Uploaded by Varela Adrian

TechEssay

advertisement
Adrian Varela 74314
The Career of an Information Security Analyst
With the inevitable advancement of technology in today’s world, enhanced protection of
information systems becomes imperative. Information security analysts strategize and
perform security measures to protect an organization's or business’s computer networks
and systems. An information security analyst defends an organization’s computer network
from all cyber threats and security breaches by defense planning and responding to
incidents accordingly. After engineers and security architects design and employ a network,
analysts then evaluate and exam the system for threats. With the advancement and
evolution of cybersecurity threats, it is necessary that information security analysts be able
to respond swiftly. Contingent on experience and the level of one’s skill, responsibilities of
an analyst may vary from supervising and monitoring private information to inspecting data
that is compromised. Information security analysts are crucial to developing an
organization's disaster recovery plan, a system of procedures that employees must follow if
an emergency occurs. Included in this recovery plan are precautionary measures that IT
employees must follow. For example, frequently copying and relocating data to a location
that is offsite and involves plans to restore proper IT functioning after a disaster.
Information Security Analysts frequently test the steps in their recovery plans to verify its
effectiveness. They must also stay current on IT security and on the newest methods
assailants are using to penetrate computer systems. Analysts oversee researching new
security technology to determine what is the most effective way to defend their
organization.
Generally, information security analysts have a bachelor's degree in a computer-related
program, such as information systems or computer science. However, practical experience
and certifications from a similar field may be sufficient.1 Many employers favor applicants
who have a Master of Business Administration (MBA) in their computer related field. These
1
Employers will accept certifications such as Cisco certified network associate and Cisco certified internetwork
expert.
programs normally require 2 years of study past the undergraduate level and include both
business and computer-related courses.
Information Security Analysts make an attractive salary. According to the Bureau of Labor
and Statistics, the median annual wage for information security analysts was $95,510 in
May 2017. The lowest 10 percent earned less than $55,560, and the highest 10 percent
earned more than $153,090. For the most part, the majority of information security analysts
work full time. They must always be on call outside of normal business hours in case of an
emergency such as a cyberattack on their organization.
Information security analysts have an appealing projected job growth in the IT field. Their
employment is projected to grow 28 percent over the next ten years, much faster than the
average for all occupations. The demand for information security analysts is projected to be
extremely high. Cyberattacks have become a staple in today’s society, they have grown in
frequency, and analysts will be required to be innovative and create solutions to prevent
attackers from stealing critical information or creating complications for computer
networks. It will be essential for financial institutions, banks, and other types of
corporations, to increase their information security abilities in the wake of increasing
cybersecurity threats. Also, as the healthcare industry continues to implement technology
into the safeguarding of medical records, security analysts will be needed to protect
citizens’ personal data. In conclusion, the salary, job growth, and skill set needed to be an
information security analyst makes it a viable career choice.
Page 2 of 3
Works Cited
“Home : Occupational Outlook Handbook: Information Security Analysts.” U.S. Bureau of
Labor Statistics, U.S. Bureau of Labor Statistics, 13 Apr. 2018,
www.bls.gov/ooh/computer-and-information-technology/information-securityanalysts.
Page 3 of 3
Download