Everything You Need to Know About Becoming a Cyber Security Analyst

illustration of robbers breaking into a laptop

For someone who’s interested in technology, cyber security probably sounds like an appealing career focus. The much-faster-than-average projected employment growth and above average earning potential as reported by the Bureau of Labor Statistics (BLS) is enough to catch your attention.1

But when you add in the fact that your work would revolve around building IT defense systems and safeguarding valuable information from some of the world’s worst cyber criminals, it’s hard not to get excited about the cyber security analyst job description.

That being said, you may need some clarification on the details. Even if this career path checks a lot of important boxes, you’ll want to know as much as possible about what you’re getting into and what it takes to become a cyber security analyst.

We dove into the data and secured insider insight from a seasoned expert to help you understand everything you need to know about cyber security analyst jobs and how to get established in this growing field.

Why is cyber security so important?

If you’ve been at all invested in the world of technology, you know cyber security is a big deal. Even the general population can hardly miss the headlines surrounding cybercrime and data breaches. But shockingly, many organizations and individuals are very slow on the uptake when it comes to protecting their own digital security.

“I was surprised at the level of apathy about cyber security decision-makers,” says Greg Scott, author and cyber security expert. “Even after all the headlines, people still say they aren’t carrying national security secrets, and that nobody cares enough about them to attack them.”

In reality, there are loads of ways a hacker can utilize and monetize even the most innocuous information. Through identity theft, intercepting your tax refund or even stealing your health insurance for medical coverage, cyber criminals come up with all sorts of creative ways to profit from information most people don’t take sufficient lengths to protect. This makes everyone a target.

“The public cyber security education gap is larger than the Grand Canyon,” Scott says. “It’s a huge opportunity and a huge threat.” He says one of his favorite parts of working in cyber security is seeing people’s reactions when they realize how vulnerable they are without taking precautions. “The most rewarding times are when the message finally gets through and people’s eyes light up.”

What does a cyber security analyst do?

Cyber security analysts (also called information security analysts) plan and carry out security measures to protect a company’s computer networks and systems, according to the BLS.1 They keep constant tabs on threats and monitor their organization’s networks for any breaches in security.

A typical cyber security analyst job description includes installing firewall and encryption tools, reporting breaches or weak spots, researching IT trends, educating the rest of the company on security—and even simulating security attacks to find potential vulnerabilities.

Cyber security analysts will also plan for trouble, creating contingency plans that the company will implement in case of a successful attack. Since cyber attackers are constantly using new tools and strategies, cyber security analysts need to stay informed about the weapons out there to mount a strong defense.

Additionally, information security professionals may assist in spreading the word and educating members of an organization about security risks and best practices, which makes perfect sense. Even the most technically sound and secure systems can be undermined by a user with the right access level acting foolishly.

Cyber security analyst salary and job outlook

With the prevalence of threats and breaches out there today, it’s no surprise that cyber security jobs are on the rise. What might surprise you is just how fast these opportunities are projected to grow. The BLS projects cyber security analyst jobs to grow 31 percent through 2029, which is more than seven times faster than the average for all occupations!1

This demand translates well when it comes to a typical cyber security analyst salary. The BLS states the median annual salary for these professionals in 2019 was $99,730.1

Important skills for cyber security analysts

Cyber security analysts need a healthy mix of hard and soft skills. We used real-time job analysis software to examine more than 170,000 cyber security analyst jobs posted over the past year.2 This data helped us determine what skills employers are seeking in candidates.

Top technical skills for cyber security analysts2

  • Information systems
  • Linux
  • Network security
  • Python®
  • Project management
  • Information assurance
  • Cryptography
  • NIST Cybersecurity Framework
  • Vulnerability assessment
  • Penetration testing

Top transferable skills for cyber security analysts2

  • Communication
  • Teamwork
  • Research
  • Planning
  • Problem solving
  • Writing
  • Troubleshooting
  • Attention to detail
  • Microsoft Office®
  • Organization

Scott emphasizes that no matter what you bring to the table, acquiring new skills will be a constant in your cyber security analyst career. “Of course your technical know-how is important. If you want success in your career, you’ll learn how to learn for a living,” he says. “But your soft skills—especially your ability to communicate—are equally as important.”

