Information Security Analyst Essay

Improved Essays
The education that is required to become an Information Security Analyst is a Bachelor’s degree in computer science, or a related field, also a MBA is preferred, in business management. The salary is about 86,000$ a year on the median, or about 41.43$ an hour. One the job responsibilities are the fact that you must monitor the network to make sure that there is no data breaches, know how to use firewalls, and encryption. Do penetration testing which is basically testing a network for vulnerabilities, and how to patch the vulnerabilities that occur in the network, and also knowing current security issues and how to address them. Being analytical is important, also detail oriented, ingenuity, and problem solving skills is an extremely important …show more content…
You need to know current networking knowledge, for example what is the current speed for backbone connectivity, which would be 40GBP for a larger company, end to end. Also you need to know how to correctly implement VLAN 's, firewalls, Access control lists, and more. There is a lot of content knowledge that you must know to do the job correctly.
I feel that I would be I would still need to get some more certifications, and experience before I 'm ready for most of these jobs. Since when you start out you typically don 't get the highest responsibility, and highest paying jobs out there, just how it works. I need to work at gaining experience in the field, that is really the best way to get where I would like to go, and the options are basically unlimited. Although I would enjoy becoming a Information Security Analyst since it a very interesting job. There is a lot of work to do before, I become any of these

Related Documents

  • Improved Essays

    In 1776 the founding fathers signed the Declaration of Independence to free themselves from the tyrant King George of Great Britain. This caused a war of independence that freed the people of the United States from an unfair government, but left them in need of leadership. After several failed attempts the leaders of the new nation formed a government that would be free from tyranny. The Founders wrote the constitution to limit the powers of the government to insure that the government would not create a new tyrant.…

    • 551 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Patriot Act Dbq Essay

    • 431 Words
    • 2 Pages

    An act where the government can provide higher security for our country. An act that further protects Americans. The Patriot act strengthens and improves America by providing the appropriate tools to intercept terrorism in America. Providing America with the maximum security and doing everything to protect us from events such as 9/11 from happening again, is the governments goal with placing the Patriot Act.…

    • 431 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Their duties could consist of containment of the substance and then decontamination. Information analysis and infrastructure protection assist in the obtaining and analysis of intel or information, while infrastructure protection has to do with government buildings, utility companies, and banking institutions among other structures. Their role could consist of having contingencies in place when something catastrophic happens to any structure. Alternative structures would be assigned and made available to keep those parts of our country running and accessible. All these entities are part of the Department of Homeland Security, which is there to protect the citizens of the United States of…

    • 425 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Do you as an American citizen ever feel like you are trapped in George Orwell’s 1984 society? Do you ever feel like the government is watching your every move, molding you into the “perfect” citizens? If so, you have the Patriot Act to thank. The United States Patriot Act is an Act set by Congress, signed by former President George W. Bush, following the terrorist attacks of September 11, 2001, as well as the 2001 anthrax attacks. The Patriot Act is actually an acronym, standing for “Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001.”…

    • 2111 Words
    • 9 Pages
    Great Essays
  • Improved Essays

    Three careers that would be well suited for me are a cost estimator, an operations research analyst, and a conservation officer. Two of these careers involve quantitative thinking and mathematical skills, while the third career involves enforcing laws and regulations and working outdoors. Due to my interest in working outdoors I have chosen conservation officer as the best career opportunity for me. The first job I researched is a cost estimator. I researched this job because it involves mathematical skills on a daily basis.…

    • 1035 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    The Patriot Act Essay

    • 769 Words
    • 4 Pages

    Immediately after the September 11, 2001 attacks, President George Bush was able to push one of the most controversial acts through Congress. This act is called the U.S.A. P.A.T.R.I.O.T Act; which stands for “Uniting and Strengthening American by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism.” This act focused on giving “...federal officials greater authority to track and intercept communications, both for law enforcement and foreign intelligence-gathering purposes...” (Oliver, 2007, p. 68). Of course, a major concern then (and to this day) is that it impedes on civil liberties.…

