Occupational Guides banner
Detailed Guide for

Information Security Analysts in

May also be called: Computer Security Specialists; Data Security Administrators; Information Security Engineers; Information Security Officers; Information Security Specialists; Information Systems Security Analysts; and Information Technology Security Analysts

What Would I Do?

Many organizations store all of their information solely on computers, so Information Security Analysts are needed to keep that data safe. Information such as personnel files, client lists, bank account records, and government data needs to be protected from cyberattack.

Information Security Analysts plan, develop, implement, upgrade, or monitor security measures to protect computer networks and systems. They must comply with laws, regulations, and information security requirements to ensure that appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. They assess data exposure risks and validate that security systems are working properly. They teach users about computer security and install security software. They respond to computer security breaches and viruses; therefore, it is vital that they stay current on virus trends and ensure virus protection is in place.

They may plan for situations where power outages caused by severe weather or other disaster leave security vulnerable. They will also need to ensure operations are maintained during such an event by regularly copying and transferring data to an offsite location. In some cases, they gather data and evidence to be used in prosecuting cybercrime. As cyberattacks have become more sophisticated, the responsibilities of Information Security Analysts have increased.

Tools and Technology

Information Security Analysts use a variety of tools and technology in their work. In addition to computers, they use network and protocol analyzers. They also use authentication server, network monitoring, network security or virtual private network (VPN) management and equipment, operating system, and transaction security and virus protection software.

Important Tasks and Related Skills

Each task below is matched to a sample skill required to carry out the task.

TaskSkill Used in this Task
Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.Telecommunications
Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.Critical Thinking
Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated.Written Comprehension
Monitor use of data files and regulate access to safeguard information in computer files.Inductive Reasoning
Monitor current reports of computer viruses to determine when to update virus protection systems.Problem Sensitivity
Modify computer security files to incorporate new software, correct errors, or change individual access status.Complex Problem Solving
Perform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures.Computers and Electronics
Confer with users to discuss issues such as computer data access needs, security violations, and programming changes.Oral Comprehension
Train users and promote security awareness to ensure system security and to improve server and network efficiency.Speaking
Source: U.S. Department of Labor Occupational Information Network (O*NET) at online.onetcenter.org

Working Conditions

Information Security Analysts usually work in offices or laboratories in comfortable surroundings. They work about 40 hours a week, but may be required to work some evenings or weekends to meet deadlines or solve specific problems. They may also need to be on call outside of normal business hours in case of an emergency at their organization.

This type of work may be stressful for some as they must be able to work well under pressure. Following proper precautions, they can minimize eyestrain, back discomfort, and hand and wrist problems from using a computer for long periods of time.

Although most Information Security Analysts are not represented by unions, unionization varies by industry. Public sector employees may join the Service Employees International Union.

Will This Job Fit Me?

The job of Information Security Analyst may appeal to those who enjoy activities that involve following set procedures and routines. This occupation involves working with data and details more than with ideas. Individuals who value job security and good working conditions may enjoy this occupation.

Information Security Analysts may work independently or as part of a team. They must have excellent technical, research, and writing skills as well as the ability to handle multiple projects. They must be able to communicate with both technical and non-technical staff. Sound analytical and problem solving skills as well as good attention to detail are essential. In addition, they need ingenuity and the ability to take initiative.

What Wages and Benefits Can I Expect?


The median wage in 2021 for Information Security Analysts in California is $0 annually. The median is the point at which half of the workers earn more and half earn less.

Annual Wages for 2021Low
(25th percentile)
(50th percentile)
(75th percentile)
Source: EDD/LMID Occupational Employment Statistics Survey, 2021 at www.labormarketinfo.edd.ca.gov/data/wages.html Wages do not reflect self-employment.


Information Security Analysts generally receive medical and dental insurance, vacation, sick leave, and retirement plans from their employers.

What is the Job Outlook?

Demand for Information Security Analysts is expected to be very high. Analysts will be needed to come up with innovative solutions to prevent cyberattacks and hackers from stealing critical information or creating havoc on computer networks. In addition, as the healthcare industry expands its use of electronic medical records, more Information Security Analysts are likely to be needed to create the safeguards that will ensure patients’ privacy, protect personal data, and satisfy patients’ concerns.

The number of Information Security Analysts in California is unknown at this time since this is a new occupation and there are no employment projections data available. Information Security Analysts is a fast growing occupation in California. It should be in high demand over the next decade as information security needs rise due to increasingly sophisticated cyberattacks. New job growth is expected in the federal government to protect critical information technology systems as well as in the healthcare industry to safeguard the protection of patients’ privacy and personal data with the use of electronic records. Because of the rapidly changing technology, workers who are capable of implementing new technologies will find the most opportunities.

