Statements (51)
Predicate | Object |
---|---|
gptkbp:instanceOf |
occupation
|
gptkbp:abilities |
gptkb:communication
network security risk assessment incident response malware analysis security auditing report writing |
gptkbp:certificationRequirement |
gptkb:CompTIA_Security+
Certified Ethical Hacker (CEH) Certified Information Security Manager (CISM) Certified Information Systems Security Professional (CISSP) |
gptkbp:eligibility |
bachelor's degree in computer science
bachelor's degree in information technology bachelor's degree in cybersecurity |
gptkbp:employer |
gptkb:government_agency
corporations healthcare organizations financial institutions IT service providers |
gptkbp:field |
cybersecurity
information security |
https://www.w3.org/2000/01/rdf-schema#label |
Security Analyst
|
gptkbp:industry |
gptkb:government
gptkb:technology finance healthcare retail |
gptkbp:jobOutlook |
growing
|
gptkbp:officeLocation |
gptkb:security
office remote |
gptkbp:relatedTo |
network administrator
security engineer chief information security officer penetration tester |
gptkbp:responsibility |
monitoring security systems
responding to incidents implementing security measures analyzing security breaches conducting vulnerability assessments creating security policies training staff on security protocols |
gptkbp:salary |
$60,000 - $120,000 (US, typical)
|
gptkbp:uses |
gptkb:security
firewalls intrusion detection systems SIEM systems vulnerability scanners |
gptkbp:bfsParent |
gptkb:Security_Technical_Specialists
|
gptkbp:bfsLayer |
7
|