Presentation is loading. Please wait.

Presentation is loading. Please wait.

 Monitor their organization’s networks for security breaches and investigate a violation when one occurs  Install and use software, such as firewalls.

Similar presentations


Presentation on theme: " Monitor their organization’s networks for security breaches and investigate a violation when one occurs  Install and use software, such as firewalls."— Presentation transcript:

1

2

3  Monitor their organization’s networks for security breaches and investigate a violation when one occurs  Install and use software, such as firewalls and data encryption programs, to protect sensitive information  Recommend security enhancements to management or senior IT staff  Research the latest information technology (IT) security trends  Prepare reports that document security breaches and the extent of the damage caused by the breaches

4 Physical: Typing Mental: Mathematics and coding Indoors: Internet and power access is indoors Hours: Mostly full time; often on call outside of business hours Conditions: Company office place

5  a bachelor’s degree in computer science, programming, or a related field  College: ITT Technical Institutes  Classes to take: 656X Computer Technology II TC 10-12 / 1 Tri 606X Intro to Bus Tech TC 10-12 / 1 Tri

6  Employment rate: rise 37%  Find a job in: Ann Arbor, Michigan  Business place: Nowhere in particular

7  Median salary: $86,170 a year  Lifestyle goal #1: Live in a two story house; about $185,000(-)  Lifestyle goal #2: Drive a 2014 Chevrolet Corvette Stingray; from $53,000 (+)  Lifestyle goal #3: Give to charity: At least $25,000(+)

8  Responsibilities: Research emerging technologies to decide if installing them can increase the organization’s efficiency and effectiveness. Conduct testing to ensure that the systems work as expected  Where: Nowhere in particular, prefer staying in Michigan  Hours: Most systems analysts work full time. About a quarter worked more than 40 hours per week in 2012.  Why I chose this: It is very similar to Information Security Analyst

9 I still think that I would love to have this career after all the research I’ve conducted today. I’ve always loved computers and that’s not going to stop because this career has some complications. Multiple years of schooling and student loans are going to be very troublesome, but it would all be worth it. One thing I look forward to is working with computers daily and the excessive pay. One thing I am not looking forward to is the full time hours and not being able to see my family some days. Overall I’ve learned that computers are a big part of our generation’s lifestyle and the people who help run them are essential to technology.

10 http://www.quotegarden.com/computers.html http://www.bls.gov/ooh/computer-and-information-technology/information- security-analysts.htm http://www.bls.gov/ooh/computer-and-information-technology/computer-systems- analysts.htm


Download ppt " Monitor their organization’s networks for security breaches and investigate a violation when one occurs  Install and use software, such as firewalls."

Similar presentations


Ads by Google