Information Security Analyst

Does this career fit your work personality?

Begin The Career Assessment Test
?
FIT Score
?
?
?
?
Discover your work personality strengths.
This is a Premium Feature X Find your
  • Best Fitting Careers
  • Work Personality Strengths
  • Work Style Preferences
  • and more
Job Outlook:
Much faster than average
Education: Bachelor's degree
Salary
High: $174,540.00
Average: $119,860.00
Hourly
Average: $57.63

What they do:

Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. Assess system vulnerabilities for security risks and propose and implement risk mitigation strategies. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses.

On the job, you would:

  • Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
  • Monitor current reports of computer viruses to determine when to update virus protection systems.
  • Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.

Important Qualities

Analytical skills. Information security analysts study computer systems and networks and assess risks to determine improvements for security policies and protocols.

Communication skills. Information security analysts must be able to explain information security needs and potential threats to technical and nontechnical audiences within their organizations.

Creative skills. Information security analysts must anticipate information security risks and implement new ways to protect their organizations’ computer systems and networks.

Detail oriented. Because cyberattacks may be difficult to detect, information security analysts must pay careful attention to computer systems and watch for minor changes in performance.

Problem-solving skills. Information security analysts must respond to security alerts and uncover and fix flaws in computer systems and networks.

Personality

A3 Your Strengths Importance

Characteristics of this Career

89% Attention to Detail  -  Job requires being careful about detail and thorough in completing work tasks.
88% Dependability  -  Job requires being reliable, responsible, and dependable, and fulfilling obligations.
88% Integrity  -  Job requires being honest and ethical.
86% Analytical Thinking  -  Job requires analyzing information and using logic to address work-related issues and problems.
82% Cooperation  -  Job requires being pleasant with others on the job and displaying a good-natured, cooperative attitude.
81% Adaptability/Flexibility  -  Job requires being open to change (positive or negative) and to considerable variety in the workplace.
80% Initiative  -  Job requires a willingness to take on responsibilities and challenges.
76% Self-Control  -  Job requires maintaining composure, keeping emotions in check, controlling anger, and avoiding aggressive behavior, even in very difficult situations.
76% Persistence  -  Job requires persistence in the face of obstacles.
75% Achievement/Effort  -  Job requires establishing and maintaining personally challenging achievement goals and exerting effort toward mastering tasks.
73% Stress Tolerance  -  Job requires accepting criticism and dealing calmly and effectively with high-stress situations.
73% Leadership  -  Job requires a willingness to lead, take charge, and offer opinions and direction.
72% Independence  -  Job requires developing one's own ways of doing things, guiding oneself with little or no supervision, and depending on oneself to get things done.
68% Innovation  -  Job requires creativity and alternative thinking to develop new ideas for and answers to work-related problems.
67% Concern for Others  -  Job requires being sensitive to others' needs and feelings and being understanding and helpful on the job.
A3 Your Strengths Importance

Strengths

89% Conventional  -  Work involves following procedures and regulations to organize information or data, typically in a business setting. Conventional occupations are often associated with office work, accounting, mathematics/statistics, information technology, finance, or human resources.
72% Investigative  -  Work involves studying and researching non-living objects, living organisms, disease or other forms of impairment, or human behavior. Investigative occupations are often associated with physical, life, medical, or social sciences, and can be found in the fields of humanities, mathematics/statistics, information technology, or health care service.
61% Realistic  -  Work involves designing, building, or repairing of equipment, materials, or structures, engaging in physical activity, or working outdoors. Realistic occupations are often associated with engineering, mechanics and electronics, construction, woodworking, transportation, machine operation, agriculture, animal services, physical or manual labor, athletics, or protective services.
A3 Your Strengths Importance

Values of the Work Environment

78% Working Conditions  -  Occupations that satisfy this work value offer job security and good working conditions. Corresponding needs are Activity, Compensation, Independence, Security, Variety and Working Conditions.
72% Support  -  Occupations that satisfy this work value offer supportive management that stands behind employees. Corresponding needs are Company Policies, Supervision: Human Relations and Supervision: Technical.
72% Independence  -  Occupations that satisfy this work value allow employees to work on their own and make decisions. Corresponding needs are Creativity, Responsibility and Autonomy.
61% Achievement  -  Occupations that satisfy this work value are results oriented and allow employees to use their strongest abilities, giving them a feeling of accomplishment. Corresponding needs are Ability Utilization and Achievement.

Aptitude

A3 Your Strengths Importance

Abilities | Cognitive, Physical, Personality

75% Oral Comprehension  -  The ability to listen to and understand information and ideas presented through spoken words and sentences.
75% Written Comprehension  -  The ability to read and understand information and ideas presented in writing.
75% Problem Sensitivity  -  The ability to tell when something is wrong or is likely to go wrong. It does not involve solving the problem, only recognizing that there is a problem.
75% Deductive Reasoning  -  The ability to apply general rules to specific problems to produce answers that make sense.
75% Inductive Reasoning  -  The ability to combine pieces of information to form general rules or conclusions (includes finding a relationship among seemingly unrelated events).
72% Information Ordering  -  The ability to arrange things or actions in a certain order or pattern according to a specific rule or set of rules (e.g., patterns of numbers, letters, words, pictures, mathematical operations).
72% Written Expression  -  The ability to communicate information and ideas in writing so others will understand.
69% Oral Expression  -  The ability to communicate information and ideas in speaking so others will understand.
69% Near Vision  -  The ability to see details at close range (within a few feet of the observer).

