IT Security Systems Schools

Information security systems analysts: An overview

IT security systems analysts conceptualize, design and implement security attacks against a computer system to identify a system's vulnerabilities and strengthen them. They can also decode and identify malware, computer viruses, and worms. IT security systems analysts need a solid understanding of computer science, information technology and software programming, and the ability to think creatively.

According to the Bureau of Labor Statistics (BLS), information security analysts usually need a bachelor's degree in computer science or a related subject (BLS.gov/ooh, 2012). Security analysts may be required to have earned an MBA in information systems. An MBA generally requires two years of study beyond a bachelor's degree and can prepare analysts for managing other security teams or security departments, as well as preparing the security analyst for working with a company's management.

In addition to earning a degree in a related field, the BLS also notes that information security analysts may be required to have prior work experience in a related occupation or field, such as computer systems analysis, database administration, or software programming.

While the job description of an information security analyst can change from employer to employer, information security analysts can generally expect to do the following:

  • Implement firewalls across an entire network
  • Deconstruct worms and viruses
  • Monitor traffic for malicious activity
  • Create "honeypot" defenses for attackers
  • Perform a penetration test on their own security measures

A number of certifications are available to IT security analysts to display their varied security skills:

  • EC-Council: Ethical Hacker Certification
  • TruSecure: TICSA Certification: Information Security Basics
  • CompTIA: Security+ Certification
  • (ISC)2: Certified Information Systems Security Professional

Many of the certifications for information security analysts are vendor-neutral, meaning they are not offered by a software provider or that they focus on software from a specific vendor, and none of the certifications require state, agency or government approval. Similar to locksmiths and safecrackers, there is no difference in the skills or tools of a professional information security analyst and a criminal hacker, only how they choose to use their skills (Forbes.com, 2012).

Skills of a security systems analyst

Since the job of an IT security systems analyst is to outthink hackers, this can involve anticipating where an attack might come from and how the attack might be carried out. Sometimes this involves breaking into the analyst's own network. As a result, the BLS notes that information security analysts may benefit from the following skills (BLS.gov/ooh, 2012):

  • Ingenuity
  • Good problem-solving skills
  • Creativity
  • Excellent attention to detail
  • Strong organization skills
  • Solid analytical skills
  • Ability to work well as part of a team

Additionally, information security analysts should have the mindset of a hacker, continually testing boundaries and limitations (Forbes.com, 2012). Because those who may attempt to break a network's security will not obey rules and industry norms, analysts who want to protect data should think like someone who wants to steal data.

This might require analysts to dupe their own employees with viruses they created in order to test the firewalls of a network and even leverage social engineering to get their co-workers to break their own security (WSJ.com, 2013). In essence, it is vital for an information security analyst to possess a) the knowledge of how to cheat at IT security, and b) the willingness to do so.

"Hacking is cheating, and it's how we get better at security," wrote security technologist Bruce Shneier (Schneier, 2006). "We need these people in security, and we need them on our side. Criminals are always trying to figure out how to break security systems. Field a new system -- an ATM, an online banking system, a gambling machine -- and criminals will try to make an illegal profit off it. They'll figure it out eventually, because some hackers are also criminals. But if we have hackers working for us, they'll figure it out first -- and then we can defend ourselves."

Tools of the security systems analyst

The tools of an IT security systems analyst are the same as those used by hackers, so it stands to reason that security analysts can expect to use some of the following hacker tools while preparing their company's security:

  • Network vulnerability scanners such as Nmap and GFI LanGuard

o   These software tools look for unrestricted ports, information on usernames, passwords and group info. When used maliciously, these are called "worms."

  • Network analyzer software such as OmniPeek and Aircrack-ng

o   This software allows a security analyst to monitor traffic across an entire network and spot potential denial of service (DoS) attacks or traffic bottlenecks.

  • Exploit software such as Metasploit and Milw0rm

o   Exploit software looks for bugs in the code that could be exploited by an attacker to gain privileged data or facilitate a DoS attack.

  • Database security software such as AppDetectivePro and SQLPing3

o   This software locates any and all databases across an entire network and monitors the activity of each database, similar to a network analyzer, while also checking for potential exploits.