Projections of Employment

In California, the number of Information Security Analysts is expected to grow much faster than average growth rate for all occupations. Jobs for Information Security Analysts are expected to increase by 32.7 percent, or 1,800 jobs between 2018 and 2028.

Estimated Employment and Projected Growth
Information Security Analysts
Geographic Area
(Estimated Year-Projected Year)
Source: EDD/LMID Projections of Employment by Occupation at www.labormarketinfo.edd.ca.gov/data/employment-projections.html

How Do I Qualify?

Education, Training, and Other Requirements

The level of education and type of training varies by employer. A bachelor’s degree in computer science or a related field is required for most jobs. Some employers may prefer applicants with a Master of Business Administration (MBA) in Information Systems. Most employers require several years of prior information technology or security experience as relevant work experience is very important in this occupation. Many positions require that the candidate be able to obtain a security clearance. Those who have a background in the industry should have an advantage.

Early Career Planning

High school students interested in this kind of work should take classes in mathematics, computer science, information technology, and language arts. Other helpful classes may include business, physical science, and engineering technology. Training programs are also available through Regional Occupational Programs (ROP) in computer forensics, computer security, network security, and security issues for information technology professionals.  To find an ROP program near you, go to the California Association of Regional Occupational Centers and Programs Web site at www.carocp.org/carocps.html.

Continuing Education

With rapidly changing technology come new security risks, making it necessary for Information Security Analysts to keep current on new security technology as well as the latest attack methods. Employers, hardware and software vendors, colleges and universities, and private training institutions offer continuing education. Attending cybersecurity conferences may be useful to hear from other information security professionals who have knowledge of new types of attacks.


Professional certification has become the industry standard. Many different certification programs are available through product vendors, computer associations, and other training institutions. Employers prefer relevant security certification, such as a Certified Information Systems Security Professional (CISSP) credential. In addition, many product vendors require those who work with their products to be certified. For more information, go to the U.S. Department of Labor's Career InfoNet Web site at www.acinet.org and scroll down to "Career Tools." Click on "Certification Finder" at www.acinet.org/certifications_new/default.aspx and follow the instructions to locate certification programs.

Where Can I Find Training?

There are two ways to search for training information at www.labormarketinfo.edd.ca.gov/resources/training-and-apprenticeships.html

Contact the schools you are interested in to learn about the classes available, tuition and fees, and any prerequisite course work.

Where Would I Work?

The largest industries employing Information Security Analysts are as follows:

Industry TitlePercent of Total Employment for Occupation in California
Computer Systems Design and Rel Services21.6%
Credit Intermediation & Related Activity6.6%
Management of Companies and Enterprises6.1%
Software Publishers5.6%
Aerospace Product & Parts Manufacturing4.9%
Source: EDD/LMID Staffing Patterns at www.labormarketinfo.edd.ca.gov/data/employment-projections.html

Finding a Job

Networking is important in this occupation, since many Information Security Analysts find work through referrals. Jobs can also be found through direct application to employers, newspaper classified advertisements, online job boards, and professional organizations.  Online job opening systems include JobCentral at www.jobcentral.com and CalJOBSSM at www.caljobs.ca.gov.

To find your nearest One-Stop Career Center, go to Service Locator. View the helpful job search tips for more resources. (requires Adobe Reader).

Yellow Page Headings

You can focus your local job search by checking employers listed online or in your local telephone directory. Below are some suggested headings where you might find employers of Information Security Analysts.

Find Possible Employers

To locate a list of employers in your area, use "Find Employers" on the LaborMarketInfo Web site at http://www.labormarketinfo.edd.ca.gov/aspdotnet/databrowsing/empMain.aspx?menuChoice=emp

Where Could This Job Lead?

Information Security Analysts may advance into lead or supervisory positions. They may also move into other computer positions, such as computer systems analyst. Those with significant expertise may find opportunities as independent consultants.

Related Occupations

Below is a list of occupations related to Information Security Analysts.

Other Sources

These links are provided for your convenience and do not constitute an endorsement by EDD.

For the Career Professional

The following codes are provided to assist counselors, job placement workers, or other career professionals.

SOC - Standard Occupational Classification at www.bls.gov/soc/15-1122
O*NET - Occupational Information Network at online.onetcenter.org/
   Information Security Analysts15-1122.00
   Interest Codes (RIASEC) at online.onetcenter.org/find/descriptor/browse/Interests/#curCIR

The California Occupational Guides are a product of:
The California Employment Development Department
Labor Market Information Division

Printed on Friday, December 03, 2021