Plan, coordinate, and implement security measures for information systems to regulate access to computer data files and prevent unauthorized modification, destruction, or disclosure of information. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses. May use the following technology: Authentication server software (Akoura SmartToken; Diameter; IBM Tivoli Identity Management TIM; Remote authentication dial-in user service RADIUS), Internet directory services software (Active directory; BIND; DNS; Network directory services), Network monitoring software (Cisco Systems CiscoWorks; Hewlett-Packard HP OpenView; Quest Big Brother; Sun Microsystems NetManage), Network security or virtual private network VPN management software (IPS; Network and system vulnerability assessment; Network security auditing; Snort intrusion detection technology), Transaction security and virus protection software (Honeypot; McAfee VirusScan; Ping; SSP). Alternate job titles include: Data Security Administrator, Information Security Analyst, Information Security Officer, Information Security Specialist, Information Systems Security Analyst, Computer Security Specialist, Information Security Manager, Information Technology Security Analyst.
Intrusion Detection And Prevention