Information Security Analysts
SOC: 15-1122.00

Description:

Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses.


National Salary Information:

Hourly Statistics:

Annual Statistics:

Source: Bureau of Labor Statistics 2015 wage data.


Employment Projections:

Employment (2014):
82,900 employed

Projected (2024):
97,700 employed

Projected growth (2014-2024)


Source: Bureau of Labor Statistics 2015 2014-2024 employment projections external site. "Projected growth" represents the estimated change in total employment over the projections period (2014-2024). "Projected job openings" represent openings due to growth and replacement.


Alternate Titles:

  • Automatic Data Processing Systems Security Specialist (ADP Systems Security)
  • Certified Information Systems Security Professional (CISSP)
  • Chief Technology Officer (CTO)
  • Computer Security Coordinator
  • Computer Security Information Specialist
  • Computer Security Specialist
  • Computer Specialist
  • Computer Systems Manager
  • Computer Systems Security Analyst
  • Computer Systems Technician
  • Cryptological Technician
  • Cryptologist
  • Cyber Security Engineer
  • Cyber Security Specialist
  • Data Recovery Planner
  • Data Security Administrator
  • Data Security Analyst
  • Database Security Expert
  • Information Assurance Analyst
  • Information Assurance Engineer
  • Information Security Analyst
  • Information Security Director
  • Information Security Engineer
  • Information Security Manager
  • Information Security Officer
  • Information Security Specialist
  • Information Systems Security Analyst
  • Information Systems Security Officer
  • Information Systems Security Specialist
  • Information Technology Analyst (IT Analyst)
  • Information Technology Applications Developer (IT Applications Developer)
  • Information Technology Consultant (IT Consultant)
  • Information Technology Manager
  • Information Technology Security Analyst
  • Information Technology Specialist
  • Internet Security Specialist
  • Network Administrator
  • Network Engineer
  • Network Manager
  • Network Security Administrator
  • Network Security Analyst
  • Network Security Engineer
  • Network Security Officer
  • PC Analyst (Personal Computer Analyst)
  • Programmer Analyst
  • Security Analyst
  • Security Architect
  • Security Consultant
  • Security Director
  • Security Engineer
  • Security Specialist
  • Systems Administrator
  • Systems Analyst
  • Systems Security Information Technology Specialist


  • Job Zone Four: Considerable Preparation Needed

    Experience:

    A considerable amount of work-related skill, knowledge, or experience is needed for these occupations. For example, an accountant must complete four years of college and work for several years in accounting to be considered qualified.

    Education:

    Most of these occupations require a four-year bachelor's degree, but some do not.

    Job Training:

    Employees in these occupations usually need several years of work-related experience, on-the-job training, and/or vocational training.


    Required Skills:

  • Reading Comprehension
  • Active Listening
  • Writing
  • Speaking
  • Mathematics
  • Science
  • Critical Thinking
  • Active Learning
  • Learning Strategies
  • Monitoring
  • Social Perceptiveness
  • Coordination
  • Persuasion
  • Negotiation
  • Instructing
  • Service Orientation
  • Complex Problem Solving
  • Operations Analysis
  • Technology Design
  • Programming
  • Operation Monitoring
  • Operation and Control
  • Troubleshooting
  • Quality Control Analysis
  • Judgment and Decision Making
  • Systems Analysis
  • Systems Evaluation
  • Time Management
  • Management of Financial Resources
  • Management of Material Resources
  • Management of Personnel Resources

  • Knowledge Used:

  • Administration and Management
  • Clerical
  • Economics and Accounting
  • Sales and Marketing
  • Customer and Personal Service
  • Personnel and Human Resources
  • Production and Processing
  • Computers and Electronics
  • Engineering and Technology
  • Design
  • Building and Construction
  • Mechanical
  • Mathematics
  • Physics
  • Chemistry
  • Psychology
  • Sociology and Anthropology
  • Geography
  • Therapy and Counseling
  • Education and Training
  • English Language
  • Fine Arts
  • History and Archeology
  • Philosophy and Theology
  • Public Safety and Security
  • Law and Government
  • Telecommunications
  • Communications and Media
  • Transportation


  • Tasks:

  • Train users and promote security awareness to ensure system security and to improve server and network efficiency.
  • Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
  • Confer with users to discuss issues such as computer data access needs, security violations, and programming changes.
  • Monitor current reports of computer viruses to determine when to update virus protection systems.
  • Modify computer security files to incorporate new software, correct errors, or change individual access status.
  • Coordinate implementation of computer system plan with establishment personnel and outside vendors.
  • Monitor use of data files and regulate access to safeguard information in computer files.
  • Perform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures.
  • Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.
  • Document computer security and emergency measures policies, procedures, and tests.
  • Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated.
  • Maintain permanent fleet cryptologic and carry-on direct support systems required in special land, sea surface and subsurface operations.

