Information Security Analysts

Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. Assess system vulnerabilities for security risks and propose and implement risk mitigation strategies. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses.

SOC: 15-1212.00

Common Job Titles

Information Security OfficerInformation Systems Security Officer (ISSO)Information Technology Security Analyst (IT Security Analyst)Network Security Analyst
Wage Data According to the Bureau of Labor Statistics

Annual wage data for Information Security Analysts (2024)

Estimated Total Employment (U.S.)

179,430

Wage Distribution by Percentile

MetricU.S.
10% of workers earn the following or less$69,660
10% of workers earn the following or more$186,420
Workers on average earn$127,730

+ indicates wage is at or above the BLS reporting cap ($239,200/year)

Skills & Requirements

Key competencies for this occupation, ranked by importance

  • Computers and Electronics4.3/5
  • English Language4.3/5
  • Administration and Management3.7/5
  • Telecommunications3.6/5
  • Engineering and Technology3.6/5
Tools & Technology

Equipment and software commonly used in this occupation

In-Demand Technology

Frequently requested by employers in job postings

AJAXAmazon DynamoDBAmazon Elastic Compute Cloud EC2Amazon RedshiftAmazon Simple Storage Service S3Amazon Web Services AWS CloudFormationAmazon Web Services AWS softwareAnsible softwareApache CassandraApache HadoopApache HiveApache KafkaApache MavenApache SparkApache Subversion SVNApache TomcatApple macOSAtlassian ConfluenceAtlassian JIRABashBorder Gateway Protocol BGPCC#C++ChefDjangoDockerDrupalESRI ArcGIS softwareEclipse IDEElasticsearchEpic SystemsExtensible markup language XMLGitGitHubGoGoogle AngularHypertext markup language HTMLJavaScriptJavaScript Object Notation JSONLinuxMicrosoft .NET FrameworkMicrosoft ASP.NETMicrosoft AccessMicrosoft Active DirectoryMicrosoft Active Server Pages ASPMicrosoft Azure softwareMicrosoft DynamicsMicrosoft ExcelMicrosoft Office softwareMicrosoft PowerPointMicrosoft PowerShellMicrosoft ProjectMicrosoft SQL ServerMicrosoft SQL Server Integration Services SSISMicrosoft SQL Server Reporting Services SSRSMicrosoft SharePointMicrosoft TeamsMicrosoft VisioMicrosoft Visual BasicMicrosoft Visual Basic for Applications VBAMicrosoft Visual StudioMicrosoft WindowsMicrosoft Windows ServerMicrosoft WordMongoDBMySQLNoSQLNode.jsOracle DatabaseOracle JavaOracle PL/SQLOracle PeopleSoftPHPPerlPostgreSQLPuppetPythonRed Hat Enterprise LinuxRed Hat OpenShiftRubySAP softwareSASSalesforce softwareScalaSeleniumShell scriptSplunk EnterpriseSpring FrameworkStructured query language SQLSwiftTableauTeradata DatabaseThe MathWorks MATLABUNIXUNIX Shell

Technology Skills

3M Post-it AppAccess management softwareAccessData FTKActive directory softwareAdobe ActionScriptAdvanced business application programming ABAPAnti-Trojan softwareAnti-phishing software

Tools & Equipment

Desktop computersLocal area network LAN analyzersMainframe computersNetwork analyzersNotebook computersProtocol analyzers