Information Security Analysts

Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses.

Median Annual Wage: $88,890

Education: Bachelor's degree (65%); Post-baccalaureate certificate (19%); Post-secondary certificate (10%)

Projected Growth: Much faster than average (22% or higher)

Related Job Titles: Information Technology Specialist; Data Security Administrator; Information Security Analyst; Information Security Officer; Computer Specialist; Information Security Specialist; Information Systems Security Analyst; Computer Security Specialist; Information Security Manager; Information Technology Security Analyst

Browse Job Listings

Browse Schools

Source: O*NET OnLine information for Information Security Analysts.

More Computer and Mathematical Careers

  • Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
  • Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated.
  • Monitor use of data files and regulate access to safeguard information in computer files.
  • Monitor current reports of computer viruses to determine when to update virus protection systems.
  • Modify computer security files to incorporate new software, correct errors, or change individual access status.
  • Perform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures.
  • Confer with users to discuss issues such as computer data access needs, security violations, and programming changes.
  • Train users and promote security awareness to ensure system security and to improve server and network efficiency.
  • Coordinate implementation of computer system plan with establishment personnel and outside vendors.
  • Document computer security and emergency measures policies, procedures, and tests.

Source: O*NET OnLine information for Information Security Analysts.

  • Critical Thinking - Using logic and reasoning to identify the strengths and weaknesses of alternative solutions, conclusions or approaches to problems.
  • Complex Problem Solving - Identifying complex problems and reviewing related information to develop and evaluate options and implement solutions.
  • Speaking - Talking to others to convey information effectively.
  • Writing - Communicating effectively in writing as appropriate for the needs of the audience.
  • Active Listening - Giving full attention to what other people are saying, taking time to understand the points being made, asking questions as appropriate, and not interrupting at inappropriate times.
  • Judgment and Decision Making - Considering the relative costs and benefits of potential actions to choose the most appropriate one.
  • Time Management - Managing one's own time and the time of others.
  • Monitoring - Monitoring/Assessing performance of yourself, other individuals, or organizations to make improvements or take corrective action.
  • Active Learning - Understanding the implications of new information for both current and future problem-solving and decision-making.

Source: O*NET OnLine information for Information Security Analysts.

Search Local Job Listings