Occupation Summary

Information Security Analysts

O*NET 15-1212.00

Description:

Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. Assess system vulnerabilities for security risks and propose and implement risk mitigation strategies. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses.

Annual Wages:
$119,483.00
Employment Rate:
Employment is expected to increase by 47.88%.
Education Level:
Bachelor's Degree. According to O*Net, the majority of people employed in this occupation have this level of education.
Endorsement:
Business and Industry, Science Technology Engineering and Math (STEM)

  1. Train users and promote security awareness to ensure system security and to improve server and network efficiency.
  2. Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
  3. Confer with users to discuss issues such as computer data access needs, security violations, and programming changes.
  4. Monitor current reports of computer viruses to determine when to update virus protection systems.
  5. Modify computer security files to incorporate new software, correct errors, or change individual access status.
  6. Coordinate implementation of computer system plan with establishment personnel and outside vendors.
  7. Monitor use of data files and regulate access to safeguard information in computer files.
  8. Perform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures.
  9. Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.
  10. Document computer security and emergency measures policies, procedures, and tests.
  11. Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated.


National Industry Employment Patterns


Industry % of Information Security Analysts employed Annual Growth Rate
Computer systems design and related services 24.9 3.94
Management, scientific, and technical consulting services 6 2.84
Insurance carriers 4.6 2.41
Accounting, tax preparation, bookkeeping, and payroll services 4.1 1.99
Scientific research and development services 4.1 2.35
Employment services 3.4 1.93
Architectural, engineering, and related services 3.1 2.26
Colleges, universities, and professional schools 2.3 2.15
Software publishers 2.1 2.92


Labor Market Information


2023 Statewide average hourly wage $57.44
2023 National average hourly wage $59.97
2022 National employment 168,900
2022 Texas employment 14,621
Texas projected employment by 2032 21,622
Texas projected annual employment and Turnover openings through 2032 1,760




TEXAS COUNTY MAP BY WORKFORCE DEVELOPMENT AREA
* Due to confidentiality rules, not all regions may have the data displayed. The sum of all the regions may not be equal to the state total.


Top 10 Relevant Knowledge Areas Relevant Importance Levels
Computers and Electronics
Knowledge of circuit boards, processors, chips, electronic equipment, and computer hardware and software, including applications and programming.
87.00%
English Language
Knowledge of the structure and content of the English language including the meaning and spelling of words, rules of composition, and grammar.
85.20%
Administration and Management
Knowledge of business and management principles involved in strategic planning, resource allocation, human resources modeling, leadership technique, production methods, and coordination of people and resources.
73.60%
Engineering and Technology
Knowledge of the practical application of engineering science and technology. This includes applying principles, techniques, procedures, and equipment to the design and production of various goods and services.
72.80%
Telecommunications
Knowledge of transmission, broadcasting, switching, control, and operation of telecommunications systems.
72.80%
Customer and Personal Service
Knowledge of principles and processes for providing customer and personal services. This includes customer needs assessment, meeting quality standards for services, and evaluation of customer satisfaction.
68.40%
Public Safety and Security
Knowledge of relevant equipment, policies, procedures, and strategies to promote effective local, state, or national security operations for the protection of people, data, property, and institutions.
65.40%
Education and Training
Knowledge of principles and methods for curriculum and training design, teaching and instruction for individuals and groups, and the measurement of training effects.
63.80%
Mathematics
Knowledge of arithmetic, algebra, geometry, calculus, statistics, and their applications.
57.40%
Communications and Media
Knowledge of media production, communication, and dissemination techniques and methods. This includes alternative ways to inform and entertain via written, oral, and visual media.
56.00%


