Career Details
Career Details
Back to top

Career Details

15-1212.00 - Information Security Analysts


Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. Assess system vulnerabilities for security risks and propose and implement risk mitigation strategies. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses.


Key Facts
Expand or Shrink Accordion
Bright Outlook
Career Details
Green Job
Career Details
Current Employment
N/A
Estimate
Forecasted Employment
N/A
Estimate
Change in Employment
N/A
Estimate
Change in Employment %
N/A
Estimate
Tasks
Expand or Shrink Accordion
Tasks
The tasks listed below can be performed to prepare you for a career in this field.
Core
  • Train users and promote security awareness to ensure system security and to improve server and network efficiency.
  • Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
  • Confer with users to discuss issues such as computer data access needs, security violations, and programming changes.
  • Monitor current reports of computer viruses to determine when to update virus protection systems.
  • Modify computer security files to incorporate new software, correct errors, or change individual access status.
  • Coordinate implementation of computer system plan with establishment personnel and outside vendors.
  • Monitor use of data files and regulate access to safeguard information in computer files.
  • Perform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures.
  • Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.
  • Document computer security and emergency measures policies, procedures, and tests.
  • Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated.
Supplemental
  • Maintain permanent fleet cryptologic and carry-on direct support systems required in special land, sea surface and subsurface operations.
All data sourced from US Department of Labor, Employment & Training Administration O*Net Database.
Knowledge
Expand or Shrink Accordion
Knowledge

