Information Security Analysts

Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. Assess system vulnerabilities for security risks and propose and implement risk mitigation strategies. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses.

85 alternate job titles:

AI Security Specialist (Artificial Intelligence Security Specialist) All-Source Analyst Application Security Analyst Applications Security Analyst Automatic Data Processing Systems Security Specialist (ADP Systems Security) Blue Team Member Certified Information Systems Security Professional (CISSP) Cloud Security Architect Cloud Security Engineer Computer Security Coordinator Computer Security Information Specialist Computer Security Specialist Computer Systems Security Analyst Counterespionage Analyst Cryptological Technician Cryptologist Cyber Defense Analyst Cyber Defense Forensics Analyst Cyber Incident Responder Cyber Information Security Analyst Cyber Intel Planner Cyber Intelligence Specialist Cyber Operations Planner (Cyber Ops Planner) Cyber Operations Specialist Cyber Operator Cyber Policy and Strategy Planner Cyber Security Analyst Cyber Security Specialist Cyber Security Support Technician Cybersecurity All-Source Analyst Cybersecurity Analyst Cybersecurity Engineer Cybersecurity Exploitation Analyst Cybersecurity Multi-Disciplined Language Analyst Cybersecurity Partner Integration Planner Cybersecurity Specialist Cybersecurity Target Developer Cybersecurity Target Network Analyst Cybersecurity Threat Analyst Cybersecurity Warning Analyst Data Security Analyst Database Security Expert Exploitation Analyst Incident Responder Incident Response Analyst Industrial Internet of Things Security Specialist (IIoT Security Specialist) Information Assurance Analyst Information Security Analyst Information Security Officer Information Security Specialist Information Systems Security Analyst Information Systems Security Officer (ISSO) Information Systems Security Specialist Information Technology Analyst (IT Analyst) Information Technology Consultant (IT Consultant) Information Technology Security Analyst (IT Security Analyst) Information Technology Security Architect (IT Security Architect) International Affairs Specialist Internet of Things Security Specialist (IoT Security Specialist) Internet Security Specialist Intrusion Detection Analyst IT Auditor (Information Technology Auditor) IT Risk Specialist (Information Technology Risk Specialist) Mission Assessment Specialist Network Security Analyst Network Security Officer Network Security Systems Analyst Red Team Member Security Analyst Security Auditor Security Consultant Security Control Assessor Security Operations Analyst Security Operations Center Analyst (SOC Analyst) Security Specialist Source Code Auditor Supervisory Control and Data Acquisition Security Analyst (SCADA Security Analyst) Systems Analyst Systems Security Analyst Systems Security Specialist Technology Analyst Threat Hunter Threat Monitoring Analyst Virus Technician Warning Analyst
Scroll for more
Salary Information

Information Security Analysts: $124,910 (median) per year.

Starting salary (10th percentile).
Required expreience: Varies by Company


Data source: U.S. Bureau of Labor Statistics

Daily Tasks & Responsibilities

Task Description Category
Train others in computer interface or software use. General
Troubleshoot issues with computer applications or systems. General
Collaborate with others to resolve information technology issues. General
Implement security measures for computer or information systems. General
Test computer system operations to ensure proper functioning. General
Document operational procedures. General
Develop computer or information security policies or procedures. Development
Update knowledge about emerging industry or technology trends. Maintenance
Monitor the security of digital information. Maintenance
Coordinate project activities with other personnel or departments. Management
Showing 1 to 10 of 0 entries

