Information Security Analysts
Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. Assess system vulnerabilities for security risks and propose and implement risk mitigation strategies. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses.
85 alternate job titles:
Salary Information
Information Security Analysts: $124,910 (median) per year.
Starting salary (10th percentile).
Required expreience: Varies by Company
Data source: U.S. Bureau of Labor Statistics
Daily Tasks & Responsibilities
| Task Description | Category |
|---|---|
| Train others in computer interface or software use. | General |
| Troubleshoot issues with computer applications or systems. | General |
| Collaborate with others to resolve information technology issues. | General |
| Implement security measures for computer or information systems. | General |
| Test computer system operations to ensure proper functioning. | General |
| Document operational procedures. | General |
| Develop computer or information security policies or procedures. | Development |
| Update knowledge about emerging industry or technology trends. | Maintenance |
| Monitor the security of digital information. | Maintenance |
| Coordinate project activities with other personnel or departments. | Management |
Technology Requirements
| Technology | Description |
|---|---|
| Amazon Web Services AWS software | Data base user interface and query software |
| Amazon DynamoDB | Data base management system software |
| Amazon Elastic Compute Cloud EC2 | Data base user interface and query software |
| Amazon Redshift | Data base user interface and query software |
| Apache Cassandra | Data base management system software |
| Apache Hadoop | Data base management system software |
| Apache Hive | Data base management system software |
| Apache Spark | Business intelligence and data analysis software |
| Elasticsearch | Data base management system software |
| Microsoft Access | Data base user interface and query software |
| Microsoft SQL Server | Data base user interface and query software |
| Microsoft SQL Server Reporting Services SSRS | Data base reporting software |
| MongoDB | Data base management system software |
| MySQL | Data base management system software |
| NoSQL | Data base management system software |
| Oracle Database | Data base user interface and query software |
| Oracle PL/SQL | Data base management system software |
| PostgreSQL | Object oriented data base management software |
| Structured query language SQL | Data base user interface and query software |
| Tableau | Business intelligence and data analysis software |
| Teradata Database | Data base management system software |
| Apache Pig | Data base management system software |
| Apache Solr | Data base management system software |
| ArcSight Enterprise Threat and Risk Management | Risk management data and analysis software |
| Blackboard software | Data base user interface and query software |
| IBM Cognos Impromptu | Business intelligence and data analysis software |
| MicroStrategy | Business intelligence and data analysis software |
| Oracle Business Intelligence Enterprise Edition | Business intelligence and data analysis software |
| Oracle JDBC | Data base user interface and query software |
| Qlik Tech QlikView | Business intelligence and data analysis software |
| Relational database management software | Data base management system software |
| SAP Crystal Reports | Data base reporting software |
| Linux | Operating system software |
| Microsoft Azure software | Development environment software |
| Microsoft Excel | Spreadsheet software |
| Microsoft Office software | Office suite software |
| Microsoft PowerPoint | Presentation software |
| Microsoft PowerShell | Development environment software |
| Python | Object or component oriented development software |
| Splunk Enterprise | Cloud-based management software |
| AJAX | Web platform development software |
| Amazon Simple Storage Service S3 | Storage networking software |
| Amazon Web Services AWS CloudFormation | Cloud-based management software |
| Ansible software | Expert system software |
| Apache Kafka | Development environment software |
| Apache Maven | Development environment software |
| Apache Subversion SVN | File versioning software |
| Apache Tomcat | Web platform development software |
| Apple macOS | Operating system software |
| Atlassian Confluence | Project management software |
| Atlassian JIRA | Content workflow software |
| Bash | Operating system software |
| Border Gateway Protocol BGP | Switch or router software |
| C | Development environment software |
| C# | Object or component oriented development software |
| C++ | Object or component oriented development software |
| Chef | Configuration management software |
| Django | Web platform development software |
| Docker | Application server software |
