All About Information Security Analysts
Example of Information Security Analyst Job Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses.
A Day in the Life of an Information Security Analyst
- Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.
- Modify computer security files to incorporate new software, correct errors, or change individual access status.
- Confer with users to discuss issues such as computer data access needs, security violations, and programming changes.
- Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated.
- Perform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures.
- Coordinate implementation of computer system plan with establishment personnel and outside vendors.
Featured schools near , edit
Qualities of an Information Security Analyst
These are the skills Information Security Analysts say are the most useful in their careers:
Reading Comprehension: Understanding written sentences and paragraphs in work related documents.
Critical Thinking: Using logic and reasoning to identify the strengths and weaknesses of alternative solutions, conclusions or approaches to problems.
Active Listening: Giving full attention to what other people are saying, taking time to understand the points being made, asking questions as appropriate, and not interrupting at inappropriate times.
Complex Problem Solving: Identifying complex problems and reviewing related information to develop and evaluate options and implement solutions.
Speaking: Talking to others to convey information effectively.
Writing: Communicating effectively in writing as appropriate for the needs of the audience.
Related Job Titles for this Occupation:
- Security Consultant
- Security Manager
- Automatic Data Processing Systems Security Specialist (ADP Systems Security)
- All-Source Analyst
- Information Assurance Engineer
Job Outlook for Information Security Analysts
There were about 100,000 jobs for Information Security Analyst in 2016 (in the United States). New jobs are being produced at a rate of 28.5% which is above the national average. The Bureau of Labor Statistics predicts 28,500 new jobs for Information Security Analyst by 2026. Due to new job openings and attrition, there will be an average of 10,400 job openings in this field each year.
The states with the most job growth for Information Security Analyst are Louisiana, Utah, and Washington. Watch out if you plan on working in Maryland, Vermont, or Alaska. These states have the worst job growth for this type of profession.
What is the Average Salary of an Information Security Analyst
Information Security Analysts make between $56,750 and $156,580 a year.
Information Security Analysts who work in New Jersey, District of Columbia, or New York, make the highest salaries.
How much do Information Security Analysts make in each U.S. state?
| State | Annual Mean Salary |
|---|---|
| Alabama | $92,500 |
| Alaska | $105,280 |
| Arizona | $93,960 |
| Arkansas | $81,710 |
| California | $110,340 |
| Colorado | $102,820 |
| Connecticut | $112,900 |
| Delaware | $106,780 |
| District of Columbia | $118,080 |
| Florida | $91,950 |
| Georgia | $94,490 |
| Hawaii | $91,520 |
| Idaho | $86,590 |
| Illinois | $98,640 |
| Indiana | $80,080 |
| Iowa | $83,030 |
| Kansas | $86,160 |
| Kentucky | $83,890 |
| Louisiana | $74,350 |
| Maine | $82,270 |
| Maryland | $107,960 |
| Massachusetts | $108,400 |
| Michigan | $93,850 |
| Minnesota | $97,040 |
| Mississippi | $73,550 |
| Missouri | $91,210 |
| Montana | $64,790 |
| Nebraska | $84,540 |
| Nevada | $89,530 |
| New Hampshire | $100,850 |
| New Jersey | $121,600 |
| New Mexico | $106,360 |
| New York | $122,000 |
| North Carolina | $104,430 |
| North Dakota | $79,940 |
| Ohio | $93,770 |
| Oklahoma | $81,900 |
| Oregon | $92,620 |
| Pennsylvania | $97,620 |
| Rhode Island | $109,580 |
| South Carolina | $75,770 |
| South Dakota | $91,630 |
| Tennessee | $82,160 |
| Texas | $104,170 |
| Utah | $86,790 |
| Vermont | $84,680 |
| Virginia | $111,780 |
| Washington | $107,800 |
| West Virginia | $84,620 |
| Wisconsin | $81,050 |
| Wyoming | $73,280 |
Tools & Technologies Used by Information Security Analysts
Although they’re not necessarily needed for all jobs, the following technologies are used by many Information Security Analysts:
- Microsoft Excel
- Microsoft Word
- Microsoft Office
- Hypertext markup language HTML
- JavaScript
- Microsoft PowerPoint
- Git
- Python
- Microsoft Access
- Node.js
- MySQL
- Data entry software
- MongoDB
- SAP
- Microsoft Windows
- Microsoft Project
- Microsoft SharePoint
- Microsoft Visio
- Structured query language SQL
- The MathWorks MATLAB
How do I Become an Information Security Analyst?
What education or degrees do I need to become an Information Security Analyst?
How Long Does it Take to Become an Information Security Analyst?
Who Employs Information Security Analysts?
Below are examples of industries where Information Security Analysts work:
Other Jobs You May be Interested In
Those thinking about becoming an Information Security Analyst might also be interested in the following careers:
Career changers with experience as an Information Security Analyst sometimes find work in one of the following fields:
References:
Image Credit: Negative Space via CC0 License
More about our data sources and methodologies.
Featured Schools
Request Info
|
Southern New Hampshire University You have goals. Southern New Hampshire University can help you get there. Whether you need a bachelor's degree to get into a career or want a master's degree to move up in your current career, SNHU has an online program for you. Find your degree from over 200 online programs. Learn More > |