Information analyst serp_jobs.h1.location_city
serp_jobs.job_alerts.create_a_job
Information analyst • dallas tx
- serp_jobs.job_card.promoted
Information Security Analyst
TradeJobsWorkForce75373 Dallas, TX, USInformation Technology - Data Analyst
The Fountain GroupRemote, TX- serp_jobs.job_card.promoted
Information Systems Technician
NavyDallas, TX, United StatesInformation Security Tech Lead Analyst
CitiIrving, Texas, United StatesInformation Security & Compliance Analyst
ArcosaDallas, TX null, USInformation Systems Analyst (I / II / III / IV)
Allen ISDInformation Servicestutor - Information Technology
BUKIDallas, TX, USLead Information Security Analyst
Triumph FinancialDallas, TX, US- serp_jobs.job_card.promoted
Information Management Analyst
Bank of AmericaDallas, TX, USSoftware Engineer
Lp AnalystDallas, Texas, United States- serp_jobs.job_card.promoted
Application System Analyst II-Converge Information Services TX
Christus HealthDallas, Texas, US- serp_jobs.job_card.promoted
Information Professional
US NavyDallas, Texas, USInformation Security Engineer
Isn Software CorporationDallas, Texas, United States- serp_jobs.job_card.promoted
Information Security Engineer
TTECDallas, TX, US- serp_jobs.job_card.promoted
Information Security Analyst
VirtualVocationsIrving, Texas, United StatesInformation Security Analyst
AppFolio, IncDallas, TexasInformation Technology_USA - USA_Analyst
HG SolutionsDallas, TX, United States- serp_jobs.job_card.promoted
Application System Analyst II-Converge Information Services
CHRISTUS HealthIrving, Texas, US- serp_jobs.job_card.promoted
Private Equity Data Operations Analyst
LP AnalystDallas, TX, USInformation Security Analyst
TradeJobsWorkForce75373 Dallas, TX, US- serp_jobs.job_card.full_time
Monitor their organization’s networks for security breaches and investigate a violation when one occurs
Install and use software, such as firewalls and data encryption programs, to protect sensitive information
Prepare reports that document security breaches and the extent of the damage caused by the breaches
Conduct penetration testing, which is when analysts simulate attacks to look for vulnerabilities in their systems before they can be exploited
Research the latest information technology (IT) security trends
Develop security standards and best practices for their organization
Recommend security enhancements to management or senior IT staff
Help computer users when they need to install or learn about new security products and procedures