What You'll Do

  • Train users and promote security awareness to ensure system security and to improve server and network efficiency.
  • Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
  • Confer with users to discuss issues such as computer data access needs, security violations, and programming changes.
  • Monitor current reports of computer viruses to determine when to update virus protection systems.
  • Modify computer security files to incorporate new software, correct errors, or change individual access status.
  • Coordinate implementation of computer system plan with establishment personnel and outside vendors.
  • Monitor use of data files and regulate access to safeguard information in computer files.
  • Perform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures.
  • Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.
  • Document computer security and emergency measures policies, procedures, and tests.

Essential Skills

Reading Comprehension 4.0/5
Critical Thinking 3.88/5
Active Listening 3.75/5
Complex Problem Solving 3.75/5
Speaking 3.62/5
Writing 3.5/5
Monitoring 3.38/5
Judgment and Decision Making 3.38/5
Systems Analysis 3.38/5
Active Learning 3.25/5
Time Management 3.12/5
Coordination 3.0/5

Career Fit Overview

Use this summary to sense whether the day to day rhythm and focus of this path line up with what energizes you.

Top passions

  • Organizer: Bringing order to data and processes satisfies you.
  • Analyst: Investigating problems and finding patterns keeps you engaged.
  • Maker: Building and fixing energizes you. You like tangible results and practical tools.

Common styles

Attention to Detail, Dependability, Integrity, Analytical Thinking, Cooperation

Want a personal read on fit. Take the free assessment and see your exact compatibility with this career and many related roles.

Key Abilities

This career demands strong capabilities in the following areas:

Oral Comprehension 4.0/5
Written Comprehension 4.0/5
Problem Sensitivity 4.0/5
Deductive Reasoning 4.0/5
Inductive Reasoning 4.0/5
Written Expression 3.88/5
Information Ordering 3.88/5
Oral Expression 3.75/5

Technologies & Tools

3M Post-it App Access management software AccessData FTK Active directory software Adobe ActionScript Advanced business application programming ABAP AJAX Amazon DynamoDB Amazon Elastic Compute Cloud EC2 Amazon Redshift Amazon Simple Storage Service S3 Amazon Web Services AWS CloudFormation Amazon Web Services AWS software Ansible software Anti-phishing software Anti-spyware software Anti-Trojan software Apache Ant Apache Cassandra Apache Groovy

Work Environment & Style

Common Styles for This Career

  • Attention to Detail (High importance: 4.55/5)
  • Dependability (High importance: 4.53/5)
  • Integrity (High importance: 4.53/5)
  • Analytical Thinking (High importance: 4.44/5)
  • Cooperation (High importance: 4.28/5)

Want to see how YOUR work style matches this career?

Take Free 15-Min Assessment →

How to Become One

Most employers require a bachelor's degree in a relevant field. Some positions may also require experience through internships, co-ops, or entry-level work to strengthen your candidacy.

Similar Careers to Explore

Also Known As

This career is known by many different job titles across industries. Here are all the variations:

AI Security Specialist (Artificial Intelligence Security Specialist) All-Source Analyst Application Security Analyst Applications Security Analyst Automatic Data Processing Systems Security Specialist (ADP Systems Security) Blue Team Member Certified Information Systems Security Professional (CISSP) Cloud Security Architect Cloud Security Engineer Computer Security Coordinator Computer Security Information Specialist Computer Security Specialist Computer Systems Security Analyst Counterespionage Analyst Cryptological Technician Cryptologist Cyber Defense Analyst Cyber Defense Forensics Analyst Cyber Incident Responder Cyber Information Security Analyst Cyber Intel Planner Cyber Intelligence Specialist Cyber Operations Planner (Cyber Ops Planner) Cyber Operations Specialist Cyber Operator Cyber Policy and Strategy Planner Cyber Security Analyst Cyber Security Specialist Cyber Security Support Technician Cybersecurity All-Source Analyst Cybersecurity Analyst Cybersecurity Engineer Cybersecurity Exploitation Analyst Cybersecurity Multi-Disciplined Language Analyst Cybersecurity Partner Integration Planner Cybersecurity Specialist Cybersecurity Target Developer Cybersecurity Target Network Analyst Cybersecurity Threat Analyst Cybersecurity Warning Analyst Data Security Analyst Database Security Expert Exploitation Analyst Incident Responder Incident Response Analyst Industrial Internet of Things Security Specialist (IIoT Security Specialist) Information Assurance Analyst Information Security Analyst Information Security Officer Information Security Specialist Information Systems Security Analyst Information Systems Security Officer (ISSO) Information Systems Security Specialist Information Technology Analyst (IT Analyst) Information Technology Consultant (IT Consultant) Information Technology Security Analyst (IT Security Analyst) Information Technology Security Architect (IT Security Architect) International Affairs Specialist Internet of Things Security Specialist (IoT Security Specialist) Internet Security Specialist Intrusion Detection Analyst IT Auditor (Information Technology Auditor) IT Risk Specialist (Information Technology Risk Specialist) Mission Assessment Specialist Network Security Analyst Network Security Officer Network Security Systems Analyst Red Team Member Security Analyst Security Auditor Security Consultant Security Control Assessor Security Operations Analyst Security Operations Center Analyst (SOC Analyst) Security Specialist Source Code Auditor Supervisory Control and Data Acquisition Security Analyst (SCADA Security Analyst) Systems Analyst Systems Security Analyst Systems Security Specialist Technology Analyst Threat Hunter Threat Monitoring Analyst Virus Technician Warning Analyst