How to become a cyber security analyst

If you’re liking what you’re hearing about the cyber security job description, projected growth and earning potential, the next logical question is “How do you become a cyber security analyst?”

Given that this specialized area of information technology is relatively new, the path to working in this field isn’t quite as clear cut as others. Many information security professionals in the field today started out in more generalized IT roles and made a transition. This route is still pretty common—it makes sense for cyber security analysts to have a strong background in the design and operations of computer networks and systems.

Professionals in this field usually have at least a bachelor’s degree in Cyber Security or a related field, according to the BLS.1 Our analysis of cyber security analyst jobs supports this claim, with 85 percent of employers seeking candidates with a bachelor’s degree.3

Aspiring analysts should know that there are also plenty of information security certifications out there that can boost your credibility to potential employers. Information security certification, like the Certified Information Systems Auditor® (CISA) and CompTIA® Cybersecurity Analyst (CySA+) are excellent options for verifying your cyber security knowledge.

Analyzing your cyber security potential

Do you think this career matches up with what you are looking for? Cyber security analysts are certainly sought after in the Wild West of today’s digital landscape. If you could see yourself delving into the nuts and bolts of protecting information systems, or if you are the kind of person who could become passionate about the best defenses out there, then this might be the perfect choice for you.

But like any big change, embarking on a cyber security analyst career requires some investment and consideration. Take the next step in your research by checking out our article, “Is a Cyber Security Degree Worth It? The Facts You Can't Ignore.”

1Bureau of Labor Statistics, U.S. Department of Labor, Occupational Outlook Handbook, [career information accessed October 2020] www.bls.gov/ooh/. Salary data represents national, averaged earnings for the occupations listed and includes workers at all levels of education and experience. This data does not represent starting salaries and employment conditions in your area may vary.
2Burning-Glass.com (analysis of 170,700 information security analyst job postings, Oct. 01, 2019 – Sep. 30, 2020).
3Burning-Glass.com (analysis of 117,978 information security analyst job postings by education level, Oct. 01, 2019 – Sep. 30, 2020).

CompTIA Cybersecurity Analyst (CySA+) is a registered trademark of CompTIA Properties, LLC.
Certified Information Systems Auditor (CISA) is a registered trademark of ISACA.
Microsoft Office is a registered trademark of Microsoft, Inc.
Python is a registered trademark of the Python Software Foundation, Inc.

EDITOR’S NOTE: This article was originally published in 2018. It has since been updated to include information relevant to 2020. Insight from Greg Scott remains from original article.

About the author

Callie Malvik

Callie is the Content Manager at Collegis Education, overseeing blog content on behalf of Rasmussen University. She is passionate about creating quality resources that empower others to improve their lives through education.

female writer

Related Content

This piece of ad content was created by Rasmussen University to support its educational programs. Rasmussen University may not prepare students for all positions featured within this content. Please visit www.rasmussen.edu/degrees for a list of programs offered. External links provided on rasmussen.edu are for reference only. Rasmussen University does not guarantee, approve, control, or specifically endorse the information or products available on websites linked to, and is not endorsed by website owners, authors and/or organizations referenced. Rasmussen University is accredited by the Higher Learning Commission, an institutional accreditation agency recognized by the U.S. Department of Education.

