Information Security Analysts




Want this summary on your site? Embed code:
Automation risk
Moderate Risk (41-60%): Occupations with a moderate risk of automation usually involve routine tasks but still require some human judgment and interaction.
More information on what this score is, and how it is calculated is available here.
User poll
Our visitors have voted there's a low chance this occupation will be automated. This assessment is further supported by the calculated automation risk level, which estimates 47% chance of automation.
What do you think the risk of automation is?
What is the likelihood that Information Security Analysts will be replaced by robots or artificial intelligence within the next 20 years?
Sentiment
The following graph(s) are included wherever there is a substantial amount of votes to render meaningful data. These visual representations display user poll results over time, providing a significant indication of sentiment trends.
Sentiment over time (yearly)
Growth
The number of 'Information Security Analysts' job openings is expected to rise 34.7% by 2031
Total employment, and estimated job openings
Updated projections are due 09-2023.
Wages
In 2022, the median annual wage for 'Information Security Analysts' was $112,000, or $53 per hour
'Information Security Analysts' were paid 141.8% higher than the national median wage, which stood at $46,310
Wages over time
Volume
As of 2022 there were 163,690 people employed as 'Information Security Analysts' within the United States.
This represents around 0.11% of the employed workforce across the country
Put another way, around 1 in 903 people are employed as 'Information Security Analysts'.
Job description
Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. Assess system vulnerabilities for security risks and propose and implement risk mitigation strategies. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses.
SOC Code: 15-1212.00
Resources
If you're thinking of starting a new career, or looking to change jobs, we've created a handy job search tool which might just help you land that perfect new role.
People also viewed
Comments
This will increase the ability of automated systems to detect any remaining vulnerabilities, but will not completely remove the need for technicians to maintain, remediate, and upgrade the systems. There will still be a need to touch the hardware. Depending on individual situation, some companies will use more of AI tech than the others. We can already see something similar in the engineering, accounting, and law practice, where paralegals and drafters have not been completely replaced by software. Sole practitioners might use automation more extensively than the large corporations, but there will be a legal requirement for a human audit.
In addition, location-independent digital nomads who train themselves to use the automation tools could do a lot of accurate work in a short amount of time, as independent consultants and freelancers, and do business with multiple clients.
Making the choice to transition from repetitive and tedious manual work to automation, will be akin to transitioning from flintstones to nuclear power. Nuclear power still needs humans, and so will information security solutions.
Leave a reply about this occupation