The Cybersecurity Analyst Profession

Topic: HR Management
Words: 2123 Pages: 6

Introduction

Cybersecurity specialists work in significant financial and IT companies; the value of such personnel is noted in government agencies and defense departments, whose main task is to ensure national security and prevent penetration into state infrastructure. Analysts in this field, as a rule, analyze various components of an information system depends on the implementation industry: in fintech, card transactions and payment automation are considered, and, for example, in software engineering, code. With the rapid growth in the use of technology in virtually every business industry, security and the profession are becoming relevant and necessary aspects of being successful and competitive. The level of current threats could bring some businesses to a complete halt, potentially resulting in catastrophic losses. Salaries and opportunities are ranked depending on the industry and region of the job. Sections of this paper reflect such dynamics. This work also offers a detailed description of the profession and general personal skills that contribute to or hinder its acquisition.

Cybersecurity is the process of recovering computer systems and protecting them from any cyberattacks. These threats are increasingly sophisticated and growing threats to sensitive data as attackers use new artificial intelligence methods and social engineering to overcome traditional security measures. The importance of this sector is growing as society becomes more technologically dependent every day, and the trend will grow. Data breaches that could lead to identity theft are now publicly posted on social media accounts (Coursera, 2022). This work offers a detailed description of the profession of cybersecurity analyst, the required skills, and the salaries and characteristics of vacancies in various geographic regions. Finally, a personal analysis of the strengths and weaknesses of the applicant for this profession will be presented.

Job Description

Description

A cybersecurity specialist identifies information security threats and data loss risks, develops and implements threat countermeasures and solutions to protect against information loss; ensures the safety and confidentiality of data; participates in developing and implementing IT solutions. Mobile phones, computers, cars, and, for some time now, even household appliances bind themselves and their owner with a considerable amount of data (Shea et al., 2021). The need for such specialists is especially evident now due to the increase in cyber crimes and cases of cyber terrorism (Team, 2022). At the same time, job diversification is essential: analysts who analyze complex systems and engineers who directly deal with threats are needed. Hacker attacks are registered in all corners of the world. Among the most resonant, it is worth mentioning the spread of WannaCry viruses, which caused significant damage to banking systems and large companies in different countries (Algarni, 2021). To prevent threats, analysts must have a solid foundation, including knowledge of operating systems, hacking and anti-hacking software, basic programming, and database management systems. Mindfulness and stress tolerance are also highlighted as crucial skills since critical situations are always associated with potential danger to data.

Typical Job Tasks of a Cybersecurity Analyst

Development Of Preventive Methods to Combat Malware, Protection of Private Information and Intellectual Property

Since the development of information technology is highly dynamic, the competencies of the analyst should change accordingly. A specialist must be able to act reactively in conditions of stress and increased danger and proactively, which is manifested in the creation of preventive methods. The main activity of a cybersecurity analyst is monitoring and advising other departments involved in operations, and within these two processes, the development of protection methods is the specialist’s most prolonged and updated task.

Ensuring The Stability of the Operation of Socially Important Information Systems, Preventing Situations of System Collapse

It is not uncommon for a cybersecurity analyst to work in industries such as medicine, first aid, emergency services, and many others. In these organizations, seconds often count, and human lives are at stake. A failure in the system can lead to highly negative consequences, so the stability of work is the direct responsibility and responsibility of the analyst. In this situation, a specialist can install various evaluating and tracking applications, firewalls, and test systems to maintain high-quality monitoring. At the same time, socially significant information systems include not only those related to health and emergencies.

Search for Potential Vulnerabilities in Existing Systems

The search for potential threats is done in several ways. Firstly, a specialist can act like a hacker to test the system: a similar phenomenon is called ethical hacking (UT Austin Boot Camps, 2021). In many ways, this competence is made up of deep knowledge in the field of networks, programming and data structure devices, including modern non-relational databases and artificial intelligence (Maurushat, 2019). Secondly, a specialist can identify shortcomings in the system in its direct use; this approach is called bug bounty (Malladi & Subramanian, 2019). Along with monitoring, a manual search is the main functional activity of representatives of this profession.

