Career Details
Career Details
Back to top

Career Details

15-1212.00 - Information Security Analysts


Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. Assess system vulnerabilities for security risks and propose and implement risk mitigation strategies. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses.


Key Facts
Expand or Shrink Accordion
Bright Outlook
Career Details
Green Job
Career Details
Current Employment
N/A
Estimate
Forecasted Employment
N/A
Estimate
Change in Employment
N/A
Estimate
Change in Employment %
N/A
Estimate
Tasks
Expand or Shrink Accordion
Tasks
The tasks listed below can be performed to prepare you for a career in this field.
Core
  • Train users and promote security awareness to ensure system security and to improve server and network efficiency.
  • Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
  • Confer with users to discuss issues such as computer data access needs, security violations, and programming changes.
  • Monitor current reports of computer viruses to determine when to update virus protection systems.
  • Modify computer security files to incorporate new software, correct errors, or change individual access status.
  • Coordinate implementation of computer system plan with establishment personnel and outside vendors.
  • Monitor use of data files and regulate access to safeguard information in computer files.
  • Perform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures.
  • Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.
  • Document computer security and emergency measures policies, procedures, and tests.
  • Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated.
Supplemental
  • Maintain permanent fleet cryptologic and carry-on direct support systems required in special land, sea surface and subsurface operations.
All data sourced from US Department of Labor, Employment & Training Administration O*Net Database.
Knowledge
Expand or Shrink Accordion
Knowledge

