{"id":2291,"date":"2023-01-17T12:30:00","date_gmt":"2023-01-17T17:30:00","guid":{"rendered":"https:\/\/theforage.wpengine.com\/?p=2291"},"modified":"2024-07-19T20:13:41","modified_gmt":"2024-07-20T00:13:41","slug":"cybersecurity-analyst","status":"publish","type":"post","link":"https:\/\/theforage.wpengine.com\/careers\/cybersecurity-analyst","title":{"rendered":"What Is a Cybersecurity Analyst?"},"content":{"rendered":"\n<p>With so much of our personal information online (think: credit card information, banking details), <a href=\"https:\/\/www.theforage.com\/blog\/careers\/cybersecurity\">cybersecurity<\/a> analysts have become more critical than ever for their vital role in protecting an organization\u2019s network and data from security threats.&nbsp;<\/p>\n\n\n\n<p>So, what do cybersecurity analysts do?&nbsp; Cybersecurity analysts are responsible for analyzing the security environment of a company\u2019s computer network and identifying potential vulnerabilities. They also develop and implement security measures to protect networks from cybercriminals.&nbsp;<\/p>\n\n\n\n<p>If you&#8217;re wondering how to become a cybersecurity analyst, this guide tells you everything you need to know about what a cybersecurity analyst does, the average salary you might make, the skills you&#8217;ll need as a cybersecurity analyst, and more.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-does-a-cybersecurity-analyst-do\">What Does a Cybersecurity Analyst Do?<\/h2>\n\n\n\n<p>Cybersecurity analysts specialize in the security of computer networks, hardware devices, and IT infrastructure. A wide range of industries relies on cybersecurity professionals, with an increasing number of businesses finding themselves vulnerable to cybersecurity threats. Some industries that employ cybersecurity analysts include the government, <a href=\"https:\/\/www.theforage.com\/blog\/careers\/financial-services\">financial services<\/a>, <a href=\"https:\/\/www.theforage.com\/blog\/careers\/health-care-good-career-path\">health care<\/a>, and IT sectors \u2014 although any business with an online presence needs cybersecurity professionals.<\/p>\n\n\n\n<p>\u201cCybersecurity analysts can work in a variety of roles, such as <a href=\"https:\/\/www.theforage.com\/blog\/careers\/security-engineer\">security engineers<\/a>, security analysts, security architects, and security consultants,\u201d says Nate Morris, a cybersecurity analyst at a large financial services firm.<\/p>\n\n\n\n\t<div class=\"forage-core-course-card\">\n\t\t<div class=\"forage-core-course-card__inner\">\n\n\t\t\t<div class=\"forage-core-course-card__col\">\n\t\t\t\t<div class=\"forage-core-course-card__row\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"100\" src=\"https:\/\/theforage.wpengine.com\/wp-content\/uploads\/2023\/02\/commonwealth-150x100.jpg\" class=\"attachment-thumbnail size-thumbnail\" alt=\"commonwealth bank logo\" srcset=\"https:\/\/theforage.wpengine.com\/wp-content\/uploads\/2023\/02\/commonwealth-150x100.jpg 150w, https:\/\/theforage.wpengine.com\/wp-content\/uploads\/2023\/02\/commonwealth-300x200.jpg 300w, https:\/\/theforage.wpengine.com\/wp-content\/uploads\/2023\/02\/commonwealth-1024x683.jpg 1024w, https:\/\/theforage.wpengine.com\/wp-content\/uploads\/2023\/02\/commonwealth-768x512.jpg 768w, https:\/\/theforage.wpengine.com\/wp-content\/uploads\/2023\/02\/commonwealth-1536x1024.jpg 1536w, https:\/\/theforage.wpengine.com\/wp-content\/uploads\/2023\/02\/commonwealth-2048x1365.jpg 2048w, https:\/\/theforage.wpengine.com\/wp-content\/uploads\/2023\/02\/commonwealth-600x400.jpg 600w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h2 class=\"forage-core-course-card__name\">Introduction to Cybersecurity<\/h2>\n\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t<p class=\"forage-core-course-card__description\">See what it&#039;s like to work in cybersecurity in this free course from Commonwealth Bank. You&#039;ll analyze a cyber attack and uncover what kind of attack it is, learn how to prevent future attacks, and more.<\/p>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"forage-core-course-card__button forage-core-course-card__button--desktop\">\n\t\t\t\t\t\t<a href=\"https:\/\/www.theforage.com\/simulations\/commonwealth-bank\/intro-cybersecurity-rdxl\" target=\"_blank\">\n\t\t\t\t\t\t\tJoin Today\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t<div class=\"forage-core-course-card__col\">\n\t\t\t\t\t\t\t\t\t<p class=\"forage-core-course-card__time\">\n\t\t\t\t\t\t<span class=\"label\">Avg. Time:<\/span>\n\t\t\t\t\t\t3-4 hours\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"forage-core-course-card__skills\">\n\t\t\t\t\t\t<span class=\"label\">Skills you&#8217;ll build:<\/span>\n\t\t\t\t\t\tSplunk basics, incident triage, password security, data analysis\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"forage-core-course-card__button forage-core-course-card__button--mobile\">\n\t\t\t\t\t\t<a href=\"https:\/\/www.theforage.com\/simulations\/commonwealth-bank\/intro-cybersecurity-rdxl\" target=\"_blank\">\n\t\t\t\t\t\t\tJoin Today\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t<\/div>\n\t<\/div>\n\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>As a mid-level position on the <a