A thorough, clear job description will ensure that security analysts stay on the same page with management expectations. Credit: Thinkstock Whatever the role, good communication regarding the duties and expectations of a security professional is key to that person’s success. That communication starts with a solid, thorough job description. It will be an important benchmark when hiring for the role, and a touch point for performance once the candidate is on board.The job description is also a baseline that helps security team managers keep pace as many roles evolve. That’s especially true for information security analysts, also referred to as cybersecurity analyst, data security analyst, information systems security analyst or IT security analyst. According to the U.S. Bureau of Labor Statistics (BLS), the outlook for security analyst job seekers is bright. Demand for them is projected to grow 22 percent through 2020, compared to an average of 14 percent for all occupations. DutiesThe duties outline the tasks and goals for which the information security analyst is responsible. That may vary depending on your company’s needs or industry. Jeremy Wittkop, chief technology officer at InteliSecure, says the infosec industry is shaping itself into, “different disciplines that have different analyst profiles.” He said the two most definitive are information protection (IP), which includes data loss protection (DLP) and data classification. Threat protection (TP) includes security information and event management (SIEM), user and entity behavior analytics (UEBA), point products like anti-virus (AV) and intrusion detection system/intrusion prevention system (IDS/IPS) and penetration testing.[Related: What it takes to be a malware analyst] IP analysts require less technical expertise, he said, but, “must have the ability to understand business processes qualitatively in order to assess behaviors against the authorized activities in a given business unit,” says Wittkop. Their role is to analyze if a behavior was authorized or not, “and if it was not, whether they think the behavior was due to ignorance or intentional,” which means a law enforcement or intelligence background can be useful.TPs are “far more technical,” says Wittkop, and need to be able to, “understand network protocols and system behavior,” which means digital forensics training is useful. “These people are really there to look through logs or behaviors from a systematic perspective in order to find anomalies that they can then investigate,” he says. Key duties for an information security analyst might include:Plan, implement and upgrade security measures and controlsProtect digital files and information systems against unauthorized access, modification or destructionMaintain data and monitor security accessConduct internal and external security auditsManage network, intrusion detection and prevention systemsAnalyze security breaches to determine their root causeRecommend and install appropriate tools and countermeasuresDefine, implement and maintain corporate security policiesSecurity awareness trainingCoordinate security plans with outside vendorsSkills and competenciesThis section outlines the technical and general skills required as well as any certificates or degrees that a company might expect an information security analyst to have.[Related: What it takes to become an information assurance analyst]Key technical skills include:Penetration testing of applications and infrastructure – a good way to find vulnerabilities before attackers doSocial engineering – given that humans are the weakest link in the security chain, an analyst’s expertise can help with awareness trainingVulnerability and risk assessment – important components of risk managementSecurity assessments of network infrastructure, hosts and applications – another element of risk managementForensics – investigation and analysis of how and why a breach or other compromise occurredTroubleshooting – the skill to recognize the cause of a problemDLP, AV and anti-malware – an understanding of the tools used to protect the organizationTCP/IP, computer networking, routing and switching – an understanding of the fundamentals: the language, protocol and functioning of the internetISO27001 assessment – specifications for a framework of policies and procedures that include all legal, physical and technical controls involved in an organization’s risk managementC, C++, C#, Java or PHP programming languages – you can’t analyze what you don’t understandCloud computing – the risks and benefits of using a vendor’s remote servers to store, manage and process an organization’s dataWindows, UNIX and Linux operating systems, on which most of the business world runsGeneral skills include:Excellent report writing and communicationThe ability to work well independently or with a teamAvailable to travel, possibly internationallyCapable of meeting deadlines and budgetsCertifications and educationCompany policies regarding certifications and education can vary. Some might be willing to overlook a lack of degree or certification if a person has proven skills. Others use certifications and education as gating factors when hiring. Possible certification requirements are:Certified Information Systems Security Professional (CISSP)Certified Information Security Manager (CISM)Certified Information Systems Auditor (CISA)Certified in Risk and Information Systems ControlCertified Ethical HackerGlobal Information Assurance CertificationVendor credentials offered by companies such as Microsoft and CiscoIn addition, education requirements range from high school to Master of Business Administration in Information Systems. Most companies require a college degree in computer science, cyber security or a related discipline.Industry-specific requirementsCertain industries might have unique requirements need to be addressed in the information security analyst job description. In health care, for example, the analyst’s duties might include the ability to assess and participate in compliance policies. That might include meeting internal and external audit requirements and gathering and providing information to internal and external auditors.Skills specific to health care might include: Identity and access management (IAM) solutions – prevention of unauthorized access by internal or external staffEndpoint protection technologies and techniquesWeb application firewalls and intrusion preventionencryptionAccess control methodologies (MAC, DAC. RBAC)IDS/IPS systems, SIEM tools and network scannersFinance would also have its own unique set of duty and skill requirements. Related duties include:Develop and recommend policies, standards and procedures that are in compliance with statutory and regulatory requirements that cover internal and external parties, physical security systems, internet and computer systemsMonitor and respond to regulatory developments and industry best practices in a timely mannerMaintain customer information security program compliant with the provisions of the Gramm-Leach-Bliley Act (GLBA) or the Bank Security Act, and prepare annual report on the overall status on the level of compliancePerform operational risk assessment (OSA) process for all organization facilitiesAudit activities of security administrators on various software applicationsSkills specific to finance would include a strong understanding of GLBA and IS/IT risk assessment, the Federal Financial Institution Examination Council (FFIEC) IT examination handbooks, and National Institute of Standard and Technology (NIST) 800-53 and Cybersecurity Framework.How to attract the bestMoney is always a factor. While the salary for an information security analyst ranges from $50,000 to $177,000, with the average around $88,000, Wittkop said senior analysts with a proven track record, “are often the subject of multiple offers and a bidding war can easily ensue.”For the best out there, it often comes down to more than money. Attractive perks include flexible work arrangements, growth potential, and training programs. Related content news Google Chrome zero-day jumps onto CISA's known vulnerability list A serious security flaw in Google Chrome, which was discovered under active exploitation in the wild, is a new addition to the Cybersecurity and Infrastructure Agency’s Known Exploited vulnerabilities catalog. By Jon Gold Oct 03, 2023 3 mins Zero-day vulnerability brandpost The advantages and risks of large language models in the cloud Understanding the pros and cons of LLMs in the cloud is a step closer to optimized efficiency—but be mindful of security concerns along the way. By Daniel Prizmant, Senior Principal Researcher at Palo Alto Networks Oct 03, 2023 5 mins Cloud Security news Arm patches bugs in Mali GPUs that affect Android phones and Chromebooks The vulnerability with active exploitations allows local non-privileged users to access freed-up memory for staging new attacks. By Shweta Sharma Oct 03, 2023 3 mins Android Security Vulnerabilities news UK businesses face tightening cybersecurity budgets as incidents spike More than a quarter of UK organisations think their cybersecurity budget is inadequate to protect them from growing threats. By Michael Hill Oct 03, 2023 3 mins CSO and CISO Risk Management Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe