AI Risk Logo
Salary Range
Low (10th %)$69,210
Median$120,360
High (90th %)$182,370

AI Prompt Guides for Information Security Analysts

Unlock expert prompt guides tailored for this Information Security Analysts. Get strategies to boost your productivity and results with AI.

AI Prompt Tool for Information Security Analysts

Experiment with and customize AI prompts designed for this occupation. Try, edit, and save prompts for your workflow.

Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. Assess system vulnerabilities for security risks and propose and implement risk mitigation strategies. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses.

The occupation "Information Security Analysts" has an automation risk of 53.7%, based on a base risk estimate of 54.5%. This moderately high risk reflects how many of the tasks performed by these analysts can be at least partially automated with current and near-future technology. Many aspects of the role involve structured, repetitive activities that are well-suited for automation, especially as cyber threats and security protocols become increasingly standardized. However, the risk level stops short of being overwhelming due to the continued importance of human expertise, judgment, and coordination in protecting organizational information assets. The top three most automatable tasks for Information Security Analysts involve methodical, rule-based activities. Developing plans to safeguard computer files against unauthorized modification or destruction can often be handled by automated policy engines and security management platforms. Monitoring current reports of computer viruses and determining when to update virus protection systems is another task where automated tools and artificial intelligence can rapidly ingest threat data and manage system updates without human intervention. Similarly, encrypting data transmissions and erecting firewalls can be handled automatically through pre-configured security software, reducing the need for manual oversight in these areas. On the other hand, the most automation-resistant tasks highlight where human intervention is still crucial. Training users and promoting security awareness require communication skills, adaptability, and the ability to assess human factors—qualities that algorithms struggle to replicate. Coordinating the implementation of computer system plans with personnel and outside vendors demands nuanced negotiation and context-sensitive decision-making, further resisting automation. Monitoring use of data files and regulating access, while partially automatable, still often requires human oversight to interpret suspicious activity and enforce complex policies. The main bottleneck skills that limit automation in this occupation—originality (scored at 3.0% and 3.3%)—reflect the need for creative problem-solving and innovative thinking, which current technologies cannot fully emulate.

Filter by Automatable Status
Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
Partially Automatable
Monitor current reports of computer viruses to determine when to update virus protection systems.
Automatable
Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.
Partially Automatable
Perform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures.
Partially Automatable
Modify computer security files to incorporate new software, correct errors, or change individual access status.
Partially Automatable
Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated.
Partially Automatable
Document computer security and emergency measures policies, procedures, and tests.
Partially Automatable
Confer with users to discuss issues such as computer data access needs, security violations, and programming changes.
Partially Automatable
Monitor use of data files and regulate access to safeguard information in computer files.
Partially Automatable
Coordinate implementation of computer system plan with establishment personnel and outside vendors.
Partially Automatable
Train users and promote security awareness to ensure system security and to improve server and network efficiency.
Partially Automatable

Monitoring Processes, Materials, or SurroundingsGetting InformationProcessing InformationIdentifying Objects, Actions, and EventsInspecting Equipment, Structures, or MaterialsEstimating the Quantifiable Characteristics of Products, Events, or InformationJudging the Qualities of Objects, Services, or PeopleMaking Decisions and Solving ProblemsThinking CreativelyUpdating and Using Relevant KnowledgeDeveloping Objectives and StrategiesScheduling Work and ActivitiesOrganizing, Planning, and Prioritizing WorkPerforming General Physical ActivitiesHandling and Moving ObjectsControlling Machines and ProcessesOperating Vehicles, Mechanized Devices, or EquipmentWorking with ComputersRepairing and Maintaining Electronic EquipmentDocumenting/Recording InformationDrafting, Laying Out, and Specifying Technical Devices, Parts, and EquipmentInterpreting the Meaning of Information for OthersRepairing and Maintaining Mechanical EquipmentCommunicating with Supervisors, Peers, or SubordinatesCommunicating with People Outside the OrganizationEstablishing and Maintaining Interpersonal RelationshipsAssisting and Caring for OthersSelling or Influencing OthersResolving Conflicts and Negotiating with OthersPerforming for or Working Directly with the PublicCoordinating the Work and Activities of OthersDeveloping and Building TeamsTraining and Teaching OthersGuiding, Directing, and Motivating SubordinatesCoaching and Developing OthersProviding Consultation and Advice to OthersPerforming Administrative ActivitiesStaffing Organizational UnitsMonitoring and Controlling ResourcesEvaluating Information to Determine Compliance with StandardsAnalyzing Data or Information

