Information Security Analysts

rpa-concept-with-blurry-hand-touching-screen_1_1.webp
$112,000 Median Wage (2022)
16,800 Projected job openings (2022-2032)
31.50% Projected growth (2022-2032)

Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. Assess system vulnerabilities for security risks and propose and implement risk mitigation strategies. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses.

Experience Requirements Overview

  • Job Zone Four: Considerable Preparation Needed
  • A considerable amount of work-related skill, knowledge, or experience is needed for these occupations. For example, an accountant must complete four years of college and work for several years in accounting to be considered qualified.
  • Most of these occupations require a four-year bachelor's degree, but some do not.
  • Employees in these occupations usually need several years of work-related experience, on-the-job training, and/or vocational training.

Education, Training and Experience

Required Level of Education: Bachelor's Degree

Related Work Experience: Over 2 years, up to and including 4 years

On-Site or In-Plant Training: N.A.

On-the-Job Training: Over 6 months, up to and including 1 year

Detailed Work Activities

  • Train others in computer interface or software use.
  • Develop computer or information security policies or procedures.
  • Troubleshoot issues with computer applications or systems.
  • Collaborate with others to resolve information technology issues.
  • Update knowledge about emerging industry or technology trends.

Work Values

Achievement

Occupations that satisfy this work value are results oriented and allow employees to use their strongest abilities, giving them a feeling of accomplishment. Corresponding needs are Ability Utilization and Achievement.

Working Conditions

Recognition

Relationships

Support

Independence

Tasks

  • Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
  • Monitor current reports of computer viruses to determine when to update virus protection systems.
  • Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.
  • Perform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures.
  • Modify computer security files to incorporate new software, correct errors, or change individual access status.
  • Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated.
  • Document computer security and emergency measures policies, procedures, and tests.
  • Confer with users to discuss issues such as computer data access needs, security violations, and programming changes.
  • Monitor use of data files and regulate access to safeguard information in computer files.
  • Coordinate implementation of computer system plan with establishment personnel and outside vendors.
  • Train users and promote security awareness to ensure system security and to improve server and network efficiency.
  • Maintain permanent fleet cryptologic and carry-on direct support systems required in special land, sea surface and subsurface operations.

Work Styles

Achievement/Effort

Job requires establishing and maintaining personally challenging achievement goals and exerting effort toward mastering tasks.

Persistence

Initiative

Leadership

Cooperation

Concern for Others

Social Orientation

Self-Control

Stress Tolerance

Adaptability/Flexibility

Dependability

Attention to Detail

Integrity

Independence

Innovation

Analytical Thinking

Data Source: This page includes information from the O*NET 28.0 Database by the U.S. Department of Labor, Employment and Training Administration (USDOL/ETA). Used under the CC BY 4.0 license. O*NET® is a trademark of USDOL/ETA. This page includes Employment Projections program, Occupational Employment and Wage Statistics program, U.S. Bureau of Labor Statistics.