    Information security analysts may also need to understand the types of vulnerabilities and weapons of attack, such as DoS attacks, SQL injections, and man-in-the-middle attacks. Man-in-the-middle attacks breach security on information after it leaves a user's computer and before it reaches the network, often as it passes through an email system or a website. As such, information security analysts may create and disassemble computer viruses, malware, spyware, computer worms, and Trojans. Security analysts may also be expected to know various programming languages such as C, Java, and SQL, among others.

    Employment opportunities for security systems analysts

    IT security analysts can be employed under many job titles, including:

    • Security Managers
    • Information Security Analysts
    • Systems Security Analysts
    • Penetration Testers
    • Code Breakers
    • Data Security Engineer
    • Security Engineer
    • Cyber Security Analysts

    The Bureau of Labor Statistics reports that, as of May 2012, information security analysts earned a national median annual wage of $86,170, with the highest and lowest 10 percent earning $135,600 and $49,960, respectively (BLS.gov/oes, 2013).

    According to the BLS, employment for information security analysts is expected to increase 22 percent from 2010 to 2020 (BLS.gov/ooh, 2012). Because cyber attacks have grown both in frequency and sophistication, as recent data mining attacks on major news outlets and search engines make clear, organizations are expected to increase their staff of security analysts to guard against these new threats. Two primary employers of information security analysts are projected to be the federal government and the health care industry, as analysts will be needed to protect the nation's critical information technology systems and to safeguard patient records (BLS.gov/ooh, 2012).


    EC-Council, Courses: Certified Ethical Hacker, 2013, http://www.eccouncil.org/courses/certified_ethical_hacker.aspx
    Forbes, Exploding The Myth Of The 'Ethical Hacker,'" Conrad Constantine and Dominique Karg, http://www.forbes.com/sites/parmyolson/2012/07/31/exploding-the-myth-of-the-ethical-hacker/
    Bureau of Labor Statistics, U.S. Department of Labor, Occupational Outlook Handbook, 2012-13 Edition, Information Security Analysts, Web Developers, and Computer Network Architects, March 29, 2012, http://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts-web-developers-and-computer-network-architects.htm
    Bureau of Labor Statistics, U.S. Department of Labor, Occupational Employment Statistics: Occupational Employment and Wages, May 2012, Information Security Analysts, March 29, 2013, http://www.bls.gov/oes/current/oes151122.htm
    The Wall Street Journal, "You Won't Believe How Adorable This Kitty Is! Click for More!," Geoffrey A. Fowler, March 26, 2013, http://online.wsj.com/article/SB10001424127887324373204578373011392662962.html
    Schneier on Security, "What is a Hacker?," Bruce Schneier [blog], September 14, 2006, http://www.schneier.com/blog/archives/2006/09/what_is_a_hacke.html

    Search for Campus and Online Systems Security Schools Below

    Click on a school to request more information.

    Refine School Matches
    Hide filters
    • SUBJECT Clear All

      See More

    • DEGREE

      See More



      Please enter valid US or Canada Zip.

    Searching Searching ...

    Prefer exploring options talking to our staff?
    Call toll free now: 1.855.330.6938
    Matching School Ads
    5 Program(s) Found
    • Liberty University’s online programs ranked in the top 10 out of more than 2,100 colleges & universities for academic quality, affordability, and accessibility.*
    • 100% online programs at associate, bachelor’s, master’s, and doctoral level.**
    • Transfer up to 90 credits into an undergraduate degree program.
    • Up to 50% of your master’s degree can be transferred in to help you get the most out of your hard work and maximize the credit you previously earned.
    Show more [+]
    • Accredited
    • Online Courses
    • Financial Aid
    • Transferable Credits
    5 Program(s) Found
    ABCO Technology , Inglewood
    • An accredited computer training academy preparing students to enter the IT industry as Network Engineers, Software Engineers, Web Apps Developer, Website Designers, Programmers, Database Administrators since 2000.
    • Holds A+ certification from CompTIA.
    • Located in Los Angeles, approximately 10 minutes away from LAX.
    • Flexible class schedules offered during day times, evenings and weekends.
    • Helping students start a career in technology within 3 - 9 months.
    • Educates with the mission to serve the needs of the local community and graduates by matching opportunities to skills.
    • Military friendly school.
    Show more [+]
    Good for Working Adults
    • Flexible Scheduling
    • Financial Aid
    3 Program(s) Found
    • Has students attend one four-week class at a time and take their final exam before moving on to their next class.
    • Offers 24/7 online tech support, with a typical response time of 4 hours or less.
    • Has online help centers that offer assistance with writing, statistics, medical assisting, and more.
    • Provides job placement assistance to all its students and alumni.
    • Researches trends for growing fields to tailor a more effective curriculum.
    Show more [+]
    • Online Courses
    5 Program(s) Found
    • UC is committed to liberal education integrated with professional study
    • Accredited by the MSCHE with a beautiful campus located in Utica, New York
    • 21 graduate programs, 38 undergraduate majors & study abroad opportunities
    • More than 5,000 undergraduate and graduate students (full- and part-time)
    • Offers financial aid options to students who qualify for tuition assistance
    Show more [+]
    • Online Courses
    1 Program(s) Found

