Deal with People
Information security analysts plan and carry out security measures to protect an organization’s computer networks and systems. Their responsibilities are continually expanding as the number of cyberattacks increases.Duties
Information security analysts typically do the following:
Information security analysts must continually adapt to stay a step ahead of cyberattackers. They must stay up to date on the latest methods attackers are using to infiltrate computer systems and on IT security. Analysts need to research new security technology to decide what will most effectively protect their organization. This may involve attending cybersecurity conferences to hear firsthand accounts of other professionals who have experienced new types of attacks.
IT security analysts are heavily involved with creating their organization’s disaster recovery plan, a procedure that IT employees follow in case of emergency. These plans allow for the continued operation of an organization’s IT department. It includes preventive measures such as regularly copying and transferring data to an offsite location. It also involves plans to restore proper IT functioning after a disaster. Analysts continually test the steps in their recovery plans.
Because information security is important, these workers usually report directly to upper management. Many information security analysts work with an organization’s computer and information systems manager or chief technology officer (CTO) to design security or disaster recovery systems.
Most information security analyst positions require a bachelor’s degree in a computer-related field. Employers usually prefer analysts to have experience in a related occupation.Education
Information security analysts usually need at least a bachelor’s degree in computer science, programming, or a related field. As information security continues to develop as a career field, many schools are responding with information security programs for prospective job seekers. These programs may become a common path for entry into the occupation. Currently, a well-rounded computer education is preferred.
Employers of information security analysts sometimes prefer applicants who have a Master's of Business Administration (MBA) in information systems. Programs offering the MBA in information systems generally require 2 years of study beyond the undergraduate level and include both business and computer-related courses.Work Experience in a Related Occupation
Information security analysts generally need to have previous experience in a related occupation. Many analysts have experience in an information technology department, often as a network or systems administrator. Some employers look for people who have already worked in fields related to the one in which they are hiring. For example, if the job opening is in database security, they may look for a database administrator. If they are hiring in systems security, a computer systems analyst may be an ideal candidate.Licenses, Certifications, and Registrations
There are a number of information security certifications available, and many employers prefer job candidates to have one. Certification validates the knowledge and best practices required from information security analysts. Some are general information security certificates, such as the Certified Information Systems Security Professional, and others have a narrow focus, such as penetration testing or systems auditing.Advancement
Information security analysts can advance to become chief security officers or another type of computer and information systems manager.Important Qualities
Analytical skills. Information security analysts must carefully study computer systems and networks and assess risks to determine how security policies and protocols can be improved.
Detail oriented. Because cyberattacks can be difficult to detect, information security analysts pay careful attention to their computer systems and watch for minor changes in performance.
Ingenuity. Information security analysts anticipate information security risks and implement new ways to protect their organizations’ computer systems and networks.
Problem-solving skills. Information security analysts respond to security alerts and uncover and fix flaws in computer systems and networks.
|Job Title||Company||Location||Start Date||Salary|
|MTS 2, Information Security||Paypal, Inc.||San Jose, CA||Oct 17, 2015||$200,000|
|Information Security Specialist||PDT Partners LLC||New York, NY||Aug 15, 2016||$185,000|
|MTS 2, Information Security||EBAY Inc.||San Jose, CA||Sep 11, 2015||$180,000|
|Chief Information Security Specialist||Inovant, LLC||Foster City, CA||May 13, 2016||$175,718 -
|MTS 2, Information Security||EBAY Inc.||San Jose, CA||Feb 11, 2015||$175,000|
|MTS 2, Information Security||EBAY Inc.||San Jose, CA||Oct 31, 2016||$175,000|
|Information Security Analyst||Populus Group LLC||Johnson City, TX||Jul 06, 2015||$162,786|
|MTS 1, Information Security||EBAY Inc.||San Jose, CA||Feb 15, 2016||$160,000|
|MTS 1, Information Security||EBAY Inc.||San Jose, CA||Feb 11, 2015||$160,000|
|SR. Information Security Specialist||Electronic Arts, Inc.||Redwood City, CA||Feb 02, 2015||$155,000|
A day in the life of IT security
A day in the life of Andrea Simmons, Chief Information Security Officer, HP Enterprise Services