The items listed below are organized into sections that contain knowledge useful for pursuing a career in this field. Each section also contains a "Percentage of Importance" statistic that shows how relevant an item is to the occupation.
 Computers and Electronics
  • 87%
    Knowledge of circuit boards, processors, chips, electronic equipment, and computer hardware and software, including applications and programming.
 English Language
  • 85%
    Knowledge of the structure and content of the English language including the meaning and spelling of words, rules of composition, and grammar.
 Administration and Management
  • 74%
    Knowledge of business and management principles involved in strategic planning, resource allocation, human resources modeling, leadership technique, production methods, and coordination of people and resources.
 Engineering and Technology
  • 73%
    Knowledge of the practical application of engineering science and technology. This includes applying principles, techniques, procedures, and equipment to the design and production of various goods and services.
 Telecommunications
  • 73%
    Knowledge of transmission, broadcasting, switching, control, and operation of telecommunications systems.
 Customer and Personal Service
  • 68%
    Knowledge of principles and processes for providing customer and personal services. This includes customer needs assessment, meeting quality standards for services, and evaluation of customer satisfaction.
 Public Safety and Security
  • 65%
    Knowledge of relevant equipment, policies, procedures, and strategies to promote effective local, state, or national security operations for the protection of people, data, property, and institutions.
 Education and Training
  • 64%
    Knowledge of principles and methods for curriculum and training design, teaching and instruction for individuals and groups, and the measurement of training effects.
 Mathematics
  • 57%
    Knowledge of arithmetic, algebra, geometry, calculus, statistics, and their applications.
 Communications and Media
  • 56%
    Knowledge of media production, communication, and dissemination techniques and methods. This includes alternative ways to inform and entertain via written, oral, and visual media.
 Law and Government
  • 54%
    Knowledge of laws, legal codes, court procedures, precedents, government regulations, executive orders, agency rules, and the democratic political process.
 Clerical
  • 54%
    Knowledge of administrative and clerical procedures and systems such as word processing, managing files and records, stenography and transcription, designing forms, and other office procedures and terminology.
All data sourced from US Department of Labor, Employment & Training Administration O*Net Database.
Tools
Expand or Shrink Accordion
Tools
The tools listed below include machines, equipment, tools, and software that is useful for individuals who are interested in this career.
 Electronic and communication measuring and testing instruments
  • Local area network LAN analyzers
  • Network analyzers
  • Protocol analyzers
 Computers
  • Notebook computers
  • Desktop computers
  • Mainframe computers
All data sourced from US Department of Labor, Employment & Training Administration O*Net Database.
Technology
Expand or Shrink Accordion
Technology
The technologies listed below include machines, equipment, tools, and software that is useful for individuals who are interested in this career.
 Business function specific software
  • Human resource management software HRMS
  • ConfluenceHOT
  • Microsoft ProjectHOT
  • Microsoft SharePointHOT
  • Microsoft Teams
  • Ansible softwareHOT
  • License management software
  • Microsoft OfficeHOT
 Finance accounting and enterprise resource planning ERP software
  • Microsoft DynamicsHOT
  • Oracle Fusion ApplicationsHOT
  • Oracle HyperionHOT
  • Oracle JD Edwards EnterpriseOneHOT
  • Oracle PeopleSoftHOT
  • Oracle PeopleSoft FinancialsHOT
  • SAPHOT
  • Delphi Technology
  • Oracle E-Business Suite Financials
 Content authoring and editing software
  • Adobe Systems Adobe Flash
  • Microsoft VisioHOT
  • 3M Post-it App
  • Microsoft WordHOT
  • Microsoft PowerPointHOT
  • Google Sites
  • Microsoft ExcelHOT
 Content management software
  • Atlassian JIRAHOT
  • Apache Subversion SVNHOT
  • GitHOT
  • WinMerge
 Data management and query software
  • Salesforce
  • Amazon DynamoDBHOT
  • Apache CassandraHOT
  • Apache HadoopHOT
  • Apache HiveHOT
  • Apache PigHOT
  • Apache SolrHOT
  • ElasticsearchHOT
  • MongoDBHOT
  • MySQLHOT
  • NoSQLHOT
  • Oracle PL/SQLHOT
  • Relational database management softwareHOT
  • Teradata DatabaseHOT
  • Microsoft SQL Server Reporting ServicesHOT
  • SAP Crystal ReportsHOT
  • Amazon Elastic Compute Cloud EC2HOT
  • Amazon RedshiftHOT
  • Amazon Web Services AWS softwareHOT
  • Blackboard software
  • Data entry softwareHOT
  • Microsoft AccessHOT
  • Microsoft SQL ServerHOT
  • Oracle JDBCHOT
  • Oracle softwareHOT
  • Structured query language SQLHOT
  • LexisNexis
  • PostgreSQLHOT
  • Apache HTTP ServerHOT
  • Customer information control system CICS
  • Apache SparkHOT
  • IBM Cognos ImpromptuHOT
  • MicroStrategyHOT
  • Oracle Business Intelligence Enterprise EditionHOT
  • Qlik Tech QlikViewHOT
  • TableauHOT
 Development software
  • Automated installation software
  • Chef
  • Patch and update management software
  • Perforce Helix software
  • PuppetHOT
  • VMWareHOT
  • Adobe Systems Adobe ActionScript
  • Apache AntHOT
  • Apache KafkaHOT
  • Apache Maven
  • C
  • Common business oriented language COBOLHOT
  • Eclipse IDEHOT
  • GoHOT
  • Integrated development environment IDE softwareHOT
  • Microsoft .NET FrameworkHOT
  • Microsoft AzureHOT
  • Microsoft PowerShellHOT
  • Microsoft Visual BasicHOT
  • Microsoft Visual Basic Scripting Edition VBScriptHOT
  • Microsoft Visual Basic for Applications VBAHOT
