Occupation

Information Security Analysts

Human Advantage 71%

Significant human skills needed

AI Automation Risk Moderate Risk
3.4 / 10

Some tasks in this role may be augmented by AI, but human oversight and interpersonal skills remain important.

Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. Assess system vulnerabilities for security risks and propose and implement risk mitigation strategies. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses.

Also Known As: AI Security Specialist (Artificial Intelligence Security Specialist), All-Source Analyst, Application Security Analyst, Applications Security Analyst, Automatic Data Processing Systems Security Specialist (ADP Systems Security), Blue Team Member, Certified Information Systems Security Professional (CISSP), Cloud Security Architect +77 more

Video

Core Tasks

  1. Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
  2. Monitor current reports of computer viruses to determine when to update virus protection systems.
  3. Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.
  4. Perform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures.
  5. Modify computer security files to incorporate new software, correct errors, or change individual access status.
  6. Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated.
  7. Document computer security and emergency measures policies, procedures, and tests.
  8. Confer with users to discuss issues such as computer data access needs, security violations, and programming changes.
  9. Monitor use of data files and regulate access to safeguard information in computer files.
  10. Coordinate implementation of computer system plan with establishment personnel and outside vendors.
  11. Train users and promote security awareness to ensure system security and to improve server and network efficiency.

Education & Training

Job Zone 4 Job Zone Four: Considerable Preparation Needed
Education: Most of these occupations require a four-year bachelor's degree, but some do not.
Experience: A considerable amount of work-related skill, knowledge, or experience is needed for these occupations. For example, an accountant must complete four years of college and work for several years in accounting to be considered qualified.
On-the-Job Training: Employees in these occupations usually need several years of work-related experience, on-the-job training, and/or vocational training.

Education Level Distribution

Percentage of workers in this occupation with each education level.

Bachelor's Degree
53%
Post-Baccalaureate Certificate - awarded for completion of an organized program of study; designed for people who have completed a Baccalaureate degree but do not meet the requirements of academic degrees carrying the title of Master.
23%
Associate's Degree (or other 2-year degree)
13%
Post-Secondary Certificate - awarded for training completed after high school (for example, in agriculture or natural resources, computer services, personal or culinary services, engineering technologies, healthcare, construction trades, mechanic and repair technologies, or precision production)
7%
Master's Degree
3%
Some College Courses
2%

Relevant College Majors

  • Homeland Security CIP 43.0301National security, cybersecurity, and protective measures.
  • Computer and Information Systems Security CIP 11.1003Protecting digital systems and data from threats.

Technology & Tools

Hot Technologies

  • AJAX
  • Amazon DynamoDB
  • Amazon Elastic Compute Cloud EC2
  • Amazon Redshift
  • Amazon Simple Storage Service S3
  • Amazon Web Services AWS CloudFormation
  • Amazon Web Services AWS software
  • Ansible software
  • Apache Cassandra
  • Apache Hadoop
  • Apache Hive
  • Apache Kafka
  • Apache Maven
  • Apache Spark
  • Apache Subversion SVN
  • Apache Tomcat
  • Apple macOS
  • Atlassian Bamboo
  • Atlassian Confluence
  • Atlassian JIRA
  • Bash
  • Border Gateway Protocol BGP
  • C
  • C#
  • C++
  • Chef
  • Django
  • Docker
  • Drupal
  • ESRI ArcGIS software
  • Eclipse IDE
  • Elasticsearch
  • Epic Systems
  • Extensible markup language XML
  • Git
  • GitHub
  • Go
  • Google Angular
  • Hypertext markup language HTML
  • JavaScript
  • JavaScript Object Notation JSON
  • Linux
  • Microsoft .NET Framework
  • Microsoft ASP.NET
  • Microsoft Access
  • Microsoft Active Directory
  • Microsoft Active Server Pages ASP
  • Microsoft Azure software
  • Microsoft Dynamics
  • Microsoft Excel
  • Microsoft Office software
  • Microsoft PowerPoint
  • Microsoft PowerShell
  • Microsoft Project
  • Microsoft SQL Server
  • Microsoft SQL Server Integration Services SSIS
  • Microsoft SQL Server Reporting Services SSRS
  • Microsoft SharePoint
  • Microsoft Teams
  • Microsoft Visio
  • Microsoft Visual Basic
  • Microsoft Visual Basic for Applications VBA
  • Microsoft Visual Studio
  • Microsoft Windows
  • Microsoft Windows Server
  • Microsoft Word
  • MongoDB
  • MySQL
  • NoSQL
  • Node.js
  • Oracle Database
  • Oracle Java
  • Oracle JavaServer Pages JSP
  • Oracle PL/SQL
  • Oracle PeopleSoft
  • PHP
  • Perl
  • PostgreSQL
  • Puppet
  • Python
  • Red Hat Enterprise Linux
  • Red Hat OpenShift
  • Ruby
  • Ruby on Rails
  • SAP software
  • SAS
  • Salesforce software
  • Scala
  • Selenium
  • Shell script
  • Splunk Enterprise
  • Spring Framework
  • Structured query language SQL
  • Swift
  • Tableau
  • Teradata Database
  • The MathWorks MATLAB
  • UNIX
  • UNIX Shell

