Live Chat Now
Available
Give us a call

Send us a text

855.890.3001

855.890.3001

How to Become a Cyber Security Analyst

By DeVry University

The information presented here is true and accurate as of the date of publication. DeVry’s programmatic offerings and their accreditations are subject to change. Please refer to the current academic catalog for details.
 

December 13, 2021

10 min read

Becoming a cyber security analyst takes time and hard work but can be an achievable goal with the right action plan. As you work toward preparing to pursue a career as a cyber security analyst, you'll need to develop your understanding of information systems and networks while remaining up to date on the latest cyber security practices.

 

While there’s no single pathway toward becoming a cyber security analyst, those looking to pursue this career should have a diverse skill set, a strong grasp of cyber security principles and relevant credentials that validate their capabilities.

 

In this article, we'll help you learn how to become a cyber security analyst by answering a few questions about the profession itself. You'll learn what cyber security analysts are, what they do and how to become one as we explore the following sections:

 

What is a Cyber Security Analyst?

A cyber security analyst is an information technology and cyber security professional who uses a wide variety of processes and technologies to safeguard private data and networks from threats. They are responsible for monitoring and responding to security risks and are in charge of selecting and deploying the technologies that will be used to protect the IT infrastructure at a company. In many cases, they also work with other IT staff to develop best practices and processes that will be used by every member of a company to protect infrastructure and data from being accessed or tampered with by cyber criminals.

What Does a Cyber Security Analyst Do?

A cyber security analyst’s role is constantly evolving and typically involves a wide range of responsibilities. But exactly what does a cyber security analyst do? While tasks may vary based on your position and the type and size of your employer organization, here are some general tasks you might perform:
 

Review security systems

Analyzing security systems is one of the primary responsibilities of a cyber security analyst. To do this, they employ a variety of skills such as penetration testing and running security audits. These audits can help them determine who has access to various levels of a network and whether or not their clearance matches their responsibilities. While completing the audit, they also write up reports that communicate their findings and recommend measures to increase or improve security.
 

Set security protocols

After analyzing a company’s security systems, a cyber security analyst works on building security protocols. These protocols may include adding firewalls and encryption methods to certain portions of a network or database. They may also include setting up processes for accessing and transferring sensitive data safely.

Configure security tools

Cyber security analysts use a variety of tools to keep an organization’s networks safe. They determine whether or not the company will use a VPN and what encryption programs to install, should they be necessary. They also determine what or who can or cannot pass through these barriers.

Petition for security software and hardware upgrades

In the event that their analysis shows a weakness that cannot be fixed with their existing tools, a cyber security analyst will have to petition for upgrades. Upgrading the software and their protocols helps prevent data breaches or upgrading to more effective security software programs.

Investigate security incidents

In the event of a security breach, a cyber security analyst investigates what, how and why it happened in order to construct countermeasures that will prevent similar incidents in the future.

What Skills Does a Cyber Security Analyst Need?

To become a cyber security analyst, you should acquire and sharpen a variety of IT and technological skills, networking being the first among them. Some useful cyber security analyst skills may include:
 

Familiarity with small enterprise networks

Many businesses use small enterprise networks to maintain their day-to-day communications. Cyber security analysts need to understand how these computer networks work when bolstering network security.

Firewalls

Being a cyber security analyst means being comfortable with a wide range of technologies, and firewalls are among the most important. Strong comprehension of how firewalls work and how to tactically deploy them across a network is important for anyone who wants to become a cyber security analyst.

Programming

Having at least a working knowledge of how to code can be a beneficial skill as a cyber security analyst, as you’ll need to be able to look at code and determine whether or not it’s secure or if someone is using programming languages maliciously.
 

Software application knowledge

Another aspect of a cyber security analyst's job involves selecting the correct software to protect their network. Having a firm grasp on the functionality of different software applications is crucial to performing the duties of this profession.
 

Research capabilities

As a technology professional, you'll need to remain aware of the ever-shifting landscape of your field. Being able to do research and quickly evaluate information is essential.
 

Communication skills

A big part of being a cyber security analyst is developing new best practices and communicating them to coworkers and employees. You may also have to regularly speak to higher-ups in order to communicate why certain security protocols have to be changed or technologies need to be updated.
 

Attention to detail

While attention to detail is useful in just about any profession, it's vital in the world of cyber security. This soft skill can help you better identify threats and breaches in your security. It's also helpful for pinpointing and resolving areas of weakness in your own work.
 

The ability to learn quickly

The world of technology moves fast. Cyber professionals need to be able to stay up to speed with emerging tech, new developments in security, understand evolving cyberthreats and be able to respond swiftly.

Security planning, auditing and penetration testing

Cyber security analysts need to know how to evaluate existing security measures, identify potential vulnerabilities and security issues, and know how to strengthen and improve their defense capabilities against the constant threat of cyberattacks. One way to effectively test a systems’ defenses is to launch an attack. Penetration testing is one method where an internal cyber security utilizes a simulated attack to sus out where there may be gaps in their security systems.