  • Microsoft Visual StudioHOT
  • National Instruments LabVIEWHOT
  • RubyHOT
  • Atlassian BambooHOT
  • Extensible markup language XMLHOT
  • IBM WebSphereHOT
  • Microsoft SQL Server Integration Services SSISHOT
  • Oracle Fusion MiddlewareHOT
  • Advanced business application programming ABAPHOT
  • Apache GroovyHOT
  • C#HOT
  • C++HOT
  • Objective CHOT
  • Oracle JavaHOT
  • Practical extraction and reporting language PerlHOT
  • PythonHOT
  • ScalaHOT
  • SwiftHOT
  • Conformance and validation testing software
  • Kali Linux
  • SeleniumHQ
  • System testing software
  • Unified modeling language UMLHOT
  • AJAXHOT
  • Apache StrutsHOT
  • Apache TomcatHOT
  • DjangoHOT
  • DrupalHOT
  • Enterprise JavaBeans
  • Extensible HyperText Markup Language XHTML
  • Google AngularJSHOT
  • Hypertext markup language HTMLHOT
  • JavaScriptHOT
  • JavaScript Object Notation JSONHOT
  • LAMP Stack
  • Microsoft ASP.NETHOT
  • Microsoft Active Server Pages ASPHOT
  • Node.jsHOT
  • Oracle JavaServer Pages JSPHOT
  • PHP: Hypertext PreprocessorHOT
  • Ruby on RailsHOT
  • Spring FrameworkHOT
 Industry specific software
  • SASHOT
  • The MathWorks MATLABHOT
  • Supervisory control and data acquisition SCADA softwareHOT
  • Epic SystemsHOT
  • Smart card management software
 Network applications software
  • DockerHOT
  • GitHubHOT
  • Oracle WebLogic ServerHOT
  • Red Hat OpenShiftHOT
  • Red Hat WildFlyHOT
  • Secure shell SSH software
  • Active directory software
  • Berkeley Internet Domain Name BIND
  • Domain name system DNS
  • Network directory services software
 Network management software
  • AccessData FTK
  • Automated audit trail analysis software
  • Automated media tracking software
  • Ethereal
  • Guidance Software EnCase Forensic
  • IBM QRadar SIEM
  • Integrity verification software
  • Keystroke monitoring software
  • Micro Focus OpenView
  • NagiosHOT
  • Network intrusion prevention systems NIPS
  • Network, hardware, and software auditing software
  • Oracle Net Manager
  • Quest BigBrother
  • Sniffer Investigator
  • Snort
  • Symantec Blue Coat Data Loss Prevention
  • Tcpdump
  • WiresharkHOT
  • Cisco Systems CiscoWorks
  • Voice over internet protocol VoiP system softwareHOT
 Networking software
  • Access management software
  • CitrixHOT
  • IBM Tivoli Access Management TAM
  • IBM Domino
  • Amazon Simple Storage Service S3HOT
  • Amazon Web Services AWS CloudFormationHOT
 Operating environment software
  • Computer forensic software
  • Apple macOSHOT
  • BashHOT
  • Hewlett Packard HP-UX
  • Job control language JCL
  • KornShell
  • LinuxHOT
  • Microsoft Hyper-V Server
  • Microsoft WindowsHOT
  • Microsoft Windows ServerHOT
  • Oracle SolarisHOT
  • Red Hat Enterprise LinuxHOT
  • Shell scriptHOT
  • UNIXHOT
  • UNIX ShellHOT
  • Ubuntu
 Security and protection software
  • Diameter
  • IBM Tivoli Identity Management TIM
  • Password management software
  • Remote authentication dial-in user service RADIUS software
  • HP Fortify
  • ISS RealSecure
  • Intrusion detection system IDS
  • Intrusion prevention system IPS
  • Network and system vulnerability assessment software
  • Network security auditing software
  • Qualys Cloud Platform
  • Security incident management software
  • Websense Data Loss Prevention
  • Cryptographic key management software
  • Firewall software
  • Imperva SecureSphere
  • IpFilter
  • IpTables
  • Juniper Networks NetScreen-Security Manager
  • Palo Alto Networks Next-Generation Security Platform
  • Trend Micro TippingPoint
  • Virtual private networking VPN softwareHOT
  • Anti-Trojan software
  • Anti-phishing software
  • Anti-spyware software
  • Check Point Next Generation Secure Web Gateway
  • End-to-end encryption software
  • HP WebInspect
  • Honeypot
  • Link encryption software
  • McAfee
  • McAfee VirusScan
  • Metasploit
  • Password cracker software
  • Penetration testing software
  • Ping Identity
  • Portswigger BurP Suite
  • Program checksumming software
  • Rapid7 Nexpose
  • Root kit detection software
  • Secure internet filtering software
  • Security risk assessment software
  • Stack smashing protection SSP software
  • SymantecHOT
  • Symantec Endpoint Protection
  • Symantec Norton Antivirus
  • Tenable Nessus
  • Virus scanning software
 Utility and device driver software
  • Backup and archival software
  • System and data disaster recovery software
  • Veritas NetBackup
 Information exchange software
  • IBM NotesHOT
  • Microsoft ExchangeHOT
  • Blink
  • ESRI ArcGIS softwareHOT
  • Geographic information system GIS softwareHOT
 System management software
  • ArcSight Enterprise Threat and Risk Management
  • IBM Power Systems software
  • Splunk EnterpriseHOT
All data sourced from US Department of Labor, Employment & Training Administration O*Net Database.
Certifications
Expand or Shrink Accordion
Certifications
The certifications listed below are useful to pursue if you are interested in a career in this field.
No specific certifications are listed for this career
All data sourced from US Department of Labor, Employment & Training Administration O*Net Database.
Licensing
Expand or Shrink Accordion
Licensing
The licensing information below is organized into sections and is useful for pursuing if you are interested in a career in this field.
No specific licensing information is listed for this occupation in the area you have selected.
All data sourced from US Department of Labor, Employment & Training Administration O*Net Database.
Related Programs
Expand or Shrink Accordion
Programs related to this career, offered by participating institution(s), are listed below.

Clicking on the Degree programs in the list below will take you away from the Careers page.
INSTITUTION
PROGRAMS
Peirce College
Jobs
Expand or Shrink Accordion
Jobs related to this career may be found on Indeed.com or on the Google Job Search page.