| Drupal | Web platform development software |
| Eclipse IDE | Development environment software |
| Epic Systems | Medical software |
| Extensible markup language XML | Enterprise application integration software |
| Git | File versioning software |
| GitHub | Application server software |
| Go | Development environment software |
| Google Angular | Web platform development software |
| Hypertext markup language HTML | Web platform development software |
| JavaScript | Web platform development software |
| JavaScript Object Notation JSON | Web platform development software |
| Microsoft .NET Framework | Development environment software |
| Microsoft ASP.NET | Web platform development software |
| Microsoft Active Directory | Internet directory services software |
| Microsoft Active Server Pages ASP | Web platform development software |
| Microsoft Dynamics | Enterprise resource planning ERP software |
| Microsoft Project | Project management software |
| Microsoft SQL Server Integration Services SSIS | Enterprise application integration software |
| Microsoft SharePoint | Document management software |
| Microsoft Teams | Project management software |
| Microsoft Visio | Process mapping and design software |
| Microsoft Visual Basic | Development environment software |
| Microsoft Visual Basic for Applications VBA | Development environment software |
| Microsoft Visual Studio | Development environment software |
| Microsoft Windows | Operating system software |
| Microsoft Windows Server | Operating system software |
| Microsoft Word | Word processing software |
| Node.js | Web platform development software |
| Oracle Java | Object or component oriented development software |
| Oracle PeopleSoft | Enterprise resource planning ERP software |
| PHP | Web platform development software |
| Perl | Object or component oriented development software |
| Puppet | Configuration management software |
| Red Hat Enterprise Linux | Operating system software |
| Red Hat OpenShift | Application server software |
| Ruby | Development environment software |
| SAP software | Enterprise resource planning ERP software |
| SAS | Analytical or scientific software |
| Salesforce software | Customer relationship management CRM software |
| Scala | Object or component oriented development software |
| Selenium | Program testing software |
| Shell script | Operating system software |
| Spring Framework | Web platform development software |
| Swift | Object or component oriented development software |
| The MathWorks MATLAB | Analytical or scientific software |
| UNIX | Operating system software |
| UNIX Shell | Operating system software |
| Firewall software | Network security and virtual private network VPN equipment software |
| Operating system software | Operating system software |
| 3M Post-it App | Word processing software |
| Access management software | Access software |
| AccessData FTK | Network monitoring software |
| Active directory software | Internet directory services software |
| Adobe ActionScript | Development environment software |
| Advanced business application programming ABAP | Object or component oriented development software |
| Anti-Trojan software | Transaction security and virus protection software |
| Anti-phishing software | Transaction security and virus protection software |
| Anti-spyware software | Transaction security and virus protection software |
| Apache Ant | Development environment software |
| Apache Groovy | Object or component oriented development software |
| Apache HTTP Server | Portal server software |
| Apache Struts | Web platform development software |
| Atlassian Bamboo | Enterprise application integration software |
| Automated audit trail analysis software | Network monitoring software |
| Automated installation software | Configuration management software |
| Automated media tracking software | Network monitoring software |
| Backup and archival software | Backup or archival software |
| Berkeley Internet Domain Name BIND | Internet directory services software |
| Blink | Instant messaging software |
| Check Point Next Generation Secure Web Gateway | Transaction security and virus protection software |
| Cisco Systems CiscoWorks | Administration software |
| Citrix cloud computing software | Access software |
| Common business oriented language COBOL | Development environment software |
| Computer forensic software | Filesystem software |
| Conformance and validation testing software | Program testing software |
| Cryptographic key management software | Network security and virtual private network VPN equipment software |
| Customer information control system CICS | Transaction server software |
| Delphi Technology | Financial analysis software |
| Diameter | Authentication server software |
| Domain name system DNS | Internet directory services software |
| End-to-end encryption software | Transaction security and virus protection software |
