Information Security Analysts:

Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. Assess system vulnerabilities for security risks and propose and implement risk mitigation strategies. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses.

Also includes




About the Job


Indiana Average Salary $82,350.00
Average Time to Fill 61 days
Typical Education Bachelor's degree
Typical Experience Over 2 years, up to and including 4 years
10 Year Projected Openings (2016-2026) 2,022
10 Year Expected Percentage Change (2016-2026) 37.20 %

For more information on the new projection methodology, visit Hoosiers by the Numbers .

Find Available Postings


Select an Area:



Find Training


Find Training Programs

...



Skills Profile



Essential (Soft) Skills

Essential Skills to Employers

Critical Thinking
Attention to Detail
Information Gathering
Computer Fundamentals
Decision-making
Creativity
Written Communication
Technology and Tool Usage
Oral Communication
Integrity
Leadership
Following Directions
Organization
Professionalism
Resource Management

Top Job Duties and Responsibilities

Interacting With Computers

Solve software problems
Troubleshoot computer database problems
Debug computer programs or code
Maintain computer software or code
Assist users with software or hardware problems
Solve computer hardware problems
Maintain complex computer databases
Troubleshoot computer hardware problems
Install software applications
Maintain network systems
Troubleshoot computer network problems
Configure computer networks
Integrate software into different types of pre-existing environments, architectures, or systems
Install hardware, software, or peripheral equipment
Plan computer security measures
Implement security measures for computer or information systems
Debug computer software or systems
Create data backups to prevent loss of information
Upload data to website or online server for information sharing
Enter codes into computers to set or operate equipment
Modify computer network systems
Update database information
Manage access using cards, keys, permissions, and readers
Communicate information using social media

Thinking Creatively

Write computer programs or code
Develop computer, network, or database policies, procedures, or standards
Optimize software performance
Design data security systems
Develop computer or information security policies or procedures
Develop basic financial data repositories or databases
Develop simple informational data repositories or databases
Develop basic data repositories or databases
Design data processing systems
Develop complex computer databases
Design video game features or details
Develop records management systems
Design software or user interface
Develop software or computer applications
Design software applications
Define database parameters or specifications
Apply user experience to application design
Create databases including tables, relationships, and queries
Develop applications to access data warehouses while maintaining information security and integrity
Develop web services
Design computer hardware solutions
Develop web interfaces using established guidelines and verification techniques
Create relational databases
Develop computer or data information systems
Define website architectures
Develop business or organizational policies, programs, or standards
Maintain quality assurance procedures
Develop dynamic or hybrid web applications
Develop operational policies and standards
Develop procedures for data management
Develop diagrams or flow charts of how systems operate
Develop staff policies
Prepare graphics or other visual representations of information
Develop testing routines or procedures
Write business project or bid proposals
Develop mathematical concepts, models, or simulations

Monitor Processes, Materials, or Surroundings

Monitor use of electronic files to safeguard information
Maintain physical security of sensitive or classified hardware or software
Monitor performance of computer systems or networks
Monitor message or event logs for computer systems
Maintain physical security of sensitive or classified data
Maintain confidentiality of data
Monitor the security of digital information
Monitor transportation operations to ensure compliance with regulations or standards
Monitor financial performance
Detect infractions of rules
Manage security for visitors or employees
Monitor project scope guidelines
Monitor project performance metrics
Monitor project risk mitigation plan


Real-Time Job Posting Statistics


Booster Skills & Certifications

Job Seekers possessing booster skills & certifications, such as those listed below, added to core skills are more marketable, harder to find and expensive to hire.

Hard to Fill: Employers find positions requiring these skills to be hard to fill. These skills and certifications make a job seeker more in demand because the skills are not widely available.

Expensive to Fill: Employers find positions requiring these skills to be expensive to fill. Job seekers with these skills and certifications are likely to earn more money.

Skill or Certification Certi - fication Hard to Fill Expensive to Fill
Python
Security Clearance
PERL
System Administration
Information Systems
Hard Drives
System/Network Configuration



Department of Workforce Development Resources