Digital device competency

While it’s unlikely that you’ll be familiar with every type of device, as a cyber security analyst you should be able to understand the basic characteristics of a range of devices, how they’re built and how they work with other devices.

OS architecture and design

An operating system (OS) allows all computers to function. A cyber security analyst understands what could impact these systems and how to correct any issues should an operating system be jeopardized.

Ethical hacking

Ethical hacking is attempting to break into a network in order to test the strength of a security system. Cyber security analysts use this skill, mimicking the tactics of a malicious hacker, to identify and correct any vulnerabilities in security plans.

Systems administration

A cyber security analyst also needs to know how to set and approve system permissions so that only authorized employees have access to it.

Digital literacy

All cyber security analysts need to be familiar with how the internet, digital devices and modern communication methods work together.

How to Become a Cyber Security Analyst

While it’s important to restate that there is no single way to become a cyber security analyst, as the field becomes more established, more pathways into the profession may emerge. This is one pathway that you can follow as you prepare to pursue a career as a cyber security analyst or other cyber security professional:
 

1. Earn a degree or certificate

Typically, the path to becoming a cyber security analyst begins with earning a degree or certificate in the field. An undergraduate certificate in cyber security is a great way to dip your toes into the world of cyber security without making a commitment to a full associate or bachelor’s degree program.

That said, employers may look for cyber security education that includes a bachelor’s degree in the field, such as a bachelor’s degree with a cyber security specialization, depending on the company and the position itself. A bachelor's degree can help show employers that you're serious about this career path and have taken the time to develop your skills.
 

2. Pursue basic cyber security certifications

As the cyber security field evolves to keep pace with new threats presented by cybercriminals, individuals looking to grow in this field are encouraged to earn relevant credentials and certifications. 

Courses within DeVry’s cyber security programs may help you prepare to pursue industry-relevant cyber security certifications like:

  • CompTIA LINUX+: Designed for professionals that use the Linux operating system to manage networks and devices, this credential verifies skills in carefully managing each aspect of a system or network.

  • CompTIA Network+:  This certification verifies knowledge and proficiency with establishing networks in a variety of environments, as well as their upkeep and maintenance. 

  • CompTIA Security+: This certification demonstrates your skills in recent developments of technology, terms and tools related to the cyber security field. It also certifies your risk analysis, automation, IoT, zero trust and operational technology skills.

  • CEH Certification: Short for Certified Ethical Hacker, this credential certifies your ability to assess security and look for vulnerable points in computer systems using the same methods as cybercriminals, but in a legal way. This certification is specifically geared toward network security professionals working in Ethical Hacking.

  • CompTIA CySA+: This certification verifies that you’re able to detect and analyze signs of malicious activity. It also verifies your skills in threat intelligence and management, incident response, and reporting and communication.

  • CompTIA CASP+: This is a technical certification that certifies your technical skill in solution engineering, and tests your knowledge of how to build, integrate and implement them across different environments. Compliance rules, risk and governance are also covered.

  • CompTIA PenTest+: This credential states that you have the ability to map out a successful penetration test. Adeptness in scanning for vulnerabilities, an understanding of the legal requirements and how to interpret results and build a report are also verified.
     

At DeVry University, our cyber security curriculum is acknowledged and verified as an approved provider by the National Initiative for Cybersecurity Careers and Studies (NICCS).


 

3. Work in a cyber security internship or related field

Once you’ve earned your degree, or if you are in the process of earning one, you may want to take on an internship. If you’re already working in a related field, that can also be beneficial as some skills may transfer over or provide you additional insight you wouldn’t have gained elsewhere. An internship or other job experience can help you build your skills in a real-world setting while providing the opportunity to develop relationships with people who are in your field and who may be able to connect you to other cyber security job opportunities.

4. Earn additional certifications and credentials

Whether you’re already working in the field as a professional or as an intern, earning some additional credentials may help you stand out in the eyes of employers. In particular, professional certifications such as the CISSP (Certified Information Systems Security Professional), CISA (Certified Information Systems Auditor) and CISM (Certified Information Security Manager) are intermediate-to-advanced certifications that demonstrate your skill and ability to potential employers.

5. Find a cyber security job

Once you've built up your resume, the next step is to find a cyber security job. This step may take some time, but persistence is key. Keep an eye out for any open job postings in your area, and consider how far you're willing to commute, or even if you'd be willing to move. Since many roles are now remote, you may be able to find work as a cyber security analyst from home.

Projected Job Growth for Cyber Security Analysts

Based on available data, there is strong evidence to suggest cyber security analysts will continue to play a significant role in cyber security to reinforce information security and protect data systems in government, healthcare, banking and other industries. According to the U.S. Bureau of Labor Statistics (BLS), employment of information security analysts is projected to grow 32% from 2022 to 2032, much faster than the average for all occupations, with about 16,800 job openings each year, on average, over the decade.1 This growth is projected on a national level and local growth will vary by location. BLS projections are not specific to DeVry University students or graduates and may include earners at all stages of their careers and not just entry level.