| Enterprise JavaBeans | Web platform development software |
| Ethereal | Network monitoring software |
| Extensible hypertext markup language XHTML | Web platform development software |
| Google Sites | Web page creation and editing software |
| Guidance Software EnCase Forensic | Network monitoring software |
| HP Fortify | Network security or virtual private network VPN management software |
| HP WebInspect | Transaction security and virus protection software |
| Hewlett Packard HP-UX | Operating system software |
| Honeypot | Transaction security and virus protection software |
| Human resource management software HRMS | Human resources software |
| IBM Domino | Communications server software |
| IBM Notes | Electronic mail software |
| IBM Power Systems software | Enterprise system management software |
| IBM QRadar SIEM | Network monitoring software |
| IBM Tivoli Access Management TAM | Access software |
| IBM Tivoli Identity Management TIM | Authentication server software |
| IBM WebSphere | Cloud-based management software |
| ISS RealSecure | Network security or virtual private network VPN management software |
| Imperva SecureSphere | Network security and virtual private network VPN equipment software |
| Integrated development environment IDE software | Development environment software |
| Integrity verification software | Network monitoring software |
| Intrusion detection system IDS | Network security or virtual private network VPN management software |
| Intrusion prevention system IPS | Network security or virtual private network VPN management software |
| IpFilter | Network security and virtual private network VPN equipment software |
| IpTables | Network security and virtual private network VPN equipment software |
| Job control language JCL | Operating system software |
| Juniper Networks NetScreen-Security Manager | Network security and virtual private network VPN equipment software |
| Kali Linux | Program testing software |
| Keystroke monitoring software | Network monitoring software |
| KornShell | Operating system software |
| LAMP Stack | Web platform development software |
| LexisNexis | Information retrieval or search software |
| License management software | License management software |
| Link encryption software | Transaction security and virus protection software |
| McAfee | Transaction security and virus protection software |
| McAfee VirusScan | Transaction security and virus protection software |
| Metasploit | Transaction security and virus protection software |
| Micro Focus OpenView | Network monitoring software |
| Microsoft Exchange | Electronic mail software |
| Microsoft Hyper-V Server | Operating system software |
| Microsoft Visual Basic Scripting Edition VBScript | Development environment software |
| Nagios | Network monitoring software |
| National Instruments LabVIEW | Development environment software |
| Network and system vulnerability assessment software | Network security or virtual private network VPN management software |
| Network directory services software | Internet directory services software |
| Network intrusion prevention systems NIPS | Network monitoring software |
| Network security auditing software | Network security or virtual private network VPN management software |
| Network, hardware, and software auditing software | Network monitoring software |
| Norton AntiVirus | Transaction security and virus protection software |
| NortonLifeLock cybersecurity software | Transaction security and virus protection software |
| Objective C | Object or component oriented development software |
| Oracle E-Business Suite Financials | Financial analysis software |
| Oracle Fusion Applications | Enterprise resource planning ERP software |
| Oracle Fusion Middleware | Enterprise application integration software |
| Oracle Hyperion | Enterprise resource planning ERP software |
| Oracle JD Edwards EnterpriseOne | Enterprise resource planning ERP software |
| Oracle JavaServer Pages JSP | Web platform development software |
| Oracle Net Manager | Network monitoring software |
| Oracle PeopleSoft Financials | Enterprise resource planning ERP software |
| Oracle Solaris | Operating system software |
| Oracle WebLogic Server | Application server software |
| Palo Alto Networks Next-Generation Security Platform | Network security and virtual private network VPN equipment software |
| Password cracker software | Transaction security and virus protection software |
| Password management software | Authentication server software |
| Patch and update management software | Configuration management software |
| Penetration testing software | Transaction security and virus protection software |
| Perforce Helix software | Configuration management software |
| Ping Identity | Transaction security and virus protection software |
