Flagship Kansas

Association

Information Security Analyst

Hybrid-based occupation
Onet code: 15-1212.00

1

Years

14

Skills

315h

Related instruction

2000h

On-the-job training
Classroom Instruction Topics
  • Business Acumen-Team Culture, Customer Service and Confidential information
  • Information Science Strategy
  • Digital and Cyber security awareness/ Computer and Information Sciences Business frameworks
  • Computer and Network Programming/Cryptography
  • Data Entry/Microcomputer Applications Security
  • Wireless Networks, Cloud and Virtualization
  • Enterprise Security Computer Systems Analysis
  • Computer Software and Media Application vulnerabilities, threats, and attacks
  • Computer Systems Networking and Telecommunications
  • Computer/Information Technology Administration and Management
  • Computer and Information Sciences and Support Services
  • Information Technology Project Management/Encryption & Hashing
  • Introduction to Digital crime/Forensics
  • Staff Training
  • CompTIA Security+
  • Company Training - Staff Training/Meeting
  • Improve Your Data Governance and Security Skills
  • Essential New Skills in IT Administration
  • Learning Cloud Computing: Monitoring and Operations
  • Introduction to IT Architecture
  • Learning Computer Forensics
  • Learning Cyber Incident Response and Digital Forensics
  • Operating System Forensics
  • Learning Autopsy for Digital Forensics
  • Ethical Hacking: Cryptography
  • Ethical Hacking: Wireless Networks
  • Ethical Hacking: System Hacking
  • Prepare for the Certified in Risk and Information Systems Control (CRISC) Exam
  • Implementing the NIST Privacy Framework
  • Implementing the NIST Risk Management Framework
  • Project Management: Choosing the Right Online Tool
  • Professional Soft Skills Learning Pathway
  • Essential New Skills in Customer Support
  • Improve Your Interoffice Politics Skills
  • Teamwork Foundations
  • Creative Collaboration
  • Culture of Kaizen (continuous improvement)
  • Tech Career Skills: Effective Technical Communication
  • Build Your Skills In Customer Service
  • Develop Critical-Thinking, Decision-Making, and Problem-Solving Skills
  • Business Etiquette: Phone, Email, and Text
  • The Motivation Code: Discover the Hidden Forces That Drive Your
  • Reframing: The Power of Changing Your Perspective
  • Develop Your Communication Skills and Interpersonal Influence
  • Creative Problem Solving for Technologists
  • Tech Ethics: Avoiding Unintended Consequences
On-the-job Training
  • Develop computer or information security policies or procedures.
    • Understands company routine processes. Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
  • Update knowledge about emerging industry or technology trends.
    • Monitor current reports of computer viruses to determine when to update virus protection systems. Understands technologies and platforms utilized to complete investigations.
  • Implement security measures for computer or information systems.
    • Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.
    • Modify computer security files to incorporate new software, correct errors, or change individual access status.
    • Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated.
    • Maintain permanent fleet cryptologic and carry-on direct support systems required in special land, sea surface and subsurface operations.
  • Test computer system operations to ensure proper functioning.
    • Perform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures.
  • Collaborate with others to resolve information technology issues.
    • Confer with users to discuss issues such as computer data access needs, security violations, and programming changes.
  • Document operational procedures.
    • Document computer security and emergency measures policies, procedures, and tests. Understand processes for handling internal outages and the escalation flow when such events occur.
  • Troubleshoot issues with computer applications or systems.
    • Confer with users to discuss issues such as computer data access needs, security violations, and programming changes. Understand organizational hierarchy and workflow.
  • Coordinate project activities with other personnel or departments.
    • Coordinate implementation of computer system plan with establishment personnel and outside vendors. Uses client/customer requirements to determine investigation requirements. Provides appropriate customer service for customer needs. needs
  • Monitor the security of digital information.
    • Monitor use of data files and regulate access to safeguard information in computer files. Create cases based on host impacted, host origin, location, types of attach, executable files etc...Review repeat alarms create service requests and elevate to proper analyst.
  • Train others in computer interface or software use.
    • Provide customer training, as appropriate, to attain necessary information to address customer concerns. Train users and promote security awareness to ensure system security and to improve server and network efficiency.
  • Full service case load with supervision.
    • Acclimate to fill customer load. Mentor will be available to field questions and issues. Mentor will validate quality of performance of duties. Review cases and investigations to validate that they meet requirements and service level agreements. Remedial training as required.
calendar.svg
Get on our calendar
Not sure if WorkHands is right for you? Chat with our team today
sendEmail.svg
Send us an email
We'll get back to you shortly