Apache HadoopApple macOSAtlassian ConfluenceBlackboard softwareDelphi TechnologyDrupalApache HiveApache PigApache SolrCAdobe ActionScriptEclipse IDEApache CassandraApache HTTP ServerApache MavenC#C++Enterprise JavaBeansApache KafkaAmazon Elastic Compute Cloud EC2BashChefDjangoDockerApache GroovyBlink3M Post-it AppAdvanced business application programming ABAPAtlassian BambooAJAXApache AntApache SparkCisco Systems CiscoWorksActive directory softwareAmazon Web Services AWS CloudFormationAutomated installation softwareApache Subversion SVNAccess management softwareAccessData FTKAnti-phishing softwareAnti-Trojan softwareAutomated media tracking softwareBackup and archival softwareBerkeley Internet Domain Name BINDCheck Point Next Generation Secure Web GatewayComputer forensic softwareCryptographic key management softwareDiameterDomain name system DNSMicrosoft PowerPointMicrosoft ProjectMicrosoft WordOracle PeopleSoftPHPIBM Cognos ImpromptuIBM DominoIBM NotesMicrosoft AccessJob control language JCLLexisNexisMcAfeeMicrosoft ExchangeMicrosoft Visual BasicMicrosoft WindowsMicroStrategyNagiosOracle DatabaseOracle E-Business Suite FinancialsOracle HyperionOracle PeopleSoft FinancialsOracle SolarisJavaScriptGitHubLAMP StackMicrosoft TeamsMySQLNoSQLOracle JavaServer Pages JSPOracle PL/SQLHuman resource management software HRMSGoogle SitesFirewall softwareOperating system softwareOracle Fusion ApplicationsMicrosoft ExcelIBM WebSphereKornShellLinuxMicrosoft .NET FrameworkMicrosoft Visual StudioMicrosoft Windows ServerMongoDBNode.jsObjective COracle Fusion MiddlewareOracle JavaPerlPerforce Helix softwareGitGoNational Instruments LabVIEWESRI ArcGIS softwareMicrosoft PowerShellGoogle AngularMicrosoft Active Server Pages ASPMicrosoft ASP.NETOracle JDBCMetasploitMicrosoft Active DirectoryNetwork directory services softwarePatch and update management softwareEtherealGuidance Software EnCase ForensicHoneypotHP WebInspectIBM QRadar SIEMIBM Tivoli Identity Management TIMImperva SecureSphereIntrusion detection system IDSIpFilterIpTablesISS RealSecureKali LinuxKeystroke monitoring softwareLicense management softwareMcAfee VirusScanMicro Focus OpenViewNetwork security auditing softwareNetwork, hardware, and software auditing softwareNorton AntiVirusOracle Net ManagerPassword cracker softwarePassword management softwarePenetration testing softwareTableauQlik Tech QlikViewSAP Crystal ReportsSASSplunk EnterpriseTeradata DatabaseThe MathWorks MATLABVeritas NetBackupPythonRuby on RailsSwiftSalesforce softwareRed Hat Enterprise LinuxRed Hat WildFlySpring FrameworkUNIXVMwareSeleniumScalaWiresharkTenable NessusVirtual private networking VPN softwareSnortSystem testing softwareUNIX ShellRed Hat OpenShiftVirus scanning softwarePing IdentityPortswigger BurP SuiteProgram checksumming softwareQualys Cloud PlatformQuest BigBrotherRapid7 NexposeRoot kit detection softwareSecure internet filtering softwareSecure shell SSH softwareSecurity risk assessment softwareSmart card management softwareStack smashing protection SSP softwareSymantec Endpoint ProtectionTcpdumpTrend Micro TippingPointWinMergeMicrosoft VisioMicrosoft Visual Basic for Applications VBAOracle E-Business Suite FinancialsPostgreSQLApple macOSAtlassian ConfluenceBlackboard softwareApache HiveApache PigApache SolrCAdobe ActionScriptApache CassandraApache HTTP ServerApache MavenApache TomcatC#Apache KafkaAmazon DynamoDBAnsible softwareBashApache