Who Is An Information Security Analyst?

Information security analysts plan and carry out security measures to protect an organization?s computer networks and systems. Their responsibilities are continually expanding as the number of cyberattacks increases. Information security threats come in many different forms. Some of the most common threats today are software attacks, theft of intellectual property, identity theft, theft of equipment or information, sabotage, and information extortion. Most people have experienced software attacks of some sort. Viruses, worms, phishing attacks, and Trojan horses are a few common examples of software attacks. The theft of intellectual property has also been an extensive issue for many businesses in the information technology (IT) field. Identity theft is the attempt to act as someone else usually to obtain that person's personal information or to take advantage of their access to vital information through social engineering.

What Do They Do?

Information security analysts typically do the following:

Education

Information security analysts usually need at least a bachelor?s degree in computer science, information assurance, programming, or a related field. Some employers prefer applicants who have a Master of Business Administration (MBA) in information systems. Programs offering an MBA in information systems generally require 2 years of study beyond the undergraduate level and include both business and computer-related courses.

Eligibility

Information security analysts generally need to have previous experience in a related occupation. Many analysts have experience in an information technology department, often as a network or computer systems administrator. Some employers look for people who have already worked in fields related to the one in which they are hiring. For example, if the job opening is in database security, they may look for a database administrator. If they are hiring in systems security, a computer systems analyst may be an ideal candidate.

Scope

The demand for information security analysts is expected to be very high. Cyberattacks have grown in frequency, and analysts will be needed to come up with innovative solutions to prevent hackers from stealing critical information or creating problems for computer networks. Banks and financial institutions, as well as other types of corporations, will need to increase their information security capabilities in the face of growing cybersecurity threats. In addition, as the healthcare industry expands its use of electronic medical records, ensuring patients? privacy and protecting personal data are becoming more important. More information security analysts are likely to be needed to create the safeguards that will satisfy patients? concerns.

" />

Who Is An Information Security Analyst?

Information security analysts plan and carry out security measures to protect an organization?s computer networks and systems. Their responsibilities are continually expanding as the number of cyberattacks increases. Information security threats come in many different forms. Some of the most common threats today are software attacks, theft of intellectual property, identity theft, theft of equipment or information, sabotage, and information extortion. Most people have experienced software attacks of some sort. Viruses, worms, phishing attacks, and Trojan horses are a few common examples of software attacks. The theft of intellectual property has also been an extensive issue for many businesses in the information technology (IT) field. Identity theft is the attempt to act as someone else usually to obtain that person's personal information or to take advantage of their access to vital information through social engineering.

What Do They Do?

Information security analysts typically do the following:

Education

Information security analysts usually need at least a bachelor?s degree in computer science, information assurance, programming, or a related field. Some employers prefer applicants who have a Master of Business Administration (MBA) in information systems. Programs offering an MBA in information systems generally require 2 years of study beyond the undergraduate level and include both business and computer-related courses.

Eligibility

Information security analysts generally need to have previous experience in a related occupation. Many analysts have experience in an information technology department, often as a network or computer systems administrator. Some employers look for people who have already worked in fields related to the one in which they are hiring. For example, if the job opening is in database security, they may look for a database administrator. If they are hiring in systems security, a computer systems analyst may be an ideal candidate.

Scope

The demand for information security analysts is expected to be very high. Cyberattacks have grown in frequency, and analysts will be needed to come up with innovative solutions to prevent hackers from stealing critical information or creating problems for computer networks. Banks and financial institutions, as well as other types of corporations, will need to increase their information security capabilities in the face of growing cybersecurity threats. In addition, as the healthcare industry expands its use of electronic medical records, ensuring patients? privacy and protecting personal data are becoming more important. More information security analysts are likely to be needed to create the safeguards that will satisfy patients? concerns.

" />
First Community Portal for K-12