Page 17 - Cybersecurity Career Guide for North Dakota
P. 17

 ANALYZE
Review and evaluate incoming cybersecurity information to determine its usefulness for intelligence.
WHAT THEY DO
n Identifyandassessthecapabilities and activities of cyber criminals or foreign entities
n Produce findings to help initialize or support law enforcement and counterintelligence investigations or activities
n Analyze threat information from multiple sources, disciplines, and agencies across the intelligence community
JOB TITLE EXAMPLES
Cyber Threat Analyst
Cyber Counterintelligence Analyst Cryptanalysis and Signals Analyst Security Analyst
ADVANCED DEGREE OR TRAINING
Computer Science Criminal Justice Forensics
Information Technology Engineering
Law
COLLECT and OPERATE
Collect, process, analyze, and present information from adversaries that may be used to develop intelligence and counterintelligence.
WHAT THEY DO
n Collect intelligence, and interpret and analyze information n Discover and mitigate criminal and adversarial threats
JOB TITLE EXAMPLES
Cyber Analyst
Intelligence Analyst Information Systems Manager Security Software Developer
ADVANCED DEGREE OR TRAINING
Cybersecurity
Computer Science or Engineering IT or Network Security
INVESTIGATE
Investigate, review, and evaluate cyber events and cyber crimes.
WHAT THEY DO
n Investigate cyber crimes
n Recover data from computers to use in prosecuting crimes, analyzing
and decrypting any type of hidden information
n Identify and assess cyber criminals or foreign entities
n Help law enforcement and counterintelligence investigations
JOB TITLE EXAMPLES
Forensic Computer Analyst Cryptographer
Cyber Intelligence Analyst Security Analyst
DEGREE OR TRAINING
Cybersecurity Computer Science Network Security Information Assurance Forensic Science
IT and Security
START-ENGINEERING.COM 17





























































   15   16   17   18   19