Information Security Analysts

AUTOMATION RISK
CALCULATED
47%
risk level
POLLING
36%
Based on 474 votes
LABOR DEMAND
GROWTH
34.7%
by 2031
WAGES
$112,000
or $53.84 hourly
VOLUME
163,690
as of 2022
SUMMARY
JOB SCORE
7.4/10

Automation risk

47% (Moderate Risk)

Moderate Risk (41-60%): Occupations with a moderate risk of automation usually involve routine tasks but still require some human judgment and interaction.

More information on what this score is, and how it is calculated is available here.

Some quite important qualities of the job are difficult to automate:

  • Originality

User poll

36% chance of full automation within the next two decades

Our visitors have voted that there is a small chance this occupation will be replaced. This assessment is further supported by the calculated automation risk level, which estimates 47% chance of automation.

What do you think the risk of automation is?

What is the likelihood that this occupation will be replaced by robots or AI in the next 20 years?






Growth

Very fast growth relative to other professions

The number of 'Information Security Analysts' job openings is expected to rise 34.7% by 2031

Total employment, and estimated job openings

* Data from the Bureau of Labor Statistics for the period between 2021 and 2031.
Updated projections are due Sep 2023.

Wages

Very high paid relative to other professions

In 2022, the median annual wage for 'Information Security Analysts' was $112,000, or $53.84 per hour

'Information Security Analysts' were paid 141.8% higher than the national median wage, which stood at $46,310

Wages over time

* Data from the Bureau of Labor Statistics

Volume

Greater range of job opportunities compared to other professions

As of 2022 there were 163,690 people employed as Information Security Analysts within the United States.

This represents around 0.11% of the employed workforce across the country.

Put another way, around 1 in 903 people are employed as Information Security Analysts.

Job description

Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. Assess system vulnerabilities for security risks and propose and implement risk mitigation strategies. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses.

SOC Code: 15-1212.00

Resources

If you're thinking of starting a new career, or looking to change jobs, we've created a handy job search tool which might just help you land that perfect new role.

Search jobs in your local area

Comments

Jack (Small chance) says
Social engineering risks are highly unlikely to be detected by AI.
Feb 10, 2022 at 11:14 PM
James (Small chance) says
Unlikely. Security analysis often have to think outside the box to find novel vulnerabilities.
Jan 31, 2022 at 04:42 AM
Richard P (Likely) says
Could be disrupted by Quantum computers
Jan 17, 2021 at 04:22 PM
FD says
New regulations will force the software developing companies to create less vulnerabilities in products (at the source.) Hardware vendors will similarly have to sell networked devices with secure settings programmed in by default.

This will increase the ability of automated systems to detect any remaining vulnerabilities, but will not completely remove the need for technicians to maintain, remediate, and upgrade the systems. There will still be a need to touch the hardware. Depending on individual situation, some companies will use more of AI tech than the others. We can already see something similar in the engineering, accounting, and law practice, where paralegals and drafters have not been completely replaced by software. Sole practitioners might use automation more extensively than the large corporations, but there will be a legal requirement for a human audit.

In addition, location-independent digital nomads who train themselves to use the automation tools could do a lot of accurate work in a short amount of time, as independent consultants and freelancers, and do business with multiple clients.

Making the choice to transition from repetitive and tedious manual work to automation, will be akin to transitioning from flintstones to nuclear power. Nuclear power still needs humans, and so will information security solutions.
Dec 23, 2020 at 05:42 AM
Fakiha (Small chance) says
I believe that is is less likely because mostly automatically finding vulnerabilities may be performed by AI but it will be the security analyst to enable computer do it, help it learn by giving feedback, as the result may not always be right. AI will help make task easier and fast for security analyst
Mar 09, 2020 at 07:14 AM
Michael (Small chance) says
there are some areas such as malware detection and IPS , IDS that will be fully automated , but others like policy and social engineering are very hard to .
Jan 30, 2020 at 03:22 PM
frankie (Highly likely) says
Automated penetration testing
Jan 19, 2020 at 02:15 PM

Leave a reply about this occupation

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

People also viewed

Computer Programmers
Lawyers
Graphic Designers
Accountants and Auditors
Mechanical Engineers

Have your say

Elizabeth Annette Wolter on Writers and Authors

Someone who is passionate about storytelling on Writers and Authors

Vk on Computer Programmers

PeopleHereAreReallyDumb on Computer Programmers

Dave Leininger on Database Architects