Cyber Security Policy Analysts Kiera Drew, Ava Valentine, & Evan Valentine
Introduction During our meeting, we learned many things like how to make a Local Area Network (LAN). We also learned how to build a firewall, which is a barrier that prevents hackers from getting into your network and stealing personal information such as passwords that could give hackers access to your bank account.
Short narrative We chose Cyberspace Policy Analysts as a career field topic because, we love technology, it sounded interesting and we wanted to learn more! Companies like Target, JPMorgan Chase, Sony, as well as small businesses have all been the target of hackers. This makes Cyberspace Policy Analysts a desirable field of work.
Day to day responsibilities Microsoft and Google, and search engines like Chrome, Firefox and Internet Explorer use Cyber Security Policy Analysts to protect their websites from bad hackers so that they can execute transactions safely and without errors. On a daily basis, Cyber Security Policy Analysts, could be involved in policy and configuration decisions, virus scanning, monitoring strategies, detection and reaction.
Salaries Independent consultants make about $114,452; government contractors make about $99,339; government employees make about $86,218; military (Active Duty or Reservist) make about $69,508; and private business owners make about $78,476 according to clearancejobs.com.
Necessary training Bachelor of Science degree & 5 years of Cyber Security experience or 7 years if no BS degree. Technical auditing and cyber systems security engineering work. Ability to obtain and maintain a “Secret” or “Top Secret” clearance. ISC2 Certified Information System Security Professional (CISSP) or ISACA Certified Information Systems Auditor (CISA).
Why it is important Hacking is a serious problem and Analysts keep the public safe. Cybercrime and cyber espionage cost the US economy $100bn a year. Cyber-attacks cost the global economy about $300bn annually 1. 1. .
Other important information Some aspects of this project we really enjoyed were learning how to code! Coding teaches you how to program—and programing teaches you how to hack. As Good hackers, we learned how to defend against viruses in funs ways using video games and apps. We also LOVE Math!
References [A. D’Amico, K. Whitley]. [2008]. [The Real Work of Computer Network Defense Analysts]. [https://link.springer.com/chapter/10.1007/978-3-540-78243-8_2#page-1]. [4/14/2017] [Knapp, Kenneth; Boulton, William]. [2006]. [Cyber-warfare Threatens Corporations: Expansion into Commercial Environments]. [http://www.infosectoday.com/Articles/cyberwarfare.pdf]. [4/14/2017] [Department of Labor, Licensing and Regulation]. [2017]. [Local Area Unemployment Statistics (LAUS) - Workforce Information & Performance]. [https://www.dllr.state.md.us/lmi/laus/]. [4/14/2017] [Glassdoor]. [2017]. [Cyber Security Program and Policy Analyst]. [https://www.glassdoor.com/Job/cyber- policy-analyst-jobs-SRCH_KO0,20.htm]. [4/14/2017] [Clearancejobs.com]. [2017]. [Security Clearance Compensation Survey]. [https://about.clearancejobs.com/salary/security-clearance-compensation-survey]. [4/14/2017]
References [A. D’Amico, K. Whitley]. [2008]. [The Real Work of Computer Network Defense Analysts]. [https://link.springer.com/chapter/10.1007/978-3-540-78243-8_2#page-1]. [4/14/2017] [Knapp, Kenneth; Boulton, William]. [2006]. [Cyber-warfare Threatens Corporations: Expansion into Commercial Environments]. [http://www.infosectoday.com/Articles/cyberwarfare.pdf]. [4/14/2017] [Department of Labor, Licensing and Regulation]. [2017]. [Local Area Unemployment Statistics (LAUS) - Workforce Information & Performance]. [https://www.dllr.state.md.us/lmi/laus/]. [4/14/2017] [Glassdoor]. [2017]. [Cyber Security Program and Policy Analyst]. [https://www.glassdoor.com/Job/cyber- policy-analyst-jobs-SRCH_KO0,20.htm]. [4/14/2017] [Clearancejobs.com]. [2017]. [Security Clearance Compensation Survey]. [https://about.clearancejobs.com/salary/security-clearance-compensation-survey]. [4/14/2017]