    Excel At a Top Research Institution

    Become a leader in your field at a university that is recognized for its leading research and  commitment to the development of students.


    • One of fewer than 3% of U.S. institutions with a Carnegie classification of very high research activity
    • Online Courses
    5 Program(s) Found
    • Why Earn Your Degree from GCU?
    • Options: Choose from a variety of undergraduate and graduate degree programs in Business, Nursing, Psychology, Education & more!
    • Convenience: Complete courses online, on campus, or a combination of both!
    • Earlier Graduation: Our 4-credit courses allow you to complete your degree program in less time.
    • Transfer Friendly: We will request your transcripts, evaluate your graduate coursework, and determine your anticipated graduation date within 24 hours.
    • Quality: Grand Canyon University was founded in 1949 and is regionally accredited. Learn more today!
    Good for Working Adults
    • Accredited
    • Online Courses
    • Flexible Scheduling
    • Accelerated Programs
    • Financial Aid
    • Transferable Credits
    1 Program(s) Found
    UEI College , Ontario
    • Dedicated to providing  career training since 1975.
    • Has 13 campus locations in Southern California and a campus in Morrow, GA.
    • Provides flexible class times including weekends.
    • Offers curriculum that ranges from 8 month diploma programs to 16-month Associate of Applied Science degree programs.
    • Has admissions professionals available to help students decide which diploma or degree program they should pursue.
    • Gives job placement assistance strengthened by relationships with local employers.
    Show more [+]
    Good for Working Adults
    • Accredited
    • Flexible Scheduling
    • Financial Aid
    1 Program(s) Found
    Platt College , Anaheim
    • A Los Angeles-based private college offering programs in medical sciences, legal studies, and graphic design since 1985.
    • Has weekend programs, including certified  veterinary technology, nurse assistant, and hemodialysis technician.
    • Showcases visual communication students’ artwork and design through campus magazine.
    • 3 campuses in Southern California.
    • Accredited by the Accrediting Commission of Career Schools and Colleges (ACCSC).
    Show more [+]
    Good for Working Adults
    • Accredited
    • Flexible Scheduling
    • Accelerated Programs
    • Financial Aid
    • Transferable Credits
    1 Program(s) Found
    • Designated as a 2015 Military Friendly® School by Victory Media, publishers of G.I. Jobs®.
    • Each program is designed to instill the knowledge, ethical values, and interpersonal skills of professional practice and to foster values of social responsibility.
    • Offers several flexible learning options, including a blended format that combines campus and online learning.
    • Several scholarship opportunities are available for students who qualify.
    • Features a competency-based MBA program that allows students to test out of subjects based on prior professional experience.
    Show more [+]
    Good for Working Adults
    • Online Courses
    • Flexible Scheduling
    • Financial Aid
    • Transferable Credits
    1 Program(s) Found
    • Offers career programs in accounting, cosmetology, massage therapy, physical fitness training, and more.
    • Provides hands-on training led by instructors who have relevant, on-the-job experience.
    • Each campus features a public salon and spa for student practice.
    • Campuses are accredited by the Accrediting Council for Continuing Education and Training (ACCET) and Council on Occupational Education (COE).
    • 11 campuses across California, Texas, Nevada and Idaho, as well as 8 additional Milan Institute of Cosmetology campuses.
    Show more [+]
    Good for Working Adults
    • Flexible Scheduling
    • Financial Aid