GroovyBlinkAdvanced business application programming ABAPAtlassian BambooAJAXApache AntApache SparkActive directory softwareAutomated installation softwareApache Subversion SVNAccess management softwareAccessData FTKAnti-phishing softwareAnti-Trojan softwareAutomated media tracking softwareBackup and archival softwareBerkeley Internet Domain Name BINDAmazon Simple Storage Service S3Microsoft PowerPointMicrosoft ProjectMicrosoft SharePointJob control language JCLMicrosoft WordIBM Cognos ImpromptuIBM DominoIBM NotesLexisNexisMcAfeeMicrosoft SQL ServerMicrosoft VisioMicrosoft Visual BasicMicrosoft WindowsMicroStrategyNagiosOracle DatabaseDelphi TechnologyDrupalJavaScriptElasticsearchGitHubLAMP StackMicrosoft Azure softwareMicrosoft TeamsMySQLNoSQLEclipse IDEOracle Business Intelligence Enterprise EditionGoogle SitesHypertext markup language HTMLFirewall softwareOperating system softwareOracle Fusion ApplicationsMicrosoft ExcelC++Enterprise JavaBeansHewlett Packard HP-UXIBM WebSphereKornShellLinuxMicrosoft .NET FrameworkMicrosoft Visual StudioMicrosoft Windows ServerMongoDBNode.jsObjective CChefDjangoDockerGitGoJavaScript Object Notation JSONNational Instruments LabVIEWMicrosoft PowerShellGoogle AngularMicrosoft Active Server Pages ASPMicrosoft ASP.NETMetasploitMicrosoft Active DirectoryComputer forensic softwareCryptographic key management softwareDiameterEtherealHoneypotHP WebInspectIBM QRadar SIEMIBM Tivoli Identity Management TIMImperva SecureSphereIntrusion detection system IDSIpFilterIpTablesISS RealSecureKali LinuxKeystroke monitoring softwareLicense management softwareMcAfee VirusScanMicro Focus OpenViewNetwork security auditing softwareNetwork, hardware, and software auditing softwareNorton AntiVirusIntrusion prevention system IPSNetwork intrusion prevention systems NIPSConformance and validation testing softwareEnd-to-end encryption softwareHP FortifyTableauStructured query language SQLOracle HyperionOracle JD Edwards EnterpriseOneOracle SolarisPostgreSQLPuppetQlik Tech QlikViewSAP Crystal ReportsSASSplunk EnterpriseTeradata DatabaseThe MathWorks MATLABVeritas NetBackupOracle PL/SQLPythonRubyRuby on RailsSwiftOracle Fusion MiddlewareSAP softwareOracle JavaPerlRed Hat WildFlySpring FrameworkUnified modeling language UMLUNIXVMwareSeleniumPerforce Helix softwareScalaUbuntuWiresharkOracle JDBCTenable NessusSnortSystem testing softwareUNIX ShellOracle Net ManagerPassword cracker softwarePassword management softwareRed Hat OpenShiftVirus scanning softwarePing IdentityPortswigger BurP SuiteProgram checksumming softwareQuest BigBrotherRapid7 NexposeRoot kit detection softwareSecure internet filtering softwareSecure shell SSH softwareSecurity risk assessment softwareSmart card management softwareSymantec Endpoint ProtectionTcpdumpWinMergeWebsense Data Loss PreventionPalo Alto Networks Next-Generation Security PlatformSniffer InvestigatorSymantec Blue Coat Data Loss PreventionAmazon Web Services AWS softwareExtensible hypertext markup language XHTMLHuman resource management software HRMSAtlassian JIRASupervisory control and data acquisition SCADA softwareMicrosoft Visual Basic Scripting Edition VBScriptMicrosoft Visual Basic Scripting Edition VBScriptExtensible markup language XMLRed Hat Enterprise LinuxAmazon Elastic Compute Cloud EC2Geographic information system GIS softwareGeographic information system GIS softwareEpic SystemsJavaScript Object