  • Tools & Technology:

  • Desktop computers
  • Local area network LAN analyzers
  • Mainframe computers
  • Network analyzers
  • Notebook computers
  • Protocol analyzers
  • Access management software
  • Active directory software
  • Akoura SmartToken
  • Anti-phishing software
  • Anti-spyware software
  • Anti-Trojan software
  • Apache Cassandra
  • Apache Hadoop
  • Apache HTTP Server
  • Apache Tomcat
  • ArcSight Enterprise Threat and Risk Management
  • Automated audit trail analysis software
  • Automated installation software
  • Automated media tracking software
  • Backup and archival software
  • Berkeley Internet Domain Name BIND software
  • C
  • C#
  • C++
  • Cisco Systems CiscoWorks software
  • Citrix software
  • Common business oriented language COBOL
  • Computer forensic software
  • Conformance and validation testing software
  • Cryptographic key management software
  • Customer information control system CICS
  • Diameter
  • Domain name system DNS software
  • End-to-end encryption software
  • Extensible markup language XML
  • Firewall software
  • Hewlett Packard HP-UX
  • Hewlett-Packard HP OpenView software
  • Honeypot
  • Hypertext markup language HTML
  • IBM Notes
  • IBM Power Systems software
  • IBM Tivoli Access Management TAM
  • IBM Tivoli Identity Management TIM
  • IBM WebSphere
  • Integrity verification software
  • Intrusion detection system IDS software
  • Intrusion prevention system IPS software
  • JavaScript
  • Job control language JCL
  • Keystroke monitoring software
  • KornShell
  • License management software
  • Link encryption software
  • Linux
  • McAfee software
  • McAfee VirusScan
  • Microsoft .NET Framework
  • Microsoft Access
  • Microsoft Excel
  • Microsoft Exchange Server
  • Microsoft Office software
  • Microsoft PowerPoint
  • Microsoft Project
  • Microsoft SharePoint software
  • Microsoft SQL Server software
  • Microsoft Visio
  • Microsoft Visual Basic Scripting Edition VBScript
  • Microsoft Windows
  • Microsoft Word
  • MySQL software
  • Nagios
  • Network and system vulnerability assessment software
  • Network directory services software
  • Network intrusion prevention systems NIPS software
  • Network security auditing software
  • Network, hardware, and software auditing software
  • Objective C
  • Oracle Java
  • Oracle Net Manager
  • Oracle software
  • Oracle Solaris
  • Oracle WebLogic Server
  • Password cracker software
  • Password management software
  • Patch and update management software
  • Penetration testing software
  • PHP: Hypertext Preprocessor
  • Ping Identity software
  • PostgreSQL software
  • Practical extraction and reporting language Perl
  • Program checksumming software
  • Puppet
  • Python
  • Quest BigBrother
  • Red Hat Enterprise Linux
  • Red Hat WildFly
  • Remote authentication dial-in user service RADIUS software
  • Root kit detection software
  • Safeguard Systems software
  • SAP software
  • SAS software
  • Secure internet filtering software
  • Secure shell SSH software
  • Security incident management software
  • Security risk assessment software
  • Smart card management software
  • Snort
  • Splunk Enterprise
  • Stack smashing protection SSP software
  • Structured query language SQL
  • Sybase software
  • Symantec Norton Antivirus
  • Symantec security software
  • System and data disaster recovery software
  • System testing software
  • Unified modeling language UML
  • UNIX
  • Veritas NetBackup
  • Virtual private networking VPN software
  • Virus scanning software
  • Wireshark


  • computer and mathematical


    industry stats

    SOC: 15-0000

    Total Employed: 4,005,250

    Average Annual Salary: $86,170