Skip to Content
Logo Careeronestop
careeronestop
GetMyFuture
Sponsored by the U.S. Department of Labor.
A proud partner of the american job center network.

Occupation Profile
Information Security Analysts

What do they do?

Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses.
Typical interests of people in this field:
Conventional, Investigative, Realistic

    Help:

    What does this information tell me?

    This description can give you a quick overview of what you might do if you worked in this job.

    “Typical interests of people in this field” shows the main types of interests related to this occupation, based on categories from the Interest Assessment. You’ll see one, two, or three “interest types” that are strongest for the occupation.

    You can read more about these interest types and learn more about your own interests by taking the Interest Assessment.

    You can use this information to see if this career might be a good match for what you are interested in and like to do. 

    What is the source of this information?

    The occupation description and the related interests come from O*NET OnLine’s Occupation Information.

Also known as

  • Information Security Officer
  • Information Security Specialist
  • Information Systems Security Analyst
  • Systems Analyst
  • Information Systems Security Officer
  • Data Security Administrator
  • Security Analyst
  • Network Security Analyst
  • Information Technology Specialist
  • Information Technology Security Analyst (IT Security Analyst)
    Help:

    What does this information tell me?

    This is a list of other names for the occupation you selected. Sometimes different employers, industries, or parts of the country use different names for the same career.

    You can use these names as substitutes for the career name when you’re looking for more information online or searching for job postings.

    What is the source of this information?

    These alternate titles come from O*NET OnLine’s Occupation Information.

Career video

00:00
00:00
    Transcript:As persistently as computer hackers work to infiltrate secure networks, information security analysts work that much harder to keep prying eyes out. Information security analysts design and implement security measures to protect an organization’s computer networks and systems. Their creativity and innovation continually expand as the number and complexity of cyberattacks increases. In this field, it’s essential to keep up with new technology and preventive methods. Information security analysts install and operate firewalls, data encryption programs, and other software, monitor their organization for security breaches, and even simulate attacks to look for vulnerabilities in their system. Their work is the opposite of hacking— and security analysts need to know how to break a system’s defenses… just as well as they know how to build them. Information security analysts work for computer companies, consulting firms, or business and financial companies. Most work standard full-time hours but may need to be on call in case of an emergency. Information security analysts typically need at least a bachelor’s degree in computer science, programming, or a related field, though some employers prefer applicants with a Master’s of Business Administration in Information Systems. As the field of information security quickly evolves, new specialized education and training programs are emerging, but having an ingenious streak will continue to be a vital quality for these professionals.
View transcript
How much does it pay?

Hourly wages for Information Security Analysts in United States


Wage Chart for Occupation
$34.68 $59.22


Wage Chart legend for lowest 25 percent
  One out of four earn less than $34.68
Wage Chart legend for middle 50 percent
  Half earn between $34.68 and $59.22
Wage Chart legend for highest 25 percent
  One out of four earn more than $59.22



    What does this information tell me?

    This chart shows you a range of how much most workers in this occupation earn per hour, in the location that you selected.

    The lower rate on the left shows what 25 percent of all workers in this field earn less than, and 75 percent earn more than. If you are just starting out, you can assume you might make closer to this amount than the higher amount, although this is not necessarily a “starting wage.” Often workers with more experience and training earn wages at the higher end.

    You can learn more about wages for this and other occupations by clicking “See more wages” above.

    What is the source of this information?

    The wage information comes from the Bureau of Labor Statistics, Occupational Employment Statistics Program, a semi-annual survey that provides wage and employment statistics for the nation, each state, and sub-state regions.

Will there be jobs?

Image. Employment outlook for this occupation
New job opportunities are very likely in the future.

This occupation is:
  • Expected to grow much faster than average


    What does this information tell me?

    Outlook information can tell you whether a career is expected to be in demand in the future—that is, whether there are likely to be job openings if you choose this career. Careers can have one of three outlooks:

    • A Bright outlook means new job opportunities are very likely in the future
    • An Average outlook means that a small number of new job opportunities are likely in the future (less than an 8 percent increase)
    • A Below average outlook means new job opportunities are less likely in the future

    You can also view local job listings in this field by clicking "Find job openings" above. This can help you see if local businesses are hiring—another way of looking at demand.

    What is the source of this information?

    This information comes from O*NET’s Bright Outlook occupations. It is only available at a national level, so even if you selected a state, you’ll only see this information for the whole country.

How much education do you need?

Typical education needed for entry: Bachelor's degree
Chart. Percent of workers in this field by education level attained

    What does this information tell me?

    There are two pieces of information here:

    • The first sentence tells you the typical level of education that you would need to start in this career. You can use this to see if you have, or want to get, the education level usually needed for this career.
    • The chart shows you the range of education levels that people who currently work in this field have. You can use this to see if you fit in this range.

    Note that these two may be different since the chart includes ALL people who work in this field and not just those getting started.

    For example, sometimes career requirements change. People already in the field may not be required to have the higher level of education that new workers need.

    You can search for programs that lead to the education needed for this career in your local area, by clicking “Find local training” above.

    What is the source of this information?

    Both pieces of education information come from the Bureau of Labor Statistics, Office of Occupational Statistics and Employment Projections.

What you might do in a day
  • Develop computer or information security policies or procedures.
  • Update knowledge about emerging industry or technology trends.
  • Implement security measures for computer or information systems.
  • Test computer system operations to ensure proper functioning.
  • Troubleshoot issues with computer applications or systems.
  • Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
  • Monitor current reports of computer viruses to determine when to update virus protection systems.
  • Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.
  • Perform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures.
  • Modify computer security files to incorporate new software, correct errors, or change individual access status.

    What does this information tell me?

    This is a list of typical tasks that people in this career might do on the job.  You can use this list to get an idea of whether this career might be a good fit for you.

    Click on “More tasks” to see more detailed examples of activities for this career.

    You can also use this list to help you prepare for a job interview. Or, if you’ve already held a job like this, you can copy these tasks to use on your resume.

    What is the source of this information?

    This information comes from O*NET OnLine's Occupation Information. The first five items on the list are O*NET’s Detailed Work Activities. The second five, shown after you click “More tasks,” are O*NET‘s Tasks.