Skip to content
AI Work Index

Headline risk

0%

Very Low Risk

Information security analysts

United States AI Work IndexISCO 1330title_match

United States AI Work Index tracks this occupation on the shared structural baseline and then layers on local demand resilience, wages, and confidence.

182.8 current · 234.9 projectedConfidence high

Why This Score

Tasks 100%

Share of job tasks that overlap with current AI capabilities

Wage $125K

Median annual wage

Demand 29%

Projected employment change over 10 years

Preparation Zone 4

Typical preparation needed for this occupation

Occupation profile

Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. Assess system vulnerabilities for security risks and propose and implement risk mitigation strategies. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses.

Task evidence

100% weighted task match · 41% effective coverage

Scores combine AI task overlap, human advantages, and local demand. How it works

United States Now

Median Wage

USD 124,910

Employment 2024

182.8K

Projected Change (2024–34)

28.5%

Openings (2024–34)

16.0K

Wage distribution

Bottom 10%: USD 69,66025th pctl: USD 92,160Median: USD 124,91075th pctl: USD 159,600Top 10%: USD 186,420

Demand outlook

Employment of information security analysts is projected to grow 29 percent from 2024 to 2034, much faster than the average for all occupations.

Education: Bachelor's degree Experience: Less than 5 years

Role Profile

Computers and information technologyAdaptabilityWriting and reading

Tasks

  • 1. Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs. AI use: 0%
  • 2. Document computer security and emergency measures policies, procedures, and tests. AI use: 83%
  • 3. Confer with users to discuss issues such as computer data access needs, security violations, and programming changes. AI use: 0%
  • 4. Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated. AI use: 0%
  • 5. Perform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures. AI use: 95%
  • 6. Modify computer security files to incorporate new software, correct errors, or change individual access status. AI use: 96%

Technologies

Amazon Web Services AWS softwareLinuxMicrosoft Azure softwareMicrosoft ExcelMicrosoft Office softwareMicrosoft PowerPoint

Requirements

Telework: 86.1%Telework: 13.9%License required: 5.9%License required: 94.1%

Work context

E-Mail 5.0/5
Indoors, Environmentally Controlled 4.8/5
Telephone Conversations 4.5/5
Face-to-Face Discussions with Individuals and Within Teams 4.5/5
Contact With Others 4.3/5
Spend Time Sitting 4.2/5

Worker profile

Median age 41.5 · 261K employed

Under 25: 6% · 25–54: 77% · 55+: 18%

Related