Notation JSONMicrosoft SQL Server Reporting Services SSRSESRI ArcGIS softwareRelational database management softwareCommon business oriented language COBOLAmazon Web Services AWS CloudFormationVirtual private networking VPN softwareSystem and data disaster recovery softwareNetwork directory services softwareMicrosoft SharePointIntegrated development environment IDE softwareVoice over internet protocol VoIP system softwareRelational database management softwareAmazon Web Services AWS softwareIBM Power Systems softwareMicrosoft ExchangeArcSight Enterprise Threat and Risk ManagementMicrosoft SQL ServerOracle Business Intelligence Enterprise EditionPuppetShell scriptShell scriptSupervisory control and data acquisition SCADA softwareHypertext markup language HTMLAmazon RedshiftElasticsearchMicrosoft Azure softwareRubyApache TomcatHewlett Packard HP-UXCommon business oriented language COBOLIntegrated development environment IDE softwareMicrosoft SQL Server Reporting Services SSRSOracle WebLogic ServerOracle WebLogic ServerUnified modeling language UMLEpic Systems3M Post-it AppAmazon DynamoDBAnsible softwareUbuntuMicrosoft SQL Server Integration Services SSISMicrosoft SQL Server Integration Services SSISApache StrutsApache StrutsCisco Systems CiscoWorksIntrusion prevention system IPSArcSight Enterprise Threat and Risk ManagementAmazon Simple Storage Service S3Patch and update management softwareNetwork intrusion prevention systems NIPSSystem and data disaster recovery softwareVoice over internet protocol VoIP system softwareCheck Point Next Generation Secure Web GatewayDomain name system DNSGuidance Software EnCase ForensicAnti-spyware softwareAnti-spyware softwareMicrosoft Hyper-V ServerBorder Gateway Protocol BGPBorder Gateway Protocol BGPConformance and validation testing softwareEnd-to-end encryption softwareHP FortifyAutomated audit trail analysis softwareAutomated audit trail analysis softwareIBM Tivoli Access Management TAMIBM Tivoli Access Management TAMIntegrity verification softwareIntegrity verification softwareJuniper Networks NetScreen-Security ManagerJuniper Networks NetScreen-Security ManagerLink encryption softwareLink encryption softwarePenetration testing softwareQualys Cloud PlatformStack smashing protection SSP softwareTrend Micro TippingPointMicrosoft Hyper-V ServerNetwork and system vulnerability assessment softwareNetwork and system vulnerability assessment softwareSecurity incident management softwareSecurity incident management softwareWebsense Data Loss PreventionPalo Alto Networks Next-Generation Security PlatformSniffer InvestigatorSymantec Blue Coat Data Loss PreventionRemote authentication dial-in user service RADIUS softwareRemote authentication dial-in user service RADIUS softwareMicrosoft DynamicsMicrosoft DynamicsOracle PeopleSoftPHPSAP softwareSalesforce softwareApache HadoopCitrix cloud computing softwareCitrix cloud computing softwareCustomer information control system CICSStructured query language SQLIBM Power Systems softwareMicrosoft Visual Basic for Applications VBANortonLifeLock cybersecurity softwareNortonLifeLock cybersecurity softwareOracle JD Edwards EnterpriseOneOracle PeopleSoft FinancialsAmazon RedshiftExtensible hypertext markup language XHTMLOracle JavaServer Pages JSPAtlassian JIRAExtensible markup language XMLMicrosoft Office softwareMicrosoft Office softwareCustomer information control system CICSMicrosoft Access

