Cybersecurity Analyst Job Description: Duties, Skills & Requirements

Cybersecurity Analyst Job Description: Duties, Skills, Salary, and Career Path

Employment of information security analysts is projected to grow 29 percent from 2024 to 2034 — nearly ten times the average for all occupations — as organizations across every industry accelerate investment in cybersecurity to defend against increasingly sophisticated threat actors [1].

Key Takeaways

  • Cybersecurity analysts protect an organization's computer systems, networks, and data by monitoring for threats, investigating security incidents, and implementing protective measures.
  • The median annual wage for information security analysts was $124,910 in May 2024, with the highest 10 percent earning more than $186,420 [1].
  • Most positions require a bachelor's degree in cybersecurity, computer science, or information technology, combined with industry certifications such as CompTIA Security+, CEH, or CISSP.
  • The role requires a blend of technical depth (network analysis, log forensics, malware behavior) and analytical thinking to distinguish real threats from false positives across millions of daily events.
  • A persistent global shortage of cybersecurity professionals — estimated at 3.4 million unfilled positions worldwide by ISC2 — means qualified candidates face exceptionally strong hiring demand [3].

What Does a Cybersecurity Analyst Do?

A cybersecurity analyst is the organization's first line of defense against cyberattacks. While firewalls and automated tools block the majority of malicious traffic, it is the human analyst who investigates the alerts that machines cannot resolve, hunts for threats that evade automated detection, and responds when a breach occurs.

A typical shift begins with reviewing the overnight alert queue in the Security Information and Event Management (SIEM) platform — tools like Splunk, Microsoft Sentinel, or CrowdStrike Falcon LogScale. Analysts triage hundreds of alerts, separating genuine threats from false positives. A suspicious login from an unusual geographic location might be a compromised credential, or it might be an employee traveling. The analyst correlates multiple data sources — authentication logs, VPN records, endpoint detection data, and email headers — to make the determination.

When a confirmed threat is identified, the analyst escalates to incident response. This involves isolating affected systems, collecting forensic evidence (memory dumps, disk images, network captures), determining the attack vector (phishing email, unpatched vulnerability, compromised third-party vendor), and coordinating with IT operations to contain and remediate the threat. According to O*NET, information security analysts "monitor computer networks for security issues" and "investigate security breaches and other cybersecurity incidents" [2].

Proactive defense occupies the remainder of the work. Cybersecurity analysts conduct vulnerability assessments using tools like Nessus, Qualys, or Rapid7 InsightVM, scanning infrastructure for unpatched software, misconfigured services, and exposed credentials. They review firewall rules, access control lists, and endpoint protection configurations. They write detection rules in SIEM query languages (SPL for Splunk, KQL for Sentinel) to catch emerging attack techniques documented in the MITRE ATT&CK framework [4].

Security awareness is also part of the job. Analysts design and execute phishing simulations to test employee susceptibility, analyze the results, and develop targeted training for departments with high click rates. They write security advisories when new vulnerabilities (CVEs) affect the organization's technology stack.

Core Responsibilities

Primary duties, consuming approximately 60 percent of working time:

  1. Monitor security alerts and events in the SIEM platform, triaging incoming alerts from network intrusion detection systems (IDS/IPS), endpoint detection and response (EDR) tools, email security gateways, and cloud security platforms.
  2. Investigate security incidents by correlating data across multiple sources, determining scope and impact, documenting findings in the incident management system, and escalating to senior analysts or incident response teams as needed.
  3. Conduct vulnerability assessments by running scheduled and ad-hoc scans against internal and external assets, prioritizing findings by CVSS score and business context, and tracking remediation with IT operations teams.
  4. Develop and tune detection rules in the SIEM and EDR platforms to reduce false positives, detect emerging threats, and align detections with the MITRE ATT&CK framework [4].
  5. Perform threat hunting by proactively searching for indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs) that may have evaded automated detection.
  6. Respond to phishing reports by analyzing suspicious emails, extracting IOCs (URLs, file hashes, sender domains), and blocking malicious indicators across email and web security tools [2].

Secondary responsibilities, approximately 30 percent of time:

  1. Maintain and configure security tools including SIEM, EDR, firewall, proxy, DLP, and cloud security posture management (CSPM) platforms.
  2. Conduct security awareness activities including phishing simulations, training content development, and new-hire security orientation.
  3. Participate in incident response exercises and tabletop simulations to test and improve the organization's response playbooks.
  4. Research emerging threats and vulnerabilities by monitoring threat intelligence feeds (AlienVault OTX, Recorded Future, CISA advisories) and translating findings into actionable detection and prevention measures.

Administrative and organizational activities, approximately 10 percent:

  1. Document security procedures, incident reports, and post-mortem analyses for compliance requirements and organizational learning.
  2. Support audit and compliance activities by providing evidence of security controls for SOC 2, ISO 27001, HIPAA, PCI-DSS, or industry-specific frameworks.
  3. Mentor junior analysts by reviewing their triage work, teaching investigation techniques, and sharing knowledge about attack patterns.