Job Details

Responsibilities
Train others in computer interface or software use.
Develop computer or information security policies or procedures.
Troubleshoot issues with computer applications or systems.
Collaborate with others to resolve information technology issues.
Update knowledge about emerging industry or technology trends.
Implement security measures for computer or information systems.
Coordinate project activities with other personnel or departments.
Monitor the security of digital information.
Test computer system operations to ensure proper functioning.
Implement security measures for computer or information systems.
Document operational procedures.
Implement security measures for computer or information systems.
Implement security measures for computer or information systems.
A3 Your Strengths Importance

Attributes & Percentage of Time Spent

99% Electronic Mail  -  How often do you use electronic mail in this job?
96% Indoors, Environmentally Controlled  -  How often does this job require working indoors in environmentally controlled conditions?
87% Telephone  -  How often do you have telephone conversations in this job?
87% Face-to-Face Discussions  -  How often do you have to have face-to-face discussions with individuals or teams in this job?
83% Contact With Others  -  How much does this job require the worker to be in contact with others (face-to-face, by telephone, or otherwise) in order to perform it?
81% Spend Time Sitting  -  How much does this job require sitting?
80% Work With Work Group or Team  -  How important is it to work with others in a group or team in this job?
77% Structured versus Unstructured Work  -  To what extent is this job structured for the worker, rather than allowing the worker to determine tasks, priorities, and goals?
77% Importance of Being Exact or Accurate  -  How important is being very exact or highly accurate in performing this job?
75% Freedom to Make Decisions  -  How much decision making freedom, without supervision, does the job offer?
66% Impact of Decisions on Co-workers or Company Results  -  What results do your decisions usually have on other people or the image or reputation or financial resources of your employer?
65% Time Pressure  -  How often does this job require the worker to meet strict deadlines?
78% Duration of Typical Work Week  -  Number of hours typically worked in one week.
A3 Your Strengths Importance

Tasks & Values

93% Working with Computers  -  Using computers and computer systems (including hardware and software) to program, write software, set up functions, enter data, or process information.
88% Getting Information  -  Observing, receiving, and otherwise obtaining information from all relevant sources.
82% Identifying Objects, Actions, and Events  -  Identifying information by categorizing, estimating, recognizing differences or similarities, and detecting changes in circumstances or events.
78% Evaluating Information to Determine Compliance with Standards  -  Using relevant information and individual judgment to determine whether events or processes comply with laws, regulations, or standards.
77% Processing Information  -  Compiling, coding, categorizing, calculating, tabulating, auditing, or verifying information or data.
77% Analyzing Data or Information  -  Identifying the underlying principles, reasons, or facts of information by breaking down information or data into separate parts.
76% Updating and Using Relevant Knowledge  -  Keeping up-to-date technically and applying new knowledge to your job.
76% Documenting/Recording Information  -  Entering, transcribing, recording, storing, or maintaining information in written or electronic/magnetic form.
75% Communicating with Supervisors, Peers, or Subordinates  -  Providing information to supervisors, co-workers, and subordinates by telephone, in written form, e-mail, or in person.
74% Making Decisions and Solving Problems  -  Analyzing information and evaluating results to choose the best solution and solve problems.
73% Monitoring Processes, Materials, or Surroundings  -  Monitoring and reviewing information from materials, events, or the environment, to detect or assess problems.
69% Interpreting the Meaning of Information for Others  -  Translating or explaining what information means and how it can be used.
67% Organizing, Planning, and Prioritizing Work  -  Developing specific goals and plans to prioritize, organize, and accomplish your work.

What Information Security Analysts Do

information security analysts image
Information security analysts install software, such as firewalls, to protect computer networks.

Information security analysts plan and carry out security measures to protect an organization’s computer networks and systems.

Duties

Information security analysts typically do the following:

  • Monitor their organization’s networks for security breaches and investigate when one occurs
  • Use and maintain software, such as firewalls and data encryption programs, to protect sensitive information
  • Check for vulnerabilities in computer and network systems
  • Research the latest information technology (IT) security trends
  • Prepare reports that document general metrics, attempted attacks, and security breaches
  • Develop security standards and best practices for their organization
  • Recommend security enhancements to management or senior IT staff
  • Help computer users when they need to install or learn about new security products and procedures

Information security analysts are heavily involved with creating their organization’s disaster recovery plan, a procedure that IT employees follow in case of emergency. These plans allow for the continued operation of an organization’s IT department. The recovery plan includes preventive measures such as regularly copying and transferring data to an offsite location. It also involves plans to restore proper IT functioning after a disaster. Analysts continually test the steps in their recovery plans.

Information security analysts must stay up to date on IT security and on the latest methods attackers are using to infiltrate computer systems. Analysts need to research new security technology to decide what will most effectively protect their organization.