href=\"https:\/\/www.theforage.com\/blog\/careers\/cybersecurity-career-path\">cybersecurity career path,<\/a> analysts are responsible for monitoring and responding to security incidents and conducting regular security assessments and audits. These are some of the most common job titles for this role:<\/p>\n\n\n\n<ul>\n<li>Compliance analyst<\/li>\n\n\n\n<li>Information security analyst<\/li>\n\n\n\n<li>Information technology security analyst<\/li>\n\n\n\n<li>Security analyst<\/li>\n\n\n\n<li>Security operations analyst<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-cybersecurity-job-description\">Cybersecurity Job Description<\/h3>\n\n\n\n<p>So, what does a cybersecurity analyst do on a daily basis? A cybersecurity analyst\u2019s job description includes protecting companies from cyberthreats like malware, trying to prevent cyberattacks, and responding to successful attacks from hackers and other cybercriminals. Without cybersecurity analysts, cybercriminals would have an easier time stealing or damaging an organization\u2019s sensitive data.&nbsp;<\/p>\n\n\n\n<p>\u201cThe profession of a cybersecurity analyst includes a number of possible areas of responsibility and combines a whole class of professions,\u201d explains Maxim Beloenko, vice president of global sales at the network security services company Qrator Labs. \u201cRespectively, such employees can be engaged, for example, in the formation of a company\u2019s information protection policy in accordance with current external threats and with the state of affairs within the company.\u201d<\/p>\n\n\n\n<p>\u201cThe specific tasks of a cybersecurity analyst vary depending on the organization they work for,\u201d Morris says. \u201cGenerally, their duties include monitoring networks for threats, deploying and configuring security solutions, and conducting risk assessments.\u201d&nbsp;&nbsp;<\/p>\n\n\n\n<p>Typical tasks include:<\/p>\n\n\n\n<ul>\n<li>Analyzing an organization\u2019s current level of threats<\/li>\n\n\n\n<li>Investigating phishing methods and malware delivery<\/li>\n\n\n\n<li>Adapting the company\u2019s protection mechanisms to evolving threats<\/li>\n<\/ul>\n\n\n\n<p>Cybersecurity consultant Alessandro Mirani points out that since the root of a cybersecurity analyst\u2019s job consists of securing an operational IT environment, this includes everything from physical perimeters to applications running on servers. \u201cA cybersecurity analyst will deal more often with regulatory compliance, audit readiness, risk\/vulnerability assessment, and penetration testing,\u201d Mirani says.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-cybersecurity-analyst-salary\">Cybersecurity Analyst Salary<\/h2>\n\n\n\n<p>The <a href=\"https:\/\/www.bls.gov\/oes\/current\/oes151212.htm\" target=\"_blank\" rel=\"noreferrer noopener\">U.S. Bureau of Labor Statistics (BLS)<\/a> lists the average annual salary for information security analysts at $119,860 with the top 10% earning more than $174,540. Self-reported information from <a href=\"https:\/\/www.glassdoor.com\/Salaries\/cyber-security-analyst-salary-SRCH_KO0,22.htm\" target=\"_blank\" rel=\"noreferrer noopener\">Glassdoor<\/a> indicates that cybersecurity analysts can earn between $83,000 and $134,000 per year, though people with zero to one year of experience will likely have a salary between $60,000 and $97,000 a year.<\/p>\n\n\n\n<p>According to Mirani, higher salary grades require additional experience in <a href=\"https:\/\/www.theforage.com\/blog\/skills\/coding-bootcamps-online\">coding<\/a> or regulatory compliance, or relevant professional certifications in cybersecurity or cloud security.<\/p>\n\n\n\n<p><strong>&gt;&gt;MORE: <\/strong><a href=\"https:\/\/www.theforage.com\/blog\/careers\/cloud-security-engineer\">What Is a Cloud Security Engineer?<\/a><\/p>\n\n\n\n<p>A cybersecurity analyst\u2019s salary also depends on the size and type of organization they work for. Certain large tech companies often pay cybersecurity analysts higher total pay than the average. Glassdoor notes that the highest-paying companies for this position are Google, with a total average pay of over $183,000 per year; Meta, at over $178,000 per year; and Apple, at over $172,000 per year.<\/p>\n\n\n\n<p>The average advertised salary in cybersecurity analyst job openings for the 12 months ending April 2023 was $107,346, as reported by <a href=\"https:\/\/www.cyberseek.org\/pathway.html\" target=\"_blank\" rel=\"noreferrer noopener\">CyberSeek<\/a>, a project of the National Initiative for Cybersecurity Education (NICE).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-cybersecurity-analyst-skills\">Cybersecurity Analyst Skills<\/h2>\n\n\n\n<p>Both technical and general workplace skills are essential for cybersecurity analysts. \u201cSkills can, and should, vary from technical ability, such as implementing secure IT infrastructures, to business ability, such as interacting with stakeholders and understanding business strategy,\u201d Mirani says. \u201cAbility to learn and adapt to emerging technologies is also a must.