Where do you want to work?
Deal with People
Most information security analyst positions require a bachelor’s degree in a computer-related field. Employers usually prefer analysts to have experience in a related occupation.Education
Information security analysts usually need at least a bachelor’s degree in computer science, programming, or a related field. As information security continues to develop as a career field, many schools are responding with information security programs for prospective job seekers. These programs may become a common path for entry into the occupation. Currently, a well-rounded computer education is preferred.
Employers of information security analysts sometimes prefer applicants who have a Master's of Business Administration (MBA) in information systems. Programs offering the MBA in information systems generally require 2 years of study beyond the undergraduate level and include both business and computer-related courses.Work Experience in a Related Occupation
Information security analysts generally need to have previous experience in a related occupation. Many analysts have experience in an information technology department, often as a network or systems administrator. Some employers look for people who have already worked in fields related to the one in which they are hiring. For example, if the job opening is in database security, they may look for a database administrator. If they are hiring in systems security, a computer systems analyst may be an ideal candidate.Licenses, Certifications, and Registrations
There are a number of information security certifications available, and many employers prefer job candidates to have one. Certification validates the knowledge and best practices required from information security analysts. Some are general information security certificates, such as the Certified Information Systems Security Professional, and others have a narrow focus, such as penetration testing or systems auditing.Advancement
Information security analysts can advance to become chief security officers or another type of computer and information systems manager.Important Qualities
Analytical skills. Information security analysts must carefully study computer systems and networks and assess risks to determine how security policies and protocols can be improved.
Detail oriented. Because cyberattacks can be difficult to detect, information security analysts pay careful attention to their computer systems and watch for minor changes in performance.
Ingenuity. Information security analysts anticipate information security risks and implement new ways to protect their organizations’ computer systems and networks.
Problem-solving skills. Information security analysts respond to security alerts and uncover and fix flaws in computer systems and networks.
Average Length of Employment
Top Careers Before Security Architect
Top Careers After Security Architect
Hispanic or Latino8.6%
Black or African American1.1%
Unfortunately we don’t have enough data for this section.
University of Maryland - University College7.4%
James Madison University7.4%
University of Phoenix6.3%
University of Illinois at Chicago5.3%
More Tech Institute5.3%
Western Governors University4.2%
Texas A&M University4.2%
George Washington University4.2%
Carnegie Mellon University4.2%
Wright State University3.2%
University of Nebraska at Omaha3.2%
Unfortunately we don’t have enough data for this section.
|Job Title||Company||Location||Start Date||Salary|
|Security Architect Engineer||Software Guidance & Assistance, Inc.||Jersey City, NJ||Nov 20, 2016||$225,396|
|Security Architect Engineer||Software Guidance & Assistance, Inc.||Jersey City, NJ||Jul 27, 2015||$204,526|
|Cyber Security Principal Security Architect||First Data Technologies, Inc.||Jersey City, NJ||Jun 02, 2015||$200,000|
|Hardware Security Architect||Verifone, Inc.||San Diego, CA||Sep 03, 2016||$185,000|
|Chief Security Architect||Inovant LLC||Foster City, CA||Oct 30, 2015||$180,000 -
|Security Architect||TIVO, Inc.||San Jose, CA||Oct 19, 2016||$180,000|
|Security Architect||TIVO, Inc.||San Jose, CA||Sep 11, 2015||$180,000|
|Information Security Architect||Wyndham Worldwide Operations Inc.||Parsippany-Troy Hills, NJ||Jun 29, 2015||$178,360 -
|Application Security Architect||On Deck Capital, Inc.||New York, NY||Apr 17, 2016||$170,000|
|Application Security Architect||Ebsco Publishing||Ipswich, MA||Mar 23, 2015||$170,000|
|Application Security Architect||On Deck Capital Inc.||New York, NY||Oct 05, 2015||$170,000|
|Application Security Architect||Ringcentral, Inc.||Belmont, CA||Dec 23, 2015||$165,000|
|Hardware Security Architect||Verifone, Inc.||San Jose, CA||Mar 19, 2015||$165,000 -
|Chief Security Architect||Inovant, LLC||Foster City, CA||May 16, 2016||$163,462 -
|Security Architect||JASK Labs Inc.||Palo Alto, CA||Jan 12, 2015||$145,000|
|Security Architect||Air Worldwide||Boston, MA||Apr 02, 2016||$140,000|
|Security Architect||Air Worldwide Corp.||Boston, MA||Jun 16, 2015||$140,000|
|Security Architect||Air Worldwide Corp.||Boston, MA||Apr 15, 2015||$140,000|
|Enterprise Security Architect||Align Technology, Inc.||San Jose, CA||Jan 08, 2016||$140,000|
|Security Architect||Air Worldwide Corp.||Boston, MA||Dec 09, 2016||$140,000|
|Lead Security Architect||Here North America, LLC||Burlington, MA||Jun 09, 2016||$137,550 -
|Product Security Architect||Autodesk, Inc.||San Francisco, CA||Sep 12, 2015||$134,472 -
|Information Security Architect||XO Group Inc.||Austin, TX||Oct 10, 2016||$115,000|
|Security Architect||Verimatrix, Inc.||San Diego, CA||Aug 01, 2015||$115,000|
|Enterprise Security Architect II||Akamai Technologies, Inc.||Santa Clara, CA||Jun 07, 2016||$111,900 -
|Security Architect||Crown Equipment Corporation||New Bremen, OH||Jul 25, 2016||$111,010 -
|Security Architect||Aurionpro Solutions, Inc.||Edison, NJ||Mar 16, 2015||$110,406 -
|Hadoop Security Architect/Administration||RCG Global Services, Inc.||Schaumburg, IL||Sep 23, 2015||$110,000|
|Security Architect||Blockstream Corporation||San Francisco, CA||Aug 20, 2016||$110,000|
To get more results, try adjusting your search by changing your filters.
Effective Security Architecture as a Foundation for Risk Reduction
The truth about being an architect
2009-09-16 CERIAS - From Security Architecture to Implementation