logo-accreditation-acen logo-accreditation-ccne chart-credential-laddering-associates-bachelors-masters 0 Credits90 Credits180 Credits48 CreditsStart HereHIGH SCHOOL GRADSStart HereTRANSFER STUDENTSStart HereSECOND DEGREE PURSUERSEnd HereASSOCIATE'S DEGREEStart HereMASTER'S DEGREEPURSUERSEnd HereBACHELOR'S DEGREEEnd HereMASTER'S DEGREE chart-credential-laddering-associates-bachelors 0 CreditsStart HereHIGH SCHOOL GRADSStart HereTRANSFER STUDENTS90 CreditsStart HereSECOND DEGREE PURSUERSEnd HereASSOCIATE'S DEGREE180 CreditsEnd HereBACHELOR'S DEGREE chart-credential-laddering-msn chart-credential-laddering-nursing-programs chart-credential-laddering-nursing DNPMSNRN to BSNLPN to RN BridgeAccelerated BSNProfessional Nursing ADNPractical Nursing DiplomaPre-LicensurePost-Licensure icon-colored-outline-bank icon-colored-outline-certificate icon-colored-outline-circle-dollar-sign icon-colored-outline-folder-search icon-colored-outline-hand-heart icon-colored-outline-head-blocks icon-colored-outline-head-cog icon-colored-outline-head-heart icon-colored-outline-health-plus-leaves icon-colored-outline-hospital icon-colored-outline-lifelong-learning icon-colored-outline-light-bulb-analytics icon-colored-outline-location-pin icon-colored-outline-maginify-glass icon-colored-outline-magnifying-glass icon-colored-outline-monitor-healthcare icon-colored-outline-monitor-paper-search icon-colored-outline-nurse-rays icon-colored-outline-padlock-shield icon-colored-outline-person-presenter-screen icon-colored-outline-scales icon-colored-advance icon-colored-arrows-cross-curve icon-colored-briefcase-star icon-colored-build icon-colored-bulb-analytics icon-colored-certificate icon-colored-continual-development icon-colored-duo-chatbox icon-colored-folder-mortarboard icon-colored-forward-ribbon icon-colored-gears-clock icon-colored-globe-pen icon-colored-growth icon-colored-hand-bubble icon-colored-hand-stars icon-colored-hands-gear icon-colored-head-blocks icon-colored-head-cog icon-colored-health-plus-leaves icon-colored-hospital-building icon-colored-laptop-cbe-skyscraper icon-colored-laptop-checkmark icon-colored-laptop-webpage icon-colored-location-map icon-colored-location-pin icon-colored-monitor-paper-scan icon-colored-mortarboard-dollar icon-colored-national icon-colored-people-chat-bubbles icon-colored-person-cheer-star icon-colored-person-laptop-checkboxes icon-colored-person-screen-instructor icon-colored-person-whiteboard icon-colored-phone-chatbox icon-colored-police-light icon-colored-prep icon-colored-presenter icon-colored-regional icon-colored-save-time icon-colored-shirt-hat icon-colored-skyscraper icon-colored-state icon-colored-student-centered icon-colored-support icon-colored-world-experience icon-triangle-arrow-up-plant icon-triangle-calendar-pencil icon-triangle-clock-rotating-arrows icon-triangle-display-gears icon-triangle-hand-right-speech-bubble icon-triangle-laptop-coding-brackets icon-triangle-mortarboard icon-triangle-paper-ribbon icon-triangle-person-cheer-star icon-triangle-person-juggle icon-triangle-triple-people-chat-bubble icon-arrow icon-bank icon-camera icon-filter icon-general-chart icon-general-connect icon-general-degree icon-general-discuss icon-general-email icon-general-find icon-general-hat icon-general-heart icon-general-laptop-building icon-general-laptop icon-general-leader icon-general-map icon-general-money icon-general-paperwork icon-general-people icon-general-phone icon-general-speak-out icon-head-heart icon-info-circle icon-mail-forward icon-mglass icon-play-solid icon-quote-mark-left icon-quote-mark-right icon-scales icon-share-square-o icon-simple-chat icon-simple-desktop icon-simple-find icon-simple-hamburger icon-simple-phone icon-spinner icon-tag icon-testimonial-quotes icon-util-checkbox-white icon-util-checkbox icon-util-checked-white icon-util-checked icon-util-chevron-down icon-util-chevron-left icon-util-chevron-right icon-util-chevron-up icon-util-circle-arrow-down icon-util-circle-dot icon-util-language-switch icon-util-loading icon-util-open-window-button icon-util-open-window-link icon-util-pdf-button icon-util-pdf-link icon-util-refresh icon-util-x rebrand-arrows icon-modality-campus icon-modality-field icon-modality-online icon-modality-residential icon-social-facebook-square-colored icon-social-facebook-square icon-social-facebook icon-social-google-plus-square icon-social-google-plus icon-social-instagram icon-social-linkedin-square-colored icon-social-linkedin-square icon-social-linkedin icon-social-pinterest-p icon-social-twitter-square icon-social-twitter icon-social-youtube-play-colored icon-social-youtube-play ras-logo-flame ras-logo-horizontal ras-logo-stacked