Develop and implement defensive measures to protect computer networks and systems. Information security analysts watch over companies’ computer networks in order to identify any breaches. When a breach occurs, they investigate the intrusion, install firewalls and/or encryption criteria to prevent similar violations from occurring in the future, and prepare a report documenting the issue and the damage caused. In order to minimize these situations, they utilize penetration tests to simulate attacks and seek out weaknesses in security.
Because the field of information technology (IT) is constantly changing, security analysts must continually research new developments to stay up to date on resources and trends. They use this knowledge to form security and best practice standards, advise management personnel on potential security modifications, and contribute to the company’s disaster recovery plan.
Citizens Bank
-
Johnston, RI
Description The IT Security Professional within the Corporate Security and Resilience (CS&R) Identity and Access Management (IAM) team is an experienced security professional providing 2nd level...
|
3 days ago
|
Exa Data Inc.
-
Chicago, IL
Job Description: 5-7 years of experience working as a Computer Incident Response Team (CIRT), Computer Emergency Response Team (CERT), Computer Security Incident Response Center (CSIRC) or a...
|
3 days ago
|
Midland, MI
systems design, and application coding/scripting....
|
3 days ago
|
United States District Court - Western District of Wisconsin
-
Madison, WI
Job The Western District of Wisconsin is seeking a talented IT Security Officer to serve the Bankruptcy and District Courts as well as the Probation and Pretrial Services office. The successful...
|
3 days ago
|
Sunshine State Health Plan, INC.
-
Washington, DC
The Information Security Analyst reports to CAQH Director of Information Security; the position is full time, exempt....
|
3 days ago
|
Conduent
-
Cary, NC
Conduent is proud to offer comprehensive and competitive benefits that reflect the value of our employees. Benefits will differ by country, please contact your recruiter for details specific to...
|
3 days ago
|
CSRA, Inc.
-
Bossier City, LA
Intermediate knowledge of NextGen Security Products such as Fortinet Knowledge of various network vulnerability scanning platforms (Qualys, Nessus, etc.)...
|
3 days ago
|
Sherwin-Williams
-
Cleveland, OH
Understanding of various operating systems (z/OS, Window, UNIX, Linux, AIX, etc.) with an emphasis on vulnerability assessment and hardening....
|
3 days ago
|
CSAA Insurance Group, a AAA Insurer
-
Chicago, IL
Identity and Access Management Information Security Consultant (Phoeni Are you a highly skilled Information Security professional that has a passion for Security within a DevOps world? Use your...
|
3 days ago
|
CSAA Insurance Group, a AAA Insurer
-
New York City, NY
Identity and Access Management Information Security Consultant (Phoeni Are you a highly skilled Information Security professional that has a passion for Security within a DevOps world? Use your...
|
3 days ago
|
CSAA Insurance Group, a AAA Insurer
-
Walnut Creek, CA
Identity and Access Management Information Security Consultant (Phoeni Location: Washington Are you a highly skilled Information Security professional that has a passion for Security within a...
|
3 days ago
|
Alpha Net Consulting LLC
-
Menlo Park, CA
Science, Statistics, Math, Engineering, Business, and 2+ years of work experience in the field Balance attention to detail with swift execution - we need to do things quickly, and we need to do them...
|
3 days ago
|
General Dynamics Information Technology
-
Whiteman Air Force Base, MO
Job Description GDIT has the opportunity for an Information Systems Security Officer (ISSO) to support the Defense Health Agency (DHA) Desktop to Data Center program. Positions are based both US...
|
3 days ago
|
Digital Age Experts
-
Washington, DC
. * Department of Defense Secret Security Clearance required * Certification in IT security, such as Certified Information Systems Security Professional (CISSP) or CompTIA Security+. * Cisco certifications...
|
3 days ago
|
Jda Professional Services Incorporated
-
Houston, TX
science or relevant field....
|
3 days ago
|
This course provides a one-semester overview of information security. It is designed to help students with
prior computer and programming knowledge — both undergraduate and...
Users interested in this job title also searched for the following job title
Required or preferred licenses and certifications for Information Security Analyst positions.
The following top skills are often required or desired to land a Information Security Analyst position
= trendingHere are some other career titles that require similar skills
Top hiring companies for Information Security Analyst positions
Want to learn more about technology jobs? Wondering how to become a developer? Check out our guide to top IT jobs and computer science careers.
As the hot field nationwide, technology is drawing in new people from all stages in their careers. If you’re interested in breaking into the industry, this simple four-step guide is for you.