Occupation Summary

Information Security Analysts

O*NET 15-1122.00

Description:

Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses.

Annual Wages:
$94,966.00
Employment Rate:
Employment is expected to increase by 31.21%.
Education Level:
Bachelor's Degree. According to O*Net, the majority of people employed in this occupation have this level of education.
Endorsement:
Business and Industry, Science Technology Engineering and Math (STEM)

  1. Train users and promote security awareness to ensure system security and to improve server and network efficiency.
  2. Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
  3. Confer with users to discuss issues such as computer data access needs, security violations, and programming changes.
  4. Monitor current reports of computer viruses to determine when to update virus protection systems.
  5. Modify computer security files to incorporate new software, correct errors, or change individual access status.
  6. Coordinate implementation of computer system plan with establishment personnel and outside vendors.
  7. Monitor use of data files and regulate access to safeguard information in computer files.
  8. Perform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures.
  9. Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.
  10. Document computer security and emergency measures policies, procedures, and tests.
  11. Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated.
  12. Maintain permanent fleet cryptologic and carry-on direct support systems required in special land, sea surface and subsurface operations.


National Industry Employment Patterns


Industry % of Information Security Analysts employed Annual Growth Rate
Computer systems design and related services 26.4 3.09
Depository credit intermediation 7.4 0.64
Management and technical consulting services 4.7 2.52
Insurance carriers 4 2.84
Securities and commodity contracts brokerage 3.3 0.72
General medical and surgical hospitals 2.9 2.92
Architectural and engineering services 2.8 1.23
Colleges and universities 2.7 0.43
Scientific research and development services 2.5 0.47
Wired telecommunications carriers 2.3 -1.70


Labor Market Information


2017 Statewide average hourly wage $45.66
2017 National average hourly wage $47.93
2014 National employment 82,900
2014 Texas employment 7,210
Texas projected employment by 2024 9,460
Texas projected annual employment and Turnover openings through 2024 320




TEXAS COUNTY MAP BY WORKFORCE DEVELOPMENT AREA
* Due to confidentiality rules, not all regions may have the data displayed. The sum of all the regions may not be equal to the state total.


Top 10 Relevant Knowledge Areas Relevant Importance Levels
Computers and Electronics
Knowledge of circuit boards, processors, chips, electronic equipment, and computer hardware and software, including applications and programming.
96.40%
Telecommunications
Knowledge of transmission, broadcasting, switching, control, and operation of telecommunications systems.
79.20%
Administration and Management
Knowledge of business and management principles involved in strategic planning, resource allocation, human resources modeling, leadership technique, production methods, and coordination of people and resources.
78.40%
English Language
Knowledge of the structure and content of the English language including the meaning and spelling of words, rules of composition, and grammar.
76.00%
Education and Training
Knowledge of principles and methods for curriculum and training design, teaching and instruction for individuals and groups, and the measurement of training effects.
69.00%
Engineering and Technology
Knowledge of the practical application of engineering science and technology. This includes applying principles, techniques, procedures, and equipment to the design and production of various goods and services.
67.00%
Public Safety and Security
Knowledge of relevant equipment, policies, procedures, and strategies to promote effective local, state, or national security operations for the protection of people, data, property, and institutions.
66.40%
Communications and Media
Knowledge of media production, communication, and dissemination techniques and methods. This includes alternative ways to inform and entertain via written, oral, and visual media.
63.40%
Customer and Personal Service
Knowledge of principles and processes for providing customer and personal services. This includes customer needs assessment, meeting quality standards for services, and evaluation of customer satisfaction.
60.20%
Mathematics
Knowledge of arithmetic, algebra, geometry, calculus, statistics, and their applications.
57.20%


