Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

Systems Security Analysts assess system architectures and integrate cybersecurity controls to protect sensitive data. They conduct vulnerability analyses, resolve incidents, and ensure compliance with cybersecurity standards.

What You'll Do

Cybersecurity Architecture Integration

Design, integrate, and optimize robust cybersecurity architectures to protect critical systems and ensure seamless operational performance.

Vulnerability Incident Response

Identify vulnerabilities, mitigate cybersecurity risks, and swiftly resolve incidents to maintain continuous organizational resilience.

Cryptography Credential Compliance

Implement cryptographic solutions, manage credential systems, and ensure strict compliance with cybersecurity regulations and standards.

Similar Roles

Data Analysis (OPM 422)

NICE: Implementation and Operation

Responsible for analyzing data from multiple disparate sources to provide cybersecurity and privacy insight. Designs and implements custom algorithms, workflow processes, and layouts for complex, enterprise-scale data sets used for modeling, data mining, and research purposes.

Explore learning path

Systems Administration (OPM 451)

NICE: Implementation and Operation

Responsible for setting up and maintaining a system or specific components of a system in adherence with organizational security policies and procedures. Includes hardware and software installation, configuration, and updates; user account management; backup and recovery management; and security control implementation.

Explore learning path

Network Operations (OPM 441)

NICE: Implementation and Operation

Responsible for planning, implementing, and operating network services and systems, including hardware and virtual environments.

Explore learning path

Knowledge Management (OPM 631)

NICE: Implementation and Operation

Responsible for managing and administering processes and tools to identify, document, and access an organization’s intellectual capital.

Explore learning path

Database Administration (OPM 421)

NICE: Implementation and Operation

Responsible for administering databases and data management systems that allow for the secure storage, query, protection, and utilization of data.

Explore learning path

Technical Support (OPM 411)

NICE: Implementation and Operation

Responsible for providing technical support to customers who need assistance utilizing client-level hardware and software in accordance with established or approved organizational policies and processes.

Explore learning path

Need more guidance about cyber roles?

There are numerous different roles in cybersecurity and where you fit depends on your interest level. SANS New to Cyber offers courses, certifications, and free resources for anyone interested in getting started in cybersecurity.

Explore New to Cyber