What is an Information Security Analyst?
Job Description & Duties Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses.
Daily Life Of an Information Security Analyst
- Document computer security and emergency measures policies, procedures, and tests.
- Coordinate implementation of computer system plan with establishment personnel and outside vendors.
- Monitor current reports of computer viruses to determine when to update virus protection systems.
- Monitor use of data files and regulate access to safeguard information in computer files.
- Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated.
- Confer with users to discuss issues such as computer data access needs, security violations, and programming changes.
Information Security Analyst Required Skills
Below is a list of the skills most Information Security Analysts say are important on the job.
Reading Comprehension: Understanding written sentences and paragraphs in work related documents.
Critical Thinking: Using logic and reasoning to identify the strengths and weaknesses of alternative solutions, conclusions or approaches to problems.
Active Listening: Giving full attention to what other people are saying, taking time to understand the points being made, asking questions as appropriate, and not interrupting at inappropriate times.
Complex Problem Solving: Identifying complex problems and reviewing related information to develop and evaluate options and implement solutions.
Speaking: Talking to others to convey information effectively.
Writing: Communicating effectively in writing as appropriate for the needs of the audience.
Related Job Titles
- Security Operations Center Analyst (SOC Analyst)
- Cyber Intel Planner
- Certified Information Systems Security Professional (CISSP)
- Cyber Operator
- Information Security Analyst
Are There Job Opportunities for Information Security Analysts?
There were about 100,000 jobs for Information Security Analyst in 2016 (in the United States). New jobs are being produced at a rate of 28.5% which is above the national average. The Bureau of Labor Statistics predicts 28,500 new jobs for Information Security Analyst by 2026. Due to new job openings and attrition, there will be an average of 10,400 job openings in this field each year.
The states with the most job growth for Information Security Analyst are Louisiana, Utah, and Washington. Watch out if you plan on working in Maryland, Vermont, or Alaska. These states have the worst job growth for this type of profession.
Information Security Analyst Average Salary
Information Security Analysts make between $56,750 and $156,580 a year.
Information Security Analysts who work in New Jersey, District of Columbia, or New York, make the highest salaries.
Below is a list of the median annual salaries for Information Security Analysts in different U.S. states.
|State||Annual Mean Salary|
|District of Columbia||$118,080|
What Tools do Information Security Analysts Use?
Below is a list of the types of tools and technologies that Information Security Analysts may use on a daily basis:
- Microsoft Excel
- Microsoft Word
- Microsoft Office
- Hypertext markup language HTML
- Microsoft PowerPoint
- Microsoft Access
- Data entry software
- Microsoft Windows
- Microsoft Project
- Microsoft Visio
- Microsoft SharePoint
- Structured query language SQL
- The MathWorks MATLAB
How to Become an Information Security Analyst
Education needed to be an Information Security Analyst:
How many years of work experience do I need?
Where do Information Security Analysts Work?
Below are examples of industries where Information Security Analysts work:
Those interested in being an Information Security Analyst may also be interested in:
Those who work as an Information Security Analyst sometimes switch careers to one of these choices:
More about our data sources and methodologies.