Top 10 Relevant Skill Areas Relevant Importance Levels
Reading Comprehension
Understanding written sentences and paragraphs in work-related documents.
80.00%
Critical Thinking
Using logic and reasoning to identify the strengths and weaknesses of alternative solutions, conclusions, or approaches to problems.
77.60%
Active Listening
Giving full attention to what other people are saying, taking time to understand the points being made, asking questions as appropriate, and not interrupting at inappropriate times.
75.00%
Complex Problem Solving
Identifying complex problems and reviewing related information to develop and evaluate options and implement solutions.
75.00%
Speaking
Talking to others to convey information effectively.
72.40%
Writing
Communicating effectively in writing as appropriate for the needs of the audience.
70.00%
Monitoring
Monitoring/Assessing performance of yourself, other individuals, or organizations to make improvements or take corrective action.
67.60%
Judgment and Decision Making
Considering the relative costs and benefits of potential actions to choose the most appropriate one.
67.60%
Systems Analysis
Determining how a system should work and how changes in conditions, operations, and the environment will affect outcomes.
67.60%
Active Learning
Understanding the implications of new information for both current and future problem-solving and decision-making.
65.00%


Top 10 Relevant Abilities Relevant Importance Levels
Problem Sensitivity
The ability to tell when something is wrong or is likely to go wrong. It does not involve solving the problem, only recognizing that there is a problem.
80.00%
Deductive Reasoning
The ability to apply general rules to specific problems to produce answers that make sense.
80.00%
Inductive Reasoning
The ability to combine pieces of information to form general rules or conclusions (includes finding a relationship among seemingly unrelated events).
80.00%
Oral Comprehension
The ability to listen to and understand information and ideas presented through spoken words and sentences.
80.00%
Written Comprehension
The ability to read and understand information and ideas presented in writing.
80.00%
Written Expression
The ability to communicate information and ideas in writing so others will understand.
77.60%
Information Ordering
The ability to arrange things or actions in a certain order or pattern according to a specific rule or set of rules (e.g., patterns of numbers, letters, words, pictures, mathematical operations).
77.60%
Oral Expression
The ability to communicate information and ideas in speaking so others will understand.
75.00%
Near Vision
The ability to see details at close range (within a few feet of the observer).
75.00%
Category Flexibility
The ability to generate or use different sets of rules for combining or grouping things in different ways.
70.00%


  • Working with Computers
    -- Using computers and computer systems (including hardware and software) to program, write software, set up functions, enter data, or process information.
  • Getting Information
    -- Observing, receiving, and otherwise obtaining information from all relevant sources.
  • Identifying Objects, Actions, and Events
    -- Identifying information by categorizing, estimating, recognizing differences or similarities, and detecting changes in circumstances or events.
  • Evaluating Information to Determine Compliance with Standards
    -- Using relevant information and individual judgment to determine whether events or processes comply with laws, regulations, or standards.
  • Processing Information
    -- Compiling, coding, categorizing, calculating, tabulating, auditing, or verifying information or data.
Other Activities


  • Support
    - Occupations that satisfy this work value offer supportive management that stands behind employees. Corresponding needs are Company Policies, Supervision: Human Relations and Supervision: Technical.
  • Working Conditions
    - Occupations that satisfy this work value offer job security and good working conditions. Corresponding needs are Activity, Compensation, Independence, Security, Variety and Working Conditions.



Tools

Desktop computers: Desktop computers;

Mainframe computers: Mainframe computers;

Network analyzers: Local area network LAN analyzers; Network analyzers;

Notebook computers: Notebook computers;

Protocol analyzers: Protocol analyzers;


Technology

Access software: Access management software; Citrix cloud computing software; IBM Tivoli Access Management TAM;

Administration software: Cisco Systems CiscoWorks;

Analytical or scientific software: SAS; The MathWorks MATLAB;

Application server software: Red Hat OpenShift; Red Hat WildFly; Oracle WebLogic Server; Docker; GitHub;

Authentication server software: IBM Tivoli Identity Management TIM; Diameter; Password management software; Remote authentication dial-in user service RADIUS software;

Backup or archival software: Veritas NetBackup; System and data disaster recovery software; Backup and archival software;