Top 10 Relevant Skill Areas Relevant Importance Levels
Reading Comprehension
Understanding written sentences and paragraphs in work related documents.
77.60%
Critical Thinking
Using logic and reasoning to identify the strengths and weaknesses of alternative solutions, conclusions or approaches to problems.
77.60%
Complex Problem Solving
Identifying complex problems and reviewing related information to develop and evaluate options and implement solutions.
75.00%
Speaking
Talking to others to convey information effectively.
72.40%
Active Listening
Giving full attention to what other people are saying, taking time to understand the points being made, asking questions as appropriate, and not interrupting at inappropriate times.
70.00%
Writing
Communicating effectively in writing as appropriate for the needs of the audience.
70.00%
Judgment and Decision Making
Considering the relative costs and benefits of potential actions to choose the most appropriate one.
67.60%
Time Management
Managing one's own time and the time of others.
67.60%
Systems Analysis
Determining how a system should work and how changes in conditions, operations, and the environment will affect outcomes.
65.00%
Monitoring
Monitoring/Assessing performance of yourself, other individuals, or organizations to make improvements or take corrective action.
65.00%


Top 10 Relevant Abilities Relevant Importance Levels
Written Comprehension
The ability to read and understand information and ideas presented in writing.
80.00%
Problem Sensitivity
The ability to tell when something is wrong or is likely to go wrong. It does not involve solving the problem, only recognizing there is a problem.
77.60%
Oral Comprehension
The ability to listen to and understand information and ideas presented through spoken words and sentences.
77.60%
Deductive Reasoning
The ability to apply general rules to specific problems to produce answers that make sense.
75.00%
Inductive Reasoning
The ability to combine pieces of information to form general rules or conclusions (includes finding a relationship among seemingly unrelated events).
75.00%
Oral Expression
The ability to communicate information and ideas in speaking so others will understand.
72.40%
Written Expression
The ability to communicate information and ideas in writing so others will understand.
70.00%
Information Ordering
The ability to arrange things or actions in a certain order or pattern according to a specific rule or set of rules (e.g., patterns of numbers, letters, words, pictures, mathematical operations).
70.00%
Near Vision
The ability to see details at close range (within a few feet of the observer).
70.00%
Speech Clarity
The ability to speak clearly so others can understand you.
70.00%


  • Interacting With Computers
    -- Using computers and computer systems (including hardware and software) to program, write software, set up functions, enter data, or process information.
  • Getting Information
    -- Observing, receiving, and otherwise obtaining information from all relevant sources.
  • Analyzing Data or Information
    -- Identifying the underlying principles, reasons, or facts of information by breaking down information or data into separate parts.
  • Evaluating Information to Determine Compliance with Standards
    -- Using relevant information and individual judgment to determine whether events or processes comply with laws, regulations, or standards.
  • Communicating with Supervisors, Peers, or Subordinates
    -- Providing information to supervisors, co-workers, and subordinates by telephone, in written form, e-mail, or in person.
Other Activities


