Career Research Paper Example.

Published on June 2016 | Categories: Types, Presentations | Downloads: 62 | Comments: 0 | Views: 269
of 5
Download PDF   Embed   Report

This is a career research paper. This paper is an example of a career research paper. It is REALLY AWESOME. READ THIS IT IS LIKE JESUS> IT WILL SAVE YOU

Comments

Content

Avid 2 Career Research
By: Kevin Yang
When I graduate high school and college, I believe that I would like to be an
Information Security Analyst. I think everyone should have secure networks safe from
cybercriminals and hackers. I want to also take advantage and be a part of the 37%
estimated growth in the amount of jobs available and the insuppressible and gradual
rise in technological usage; this will make it easier to find jobs. With this rise in the
computer usage, I believe more people and companies will need analysts to protect
their networks and systems which is another reason I would like to be an analyst.
Personally, I've always enjoyed playing with computers and want to learn more about
the ins and outs of computer programming. This is what an analyst is and everything
you need to know to become an analyst.
Information security analysts plan and carry out security measures to protect an
organization's computer networks and systems. With the continual expanding number of
cyber-attacks, the need for these analysts are rising. Their main functions are
monitoring their employer's network for security breaches and investigate a violation
when one occurs, developing security standards and procedures, and conducting
simulated attacks on the server to look for vulnerabilities before they are exploited.
Security analyst usually work for computer companies, consulting firms, and
financial companies. The industries that employed the most information security
analysts in 2012 were: computer systems design (27%), finance and insurance (19%),
information (10%), and management of companies and enterprises (8%). Analysts work
in groups with other analysts and administrators and spend most of their time in offices

and cubicles. Most analysts work full time and always have to be prepared to be called
back due to a security breach or emergency at their organization.
The median annual wage for information security analysts was $86,170 in May
2012. The median wage is the wage at which half the workers in an occupation earned
more than and half earned less. The lowest 10 percent earned less than $49,960, and
the top 10 percent earned more than $135,600. In May 2012, the median annual wages
for information security analysts in the top four industries in which these analysts
worked were: for finance and insurance: $92,080, information: $91,440, computer
systems design and related services: $88,270, and management of companies and
enterprises: $81,130.
Getting a job will be exponentially easier by 2022. Like I said before, the
projected growth according to the Occupational Outlook Handbook is said to be a 37%
increase in analysts. This is due to the growing population and the need of electronic
databases, the federal governments need for safeguards so another incident like the
NSA's won't occur, and for healthcare providers and many organizations that have a
non-disclosure agreement with their patients and employees.
To be an analyst, the individual has to have at least a bachelor’s degree in
programming, computer science, or something closely related. It is also recommended
that they have some hands-on experience in the field and many schools have
information security programs which may help prospective analysts. In high school,
classes such as, C++ Programming, computer science and Computer Literacy can help
you fulfill the well roundedness of the programmer’s knowledge of computers. This

directly helps you achieve your goal by letting you create a more comfortable resume to
give to your employer; stating that you started early, undoubtingly had experience, and
know what you’re doing. If the individual can, make sure to take up chances for an
internship in the field, because past experience is a big deal to employers. It is best not
to specialize in a certain area of computer security and be well-rounded so you can face
a wider range of problems, but some employ analyst specifically with certification in
penetration testing or systems auditing. It is required to have a certificate stating that
one is a Certified information Systems Security Professional or something very close.
As a side note, applicants usually take classes in business to gain better intel in the
field.
Top colleges to attend for this career include the Johns Hopkins University in
Baltimore, Maryland, the Nova Southeastern University in Fort Lauderdale, Florida, and
the George Mason University in Fairfax, Virginia. The Johns Hopkins University was
ranked #13 on the overall list of best national universities and offers a Master of Science
in Security Informatics degree program. At the undergraduate level, students can enroll
in computer science programs to learn about computer security and prepare them for
graduate-level study in information security. In the Nova Southeastern University, The
same Master's degree is offered, but is special for giving you certificates for the general
education in information security. Finally, the George Mason College is special in two
ways: one way is that the schools Center for Secure Information systems was the first
ever created and two for being in my home state of Virginia!

Information Security Analysts are important to the well-being of the nation. They
ensure a secure cyber environment and are the "network police". I look forward to all
the hard work that will come by keeping the corporation I work for safe!

Works Cited
Education Portal. Education Portal. 2003. 26 January 2015. <http://educationportal.com/articles/List_of_Top_Information_Security_Schools_and_Colleges_in_
the_US.html>.
Spencer, Joshua. Joshua Spencer Information Security Analyst. 18 April 2013. 27
January 2015. <http://www.dfwinfosec.com/i/top-15-information-securityinterview-questions/>.
United States Department Of Labor. U.S. Bureau of Labor Statistics. 8 January 2014. 27
January 2015. <http://www.bls.gov/ooh/computer-and-informationtechnology/information-security-analysts.htm#tab-4>.

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close