Business intelligence and data analysis software: Apache Spark; IBM Cognos Impromptu; MicroStrategy; Tableau; Qlik Tech QlikView; Oracle Business Intelligence Enterprise Edition;

Cloud-based data access and sharing software: Microsoft SharePoint;

Cloud-based management software: IBM WebSphere; Amazon Web Services AWS CloudFormation; Splunk Enterprise;

Cloud-based protection or security software: Qualys Cloud Platform;

Clustering software: VMware;

Communications server software: IBM Domino;

Configuration management software: Automated installation software; Chef; Puppet; Patch and update management software; Perforce Helix software;

Content workflow software: Atlassian JIRA;

Customer relationship management CRM software: Salesforce software;

Data base management system software: Relational database management software; Oracle PL/SQL; NoSQL; Teradata Database; Apache Pig; Apache Solr; Apache Hadoop; Apache Hive; Apache Cassandra; Amazon DynamoDB; Elasticsearch; MongoDB; MySQL;

Data base reporting software: Microsoft SQL Server Reporting Services SSRS; SAP Crystal Reports;

Data base user interface and query software: Structured query language SQL; Oracle Database; Oracle JDBC; Microsoft SQL Server; Microsoft Access; Blackboard software; Amazon Elastic Compute Cloud EC2; Amazon Redshift; Amazon Web Services AWS software;

Desktop communications software: Secure shell SSH software;

Development environment software: Ruby; Microsoft .NET Framework; National Instruments LabVIEW; Adobe ActionScript; Apache Kafka; Apache Maven; Apache Ant; Common business oriented language COBOL; C; Eclipse IDE; Microsoft Azure software; Microsoft PowerShell; Microsoft Visual Basic; Microsoft Visual Basic for Applications VBA; Microsoft Visual Basic Scripting Edition VBScript; Microsoft Visual Studio; Go; Integrated development environment IDE software;

Electronic mail software: IBM Notes; Microsoft Exchange;

Enterprise application integration software: Microsoft SQL Server Integration Services SSIS; Extensible markup language XML; Atlassian Bamboo; Oracle Fusion Middleware;

Enterprise resource planning ERP software: Oracle Hyperion; Oracle PeopleSoft; Oracle PeopleSoft Financials; Oracle Fusion Applications; Oracle JD Edwards EnterpriseOne; SAP software; Microsoft Dynamics;

Enterprise system management software: IBM Power Systems software;

Expert system software: Ansible software;

File versioning software: Apache Subversion SVN; Git; WinMerge;

Filesystem software: Computer forensic software;

Financial analysis software: Delphi Technology; Oracle E-Business Suite Financials;

Geographic information system: ESRI ArcGIS software; Geographic information system GIS software;

Human resources software: Human resource management software HRMS;

Industrial control software: Supervisory control and data acquisition SCADA software;

Information retrieval or search software: LexisNexis;

Instant messaging software: Blink;

Internet directory services software: Berkeley Internet Domain Name BIND; Domain name system DNS; Active directory software; Microsoft Active Directory; Network directory services software;

Internet protocol IP multimedia subsystem software: Voice over internet protocol VoIP system software;

License management software: License management software;

Medical software: Epic Systems;

Network monitoring software: Guidance Software EnCase Forensic; IBM QRadar SIEM; Integrity verification software; Keystroke monitoring software; Micro Focus OpenView; Nagios; AccessData FTK; Automated audit trail analysis software; Ethereal; Automated media tracking software; Wireshark; Tcpdump; Symantec Blue Coat Data Loss Prevention; Network intrusion prevention systems NIPS; Network, hardware, and software auditing software; Oracle Net Manager; Sniffer Investigator; Snort; Quest BigBrother;

Network security and virtual private network VPN equipment software: Palo Alto Networks Next-Generation Security Platform; Virtual private networking VPN software; Trend Micro TippingPoint; Firewall software; Cryptographic key management software; Juniper Networks NetScreen-Security Manager; IpFilter; IpTables; Imperva SecureSphere;

