Department of Labor Logo United States Department of Labor
Dot gov

The .gov means it's official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you're on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Summary

Please enable javascript to play this video.

Video transcript available at https://www.youtube.com/watch?v=cVZktAEtWE4.
Quick Facts: Information Security Analysts
2020 Median Pay $qf_median_annual_wage_html $qf_median_hourly_wage_html
Typical Entry-Level Education $qf_education_html
Work Experience in a Related Occupation $qf_experience_html
On-the-job Training $qf_training_html
Number of Jobs, 2020 $qf_number_jobs_html
Job Outlook, 2020-30 $qf_outlook_html
Employment Change, 2020-30 $qf_openings_html

What Information Security Analysts Do

Information security analysts plan and carry out security measures to protect an organization’s computer networks and systems.

Work Environment

Most information security analysts work for computer companies, consulting firms, or business and financial companies.

How to Become an Information Security Analyst

Most information security analyst positions require a bachelor’s degree in a computer-related field. Employers usually prefer to hire analysts with experience in a related occupation.

Pay

Job Outlook

Overall employment of information security analysts is projected to grow $pc.toString().replaceAll("^\-","") percent from 2020 to 2030, $gra.

About $tools.number.format('#,###',$op) openings for information security analysts are projected each year, on average, over the decade. Many of those openings are expected to result from the need to replace workers who transfer to different occupations or exit the labor force, such as to retire.

State & Area Data

Explore resources for employment and wages by state and area for information security analysts.

Similar Occupations

Compare the job duties, education, job growth, and pay of information security analysts with similar occupations.

More Information, Including Links to O*NET

Learn more about information security analysts by visiting additional resources, including O*NET, a source on key characteristics of workers and occupations.

What Information Security Analysts Do About this section

information security analysts image
Information security analysts install software, such as firewalls, to protect computer networks.

Information security analysts plan and carry out security measures to protect an organization’s computer networks and systems. Their responsibilities are continually expanding as the number of cyberattacks increases.

Duties

Information security analysts typically do the following:

  • Monitor their organization’s networks for security breaches and investigate a violation when one occurs
  • Install and use software, such as firewalls and data encryption programs, to protect sensitive information
  • Prepare reports that document security breaches and the extent of the damage caused by the breaches
  • Conduct penetration testing, which is when analysts simulate attacks to look for vulnerabilities in their systems before they can be exploited
  • Research the latest information technology (IT) security trends
  • Develop security standards and best practices for their organization
  • Recommend security enhancements to management or senior IT staff
  • Help computer users when they need to install or learn about new security products and procedures

IT security analysts are heavily involved with creating their organization’s disaster recovery plan, a procedure that IT employees follow in case of emergency. These plans allow for the continued operation of an organization’s IT department. The recovery plan includes preventive measures such as regularly copying and transferring data to an offsite location. It also involves plans to restore proper IT functioning after a disaster. Analysts continually test the steps in their recovery plans.

Information security analysts must stay up to date on IT security and on the latest methods attackers are using to infiltrate computer systems. Analysts need to research new security technology to decide what will most effectively protect their organization.

Work Environment About this section

information security analysts image
Many analysts work in IT departments and manage the security of their companies computer networks.

Many information security analysts work with other members of an information technology department, such as network administrators or computer systems analysts.

Work Schedules

Most information security analysts work full time. Information security analysts sometimes have to be on call outside of normal business hours in case of an emergency. Some work more than 40 hours per week.

How to Become an Information Security Analyst About this section

information security analysts image
There are a number of information security certifications available, and many employers prefer candidates to have certification.

Most information security analyst positions require a bachelor’s degree in a computer-related field. Employers usually prefer analysts to have experience in a related occupation.

Education

Information security analysts usually need at least a bachelor’s degree in computer science, information assurance, programming, or a related field. 

Some employers prefer applicants who have a Master of Business Administration (MBA) in information systems. Programs offering the MBA in information systems generally require 2 years of study beyond the undergraduate level and include both business and computer-related courses.

Work Experience in a Related Occupation

Information security analysts generally need to have previous experience in a related occupation. Many analysts have experience in an information technology department, often as a network or computer systems administrator. Some employers look for people who have already worked in fields related to the one in which they are hiring. For example, if the job opening is in database security, they may look for a database administrator. If they are hiring in systems security, a computer systems analyst may be an ideal candidate.

Licenses, Certifications, and Registrations

There are a number of information security certifications available, and many employers prefer candidates to have certification, which validates the knowledge and best practices required from information security analysts. Some are general information security certificates, such as the Certified Information Systems Security Professional (CISSP), while others have a more narrow focus, such as penetration testing or systems auditing.