The items listed below are organized into sections that contain knowledge useful for pursuing a career in this field. Each section also contains a "Percentage of Importance" statistic that shows how relevant an item is to the occupation.
 Computers and Electronics
  • 87%
    Knowledge of circuit boards, processors, chips, electronic equipment, and computer hardware and software, including applications and programming.
 English Language
  • 85%
    Knowledge of the structure and content of the English language including the meaning and spelling of words, rules of composition, and grammar.
 Administration and Management
  • 74%
    Knowledge of business and management principles involved in strategic planning, resource allocation, human resources modeling, leadership technique, production methods, and coordination of people and resources.
 Engineering and Technology
  • 73%
    Knowledge of the practical application of engineering science and technology. This includes applying principles, techniques, procedures, and equipment to the design and production of various goods and services.
 Telecommunications
  • 73%
    Knowledge of transmission, broadcasting, switching, control, and operation of telecommunications systems.
 Customer and Personal Service
  • 68%
    Knowledge of principles and processes for providing customer and personal services. This includes customer needs assessment, meeting quality standards for services, and evaluation of customer satisfaction.
 Public Safety and Security
  • 65%
    Knowledge of relevant equipment, policies, procedures, and strategies to promote effective local, state, or national security operations for the protection of people, data, property, and institutions.
 Education and Training
  • 64%
    Knowledge of principles and methods for curriculum and training design, teaching and instruction for individuals and groups, and the measurement of training effects.
 Mathematics
  • 57%
    Knowledge of arithmetic, algebra, geometry, calculus, statistics, and their applications.
 Communications and Media
  • 56%
    Knowledge of media production, communication, and dissemination techniques and methods. This includes alternative ways to inform and entertain via written, oral, and visual media.
 Law and Government
  • 54%
    Knowledge of laws, legal codes, court procedures, precedents, government regulations, executive orders, agency rules, and the democratic political process.
 Clerical
  • 54%
    Knowledge of administrative and clerical procedures and systems such as word processing, managing files and records, stenography and transcription, designing forms, and other office procedures and terminology.
All data sourced from US Department of Labor, Employment & Training Administration O*Net Database.
Tools
Expand or Shrink Accordion
Tools
The tools listed below include machines, equipment, tools, and software that is useful for individuals who are interested in this career.
 Computers
  • Desktop computers
  • Mainframe computers
  • Notebook computers
 Electronic and communication measuring and testing instruments
  • Local area network LAN analyzers
  • Network analyzers
  • Protocol analyzers
All data sourced from US Department of Labor, Employment & Training Administration O*Net Database.
Technology
Expand or Shrink Accordion
Technology
The technologies listed below include machines, equipment, tools, and software that is useful for individuals who are interested in this career.
 Content authoring and editing software
  • 3M Post-it App
  • Adobe Systems Adobe Flash
  • Google Sites
  • Microsoft ExcelHOT
  • Microsoft PowerPointHOT
  • Microsoft VisioHOT
  • Microsoft WordHOT
 Networking software
  • Access management software
  • Amazon Simple Storage Service S3HOT
  • Amazon Web Services AWS CloudFormationHOT
  • CitrixHOT
  • IBM Domino
  • IBM Tivoli Access Management TAM
 Network management software
  • AccessData FTK
  • Automated audit trail analysis software
  • Automated media tracking software
  • Cisco Systems CiscoWorks
  • Ethereal
  • Guidance Software EnCase Forensic
  • IBM QRadar SIEM
  • Integrity verification software
  • Keystroke monitoring software
  • Micro Focus OpenView
  • NagiosHOT
  • Network intrusion prevention systems NIPS
  • Network, hardware, and software auditing software
  • Oracle Net Manager
  • Quest BigBrother
  • Sniffer Investigator
  • Snort
  • Symantec Blue Coat Data Loss Prevention
  • Tcpdump
  • Voice over internet protocol VoiP system softwareHOT
  • WiresharkHOT
 Network applications software
  • Active directory software
  • Berkeley Internet Domain Name BIND
  • DockerHOT
  • Domain name system DNS
  • GitHubHOT
  • Network directory services software
  • Oracle WebLogic ServerHOT
  • Red Hat OpenShiftHOT
  • Red Hat WildFlyHOT
  • Secure shell SSH software
 Development software
  • Adobe Systems Adobe ActionScript
  • Advanced business application programming ABAPHOT
  • AJAXHOT
  • Apache AntHOT
  • Apache GroovyHOT
  • Apache KafkaHOT
  • Apache Maven
  • Apache StrutsHOT
  • Apache TomcatHOT
  • Atlassian BambooHOT
  • Automated installation software
  • C
  • C#HOT
  • C++HOT
  • Chef
  • Common business oriented language COBOLHOT
  • Conformance and validation testing software
  • DjangoHOT
  • DrupalHOT
  • Eclipse IDEHOT
  • Enterprise JavaBeans
  • Extensible HyperText Markup Language XHTML
  • Extensible markup language XMLHOT
  • GoHOT
  • Google AngularJSHOT
  • Hypertext markup language HTMLHOT
  • IBM WebSphereHOT
  • Integrated development environment IDE softwareHOT
  • JavaScriptHOT
  • JavaScript Object Notation JSONHOT
  • Kali Linux
  • LAMP Stack
  • Microsoft .NET FrameworkHOT
  • Microsoft Active Server Pages ASPHOT
  • Microsoft ASP.NETHOT
  • Microsoft AzureHOT
  • Microsoft PowerShellHOT
  • Microsoft SQL Server Integration Services SSISHOT
  • Microsoft Visual BasicHOT
  • Microsoft Visual Basic for Applications VBAHOT
  • Microsoft Visual Basic Scripting Edition VBScriptHOT
  • Microsoft Visual StudioHOT
  • National Instruments LabVIEWHOT
  • Node.jsHOT
  • Objective CHOT
  • Oracle Fusion MiddlewareHOT
  • Oracle JavaHOT
  • Oracle JavaServer Pages JSPHOT
  • Patch and update management software
  • Perforce Helix software
  • PHP: Hypertext PreprocessorHOT
  • Practical extraction and reporting language PerlHOT
  • PuppetHOT
  • PythonHOT
  • RubyHOT
  • Ruby on RailsHOT
  • ScalaHOT
  • SeleniumHQ
  • Spring FrameworkHOT
  • SwiftHOT
  • System testing software
  • Unified modeling language UMLHOT
  • VMWareHOT
 Data management and query software
  • Amazon DynamoDBHOT