\u201d<\/p>\n\n\n\n\t<div class=\"forage-core-course-card\">\n\t\t<div class=\"forage-core-course-card__inner\">\n\n\t\t\t<div class=\"forage-core-course-card__col\">\n\t\t\t\t<div class=\"forage-core-course-card__row\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"105\" src=\"https:\/\/theforage.wpengine.com\/wp-content\/uploads\/2023\/09\/data-science-vs-software-engineering-150x105.jpg\" class=\"attachment-thumbnail size-thumbnail\" alt=\"What&#039;s the difference: Data science vs. software engineering?\" srcset=\"https:\/\/theforage.wpengine.com\/wp-content\/uploads\/2023\/09\/data-science-vs-software-engineering-150x105.jpg 150w, https:\/\/theforage.wpengine.com\/wp-content\/uploads\/2023\/09\/data-science-vs-software-engineering-300x210.jpg 300w, https:\/\/theforage.wpengine.com\/wp-content\/uploads\/2023\/09\/data-science-vs-software-engineering-768x538.jpg 768w, https:\/\/theforage.wpengine.com\/wp-content\/uploads\/2023\/09\/data-science-vs-software-engineering.jpg 1000w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h2 class=\"forage-core-course-card__name\">Cybersecurity<\/h2>\n\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t<p class=\"forage-core-course-card__description\">Try your hand at cybersecurity in this free course from Datacom. You&#039;ll analyze an attack, conduct a risk assessment, and present your findings.<\/p>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"forage-core-course-card__button forage-core-course-card__button--desktop\">\n\t\t\t\t\t\t<a href=\"https:\/\/www.theforage.com\/simulations\/datacom\/cybersecurity-zm6d\" target=\"_blank\">\n\t\t\t\t\t\t\tJoin Now\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t<div class=\"forage-core-course-card__col\">\n\t\t\t\t\t\t\t\t\t<p class=\"forage-core-course-card__time\">\n\t\t\t\t\t\t<span class=\"label\">Avg. Time:<\/span>\n\t\t\t\t\t\t3-4 hours\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"forage-core-course-card__skills\">\n\t\t\t\t\t\t<span class=\"label\">Skills you&#8217;ll build:<\/span>\n\t\t\t\t\t\tOSINT, risk management, security analysis, analytical skills\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"forage-core-course-card__button forage-core-course-card__button--mobile\">\n\t\t\t\t\t\t<a href=\"https:\/\/www.theforage.com\/simulations\/datacom\/cybersecurity-zm6d\" target=\"_blank\">\n\t\t\t\t\t\t\tJoin Now\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t<\/div>\n\t<\/div>\n\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-technical-skills\">Technical Skills<\/h3>\n\n\n\n<p>Cybersecurity analysts must have specific technical skills to perform well in this role. This means being familiar with the latest technologies and security solutions and thoroughly understanding networking, encryption, firewalls, and other security solutions.&nbsp;<\/p>\n\n\n\n<p>Knowledge of the current cyberthreat landscape and security vulnerabilities is another critical skill. \u201cCybersecurity analysts should have a deep knowledge of the latest threats, vulnerabilities, and trends in the industry,\u201d Morris says. \u201cThey should be able to identify potential security weaknesses and be able to recommend solutions to mitigate them.\u201d&nbsp;<\/p>\n\n\n\n<p><strong>&gt;&gt;MORE:<\/strong> <a href=\"https:\/\/www.theforage.com\/blog\/interview-questions\/cybersecurity-interview-questions\">10 Common Cybersecurity Interview Questions<\/a><\/p>\n\n\n\n<p>Other technical skills and areas of expertise include:<\/p>\n\n\n\n<ul>\n<li>Controls and frameworks&nbsp;<\/li>\n\n\n\n<li>Scripting (a form of coding)<\/li>\n\n\n\n<li>Intrusion detection software<\/li>\n\n\n\n<li>Cloud and network security&nbsp;<\/li>\n\n\n\n<li>Software development and operations<\/li>\n\n\n\n<li>Operating systems<\/li>\n<\/ul>\n\n\n\n<p>\u201cThis is certainly an advanced level in technical terms \u2014 that is, a deep knowledge of the fundamentals of programming, including secure programming; a detailed understanding of the basics and latest trends in the cybersecurity industry; and the ability to analyze, interpret, and collect information and work with it,\u201d Beloenko explains. \u201cAdditional knowledge and skills may be required depending on the industry in which the specialist works.\u201d<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-soft-skills\">Soft Skills<\/h3>\n\n\n\n<p>In addition to <a href=\"https:\/\/www.theforage.com\/blog\/basics\/hard-skills\">hard skills<\/a>, cybersecurity analysts also should have several <a href=\"https:\/\/www.theforage.com\/blog\/basics\/what-are-soft-skills-definition-and-examples\">soft skills<\/a> common to many industries and workplaces, such as:<\/p>\n\n\n\n<ul>\n<li><a href=\"https:\/\/www.theforage.com\/blog\/skills\/problem-solving-skills\">Problem-solving<\/a> and <a href=\"https:\/\/www.theforage.com\/blog\/skills\/analytical-skills\">analytical skills<\/a>: Cybersecurity analysts should be able to identify and analyze potential threats and risks and develop and implement solutions to mitigate those risks.&nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/www.theforage.com\/blog\/skills\/communication-skills\">Communication skills<\/a>: They must be able to communicate technical information to non-technical stakeholders and explain complex security concepts in a way that\u2019s easy to understand.&nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/www.theforage.com\/blog\/skills\/attention-to-detail\">Attention to detail<\/a>: Cybersecurity analysts should be detail-oriented and able to notice security vulnerabilities. \u201cThey should be able to quickly identify potential security breaches and take the necessary steps to mitigate them,\u201d Morris says.