    Technology Requirements

    Technology Description
    Amazon Web Services AWS software Data base user interface and query software
    Amazon DynamoDB Data base management system software
    Amazon Elastic Compute Cloud EC2 Data base user interface and query software
    Amazon Redshift Data base user interface and query software
    Apache Cassandra Data base management system software
    Apache Hadoop Data base management system software
    Apache Hive Data base management system software
    Apache Spark Business intelligence and data analysis software
    Elasticsearch Data base management system software
    Microsoft Access Data base user interface and query software
    Microsoft SQL Server Data base user interface and query software
    Microsoft SQL Server Reporting Services SSRS Data base reporting software
    MongoDB Data base management system software
    MySQL Data base management system software
    NoSQL Data base management system software
    Oracle Database Data base user interface and query software
    Oracle PL/SQL Data base management system software
    PostgreSQL Object oriented data base management software
    Structured query language SQL Data base user interface and query software
    Tableau Business intelligence and data analysis software
    Teradata Database Data base management system software
    Apache Pig Data base management system software
    Apache Solr Data base management system software
    ArcSight Enterprise Threat and Risk Management Risk management data and analysis software
    Blackboard software Data base user interface and query software
    IBM Cognos Impromptu Business intelligence and data analysis software
    MicroStrategy Business intelligence and data analysis software
    Oracle Business Intelligence Enterprise Edition Business intelligence and data analysis software
    Oracle JDBC Data base user interface and query software
    Qlik Tech QlikView Business intelligence and data analysis software
    Relational database management software Data base management system software
    SAP Crystal Reports Data base reporting software
    Linux Operating system software
    Microsoft Azure software Development environment software
    Microsoft Excel Spreadsheet software
    Microsoft Office software Office suite software
    Microsoft PowerPoint Presentation software
    Microsoft PowerShell Development environment software
    Python Object or component oriented development software
    Splunk Enterprise Cloud-based management software
    AJAX Web platform development software
    Amazon Simple Storage Service S3 Storage networking software
    Amazon Web Services AWS CloudFormation Cloud-based management software
    Ansible software Expert system software
    Apache Kafka Development environment software
    Apache Maven Development environment software
    Apache Subversion SVN File versioning software
    Apache Tomcat Web platform development software
    Apple macOS Operating system software
    Atlassian Confluence Project management software
    Atlassian JIRA Content workflow software
    Bash Operating system software
    Border Gateway Protocol BGP Switch or router software
    C Development environment software
    C# Object or component oriented development software
    C++ Object or component oriented development software
    Chef Configuration management software
    Django Web platform development software
    Docker Application server software
    Drupal Web platform development software
    Eclipse IDE Development environment software
    Epic Systems Medical software
    Extensible markup language XML Enterprise application integration software
    Git File versioning software
    GitHub Application server software
    Go Development environment software
    Google Angular Web platform development software
    Hypertext markup language HTML Web platform development software
    JavaScript Web platform development software
    JavaScript Object Notation JSON Web platform development software
    Microsoft .NET Framework Development environment software
    Microsoft ASP.NET Web platform development software
    Microsoft Active Directory Internet directory services software
    Microsoft Active Server Pages ASP Web platform development software
    Microsoft Dynamics Enterprise resource planning ERP software
    Microsoft Project Project management software
    Microsoft SQL Server Integration Services SSIS Enterprise application integration software
    Microsoft SharePoint Document management software
    Microsoft Teams Project management software
    Microsoft Visio Process mapping and design software
    Microsoft Visual Basic Development environment software
    Microsoft Visual Basic for Applications VBA Development environment software
    Microsoft Visual Studio Development environment software
    Microsoft Windows Operating system software
    Microsoft Windows Server Operating system software
    Microsoft Word Word processing software
    Node.js Web platform development software
    Oracle Java Object or component oriented development software
    Oracle PeopleSoft Enterprise resource planning ERP software
    PHP Web platform development software
