Career Guide > Computer & IT

Information Security Analyst

Information Security Analyst Job Description

Other job titles for Information Security Analyst

Information Security Analyst, Information Security Specialist, Information Security Engineer

What does anc Information Security Analyst do?

Information Security Analysts keep an organization’s computer and network systems safe. They plan and implement security measures that monitor and protect sensitive data and systems from cyber-attacks or infiltration. They also respond to computer security breaches and viruses.


Duties and Responsibilities:

These are some of the core duties and responsibilities of an Information Security Analyst, however, specific tasks will depend on the type of business, organization, client, or project.


  • Develop information security plans, procedures, standards, policies, and best practices
  • Carry out an organization’s information security strategies
  • Recommend necessary enhancements as needed
  • Respond to and recover from security breaches
  • Install software such as firewalls and data encryption programs to protect sensitive information
  • Conduct periodic scans to test for vulnerabilities
  • Perform penetration testing to find issues in the system
  • Continuously monitor network and systems for any security breaches and investigate any breaches that may occur


Products/Technologies an Information Security Analyst may work with:

  • Fortinet
  • Kaspersky
  • Cisco
  • Check Point
  • Juniper
  • Symantec
  • Palo Alto

Information Security Analyst Salary in the Philippines

How much does anc Information Security Analyst make?

The average monthly salary of anc Information Security Analyst in Philippines ranges between Php 0 - Php 0 (median: Php 0).

Unlock Salary Breakdown

Login to your Recruitday account to see the breakdown of salary ranges for Information Security Analyst based on experience level.

Information Security Analyst Skills & Qualifications


These are some of the skills & qualifications an Information Security Analyst needs. These may vary depending on the specific requirements of the business or organization.


Technical Knowledge:

  • Firewalls
  • Anti-Virus and Anti-Malware software
  • IDP (Intrusion Detection & Prevention)
  • Content filtering
  • Penetration Testing
  • Risk assessment tools, technologies, and methods
  • Disaster recovery and computer forensic tools


Other Key Qualities/Abilities/Knowledge:

  • Good Communication - can communicate issues with other team members
  • Complex Problem Solving
  • Critical Thinking
  • Problem Sensitivity


Sample Certifications:

These are examples of certifications that some companies may look for/require

  • CISM (Certified Information Security Manager)
  • CISSP (Certified Information Systems Security Professional)
  • CEH (Certified Ethical Hacker)
  • HCISPP (Health Care Information Security and Privacy Practitioner)

Education Requirements

Bachelor’s Degree in Computer Science, Information Technology, or similar

Skills required

Penetration Testing

Information Security


Anti Malware

Anti Virus

Intrusion Prevention Systems

Intrusion Detection and Prevention

Risk Assessment

Disaster Recovery

Incident Management

System Administration


Framework Design

IT Security


IT Infrastructure

Training Courses for Information Security Analyst

Certified Ethical Hacker (CEH)

The Certified Ethical Hacker (CEH) is a core training program for an information security professional, also referred to as a white-hat hacker, who systematically attempts to inspect network infrastructure with the consent of its owner to find security vulnerabilities which a malicious hacker could potentially exploit. The course helps you assess the security posture of an organization by identifying vulnerabilities in the network and system infrastructure to determine if unauthorized access is possible. The Certified Ethical Hacker program is the most comprehensive Ethical Hacking program in the world. It is the first of three courses within our Vulnerability Assessment and Penetration Testing (VAPT) track. The goal of this hacking course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with ethical hacking skills that are highly in demand. This course prepares you for EC-Council Certified Ethical Hacker course exam 312-50.

5 Days
Online (Instructor-Led)

Certified Network Defender (CND)

Certified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on a job-task analysis and cybersecurity education framework presented by the National Initiative of Cybersecurity Education (NICE). The network security training course has also been mapped to global job roles and responsibilities and the Department of Defense (DoD) job roles for system/network administrators. The course is designed and developed after extensive market research and surveys.

5 Days
Online (Instructor-Led)


CompTIA Advanced Security Practitioner (CASP+) is the ideal certification for those technical professionals who wish to remain immersed in technology as opposed to managing cybersecurity policy and frameworks.

5 Days
Online (Instructor-Led)

CompTIA Network+

CompTIA Network+ verifies that you have the essential knowledge and skills in networking to develop a career in IT infrastructure.

5 Days
Online (Instructor-Led)

CompTIA Security+

CompTIA Security+ is an international, vendor-neutral certification that validates the baseline skills necessary to perform core security functions and pursue an IT security career.

5 Days
Online (Instructor-Led)

Need help finding a job?

Let our recruitment specialists introduce you to awesome companies and help you land a career in Information Security. Submit your resume and they'll handle the rest!

Submit Resume

Refer and earn

Know someone looking for a career in Information Security? Refer them to us and get rewarded when they get hired.

Refer friend

Follow this career

Get notified via email with the latest Information Security career information, jobs, and articles.

Email Address

By signing up, I agree to Recruitday's Privacy Policy.