Log In

Log In to Save

Sign Up to Save

Sign Up to Dismiss


The email and password you specified are invalid. Please, try again.

Email and password are mandatory

Forgot Password?

Don't have an account? Sign Up

reset password

Enter your email address and we will send you a link to reset your password.

Back to Log In

Become A Securities Research Analyst

Where do you want to work?

To get started, tell us where you'd like to work.
Sorry, we can't find that. Please try a different city or state.

Working As A Securities Research Analyst

  • Interacting With Computers
  • Getting Information
  • Analyzing Data or Information
  • Evaluating Information to Determine Compliance with Standards
  • Communicating with Supervisors, Peers, or Subordinates
  • Deal with People

  • Mostly Sitting

  • $94,612

    Average Salary

What Does A Securities Research Analyst Do At Intel

* Own emerging threat analysis, gain insights & know-how of evolving attack techniques, predict and extrapolate attack trends ahead of its occurrence, develop robust counter measures and mitigation.
* This role requires maintaining substantial knowledge of state-of-the-art security principles, theories, attacks etc. and contribute those insights to internal and external stakeholders.
* Participation in development or intellectual property is also a responsibility.
* Qualifications
* oApplicants should possess at least 10 years of experience in the field of system security research and excel in exploring software and hardware techniques as a method of attack against targets within the computing systems.oAbility to work autonomously in a less structured startup type environment with minimal supervision is a must.
* Ability to lead a team of security researchers is also a requirement. oAbility to span security expertise over HW, SW and Firmware domains.
* Passion for the latest gadgets and building security into these gadgets.oApplicants should have expertise or experience in four or more of the following areas:oIn-depth experience with security threats, vulnerability research along with practicing security development lifecycle practices

What Does A Securities Research Analyst Do At Goldman Sachs & Co.

* The role focuses on managing the portfolio and is great for someone who wants to enhance his/her skillset in credit analysis / investment skills and enjoys working in a fast-paced, market-oriented environment.
* You will analyze corporate credit, price risk across capital structures and learn about risk management.
* In particular, this person will be expected to:
* Analyze corporate credits and develop hedging / investment recommendations
* Work closely with team of dedicated research analysts to follow and develop a credit view on a portfolio of names
* Assist in executing cash and derivative trades either internally or through our external coverage
* Develop views on appropriate hedge strategy, candidates for sales and target prices
* Value and mark positions, many of which are illiquid (requires review of comps, derivatives and cross capital structure)
* Monitor, update and develop portfolio screens for news and price changes
* Basic requirements
* Experience in financial statement analysis (e.g. via IBD or research background)
* years relevant experience
* The Goldman Sachs Group, Inc. is a leading global investment banking, securities and investment management firm that provides a wide range of financial services to a substantial and diversified client base that includes corporations, financial institutions, governments and individuals.
* Founded in 1869, the firm is headquartered in New York and maintains offices in all major financial centers around the world.© The Goldman Sachs Group, Inc., 2018.
* All rights reserved Goldman Sachs is an equal employment/affirmative action employer Female/Minority/Disability/Vet.
* Job ID2017
* Schedule TypeFull Time
* LevelAnalyst, Associate
* Function(s)General
* RegionAmericas
* DivisionSecurities
* Business UnitSpecial Assets Group
* Employment

What Does A Securities Research Analyst Do At Mantech

* Perform vulnerability analysis of mobile/embedded platforms, applications, protocols, and supporting infrastructure
* Engage in extensive reverse engineering of mobile and wireless technology
* Act as key team participant in internal security research endeavors
* Maintain continuous awareness of threats, vulnerabilities, and techniques in mobile security and associated fields
* Provide insight into mid and near future mobile security trends, give expert strategic direction, and contribute both original ideas and technical content.
* Thoroughly document, in a manner suitable for widespread publication, all aspects of research including everything from initial discovery to methods and procedures used to findings and future research steps
* Interact with customers to identify their specific requirements and provide expert advice and direction on optimal and efficient means of achieving their objectives

