starweaver-logo
LOG INGET STARTED
LOG INGET STARTED
  • Browse
  • Doing

  • On Air
  • Channels
  • Career Paths
  • LEARNING

  • Courses
  • Certifications
  • Journeys
  • Test Prep
  • CONNECTING

  • How It Works
  • Community
  • Techbytes
  • Podcasts
  • Leaderboards
  • SUPPORT

  • Support & FAQs
  • Starweaver for Business
  • Starweaver for Campus
  • Teach with Starweaver
footer-brand-logo
  • COMPANY
  • About Us
  • Support and Knowledge Base
  • Policies & Terms
  • Contact
  • CONTENT
  • Courses
  • Certifications
  • Journeys
  • Test Prep
  • Meet the Gurus
  • Techbytes
  • FOR ORGANIZATIONS
  • Starweaver for Business
  • Starweaver for Campus
  • Catalogue
  • Pricing
  • Private Classes
  • PARTNER WITH US
  • Instructors & Teachers
  • Books, Writing & Publishing
  • FOLLOW US
    • facebook
    • twitter
    • linkedin
    • pinterest
    • instagram
    • youtube
Our trademarks include Starweaver®, Make genius happen™, Education you can bank on®, People are your most important assets!®, Body of Knowledge™, StarLabs™, LiveLabs™, Journeys™
© Starweaver Group, Inc. All Rights Reserved.
  1. Job Roles
  2. >
  3. Information Security Analysts

Information Security Analysts

What does a professional in this career do?

Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. Assess system vulnerabilities for security risks and propose and implement risk mitigation strategies. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses.

In this job you will...

  • Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
  • Monitor current reports of computer viruses to determine when to update virus protection systems.
  • Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.
  • Perform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures.
  • Modify computer security files to incorporate new software, correct errors, or change individual access status.
  • Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated.
  • Document computer security and emergency measures policies, procedures, and tests.
  • Confer with users to discuss issues such as computer data access needs, security violations, and programming changes.
  • Monitor use of data files and regulate access to safeguard information in computer files.
  • Coordinate implementation of computer system plan with establishment personnel and outside vendors.
  • Train users and promote security awareness to ensure system security and to improve server and network efficiency.

Skills You Will Gain

Computer viruses
Data Processing
Safeguard
Virus protection systems.

Representative Journeys

Foundations of Cybersecurity
Foundations of CybersecurityKevin Cardwell | Cybersecurity | 3 hrs and 30 mins

Launch Journey

analyzing-and-defending-networks-with-wireshark
Analyzing and Defending Networks with Wireshark
Kevin CardwellSkills: HackingTCP/IPWireshark

Journey Completed

Related roles

Information Technology Project Managers

Information Technology Project Managers

Network and Computer Systems Administrators

Network and Computer Systems Administrators

Information Security Engineers

Information Security Engineers

Computer Network Support Specialists

Computer Network Support Specialists

  • AI Security Specialist (Artificial Intelligence Security Specialist)
  • All-Source Analyst
  • Application Security Analyst
  • Applications Security Analyst
  • Automatic Data Processing Systems Security Specialist (ADP Systems Security)
  • Blue Team Member
  • Certified Information Systems Security Professional (CISSP)
  • Cloud Security Architect
  • Cloud Security Engineer
  • Computer Security Coordinator
  • Computer Security Information Specialist
  • Computer Security Specialist
  • Computer Systems Security Analyst
  • Counterespionage Analyst
  • Cryptological Technician
  • Cryptologist
  • Cyber Defense Analyst
  • Cyber Defense Forensics Analyst
  • Cyber Incident Responder
  • Cyber Information Security Analyst
  • Cyber Intel Planner
  • Cyber Intelligence Specialist
  • Cyber Operations Planner (Cyber Ops Planner)
  • Cyber Operations Specialist
  • Cyber Operator
  • Cyber Policy and Strategy Planner
  • Cyber Security Analyst
  • Cyber Security Specialist
  • Cyber Security Support Technician
  • Cybersecurity All-Source Analyst
  • Cybersecurity Analyst
  • Cybersecurity Engineer
  • Cybersecurity Exploitation Analyst
  • Cybersecurity Multi-Disciplined Language Analyst
  • Cybersecurity Partner Integration Planner
  • Cybersecurity Specialist
  • Cybersecurity Target Developer
  • Cybersecurity Target Network Analyst
  • Cybersecurity Threat Analyst
  • Cybersecurity Warning Analyst
  • Data Security Analyst
  • Database Security Expert
  • Exploitation Analyst
  • Incident Responder
  • Industrial Internet of Things Security Specialist (IIoT Security Specialist)
  • Information Assurance Analyst
  • Information Security Analyst
  • Information Security Officer
  • Information Security Specialist
  • Information Systems Security Analyst
  • Information Systems Security Officer (ISSO)
  • Information Systems Security Specialist
  • Information Technology Analyst (IT Analyst)
  • Information Technology Consultant (IT Consultant)
  • Information Technology Security Analyst (IT Security Analyst)
  • Information Technology Security Architect (IT Security Architect)
  • International Affairs Specialist
  • Internet of Things Security Specialist (IoT Security Specialist)
  • Internet Security Specialist
  • Intrusion Detection Analyst
  • IT Auditor (Information Technology Auditor)
  • IT Risk Specialist (Information Technology Risk Specialist)
  • Mission Assessment Specialist
  • Network Security Analyst
  • Network Security Officer
  • Network Security Systems Analyst
  • Red Team Member
  • Security Analyst
  • Security Auditor
  • Security Consultant
  • Security Operations Analyst
  • Security Operations Center Analyst (SOC Analyst)
  • Security Specialist
  • Source Code Auditor
  • Supervisory Control and Data Acquisition Security Analyst (SCADA Security Analyst)
  • Systems Analyst
  • Systems Security Analyst
  • Systems Security Specialist
  • Technology Analyst
  • Threat Hunter
  • Threat Monitoring Analyst
  • Virus Technician
  • Warning Analyst

SOME OF THE INSTRUCTORS AND EXPERTS SUPPORTING YOU ON THESE JOURNEYS

Analyzing and Defending Networks with Wireshark

Analyzing and Defending Networks with Wireshark