Skip over navigation
mySkills myFuture Start Page

Occupations Information for

Information Security Analysts


Want to see how your skills match up?
Enter your current or previous job

Choose a Location




Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses.


Currently Employed: 310

Projected Annual Job Openings: 30

Typical Hourly Wage: $32.35 - $51.95

Typical Annual Salary: $67,300 - $108,100

See Job Listings (43)
Find Businesses

typical training

Typical education needed for entry: Bachelor's degree

Typical work experience needed for a job in this occupation: Less than 5 years

Typical on-the-job training once you have a job in this occupation: None

Find Training

typical job duties

  • Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
  • Monitor current reports of computer viruses to determine when to update virus protection systems.
  • Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.
  • Perform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures.
  • Modify computer security files to incorporate new software, correct errors, or change individual access status.
  • Maintain permanent fleet cryptologic and carry-on direct support systems required in special land, sea surface and subsurface operations.
  • Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated.
  • Confer with users to discuss issues such as computer data access needs, security violations, and programming changes.
  • Document computer security and emergency measures policies, procedures, and tests.
  • Monitor use of data files and regulate access to safeguard information in computer files.

tools & technology

  • Desktop computers
  • Mainframe computers
  • Network analyzers
  • Notebook computers
  • Protocol analyzers

  • Development environment software
  • Network monitoring software
  • Operating system software
  • Transaction security and virus protection software
  • Web platform development software