The BLS attributes this growth to the increasing frequency of cyberattacks and the resulting focus businesses are placing on enhancing their cyber security measures. They further note contributing factors like the shift to remote work, rise of e-commerce, and strong growth in telehealth that may increase data security risks for healthcare providers. 

Cyber Security Analyst FAQs

What other cyber security careers could I pursue?

It’s important to remember that job titles, responsibilities and employment qualifications may vary widely among employers. Your choice of career opportunities will be related to the academic programs and industry-relevant certifications you pursue. Here are a few examples based on our undergraduate cyber security programs:

Graduates from DeVry’s Undergraduate Certificate in Cyber Security program may find themselves prepared to pursue entry-level information security opportunities like Computer User Support Specialist, Cyber Security Analyst, Computer Network Support Specialist, Network System Administrator or Cyber Security Specialist.

Graduates of our Bachelor’s Degree in Cyber Security and Networking may find themselves exploring career opportunities such as Cyber Security Engineer, Cyber Security Analyst, Cloud Security Engineer and Cyber Security Manager. 

Graduates with our Cyber Security Programming Bachelor’s Degree Specialization may consider careers such as Computer Programmer, Computer and Information Systems Manager, Data Security Administrator, Cyber Security Analyst, Cyber Security Specialist, Software Developer or Information Security Analyst.

With additional work experience, graduates of these programs may also explore careers like Cyber Security Consultant, Cyber Security Auditor and Cyber Security Engineer.

How long does it take to become a cyber security analyst?

Everyone’s journey is different and subject to several factors, including the time it takes to complete your education, the entry-level job opportunities you consider and the organizations you work for. You may have to gain work experience in a related occupation before being hired or promoted to a cyber security analyst position. All of this means your journey is yours.

At DeVry, our Undergraduate Certificate in Cyber Security can be earned in as little as 1 year and 2 months on on a minimum schedule, or 1 year and 6 months on a normal one.2

2Normal schedule does not include breaks and assumes 2 semesters of year-round, full-time enrollment in 7-13 credit hours a semester per 12 month period. Minimum schedule does not include breaks and assumes 3 semesters of year-round, full-time enrollment in 7-13 credit hours a semester per 12 month period.

If you’re looking to pursue a more advanced education, our Bachelor’s Degree in Computer Information Systems with a Specialization in Cyber Security Programming can be earned in as little as 2 years and 8 months on on a minimum schedule, or 4 years on a normal one.3

3Normal schedule assumes 2 semesters of year-round, full-time enrollment in 13-19 credit hours a semester per 12 month period. Minimum schedule does not include breaks and assumes 3 semesters of year-round, full-time enrollment in 13-19 credit hours a semester per 12 month period.

Similarly, our Bachelor’s Degree in Cyber Security and Networking can be earned in 2 years and 8 months on on a minimum schedule, and 4 years on a normal one.4

4Normal schedule assumes 2 semesters of year-round, full-time enrollment in 12-18 credit hours a semester per 12 month period. Minimum schedule does not include breaks and assumes 3 semesters of year-round, full-time enrollment in 12-18 credit hours a semester per 12 month period.

Interested in Pursuing a Career as a Cyber Security Analyst?

Everyone’s journey is unique. At DeVry, we offer a variety of  cyber security programs  that are designed to help you build real-world skills and help prepare you to pursue a career in this dynamic field.

Prepare to make your mark in the cyber security industry. In DeVry’s Future Cyber Defenders Scholars Program, eligible undergraduate and graduate students can learn about training, events, conferences and networking opportunities hosted by leading industry organizations. Students also have the opportunity to participate in DeVry’s National Cyber League competition team and gain access to CompTIA; the leading provider of vendor-neutral IT certifications in the world. Career support with access to job search resources and opportunities including internships, apprenticeships and full-time positions is also available.

Ready to get started? Speak with your advisor about the program now!
 

1Growth projected on a national level. Local growth will vary by location. BLS projections are not specific to DeVry University students or graduates and may include earners at all stages of their career and not just entry level. https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.html

2Normal schedule does not include breaks and assumes 2 semesters of year-round, full-time enrollment in 7-13 credit hours a semester per 12 month period. Minimum schedule does not include breaks and assumes 3 semesters of year-round, full-time enrollment in 7-13 credit hours a semester per 12 month period.

3Normal schedule assumes 2 semesters of year-round, full-time enrollment in 13-19 credit hours a semester per 12-month period. Minimum schedule does not include breaks and assumes 3 semesters of year-round, full-time enrollment in 13-19 credit hours a semester per 12-month period.

4Normal assumes 2 semesters of year-round, full-time enrollment in 12-18 credit hours a semester per 12-month period. Minimum schedule does not include breaks and assumes 3 semesters of year-round, full-time enrollment in 12-18 credit hours a semester per 12-month period.

8-Week Class Sessions

Classes Start Every 8 Weeks

Filter Blog Post Category

Related Posts