    Perl Object or component oriented development software
    Puppet Configuration management software
    Red Hat Enterprise Linux Operating system software
    Red Hat OpenShift Application server software
    Ruby Development environment software
    SAP software Enterprise resource planning ERP software
    SAS Analytical or scientific software
    Salesforce software Customer relationship management CRM software
    Scala Object or component oriented development software
    Selenium Program testing software
    Shell script Operating system software
    Spring Framework Web platform development software
    Swift Object or component oriented development software
    The MathWorks MATLAB Analytical or scientific software
    UNIX Operating system software
    UNIX Shell Operating system software
    Firewall software Network security and virtual private network VPN equipment software
    Operating system software Operating system software
    3M Post-it App Word processing software
    Access management software Access software
    AccessData FTK Network monitoring software
    Active directory software Internet directory services software
    Adobe ActionScript Development environment software
    Advanced business application programming ABAP Object or component oriented development software
    Anti-Trojan software Transaction security and virus protection software
    Anti-phishing software Transaction security and virus protection software
    Anti-spyware software Transaction security and virus protection software
    Apache Ant Development environment software
    Apache Groovy Object or component oriented development software
    Apache HTTP Server Portal server software
    Apache Struts Web platform development software
    Atlassian Bamboo Enterprise application integration software
    Automated audit trail analysis software Network monitoring software
    Automated installation software Configuration management software
    Automated media tracking software Network monitoring software
    Backup and archival software Backup or archival software
    Berkeley Internet Domain Name BIND Internet directory services software
    Blink Instant messaging software
    Check Point Next Generation Secure Web Gateway Transaction security and virus protection software
    Cisco Systems CiscoWorks Administration software
    Citrix cloud computing software Access software
    Common business oriented language COBOL Development environment software
    Computer forensic software Filesystem software
    Conformance and validation testing software Program testing software
    Cryptographic key management software Network security and virtual private network VPN equipment software
    Customer information control system CICS Transaction server software
    Delphi Technology Financial analysis software
    Diameter Authentication server software
    Domain name system DNS Internet directory services software
    End-to-end encryption software Transaction security and virus protection software
    Enterprise JavaBeans Web platform development software
    Ethereal Network monitoring software
    Extensible hypertext markup language XHTML Web platform development software
    Google Sites Web page creation and editing software
    Guidance Software EnCase Forensic Network monitoring software
    HP Fortify Network security or virtual private network VPN management software
    HP WebInspect Transaction security and virus protection software
    Hewlett Packard HP-UX Operating system software
    Honeypot Transaction security and virus protection software
    Human resource management software HRMS Human resources software
    IBM Domino Communications server software
    IBM Notes Electronic mail software
    IBM Power Systems software Enterprise system management software
    IBM QRadar SIEM Network monitoring software
    IBM Tivoli Access Management TAM Access software
    IBM Tivoli Identity Management TIM Authentication server software
    IBM WebSphere Cloud-based management software
    ISS RealSecure Network security or virtual private network VPN management software
    Imperva SecureSphere Network security and virtual private network VPN equipment software
    Integrated development environment IDE software Development environment software
    Integrity verification software Network monitoring software
    Intrusion detection system IDS Network security or virtual private network VPN management software
    Intrusion prevention system IPS Network security or virtual private network VPN management software
    IpFilter Network security and virtual private network VPN equipment software
    IpTables Network security and virtual private network VPN equipment software
    Job control language JCL Operating system software
    Juniper Networks NetScreen-Security Manager Network security and virtual private network VPN equipment software
    Kali Linux Program testing software
    Keystroke monitoring software Network monitoring software
    KornShell Operating system software
    LAMP Stack Web platform development software
    LexisNexis Information retrieval or search software
