Cybersecurity analyst salary


A cybersecurity analyst is an integral part of a cybersecurity team. The cybersecurity analyst works to ensure that the organization they work for is safe from cyberthreats. To do this they perform a number of highly skilled duties, including involvement in designing and implementing secure networks — which involves analyzing those networks for threats and risks.

Cybersecurity analysts typically have a master’s degree. However, they can enter the profession via internships in computer security and build up their experience, qualifications and expertise that way.

Typical qualifications and certifications that make a cybersecurity analyst attractive to an employer include:

  • Degree in computer science, mathematics or a physical science like physics
  • Master’s degree in information security

Certifications such as:

  • CEH: Certified Ethical Hacker
  • ECSA: EC-Council Certified Security Analyst

How much does a cybersecurity analyst make?

Salaries are dependent on a number of factors, including experience, qualifications and responsibility level. According to Indeed, the average salary for a security analyst is around $78,000 in the U.S.

The range of cybersecurity analyst salaries, however, varies across different countries too. Below, we’ve shown the typical hourly salaries of different levels of cybersecurity analyst in several countries and also in two U.S. states. Data from PayScale.

Cybersecurity analyst with three relevant certifications

Entry-level cybersecurity analyst

  • London                    $35,400
  • Seattle, USA           $75,300
  • New York USA       $77,300
  • Sydney, Australia    $51,700

Junior cybersecurity analyst: Five years’ experience

  • London                    $43,000
  • Seattle, USA           $99,600
  • New York USA       $96,800
  • Sydney, Australia    $55,800

Senior cybersecurity analyst: 10 years’ experience

  • London                    $59,400
  • Seattle, USA       (Read more...)

*** This is a Security Bloggers Network syndicated blog from Infosec Resources authored by Susan Morrow. Read the original post at: