How do they match: Information Security Analysts

  • Cyber Policy and Strategy Planner
  • Supervisory Control and Data Acquisition Security Analyst

  • Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.