A Data and Security Analyst plays a vital role in keeping an organization’s proprietary and sensitive information secure. Their primary function is to work to ensure that computer networks and systems are protected from hackers and viruses. This involves planning, installing, and maintaining data security measures for specific networks or computer systems. They aim to protect data from corruption and prevent unauthorized access to digital assets. Analysts work within specific businesses or may operate as independent contractors or within computer services firms.
Salary Information:
10/ hour- project based
Key Responsibilities and Job Duties:
- Ensure computer networks and systems are protected from hackers and viruses.
- Plan, install, and maintain data security measures.
- Evaluate the security measures a company has in place to identify flaws and vulnerabilities.
- Suggest and help make changes to make systems more secure and efficient.
- Ensure antivirus software and other security programs are up to date and running properly.
- Monitor security access.
- Work with clients or internal teams to determine security risks.
- Develop a plan to protect data from corruption.
- Strategize ways to implement protection plans for computer systems or networks.
- Weed through metrics and data to filter out suspicious activity.
- Find and mitigate risks before breaches occur.
- Lead efforts to counter an attack if a breach does occur.
- Conduct security assessments through vulnerability testing and risk analysis.
- Perform both internal and external security audits.
- Analyze security breaches to identify the root cause.
- Generate reports for IT administrators and business managers to evaluate the efficacy of security policies.
- Create training programs and modules to educate employees and users on proper security protocols.
- Keep the company's security systems up to date.
- Create documentation and planning for all security-related information, including incident response and disaster recovery plans.
- Verify the security of third-party vendors and collaborate with them to meet security requirements.
Education:
- A Bachelor's degree is required.
- Relevant fields of study include computer science, information science, or information security.
- A Bachelor of Science in Information Security is described as a degree program tailored considerably to the profession.
- A 4-year Information Security degree typically provides a basic understanding of computer science, business administration, and privacy issues.
- Skills and knowledge are generally gained through classroom lectures and computer laboratory experiences.
Required Skills and Knowledge Areas:
Analysts need expertise in areas such as:
- Information security fundamentals.
- Structured systems analysis.
- Computer programming.
- Networking.
- Database management.
- Operating systems security.
- System software security.
- Telecommunications.
- Systems analysis.
- Cyber security.
- Firewalls.
- Information assurance.
- Linux and UNIX.
- Security Information and Event Management (SIEM).
- Application security.
- Security engineering.
- Security architecture.
- Ethical hacking, including penetration testing, to expose weak points and identify threats.
- Intrusion prevention to monitor network traffic and respond to threats.
- Incident response to manage the effects of attacks and alter controls for future prevention.
- Computer forensics for collecting, analyzing, and reporting data for crime prevention or creating evidence.
- Reverse engineering to understand software behavior, patch bugs, or analyze malware.
- Analysts must also keep up with the latest trends in cyber security.
Beyond technical skills, successful analysts are described as detail- oriented and having an analytical mindset. Interpersonal skills are also crucial for training staff and communicating with leadership.
Required Experience:
- Minimum of five years working as Information Security/Data Privacy Analyst
Certification:
- Certification is typically voluntary, not required.
- Cisco Information Security Specialist (CISS).
- The Global Information Assurance Certification (GIAC) offers credentials in areas like security administration, security management, software security, IT audit, and forensics.
- Other beneficial certifications include Certified Ethical Hacker (recognizes abilities to lawfully use hacker tools), CompTIA Network+ (validates network skills), CWAPT Certified Penetration Tester (certifies web application penetration testing skills), and Certified Reverse Engineering Analyst (validates malware analysis skills).
If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.
Senior ServiceNow Developer role at Fiserv leading strategic platform adoption and automated testing within a global fintech environment.
Contribute to Teleport’s secure access platform as an IT Automation & Security Engineer, leveraging Go, Kubernetes, and automation tools to safeguard and optimize modern infrastructure.
Experienced Data Visualization Specialist wanted at CACI to transform complex data into actionable, compelling visual stories supporting key mission objectives.
Seeking a skilled Programmer Analyst proficient in C#, SQL, and Python to join Stratas Foods' IT team to drive application development and data reporting solutions.
Serve as an Identity and Access Management Specialist I at OMES, supporting secure access administration and customer service for state IT resources.
Take on a key role at Renaissance as a Senior Salesforce CPQ Specialist to optimize and manage Salesforce CPQ+ solutions in a remote, full-time position.
Providing crucial IT support and issue resolution as a Help Desk Administrator, this role supports CCMR3’s mission to innovate in debt recovery while fostering a positive internal user experience.
Experienced Senior Microsoft Systems Engineer needed to design and implement an advanced Microsoft 365 infrastructure at Concentra.
Palo Alto Networks' Unit 42 is looking for an experienced MXSIAM SOC Engineer to drive innovation in cybersecurity detection and automation across global client environments.
Seeking a skilled SAP GTS Specialist to lead IMMEX compliance implementation in a fully remote, high-impact regulatory transformation project.
UMMS is looking for a Clinical Informaticist to lead and coordinate health informatics efforts across its multi-hospital system to improve clinical and operational outcomes.
INflow Federal seeks experienced transitioning military veterans to join as Cloud/DevOps Engineers, driving innovative defense infrastructure and AI-powered solutions.
Senior Analyst needed at Nationwide Financial to support and innovate business technology solutions through cross-team collaboration and data-driven decision making.
Subscribe to Rise newsletter