What Is an Information Security Analyst?
Written by:
University of Tulsa
• Jan 15, 2026
Successful cyber attacks are devastating on many levels. First, they negatively impact individuals. Data breaches leaked some 422.61 million data records in the third quarter of 2024, compromising millions of individuals, according to Statista. They also cause significant financial damage to organizations. The IBM Cost of a Data Breach Report 2025 lists the global average cost of a data breach at $4.4 million. These statistics underscore the importance of effective cybersecurity.
Information security analysts use their knowledge and skills to develop cybersecurity strategies that stay ahead of cybercriminals’ ever-evolving tactics. The career path is rewarding and worth considering for anyone pursuing an advanced cybersecurity degree. However, before deciding on a career, it’s important to understand what an information security analyst does as well as the typical steps to becoming one.
What Does an Information Security Analyst Do?
Information security analysts oversee an organization’s computer systems and network security. They implement data encryption and firewall programs to protect sensitive data and monitor networks to identify potential breaches. They also report their findings on both attempted and successful attacks. When breaches do occur, they investigate to identify the type of hacker involved, tactics used, and extent of the breach.
An information security analyst mostly focuses on proactive tasks. For example, they typically develop an organization’s best practice security standards. They also monitor emerging security enhancements and innovations and recommend ways to apply them to existing plans. Additionally, they work with an organization’s employees to install new security programs, answer questions on security procedures, and provide information about new hacking techniques.
An information security analyst also helps with an organization’s disaster recovery plan, which outlines procedures for resuming operations after an unplanned event, from extreme weather to a data breach. Their work helps minimize operational gaps, mitigate the loss of functionality, and mitigate data vulnerability and loss.
How to Become an Information Security Analyst
Information security analysts protect organizational assets, customers, and the bottom line. To prepare for that responsibility, aspiring analysts can take several steps to learn the right skills.
Education
Employers typically require applicants for information security analyst positions to have at minimum a bachelor’s degree, either directly related to computer science or in a related field, such as math or engineering.
While not necessarily required, an advanced degree, such as a master’s degree in cybersecurity, can help candidates stand out to employers. Advanced study deepens technical knowledge in cybersecurity and can also cultivate skills in leadership and management. These skills help graduates guide corporations through preparation for, defense against, and reaction to cybersecurity incidents.
Experience
Aspiring information security analysts should gain experience in other related roles. Employers typically seek out candidates who’ve worked in fields such as systems administration, information security, and information technology (IT). Success in these fields demonstrates an ability to transform knowledge into actionable applications.
Certification
Employers often prefer to hire individuals with certifications in information security that demonstrate their cybersecurity knowledge and skills. Certifications such as CompTIA Security+ show broad expertise in the field, while others show specialized qualifications in a specific area. For example, the Certified Ethical Hacker (CEH) certification can demonstrate expertise in internally hacking an organization’s systems to detect vulnerabilities.
Information Security Analyst Salary and Job Outlook
The median annual salary for information security analysts was $124,910 in 2024, according to the U.S. Bureau of Labor Statistics (BLS). Factors that can affect salary include education level, experience, and location.
Demand is significant, with the BLS projecting a 33% increase in positions between 2023 and 2033. This is substantially higher than the 4% growth projected for the labor market as a whole.
Contribute to a Bright and Secure Future
The mission of information security analysts remains constant even as technology evolves. By playing a vital role in securing data and protecting against cyber attacks, these professionals help organizations remain focused on their growth and stability with minimal fear of being compromised.
The University of Tulsa’s online Master of Science (M.S.) in Cyber Security degree prepares graduates to succeed in this crucial field — without requiring previous IT experience. Our online program is designed to help you deepen your knowledge in essential cybersecurity topics through coursework and hands-on activities with advanced IT tools, offering a thorough understanding of how to develop optimal protection strategies.
The degree’s technical and leadership tracks allow you to focus on your specific professional goals, focusing your skills for the career you want. The coursework prepares you for relevant certifications, such as CompTIA+ Security+/Pentest+, Certified Information Systems Security Professional (CISSP), and Offensive Security Certified Professional (OSCP/PEN-200). Graduates can pursue careers in information security, as well as in other areas of cybersecurity, IT, and tech leadership.
Find out how The University of Tulsa can help you prepare for an exciting professional future as an information security analyst.
Recommended Readings
Cybersecurity vs. Data Science: Differences Explained
Is Cybersecurity in Demand? 8 Reasons Demand Keeps Rising
What Are the 8 Types of Cybersecurity?
Sources:
Cisco, Cisco Certificate in Ethical Hacking
IBM, Cost of a Data Breach Report 2025
Indeed, How to Become an Information Security Analyst (Plus Salary)
Indeed, Information Security Analyst Job Description: Top Duties and Qualifications
Statista, Data Breaches Worldwide — Statistics & Facts
TechTarget, “What Is a Disaster Recovery Plan (DRP)?”
U.S. Bureau of Labor Statistics, Information Security Analysts