    License management software License management software
    Link encryption software Transaction security and virus protection software
    McAfee Transaction security and virus protection software
    McAfee VirusScan Transaction security and virus protection software
    Metasploit Transaction security and virus protection software
    Micro Focus OpenView Network monitoring software
    Microsoft Exchange Electronic mail software
    Microsoft Hyper-V Server Operating system software
    Microsoft Visual Basic Scripting Edition VBScript Development environment software
    Nagios Network monitoring software
    National Instruments LabVIEW Development environment software
    Network and system vulnerability assessment software Network security or virtual private network VPN management software
    Network directory services software Internet directory services software
    Network intrusion prevention systems NIPS Network monitoring software
    Network security auditing software Network security or virtual private network VPN management software
    Network, hardware, and software auditing software Network monitoring software
    Norton AntiVirus Transaction security and virus protection software
    NortonLifeLock cybersecurity software Transaction security and virus protection software
    Objective C Object or component oriented development software
    Oracle E-Business Suite Financials Financial analysis software
    Oracle Fusion Applications Enterprise resource planning ERP software
    Oracle Fusion Middleware Enterprise application integration software
    Oracle Hyperion Enterprise resource planning ERP software
    Oracle JD Edwards EnterpriseOne Enterprise resource planning ERP software
    Oracle JavaServer Pages JSP Web platform development software
    Oracle Net Manager Network monitoring software
    Oracle PeopleSoft Financials Enterprise resource planning ERP software
    Oracle Solaris Operating system software
    Oracle WebLogic Server Application server software
    Palo Alto Networks Next-Generation Security Platform Network security and virtual private network VPN equipment software
    Password cracker software Transaction security and virus protection software
    Password management software Authentication server software
    Patch and update management software Configuration management software
    Penetration testing software Transaction security and virus protection software
    Perforce Helix software Configuration management software
    Ping Identity Transaction security and virus protection software
    Portswigger BurP Suite Transaction security and virus protection software
    Program checksumming software Transaction security and virus protection software
    Qualys Cloud Platform Cloud-based protection or security software
    Quest BigBrother Network monitoring software
    Rapid7 Nexpose Transaction security and virus protection software
    Red Hat WildFly Application server software
    Remote authentication dial-in user service RADIUS software Authentication server software
    Root kit detection software Transaction security and virus protection software
    Ruby on Rails Web platform development software
    Secure internet filtering software Transaction security and virus protection software
    Secure shell SSH software Desktop communications software
    Security incident management software Network security or virtual private network VPN management software
    Security risk assessment software Transaction security and virus protection software
    Smart card management software Point of sale POS software
    Sniffer Investigator Network monitoring software
    Snort Network monitoring software
    Stack smashing protection SSP software Transaction security and virus protection software
    Supervisory control and data acquisition SCADA software Industrial control software
    Symantec Blue Coat Data Loss Prevention Network monitoring software
    Symantec Endpoint Protection Transaction security and virus protection software
    System and data disaster recovery software Backup or archival software
    System testing software Program testing software
    Tcpdump Network monitoring software
    Tenable Nessus Transaction security and virus protection software
    Trend Micro TippingPoint Network security and virtual private network VPN equipment software
    Ubuntu Operating system software
    Unified modeling language UML Requirements analysis and system architecture software
    VMware Clustering software
    Veritas NetBackup Backup or archival software
    Virtual private networking VPN software Network security and virtual private network VPN equipment software
    Virus scanning software Transaction security and virus protection software
    Voice over internet protocol VoIP system software Internet protocol IP multimedia subsystem software
    Websense Data Loss Prevention Network security or virtual private network VPN management software
    WinMerge File versioning software
    Wireshark Network monitoring software
    ESRI ArcGIS software Geographic information system
    Geographic information system GIS software Geographic information system
    Showing 1 to 10 of 0 entries