Advancement

Information security analysts can advance to become chief security officers or another type of computer and information systems manager.

Important Qualities

Analytical skills. Information security analysts must carefully study computer systems and networks and assess risks to determine how security policies and protocols can be improved.

Detail oriented. Because cyberattacks can be difficult to detect, information security analysts must pay careful attention to computer systems and watch for minor changes in performance.

Ingenuity. Information security analysts must anticipate information security risks and implement new ways to protect their organizations’ computer systems and networks.

Problem-solving skills. Information security analysts must respond to security alerts and uncover and fix flaws in computer systems and networks.

Pay About this section

Information Security Analysts

Median annual wages, May 2020

Total, all occupations

$41,950

 

Most information security analysts work full time. Information security analysts sometimes have to be on call outside of normal business hours in case of an emergency. Some work more than 40 hours per week.

Job Outlook About this section

Information Security Analysts

Percent change in employment, projected 2020-30

Total, all occupations

8%

 

Overall employment of information security analysts is projected to grow $pc.toString().replaceAll("^\-","") percent from 2020 to 2030, $gra.

About $tools.number.format('#,###',$op) openings for information security analysts are projected each year, on average, over the decade. Many of those openings are expected to result from the need to replace workers who transfer to different occupations or exit the labor force, such as to retire.

Employment

Employment of information security analysts is projected to grow 32 percent from 2018 to 2028, much faster than the average for all occupations.

Demand for information security analysts is expected to be very high. Cyberattacks have grown in frequency, and analysts will be needed to come up with innovative solutions to prevent hackers from stealing critical information or creating problems for computer networks.

Banks and financial institutions, as well as other types of corporations, will need to increase their information security capabilities in the face of growing cybersecurity threats. In addition, as the healthcare industry expands its use of electronic medical records, ensuring patients’ privacy and protecting personal data are becoming more important. More information security analysts are likely to be needed to create the safeguards that will satisfy patients’ concerns.

Employment of information security analysts is projected to grow 55 percent in computer systems design and related services from 2018 to 2028. The increasing adoption of cloud services by small and medium-sized businesses and a rise in cybersecurity threats will create demand for managed security services providers in this industry.

Job Prospects

Job prospects for information security analysts should be good. Information security analysts with related work experience will have the best prospects. For example, an applicant with experience as a database administrator would have better prospects in database security than someone without that experience.

Employment projections data for information security analysts, 2020-30
Occupational Title SOC Code Employment, 2020 Projected Employment, 2030 Change, 2020-30 Employment by Industry
Percent Numeric

SOURCE: U.S. Bureau of Labor Statistics, Employment Projections program

$occ_name

15-1122 $tools.number.format($emp_current) $tools.number.format($emp_projected) $emp_percent_change $tools.number.format($emp_net_change) Get data

State & Area Data About this section

Occupational Employment and Wage Statistics (OEWS)

The Occupational Employment and Wage Statistics (OEWS) program produces employment and wage estimates annually for over 800 occupations. These estimates are available for the nation as a whole, for individual states, and for metropolitan and nonmetropolitan areas.

Projections Central

Occupational employment projections are developed for all states by Labor Market Information (LMI) or individual state Employment Projections offices. All state projections data are available at www.projectionscentral.com. Information on this site allows projected employment growth for an occupation to be compared among states or to be compared within one state. In addition, states may produce projections for areas; there are links to each state’s websites where these data may be retrieved.

CareerOneStop

CareerOneStop includes hundreds of occupational profiles with data available by state and metro area. There are links in the left-hand side menu to compare occupational employment by state and occupational wages by local area or metro area. There is also a salary info tool to search for wages by zip code.

Similar Occupations About this section

This table shows a list of occupations with job duties that are similar to those of information security analysts.

Occupation Job Duties ENTRY-LEVEL EDUCATION Help on Entry-Level Education 2020 MEDIAN PAY Help on Median Pay
Computer and information research scientists Computer and Information Research Scientists

Computer and information research scientists invent and design new approaches to computing technology and find innovative uses for existing technology.

$qf_education_html $qf_median_annual_wage_html
Computer and information systems managers Computer and Information Systems Managers

Computer and information systems managers plan, coordinate, and direct computer-related activities in an organization.

$qf_education_html $qf_median_annual_wage_html
computer network architects image Computer Network Architects

Computer network architects design and build data communication networks, including local area networks (LANs), wide area networks (WANs), and Intranets.

$qf_education_html $qf_median_annual_wage_html
Computer programmers Computer Programmers

Computer programmers write and test code that allows computer applications and software programs to function properly.

