Information Security Analyst Job Description
Other job titles for Information Security Analyst
Information Security Analyst, Information Security Specialist, Information Security EngineerWhat does anc Information Security Analyst do?
Information Security Analysts keep an organization’s computer and network systems safe. They plan and implement security measures that monitor and protect sensitive data and systems from cyber-attacks or infiltration. They also respond to computer security breaches and viruses.
Duties and Responsibilities:
These are some of the core duties and responsibilities of an Information Security Analyst, however, specific tasks will depend on the type of business, organization, client, or project.
- Develop information security plans, procedures, standards, policies, and best practices
- Carry out an organization’s information security strategies
- Recommend necessary enhancements as needed
- Respond to and recover from security breaches
- Install software such as firewalls and data encryption programs to protect sensitive information
- Conduct periodic scans to test for vulnerabilities
- Perform penetration testing to find issues in the system
- Continuously monitor network and systems for any security breaches and investigate any breaches that may occur
Products/Technologies an Information Security Analyst may work with:
- Fortinet
- Kaspersky
- Cisco
- Check Point
- Juniper
- Symantec
- Palo Alto
Information Security Analyst
Information Security Analyst Salary in the Philippines | Latest Information Security Analyst Jobs |Explore Similar Careers
Information Security Analyst Salary in the Philippines
How much does anc Information Security Analyst make?
The average monthly salary of anc Information Security Analyst in Philippines ranges between Php 0 - Php 0 (median: Php 0).

Information Security Analyst
Information Security Analyst Skills & Qualifications | Latest Information Security Analyst Jobs |Explore Similar Careers
Information Security Analyst Skills & Qualifications
Qualifications
These are some of the skills & qualifications an Information Security Analyst needs. These may vary depending on the specific requirements of the business or organization.
Technical Knowledge:
- Firewalls
- Anti-Virus and Anti-Malware software
- IDP (Intrusion Detection & Prevention)
- Content filtering
- Penetration Testing
- Risk assessment tools, technologies, and methods
- Disaster recovery and computer forensic tools
Other Key Qualities/Abilities/Knowledge:
- Good Communication - can communicate issues with other team members
- Complex Problem Solving
- Critical Thinking
- Problem Sensitivity
Sample Certifications:
These are examples of certifications that some companies may look for/require
- CISM (Certified Information Security Manager)
- CISSP (Certified Information Systems Security Professional)
- CEH (Certified Ethical Hacker)
- HCISPP (Health Care Information Security and Privacy Practitioner)
Education Requirements
Bachelor’s Degree in Computer Science, Information Technology, or similar
Skills required
Penetration Testing
Information Security
Firewalls
Anti Malware
Anti Virus
Intrusion Prevention Systems
Intrusion Detection and Prevention
Risk Assessment
Disaster Recovery
Incident Management
System Administration
Cybersecurity
Framework Design
IT Security
SoC
IT Infrastructure
Training Courses for Information Security Analyst

Certified Ethical Hacker (CEH)
The Certified Ethical Hacker (CEH) is a core training program for an information security professional, also referred to as a white-hat hacker, who systematically attempts to inspect network infrastructure with the consent of its owner to find security vulnerabilities which a malicious hacker could potentially exploit. The course helps you assess the security posture of an organization by identifying vulnerabilities in the network and system infrastructure to determine if unauthorized access is possible. The Certified Ethical Hacker program is the most comprehensive Ethical Hacking program in the world. It is the first of three courses within our Vulnerability Assessment and Penetration Testing (VAPT) track. The goal of this hacking course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with ethical hacking skills that are highly in demand. This course prepares you for EC-Council Certified Ethical Hacker course exam 312-50.

Certified Network Defender (CND)
Certified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on a job-task analysis and cybersecurity education framework presented by the National Initiative of Cybersecurity Education (NICE). The network security training course has also been mapped to global job roles and responsibilities and the Department of Defense (DoD) job roles for system/network administrators. The course is designed and developed after extensive market research and surveys.

CompTIA CASP+
CompTIA Advanced Security Practitioner (CASP+) is the ideal certification for those technical professionals who wish to remain immersed in technology as opposed to managing cybersecurity policy and frameworks.

CompTIA Network+
CompTIA Network+ verifies that you have the essential knowledge and skills in networking to develop a career in IT infrastructure.

CompTIA Security+
CompTIA Security+ is an international, vendor-neutral certification that validates the baseline skills necessary to perform core security functions and pursue an IT security career.