Most modern companies house large amounts of secure and sensitive data. This data can be customer data, such as names, billing information, and even credit card information, and can also take the form of sensitive proprietary information, including analytics, software, and sales and marketing tools. A data security analyst is typically employed within the information technology (IT) sector of a company to study the way the business stores data, as well as the security programs which protect it and how it may be accessed and by whom. These analysts also make recommendations to IT managers and IT security teams within the company to help eliminate potential risks to data security.
Most stored data is housed on "cloud servers" which allow multiple individuals in separate locations to easily access the information. Data security analysts help determine what data can feasibly be stored in these vulnerable locations, and their analyses are typically used to create protocols which separate data by sensitivity so the most secure information is only stored where designated individuals or program processes can access it. They also create reports and logs of potential vulnerabilities and corrective solutions for IT security employees to use.
Data security analysts also look for possible external vectors which may breach the company's security. This can include assessing vulnerabilities from a variety of online attacks or malware approaches, as well as data access rules for departments and managers within the company. They may also analyze access footprints to determine who accesses data and the times and places where that information was engaged.
Aspiring data security analysts should have a technical schooling background or university education in IT security. Most in this position must also have a strong understanding of programming and network operations, and these analysts typically work in an office environment during daytime hours.
Data Security Analyst Tasks
Build core data center network devices and integrate.
Troubleshoot and work with providers and customers.
Respond to network and security escalations from other departments.
Build firewalls and switches for new remote nodes.
Track performance of network devices and Identify and resolve issues.