      Relevant Certifications

      Industry certifications that may be valuable for this career role:

      Certification Issuing Organization Practice Test
      AWS Certified Security Specialty Amazon.com Web Services Not Available
      Administration of Data Center Security: Server Advanced 6.7 Broadcom Inc. Not Available
      Administration of Symantec Client Management Suite 8.5 Broadcom Inc. Not Available
      Administration of Symantec Cloud Workload Protection - R1 Broadcom Inc. Not Available
      Administration of Symantec Data Loss Prevention 15.5 Broadcom Inc. Not Available
      Administration of Symantec Email Security.cloud - v1 Broadcom Inc. Not Available
      Administration of Symantec ProxySG 6.7 Broadcom Inc. Not Available
      Associate of International Information Systems Security Certification Consortium International Information Systems Security Certification Consortium, Inc. Not Available
      CCIE Security Certification Cisco Systems, Inc. Not Available
      CCNP Security Certification Cisco Systems, Inc. Not Available
      CIW Web Security Associate Certified Internet Web Professionals Not Available
      CIW Web Security Professional Certified Internet Web Professionals Not Available
      CIW Web Security Specialist Certified Internet Web Professionals Not Available
      CSX Cybersecurity Practitioner Information Systems Audit and Control Association Not Available
      Certification Authorization Professional International Information Systems Security Certification Consortium, Inc. Not Available
      Certification in Risk and Information Systems Control Information Systems Audit and Control Association Not Available
      Certified Advanced Windows Forensic Examiner International Association of Computer Investigative Specialists Not Available
      Certified Application Security Engineer EC-Council Not Available
      Certified Cloud Security Professional International Information Systems Security Certification Consortium, Inc. Not Available
      Certified Computer Crime Investigator - Advanced High Tech Crime Network Not Available
      Certified Computer Crime Investigator - Basic High Tech Crime Network Not Available
      Certified Computer Forensic Technician - Basic High Tech Crime Network Not Available
      Certified Encryption Specialist EC-Council Not Available
      Certified Ethical Hacker EC-Council Not Available
      Certified Forensic Computer Examiner International Association of Computer Investigative Specialists Not Available
      Certified Fraud Examiner Association of Certified Fraud Examiners Not Available
      Certified Healthcare Protection Administrator International Association of Healthcare Security and Safety Not Available
      Certified Information Privacy Professional International Association of Privacy Professionals Not Available
      Certified Information Privacy Technologist International Association of Privacy Professionals Not Available
      Certified Information Security Manager Information Systems Audit and Control Association Not Available
      Certified Information Systems Auditor Information Systems Audit and Control Association Not Available
      Certified Information Systems Examiner Conference of State Bank Supervisors Not Available
      Certified Information Systems Security Professional International Information Systems Security Certification Consortium, Inc. Not Available
      Certified Information Systems Security Professional - Architecture International Information Systems Security Certification Consortium, Inc. Not Available
      Certified Information Systems Security Professional - Management International Information Systems Security Certification Consortium, Inc. Not Available
      Certified Internet of Things Practitioner CertNexus Not Available
      Certified Money Service Business Examiner Conference of State Bank Supervisors Not Available
      Certified Network Defense Architect EC-Council Not Available
      Certified Secure Computer User EC-Council Not Available
      Certified Secure Software Lifecycle Professional International Information Systems Security Certification Consortium, Inc. Not Available
      Certified Security Consultant International Association of Professional Security Consultants Not Available
      Certified Security Specialist EC-Council Not Available
      Certified Senior Money Service Business Examiner Conference of State Bank Supervisors Not Available
      Certified Senior Mortgage Examiner Conference of State Bank Supervisors Not Available
      Certified Threat Intelligence Analyst EC-Council Not Available
      Certified Trust Examiner Conference of State Bank Supervisors Not Available
      Certified Wireless Security Professional Certified Wireless Network Professional Not Available
      Certified in Healthcare Privacy and Security American Health Information Management Association Not Available
      Cisco Certified CyberOps Associate Cisco Systems, Inc. Not Available
      Cisco Certified DevNet Specialist Certification Cisco Systems, Inc. Not Available
      Cisco Meraki Solutions Specialist Cisco Systems, Inc. Not Available
      Cloud Technology Associate+ Certification Cloud Credential Council Not Available
      CompTIA Advanced Security Practitioner Computing Technology Industry Association (CompTIA) Not Available
      CompTIA Advanced Security Practitioner CASP+ Computing Technology Industry Association (CompTIA) Not Available
      CompTIA CDIA+ Computing Technology Industry Association (CompTIA) Not Available
      CompTIA Cybersecurity Analyst Computing Technology Industry Association (CompTIA) Not Available
      CompTIA Cybersecurity Analyst (CySA+) Computing Technology Industry Association (CompTIA) Not Available
      CompTIA Security+ Computing Technology Industry Association (CompTIA) Not Available
      Computer Hacking Forensic Investigator EC-Council Not Available