    • 769 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    On March 12, 2002 President George W. Bush signed Homeland Security Presidential Directive-3, calling for the creation of the Homeland Security Advisory System (HSAS) and was formally implemented in July, 2002 ( ,2003). This new standardized system outlined the basic vocabulary and framework for assessing the risk of terrorist threats for the entire nation. More importantly, it was a way to more effectively communicate terrorist threats with all levels of the government, private sector, and the general public. The system was based on a hierarchal color-coded system comprised of five categories that ranked the likelihood of a terrorist attack. Ranked from lowest to highest, the color-coded system was green, blue, yellow, orange and red.…

    • 477 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Patriot Act Essay

    • 1113 Words
    • 5 Pages

    The purpose of the creation of the patriot act was after a tragic event in the United States history. After the terrorist attack during the 11 September 2001, the government established the patriot act. This act was created to help protect the people by providing higher security measures for anything related to terrorism. It is questionable if this act is ethical based on how the government using the patriot act to prevent terrorism.…

    • 1113 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Just a few days after the terrorist attacks on September 11, 2001 in New York City and in Washington D.C., Pennsylvania State Governor Tom Ridge was appointed to be the first director of the Office of Homeland Security. This office overlooked and regulated a nationally seen strategy to keep our country safe against domestic and international terrorism attacks. The Department of Homeland Security was put in place to ensure that we are safe no matter time of the day or the year. President George W. Bush signed the Homeland Security Act of 2002 on November 25, 2002.…

    • 1013 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Almost a month after students and faculty at UCF were notified about a security breach causing 63,000 Social Security numbers to be stolen, Hack@UCF is offering advice on identity theft protection and mitigation. Their meetings are every Friday at 4:30 p.m. in Engineering 2 Room 102 at UCF’s Main Campus. Hack@UCF has stated that they will host a Town Hall meeting in cooperation with UCF on identity theft protection and mitigation. A date has yet to set.…

    • 808 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    The ‘security argument’ In politically unstable and volatile regions such as Africa, RI can - according to political scientists, - improve the national and regional security situation. (Peters-Berries, 2010) They contend that  In areas of the world where states are not (yet) fully integrated and consolidated or where ‘failed’ states exist, the probability of armed conflicts is high. The potential for conflict can be greatly reduced through RI schemes which also incorporate such ‘soft’ or even ‘failed’ states.…

    • 220 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    On September 11, 2001, there we nineteen individuals who are members of a terrorist group called Al-Qaeda; they hijacked four of United States airplanes and they used them to attack various targets on the East Coast (Pressler, 2011). Two out of the four hijacked airplanes were flown into the World Trade Center in New York City; the third plane hit the Pentagon that lies just outside of Washington D.C.; and the fourth plane crashed in Pennsylvania. There were over three thousand people who were killed on September 11th by the four hijacked airplanes. Al-Qaeda? Who Are They?…

    • 1835 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    7/A. P2: Explain the principles of information security when protecting the IT systems of organizations 7/A. P3: Explain why organization must adhere to legal requirements when considering IT system Security. 7/AB. D1: Evaluate the effectiveness of the technique used to protect organisations from security threats whilst taking account of the principles of information security and legal requirements. Principles of information security…

    • 1392 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Today’s internet has become an integral part of our daily lives. It changed the world in so many positive ways, but it has also a negative side to it. The negative issues that we are facing today with internet are our online privacy and data breaches. Recently, many people were divided in terms of their strong views about the importance of privacy and the exchange “between security needs and personal privacy” (Rainie & Maniam, 2016) as millions of Americans were also affected by online threats and privacy breaches and at the same time concerned with our security. The focus has been on government monitoring, although there are some other significant issues and concerns about how industries use our data.…

    • 952 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    You need to acquire a degree for cyber security. This degree is a 4 year program. After you’ve acquired that you may possibly be able to get an entry level job. This would be recommended in the since that you need to acquire a few security related certifications, certifications like the CompTIA Security + even up to the gold stand ICS2 Certified Information Systems Security Professional. There are a lot of different types of security…

    • 754 Words
    • 4 Pages
    Improved Essays