Category: 

What Does an Information Security Analyst Do?

Article Details
  • Written By: Page Coleman
  • Edited By: Allegra J. Lingo
  • Last Modified Date: 31 October 2014
  • Copyright Protected:
    2003-2014
    Conjecture Corporation
  • Print this Article
Free Widgets for your Site/Blog
The oldest known tortoise is 182 years old, and is believed by scientists to be the oldest living land creature.  more...

November 23 ,  1936 :  The modern version of "Life" magazine published its firs  more...

An information security analyst is an important team member in an Information Technology department. People in this position help organizations take measures to protect sensitive and mission-critical data. The analyst will help develop, implement, and ensure compliance of policies to protect an organization’s data from being inappropriately accessed or used.

Excellent technical skills are critical so that the information security analyst can discern and take measures to prevent data security attacks. These attacks may come from inside or outside the organization. The analyst may be included in planning for other threats to the organization's data, such as threats caused by severe weather, maintaining power to servers in case of a local outage, and planning for continuing operations at alternate sites in case the main operations site needs to be shut down.

Some common duties of a person in this position are to create plans to prevent malicious or inadvertent use of data, create plans for emergency use, train users on security measures, and monitor access to data. Along with these duties, the information analyst may also be tasked with reviewing information on viruses and ensuring virus protection is in place. They may be asked to assess risks of data exposure as well as validate that security systems are in place and working as designed. The analyst may serve as experts on application development project teams to ensure the application complies with the organization’s information security standards.

Ad

An information security analyst job description may include a need for expert knowledge in the systems technology used by the hiring organization. Some organizations may require a certain number of years of experience. Additional requirements that an organization may find desirable are a four-year degree in a technical field, network and system administration experience, and programming experience.

There are other skills helpful for information security analysts. Developing an ability to communicate with audiences of differing technical skills is valuable. When communicating security concerns to non-technical staff, the analyst must be able to make technical concepts understandable by a general audience. A good understanding of the organization’s business will help the analyst perform more effectively, as it is useful to understand which information is most critical to the organization’s mission and more likely to need protection.

Those who are interested in an information security analyst job must be willing to keep up on technology developments that affect the field of information security. Similarly, the analyst will need to keep abreast of trends in attacks such as viruses and hacker attacks. Moreover, information security legal requirements may change, and so the analyst must also stay abreast of regulatory requirements.

Ad

More from Wisegeek

You might also Like

Discuss this Article

Telsyst
Post 2

Obviously, spying and international espionage are not new practices, but the emergence of the internet has opened up a whole new threat to national security.

Entire subversive organizations dedicate themselves to hacking government sites, either to sell the information or, in some instances, to leak it to the press in an effort to better inform the public.

Glasis
Post 1

In the age of terrorism, many colleges and universities offer advanced degree or graduate certificate programs in several areas of homeland security, including information security.

Although these programs are generally geared toward learning to protect government and military information from hackers and other security threats, businesses that do highly specialized work could benefit from the skills of these graduates.

Post your comments

Post Anonymously

Login

username
password
forgot password?

Register

username
password
confirm
email