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>This role also often requires <a href=\"https:\/\/www.theforage.com\/blog\/skills\/collaboration-skills\">collaborating<\/a> with a larger team, conducting risk management, and using <a href=\"https:\/\/www.theforage.com\/blog\/skills\/critical-thinking-skills\">critical thinking skills<\/a>.<\/p>\n\n\n\n\t<div class=\"forage-core-course-card\">\n\t\t<div class=\"forage-core-course-card__inner\">\n\n\t\t\t<div class=\"forage-core-course-card__col\">\n\t\t\t\t<div class=\"forage-core-course-card__row\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"84\" src=\"https:\/\/theforage.wpengine.com\/wp-content\/uploads\/2023\/01\/working-at-aig-1-150x84.jpg\" class=\"attachment-thumbnail size-thumbnail\" alt=\"NYC AIG office, working at AIG\" srcset=\"https:\/\/theforage.wpengine.com\/wp-content\/uploads\/2023\/01\/working-at-aig-1-150x84.jpg 150w, https:\/\/theforage.wpengine.com\/wp-content\/uploads\/2023\/01\/working-at-aig-1-300x168.jpg 300w, https:\/\/theforage.wpengine.com\/wp-content\/uploads\/2023\/01\/working-at-aig-1-1024x572.jpg 1024w, https:\/\/theforage.wpengine.com\/wp-content\/uploads\/2023\/01\/working-at-aig-1-768x429.jpg 768w, https:\/\/theforage.wpengine.com\/wp-content\/uploads\/2023\/01\/working-at-aig-1-1536x859.jpg 1536w, https:\/\/theforage.wpengine.com\/wp-content\/uploads\/2023\/01\/working-at-aig-1.jpg 2000w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h2 class=\"forage-core-course-card__name\">Shields Up: Cybersecurity<\/h2>\n\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t<p class=\"forage-core-course-card__description\">Build practical cybersecurity skills in this free course from AIG. You&#039;ll respond to a zero-day vulnerability and learn how to bypass ransomware.<\/p>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"forage-core-course-card__button forage-core-course-card__button--desktop\">\n\t\t\t\t\t\t<a href=\"https:\/\/www.theforage.com\/simulations\/aig\/cybersecurity-ku1i\" target=\"_blank\">\n\t\t\t\t\t\t\tEnroll Now\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t<div class=\"forage-core-course-card__col\">\n\t\t\t\t\t\t\t\t\t<p class=\"forage-core-course-card__time\">\n\t\t\t\t\t\t<span class=\"label\">Avg. Time:<\/span>\n\t\t\t\t\t\t2-3 hours\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"forage-core-course-card__skills\">\n\t\t\t\t\t\t<span class=\"label\">Skills you&#8217;ll build:<\/span>\n\t\t\t\t\t\tPython, security advisory, vulnerability triage, software development\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"forage-core-course-card__button forage-core-course-card__button--mobile\">\n\t\t\t\t\t\t<a href=\"https:\/\/www.theforage.com\/simulations\/aig\/cybersecurity-ku1i\" target=\"_blank\">\n\t\t\t\t\t\t\tEnroll Now\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t<\/div>\n\t<\/div>\n\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-to-become-a-cybersecurity-analyst\">How to Become a Cybersecurity Analyst<\/h2>\n\n\n\n<p>Fortunately, the job market for cybersecurity analysts is extremely promising. CyberSeek reports that there have been nearly 26,275 job openings in this field over the last 12 months, and the five-year projected growth rate for skills like threat hunting is 105%. In addition, the <a href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-analysts.htm\">BLS<\/a> projects a 32% employment growth rate for information security analysts through 2032.<\/p>\n\n\n\n<p>You can become a cybersecurity analyst through a number of potential entry points. While you can enter the cybersecurity field without a degree or certification, some positions may require specific additional training.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-cybersecurity-education\">Cybersecurity Education<\/h3>\n\n\n\n<p>In particular, a bachelor\u2019s degree in information technology can provide you with fundamentals that can open doors to this field \u2014 particularly if you choose a program specializing in cybersecurity and information assurance. CyberSeek research shows that 70% of online job listings for this title require a bachelor\u2019s degree, and 21% require a graduate degree.<\/p>\n\n\n\n<p>\u201cBecoming a cybersecurity analyst requires a combination of education, experience, and certifications,\u201d Morris says. \u201cThose interested in the field should start by pursuing a degree in computer science, information technology, or a related field.\u201d<\/p>\n\n\n\n<p><strong>&gt;&gt;RELATED:<\/strong> <a href=\"https:\/\/www.theforage.com\/blog\/careers\/cybersecurity-vs-computer-science\">Cybersecurity vs. Computer Science: What&#8217;s the Difference?<\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-cybersecurity-certification\">Cybersecurity Certification<\/h3>\n\n\n\n<p>Another more formalized route is to gain certification in cybersecurity by taking online classes or cybersecurity bootcamps through a university, community college, or online course provider. Some in-demand cybersecurity certifications include:&nbsp;<\/p>\n\n\n\n<ul>\n<li>Certified Information Systems Security Professional (CISSP)&nbsp;<\/li>\n\n\n\n<li>Certified Information Systems Auditor (CISA)<\/li>\n\n\n\n<li>Certified Information Security Manager (CISM)<\/li>\n\n\n\n<li>CompTIA Security+<\/li>\n\n\n\n<li>Certified Ethical Hacker (CEH)<\/li>\n\n\n\n<li>GIAC Security Essentials Certification (GSEC)<\/li>\n<\/ul>\n\n\n\n<p>Mirani notes that cloud security certifications such as Azure, GCP, and AWS can also help you gain relevant work experience.