Work Environment

Information security analysts held about 168,900 jobs in 2022. The largest employers of information security analysts were as follows:

Computer systems design and related services 25%
Finance and insurance 16
Information 10
Management of companies and enterprises 9
Management, scientific, and technical consulting services 6

Many information security analysts work with other members of an information technology department, such as network administrators or computer systems analysts.

Work Schedules

Most information security analysts work full time, and some work more than 40 hours per week. Information security analysts sometimes have to be on call outside of normal business hours in case of an emergency.

Getting Started

Education:
53%
Bachelor's Degree
23%
Post-Baccalaureate Certificate - awarded for completion of an organized program of study; designed for people who have completed a Baccalaureate degree but do not meet the requirements of academic degrees carrying the title of Master.

How to Become an Information Security Analyst

information security analysts image
There are a number of information security certifications available, and many employers prefer candidates to have certification.

Information security analysts typically need a bachelor’s degree in a computer science field, along with related work experience. Employers may prefer to hire analysts who have professional certification.

Education

Information security analysts typically need a bachelor’s degree in computer and information technology or a related field, such as engineering or math. However, some workers enter the occupation with a high school diploma and relevant industry training and certifications.

Work Experience in a Related Occupation

Information security analysts may need to have work experience in a related occupation. Many analysts have experience in an information technology department, often as a network and computer systems administrator.

Licenses, Certifications, and Registrations

Many employers prefer to hire candidates who have information security certification. Some of these certifications, such as Security+, are for workers at the entry level; others, such as the Certified Information Systems Security Professional (CISSP), are designed for experienced information security workers. Certification in specialized areas, such as systems auditing, also is available.

Advancement

Information security analysts may advance to become chief security officers or another type of computer and information systems manager. Information security analysts also may advance within the occupation as they gain experience. For example, they may lead a team of other information security analysts or become an expert in a particular area of information security.

Job Outlook

Employment of information security analysts is projected to grow 32 percent from 2022 to 2032, much faster than the average for all occupations.

About 16,800 openings for information security analysts are projected each year, on average, over the decade. Many of those openings are expected to result from the need to replace workers who transfer to different occupations or exit the labor force, such as to retire.

Employment

High demand is expected for information security analysts. Cyberattacks have grown in frequency, and these analysts will be needed to create innovative solutions to prevent hackers from stealing critical information or creating problems for computer networks.

As businesses focus on enhancing cybersecurity, they will need information security analysts to secure new technologies from outside threats or hacks. A shift to remote work and the rise of e-commerce have increased the need for enhanced security, contributing to the projected employment growth of these workers over the decade.

Strong growth in digital health services and telehealth will also increase data security risks for healthcare providers. More of these analysts are likely to be needed to safeguard patients' personal information and data.

Contacts for More Information

For more information about computer careers, visit

Association for Computing Machinery

Computing Research Association

IEEE Computer Society

For information about opportunities for women pursuing information technology careers, visit:

National Center for Women & Information Technology

Similar Occupations

This table shows a list of occupations with job duties that are similar to those of information security analysts.

Occupation Job Duties Entry-Level Education Median Annual Pay, May 2022
Computer and information research scientists Computer and Information Research Scientists

Computer and information research scientists design innovative uses for new and existing computing technology.

Master's degree $136,620
Computer and information systems managers Computer and Information Systems Managers

Computer and information systems managers plan, coordinate, and direct computer-related activities in an organization.

Bachelor's degree $164,070
computer network architects image Computer Network Architects

Computer network architects design and build data communication networks, including local area networks (LANs), wide area networks (WANs), and Intranets.

Bachelor's degree $126,900
Computer programmers Computer Programmers

Computer programmers write, modify, and test code and scripts that allow computer software and applications to function properly.

Bachelor's degree $97,800
Computer support specialists Computer Support Specialists

Computer support specialists maintain computer networks and provide technical help to computer users.

See How to Become One $59,660
Computer systems analysts Computer Systems Analysts

Computer systems analysts study an organization’s current computer systems and design ways to improve efficiency.

Bachelor's degree $102,240
Database administrators Database Administrators and Architects

Database administrators and architects create or organize systems to store and secure data.

Bachelor's degree $112,120
Network and computer systems administrators Network and Computer Systems Administrators

Network and computer systems administrators install, configure, and maintain organizations’ computer networks and systems.

Bachelor's degree $90,520
Software developers Software Developers, Quality Assurance Analysts, and Testers

Software developers design computer applications or programs. Software quality assurance analysts and testers identify problems with applications or programs and report defects.  

Bachelor's degree $124,200
Web developers Web Developers and Digital Designers

Web developers create and maintain websites. Digital designers develop, create, and test website or interface layout, functions, and navigation for usability.

Bachelor's degree $80,730

Information provided by CareerFitter, LLC and other sources.

Sections of this page includes information from the O*NET 27.3 Database by the U.S. Department of Labor, Employment and Training Administration (USDOL/ETA). Used under the CC BY 4.0 license.

CareerFitter, LLC has modified all or some of this information. USDOL/ETA has not approved, endorsed, or tested these modifications.