Required Qualifications

Most cybersecurity analyst positions require a bachelor's degree in cybersecurity, information security, computer science, information technology, or a related field. The BLS notes that information security analysts typically need a bachelor's degree in a computer-related field [1].

Industry certifications carry significant weight in cybersecurity hiring:

  • CompTIA Security+: The baseline certification, validating foundational security knowledge. Many job postings list it as a minimum requirement.
  • Certified Ethical Hacker (CEH): Validates offensive security knowledge useful for understanding attacker methods.
  • Certified Information Systems Security Professional (CISSP): The gold-standard certification for experienced professionals, typically required for senior roles. Requires five years of experience [5].

Entry-level cybersecurity analysts need zero to two years of experience, which can include IT help desk work, network administration, or security internships. Mid-level roles require two to five years of dedicated security experience. Senior security analysts need five or more years with demonstrated incident response expertise and the ability to mentor others.

Technical requirements include:

  • Experience with SIEM platforms (Splunk, Microsoft Sentinel, QRadar, or CrowdStrike Falcon LogScale)
  • Understanding of networking fundamentals: TCP/IP, DNS, HTTP/HTTPS, firewall rules, VPN
  • Familiarity with operating system security (Windows Active Directory, Linux hardening)
  • Knowledge of common attack types: phishing, ransomware, SQL injection, cross-site scripting, privilege escalation
  • Scripting ability in Python, PowerShell, or Bash for automating repetitive analysis tasks

Preferred Qualifications

Experience with endpoint detection and response (EDR) platforms such as CrowdStrike Falcon, SentinelOne, or Microsoft Defender for Endpoint. Hands-on experience conducting forensic analysis of compromised endpoints, including memory analysis and disk imaging.

Cloud security expertise is increasingly essential. Experience with AWS Security Hub, Azure Defender, GCP Security Command Center, and cloud-native security tools (CloudTrail, Config, GuardDuty) distinguishes candidates as organizations migrate workloads to cloud platforms.

Threat intelligence experience — collecting, analyzing, and operationalizing intelligence from open-source and commercial threat feeds — adds strategic value. Familiarity with STIX/TAXII standards for threat intelligence sharing strengthens this profile [4].

Experience with penetration testing tools (Burp Suite, Metasploit, Nmap) provides offensive perspective that strengthens defensive analysis.

Tools and Technologies

Cybersecurity analysts work with a layered defense stack:

  • SIEM Platforms: Splunk Enterprise Security, Microsoft Sentinel, IBM QRadar, CrowdStrike Falcon LogScale, Elastic Security
  • Endpoint Detection and Response: CrowdStrike Falcon, SentinelOne, Microsoft Defender for Endpoint, Carbon Black
  • Vulnerability Management: Nessus (Tenable), Qualys VMDR, Rapid7 InsightVM, CrowdStrike Falcon Spotlight
  • Network Security: Palo Alto Networks NGFW, Cisco Firepower, Snort/Suricata IDS, Zeek (network analysis)
  • Email Security: Proofpoint, Mimecast, Microsoft Defender for Office 365, Abnormal Security
  • Cloud Security: AWS Security Hub, Azure Defender, Wiz, Orca Security, Prisma Cloud
  • Threat Intelligence: Recorded Future, AlienVault OTX, MITRE ATT&CK Navigator, VirusTotal, AbuseIPDB
  • Scripting and Automation: Python, PowerShell, Bash, SOAR platforms (Splunk SOAR, Palo Alto XSOAR) [5]

Work Environment and Schedule

Cybersecurity analysts work in Security Operations Centers (SOCs), corporate offices, or remotely. SOC environments operate 24/7, requiring analysts to work rotating shifts including nights, weekends, and holidays. The BLS reports that information security analysts held about 214,500 jobs in 2024, distributed across computer systems design, finance, information services, and management of companies [1].

The work is mentally demanding. Analysts process hundreds of alerts per shift, and the consequence of missing a real threat can be severe — data breaches, ransomware infections, or regulatory penalties. The high-stakes nature of the work creates pressure, but many professionals find it intellectually stimulating and purposeful.

Remote work has become common for cybersecurity analysts, particularly for roles that do not require physical SOC presence. Analysts need secure home office setups and reliable connectivity to access SIEM dashboards, VPN into corporate networks, and respond to incidents.

Team structures vary. Small organizations may have a single security analyst who handles everything. Large enterprises have tiered SOCs: Tier 1 analysts handle initial triage, Tier 2 analysts conduct deeper investigations, and Tier 3 analysts focus on threat hunting, malware analysis, and incident response. Managed Security Service Providers (MSSPs) employ analysts who monitor multiple client environments simultaneously.

