FIND PERSONALIZED JOBS
Sign up to Zippia and discover your career options with your personalized career search.
×
FIND
PERSONALIZED JOBS

CONTENT HAS
BEEN UNLOCKED
Close this window to view unlocked content
or
find interesting jobs in

Log In

Log In to Save

Sign Up to Save

Sign Up to Dismiss

Sign Up

SIGN UP TO UNLOCK CONTENT

or

The email and password you specified are invalid. Please, try again.

Email and password are mandatory

Forgot Password?

Don't have an account? Sign Up

reset password

Enter your email address and we will send you a link to reset your password.

Back to Log In

Log In

Log In to Save

Sign Up to Save

Sign Up to Dismiss

Sign up to save the job and get personalized job recommendations.

Sign up to dismiss the job and get personalized job recommendations.

or

The email and password you specified are invalid. Please, try again.

Email and password are mandatory

Already have an account? Log in

reset password

Enter your email address and we will send you a link to reset your password.

Back to Log In

Company Saved

Answer a few questions and view jobs at that match your preferences.

Where do you want to work?

Job Saved

See your Saved Jobs now

or

find more interesting jobs in

Job Dismissed

Find better matching jobs in

Become An Information Security Consultant

Where do you want to work?

To get started, tell us where you'd like to work.
Sorry, we can't find that. Please try a different city or state.

Working As An Information Security Consultant

  • Interacting With Computers
  • Getting Information
  • Analyzing Data or Information
  • Evaluating Information to Determine Compliance with Standards
  • Communicating with Supervisors, Peers, or Subordinates
  • Deal with People

  • Mostly Sitting

  • $96,813

    Average Salary

What Does An Information Security Consultant Do

Information security analysts plan and carry out security measures to protect an organization’s computer networks and systems. Their responsibilities are continually expanding as the number of cyberattacks increases.

Duties

Information security analysts typically do the following:

  • Monitor their organization’s networks for security breaches and investigate a violation when one occurs
  • Install and use software, such as firewalls and data encryption programs, to protect sensitive information
  • Prepare reports that document security breaches and the extent of the damage caused by the breaches
  • Conduct penetration testing, which is when analysts simulate attacks to look for vulnerabilities in their systems before they can be exploited
  • Research the latest information technology (IT) security trends
  • Help plan and carry out an organization’s way of handling security
  • Develop security standards and best practices for their organization
  • Recommend security enhancements to management or senior IT staff
  • Help computer users when they need to install or learn about new security products and procedures

Information security analysts must continually adapt to stay a step ahead of cyberattackers. They must stay up to date on the latest methods attackers are using to infiltrate computer systems and on IT security. Analysts need to research new security technology to decide what will most effectively protect their organization. This may involve attending cybersecurity conferences to hear firsthand accounts of other professionals who have experienced new types of attacks.

IT security analysts are heavily involved with creating their organization’s disaster recovery plan, a procedure that IT employees follow in case of emergency. These plans allow for the continued operation of an organization’s IT department. It includes preventive measures such as regularly copying and transferring data to an offsite location. It also involves plans to restore proper IT functioning after a disaster. Analysts continually test the steps in their recovery plans.

Because information security is important, these workers usually report directly to upper management. Many information security analysts work with an organization’s computer and information systems manager or chief technology officer (CTO) to design security or disaster recovery systems.

Show More

Show Less

How To Become An Information Security Consultant

Most information security analyst positions require a bachelor’s degree in a computer-related field. Employers usually prefer analysts to have experience in a related occupation.

Education

Information security analysts usually need at least a bachelor’s degree in computer science, programming, or a related field. As information security continues to develop as a career field, many schools are responding with information security programs for prospective job seekers. These programs may become a common path for entry into the occupation. Currently, a well-rounded computer education is preferred.

Employers of information security analysts sometimes prefer applicants who have a Master's of Business Administration (MBA) in information systems. Programs offering the MBA in information systems generally require 2 years of study beyond the undergraduate level and include both business and computer-related courses.

Work Experience in a Related Occupation

Information security analysts generally need to have previous experience in a related occupation. Many analysts have experience in an information technology department, often as a network or systems administrator. Some employers look for people who have already worked in fields related to the one in which they are hiring. For example, if the job opening is in database security, they may look for a database administrator. If they are hiring in systems security, a computer systems analyst may be an ideal candidate.

Licenses, Certifications, and Registrations

There are a number of information security certifications available, and many employers prefer job candidates to have one. Certification validates the knowledge and best practices required from information security analysts. Some are general information security certificates, such as the Certified Information Systems Security Professional, and others have a narrow focus, such as penetration testing or systems auditing.

Advancement

Information security analysts can advance to become chief security officers or another type of computer and information systems manager.

Important Qualities

Analytical skills. Information security analysts must carefully study computer systems and networks and assess risks to determine how security policies and protocols can be improved.