<\/p>\n\n\n\n<p><strong>&gt;&gt;MORE:<\/strong> <a href=\"https:\/\/www.theforage.com\/blog\/skills\/10-best-cybersecurity-bootcamps-of-current_year\">10 Best Cybersecurity Bootcamps of 2024<\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-cybersecurity-work-experience\">Cybersecurity Work Experience<\/h3>\n\n\n\n<p>Many people become cybersecurity analysts by learning the basics and developing the right skill set through their own study and on-the-job experiences.&nbsp;<\/p>\n\n\n\n<p>\u201cThere is no easy way here due to the requirement of the necessary skills,\u201d Beloenko says. \u201cThe easiest way is to get a job in a company where there are relevant vacancies for an <a href=\"https:\/\/www.theforage.com\/blog\/basics\/internship\">internship<\/a>, and first of all the ability to master or practice on real scenarios.\u201d He adds that cybersecurity analysts are often engineers and experienced managers. An ordinary programmer can develop a path in this direction, even without having any previous connections to the cyber industry, based on a desire to develop in this area.<\/p>\n\n\n\n\t<div class=\"forage-core-course-card\">\n\t\t<div class=\"forage-core-course-card__inner\">\n\n\t\t\t<div class=\"forage-core-course-card__col\">\n\t\t\t\t<div class=\"forage-core-course-card__row\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"100\" src=\"https:\/\/theforage.wpengine.com\/wp-content\/uploads\/2022\/10\/Depositphotos_385951036_L-150x100.jpg\" class=\"attachment-thumbnail size-thumbnail\" alt=\"Mastercard office building in downtown Auckland\" srcset=\"https:\/\/theforage.wpengine.com\/wp-content\/uploads\/2022\/10\/Depositphotos_385951036_L-150x100.jpg 150w, https:\/\/theforage.wpengine.com\/wp-content\/uploads\/2022\/10\/Depositphotos_385951036_L-300x200.jpg 300w, https:\/\/theforage.wpengine.com\/wp-content\/uploads\/2022\/10\/Depositphotos_385951036_L-1024x682.jpg 1024w, https:\/\/theforage.wpengine.com\/wp-content\/uploads\/2022\/10\/Depositphotos_385951036_L-768x512.jpg 768w, https:\/\/theforage.wpengine.com\/wp-content\/uploads\/2022\/10\/Depositphotos_385951036_L-1536x1024.jpg 1536w, https:\/\/theforage.wpengine.com\/wp-content\/uploads\/2022\/10\/Depositphotos_385951036_L-600x400.jpg 600w, https:\/\/theforage.wpengine.com\/wp-content\/uploads\/2022\/10\/Depositphotos_385951036_L.jpg 2000w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h2 class=\"forage-core-course-card__name\">Cybersecurity<\/h2>\n\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t<p class=\"forage-core-course-card__description\">Test drive a career in cybersecurity in this free course from Mastercard. You&#039;ll design a phishing email simulation then create a security awareness training.<\/p>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"forage-core-course-card__button forage-core-course-card__button--desktop\">\n\t\t\t\t\t\t<a href=\"https:\/\/www.theforage.com\/simulations\/mastercard\/cybersecurity-t8ye\" target=\"_blank\">\n\t\t\t\t\t\t\tJoin Today\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t<div class=\"forage-core-course-card__col\">\n\t\t\t\t\t\t\t\t\t<p class=\"forage-core-course-card__time\">\n\t\t\t\t\t\t<span class=\"label\">Avg. Time:<\/span>\n\t\t\t\t\t\t1-2 hours\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"forage-core-course-card__skills\">\n\t\t\t\t\t\t<span class=\"label\">Skills you&#8217;ll build:<\/span>\n\t\t\t\t\t\tSecurity awareness training, data analysis, strategy, cybersecurity \t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"forage-core-course-card__button forage-core-course-card__button--mobile\">\n\t\t\t\t\t\t<a href=\"https:\/\/www.theforage.com\/simulations\/mastercard\/cybersecurity-t8ye\" target=\"_blank\">\n\t\t\t\t\t\t\tJoin Today\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t<\/div>\n\t<\/div>\n\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-start-your-cybersecurity-career\">Start Your Cybersecurity Career<\/h2>\n\n\n\n<p>Mirani advises to \u201cgo for it\u201d if you have the option to take on a bachelor\u2019s degree, or even a Master\u2019s of Science degree, en route to a cybersecurity analyst career. But, he recognizes other paths as equally viable.&nbsp;<\/p>\n\n\n\n<p>\u201cIf you are starting from scratch but you already possess IT experience or education, study for the certifications and try to gain relevant work experience,\u201d Mirani says. \u201cIf you want to switch from a totally different industry, define a particular set of skills and find a mentor to understand where you fit as a cybersecurity expert \u2014 then invest as much as you can on your education and training.\u201d&nbsp;<\/p>\n\n\n\n<p>Regardless of education and training, Morris emphasizes that having experience in the field is essential. \u201cThose who don\u2019t have professional experience can gain hands-on experience through internships or volunteer work,\u201d Morris says. \u201cThis can help them to gain the necessary skills and knowledge to become a successful cybersecurity analyst.