Adrian Varela 74314 The Career of an Information Security Analyst With the inevitable advancement of technology in today’s world, enhanced protection of information systems becomes imperative. Information security analysts strategize and perform security measures to protect an organization's or business’s computer networks and systems. An information security analyst defends an organization’s computer network from all cyber threats and security breaches by defense planning and responding to incidents accordingly. After engineers and security architects design and employ a network, analysts then evaluate and exam the system for threats. With the advancement and evolution of cybersecurity threats, it is necessary that information security analysts be able to respond swiftly. Contingent on experience and the level of one’s skill, responsibilities of an analyst may vary from supervising and monitoring private information to inspecting data that is compromised. Information security analysts are crucial to developing an organization's disaster recovery plan, a system of procedures that employees must follow if an emergency occurs. Included in this recovery plan are precautionary measures that IT employees must follow. For example, frequently copying and relocating data to a location that is offsite and involves plans to restore proper IT functioning after a disaster. Information Security Analysts frequently test the steps in their recovery plans to verify its effectiveness. They must also stay current on IT security and on the newest methods assailants are using to penetrate computer systems. Analysts oversee researching new security technology to determine what is the most effective way to defend their organization. Generally, information security analysts have a bachelor's degree in a computer-related program, such as information systems or computer science. However, practical experience and certifications from a similar field may be sufficient.1 Many employers favor applicants who have a Master of Business Administration (MBA) in their computer related field. These 1 Employers will accept certifications such as Cisco certified network associate and Cisco certified internetwork expert. programs normally require 2 years of study past the undergraduate level and include both business and computer-related courses. Information Security Analysts make an attractive salary. According to the Bureau of Labor and Statistics, the median annual wage for information security analysts was $95,510 in May 2017. The lowest 10 percent earned less than $55,560, and the highest 10 percent earned more than $153,090. For the most part, the majority of information security analysts work full time. They must always be on call outside of normal business hours in case of an emergency such as a cyberattack on their organization. Information security analysts have an appealing projected job growth in the IT field. Their employment is projected to grow 28 percent over the next ten years, much faster than the average for all occupations. The demand for information security analysts is projected to be extremely high. Cyberattacks have become a staple in today’s society, they have grown in frequency, and analysts will be required to be innovative and create solutions to prevent attackers from stealing critical information or creating complications for computer networks. It will be essential for financial institutions, banks, and other types of corporations, to increase their information security abilities in the wake of increasing cybersecurity threats. Also, as the healthcare industry continues to implement technology into the safeguarding of medical records, security analysts will be needed to protect citizens’ personal data. In conclusion, the salary, job growth, and skill set needed to be an information security analyst makes it a viable career choice. Page 2 of 3 Works Cited “Home : Occupational Outlook Handbook: Information Security Analysts.” U.S. Bureau of Labor Statistics, U.S. Bureau of Labor Statistics, 13 Apr. 2018, www.bls.gov/ooh/computer-and-information-technology/information-securityanalysts. Page 3 of 3