Detail oriented. Because cyberattacks can be difficult to detect, information security analysts pay careful attention to their computer systems and watch for minor changes in performance.

Ingenuity. Information security analysts anticipate information security risks and implement new ways to protect their organizations’ computer systems and networks.

Problem-solving skills. Information security analysts respond to security alerts and uncover and fix flaws in computer systems and networks.

Show More

Show Less

Do you work as an Information Security Consultant?

Information Security Consultant Jobs

NO RESULTS

Aw snap, no jobs found.

Add To My Jobs

Information Security Consultant Career Paths

Information Security Consultant
Senior Security Analyst Security Manager Security Director
Chief Security Officer
11 Yearsyrs
Information Security Officer Vice President Of Information Technology Chief Information Officer
Deputy Chief Information Officer
12 Yearsyrs
Senior Information Security Consultant Information Security Manager Information Technology Director
Director Information Technology Infrastructure
13 Yearsyrs
Senior Security Consultant Principal Consultant Senior Information Technology Manager
Director Of Information Services
9 Yearsyrs
Information Security Manager Information Technology Security Manager Information Technology Director
Director Of Information Technology Security
12 Yearsyrs
Security Architect Solutions Architect Information Technology Director
Director Of Infrastructure Operations
13 Yearsyrs
Information Assurance Engineer Senior Systems Engineer Manager, Systems Engineering
Director Of Systems Engineering
12 Yearsyrs
Information Security Engineer Senior Security Engineer Security Manager
Director, Corporate Security
11 Yearsyrs
Information Security Engineer Security Engineer Senior Network Engineer
Director, Network Operations
10 Yearsyrs
Senior Consultant Project Manager Information Technology Project Manager
Information Technology Infrastructure Manager
11 Yearsyrs
Senior Consultant Information Technology Manager
Information Technology Operations Manager
9 Yearsyrs
Senior Information Security Analyst Project Manager Information Technology Consultant
Information Technology Systems Manager
8 Yearsyrs
Senior Security Consultant Security Manager Information Technology Manager
Information Technology Technical Services Manager
10 Yearsyrs
Security Architect Architect Project Manager
Infrastructure Project Manager
11 Yearsyrs
Subject Matter Expert Operations Team Leader Security Supervisor
Security Operations Manager
7 Yearsyrs
Information Security Manager Senior Manager Information Technology Director
Senior Director Of Information & Technology
13 Yearsyrs
Information Security Officer Chief Information Officer Vice President, Business Development
Vice President Of Information Technology
12 Yearsyrs
Show More

Do you work as an Information Security Consultant?

Help others decide if this is a good career for them

Average Length of Employment
Security Architect 2.3 years
Security Engineer 2.2 years
Top Employers Before
Consultant 7.6%
Manager 3.2%
Top Employers After
Consultant 5.4%

Do you work as an Information Security Consultant?

