Skip to content
IIBA.org What Tools Do Business Analysis Professionals Use to Manage Cybersecurity Analysis?

What Tools Do Business Analysis Professionals Use to Manage Cybersecurity Analysis?

 
Receive free IIBA updates and exclusive content!    

Since early 2020, organizations have faced a plethora of cybersecurity issues. Take ransomware attacks, for example. They have increased by 148% due the pandemic, according to AFCEA. This is just one of hundreds of discouraging cybersecurity statistics. Business analysis professionals skilled in cybersecurity analysis can help keep company networks secure during this time of heightened cybercrime.

Those who practice cybersecurity analysis use these tools to do their job.

 

Business Analysis vs. Cybersecurity Analysis

Business analysis is both a role and a discipline. IIBA defines a business analyst as an agent of change who uses the discipline of business analysis to introduce and manage organizational change for businesses, governments, or not-for-profits. Job titles for business analysis practitioners include not only business analyst, but also business systems analyst, systems analyst, requirements engineer, process analyst, product manager, product owner, enterprise analyst, business architect, management consultant, business intelligence analyst, data scientist, and more.

Cybersecurity analyst is a different role than the business analysis professional, but they have many commonalities. For example, cybersecurity analysts perform business analysis tasks, as well as take measures to secure an organization’s computer systems and networks. Rasmussen University explains that cybersecurity analysts are responsible for reporting breaches and network weaknesses, researching IT trends, and educating end users on cybersecurity.

Often, an individual starts out as a business analysis professional, learns about cybersecurity and then earns credentials that give them the competence to assume a cybersecurity analyst role. IIBA and IEEE Computer Society  have partnered to offer a robust learning and certification program on Cybersecurity Analysis and is one program to consider.

6 Tools Cybersecurity Analysts Use to Do Their Job

Cybersecurity analysts use a variety of tools to secure networks and computer systems. Here are a few examples:  

  1. Encryption tools - Encryption software allows cybersecurity analysts to encrypt and decrypt a data stream, whether it is at rest or in transit. This keeps vulnerable data from being seen by unauthorized users.

  2. Network Security Monitoring Tools – Network security monitoring tools help cybersecurity analysts monitor a network to keep it safe and free from intrusion. Examples of these tools include Argus, Nagios, Splunk, and OSSEC.  

  3. Web Vulnerability Scanning Tools - Web vulnerability scanning tools provide insights into cybersecurity weaknesses. These tools enable a cybersecurity analyst to determine what security threats an organization is facing.

  4. Antivirus Software – By installing an appropriate antivirus software solution, a cybersecurity analyst can protect a network from malware. Microsoft Defender, Malwarebytes, and McAfee Total Protection are some examples of antivirus software.
  5. Penetration Testing - Cybersecurity analysts often include penetration testing in their cybersecurity toolbox. “A penetration test, or pen test, is an attempt to evaluate the security of an IT infrastructure by safely trying to exploit vulnerabilities,” explained CoreSecurity.  

  6. Network Intrusion Detection Systems - A Network Intrusion Detection System (IDS) is a software application designed to allow cybersecurity professionals to detect policy violations or malicious activity on a network. A few examples of an IDS include Suricata, SolarWinds Security Event Manager, and OpenWIPS-NG.


Become a Cybersecurity Analyst

There are over 500,000 vacant cybersecurity positions in the United States alone,  according to VentureBeat. Those who practice business analysis can augment their knowledge and skills by earning a professional designation, such as the Certificate in Cybersecurity Analysis (IIBA®-CCA) offered by IIBA. Learn about this certification program and how it can help you expand your career potential.

 


 

About The Author:
Isabel Feher-Watters

Isabel Feher-Watters is the Certification Programs Manager at IIBA® and has 20+ years' experience building talent and leadership in the workplace through learning, certification, and credentialing programs and practices. She holds a professional certification as a Certified Association Executive (CAE®), Certified Training and Development Professional (CTDP)™, and a Change Management Registered Practitioner (CMRP®). Isabel is passionate about learning and professional development in the Business Analysis community.