| Portswigger BurP Suite | Transaction security and virus protection software |
| Program checksumming software | Transaction security and virus protection software |
| Qualys Cloud Platform | Cloud-based protection or security software |
| Quest BigBrother | Network monitoring software |
| Rapid7 Nexpose | Transaction security and virus protection software |
| Red Hat WildFly | Application server software |
| Remote authentication dial-in user service RADIUS software | Authentication server software |
| Root kit detection software | Transaction security and virus protection software |
| Ruby on Rails | Web platform development software |
| Secure internet filtering software | Transaction security and virus protection software |
| Secure shell SSH software | Desktop communications software |
| Security incident management software | Network security or virtual private network VPN management software |
| Security risk assessment software | Transaction security and virus protection software |
| Smart card management software | Point of sale POS software |
| Sniffer Investigator | Network monitoring software |
| Snort | Network monitoring software |
| Stack smashing protection SSP software | Transaction security and virus protection software |
| Supervisory control and data acquisition SCADA software | Industrial control software |
| Symantec Blue Coat Data Loss Prevention | Network monitoring software |
| Symantec Endpoint Protection | Transaction security and virus protection software |
| System and data disaster recovery software | Backup or archival software |
| System testing software | Program testing software |
| Tcpdump | Network monitoring software |
| Tenable Nessus | Transaction security and virus protection software |
| Trend Micro TippingPoint | Network security and virtual private network VPN equipment software |
| Ubuntu | Operating system software |
| Unified modeling language UML | Requirements analysis and system architecture software |
| VMware | Clustering software |
| Veritas NetBackup | Backup or archival software |
| Virtual private networking VPN software | Network security and virtual private network VPN equipment software |
| Virus scanning software | Transaction security and virus protection software |
| Voice over internet protocol VoIP system software | Internet protocol IP multimedia subsystem software |
| Websense Data Loss Prevention | Network security or virtual private network VPN management software |
| WinMerge | File versioning software |
| Wireshark | Network monitoring software |
| ESRI ArcGIS software | Geographic information system |
| Geographic information system GIS software | Geographic information system |
Relevant Certifications
Industry certifications that may be valuable for this career role:
| Certification | Issuing Organization | Practice Test |
|---|---|---|
| AWS Certified Security Specialty | Amazon.com Web Services | Not Available |
| Administration of Data Center Security: Server Advanced 6.7 | Broadcom Inc. | Not Available |
| Administration of Symantec Client Management Suite 8.5 | Broadcom Inc. | Not Available |
| Administration of Symantec Cloud Workload Protection - R1 | Broadcom Inc. | Not Available |
| Administration of Symantec Data Loss Prevention 15.5 | Broadcom Inc. | Not Available |
| Administration of Symantec Email Security.cloud - v1 | Broadcom Inc. | Not Available |
| Administration of Symantec ProxySG 6.7 | Broadcom Inc. | Not Available |
| Associate of International Information Systems Security Certification Consortium | International Information Systems Security Certification Consortium, Inc. | Not Available |
| CCIE Security Certification | Cisco Systems, Inc. | Not Available |
| CCNP Security Certification | Cisco Systems, Inc. | Not Available |
| CIW Web Security Associate | Certified Internet Web Professionals | Not Available |
| CIW Web Security Professional | Certified Internet Web Professionals | Not Available |
| CIW Web Security Specialist | Certified Internet Web Professionals | Not Available |
| CSX Cybersecurity Practitioner | Information Systems Audit and Control Association | Not Available |
| Certification Authorization Professional | International Information Systems Security Certification Consortium, Inc. | Not Available |
| Certification in Risk and Information Systems Control | Information Systems Audit and Control Association | Not Available |
| Certified Advanced Windows Forensic Examiner | International Association of Computer Investigative Specialists | Not Available |
| Certified Application Security Engineer | EC-Council | Not Available |
| Certified Cloud Security Professional | International Information Systems Security Certification Consortium, Inc. | Not Available |
| Certified Computer Crime Investigator - Advanced | High Tech Crime Network | Not Available |
| Certified Computer Crime Investigator - Basic | High Tech Crime Network | Not Available |