  • Adjust computer controlled simulation equipment
  • Administer educational institutions
  • Analyze business, operational, or management reports
  • Analyze computer systems
  • Assist users with software or hardware problems
  • Attend professional conferences and events
  • Collaborate with employees to improve organizational systems
  • Collaborate with employees to reduce costs
  • Collaborate with stakeholders to incorporate requirements into contracts
  • Communicate technical or scientific information
  • Conduct computer diagnostics
  • Confer with personnel regarding computer-based security violations
  • Configure computer operating systems
  • Configure data center applications and controls
  • Debug computer programs, software, or systems
  • Design computer hardware
  • Design computer programming tools
  • Design data processing systems
  • Design data security systems
  • Design software or user interface
  • Develop computer performance standards
  • Develop computer, network, or database policies, procedures, or standards
  • Develop maintenance schedules
  • Develop project contingency plans
  • Develop records management systems
  • Develop simple financial data repositories or databases
  • Develop simple informational data repositories or databases
  • Develop simple operational data repositories or databases
  • Develop system requirements
  • Direct network personnel in remote site configuration
  • Employ computer application flow charts
  • Establish project performance metrics
  • Evaluate computer system user requests or requirements
  • Evaluate prototype software
  • Evaluate reliability of source information
  • Evaluate significance of historical data
  • Identify software needed for specific project or task
  • Implement changes in computer systems
  • Install computer programs
  • Install computer security measures
  • Install electronic equipment, components, or systems
  • Install hardware, software, or peripheral equipment
  • Install physical security measures
  • Integrate software or hardware into a variety of environments
  • Maintain business or financial records, reports, or files
  • Maintain complex computer databases
  • Maintain computer software, programs, or code
  • Maintain computer, network, or database records, reports, or files
  • Maintain computers or related equipment
  • Maintain confidentiality of data
  • Maintain network systems
  • Maintain physical security of classified data
  • Maintain physical security of classified hardware or software
  • Manage detailed records or files in law enforcement or security setting
  • Manage material resources
  • Modify network systems
  • Monitor computer operation
  • Monitor message or event logs for computer systems
  • Monitor use of computer data files to safeguard information
  • Obtain information from clients, customers, or patients
  • Obtain information from stakeholders or constituents
  • Offer purchase, repair, or modification recommendations of furnishings or equipment
  • Operate computers to enter, calculate, access, and retrieve data
  • Operate Geographic Positioning System (GPS) equipment
  • Operate Geographical Information System (GIS) software
  • Perform continuing education to maintain licenses, certifications, qualifications, and knowledge currency
  • Perform software crash analysis
  • Plan computer security measures
  • Prepare instruction manuals
  • Program computer numerical controlled machines
  • Provide network support
  • Provide technical support and information
  • Read technical, operating, service, or repair manuals or publications
  • Recommend measures to ensure maximum employee protection
  • Recommend software or hardware purchases
  • Route computer output to specified users
  • Solve computer program or software problems
  • Store data to avoid data loss
  • Test computer programs or systems
  • Test data communications systems
  • Test vehicle computer processors to detect malfunctions
  • Train workers in use of equipment or computers
  • Troubleshoot complex computer hardware problems
  • Troubleshoot computer, network, or database problems
  • Upload data to website or online server for information sharing
  • Verify completeness or accuracy of data
  • Verify investigative information
  • Write computer programs or code
  • Write documentation for computer programming or operation
  • Write technical specifications for computer systems
  • Write technical specifications for software or applications


  • Support
    - Occupations that satisfy this work value offer supportive management that stands behind employees. Corresponding needs are Company Policies, Supervision: Human Relations and Supervision: Technical.
  • Working Conditions
    - Occupations that satisfy this work value offer job security and good working conditions. Corresponding needs are Activity, Compensation, Independence, Security, Variety and Working Conditions.



Tools

Desktop computers: Desktop computers;

Mainframe computers: Mainframe computers;

Network analyzers: Local area network LAN analyzers; Network analyzers;

Notebook computers: Notebook computers;

Protocol analyzers: Protocol analyzers;


Technology

Access software: Access management software; Citrix software; IBM Tivoli Access Management TAM;

Analytical or scientific software: SAS software;

Application server software: Oracle WebLogic Server;

Authentication server software: IBM Tivoli Identity Management TIM; Diameter; Akoura SmartToken; Password management software; Remote authentication dial-in user service RADIUS software;

Backup or archival software: System and data disaster recovery software; Backup and archival software;

Configuration management software: Automated installation software; Puppet; Patch and update management software;

Data base management system software: Sybase software; Apache Hadoop; Apache Cassandra; Oracle software;

Data base user interface and query software: Microsoft SQL Server; MySQL software; Microsoft Access; Structured query language SQL;

Desktop communications software: Secure shell SSH software;

Development environment software: Microsoft Visual Basic Scripting Edition VBScript; Microsoft .NET Framework; C;

Document management software: Microsoft Office SharePoint Server MOSS;

