Career Discovery Tool
Science Buddies

Information Security Analyst

Overview and Key Facts

People examining computer content
Education
Education
Bachelor's degree
Median Pay
Median Pay
$102,600
Job Growth
Job Growth
34.70%
(Above US Average)
Jobs in 2031
Jobs in 2031
219,500

What Do They Do?

An information security analyst could...

Overview Listen to this section

Have you ever seen a story on the news about how a company or government agency was "hacked" and people's personal information, like names, addresses, or credit card numbers, was stolen? It is an information security analyst's job to prevent that from happening. Organizations hire information security analysts to analyze possible threats against their computer systems, which can range from malicious hackers trying to steal data to careless employees who accidentally forget to log out of a computer. They then make plans to prevent these threats and to deal with them when they arise. This is an exciting career for those who want to keep up with the constantly changing world of computers and the Internet.
Watch this video to see interviews with multiple experts in the field of information security.

Do You Have the Skills and Characteristics of an Information Security Analyst?


  1. Reading Comprehension: ?
  2. Critical Thinking: ?
  3. Active Listening: ?
  4. Complex Problem Solving: ?
  5. Speaking: ?

Core Tasks

Think about if you'd like the typical tasks an Information Security Analyst might do:
  • Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
  • Monitor current reports of computer viruses to determine when to update virus protection systems.
  • Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.
  • Perform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures.
  • Modify computer security files to incorporate new software, correct errors, or change individual access status.
  • Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated.
  • Confer with users to discuss issues such as computer data access needs, security violations, and programming changes.
  • Document computer security and emergency measures policies, procedures, and tests.
  • Monitor use of data files and regulate access to safeguard information in computer files.
  • Coordinate implementation of computer system plan with establishment personnel and outside vendors.
  • Train users and promote security awareness to ensure system security and to improve server and network efficiency.

Salary & Job Openings

Steps to Get There: Becoming an Information Security Analyst

Try it Out with an Activity or Project

On the Job

More Information

Please create a free account to view this career and access our full library of over 160 STEM careers.

Students    Teachers / Parents

With a free account you will have access to our full library of over 160 STEM careers. Each career profile includes detailed information to help you learn about a career and the requirements to get there. You can explore:

  • salary information by state
  • recommended high school coursework
  • fun projects and activities to test out a career
  • videos and interviews with professionals in the field
  • details on what a day on the job is like
Top
Free science fair projects.