| Certified Computer Forensic Technician - Basic | High Tech Crime Network | Not Available |
| Certified Encryption Specialist | EC-Council | Not Available |
| Certified Ethical Hacker | EC-Council | Not Available |
| Certified Forensic Computer Examiner | International Association of Computer Investigative Specialists | Not Available |
| Certified Fraud Examiner | Association of Certified Fraud Examiners | Not Available |
| Certified Healthcare Protection Administrator | International Association of Healthcare Security and Safety | Not Available |
| Certified Information Privacy Professional | International Association of Privacy Professionals | Not Available |
| Certified Information Privacy Technologist | International Association of Privacy Professionals | Not Available |
| Certified Information Security Manager | Information Systems Audit and Control Association | Not Available |
| Certified Information Systems Auditor | Information Systems Audit and Control Association | Not Available |
| Certified Information Systems Examiner | Conference of State Bank Supervisors | Not Available |
| Certified Information Systems Security Professional | International Information Systems Security Certification Consortium, Inc. | Not Available |
| Certified Information Systems Security Professional - Architecture | International Information Systems Security Certification Consortium, Inc. | Not Available |
| Certified Information Systems Security Professional - Management | International Information Systems Security Certification Consortium, Inc. | Not Available |
| Certified Internet of Things Practitioner | CertNexus | Not Available |
| Certified Money Service Business Examiner | Conference of State Bank Supervisors | Not Available |
| Certified Network Defense Architect | EC-Council | Not Available |
| Certified Secure Computer User | EC-Council | Not Available |
| Certified Secure Software Lifecycle Professional | International Information Systems Security Certification Consortium, Inc. | Not Available |
| Certified Security Consultant | International Association of Professional Security Consultants | Not Available |
| Certified Security Specialist | EC-Council | Not Available |
| Certified Senior Money Service Business Examiner | Conference of State Bank Supervisors | Not Available |
| Certified Senior Mortgage Examiner | Conference of State Bank Supervisors | Not Available |
| Certified Threat Intelligence Analyst | EC-Council | Not Available |
| Certified Trust Examiner | Conference of State Bank Supervisors | Not Available |
| Certified Wireless Security Professional | Certified Wireless Network Professional | Not Available |
| Certified in Healthcare Privacy and Security | American Health Information Management Association | Not Available |
| Cisco Certified CyberOps Associate | Cisco Systems, Inc. | Not Available |
| Cisco Certified DevNet Specialist Certification | Cisco Systems, Inc. | Not Available |
| Cisco Meraki Solutions Specialist | Cisco Systems, Inc. | Not Available |
| Cloud Technology Associate+ Certification | Cloud Credential Council | Not Available |
| CompTIA Advanced Security Practitioner | Computing Technology Industry Association (CompTIA) | Not Available |
| CompTIA Advanced Security Practitioner CASP+ | Computing Technology Industry Association (CompTIA) | Not Available |
| CompTIA CDIA+ | Computing Technology Industry Association (CompTIA) | Not Available |
| CompTIA Cybersecurity Analyst | Computing Technology Industry Association (CompTIA) | Not Available |
| CompTIA Cybersecurity Analyst (CySA+) | Computing Technology Industry Association (CompTIA) | Not Available |
| CompTIA Security+ | Computing Technology Industry Association (CompTIA) | Not Available |
| Computer Hacking Forensic Investigator | EC-Council | Not Available |
| Content Manager v9.3. Certified Professional | Micro Focus | Not Available |
| CyberSec First Responder | CertNexus | Not Available |
| Disaster Recovery Professional | EC-Council | Not Available |
| EC Council Certified Chief Information Security Officer | EC-Council | Not Available |
| EC-Council Certified Incident Handler | EC-Council | Not Available |
| EC-Council Certified Security Analyst | EC-Council | Not Available |
| Electronic Security Networking Technician | ETA International | Not Available |
| F5 Certified Solutions Expert, Security Certification | F5 | Not Available |
| FITSP-Auditor | Federal IT Security Institute | Not Available |
| FITSP-Designer | Federal IT Security Institute | Not Available |
| FITSP-Manager | Federal IT Security Institute | Not Available |
| FITSP-Operator | Federal IT Security Institute | Not Available |
| GIAC Assessing and Auditing Wireless Networks | Global Information Assurance Certification | Not Available |
| GIAC Certified Enterprise Defender | Global Information Assurance Certification | Not Available |