Electronic mail software: IBM Notes; Microsoft Exchange Server;

Enterprise application integration software: IBM WebSphere; Extensible markup language XML;

Enterprise resource planning ERP software: SAP software;

Enterprise system management software: Splunk; ArcSight Enterprise Threat and Risk Management; IBM Power Systems software;

Filesystem software: Computer forensic software;

Graphics or photo imaging software: Microsoft Visio;

Internet directory services software: Domain name system DNS software; Berkeley Internet Domain Name BIND software; Active directory software; Network directory services software;

License management software: License management software;

Network monitoring software: Keystroke monitoring software; Cisco Systems CiscoWorks software; Network, hardware, and software auditing software; Nagios; Automated media tracking software; Automated audit trail analysis software; Hewlett-Packard HP OpenView software; Integrity verification software; Quest BigBrother; Sun Microsystems NetManage; Wireshark;

Network security and virtual private network VPN equipment software: Firewall software; Cryptographic key management software;

Network security or virtual private network VPN management software: Intrusion detection system IDS software; Intrusion prevention system IPS software; Network and system vulnerability assessment software; Network security auditing software; Snort intrusion detection technology; Security incident management software;

Object or component oriented development software: Python; Practical extraction and reporting language Perl; Objective C; Oracle Java; C#; C++;

Object oriented data base management software: PostgreSQL software;

Office suite software: Microsoft Office software;

Operating system software: Linux; Job control language JCL; KornShell; Oracle Solaris; Microsoft Windows; Hewlett Packard HP-UX; Red Hat Enterprise Linux; UNIX;

Point of sale POS software: Smart card management software;

Portal server software: Apache HTTP Server;

Presentation software: Microsoft PowerPoint;

Program testing software: Conformance and validation testing software; System testing software;

Project management software: Microsoft Project; Microsoft SharePoint software;

Requirements analysis and system architecture software: Unified modeling language UML;

Spreadsheet software: Microsoft Excel;

Transaction security and virus protection software: McAfee VirusScan; Link encryption software; End-to-end encryption software; Honeypot; Anti-Trojan software; Anti-phishing software; Anti-spyware software; Virus scanning software; Symantec Norton Antivirus; Stack smashing protection SSP software; Security risk assessment software; Safeguard Systems software; Secure internet filtering software; Root kit detection software; Program checksumming software; Password cracker software; Penetration testing software; Ping Identity software;

Transaction server software: Customer information control system CCIS;

Web platform development software: Hypertext markup language HTML; JavaScript; Apache Tomcat; PHP: Hypertext Preprocessor;

Word processing software: Microsoft Word;


Related O*NET occupational titles for Information Security Analysts include:
  • 11-3021.00 Computer and Information Systems Managers
  • 15-1143.00 Computer Network Architects
  • 15-1121.00 Computer Systems Analysts
  • 15-1199.02 Computer Systems Engineers/Architects
  • 15-1141.00 Database Administrators
  • 13-1081.02 Logistics Analysts
  • 15-1133.00 Software Developers, Systems Software
  • 15-1199.01 Software Quality Assurance Engineers and Testers
  • 17-2199.02 Validation Engineers
  • 15-1199.03 Web Administrators


Sources of Additional Information
  • For more information about computer careers, visit: Association for Computing Machinery
  • IEEE Computer Society
  • Computing Research Association
  • For information about opportunities for women pursuing information technology careers, visit: National Center for Women & Information Technology
  • Information Security Analysts

  • Contact Texas Workforce Commission
    Labor Market and Career Information  |  101 E. 15th Street, Annex Room 0252  |  Austin, Texas 78778
    Official Website  |  1-800-822-PLAN (7526)  |  512.936.3200

    ** The information in this report may be derived from many sources like O*NET, BLS (Bureau of Labor Statistics), OOH (Occupational Outlook Handbook), and Career One Stop.