What Does A Securities Research Analyst Do At Ca Technologies

* Conduct research and development for automating web application attacks.
* Conduct research for improving techniques for detection of vulnerabilities.
* Develop attack signatures for specific classes of vulnerabilities.
* Define developer focused specifications for new attacks.
* Work with management to set priorities and goals for Veracode’s DAST offerings.
* Keep up to date with the latest features in web browsers, web application development techniques, and web application vulnerabilities.
* Develop test cases to demonstrate vulnerabilities and ensure products’ ability to identify them in an automated fashion.
* Actively engage with the security research community through speaking at industry conferences, publishing independent research, posting on the Veracode blog, and other means.
* This is a deeply technical role that requires significant knowledge around modern web development technologies and practices.
* You not only understand common web vulnerabilities, but understand how to find them in an automated fashion.
* You will need to follow upcoming trends and how they may have implications for security.
* It’s also crucial that you’re an effective communicator, as you’ll collaborate frequently with engineers to guide them in implementing the specifications you create
* You’ll also need:
* years of practical application security work experience, preferably including some or all of the following: source code auditing, penetration testing, product assessments, vulnerability research, reverse engineering, and related pursuits.
* years of software development experience.
* Deep understanding of web browsers (i.e. security features, DOM, JavaScript, etc.).
* Deep understanding of common client side and server side web application vulnerabilities and how to exploit them (e.g.
* SQL injection, cross-site scripting, etc.).
* Ability to learn new programming languages and/or technologies quickly and independently
* Ability to balance novelty of attacks with the restrictions automation demands.
* Experience with automated application security testing products (SAST, DAST, etc.) a plus.
* Genuine enthusiasm, not just aptitude, for application security.
* Up to 20% of your time will be allocated for independent research, and this means you’ll need interesting, relevant project ideas.
* Prototyping ability – the skill to hack something together quick and dirty to solve a problem and demonstrate feasibility.
* Excellent attention to detail, quality, and customer satisfaction.
* Consulting experience a plus.
* Strong analytical, organizational, and technical writing skills.
* B.S. in Computer Science or equivalent industry experience
* vcode
* If you want to fulfill your potential, be acknowledged for your achievements, and be given autonomy to make decisions for your business and customers; if you want to work with a company that respects you as an individual - recognizing both your needs at work and your responsibilities outside of it - then CA Technologies is where you belong.
* At CA Technologies your passion and expertise can directly impact the business and you’ll help offer our customers practical approaches to delivering new, innovative services and value through IT.
* We offer competitive salary, company-sponsored premium Medical/Prescription & Dental Plans, company-paid Holidays, Vacation, Anniversary Service and Sick Days, 401(k) Plan, Education/Training Reimbursement, Charitable Gift Program, Adoption Assistance Program.
* Learn more about CA Technologies and this opportunity now at http://ca.com/careers
* We and all of our subsidiaries are equal opportunity employers.
* As such, it is our corporate policy to fill positions with qualified candidates regardless of the candidate’s race, color, sex, age, religion, ancestry, national origin, citizenship status, marital status, sexual orientation, gender identity, genetic information, disability, pregnancy, military status, veteran status or any other protected group status.
* Note to Recruiters and Placement Agencies*: We do not accept unsolicited agency resumes.
* Please do not forward unsolicited agency resumes to our website or to any of our employees.
* We will not pay fees to any third party agency or firm and will not be responsible for any agency fees associated with unsolicited resumes.
* Unsolicited resumes received will be considered our property and will be processed accordingly./
* If you require an accommodation with the online application process, please contact Talent Acquisition at 1

What Does A Securities Research Analyst Do At PARC, a Xerox Company

Formulating research problems based on real-world needs and independently conducting high-quality research

Show More

Show Less

How To Become A Securities Research Analyst

Most information security analyst positions require a bachelor’s degree in a computer-related field. Employers usually prefer analysts to have experience in a related occupation.


Information security analysts usually need at least a bachelor’s degree in computer science, programming, or a related field. As information security continues to develop as a career field, many schools are responding with information security programs for prospective job seekers. These programs may become a common path for entry into the occupation. Currently, a well-rounded computer education is preferred.

Employers of information security analysts sometimes prefer applicants who have a Master's of Business Administration (MBA) in information systems. Programs offering the MBA in information systems generally require 2 years of study beyond the undergraduate level and include both business and computer-related courses.

Work Experience in a Related Occupation

Information security analysts generally need to have previous experience in a related occupation. Many analysts have experience in an information technology department, often as a network or systems administrator. Some employers look for people who have already worked in fields related to the one in which they are hiring. For example, if the job opening is in database security, they may look for a database administrator. If they are hiring in systems security, a computer systems analyst may be an ideal candidate.

Licenses, Certifications, and Registrations

There are a number of information security certifications available, and many employers prefer job candidates to have one. Certification validates the knowledge and best practices required from information security analysts. Some are general information security certificates, such as the Certified Information Systems Security Professional, and others have a narrow focus, such as penetration testing or systems auditing.


Information security analysts can advance to become chief security officers or another type of computer and information systems manager.

Important Qualities

Analytical skills. Information security analysts must carefully study computer systems and networks and assess risks to determine how security policies and protocols can be improved.

Detail oriented. Because cyberattacks can be difficult to detect, information security analysts pay careful attention to their computer systems and watch for minor changes in performance.