| GIAC Certified Forensic Examiner | Global Information Assurance Certification | Not Available |
| GIAC Certified Forensics Analyst | Global Information Assurance Certification | Not Available |
| GIAC Certified Incident Handler | Global Information Assurance Certification | Not Available |
| GIAC Certified Intrusion Analyst | Global Information Assurance Certification | Not Available |
| GIAC Certified Penetration Tester | Global Information Assurance Certification | Not Available |
| GIAC Certified Windows Security Administrator | Global Information Assurance Certification | Not Available |
| GIAC Cloud Security Automation | Global Information Assurance Certification | Not Available |
| GIAC Cloud Security Essentials | Global Information Assurance Certification | Not Available |
| GIAC Continuous Monitoring Certification | Global Information Assurance Certification | Not Available |
| GIAC Critical Controls Certification | Global Information Assurance Certification | Not Available |
| GIAC Cyber Threat Intelligence | Global Information Assurance Certification | Not Available |
| GIAC Defensible Security Architecture | Global Information Assurance Certification | Not Available |
| GIAC Exploit Researcher and Advanced Penetration Tester | Global Information Assurance Certification | Not Available |
| GIAC Foundational Cybersecurity Technologies | Global Information Assurance Certification | Not Available |
| GIAC Information Security Fundamentals | Global Information Assurance Certification | Not Available |
| GIAC Information Security Professional | Global Information Assurance Certification | Not Available |
| GIAC Mobile Device Security Analyst | Global Information Assurance Certification | Not Available |
| GIAC Network Forensic Analyst | Global Information Assurance Certification | Not Available |
| GIAC Reverse Engineering Malware | Global Information Assurance Certification | Not Available |
| GIAC Security Essentials Certification | Global Information Assurance Certification | Not Available |
| GIAC Security Leadership Certification | Global Information Assurance Certification | Not Available |
| GIAC Strategic Planning, Policy, and Leadership | Global Information Assurance Certification | Not Available |
| GIAC Systems and Network Auditor | Global Information Assurance Certification | Not Available |
| GIAC Web Application Penetration Tester | Global Information Assurance Certification | Not Available |
| Global Industrial Cyber Security Professional | Global Information Assurance Certification | Not Available |
| HP ASE - ArcSight Logger V1 | Hewlett Packard Certification and Learning | Not Available |
| IBM Certified Analyst - i2 Analysts Notebook V9 | IBM Corporation | Not Available |
| IBM Certified Associate Analyst - IBM QRadar SIEM V7.3.2 | IBM Corporation | Not Available |
| IBM Certified Deployment Professional - Security Access Manager V9.0 | IBM Corporation | Not Available |
| IBM Certified Deployment Professional - Spectrum Protect Plus V10.1.5 | IBM Corporation | Not Available |
| IBM Certified SOC Analyst - IBM QRadar SIEM V7.3.2 | IBM Corporation | Not Available |
| ICDL Workforce | ICDL Foundation | Not Available |
| Information Technology Security | ETA International | Not Available |
| Internet Business Associate | Certified Internet Web Professionals | Not Available |
| Intuit Certifications | Certiport | Not Available |
| Licensed Penetration Tester | EC-Council | Not Available |
| MTA: Security Fundamentals | Microsoft Corporation | Not Available |
| Microsoft 365 Certified: Enterprise Administrator Expert | Microsoft Corporation | Not Available |
| Microsoft 365 Certified: Security Administrator Associate | Microsoft Corporation | Not Available |
| Microsoft Certified: Azure Data Engineer Associate | Microsoft Corporation | Not Available |
| Microsoft Certified: Azure Security Engineer Associate | Microsoft Corporation | Not Available |
| Microsoft Certified: Dynamics 365 Field Service Functional Consultant Associate | Microsoft Corporation | Not Available |
| Oracle Cloud Platform Identity and Security Management 2021 Certified Specialist | Oracle Corporation | Not Available |
| Professional Cloud Security Engineer | Google Inc. | Not Available |
| Professional Cloud Security Manager Certification | Cloud Credential Council | Not Available |
| Specialist - Infrastructure Security, Version 1.0 | Dell Corporation | Not Available |
| Systems Security Certified Practitioner | International Information Systems Security Certification Consortium, Inc. | Not Available |
| The Certified Information Privacy Professional | International Association of Privacy Professionals | Not Available |
| The Certified Information Privacy Professional/Information Technology | International Association of Privacy Professionals | Not Available |
| Wireshark Certified Network Analyst | Wireshark | Not Available |