  • Amazon Elastic Compute Cloud EC2HOT
  • Amazon RedshiftHOT
  • Amazon Web Services AWS softwareHOT
  • Apache CassandraHOT
  • Apache HadoopHOT
  • Apache HiveHOT
  • Apache HTTP ServerHOT
  • Apache PigHOT
  • Apache SolrHOT
  • Apache SparkHOT
  • Blackboard software
  • Customer information control system CICS
  • Data entry softwareHOT
  • ElasticsearchHOT
  • IBM Cognos ImpromptuHOT
  • LexisNexis
  • Microsoft AccessHOT
  • Microsoft SQL ServerHOT
  • Microsoft SQL Server Reporting ServicesHOT
  • MicroStrategyHOT
  • MongoDBHOT
  • MySQLHOT
  • NoSQLHOT
  • Oracle Business Intelligence Enterprise EditionHOT
  • Oracle JDBCHOT
  • Oracle PL/SQLHOT
  • Oracle softwareHOT
  • PostgreSQLHOT
  • Qlik Tech QlikViewHOT
  • Relational database management softwareHOT
  • Salesforce
  • SAP Crystal ReportsHOT
  • Structured query language SQLHOT
  • TableauHOT
  • Teradata DatabaseHOT
 Business function specific software
  • Ansible softwareHOT
  • ConfluenceHOT
  • Human resource management software HRMS
  • License management software
  • Microsoft OfficeHOT
  • Microsoft ProjectHOT
  • Microsoft SharePointHOT
  • Microsoft Teams
 Security and protection software
  • Anti-phishing software
  • Anti-spyware software
  • Anti-Trojan software
  • Check Point Next Generation Secure Web Gateway
  • Cryptographic key management software
  • Diameter
  • End-to-end encryption software
  • Firewall software
  • Honeypot
  • HP Fortify
  • HP WebInspect
  • IBM Tivoli Identity Management TIM
  • Imperva SecureSphere
  • Intrusion detection system IDS
  • Intrusion prevention system IPS
  • IpFilter
  • IpTables
  • ISS RealSecure
  • Juniper Networks NetScreen-Security Manager
  • Link encryption software
  • McAfee
  • McAfee VirusScan
  • Metasploit
  • Network and system vulnerability assessment software
  • Network security auditing software
  • Palo Alto Networks Next-Generation Security Platform
  • Password cracker software
  • Password management software
  • Penetration testing software
  • Ping Identity
  • Portswigger BurP Suite
  • Program checksumming software
  • Qualys Cloud Platform
  • Rapid7 Nexpose
  • Remote authentication dial-in user service RADIUS software
  • Root kit detection software
  • Secure internet filtering software
  • Security incident management software
  • Security risk assessment software
  • Stack smashing protection SSP software
  • SymantecHOT
  • Symantec Endpoint Protection
  • Symantec Norton Antivirus
  • Tenable Nessus
  • Trend Micro TippingPoint
  • Virtual private networking VPN softwareHOT
  • Virus scanning software
  • Websense Data Loss Prevention
 Content management software
  • Apache Subversion SVNHOT
  • Atlassian JIRAHOT
  • GitHOT
  • WinMerge
 Operating environment software
  • Apple macOSHOT
  • BashHOT
  • Computer forensic software
  • Hewlett Packard HP-UX
  • Job control language JCL
  • KornShell
  • LinuxHOT
  • Microsoft Hyper-V Server
  • Microsoft WindowsHOT
  • Microsoft Windows ServerHOT
  • Oracle SolarisHOT
  • Red Hat Enterprise LinuxHOT
  • Shell scriptHOT
  • Ubuntu
  • UNIXHOT
  • UNIX ShellHOT
 System management software
  • ArcSight Enterprise Threat and Risk Management
  • IBM Power Systems software
  • Splunk EnterpriseHOT
 Utility and device driver software
  • Backup and archival software
  • System and data disaster recovery software
  • Veritas NetBackup
 Information exchange software
  • Blink
  • ESRI ArcGIS softwareHOT
  • Geographic information system GIS softwareHOT
  • IBM NotesHOT
  • Microsoft ExchangeHOT
 Finance accounting and enterprise resource planning ERP software
  • Delphi Technology
  • Microsoft DynamicsHOT
  • Oracle E-Business Suite Financials
  • Oracle Fusion ApplicationsHOT
  • Oracle HyperionHOT
  • Oracle JD Edwards EnterpriseOneHOT
  • Oracle PeopleSoftHOT
  • Oracle PeopleSoft FinancialsHOT
  • SAPHOT
 Industry specific software
  • Epic SystemsHOT
  • SASHOT
  • Smart card management software
  • Supervisory control and data acquisition SCADA softwareHOT
  • The MathWorks MATLABHOT
All data sourced from US Department of Labor, Employment & Training Administration O*Net Database.
Certifications
Expand or Shrink Accordion
Certifications
FastForward at Virginia's Community Colleges is a short-term training program for high-demand industries, like healthcare, information technology, and skilled trades and infrastructure, helping Virginians get the jobs and salaries they need. Our goal is to get you trained, help you earn your certification, and get you into a career that can support you and your family. Explore the latest training program offerings by visiting FastForward
The certifications listed below are useful to pursue if you are interested in a career in this field.
No specific certifications are listed for this career
All data sourced from US Department of Labor, Employment & Training Administration O*Net Database.
Licensing
Expand or Shrink Accordion
Licensing
The licensing information below is organized into sections and is useful for pursuing if you are interested in a career in this field.
No specific licensing information is listed for this occupation in the area you have selected.
All data sourced from US Department of Labor, Employment & Training Administration O*Net Database.
Related Programs
Expand or Shrink Accordion
Programs related to this career, offered by participating institution(s), are listed below.

Clicking on the Degree programs in the list below will take you away from the Careers page.
INSTITUTION
PROGRAMS
Averett University
Bluefield University
Bridgewater College
Brightpoint Community College
Central Virginia Community College
Christopher Newport University
Danville Community College
Eastern Mennonite University
Emory & Henry University
Ferrum College
George Mason University
Germanna Community College
J Sargeant Reynolds Community College
James Madison University
Laurel Ridge Community College
Longwood University
Marymount University
Mountain Gateway Community College
New River Community College
Norfolk State University
Northern Virginia Community College
Old Dominion University
Paul D. Camp Community College
Piedmont Virginia Community College
Radford University
Randolph College
Randolph-Macon College
Regent University
Richard Bland College
Roanoke College
Shenandoah University
Southside Virginia Community College
Southwest Virginia Community College
The University of Virginia's College at Wise
Tidewater Community College
Virginia Highlands Community College
Virginia Peninsula Community College
Virginia Western Community College
William & Mary
Wytheville Community College