InfoSec Analyst: Safeguarding Digital Assets Jobs

Also called: All-Source Analyst, Automatic Data Processing Systems Security Specialist (ADP Systems Security), Certified Information Systems Security Professional (CISSP), Computer Security Coordinator, Computer Security Information Specialist

InfoSec Analyst: Safeguarding Digital Assets Jobs


estimated salary

Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. Assess system vulnerabilities for security risks and propose and implement risk mitigation strategies. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses.





  • Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
  • Monitor current reports of computer viruses to determine when to update virus protection systems.
  • Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.
  • Perform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures.
  • Modify computer security files to incorporate new software, correct errors, or change individual access status.
  • Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated.
  • Document computer security and emergency measures policies, procedures, and tests.
  • Confer with users to discuss issues such as computer data access needs, security violations, and programming changes.
  • Monitor use of data files and regulate access to safeguard information in computer files.
  • Coordinate implementation of computer system plan with establishment personnel and outside vendors.
  • Train users and promote security awareness to ensure system security and to improve server and network efficiency.
  • Maintain permanent fleet cryptologic and carry-on direct support systems required in special land, sea surface and subsurface operations.
Work Context
  • Electronic Mail — 98% responded "Every day".
  • Indoors, Environmentally Controlled — 89% responded "Every day".
  • Telephone — 66% responded "Every day".
  • Face-to-Face Discussions — 64% responded "Every day".
  • Contact With Others — 47% responded "Constant contact with others".
  • Spend Time Sitting — 48% responded "More than half the time".
  • Work With Work Group or Team — 46% responded "Extremely important".
  • Read More
Work Activities
  • Interacting With Computers — Using computers and computer systems (including hardware and software) to program, write software, set up functions, enter data, or process information.
  • Getting Information — Observing, receiving, and otherwise obtaining information from all relevant sources.
  • Identifying Objects, Actions, and Events — Identifying information by categorizing, estimating, recognizing differences or similarities, and detecting changes in circumstances or events.
  • Evaluating Information to Determine Compliance with Standards — Using relevant information and individual judgment to determine whether events or processes comply with laws, regulations, or standards.
  • Processing Information — Compiling, coding, categorizing, calculating, tabulating, auditing, or verifying information or data.
  • Analyzing Data or Information — Identifying the underlying principles, reasons, or facts of information by breaking down information or data into separate parts.
  • Updating and Using Relevant Knowledge — Keeping up-to-date technically and applying new knowledge to your job.
  • Documenting/Recording Information — Entering, transcribing, recording, storing, or maintaining information in written or electronic/magnetic form.
  • Read More
Detailed Work Activities
  • Train others in computer interface or software use.
  • Develop computer or information security policies or procedures.
  • Troubleshoot issues with computer applications or systems.
  • Collaborate with others to resolve information technology issues.
  • Update knowledge about emerging industry or technology trends.
  • Implement security measures for computer or information systems.
  • Read More


Computers and Electronics
  • Knowledge of circuit boards, processors, chips, electronic equipment, and computer hardware and software, including applications and programming.
English Language
  • Knowledge of the structure and content of the English language including the meaning and spelling of words, rules of composition, and grammar.
Administration and Management
  • Knowledge of business and management principles involved in strategic planning, resource allocation, human resources modeling, leadership technique, production methods, and coordination of people and resources.
Read More


Reading Comprehension
  • Understanding written sentences and paragraphs in work related documents.
Critical Thinking
  • Using logic and reasoning to identify the strengths and weaknesses of alternative solutions, conclusions or approaches to problems.
Active Listening
  • Giving full attention to what other people are saying, taking time to understand the points being made, asking questions as appropriate, and not interrupting at inappropriate times.
Complex Problem Solving
  • Identifying complex problems and reviewing related information to develop and evaluate options and implement solutions.
Read More


Oral Comprehension
  • The ability to listen to and understand information and ideas presented through spoken words and sentences.
Inductive Reasoning
  • The ability to combine pieces of information to form general rules or conclusions (includes finding a relationship among seemingly unrelated events).
Deductive Reasoning
  • The ability to apply general rules to specific problems to produce answers that make sense.
Problem Sensitivity
  • The ability to tell when something is wrong or is likely to go wrong. It does not involve solving the problem, only recognizing there is a problem.
Read More


People interested in this work like activities that include ideas, thinking, and figuring things out.
They do well at jobs that need:
  • Achievement/Effort
  • Persistence
  • Initiative
  • Leadership
  • Cooperation
  • Concern for Others
  • Social Orientation
  • Self Control
Read More


You might use software like this on the job:

Enterprise application integration software
  • Oracle Fusion Middleware Hot Technology
  • Microsoft SQL Server Integration Services SSIS Hot Technology
  • IBM WebSphere Hot Technology
  • Extensible markup language XML Hot Technology
  • Atlassian Bamboo Hot Technology
Operating system software
  • Microsoft Windows Server Hot Technology
  • Microsoft Windows Hot Technology
  • Linux Hot Technology
  • Shell script Hot Technology
  • UNIX Shell Hot Technology
  • UNIX Hot Technology
  • Oracle Solaris Hot Technology
  • Red Hat Enterprise Linux Hot Technology
  • Apple macOS Hot Technology
  • Bash Hot Technology
  • Ubuntu
  • Job control language JCL
  • KornShell
  • Hewlett Packard HP-UX
  • Microsoft Hyper-V Server
Development environment software
  • Microsoft Visual Studio Hot Technology
  • Microsoft Visual Basic Scripting Edition VBScript Hot Technology
  • Microsoft Visual Basic for Applications VBA Hot Technology
  • Microsoft Visual Basic Hot Technology
  • National Instruments LabVIEW Hot Technology
  • Microsoft .NET Framework Hot Technology
  • Integrated development environment IDE software Hot Technology
  • Microsoft PowerShell Hot Technology
  • Microsoft Azure Hot Technology
  • Ruby Hot Technology
  • Apache Kafka Hot Technology
  • Go Hot Technology
  • Apache Ant Hot Technology
  • Common business oriented language COBOL Hot Technology
  • Eclipse IDE Hot Technology
  • Apache Maven
  • Adobe Systems Adobe ActionScript
  • C
Read More