SBN

Cybersecurity analyst job description

Introduction

Are you the type of person who likes to work things out from first principles? If someone tells you the Earth revolves around the sun, do you need evidence to prove it? Do you find yourself analyzing everything you come across, especially when it involves technology? If so, a career as a cybersecurity analyst may be perfect for you.

As a U.S.-based cybersecurity analyst, you should expect an average salary of around $78,000, according to Indeed. In a 2018 survey by Exabeam, North American salaries in cybersecurity can be at least 50% higher than in other parts of the world. However, a quick check of job portals shows that UK and European analysts can earn at least that, with the right qualifications and experience.

A cybersecurity analyst job description

A cybersecurity analyst either works directly for an organization as a staff member or as a consultant, possibly working for several companies at any given time.

The title cybersecurity analyst is just one variant. Similar roles and titles include information security analyst, security operations center (SOC) analyst and security analyst. They all basically have the same job description and carry out the same tasks.

As a security analyst, your overriding duty is to implement systems that protect your organization from the specter of cyberthreats. What this means, in reality, is a list of tasks that come together to perform that duty.

Typical responsibilities of a cybersecurity analyst include:

  • Being highly knowledgeable about the cybersecurity threatscape (and keeping up to date with the security industry)
  • Understand and evaluate security threats on those threats to your organization and perform a risk analysis of threats
  • Use your powers of investigation to look into any breaches and other security incidents that occur
  • Help to design secure networks and determine best practice methods
  • (Read more...)

*** This is a Security Bloggers Network syndicated blog from Infosec Resources authored by Susan Morrow. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/-CwBItQAe9I/