Analyst - Information Security

Job-Specific Whole-Person Assessment (Test)

A Short Version of this test is available.   What's the Difference?

Candidates typically need about 45 minutes to complete our full-length job-specific assessments. Our short versions take less than half that time. Like our standard assessments, these tests are based on the U.S. Government Occupational Information Network (O*Net). They do not contain the animated simulation module, however, though they still provide valuable information about all critical performance-related dimensions. Additionally, the short versions optionally include 1-2 virtual video interview questions! Click below for more information:

Analyst - Information Security (Short)

Analyst - Information Security

Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. Assess system vulnerabilities for security risks and propose and implement risk mitigation strategies. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses.

Top activities and tasks for this job:
  • Working with Computers
  • Getting Information
  • Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
  • Identifying Objects, Actions, and Events
  • Monitor current reports of computer viruses to determine when to update virus protection systems.
  • Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.
  • Evaluating Information to Determine Compliance with Standards
  • Perform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures.

About the test (Full Version)

The HR Avatar Analyst - Information Security Pre-Employment Assessment was designed to help you hire staff in this role. The test provides a whole-person evaluation by measuring job-relevant cognitive ability, personality, knowledge, skills, and relevant behavioral history. Each component provides important data for hiring decisions. Cognitive ability has been linked to overall job performance in most jobs and correlates with a candidate's ability to learn new skills and to solve complex problems. Personality characteristics determine how well the candidate will fit-in with a corporate culture. Knowledge and skills indicate how much training will be needed before a new employee becomes productive. Finally, relevant behavioral history detects counter-productive behaviors that can impact job performance.

The Analyst - Information Security test includes an animated work simulation in which candidates meet customers, colleagues and supervisors in a job-related context. Post-test surveys indicate the majority of candidates react favorably to these simulations. This test also contains an automatically-scored essay component. Writing is a key skill for many jobs and also demonstrates the ability to generate, organize, and communicate relevant ideas effectively.

The specific attributes measured include:

Cognitive Ability
  • Analytical Thinking and Attention to Detail
  Knowledge and Skills
  • Writing
  • Adaptability
  • Drive
  • Integrity
  • Resilience
  • Teamwork
  Emotional Intelligence
  • Empathy and Emotional Self-Control
Behavioral History
  • History Survey - Performance
  • History Survey - Tenure

Following completion, the test produces a Candidate Selection Report that includes an overall score and detailed scores for each attribute. The overall score weighs each of the factors based on research and analysis from the U.S. Government's Occupational Information Network (O*Net). O*Net represents over a decade of dedicated research evaluating the relative importance of various factors that lead to success in almost 1,000 different job roles.

The Candidate Selection Report also provides expert interview questions that help you probe critical or low-scoring areas, along with a guide for noting your evaluation of the candidate's responses. Consistent use of an interview guide is an important part of gaining better candidate insights and making better hiring decisions.

Language:English (US)
Time to Complete:40 Minutes (Approximately)
O*Net SOC Code:15-1212.00
Simulation Context:Information Technology
O*Net Context:Computer and Mathematical
More information about this Job
Annual US Wages (2022)
Bottom 10%:
$66,010 or less
Bottom 25%:
$85,270 or less
$112,000 (Average)
Top 25%:
$141,130 or more
Top 10%:
$174,540 or more

US Employment Statistics
2032 (projected):
Annual U.S. Job Openings:16,800

Top Knowledge Requirements
  • Computers and Electronics
  • English Language
  • Administration and Management
  • Engineering and Technology
  • Telecommunications
  • Customer and Personal Service
  • Public Safety and Security
  • Education and Training
Top Skills
  • Reading Comprehension
  • Critical Thinking
  • Active Listening
  • Complex Problem Solving
  • Speaking
  • Writing
  • Monitoring
  • Systems Analysis
Top Abilities
  • Written Comprehension
  • Oral Comprehension
  • Problem Sensitivity
  • Deductive Reasoning
  • Inductive Reasoning
  • Written Expression
  • Information Ordering
  • Oral Expression
Education Requirements
Post-Secondary Certificate:
Some College:
Associate's Degree (2 yr):
Bachelor's Degree:
Post-Baccalaureate Certificate:
Master's Degree:
This graphic shows the percentage of people in this role who have their highest education in each category.
Related Work Experience Requirements
6 Months - 1 Year:
1 - 2 Years:
2 - 4 Years:
4 - 6 Years:
6 - 8 Years:
8 - 10 Years:
More than 10 Years:
This graphic shows the percentage of people in this role whose related work experience before they entered this position falls into each category.

