ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Security Analyst: Rising to the Challenge

Updated on May 2, 2016


Security is of utmost importance and often it requires quick thinking and foresight on the part of security professionals, as fast evolving technologies also bring with it newer threats that need to be addressed immediately.

A security breach can have far reaching effects, especially in business environment, as there is a lot of sensitive data at stake. It goes without saying, therefore, that a lot of money and effort is invested to ensure up-to-date secure environments. Ensuring this is the job of a security professional, who has to iron out flaws, recommend changes, ensure network security, prevent external threats, etc. It's a challenging profile and highly sought after.

What are the career avenues that can be explored in the security arena ?

Within information security, the person could become a security analyst and help conduct penetration tests, vulnerability assessments, source code reviews, or security audits. He/she could also explore the exciting field of compliance As you progress in this field, you can become a security architect and help design secured network architectures. Other opportunities exist in terms of information security management and eventually growing to the position of a Chief Information Security Officer (CISO). A good information security professional should have a thirst for knowledge, be able to grasp new concepts quickly, work hard on their own, and have a great love for technology.

What is the difference between a ethical hacker and a security analyst ?

A Security Analyst is a person with broader responsibilities, such as:

  1. Analyzing the security of the organization from external hackers by trying to hack from the Internet.
  2. Analyzing the security of the organization from internal threats by trying to hack the network.
  3. Analyzing the network architecture of the organization.
  4. Analyzing configurations of various systems and firewalls.
  5. Analyzing Web application security.
  6. Analyzing processes in addition to the above technology elements.

Points 3 to 6 would be not usually covered withing an ethical hacker's scope of work. Secondly, the definitions are not very clear. So these are mine, but someone else's might be different. Another way to look at it is that no one would carry "Ethical Hacker" on their visiting cards, so when ethical hackers enter the corporate world, they become security analysts.

What are the growth prospects like ?

Information security is a booming field within IT, and with increasing regulations, the job opportunities are vast! Salaries for information security professionals are at least 20-30% higher than for most other positions at the same level in other fields og IT. A fresher in this field can take up the role of a security analyst, and expect a salary anywhere between Rs 25,000 and Rs 30,000 based on his aptitude and skills.

What are the challenges involved ?

Security is all about evangelism to get people to change their behavior, and this is not easy at all. In addition to this, there is a plethora of new technologies that people are now using so frequently - cloud, mobile apps, social networks, etc. All of these add to the security professionals' set of challenges, as he/she has to ensure the companies are able to use these technologies and yet not compromise on security.

What are the different parameters to be taken into consideration ?

The three typical aspects of security are - people, process and technology. Each of these three pillars has to function effectively for security to actually work. People have to be constantly trained and encouraged to follow due processes. Strong processes have to be outlined to address key technology risks. The right technology solutions have to be deployed to ensure protection from viruses, worms, internal data leakage, external hackers, etc.

What are the skills required to establish a career in this field ?

The key criteria for establishing a career in this field include thirst for knowledge i.e. not restricting yourself only to one field, but rather aiming to learn about security across a wide variety of systems and technologies, ability to think out of the box, use creative approaches to test systems, having a problem-solving mindset, and good communication skills. The person should be able to focus on finding solutions to challenges rather than getting bogged down by problems. Communication skills are also equally important, as there's no point doing a great assessment and then not being able to communicate the issues through well-written reports. Finally, security is about assurance, and if that assurance cannot be provided through strong communication, then the main goal is not being achieved.


    0 of 8192 characters used
    Post Comment

    No comments yet.


    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at:

    Show Details
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the or domains, for performance and efficiency reasons. (Privacy Policy)
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)