Typical Job Advertisements

Cybersecurity Analyst (Remote) – Home Depot

Protecting what matters most to our associates and consumers by securing our sensitive data and critical assets from current and emerging threats. At The Home Depot Cybersecurity consists of Architecture, Governance, Identity & Access Management, Internal Threat Operations, Issue and Compliance Management, Risk Assessment/Advisory, Security Consulting, Security Operations, and Strategic Planning.

Analysts are responsible for data management, analyzing performance, identifying problems, and developing recommendations that support Cybersecurity initiatives. Collaborates with cross-functional teams to collect, analyze data, present results and provide recommendations (Indeed, 2022).

Junior Cyber Security Analyst – NYC Careers

The Office of Technology and Innovation (OTI/DoITT) oversees all Citywide technology, privacy, cybersecurity, infrastructure, and telecommunications to ensure the security of and enhance City operations and service delivery to New York City’s residents, and businesses, employees, and visitors. As the City’s technology and innovation leader, OTI is responsible for operating, maintaining, and securing IT infrastructure and systems that touch every aspect of City life, from public safety to human services, from education to economic development, crossing the full spectrum of governmental operations (Indeed, 2022).

Cyber Security Analyst – FedEx Services

Under general supervision, develops cyber-intelligence solutions to prevent internal or external attacks or attempts to infiltrate company email, data, e-commerce and web-based systems. Supports technologies deployed across application, network/perimeter, data, endpoint, identity & access, and mobility domains. Researches attempted or successful efforts to compromise systems security and designs countermeasures. Provides information to management regarding the negative impact on the business caused by theft, destruction, alteration or denial of access to information and systems (Indeed, 2022).

Mid-Level Information Security Analyst – IT Data Solutions

Since 2005, IT Data Solutions has been providing focused management consulting services specializing in Information Technology (IT) solutions and tools for large private and public sector clients. We specialize in Advisory, Analytics, Audio/Video Design and Implementation, Augmented/Virtual Reality, Cybersecurity, Human Capital Solutions, Managed Services, and Robotic Process Automation (RPA). We turn big data into actionable intelligence to help reach your mission objectives. Our IT data solutions help you to increase efficiencies, reduce costs, and streamline processes (Indeed, 2022).

Career Possibilities

Salary Range

An analysis of the Indeed platform showed that salaries range from $50,000 per year for juniors. Mid-levels can reach up to 150 thousand dollars a year, and senior – up to 170 (Indeed, 2022). According to research, the median by 2021 was $100,000 per year, which is, on average, twice the overall median salary in the country (Coursera, 2022). At the same time, analysts, being associated with information technology, always have the opportunity to grow into more versatile qualified specialists, creating the potential for career growth.

Types of Industries

Medical IT

Even though organizations everywhere face cyber threats that continue to grow in complexity and volume, no industry is as significant a target and is not subject to such attacks as healthcare (Luh & Yen, 2020). In addition to hospitals, the modern healthcare industry includes medical device manufacturers, pharmaceutical manufacturers, and biotechnology organizations. Today’s healthcare industry is increasingly dependent on digitalization and data management tools. Privacy remains a top priority for senior executives and their organizations. Complex governance structure in public healthcare institutions can lead to a lack of specific requirements, insufficient preparation for cyberattacks, and difficulties in assessing the resilience of IT assets.

Energetics

Energy is one of the most potentially dangerous areas in terms of manufactured disasters. The specific duties of an analyst include: managing the technological modes of operation of electric power facilities, regulating the frequency of the electric current, ensuring the functioning of the automatic control system for the frequency of electric current and power, system and emergency automation, participating in organizing activities to forecast the volume of production and consumption in the electric power industry, and participation in the process of creating a reserve of energy production capacity (de Carvalho & Saleem, 2019). In fact, monitoring the most critical systems is carried out through unique actions for monitoring indicators, planning the production volume, and creating reserve capacities.

Transport and Logistics

Cyber-attacks in this sector used to occur every few years (Hobbs, 2021). First, the increased use of operating technologies, new communication, and wireless channels directly connected to T&L companies’ digital ecosystems make companies easy targets for hackers. Secondly, it is outdated regulations and standards in the IT field, a lack of awareness of cybersecurity, and, finally, perhaps the most significant factor is the lack of qualified personnel capable of providing protection.

