Skip to main content
4 answers
6
Asked 602 views

How much work is envolved with being a Information Security Analyst

Need more information.

Thank you comment icon Can you elaborate or clarify what you asking? How much work involved can differ by information security role/function and the level of effort also varies. Kevin Lam CISSP, PMP, ITIL

+25 Karma if successful
From: You
To: Friend
Subject: Career question for you

6

4 answers


1
Updated
Share a link to this answer
Share a link to this answer

Fatuimoana’s Answer

It depends.....For me, I went through a little bit of school and through networking, I was able to land my first job in the cyber security field. The course I took was about 2 years long. It involved everything from learning about the Windows OS desktop and server versions. I learned about the Linux OS and how to setup and mange Linux servers. Learned a little bit of programing, networking, packet analysis, and ethical hacking.
I knew a little bit about computers in the past like building one up and even got my A+.
I for one had to really take extra time to understand the concepts and how to apply it. I would spend hours making my own virtual lab spinning up VMs to really grasp what I'm learning. Some areas I was able to pick up quickly versus other areas. Understanding the Windows OS was easier for me than programming.
I think the amount of work all depends on the individual and what they can handle. I'm still learning and growing everyday in this field and so be prepared for that.
If you want to put it into hours, after I work M-F for 8hrs, I usually have an hour to two hours every night (M-F or M-Sat) trying to figure things out that I saw at work and practicing in my own made up lab or increasing my knowledge in the cyber security field.

Fatuimoana recommends the following next steps:

I recommend checking out this roadmap by SANs. Although these courses are expensive, it can give you a high level overview of jobs in Cyber Security. https://www.sans.org/media/SANS_Roadmap.pdf
1
0
Updated
Share a link to this answer
Share a link to this answer

Felipe’s Answer

Hi James,

It depends on what type of job or role you will be assigned. For example, if you are assigned to a role that is more related to managing and operating a cybersecurity technology, it is probable that you will need to work sometimes after hours due to technology changes, support, and maintenance of cybersecurity technologies. However, the technical activities of cybersecurity are great, and you will definitely have a lot of fun. Another example is if you are assigned to a job/role more related to cyber risk management. In that case, normally you will be working just during business hours. In the event of an incident, it is possible that you will have to work after hours.

In any case, to succeed as an information security analyst, it is very important to study and study to keep up to date with all new threats and cybersecurity technologies.

Finally, I would like you to know that in the world we have more than 2 million cybersecurity professionals job openings for which we don't have enough professionals, so for sure you will get a job.

I hope this answer can help you decide to take this path.

Thank you.

Best regards, 

Felipe
0
0
Updated
Share a link to this answer
Share a link to this answer

Shamik’s Answer

I would flip the question - What do I gain by becoming a Information Security Analyst ?

Job satisfaction, sound career option, better pay etc. It you are comfortable with your answers to the above question, then any amount of effort will be worth it.

Please do not shy away from hard work/effort. Hope this helps.
0
0
Updated
Share a link to this answer
Share a link to this answer

James Constantine’s Answer

Subject: The Scope of Work for an Information Security Analyst

Dear James,

Understanding the Role of an Information Security Analyst

An Information Security Analyst is a specialist who safeguards an organization's computer systems and networks from unauthorized activities, such as access, use, disclosure, disruption, alteration, or destruction. The workload for this role can fluctuate based on several factors, including the organization's size, industry, responsibilities, and the level of threats and attacks. Here are some key tasks that provide a glimpse into the life of an Information Security Analyst:

1. Designing and Executing Security Protocols: As an Information Security Analyst, you'll be tasked with creating and applying security policies, procedures, and technologies to shield an organization's data and systems. This might involve setting up firewalls, intrusion detection systems, and antivirus software, conducting vulnerability assessments, and penetration testing to spot potential system weaknesses.

2. Supervising and Interpreting Security Events: Information Security Analysts keep an eye on network traffic and security logs to identify any abnormal or suspicious activities that might signal a security breach or attack. They use a variety of tools and techniques to analyze the data and assess the threat's severity and nature. This might require collaboration with other IT professionals, such as network administrators or system engineers, to examine the incident and minimize any damage.

3. Reacting to Security Incidents: When a security incident happens, Information Security Analysts must respond swiftly and effectively to control the threat, reduce the damage, and recover any lost or compromised data. This might involve isolating infected systems, updating passwords, or deploying patches or updates to fix vulnerabilities. They also need to document the incident and report it to management or law enforcement agencies if required.

4. Keeping Up with Threats and Trends: Information Security Analysts must stay current with the latest threats, trends, and best practices in the field. This might involve attending conferences, reading industry publications, or participating in online forums and communities. They also need to continually evaluate and enhance their organization's security stance by conducting risk assessments, developing disaster recovery plans, and testing incident response procedures.

5. Collaborating with Other Teams: Information Security Analysts often work closely with other IT teams like network operations, application development, or project management to ensure that security is incorporated into all aspects of the organization's technology infrastructure. They may also work with non-IT teams such as legal, compliance, or human resources to address any regulatory or policy issues related to information security.

To sum up, being an Information Security Analyst involves a broad array of tasks and responsibilities that necessitate a solid grasp of technology, security principles, and business processes. It's a demanding yet fulfilling career for those who enjoy problem-solving, critical thinking, and continuous learning.

Stay blessed!
James Constantine.
0