Skip over navigation
mySkills myFuture Start Page

Occupations Information for

Information Security Analysts


Want to see how your skills match up?
Enter your current or previous job

Choose a Location




Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses.


Currently Employed: 160

Projected Annual Job Openings: 0

Typical Hourly Wage: $29.28 - $54.79

Typical Annual Salary: $60,900 - $114,000

See Job Listings (30)
Find Businesses

typical training

Typical education needed for entry: Bachelor's degree

Typical work experience needed for a job in this occupation: Less than 5 years

Typical on-the-job training once you have a job in this occupation: None

Find Training

typical job duties

  • Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.
  • Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
  • Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated.
  • Monitor use of data files and regulate access to safeguard information in computer files.
  • Monitor current reports of computer viruses to determine when to update virus protection systems.
  • Modify computer security files to incorporate new software, correct errors, or change individual access status.
  • Perform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures.
  • Confer with users to discuss issues such as computer data access needs, security violations, and programming changes.
  • Train users and promote security awareness to ensure system security and to improve server and network efficiency.
  • Coordinate implementation of computer system plan with establishment personnel and outside vendors.

tools & technology

  • Desktop computers
  • Mainframe computers
  • Network analyzers
  • Notebook computers
  • Protocol analyzers

  • Development environment software
  • Network monitoring software
  • Operating system software
  • Transaction security and virus protection software
  • Web platform development software