Information Security Analysts

Information Security Analysts


YouTube Video

Quick Facts: Information Security Analysts
2017 Median Pay $95,510 per year
$45.92 per hour
Typical Entry-Level Education Bachelor’s degree
Work Experience in a Related Occupation Less than 5 years
On-the-job Training None
Number of Jobs, 2016 100,000
Job Outlook, 2016-26 28% (Much faster than average)
Employment Change, 2016-26 28,500

What Information Security Analysts Do

Information security analysts plan and carry out security measures to protect an organization’s computer networks and systems. Their responsibilities are continually expanding as the number of cyberattacks increases.

Work Environment

Most information security analysts work for computer companies, consulting firms, or business and financial companies.

How to Become an Information Security Analyst

Most information security analyst positions require a bachelor’s degree in a computer-related field. Employers usually prefer to hire analysts with experience in a related occupation.


The median annual wage for information security analysts was $95,510 in May 2017.

Job Outlook

Employment of information security analysts is projected to grow 28 percent from 2016 to 2026, much faster than the average for all occupations. Demand for information security analysts is expected to be very high, as these analysts will be needed to create innovative solutions to prevent hackers from stealing critical information or causing problems for computer networks.

State & Area Data

Explore resources for employment and wages by state and area for information security analysts.

Similar Occupations

Compare the job duties, education, job growth, and pay of information security analysts with similar occupations.

More Information, Including Links to O*NET

Learn more about information security analysts by visiting additional resources, including O*NET, a source on key characteristics of workers and occupations.


Bureau of Labor Statistics, U.S. Department of Labor, Occupational Outlook Handbook, Information Security Analysts,
on the Internet at (visited July 03, 2018).

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s