Software (245)

  • 3M Post-it App
  • Access management software
  • AccessData FTK
  • Active directory software
  • Adobe ActionScript
  • Advanced business application programming ABAP
  • Anti-Trojan software
  • Anti-phishing software
  • Anti-spyware software
  • Apache Ant
  • Apache Groovy
  • Apache HTTP Server
  • Apache Pig
  • Apache Solr
  • Apache Struts
  • ArcSight Enterprise Threat and Risk Management
  • Automated audit trail analysis software
  • Automated installation software
  • Automated media tracking software
  • Backup and archival software
  • Berkeley Internet Domain Name BIND
  • Blackboard software
  • Blink
  • Check Point Next Generation Secure Web Gateway
  • Cisco Systems CiscoWorks
  • Citrix cloud computing software
  • Common business oriented language COBOL
  • Computer forensic software
  • Conformance and validation testing software
  • Cryptographic key management software
  • Customer information control system CICS
  • Delphi Technology
  • Diameter
  • Domain name system DNS
  • End-to-end encryption software
  • Enterprise JavaBeans
  • Ethereal
  • Extensible hypertext markup language XHTML
  • Firewall software
  • Geographic information system GIS software
  • Google Sites
  • Guidance Software EnCase Forensic
  • HP Fortify
  • HP WebInspect
  • Hewlett Packard HP-UX
  • Honeypot
  • Human resource management software HRMS
  • IBM Cognos Impromptu
  • IBM Domino
  • IBM Notes
  • IBM Power Systems software
  • IBM QRadar SIEM
  • IBM Tivoli Access Management TAM
  • IBM Tivoli Identity Management TIM
  • IBM WebSphere
  • ISS RealSecure
  • Imperva SecureSphere
  • Integrated development environment IDE software
  • Integrity verification software
  • Intrusion detection system IDS
  • Intrusion prevention system IPS
  • IpFilter
  • IpTables
  • Job control language JCL
  • Juniper Networks NetScreen-Security Manager
  • Kali Linux
  • Keystroke monitoring software
  • KornShell
  • LAMP Stack
  • LexisNexis
  • License management software
  • Link encryption software
  • McAfee
  • McAfee VirusScan
  • Metasploit
  • Micro Focus OpenView
  • MicroStrategy
  • Microsoft Exchange
  • Microsoft Hyper-V Server
  • Microsoft Visual Basic Scripting Edition VBScript
  • Nagios
  • National Instruments LabVIEW
  • Network and system vulnerability assessment software
  • Network directory services software
  • Network intrusion prevention systems NIPS
  • Network security auditing software
  • Network, hardware, and software auditing software
  • Norton AntiVirus
  • NortonLifeLock cybersecurity software
  • Objective C
  • Operating system software
  • Oracle Business Intelligence Enterprise Edition
  • Oracle E-Business Suite Financials
  • Oracle Fusion Applications
  • Oracle Fusion Middleware
  • Oracle Hyperion
  • Oracle JD Edwards EnterpriseOne
  • Oracle JDBC
  • Oracle Net Manager
  • Oracle PeopleSoft Financials
  • Oracle Solaris
  • Oracle WebLogic Server
  • Palo Alto Networks Next-Generation Security Platform
  • Password cracker software
  • Password management software
  • Patch and update management software
  • Penetration testing software
  • Perforce Helix software
  • Ping Identity
  • Portswigger BurP Suite
  • Program checksumming software
  • Qlik Tech QlikView
  • Qualys Cloud Platform
  • Quest BigBrother
  • Rapid7 Nexpose
  • Red Hat WildFly
  • Relational database management software
  • Remote authentication dial-in user service RADIUS software
  • Root kit detection software
  • SAP Crystal Reports
  • Secure internet filtering software
  • Secure shell SSH software
  • Security incident management software
  • Security risk assessment software
  • Smart card management software
  • Sniffer Investigator
  • Snort
  • Stack smashing protection SSP software
  • Supervisory control and data acquisition SCADA software
  • Symantec Blue Coat Data Loss Prevention
  • Symantec Endpoint Protection
  • System and data disaster recovery software
  • System testing software
  • Tcpdump
  • Tenable Nessus
  • Trend Micro TippingPoint
  • Ubuntu
  • Unified modeling language UML
  • VMware
  • Veritas NetBackup
  • Virtual private networking VPN software
  • Virus scanning software
  • Voice over internet protocol VoIP system software
  • Websense Data Loss Prevention
  • WinMerge
  • Wireshark

Tools & Equipment (6)

  • Desktop computers
  • Local area network LAN analyzers
  • Mainframe computers
  • Network analyzers
  • Notebook computers
  • Protocol analyzers

Where This Career Leads

Career progression organized by specialty track and experience level.

Network Systems & Cybersecurity Advanced Manufacturing

Zone 4
Information Security Analysts You are here

Resume Builder

Select key tasks to generate action-oriented resume bullets for Information Security Analysts positions.

Related Occupations

Show all 20 related occupations

Real Talk

Hear from real Information Security Analystss about their work: