Information security analyst
IT security co-ordinators protect their clients’ data from unauthorised access, theft and misuse.
Salary Range: £35,000 to £60,000
How to become an IT security co-ordinator
You can get into this job through:
- a university course
- an apprenticeship
- working towards this role
You could do a foundation degree, degree or postgraduate award in:
- information systems
- project management
- business management
You’ll usually need:
- at least 1 A level, or equivalent, for a foundation degree
- 2 to 3 A levels, or equivalent, for a degree
- a degree in a relevant subject for postgraduate study
- equivalent entry requirements
- student finance for fees and living costs
- university courses and entry requirements
You could do a cyber security technologist or cyber intrusion higher apprenticeship, or a cyber security technical professional degree apprenticeship.
You’ll usually need:
- 4 or 5 GCSEs at grades 9 to 4 (A* to C) and A levels, or equivalent, for a higher or degree apprenticeship
You could start work as an IT support technician after GCSEs or A levels and train on the job for further qualifications.
You could apply directly to work as an IT security co-ordinator if you’ve got several years’ experience in IT management, network engineering or cyber intelligence.
Professional and industry bodies
You could join the Chartered Institute of Information Security for professional development opportunities.
What it takes
Skills and knowledge
- analytical thinking skills
- the ability to use your initiative
- the ability to accept criticism and work well under pressure
- broadcasting and telecommunications knowledge
- to be thorough and pay attention to detail
- excellent verbal communication skills
- complex problem-solving skills
- excellent written communication skills
- to have a thorough understanding of computer systems and applications
Restrictions and requirements
You’ll need to:
What you’ll do
In this role you could be:
- assessing risks to systems, and developing plans to minimise potential threats
- designing new security systems or upgrading existing ones
- testing and evaluating security products
- planning for disaster recovery in the event of security breaches
- simulating security breaches (penetration testing)
- using ethical hacking methods to find security flaws
- investigating breaches and carrying out corrective action
- making sure procedures meet network security standards
- preparing reports and technical documentation for managers and users
You could work at a client’s business or in an office.
Career path and progression
With experience you could move into network management, IT project management or security consultancy.
You could work for the police, security services or specialist law firms, carrying out forensic investigation of computer-based crimes.