Salary Range and Benefits

The Bureau of Labor Statistics reports a median annual wage of $124,910 for information security analysts in May 2024 [1]. The lowest 10 percent earned less than $69,660, while the highest 10 percent earned more than $186,420.

Compensation varies by specialization, certification level, and industry. Analysts with CISSP certification earn approximately 20 percent more than non-certified peers. Those in financial services and technology companies tend to earn the highest salaries. Government cybersecurity roles (Department of Defense, intelligence agencies) offer competitive salaries plus security clearance premiums [5].

Benefits typically include comprehensive health insurance, 401(k) with employer match, certification reimbursement and study time (most employers pay for Security+, CISSP, and other certifications), continuing education budgets, conference attendance (DEF CON, Black Hat, RSA Conference), and in some cases, security clearance sponsorship.

Career Growth from This Role

Cybersecurity analysts advance along technical or management tracks. The technical track progresses from Security Analyst to Senior Security Analyst, Security Engineer (building and automating security systems), Threat Hunter (proactive detection), Incident Response Lead, and Principal Security Architect. The management track moves from SOC Team Lead to Security Operations Manager, Director of Security, VP of Security, and Chief Information Security Officer (CISO).

Specialization paths include penetration testing and red teaming (offensive security), digital forensics and incident response (DFIR), malware analysis and reverse engineering, application security (securing the software development lifecycle), cloud security architecture, and governance, risk, and compliance (GRC).

The CISO path is well-compensated. CISOs at large organizations earn $250,000 to $500,000 or more in total compensation, and the role has become a board-level position at many companies following high-profile breaches and regulatory pressure [3].

Lateral transitions include moving into security consulting, sales engineering for security vendors, cybersecurity policy (government agencies, think tanks), security training and education, and technical writing for security publications.


Build your ATS-optimized Cybersecurity Analyst resume with Resume Geni — it's free to start.

FAQ

What is the difference between a cybersecurity analyst and a security engineer?

Cybersecurity analysts focus on detecting and responding to threats — monitoring alerts, investigating incidents, and hunting for intrusions. Security engineers focus on building and maintaining security infrastructure — deploying and configuring SIEM platforms, automating security workflows, and developing security tools. Many professionals start as analysts and transition to engineering roles [2].

Which certification should I get first?

CompTIA Security+ is the best starting point. It validates foundational knowledge, is widely recognized, and is often listed as a minimum requirement in job postings. From there, pursue CEH for offensive knowledge or CISSP for career advancement (after gaining five years of experience) [5].

Can I become a cybersecurity analyst without a degree?

Yes, though it is more difficult. Industry certifications (Security+, CEH), hands-on experience through labs and capture-the-flag competitions (Hack The Box, TryHackMe), and a strong portfolio demonstrating security skills can substitute for a degree at some employers. Many analysts enter through IT help desk or network administration roles.

Is cybersecurity a stressful career?

It can be. SOC analysts deal with alert fatigue, on-call rotations, and the pressure of knowing that a missed alert could lead to a breach. However, the work is intellectually engaging, the job security is exceptional, and many organizations are investing in analyst wellness, automation to reduce repetitive work, and manageable shift rotations.

What is the job outlook for cybersecurity analysts?

Exceptionally strong. The BLS projects 29 percent growth through 2034, and ISC2 estimates 3.4 million unfilled cybersecurity positions globally. This supply-demand imbalance means qualified candidates have significant negotiating leverage [1][3].

Do cybersecurity analysts need programming skills?

Scripting ability in Python, PowerShell, or Bash is increasingly expected. Analysts write scripts to automate alert triage, parse log files, and extract indicators of compromise. Deep software development skills are not required, but the ability to read and write scripts significantly increases effectiveness.

What industries hire cybersecurity analysts?

Every industry, but the highest demand is in financial services, healthcare, technology, government and defense, energy, and professional services. Any organization with digital assets and customer data needs security professionals [1].


Citations:

[1] U.S. Bureau of Labor Statistics, "Information Security Analysts: Occupational Outlook Handbook," https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm

[2] O*NET OnLine, "15-1212.00 - Information Security Analysts," https://www.onetonline.org/link/summary/15-1212.00

[3] ISC2, "2024 Cybersecurity Workforce Study," https://www.isc2.org/Research/Workforce-Study

[4] MITRE, "ATT&CK Framework," https://attack.mitre.org/

[5] ISC2, "CISSP Certification," https://www.isc2.org/certifications/cissp

[6] CISA, "Cybersecurity Best Practices," https://www.cisa.gov/cybersecurity

[7] CompTIA, "Security+ Certification," https://www.comptia.org/certifications/security

[8] Robert Half, "2025 Technology Salary Guide," https://www.roberthalf.com/us/en/insights/salary-guide/technology

Match your resume to this job

Paste the job description and let AI optimize your resume for this exact role.

Tailor My Resume

Free. No signup required.