Last updated on March 5, 2021
The likelihood of running into a Cybersecurity Analyst in Los Angeles is slim to none. In the DMV metro area however, I’ve run into a number of them. A cybersecurity analyst that works for the Pentagon, Homeland Security, and a number of alphabet agencies. I recently chatted with one at a local pub. I now work with one on a semi monthly basis. Here’s the gist.
Cyber attacks are and have been a growing threat in a number of industries. Most commonly however, healthcare, education, government, and food/beverage are victims. The common reason for this is access to personal data. Regardless, after a few quick job searches I discovered roughly 40k openings across the US. Cybersecurity Analysts are in very high demand.
Cybersecurity Analyst Job Description and Duties
This individual spans a wide gamut of business. They’re responsible for advising colleagues on basic good practices. Such as password complexity, data loss mitigation, and common threats. They define new policies, fix and protect systems, and create new solutions. While solving existing ones. The analyst educates companies on phishing and social engineering tactics
They install and configure fire walls and create intrusion detection systems. They no doubt build new systems to safeguard companies against an array of cyberattacks. It’s their job to protect private and public info from being mishandled. They’re called upon to work very closely with technical teams. In the case of suspicious activity, they utilize an array of tools or lock down systems entirely.
They come from unique backgrounds but typically hold a degree in Info Security or Computer Science. All of which however have obtained graduate degrees. Like many technical jobs, they’re required to stay up to date on new technologies. They’re no stranger to advanced and persistent threats. They’re experienced in securing network architectures. Every description I’ve seen alludes to comfort in Windows environments, with Unix and Linux experience. Employers want someone well versed in MySQL and similar database platforms. Someone who possesses secure application skills while making use of encryption technologies. Identity and access management principles, knowledge of intrusion detection and prevention coupled with vulnerability testing.
A cybersecurity analyst will most likely be familiar with looking at a number of screens. Deciphering where to concentrate their attention. The ability to pinpoint spikes in network traffic and understanding cyberattack attempts. A technical individual that looks for and understands failed authentications. More and more companies nowadays area creating disaster recovery teams. People with secure coding knowledge, and skills revolving around ethical hacking and threat modeling. The cybersecurity analyst should be able to blend in with these individuals.