Security Operations Analyst
Information security analysts are vital in keeping a company’s data and sensitive information safe and protected from threats.
Also Called
Description
Security Operations Analysts keep an organization’s computer and network systems safe. They plan and implement security measures that monitor and protect sensitive data and systems from cyber-attacks or infiltration. They also respond to computer security breaches and viruses.
Duties and Responsibilities:
These are some of the core duties and responsibilities of a Security Operations Analyst, however, specific tasks will depend on the type of business, organization, client, or project.
- Develop information security plans, procedures, standards, policies, and best practices
- Carry out an organization’s information security strategies
- Recommend necessary enhancements as needed
- Respond to and recover from security breaches
- Install software such as firewalls and data encryption programs to protect sensitive information
- Conduct periodic scans to test for vulnerabilities
- Perform penetration testing to find issues in the system
- Continuously monitor network and systems for any security breaches and investigate any breaches that may occur
Products/Technologies an Information Security Analyst may work with:
- Fortinet
- Kaspersky
- Cisco
- Check Point
- Juniper
- Symantec
- Palo Alto
Salary
0 to 2 years experience
P40,000 - P50,000
(median: P0)
- 40000
- 50000
3 to 5 years experience
P50,000 - P100,000
(median: P0)
- 50000
- 100000
6 to 10 years experience
P100,000 - P180,000
(median: P0)
- 100000
- 180000
More than 10 years
P90,000 - P160,000
(median: P0)
- 90000
- 160000
Qualifications
These are some of the skills & qualifications a Security Operations Analyst needs. These may vary depending on the specific requirements of the business or organization.
Technical Knowledge:
- Firewalls
- Anti-Virus and Anti-Malware software
- IDP (Intrusion Detection & Prevention)
- Content filtering
- Penetration Testing
- Risk assessment tools, technologies, and methods
- Disaster recovery and computer forensic tools
Other Key Qualities/Abilities/Knowledge:
- Good Communication - can communicate issues with other team members
- Complex Problem Solving
- Critical Thinking
- Problem Sensitivity
Sample Certifications:
These are examples of certifications that some companies may look for/require
- CISM (Certified Information Security Manager)
- CISSP (Certified Information Systems Security Professional)
- CEH (Certified Ethical Hacker)
- HCISPP (Health Care Information Security and Privacy Practitioner)
Skills
Sign up now and get updated on the latest jobs, courses, events, and news about this career.
SIGN UPCurrently Hiring
No jobs available
Grow your Skill Set
Upcoming Events
No events available