1 00:00:01,520 --> 00:00:07,520 Now, let's talk about the next security rule that is information security analyst. 2 00:00:08,590 --> 00:00:14,090 Security analysts monitor, prevent and stop the attacks on private data. 3 00:00:14,770 --> 00:00:21,610 These digital professionals create and implement firewalls and software systems to protect the data 4 00:00:21,610 --> 00:00:28,810 and the network infrastructure as the world increasingly relies on technology and digital interfaces 5 00:00:28,810 --> 00:00:35,710 to store and share the information, security analysts are at very high demand in the industry. 6 00:00:36,580 --> 00:00:43,540 Security analysts may work in the public sector as freelance consultants are for business and corporations, 7 00:00:44,170 --> 00:00:48,940 not typically these professionals who like least a bachelor's degree in the respective field. 8 00:00:48,960 --> 00:00:57,300 But however, some employers seek analysts having advanced knowledge over their educational background. 9 00:00:57,850 --> 00:01:04,540 According to the Bureau of Labor Statistics, that is the VLS information security analysts earn a median 10 00:01:04,540 --> 00:01:07,930 salary of around ninety nine thousand dollars in the US. 11 00:01:08,470 --> 00:01:10,750 Again, the number is subject to change. 12 00:01:12,070 --> 00:01:15,630 So what exactly does a security analyst do? 13 00:01:15,640 --> 00:01:21,280 We have seen about penetration tester, but not exactly a security analyst does. 14 00:01:22,210 --> 00:01:26,650 As a job title implies, security serves as a security analyst. 15 00:01:26,650 --> 00:01:27,470 Primary goal. 16 00:01:28,030 --> 00:01:34,660 Now these analysts aim to identify the weaknesses in network security systems, patch or respond to 17 00:01:34,660 --> 00:01:37,670 issues and prevent future breaches from occurring. 18 00:01:38,590 --> 00:01:45,400 Now they may use various software, including programs designed to encrypt and protect data to increase 19 00:01:45,520 --> 00:01:47,900 and strengthen the data of digital data. 20 00:01:48,910 --> 00:01:56,110 So the basic difference between a security analyst and a penetration tester is that security analysts 21 00:01:56,110 --> 00:01:59,770 do not carry out proper penetration tests. 22 00:01:59,800 --> 00:02:02,050 They may identify the flaw in the system. 23 00:02:02,050 --> 00:02:08,200 But again, if there is a vulnerability, they try to fix the vulnerability on their own without actually 24 00:02:08,200 --> 00:02:09,430 testing properly. 25 00:02:09,850 --> 00:02:16,180 So they may hand out the vulnerability to a penetration tester who may seek to exploit and confirm. 26 00:02:17,230 --> 00:02:23,230 Now, security analysts may take on a new role as they advance within the field, for example, entry 27 00:02:23,230 --> 00:02:30,520 level security analysts may assume lower level roles and it seems helping the new users to navigate 28 00:02:30,520 --> 00:02:32,470 the systems and installing new software. 29 00:02:33,340 --> 00:02:40,090 More experienced analysts may design and implement the entire security systems and firewalls overseeing 30 00:02:40,090 --> 00:02:42,850 the teams of security and I.T. professionals. 31 00:02:43,810 --> 00:02:47,920 So what are the skills that security analysts need? 32 00:02:48,910 --> 00:02:49,870 Networking? 33 00:02:50,020 --> 00:02:50,650 Yes. 34 00:02:51,100 --> 00:02:57,160 Again, security analysts need expertise in diverse systems and the networks. 35 00:02:57,850 --> 00:03:05,500 They need a broad knowledge of various elements of network systems, along with how each element can 36 00:03:05,500 --> 00:03:06,850 impact security. 37 00:03:08,670 --> 00:03:15,090 Programming and scripting language, yes, a working knowledge of computer scripts like, let's say 38 00:03:15,090 --> 00:03:20,850 Java, Python, C++ is the strong arm of security analysts. 39 00:03:21,450 --> 00:03:27,630 This knowledge allows the professionals to understand the encoded threats and write and rewrite software 40 00:03:27,630 --> 00:03:28,350 programs. 41 00:03:29,730 --> 00:03:36,210 So security analysts must understand the hacking process to block and prevent the cyber attacks because 42 00:03:36,210 --> 00:03:42,450 ethical hacking certifications help these analysts in preparing and understanding the threats to protect 43 00:03:42,450 --> 00:03:43,200 the systems. 44 00:03:44,450 --> 00:03:51,770 Next is command and operating systems analysts must be able to work on all types of oils and platforms, 45 00:03:51,770 --> 00:03:58,770 including iOS, Windows and Linux, critical thinking is very important. 46 00:03:59,270 --> 00:04:06,020 Now, security alerts must possess strong critical thinking skills to work through complex coding and 47 00:04:06,020 --> 00:04:07,820 software troubleshooting issues. 48 00:04:08,600 --> 00:04:15,320 Communication is very important because when you are working in technology, it requires both verbal 49 00:04:15,320 --> 00:04:22,220 and written communication skills and security analysts must be able to clearly explain their work to 50 00:04:22,220 --> 00:04:24,430 people without tech backgrounds. 51 00:04:24,440 --> 00:04:31,930 As I said, as I gave you the example of a CEO and or the upper management and a brain tester, a tester 52 00:04:31,940 --> 00:04:36,720 must be able to explain what exactly he or she has found out in the software. 53 00:04:37,520 --> 00:04:41,390 And lastly, report writing and hacking knowledge again. 54 00:04:41,390 --> 00:04:44,330 Yop investors and analysts are in common. 55 00:04:44,330 --> 00:04:46,880 They do write report that is very strong. 56 00:04:46,880 --> 00:04:51,770 Written communication and hacking knowledge is also very important. 57 00:04:53,180 --> 00:05:01,940 So what are the main responsibilities of analysts is to monitor the networks, to manage the software, 58 00:05:02,600 --> 00:05:03,370 to report. 59 00:05:03,380 --> 00:05:08,540 Now analysts may compile ongoing reports about the safety of the networks they work on. 60 00:05:08,930 --> 00:05:16,240 These reports often document the security issues along with the measures the analysts are taken in response. 61 00:05:17,120 --> 00:05:24,050 Analysts also aid in development of the security plans for the organization and finally, the contribute 62 00:05:24,050 --> 00:05:30,980 towards the research in the new trends and advances in security and information technology to stay updated 63 00:05:30,980 --> 00:05:32,270 on the latest software. 64 00:05:32,900 --> 00:05:36,430 So this is the overall role of information security analysts. 65 00:05:36,440 --> 00:05:40,850 I hope it was pretty clear between the protesters and security analysts. 66 00:05:41,330 --> 00:05:47,020 You may say that 70 percent of the rule is same, but again, it's just a job title. 67 00:05:47,030 --> 00:05:55,280 You must have a strong understanding of networks, programming and scripting, operating system, verbal 68 00:05:55,280 --> 00:06:02,310 and written communication and report writing along with desire to learn more in the next lecture. 69 00:06:02,510 --> 00:06:08,880 We will talk about the role of information security in order to keep the momentum going. 70 00:06:08,900 --> 00:06:11,230 I will see you in the next lecture.