Skip to main content
acelro

How to switch from Network and Computer Systems Administrators to Information Security Analysts

Based on real labor market data. See the skills you already have, what you need to learn, and how to bridge the gap.

63%

Skill overlap

5

Skills you already have

3

Skills to build

Skills you already have

Computers and ElectronicsEnglish LanguageEngineering and TechnologyTelecommunicationsCustomer and Personal Service

Skills to build

Administration and ManagementPublic Safety and SecurityEducation and Training

Technologies you can carry over

Access management softwareActive directory softwareAdobe ActionScriptAdvanced business application programming ABAPAJAXAmazon DynamoDBAmazon Elastic Compute Cloud EC2Amazon RedshiftAmazon Simple Storage Service S3Amazon Web Services AWS CloudFormationAmazon Web Services AWS softwareAnsible softwareApache AntApache CassandraApache GroovyApache HadoopApache HiveApache HTTP ServerApache KafkaApache MavenApache PigApache SolrApache SparkApache StrutsApache Subversion SVNApache TomcatApple macOSAtlassian BambooAtlassian ConfluenceAtlassian JIRAAutomated installation softwareBashBerkeley Internet Domain Name BINDBlackboard softwareBorder Gateway Protocol BGPCC#C++ChefCisco Systems CiscoWorksCitrix cloud computing softwareCommon business oriented language COBOLCustomer information control system CICSDelphi TechnologyDjangoDockerDomain name system DNSDrupalEclipse IDEElasticsearchEnterprise JavaBeansEpic SystemsESRI ArcGIS softwareEtherealExtensible hypertext markup language XHTMLExtensible markup language XMLFirewall softwareGeographic information system GIS softwareGitGitHubGoGoogle SitesHewlett Packard HP-UXHoneypotHuman resource management software HRMSHypertext markup language HTMLIBM Cognos ImpromptuIBM DominoIBM NotesIBM Power Systems softwareIBM WebSphereIntegrated development environment IDE softwareIntrusion prevention system IPSJavaScriptJavaScript Object Notation JSONJob control language JCLKornShellLAMP StackLinuxMcAfeeMicrosoft .NET FrameworkMicrosoft AccessMicrosoft Active DirectoryMicrosoft Active Server Pages ASPMicrosoft ASP.NETMicrosoft Azure softwareMicrosoft DynamicsMicrosoft ExcelMicrosoft ExchangeMicrosoft Office softwareMicrosoft PowerPointMicrosoft PowerShellMicrosoft ProjectMicrosoft SharePointMicrosoft SQL ServerMicrosoft SQL Server Integration Services SSISMicrosoft SQL Server Reporting Services SSRSMicrosoft TeamsMicrosoft VisioMicrosoft Visual BasicMicrosoft Visual Basic for Applications VBAMicrosoft Visual Basic Scripting Edition VBScriptMicrosoft Visual StudioMicrosoft WindowsMicrosoft Windows ServerMicroStrategyMongoDBMySQLNagiosNetwork and system vulnerability assessment softwareNetwork intrusion prevention systems NIPSNode.jsNortonLifeLock cybersecurity softwareNoSQLOperating system softwareOracle Business Intelligence Enterprise EditionOracle DatabaseOracle E-Business Suite FinancialsOracle Fusion ApplicationsOracle Fusion MiddlewareOracle HyperionOracle JavaOracle JavaServer Pages JSPOracle JD Edwards EnterpriseOneOracle JDBCOracle Net ManagerOracle PeopleSoftOracle PeopleSoft FinancialsOracle PL/SQLOracle SolarisOracle WebLogic ServerPassword management softwarePatch and update management softwarePerforce Helix softwarePerlPHPPing IdentityPostgreSQLPuppetPythonQlik Tech QlikViewQuest BigBrotherRed Hat Enterprise LinuxRed Hat OpenShiftRed Hat WildFlyRelational database management softwareRoot kit detection softwareRubyRuby on RailsSAP Crystal ReportsSAP softwareSASSecure shell SSH softwareSecurity incident management softwareShell scriptSnortSplunk EnterpriseStructured query language SQLSupervisory control and data acquisition SCADA softwareSwiftSystem and data disaster recovery softwareTableauTcpdumpTeradata DatabaseUbuntuUNIXUNIX ShellVeritas NetBackupVirtual private networking VPN softwareVMwareVoice over internet protocol VoIP system softwareWireshark

Technologies to learn

Frequently asked questions

Can I switch from Network and Computer Systems Administrators to Information Security Analysts?

Yes. You already share 5 skills with the Information Security Analysts role (63% overlap). You would need to build 3 additional skills. Acelro can create a personalized learning plan for exactly those gaps.

What skills do I need to learn to become a Information Security Analysts?

Coming from Network and Computer Systems Administrators, you would need to learn: Administration and Management, Public Safety and Security, Education and Training. Key technologies to pick up include 3M Post-it App, AccessData FTK, Anti-phishing software, Anti-spyware software, Anti-Trojan software.

How long does it take to transition from Network and Computer Systems Administrators to Information Security Analysts?

It depends on your current skill level. With 63% skill overlap, you have a solid foundation. Acelro builds a personalized roadmap based on your specific gaps so you only learn what you need.