\u201d<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-cybersecurity-analysts-threat-protection-at-every-level\">Cybersecurity Analysts: Threat Protection at Every Level<\/h2>\n\n\n\n<p>A cybersecurity analyst protects computer systems and our personal information from being stolen and exploited. And as we live more of our lives online, cybersecurity analysts with top-tier skills will continue to be in demand.<\/p>\n\n\n\n<p>If you&#8217;re wondering what it&#8217;s like to work in cybersecurity or want to level-up your cybersecurity analyst skills, enroll in one of <a href=\"https:\/\/www.theforage.com\/simulations?careers=tech\">Forage\u2019s tech virtual job simulations<\/a>. It&#8217;s free and can help you learn more about this growing career field.<\/p>\n\n\n\n<p><em>Image credit: videoflow \/ Depositphotos.com<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>With so much of our personal information online (think: credit card information, banking details), cybersecurity analysts have become more critical than ever for their vital role in protecting an organization\u2019s network and data from security threats.&nbsp; So, what do cybersecurity analysts do?&nbsp; Cybersecurity analysts are responsible for analyzing the security environment of a company\u2019s computer &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/theforage.wpengine.com\/careers\/cybersecurity-analyst\"> <span class=\"screen-reader-text\">What Is a Cybersecurity Analyst?<\/span> Read More &raquo;<\/a><\/p>\n","protected":false},"author":22,"featured_media":2292,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"forage_sticky_bar_enabled":true,"forage_sticky_bar_content":"Find out which tech career is right for you!","forage_sticky_bar_button_text":"Take the Quiz","forage_sticky_bar_button_url":"https:\/\/www.theforage.com\/blog\/basics\/what-tech-job-right-for-me","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"forage_editor_id":17,"forage_reviewer_id":0,"forage_authors":[],"veps":[3978,5840],"forage_sidebar":0,"forage_related_disabled":false,"forage_toc_enabled":true,"forage_toc_level":0,"modified":"2024-02-22T10:00:00","footnotes":""},"categories":[5],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.5 (Yoast SEO v24.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What Is a Cybersecurity Analyst? - Forage<\/title>\n<meta name=\"description\" content=\"A cybersecurity analyst monitors the security of a company&#039;s computer network and identifies potential vulnerabilities.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/theforage.wpengine.com\/careers\/cybersecurity-analyst\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is a Cybersecurity Analyst?\" \/>\n<meta property=\"og:description\" content=\"A cybersecurity analyst monitors the security of a company&#039;s computer network and identifies potential vulnerabilities.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/theforage.wpengine.com\/careers\/cybersecurity-analyst\" \/>\n<meta property=\"og:site_name\" content=\"Forage\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/theforage1\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-17T17:30:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-22T05:00:00-05:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/theforage.wpengine.com\/wp-content\/uploads\/2023\/01\/cybersecurity-analyst.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1333\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Robin Madell\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theforage_\" \/>\n<meta name=\"twitter:site\" content=\"@theforage_\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Robin Madell\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.theforage.com\/blog\/careers\/cybersecurity-analyst#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.theforage.com\/blog\/careers\/cybersecurity-analyst\"},\"author\":{\"name\":\"Robin Madell\",\"@id\":\"https:\/\/www.theforage.com\/blog\/#\/schema\/person\/8f82067b4a8864f3cc1bd15f7e3f9683\"},\"headline\":\"What Is a Cybersecurity Analyst?\",\"datePublished\":\"2023-01-17T12:30:00-05:00\",\"dateModified\":\"2024-02-22T05:00:00-05:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.theforage.com\/blog\/careers\/cybersecurity-analyst\"},\"wordCount\":1729,\"publisher\":{\"@id\":\"https:\/\/www.theforage.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.theforage.com\/blog\/careers\/cybersecurity-analyst#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.theforage.com\/blog\/wp-content\/uploads\/2023\/01\/cybersecurity-analyst.jpg\",\"articleSection\":[\"Careers\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.theforage.com\/blog\/careers\/cybersecurity-analyst\",\"url\":\"https:\/\/www.theforage.com\/blog\/careers\/cybersecurity-analyst\",\"name\":\"What Is a Cybersecurity Analyst? - Forage\",\"isPartOf\":{\"@id\":\"https:\/\/www.theforage.