JOB TITLE: Information Security Analysts
OCCUPATION DESCRIPTION: Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. Assess system vulnerabilities for security risks and propose and implement risk mitigation strategies. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses.
RELATED JOB TITLES: Computer Security Specialist, Computer Specialist, Data Security Administrator, Information Security Analyst, Information Security Manager, Information Security Officer, Information Security Specialist, Information Systems Security Analyst, Information Technology Security Analyst, Information Technology Specialist
ONET: 15-1212.00
15-1122.00
15-1299.06 - Digital Forensics Analysts
Conduct investigations on computer-based crimes establishing documentary or physical evidence, such as digital media and logs associated with cyber intrusion incidents. Analyze digital evidence and investigate computer security incidents to derive information in support of system and network vulnerability mitigation. Preserve and present computer-related evidence in support of criminal, fraud, counterintelligence, or law enforcement investigations.
15-1299.05 - Information Security Engineers
Develop and oversee the implementation of information security procedures and policies. Build, maintain and upgrade security technology, such as firewalls, for the safe use of computer networks and the transmission and retrieval of information. Design and implement appropriate security controls to identify vulnerabilities and protect digital files and electronic infrastructures. Monitor and respond to computer security breaches, viruses, and intrusions, and perform forensic investigation. May oversee the assessment of information security systems.
15-1299.04 - Penetration Testers
Evaluate network system security by conducting simulated internal and external cyberattacks using adversary tools and techniques. Attempt to breach and exploit critical systems and gain access to sensitive information to assess system security.
Learn more about this and other career clusters, industries, occupations, jobs, careers paths, education, training, salaries, trends, outlooks, and related career exploration resources and tools on CareerOneStop's website.
** [ Ссылка ]
** [ Ссылка ]
** [ Ссылка ]
** [ Ссылка ]
** [ Ссылка ]
** [ Ссылка ]
Information Security Career Video
Теги
career videocareer videosoccupation videojob videolearn aboutcareerjob15-1122.00Information Security AnalystComputer Security SpecialistData Security AdministratorInformation Security ManagerInformation Security OfficerInformation Security SpecialistInformation Systems Security AnalystInformation Technology Security AnalystInformation Technology SpecialistSecurityComputerDataInformationSystemsITSpecialistAnalyst