$qf_education_html $qf_median_annual_wage_html
Computer support specialists Computer Support Specialists

Computer support specialists provide help and advice to computer users and organizations.

$qf_education_html $qf_median_annual_wage_html
Computer systems analysts Computer Systems Analysts

Computer systems analysts study an organization’s current computer systems and find a solution that is more efficient and effective.

$qf_education_html $qf_median_annual_wage_html
Database administrators Database Administrators

Database administrators (DBAs) use specialized software to store and organize data.

$qf_education_html $qf_median_annual_wage_html
Network and computer systems administrators Network and Computer Systems Administrators

Network and computer systems administrators are responsible for the day-to-day operation of computer networks.

$qf_education_html $qf_median_annual_wage_html
Software developers Software Developers

Software developers create the applications or systems that run on a computer or another device.

$qf_education_html $qf_median_annual_wage_html
Web developers Web Developers

Web developers design and create websites.

$qf_education_html $qf_median_annual_wage_html
Suggested citation:

Bureau of Labor Statistics, U.S. Department of Labor, Occupational Outlook Handbook, Information Security Analysts,
at https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm (visited December 07, 2024).

Last Modified Date: Wednesday, September 4, 2019

What They Do

The What They Do tab describes the typical duties and responsibilities of workers in the occupation, including what tools and equipment they use and how closely they are supervised. This tab also covers different types of occupational specialties.

Work Environment

The Work Environment tab includes the number of jobs held in the occupation and describes the workplace, the level of physical activity expected, and typical hours worked. It may also discuss the major industries that employed the occupation. This tab may also describe opportunities for part-time work, the amount and type of travel required, any safety equipment that is used, and the risk of injury that workers may face.

How to Become One

The How to Become One tab describes how to prepare for a job in the occupation. This tab can include information on education, training, work experience, licensing and certification, and important qualities that are required or helpful for entering or working in the occupation.

Pay

The Pay tab describes typical earnings and how workers in the occupation are compensated—annual salaries, hourly wages, commissions, tips, or bonuses. Within every occupation, earnings vary by experience, responsibility, performance, tenure, and geographic area. For most profiles, this tab has a table with wages in the major industries employing the occupation. It does not include pay for self-employed workers, agriculture workers, or workers in private households because these data are not collected by the Occupational Employment Statistics (OES) survey, the source of BLS wage data in the OOH.

State & Area Data

The State and Area Data tab provides links to state and area occupational data from the Occupational Employment Statistics (OES) program, state projections data from Projections Central, and occupational information from the Department of Labor's CareerOneStop.

Job Outlook

The Job Outlook tab describes the factors that affect employment growth or decline in the occupation, and in some instances, describes the relationship between the number of job seekers and the number of job openings.

Similar Occupations

The Similar Occupations tab describes occupations that share similar duties, skills, interests, education, or training with the occupation covered in the profile.

Contacts for More Information

The More Information tab provides the Internet addresses of associations, government agencies, unions, and other organizations that can provide additional information on the occupation. This tab also includes links to relevant occupational information from the Occupational Information Network (O*NET).

2018 Median Pay

The wage at which half of the workers in the occupation earned more than that amount and half earned less. Median wage data are from the BLS Occupational Employment Statistics survey. In May 2018, the median annual wage for all workers was $38,640.

On-the-job Training

Additional training needed (postemployment) to attain competency in the skills needed in this occupation.

Entry-level Education

Typical level of education that most workers need to enter this occupation.

Work experience in a related occupation

Work experience that is commonly considered necessary by employers, or is a commonly accepted substitute for more formal types of training or education.

Number of Jobs, 2018

The employment, or size, of this occupation in 2018, which is the base year of the 2018-28 employment projections.

Job Outlook, 2018-28

The projected percent change in employment from 2018 to 2028. The average growth rate for all occupations is 5 percent.

Employment Change, 2018-28

The projected numeric change in employment from 2018 to 2028.

Entry-level Education

Typical level of education that most workers need to enter this occupation.

On-the-job Training

Additional training needed (postemployment) to attain competency in the skills needed in this occupation.

Employment Change, projected 2018-28

The projected numeric change in employment from 2018 to 2028.

Growth Rate (Projected)

The percent change of employment for each occupation from 2018 to 2028.

Projected Number of New Jobs

The projected numeric change in employment from 2018 to 2028.

Projected Growth Rate

The projected percent change in employment from 2018 to 2028.

2018 Median Pay

The wage at which half of the workers in the occupation earned more than that amount and half earned less. Median wage data are from the BLS Occupational Employment Statistics survey. In May 2018, the median annual wage for all workers was $38,640.