Alternate Titles for this Role: AI Security Specialist (Artificial Intelligence Security Specialist), All-Source Analyst, Application Security Analyst, Applications Security Analyst, Automatic Data Processing Systems Security Specialist (ADP Systems Security), Blue Team Member, Certified Information Systems Security Professional (CISSP), Cloud Security Architect, Computer Security Coordinator, Computer Security Information Specialist, Computer Security Specialist, Computer Systems Security Analyst, Counterespionage Analyst, Cryptological Technician, Cryptologist, Cyber Defense Analyst, Cyber Defense Forensics Analyst, Cyber Incident Responder, Cyber Information Security Analyst, Cyber Intel Planner, Cyber Intelligence Specialist, Cyber Operations Planner (Cyber Ops Planner), Cyber Operations Specialist, Cyber Operator, Cyber Policy and Strategy Planner, Cyber Security Analyst, Cyber Security Specialist, Cybersecurity All-Source Analyst, Cybersecurity Analyst, Cybersecurity Exploitation Analyst, Cybersecurity Multi-Disciplined Language Analyst, Cybersecurity Partner Integration Planner, Cybersecurity Target Developer, Cybersecurity Target Network Analyst, Cybersecurity Threat Analyst, Cybersecurity Warning Analyst, Data Security Analyst, Database Security Expert, Exploitation Analyst, Incident Responder, Industrial Internet of Things Security Specialist (IIoT Security Specialist), Information Assurance Analyst, Information Security Analyst, Information Security Officer, Information Security Specialist, Information Systems Security Analyst, Information Systems Security Officer (ISSO), Information Systems Security Specialist, Information Technology Analyst (IT Analyst), Information Technology Consultant (IT Consultant), Information Technology Security Analyst (IT Security Analyst), Information Technology Security Architect (IT Security Architect), Internet of Things Security Specialist (IoT Security Specialist), Internet Security Specialist, Intrusion Detection Analyst, IT Auditor (Information Technology Auditor), IT Risk Specialist (Information Technology Risk Specialist), Mission Assessment Specialist, Network Security Analyst, Network Security Officer, Network Security Systems Analyst, Red Team Member, Security Analyst, Security Auditor, Security Consultant, Security Operations Analyst, Security Operations Center Analyst (SOC Analyst), Security Specialist, Source Code Auditor, Supervisory Control and Data Acquisition Security Analyst (SCADA Security Analyst), Systems Analyst, Systems Security Analyst, Systems Security Specialist, Technology Analyst, Threat Hunter, Threat Monitoring Analyst, Virus Technician, Warning Analyst

Related Jobs based on Skills & Abilities: Computer Systems Analysts, Network and Computer Systems Administrators, Computer Network Support Specialists, Database Administrators, Computer Systems Engineers/Architects, Computer Network Architects, Computer User Support Specialists, Computer and Information Systems Managers, Document Management Specialists, Software Quality Assurance Analysts and Testers, Database Architects, Telecommunications Engineering Specialists

(HR Avatar Use Only) pid=6344, CTB Direct Test

Sign In  to administer this Full version.

Read the Reviews
Read HR Avatar reviews on G2
"Amazing Service and Spot-On Testing"
"The value received far exceeds the price"
"Truly takes out the guess work"
"Hiring managers can easily understand the reports"

Activities performed during the Test
  • Interpret and report functional requirements.
  • Accurately communicate the maintenance schedule to employees.
  • Optimize infrastructure strategy for phones and network.
  • Calculate product defect rate.
  • Respond to a customer inquiry.

Meet the Avatars
Follow Us
Follow Us LinkedIn LinkedIn
Follow Us Facebook Facebook
Follow Us X Twitter
Subscribe to our Newsletter Tips & Updates
COPYRIGHT  ©  2024   HR Avatar, Inc.   |   Terms and Conditions   |   Privacy
Go to Home Page
This website uses cookies to ensure you get the best experience on our website. Learn More