Geographic Locations

California

California is famous for construction; hence, IT must ensure that the construction designs are per plan. The incorporation of the Internet of Things will also be realized using IT. California is the best location for the building sector because of its size and fast growth. The state had the most projects, both in terms of quantity and value, as of 2019 (Borelli & Greer, 2021). Despite the pandemic, it has not missed as many opportunities as some other states.

Houston

Houston, Texas, is a center for sophisticated medical services. There is a need for a cybersecurity analyst to ensure that patients’ data is kept safe to prevent the violation of privacy. The largest conglomeration of research and medical institutes in the world, the Texas Medical Center, is located in Houston, Texas, for this reason.

Preparation

Training

In this industry, many courses issue profile certificates. According to the source, this type of confirmation of knowledge is used in more than 40% of vacancies (UT Austin Boot Camps, 2021). Given the specifics of the profession, advanced training is required here more often than in many other specialties.

Education

The job requires an IT-related education. It is essential for understanding the abstract data architectures, building blocks, and fundamentals of security application software. Deepening into a particular industry, for example, networks or databases determines the profile of a specialist.

Work Experience

Experience is a key indicator when hiring a job seeker. The job market is less needed for juniors, while experienced workers are needed for more jobs (Indeed, 2022). It is the ability to apply practical abilities to analytics that bring results that give way up the career ladder.

Fulfillment of Giftings (SWOT Analysis)

Giftings

I know the field of information technology, namely the basics of programming. This knowledge can help me understand the structure of specific software that works with various data types. Moreover, I have developed soft skills of perseverance and attentiveness, which will be helpful both for the main activity of the profession and for teaching basic skills and advanced training.

Professional Need Analysis

At the same time, I understand that I still have a long way to go in learning about the basics of networks, the functionality of browsers, and the design of computers with operating systems. In addition to basic knowledge, practical experience with security software and its mechanisms is required. Finally, I will need knowledge about the primary hacker attacks and experience in their implementation.

Gifting Gap Analysis

When studying the basics, this profession makes it possible to retrain other IT industry employees. Moreover, immersion in the specifics of the cybersecurity of a particular industry gives a clear understanding of the mechanisms of its work: whether it is medicine or logistics. Finally, career opportunities in this profession are practically unlimited.

Kingdom Mission

The threats consist of the dynamic development of hacker attacks, which can be improved over the time of gaining knowledge. Keeping up-to-date can be a threat if I do not regularly upgrade my skills. Finally, I am not sure I can work one hundred percent in stressful situations when I need to make complex decisions quickly.

Conclusion

The profession of a cybersecurity analyst is entirely responsible and multi-criteria, and at the same time, it is pretty highly paid. It needs a solid base, complemented by the industry’s specifics, into which the analyst dives deeply. I have the makings of a career, but there is still a lot of work and study before I can get a junior position.

References

Algarni, S. (2021). Cybersecurity attacks: Analysis of “wannacry” attack and proposing methods for reducing or preventing such attacks in future. In ICT Systems and Sustainability (pp. 763-770). Springer, Singapore. Web.

Coursera. (2022). What does a cybersecurity analyst do? 2022 job guide. Coursera. Web.

de Carvalho, R. S., & Saleem, D. (2019). Recommended functionalities for improving cybersecurity of distributed energy resources (Vol. 1, pp. 226-231). IEEE.

Hobbs, A. (2021). The colonial pipeline hack: Exposing vulnerabilities in us cybersecurity. In SAGE Business Cases. SAGE Publications: SAGE Business Cases Originals.

Indeed. (2022). Cybersecurity analyst jobs. Web.

Luh, F., & Yen, Y. (2020). Cybersecurity in science and medicine: Threats and challenges. Trends in Biotechnology, 38(8), 825-828. Web.

Malladi, S. S., & Subramanian, H. C. (2019). Bug bounty programs for cybersecurity: Practices, issues, and recommendations. IEEE Software, 37(1), 31-39. Web.

Maurushat, A. (2019). Ethical hacking. University of Ottawa Press.

Shea, S., Gillis, A. S., & Clark, C. (2021). What is cybersecurity? everything you need to know. SearchSecurity. Web.

Team, E. (2022). Top 10 cybersecurity threats in 2022. Embroker. Web.

UT Austin Boot Camps. (2021). Cybersecurity analyst job Description & Role breakdown. Web.