Network security or virtual private network VPN management software: Intrusion detection system IDS; Intrusion prevention system IPS; ISS RealSecure; HP Fortify; Websense Data Loss Prevention; Network security auditing software; Network and system vulnerability assessment software; Security incident management software;

Object or component oriented development software: Scala; Swift; Python; Oracle Java; Objective C; Perl; C#; C++; Advanced business application programming ABAP; Apache Groovy;

Object oriented data base management software: PostgreSQL;

Office suite software: Microsoft Office software;

Operating system software: Microsoft Windows; Microsoft Windows Server; Job control language JCL; Linux; Microsoft Hyper-V Server; Hewlett Packard HP-UX; KornShell; Apple macOS; Bash; Shell script; Red Hat Enterprise Linux; Oracle Solaris; Operating system software; Ubuntu; UNIX; UNIX Shell;

Point of sale POS software: Smart card management software;

Portal server software: Apache HTTP Server;

Presentation software: Microsoft PowerPoint;

Process mapping and design software: Microsoft Visio;

Program testing software: Selenium; System testing software; Kali Linux; Conformance and validation testing software;

Project management software: Atlassian Confluence; Microsoft Project; Microsoft Teams;

Requirements analysis and system architecture software: Unified modeling language UML;

Risk management data and analysis software: ArcSight Enterprise Threat and Risk Management;

Spreadsheet software: Microsoft Excel;

Storage networking software: Amazon Simple Storage Service S3;

Switch or router software: Border Gateway Protocol BGP;

Transaction security and virus protection software: Check Point Next Generation Secure Web Gateway; End-to-end encryption software; Anti-phishing software; Anti-spyware software; Anti-Trojan software; McAfee; McAfee VirusScan; Metasploit; Link encryption software; Honeypot; HP WebInspect; Virus scanning software; Symantec Endpoint Protection; Tenable Nessus; Stack smashing protection SSP software; Security risk assessment software; Secure internet filtering software; Program checksumming software; Ping Identity; Portswigger BurP Suite; Rapid7 Nexpose; Root kit detection software; Norton AntiVirus; NortonLifeLock cybersecurity software; Password cracker software; Penetration testing software;

Transaction server software: Customer information control system CICS;

Web page creation and editing software: Google Sites;

Web platform development software: Google Angular; Hypertext markup language HTML; LAMP Stack; JavaScript; JavaScript Object Notation JSON; Microsoft Active Server Pages ASP; Microsoft ASP.NET; Drupal; Django; Enterprise JavaBeans; Extensible hypertext markup language XHTML; AJAX; Apache Tomcat; Apache Struts; PHP; Oracle JavaServer Pages JSP; Node.js; Ruby on Rails; Spring Framework;

Word processing software: 3M Post-it App; Microsoft Word;


Related O*NET occupational titles for Information Security Analysts include:
  • 15-1299.07 Blockchain Engineers
  • 15-1241.00 Computer Network Architects
  • 15-1231.00 Computer Network Support Specialists
  • 15-1211.00 Computer Systems Analysts
  • 15-1299.08 Computer Systems Engineers/Architects
  • 15-1242.00 Database Administrators
  • 15-1299.06 Digital Forensics Analysts
  • 15-1299.05 Information Security Engineers
  • 15-1244.00 Network and Computer Systems Administrators
  • 15-1299.04 Penetration Testers


Sources of Additional Information
  • For more information about computer careers, visit: Association for Computing Machinery
  • Computing Research Association
  • IEEE Computer Society
  • For information about opportunities for women pursuing information technology careers, visit: National Center for Women & Information Technology
  • Information Security Analysts

  • Contact Texas Workforce Commission
    Labor Market and Career Information  |  101 E. 15th Street, Annex Room 0252  |  Austin, Texas 78778
    Official Website  |  1-800-822-PLAN (7526)  |  512.936.3200

    ** The information in this report may be derived from many sources like O*NET, BLS (Bureau of Labor Statistics), OOH (Occupational Outlook Handbook), and Career One Stop.