Utilisateur
defining security goals and obectives, risk mitigation, compliance, business continuity and the law
focuses on secuting digital and physical assets. Also related to stoage, maintenance, retention and destruction of data.
Security Analysts may need to update company policies related to private health info if a change is made to federal compliance regulation such as HIPPA, for instance.
Security Analysts may be tasked with making sure old equipment is properly disposed of
focuses on optimiing data security by ensuring effective tools, systems and processes are in place
As a security analyst you may be tasked with configuring a firewall (device used to monitor and filter incoming and outgoing computer network traffic.
focuses on managig and securing physical networks and wireless communications.
as a security analyst, you may be asked to analyse user behaviour within your organization
focuseson keeping data secure by ensuring uders follow established policies to control and manage physical assets like office spaces, and logical assets like networks and applications
validating identities of employees and documenting access roles are essential to maintaining the organization's physical and digital security. You May be tasked with setting up an emplopyee's key card access.
Focuses on conducting security control testing, collecting and analyzing data, and conducting security audits to monitor risks and vulnerabilities.
Security analysts may conduct regular audits of user permissions and make sure users have correct level of access, such as making sure payroll info is only limited to certain users.
Security analysts may conduct audits to ensure no unauthorized person can view employee salaries.
focuses on conducting investigations and implementing preventative measures
as a security analyst, you may recieve an alert that an unknown device has connected to your internal network. You would need to follow an orgnization's policies and procedures to stop a potential threat.
focuses on using secure coding pravctices, which are an a set of reccomended guidlines that are used to create secure applications and services. Security Analysts may work with software development teams to ensure security practices are incorporated into the software development life cycle.
if one of your partner teams is creating a new mobile app, you may be asked to advice on passwords policies or ensure thst user data is properly secured and managed.