year round campaigns.
* Create communications on behalf of IT Security for awareness activities, initiatives or other required security announcements.
* Assist in developing security awareness materials including presentations, brochures, posters and other medium as necessary
* Maintain security and compliance metrics that are meaningful and actionable for Sr.
* Management.
* Metrics should establish baselines, highlight progress and drive behaviors
* Coordinate with internal and external audit and compliance groups on improvement of information technology controls
* Experience with analyzing, evaluating, prioritizing and processing results from security penetration tests
* Provide governance for the identification, validation and remediation of information technology controls required by SOX, PCI DSS, PII, HIPAA and other applicable regulatory compliance frameworks.
* Ensure successful audits of these compliance programs
* Develop and maintain relationships with internal and external customers to formulate information security governance solutions for Company
* Participates in projects and assessments on risk determinatio

What Does An Information Assurance Analyst Do At Parsons Corporation

* Identify and report all IAVA/B/T CTOs that affect the system; apply applicable patches to system baselines
* Coordinate with IAO for VRAM updates
* Create/maintain program security related Enterprise Change Requests (ECRs) for IAVA/B/T, CTOs, TASKORDs, etc.
* Prepare test reports, configuration guides and implementation plans for IAVM fix/mitigation and implementation
* Inform operational sites of fix/patch per documented procedures
* Create/maintain Standard Operating Procedures (SOPs) documenting the patching processes, ACAS scanning, etc.
* Generate and review ACAS scans to include IAV and STIG related findings, upload results to program dashboard
* Provide input to IAO for mitigation POAMs and Certification Accreditation Plans (as necessary

What Does An Information Assurance Analyst Do At Leidos

* Perform security scans, using tools such as Assured Compliance Assessment Solution (ACAS), Center for Internet Security (CIS) Benchmark, and Security Content Automation Protocol (SCAP).
* Analyze scan results, and document findings for products as required to successfully complete Collateral and SCI-level security certification testing and evaluation (ST&E) as appropriate for the product.
* Scan results and findings are to be documented according to NAVINTEL IA and ICD 503 Risk Management Framework (RMF) processes.
* Perform ISSO responsibilities per SECNAV M
* which includes acting as a point of contact for matters of cyber security relating to assigned systems, reviewing audit trail logs and scans, and ensuring systems are maintained per security policies and procedures, and maintaining compliance and reporting weekly findings to Vulnerability Remediation Asset Management (VRAM).
* Document and execute a plan for each security assessment and testing task performed in support of project tasks and as tasked for approved project requirements.
* Prepare Security documentation in support of project tasks and as tasked for approved project requirements, which support successful completion of Collateral and/or SCI-level security testing and evaluation (ST&E) appropriate for the product.
* Carry out and monitor all A&A Security activities, in accordance with the ICD 503 (RMF) process.
* TA_4

What Does An Information Assurance Analyst Do At Kforce

* Performs analyses to validate established security requirements and to recommend additional security requirements and safeguards to ensure compliance with the NIST 800
* and DFARS 252
* Recommend program control processes to ensure mitigation of risks and supports obtaining certification and accreditation of systems
* Includes support of process, analysis, coordination, security certification test, security documentation, as well as investigations, software research, hardware introduction and release, emerging technology research inspections, and periodic audits
* Assists in the implementation of the NIST 800
* Make recommendations on process tailoring, participate in and document process activities
* Documents the results of Assessment and Authorization (A&A) activities and technical or coordination activity and prepare the System Security Plans and update the Plan of Actions and Milestones (POA&M)
* Periodically conducts a complete review of each system's audits and monitor corrective actions until all actions are closed

What Does An Information Assurance Analyst Do At ICF Consulting Group, Inc.

* _
* Performing comprehensive security assessments using the DOD Information Assurance Certification and Accreditation Process (DIACAP).
* Developing IT system security documentation as required by both the DIACAP and the NIST Risk Management Framework (RMF).
* Develop, maintain, and update the Plan of Action and Milestones (POA&M).
* Utilize knowledge of Mission Assurance Categories (MAC), Classification Levels (CL) and the 8500
* IA controls associated with each level.
* Responsible for documentation review; reading over policy and procedures; Ports Protocols and Services Management (PPSM); system and network diagrams, descriptions, SOPs, previous certification and accreditation documents; compiling and generating deliverables (DIACAP scorecard, and findings).
* Reviewing IA Controls with the customer for specific applicability and compliancy.
* Conducting Security Tests and Evaluation (ST&E) for Accreditation or re-accreditation.
* Analyzing ST&E results; assess, determine, and describe risks associated with the results.
* Understanding of DISA Security Technical Implementation Guides (STIGs)
* Knowledge of DoD policies, regulations, and guidelines.
* Travel up to 10

Show More

Show Less

How To Become An Information Assurance Analyst

Most information security analyst positions require a bachelor’s degree in a computer-related field. Employers usually prefer analysts to have experience in a related occupation.

Education

Information security analysts usually need at least a bachelor’s degree in computer science, programming, or a related field. As information security continues to develop as a career field, many schools are responding with information security programs for prospective job seekers. These programs may become a common path for entry into the occupation. Currently, a well-rounded computer education is preferred.

Employers of information security analysts sometimes prefer applicants who have a Master's of Business Administration (MBA) in information systems. Programs offering the MBA in information systems generally require 2 years of study beyond the undergraduate level and include both business and computer-related courses.

Work Experience in a Related Occupation

Information security analysts generally need to have previous experience in a related occupation. Many analysts have experience in an information technology department, often as a network or systems administrator. Some employers look for people who have already worked in fields related to the one in which they are hiring. For example, if the job opening is in database security, they may look for a database administrator. If they are hiring in systems security, a computer systems analyst may be an ideal candidate.

Licenses, Certifications, and Registrations

There are a number of information security certifications available, and many employers prefer job candidates to have one. Certification validates the knowledge and best practices required from information security analysts. Some are general information security certificates, such as the Certified Information Systems Security Professional, and others have a narrow focus, such as penetration testing or systems auditing.

Advancement

Information security analysts can advance to become chief security officers or another type of computer and information systems manager.

Important Qualities

Analytical skills. Information security analysts must carefully study computer systems and networks and assess risks to determine how security policies and protocols can be improved.

Detail oriented. Because cyberattacks can be difficult to detect, information security analysts pay careful attention to their computer systems and watch for minor changes in performance.

Ingenuity. Information security analysts anticipate information security risks and implement new ways to protect their organizations’ computer systems and networks.

Problem-solving skills. Information security analysts respond to security alerts and uncover and fix flaws in computer systems and networks.

Show More

Show Less

Information Assurance Analyst jobs

Add To My Jobs

Information Assurance Analyst Career Paths

Information Assurance Analyst
Information Assurance Officer Information Systems Security Manager
Assurance Manager
8 Yearsyrs
Information Assurance Program Manager Deputy Program Manager
Branch Chief
9 Yearsyrs
Network Technician Information Technology Manager Information Technology Project Manager
Change Manager
10 Yearsyrs
Information Assurance Engineer Information Systems Security Manager Security Manager
Chief Of Security
9 Yearsyrs
Assurance Manager Senior Manager Chief Information Officer
Chief Security Officer
11 Yearsyrs
Assurance Manager Project Manager Construction Manager
Contracts Manager
9 Yearsyrs
Security Engineer Senior Systems Engineer Chief Information Officer
Deputy Chief Information Officer
12 Yearsyrs
Analyst Project Manager Program Manager
Deputy Director
9 Yearsyrs
Information Systems Security Officer Systems Administrator Program Manager
Deputy Program Manager
11 Yearsyrs
Network Technician Network Administrator Information Systems Manager
Director Of Information Services
9 Yearsyrs
Information Assurance Security Manager Section Chief
Division Chief
9 Yearsyrs
Information Systems Security Officer Senior Information Security Analyst
Information Security Manager
10 Yearsyrs
Information Security Engineer Security Engineer Network Security Engineer
Information Security Officer
12 Yearsyrs
Information Security Analyst Securities Consultant Security Officer
Project Manager
8 Yearsyrs
Analyst Business Analyst Quality Assurance Lead
Quality Assurance Manager
9 Yearsyrs
Security Engineer Senior Network Engineer Senior Consultant
Risk Manager
8 Yearsyrs
Information Assurance Officer Information Systems Security Officer Systems Administrator
Senior Analyst
6 Yearsyrs
Information Security Engineer Information Systems Security Officer Information Assurance Engineer
Senior Information Assurance Engineer
11 Yearsyrs
Information Assurance Engineer Senior Security Engineer
Senior Security Analyst
8 Yearsyrs
Information Security Analyst Security Engineer
Senior Security Engineer
10 Yearsyrs
Show More

Information Assurance Analyst Demographics

Gender

  • Male

    70.1%
  • Female

    28.2%
  • Unknown

    1.7%

Ethnicity

  • White

    80.7%
  • Asian

    8.9%
  • Hispanic or Latino

    7.4%
  • Unknown

    2.0%
  • Black or African American

    1.0%
Show More

Languages Spoken

  • Spanish

    33.3%
  • Tamil

    16.7%
  • Hindi

    16.7%
  • Telugu

    16.7%
  • Italian

    16.7%
Show More

Information Assurance Analyst

Unfortunately we don’t have enough data for this section.

Information Assurance Analyst Education

Information Assurance Analyst

Unfortunately we don’t have enough data for this section.

Job type you want
Full Time
Part Time
Internship
Temporary

Real Information Assurance Analyst Salaries

Job Title Company Location Start Date Salary
Information Assurance Analyst Next Jump, Inc. Cambridge, MA Sep 16, 2016 $125,000
Lead IT Assurance Analyst BMC Software, Inc. Houston, TX Jul 08, 2014 $86,798
Information Assurance Analyst II Apptio Inc. Bellevue, WA Sep 11, 2016 $84,448
Information Assurance Analyst Apptio, Inc. Bellevue, WA Sep 15, 2014 $82,000

No Results

To get more results, try adjusting your search by changing your filters.

Show More

Top Skills for An Information Assurance Analyst

DODEnsureComplianceAssuranceVulnerabilityAcasProceduresProtectsInformationSystemsDisaSecurityPoliciesRetinaStigSystemSecurityPlanInformationSecurityRiskAssessmentsPOACyberFismaMilestonesWindowsSecurityRequirementsIava

Show More

Top Information Assurance Analyst Skills

  1. DOD
  2. Ensure Compliance
  3. Assurance Vulnerability
You can check out examples of real life uses of top skills on resumes here:
  • Provide testing support for the certification of DoD Marine Corp systems in an Agile environment.
  • Maintain network security and ensure compliance with security policies and procedures.
  • Conducted frequent vulnerability scans on production and DMZ networks to ensure compliancy with Information Assurance Vulnerability Alerts.
  • Certified in Assured Compliance Assessment Solutions (ACAS) and assist Vulnerability team in the planning of this architecture deployment.
  • Perform incident handling procedures upon discovery of potential malicious activity.

Top Information Assurance Analyst Employers

Information Assurance Analyst Videos

Cybersecurity Careers

A day in the life of IT security

Designing an Information Architecture to Support Cyber Security and Information Assurance

×