Information Security Consultant Demographics

Gender

Male

65.6%

Female

30.6%

Unknown

3.7%
Ethnicity

White

58.4%

Hispanic or Latino

12.9%

Asian

12.7%

Black or African American

12.2%

Unknown

3.8%
Show More
Foreign Languages Spoken

Spanish

34.8%

Chinese

13.0%

French

8.7%

Mandarin

8.7%

Arabic

8.7%

Portuguese

4.3%

Cantonese

4.3%

Japanese

4.3%

Teochew

4.3%

Thai

4.3%

Italian

4.3%
Show More

Information Security Consultant Education

Schools

University of Phoenix

14.8%

George Mason University

8.3%

University of Maryland - University College

6.5%

Capella University

6.5%

Strayer University

5.6%

University of Texas at Austin

5.6%

Western Governors University

4.6%

James Madison University

4.6%

Johns Hopkins University

4.6%

Florida State University

4.6%

University of South Florida

3.7%

Webster University

3.7%

Rochester Institute of Technology

3.7%

University of Houston

3.7%

Colorado Technical University

3.7%

Southern New Hampshire University

3.7%

Cleveland State University

3.7%

University of Connecticut

2.8%

University of Washington

2.8%

Temple University

2.8%
Show More
Majors

Business

17.9%

Computer Science

11.4%

Information Technology

11.1%

Computer Systems Security

11.1%

Computer Information Systems

6.8%

Criminal Justice

4.8%

Electrical Engineering

4.6%

Management

4.6%

Information Systems

3.7%

Management Information Systems

3.1%

Accounting

3.1%

Computer Networking

2.6%

Communication

2.3%

Marketing

2.3%

Computer Engineering

2.0%

Finance

2.0%

Law

2.0%

Electrical Engineering Technology

1.7%

Philosophy

1.4%

Economics

1.4%
Show More
Degrees

Bachelors

39.9%

Masters

30.9%

Other

16.4%

Associate

4.4%

Doctorate

3.8%

Certificate

3.0%

Diploma

1.6%
Show More

Job type you want
Full Time
Part Time
Internship
Temporary

Real Information Security Consultant Salaries

Job Title Company Location Start Date Salary
Information Security Research Senior Consultant Secureworks, Inc. Pittsburgh, PA Sep 17, 2016 $150,000
Information Security Research Senior Consultant Secureworks, Inc. Pittsburgh, PA Mar 29, 2016 $150,000
Consultant-Information Security Aujas Networks Private Limited Pleasanton, CA Jul 11, 2016 $130,500
Archer/Information Security Consultant Accelerated Innovators, Inc. Westbury, NY Feb 17, 2016 $126,000
Information Security Consultant SMOJ Enterprises, LLC Houston, TX Nov 03, 2014 $120,000
Information Security Research Consultant Secureworks, Inc. Pittsburgh, PA Mar 01, 2014 $120,000
Information Security Consultant IBM India Private Limited Cambridge, MA Jul 27, 2016 $108,938
Information Security Consultant II Ajilon LLC D/B/A Ajilon Consulting Washington, DC Aug 31, 2010 $105,468
Information Security Consultant Accelerated Innovators, Inc. New York, NY Oct 27, 2014 $105,000
Consultant-Information Security Aujas Networks Private Limited NJ May 29, 2015 $100,000
Consultant-Information Security Aujas Networks Private Limited Monterey Park, CA May 29, 2015 $100,000
Information Security Consultant Hotskills, Inc. Blacksburg, VA Jan 31, 2010 $100,000
Consultant-Network and Information Security Terremark North America, LLC Lowell, MA Sep 12, 2014 $95,000
Consultant-Information Security Aujas Networks Private Limited Union City, CA Oct 10, 2016 $95,000
Consultant-Information Security Aujas Networks Private Limited Newark, DE Sep 05, 2016 $95,000
Senor Consultant, IT Security Audit & Compliance Coalfire Systems, Inc. Dallas, TX Sep 09, 2013 $95,000
Information Security Consultant IBM India Private Limited Cambridge, MA Oct 01, 2014 $91,416
Information Security Consultant IBM India Private Limited Cambridge, MA Aug 11, 2013 $91,416
Information Security Consultant Ioactive, Inc. Seattle, WA Oct 01, 2014 $89,000
Information Security Consultant IBM India Private Limited Cambridge, MA Jul 23, 2013 $80,446
Information Consultant Waitex International Co. Ltd. New York, NY Aug 09, 2016 $80,266
Information Security Consultant TSYS Columbus, GA May 30, 2011 $80,000 -
$100,000
Information Security Consultant Enterprise Risk Management, Inc. Coral Gables, FL Aug 11, 2011 $80,000
Consultant-Information Security Aujas Networks Private Limited Monterey Park, CA Jun 30, 2015 $80,000
Consultant-Information Security Aujas Networks Private Limited Monterey Park, CA Jul 27, 2015 $80,000
Market Information Consultant Bank of America N.A. Phoenix, AZ Aug 29, 2011 $80,000 -
$100,000

No Results

To get more results, try adjusting your search by changing your filters.

Show More

How Would You Rate The Salary Of an Information Security Consultant?

Have you worked as an Information Security Consultant? Help other job seekers by rating your experience as an Information Security Consultant.

Top Skills for An Information Security Consultant

Show More

  1. Network Security
  2. Risk Management
  3. Compliance
You can check out examples of real life uses of top skills on resumes here:
  • Provided technical support and consultation for enhancement of and change to network security configuration.
  • Designed IT Division strategies for risk management identify and manage risk impacting business.
  • Provided consultations, training, or other initiatives intended to bring business into compliance with regulatory or corporate requirements.
  • Perform risk assessment/impact analysis and collaborate with application/system/data owners and other key stakeholders to design and document security processes and procedures.
  • Conducted incident response and performed vulnerability assessments for corporate, government and non-profit clients.

How Would You Rate Working As an Information Security Consultant?

Are you working as an Information Security Consultant? Help us rate Information Security Consultant as a Career.

Rank:

Average Salary:

Top 10 Best States for Information Security Consultants

  1. New Jersey
  2. Rhode Island
  3. Virginia
  4. District of Columbia
  5. Maryland
  6. North Carolina
  7. New York
  8. Connecticut
  9. Delaware
  10. California
  • (688 jobs)
  • (110 jobs)
  • (1,735 jobs)
  • (449 jobs)
  • (771 jobs)
  • (719 jobs)
  • (1,010 jobs)
  • (236 jobs)
  • (62 jobs)
  • (2,862 jobs)

Top Information Security Consultant Employers

Show More

Jobs From Top Information Security Consultant Employers

Information Security Consultant Videos

Become SAP SECURITY consultant

Cyber Security Jobs

Defining a real Security Consultant

Related to your recently viewed content