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.theforage.com\/blog\/careers\/cybersecurity-analyst#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.theforage.com\/blog\/careers\/cybersecurity-analyst#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.theforage.com\/blog\/wp-content\/uploads\/2023\/01\/cybersecurity-analyst.jpg\",\"datePublished\":\"2023-01-17T12:30:00-05:00\",\"dateModified\":\"2024-02-22T05:00:00-05:00\",\"description\":\"A cybersecurity analyst monitors the security of a company's computer network and identifies potential vulnerabilities.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.theforage.com\/blog\/careers\/cybersecurity-analyst#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.theforage.com\/blog\/careers\/cybersecurity-analyst\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.theforage.com\/blog\/careers\/cybersecurity-analyst#primaryimage\",\"url\":\"https:\/\/www.theforage.com\/blog\/wp-content\/uploads\/2023\/01\/cybersecurity-analyst.jpg\",\"contentUrl\":\"https:\/\/www.theforage.com\/blog\/wp-content\/uploads\/2023\/01\/cybersecurity-analyst.jpg\",\"width\":2000,\"height\":1333,\"caption\":\"What is a cybersecurity analyst?\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.theforage.com\/blog\/careers\/cybersecurity-analyst#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.theforage.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Careers\",\"item\":\"https:\/\/www.theforage.com\/blog\/careers\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"What Is a Cybersecurity Analyst?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.theforage.com\/blog\/#website\",\"url\":\"https:\/\/www.theforage.com\/blog\/\",\"name\":\"Forage\",\"description\":\"Virtual job simulations produced by and for the world\u2019s largest employers\",\"publisher\":{\"@id\":\"https:\/\/www.theforage.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.theforage.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.theforage.com\/blog\/#organization\",\"name\":\"Forage\",\"url\":\"https:\/\/www.theforage.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.theforage.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.theforage.com\/blog\/wp-content\/uploads\/2023\/04\/Navy-Stacked-Logo.jpg\",\"contentUrl\":\"https:\/\/www.theforage.com\/blog\/wp-content\/uploads\/2023\/04\/Navy-Stacked-Logo.jpg\",\"width\":878,\"height\":893,\"caption\":\"Forage\"},\"image\":{\"@id\":\"https:\/\/www.theforage.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/theforage1\/\",\"https:\/\/x.com\/theforage_\",\"https:\/\/www.instagram.com\/theforage_\/\",\"https:\/\/www.linkedin.com\/school\/theforage\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.theforage.com\/blog\/#\/schema\/person\/8f82067b4a8864f3cc1bd15f7e3f9683\",\"name\":\"Robin Madell\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.theforage.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.theforage.com\/blog\/wp-content\/uploads\/2022\/10\/Madell-photo-96x96.jpg\",\"contentUrl\":\"https:\/\/www.theforage.com\/blog\/wp-content\/uploads\/2022\/10\/Madell-photo-96x96.jpg\",\"caption\":\"Robin Madell\"},\"description\":\"Robin Madell has spent over two decades as a corporate writer, business journalist, and communications consultant in New York, San Francisco, and Los Angeles serving as a copywriter, speechwriter, and ghostwriter for executives, entrepreneurs, and thought leaders across diverse industries. Her work has been published in U.S. News &amp; World Report, Business Insider, Harvard Business Review, Fortune, Forbes, and many other business publications.\",\"url\":\"https:\/\/www.theforage.com\/blog\/author\/robin-madell\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What Is a Cybersecurity Analyst? - Forage","description":"A cybersecurity analyst monitors the security of a company's computer network and identifies potential vulnerabilities.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/theforage.wpengine.com\/careers\/cybersecurity-analyst","og_locale":"en_US","og_type":"article","og_title":"What Is a Cybersecurity Analyst?","og_description":"A cybersecurity analyst monitors the security of a company's computer network and identifies potential vulnerabilities.","og_url":"https:\/\/theforage.wpengine.com\/careers\/cybersecurity-analyst","og_site_name":"Forage","article_publisher":"https:\/\/www.facebook.com\/theforage1\/","article_published_time":"2023-01-17T17:30:00+00:00","og_image":[{"width":2000,"height":1333,"url":"https:\/\/theforage.wpengine.com\/wp-content\/uploads\/2023\/01\/cybersecurity-analyst.jpg","type":"image\/jpeg"}],"author":"Robin Madell","twitter_card":"summary_large_image","twitter_creator":"@theforage_","twitter_site":"@theforage_","twitter_misc":{"Written by":"Robin Madell","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.theforage.com\/blog\/careers\/cybersecurity-analyst#article","isPartOf":{"@id":"https:\/\/www.theforage.com\/blog\/careers\/cybersecurity-analyst"},"author":{"name":"Robin Madell","@id":"https:\/\/www.theforage.com\/blog\/#\/schema\/person\/8f82067b4a8864f3cc1bd15f7e3f9683"},"headline":"What Is a Cybersecurity Analyst?","datePublished":"2023-01-17T12:30:00-05:00","dateModified":"2024-02-22T05:00:00-05:00","mainEntityOfPage":{"@id":"https:\/\/www.theforage.com\/blog\/careers\/cybersecurity-analyst"},"wordCount":1729,"publisher":{"@id":"https:\/\/www.theforage.