Security Analyst Jobs

 

What is a security analyst?

A security analyst reviews threats and devises solutions which help to tackle the weaknesses exploited by malicious actors.

They use analysis to identify how and why threats were successful and use this to inform the planning and creation of new security systems. Because of this, security analysts are likely to be involved in the planning, design, implementation and monitoring of security systems to ensure that the business is highly protected and that the threat prevention was successful.

What does a security analyst do?

  • Threat response

You will likely be expected to support the business in tackling threats as and when they present themselves. This will involve proactive attempts to mitigate the damage from threats or prevent breaches from occurring as well as assessing previous threats to understand how best to prevent in the future.

  • System implementation

Using your analysis, you will make recommendations and be involved in the design and implementation of new systems, assessing all networks and potentially hardware to ensure that any new procedures are functioning correctly.

  • Security maintenance and support

After any new systems are implemented, you will need to use available security tools to monitor its success and support the business in maintaining full security compliance throughout its introduction.

  • Security testing & auditing

You will need to undertake continuous assessments of the company’s defences in line with updates in security best practice to keep your business on the cutting edge of information security and data protection compliance.

How much does a security analyst make a year?

An information security analyst makes an average of £34,000 per year in the UK. In the US, a security analyst will typically make $67,000 per year. These figures are according to https://www.payscale.com

What qualifications do I need to be a security analyst?

Jobs in cyber security generally expect a degree in a related field such as mathematics or computer science. However, those with equivalent relevant experience will also be considered for the role of security analyst.

Some professional qualifications to work towards include:

  • Certified Ethical Hacker (CEH)
  • GIAC Certifications (GSEC, GCIA)
  • Certified Information Systems Security Professional (CISSP)

How do I become a security analyst?

This is more of an entry-level position but employers will typically expect candidates to have at least a years’ experience in cyber security. This may be gained in equivalent level roles such as security administrator or network administrator.

However, security analyst job postings may be looking for anything up to five years’ experience, depending on the role and applicants will need to consider job listings carefully before applying for a suitable position.  

 

Cyber-Exchange Member-Badge Full AFC POS RGB logo referenced on jobboard finder 90x90

We use cookies to provide you with the best possible browsing experience on our website. You can find out more below.
Cookies are small text files that can be used by websites to make a user's experience more efficient. The law states that we can store cookies on your device if they are strictly necessary for the operation of this site. For all other types of cookies we need your permission. This site uses different types of cookies. Some cookies are placed by third party services that appear on our pages.
+Necessary
Necessary cookies help make a website usable by enabling basic functions like page navigation and access to secure areas of the website. The website cannot function properly without these cookies.
SessionUsed to track your user session on our website.
essential
ResolutionUsed to ensure the correct version of the site is displayed to your device.
essential
+Statistics
Statistic cookies help website owners to understand how visitors interact with websites by collecting and reporting information anonymously.
Google AnalyticsGoogle Analytics is an analytics tool to measure website, app, digital and offline data to gain user insights.
Yes
No

More Details