      Content Manager v9.3. Certified Professional Micro Focus Not Available
      CyberSec First Responder CertNexus Not Available
      Disaster Recovery Professional EC-Council Not Available
      EC Council Certified Chief Information Security Officer EC-Council Not Available
      EC-Council Certified Incident Handler EC-Council Not Available
      EC-Council Certified Security Analyst EC-Council Not Available
      Electronic Security Networking Technician ETA International Not Available
      F5 Certified Solutions Expert, Security Certification F5 Not Available
      FITSP-Auditor Federal IT Security Institute Not Available
      FITSP-Designer Federal IT Security Institute Not Available
      FITSP-Manager Federal IT Security Institute Not Available
      FITSP-Operator Federal IT Security Institute Not Available
      GIAC Assessing and Auditing Wireless Networks Global Information Assurance Certification Not Available
      GIAC Certified Enterprise Defender Global Information Assurance Certification Not Available
      GIAC Certified Forensic Examiner Global Information Assurance Certification Not Available
      GIAC Certified Forensics Analyst Global Information Assurance Certification Not Available
      GIAC Certified Incident Handler Global Information Assurance Certification Not Available
      GIAC Certified Intrusion Analyst Global Information Assurance Certification Not Available
      GIAC Certified Penetration Tester Global Information Assurance Certification Not Available
      GIAC Certified Windows Security Administrator Global Information Assurance Certification Not Available
      GIAC Cloud Security Automation Global Information Assurance Certification Not Available
      GIAC Cloud Security Essentials Global Information Assurance Certification Not Available
      GIAC Continuous Monitoring Certification Global Information Assurance Certification Not Available
      GIAC Critical Controls Certification Global Information Assurance Certification Not Available
      GIAC Cyber Threat Intelligence Global Information Assurance Certification Not Available
      GIAC Defensible Security Architecture Global Information Assurance Certification Not Available
      GIAC Exploit Researcher and Advanced Penetration Tester Global Information Assurance Certification Not Available
      GIAC Foundational Cybersecurity Technologies Global Information Assurance Certification Not Available
      GIAC Information Security Fundamentals Global Information Assurance Certification Not Available
      GIAC Information Security Professional Global Information Assurance Certification Not Available
      GIAC Mobile Device Security Analyst Global Information Assurance Certification Not Available
      GIAC Network Forensic Analyst Global Information Assurance Certification Not Available
      GIAC Reverse Engineering Malware Global Information Assurance Certification Not Available
      GIAC Security Essentials Certification Global Information Assurance Certification Not Available
      GIAC Security Leadership Certification Global Information Assurance Certification Not Available
      GIAC Strategic Planning, Policy, and Leadership Global Information Assurance Certification Not Available
      GIAC Systems and Network Auditor Global Information Assurance Certification Not Available
      GIAC Web Application Penetration Tester Global Information Assurance Certification Not Available
      Global Industrial Cyber Security Professional Global Information Assurance Certification Not Available
      HP ASE - ArcSight Logger V1 Hewlett Packard Certification and Learning Not Available
      IBM Certified Analyst - i2 Analysts Notebook V9 IBM Corporation Not Available
      IBM Certified Associate Analyst - IBM QRadar SIEM V7.3.2 IBM Corporation Not Available
      IBM Certified Deployment Professional - Security Access Manager V9.0 IBM Corporation Not Available
      IBM Certified Deployment Professional - Spectrum Protect Plus V10.1.5 IBM Corporation Not Available
      IBM Certified SOC Analyst - IBM QRadar SIEM V7.3.2 IBM Corporation Not Available
      ICDL Workforce ICDL Foundation Not Available
      Information Technology Security ETA International Not Available
      Internet Business Associate Certified Internet Web Professionals Not Available
      Intuit Certifications Certiport Not Available
      Licensed Penetration Tester EC-Council Not Available
      MTA: Security Fundamentals Microsoft Corporation Not Available
      Microsoft 365 Certified: Enterprise Administrator Expert Microsoft Corporation Not Available
      Microsoft 365 Certified: Security Administrator Associate Microsoft Corporation Not Available
      Microsoft Certified: Azure Data Engineer Associate Microsoft Corporation Not Available
      Microsoft Certified: Azure Security Engineer Associate Microsoft Corporation Not Available
      Microsoft Certified: Dynamics 365 Field Service Functional Consultant Associate Microsoft Corporation Not Available
      Oracle Cloud Platform Identity and Security Management 2021 Certified Specialist Oracle Corporation Not Available
      Professional Cloud Security Engineer Google Inc. Not Available
      Professional Cloud Security Manager Certification Cloud Credential Council Not Available
      Specialist - Infrastructure Security, Version 1.0 Dell Corporation Not Available
      Systems Security Certified Practitioner International Information Systems Security Certification Consortium, Inc. Not Available
      The Certified Information Privacy Professional International Association of Privacy Professionals Not Available
      The Certified Information Privacy Professional/Information Technology International Association of Privacy Professionals Not Available
      Wireshark Certified Network Analyst Wireshark Not Available
      Showing 1 to 10 of 0 entries