Business Acumen-Team Culture, Customer Service and Confidential information
Information Science Strategy
Digital and Cyber security awareness/ Computer and Information Sciences Business frameworks
Computer and Network Programming/Cryptography
Data Entry/Microcomputer Applications Security
Wireless Networks, Cloud and Virtualization
Enterprise Security Computer Systems Analysis
Computer Software and Media Application vulnerabilities, threats, and attacks
Computer Systems Networking and Telecommunications
Computer/Information Technology Administration and Management
Computer and Information Sciences and Support Services
Information Technology Project Management/Encryption & Hashing
Introduction to Digital crime/Forensics
Staff Training
CompTIA Security+
Company Training - Staff Training/Meeting
Improve Your Data Governance and Security Skills
Essential New Skills in IT Administration
Learning Cloud Computing: Monitoring and Operations
Introduction to IT Architecture
Learning Computer Forensics
Learning Cyber Incident Response and Digital Forensics
Operating System Forensics
Learning Autopsy for Digital Forensics
Ethical Hacking: Cryptography
Ethical Hacking: Wireless Networks
Ethical Hacking: System Hacking
Prepare for the Certified in Risk and Information Systems Control (CRISC) Exam
Implementing the NIST Privacy Framework
Implementing the NIST Risk Management Framework
Project Management: Choosing the Right Online Tool
Professional Soft Skills Learning Pathway
Essential New Skills in Customer Support
Improve Your Interoffice Politics Skills
Teamwork Foundations
Creative Collaboration
Culture of Kaizen (continuous improvement)
Tech Career Skills: Effective Technical Communication
Build Your Skills In Customer Service
Develop Critical-Thinking, Decision-Making, and Problem-Solving Skills
Business Etiquette: Phone, Email, and Text
The Motivation Code: Discover the Hidden Forces That Drive Your
Reframing: The Power of Changing Your Perspective
Develop Your Communication Skills and Interpersonal Influence
Creative Problem Solving for Technologists
Tech Ethics: Avoiding Unintended Consequences
On-the-job training
Develop computer or information security policies or procedures.
Understands company routine processes. Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
Update knowledge about emerging industry or technology trends.
Monitor current reports of computer viruses to determine when to update virus protection systems. Understands technologies and platforms utilized to complete investigations.
Implement security measures for computer or information systems.
Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.
Modify computer security files to incorporate new software, correct errors, or change individual access status.
Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated.
Maintain permanent fleet cryptologic and carry-on direct support systems required in special land, sea surface and subsurface operations.
Test computer system operations to ensure proper functioning.
Perform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures.
Collaborate with others to resolve information technology issues.
Confer with users to discuss issues such as computer data access needs, security violations, and programming changes.
Document operational procedures.
Document computer security and emergency measures policies, procedures, and tests. Understand processes for handling internal outages and the escalation flow when such events occur.
Troubleshoot issues with computer applications or systems.
Confer with users to discuss issues such as computer data access needs, security violations, and programming changes. Understand organizational hierarchy and workflow.
Coordinate project activities with other personnel or departments.
Coordinate implementation of computer system plan with establishment personnel and outside vendors. Uses client/customer requirements to determine investigation requirements. Provides appropriate customer service for customer needs. needs
Monitor the security of digital information.
Monitor use of data files and regulate access to safeguard information in computer files. Create cases based on host impacted, host origin, location, types of attach, executable files etc...Review repeat alarms create service requests and elevate to proper analyst.
Train others in computer interface or software use.
Provide customer training, as appropriate, to attain necessary information to address customer concerns. Train users and promote security awareness to ensure system security and to improve server and network efficiency.
Full service case load with supervision.
Acclimate to fill customer load. Mentor will be available to field questions and issues. Mentor will validate quality of performance of duties. Review cases and investigations to validate that they meet requirements and service level agreements. Remedial training as required.
Interested in this apprenticeship?
Sign up to receive notifications about changes and updates about Information Security Analyst.