Ingenuity. Information security analysts anticipate information security risks and implement new ways to protect their organizations’ computer systems and networks.

Problem-solving skills. Information security analysts respond to security alerts and uncover and fix flaws in computer systems and networks.

Show More

Show Less

Securities Research Analyst jobs

Add To My Jobs

Securities Research Analyst Demographics


  • Male

  • Female

  • Unknown



  • White

  • Asian

  • Hispanic or Latino

  • Unknown

  • Black or African American

Show More

Languages Spoken

  • Spanish

  • Arabic

  • Portuguese

  • German

  • Turkish

  • Hebrew

  • Japanese

  • Norwegian

  • Persian

  • Russian

  • Korean

Show More

Securities Research Analyst

Unfortunately we don’t have enough data for this section.

Securities Research Analyst Education

Securities Research Analyst

Unfortunately we don’t have enough data for this section.

Job type you want
Full Time
Part Time

Real Securities Research Analyst Salaries

Job Title Company Location Start Date Salary
Principal Security Researcher Blue Coat Systems Inc. Draper, UT Aug 27, 2016 $165,000
Principal Security Researcher Blue Coat Systems Inc. Draper, UT Jul 28, 2016 $165,000
Web Security Researcher Adobe Systems Incorporated San Francisco, CA Sep 29, 2016 $150,000
Security Researcher Alienvault, Inc. Austin, TX Sep 15, 2015 $150,000
Staff Email Security Researcher Fireeye, Inc. Milpitas, CA May 11, 2015 $148,000
Municipal Securities Research Analyst Zions Bank/ZMSC Salt Lake City, UT Aug 22, 2016 $145,165
Muni Securities Research Analyst Zions Bank/ZMSC Salt Lake City, UT Dec 10, 2015 $141,625
Security Researcher Websense, Inc. San Diego, CA Apr 01, 2014 $141,000
Security Researcher Adobe Systems Incorporated San Francisco, CA Dec 29, 2016 $140,005
Mortgage Backed Securities (MBS) Research Analyst Barclays Capital Inc. New York, NY Sep 08, 2015 $140,000 -
Staff Security Researcher Fireeye, Inc. Milpitas, CA Sep 15, 2016 $139,672 -
Security Researcher Intel Corporation Santa Clara, CA Apr 22, 2016 $133,453 -
Security Researcher Adobe Systems Incorporated San Francisco, CA Oct 15, 2013 $132,895
Security Researcher Netskope, Inc. Los Altos, CA Sep 17, 2016 $130,000 -
Security Researcher Adobe Systems Incorporated San Francisco, CA Sep 07, 2013 $103,000
Security Researcher Intel Corporation Hillsboro, OR Sep 09, 2016 $102,502 -
Security Researcher Intel Corporation Hillsboro, OR Mar 10, 2016 $102,502 -
Security Researcher Intel Corporation Hillsboro, OR Jul 10, 2016 $102,502 -
Security Researcher Intel Corporation Hillsboro, OR Apr 05, 2016 $102,502 -
Security Researcher Intel Corporation Hillsboro, OR Sep 12, 2015 $102,502 -
Security Researcher Intel Corporation Hillsboro, OR Jul 09, 2016 $102,502 -
Security Researcher Intel Corporation Englewood, CO Jan 26, 2016 $87,214 -
Security Researcher Intel Corporation Chandler, AZ Mar 01, 2014 $86,029 -
Security Researcher Intel Corporation Hillsboro, OR Nov 18, 2016 $84,594 -
Security Researcher Intel Corporation Hillsboro, OR Apr 27, 2015 $83,262 -
Security Researcher Intel Corporation Hillsboro, OR Mar 05, 2015 $83,262 -
Security Researcher Intel Corporation Hillsboro, OR Jun 01, 2015 $83,262 -
Security Researcher Intel Corporation Hillsboro, OR Mar 20, 2015 $83,262 -
Security Researcher Intel Corporation Hillsboro, OR Jan 10, 2015 $83,262 -

No Results

To get more results, try adjusting your search by changing your filters.

Show More

Top Skills for A Securities Research Analyst


Show More

Top Securities Research Analyst Skills

  1. Vulnerability
  2. Network Security
  3. SQL
You can check out examples of real life uses of top skills on resumes here:
  • Provided penetration testing and vulnerability assessments for clients requiring such testing for compliance or general best practice.
  • Project consulting in developing network security architecture.
  • Utilized SQL and/ or Excel to analyze and summarize data.
  • Created and managed virtual and physical networks of over 400 Windows, Unix, Firewall and Router systems2015-2016Activities
  • Support other Infrastructure Protection operational functions and activities.

Top Securities Research Analyst Employers