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.theforage.com\/blog\/careers\/cybersecurity-analyst#primaryimage"},"thumbnailUrl":"https:\/\/www.theforage.com\/blog\/wp-content\/uploads\/2023\/01\/cybersecurity-analyst.jpg","articleSection":["Careers"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.theforage.com\/blog\/careers\/cybersecurity-analyst","url":"https:\/\/www.theforage.com\/blog\/careers\/cybersecurity-analyst","name":"What Is a Cybersecurity Analyst? - Forage","isPartOf":{"@id":"https:\/\/www.theforage.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.theforage.com\/blog\/careers\/cybersecurity-analyst#primaryimage"},"image":{"@id":"https:\/\/www.theforage.com\/blog\/careers\/cybersecurity-analyst#primaryimage"},"thumbnailUrl":"https:\/\/www.theforage.com\/blog\/wp-content\/uploads\/2023\/01\/cybersecurity-analyst.jpg","datePublished":"2023-01-17T12:30:00-05:00","dateModified":"2024-02-22T05:00:00-05:00","description":"A cybersecurity analyst monitors the security of a company's computer network and identifies potential vulnerabilities.","breadcrumb":{"@id":"https:\/\/www.theforage.com\/blog\/careers\/cybersecurity-analyst#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.theforage.com\/blog\/careers\/cybersecurity-analyst"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.theforage.com\/blog\/careers\/cybersecurity-analyst#primaryimage","url":"https:\/\/www.theforage.com\/blog\/wp-content\/uploads\/2023\/01\/cybersecurity-analyst.jpg","contentUrl":"https:\/\/www.theforage.com\/blog\/wp-content\/uploads\/2023\/01\/cybersecurity-analyst.jpg","width":2000,"height":1333,"caption":"What is a cybersecurity analyst?"},{"@type":"BreadcrumbList","@id":"https:\/\/www.theforage.com\/blog\/careers\/cybersecurity-analyst#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.theforage.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Careers","item":"https:\/\/www.theforage.com\/blog\/careers"},{"@type":"ListItem","position":3,"name":"What Is a Cybersecurity Analyst?"}]},{"@type":"WebSite","@id":"https:\/\/www.theforage.com\/blog\/#website","url":"https:\/\/www.theforage.com\/blog\/","name":"Forage","description":"Virtual job simulations produced by and for the world\u2019s largest employers","publisher":{"@id":"https:\/\/www.theforage.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.theforage.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.theforage.com\/blog\/#organization","name":"Forage","url":"https:\/\/www.theforage.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.theforage.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.theforage.com\/blog\/wp-content\/uploads\/2023\/04\/Navy-Stacked-Logo.jpg","contentUrl":"https:\/\/www.theforage.com\/blog\/wp-content\/uploads\/2023\/04\/Navy-Stacked-Logo.jpg","width":878,"height":893,"caption":"Forage"},"image":{"@id":"https:\/\/www.theforage.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/theforage1\/","https:\/\/x.com\/theforage_","https:\/\/www.instagram.com\/theforage_\/","https:\/\/www.linkedin.com\/school\/theforage\/"]},{"@type":"Person","@id":"https:\/\/www.theforage.com\/blog\/#\/schema\/person\/8f82067b4a8864f3cc1bd15f7e3f9683","name":"Robin Madell","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.theforage.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/www.theforage.com\/blog\/wp-content\/uploads\/2022\/10\/Madell-photo-96x96.jpg","contentUrl":"https:\/\/www.theforage.com\/blog\/wp-content\/uploads\/2022\/10\/Madell-photo-96x96.jpg","caption":"Robin Madell"},"description":"Robin Madell has spent over two decades as a corporate writer, business journalist, and communications consultant in New York, San Francisco, and Los Angeles serving as a copywriter, speechwriter, and ghostwriter for executives, entrepreneurs, and thought leaders across diverse industries. Her work has been published in U.S. News &amp; World Report, Business Insider, Harvard Business Review, Fortune, Forbes, and many other business publications.","url":"https:\/\/www.theforage.com\/blog\/author\/robin-madell"}]}},"featured_image_src":"https:\/\/theforage.wpengine.com\/wp-content\/uploads\/2023\/01\/cybersecurity-analyst-600x400.jpg","featured_image_src_square":"https:\/\/theforage.wpengine.com\/wp-content\/uploads\/2023\/01\/cybersecurity-analyst-600x600.jpg","author_info":{"display_name":"Robin Madell","author_link":"https:\/\/theforage.wpengine.com\/author\/robin-madell"},"_links":{"self":[{"href":"https:\/\/theforage.wpengine.com\/wp-json\/wp\/v2\/posts\/2291"}],"collection":[{"href":"https:\/\/theforage.wpengine.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/theforage.wpengine.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/theforage.wpengine.com\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/theforage.wpengine.com\/wp-json\/wp\/v2\/comments?post=2291"}],"version-history":[{"count":0,"href":"https:\/\/theforage.wpengine.com\/wp-json\/wp\/v2\/posts\/2291\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/theforage.wpengine.com\/wp-json\/wp\/v2\/media\/2292"}],"wp:attachment":[{"href":"https:\/\/theforage.wpengine.com\/wp-json\/wp\/v2\/media?parent=2291"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/theforage.wpengine.com\/wp-json\/wp\/v2\/categories?post=2291"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/theforage.wpengine.com\/wp-json\/wp\/v2\/tags?post=2291"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}