Security Managers
Medium48.21%
Direct an organization's security functions, including physical security and safety of employees and facilities.
Computer and Information Systems Managers
Medium46.26%
Plan, direct, or coordinate activities in such fields as electronic data processing, information systems, systems analysis, and computer programming.
Security Management Specialists
Medium47.83%
Conduct security assessments for organizations, and design security systems and processes. May specialize in areas such as physical security or the safety of employees and facilities.
Computer Systems Analysts
Medium48.05%
Analyze science, engineering, business, and other data processing problems to develop and implement solutions to complex applications problems, system administration issues, or network concerns. Perform systems management and integration functions, improve existing computer systems, and review computer system capabilities, workflow, and schedule limitations. May analyze or recommend commercially available software.
Computer Network Support Specialists
Medium55.92%
Analyze, test, troubleshoot, and evaluate existing network systems, such as local area networks (LAN), wide area networks (WAN), cloud networks, servers, and other data communications networks. Perform network maintenance to ensure networks operate correctly with minimal interruption.
Computer User Support Specialists
Medium55.42%
Provide technical assistance to computer users. Answer questions or resolve computer problems for clients in person, via telephone, or electronically. May provide assistance concerning the use of computer hardware and software, including printing, installation, word processing, electronic mail, and operating systems.
Computer Network Architects
Medium50.66%
Design and implement computer and information networks, such as local area networks (LAN), wide area networks (WAN), intranets, extranets, and other data communications networks. Perform network modeling, analysis, and planning, including analysis of capacity needs for network infrastructures. May also design network and computer security measures. May research and recommend network and data communications hardware and software.
Telecommunications Engineering Specialists
Medium56.77%
Design or configure wired, wireless, and satellite communications systems for voice, video, and data services. Supervise installation, service, and maintenance.
Database Administrators
Medium50.55%
Administer, test, and implement computer databases, applying knowledge of database management systems. Coordinate changes to computer databases. Identify, investigate, and resolve database performance issues, database capacity, and database scalability. May plan, coordinate, and implement security measures to safeguard computer databases.
Database Architects
Medium50.12%
Design strategies for enterprise databases, data warehouse systems, and multidimensional networks. Set standards for database operations, programming, query processes, and security. Model, design, and construct large relational databases or data warehouses. Create and optimize data models for warehouse infrastructure and workflow. Integrate new systems with existing warehouse structure and refine system performance and functionality.
Network and Computer Systems Administrators
Medium57.76%
Install, configure, and maintain an organization's local area network (LAN), wide area network (WAN), data communications network, operating systems, and physical and virtual servers. Perform system monitoring and verify the integrity and availability of hardware, network, and server resources and systems. Review system and application logs and verify completion of scheduled jobs, including system backups. Analyze network and server resource consumption and control user access. Install and upgrade software and maintain software licenses. May assist in network modeling, analysis, planning, and coordination between network and data communications hardware and software.
Software Developers
Medium51.32%
Research, design, and develop computer and network software or specialized utility programs. Analyze user needs and develop software solutions, applying principles and techniques of computer science, engineering, and mathematical analysis. Update software or enhance existing software capabilities. May work with computer hardware engineers to integrate hardware and software systems, and develop specifications and performance requirements. May maintain databases within an application area, working individually or coordinating database development as part of a team.
Document Management Specialists
Medium56.74%
Implement and administer enterprise-wide document management systems and related procedures that allow organizations to capture, store, retrieve, share, and destroy electronic records and documents.
Penetration Testers
Medium51.14%
Evaluate network system security by conducting simulated internal and external cyberattacks using adversary tools and techniques. Attempt to breach and exploit critical systems and gain access to sensitive information to assess system security.
Information Security Engineers
Medium52.50%
Develop and oversee the implementation of information security procedures and policies. Build, maintain and upgrade security technology, such as firewalls, for the safe use of computer networks and the transmission and retrieval of information. Design and implement appropriate security controls to identify vulnerabilities and protect digital files and electronic infrastructures. Monitor and respond to computer security breaches, viruses, and intrusions, and perform forensic investigation. May oversee the assessment of information security systems.
Digital Forensics Analysts
Medium56.25%
Conduct investigations on computer-based crimes establishing documentary or physical evidence, such as digital media and logs associated with cyber intrusion incidents. Analyze digital evidence and investigate computer security incidents to derive information in support of system and network vulnerability mitigation. Preserve and present computer-related evidence in support of criminal, fraud, counterintelligence, or law enforcement investigations.
Blockchain Engineers
Medium51.47%
Maintain and support distributed and decentralized blockchain-based networks or block-chain applications such as cryptocurrency exchange, payment processing, document sharing, and digital voting. Design and deploy secure block-chain design patterns and solutions over geographically distributed networks using advanced technologies. May assist with infrastructure setup and testing for application transparency and security.
Computer Systems Engineers/Architects
Medium50.80%
Design and develop solutions to complex applications problems, system administration issues, or network concerns. Perform systems management and integration functions.
First-Line Supervisors of Security Workers
Medium55.95%
Directly supervise and coordinate activities of security workers and security guards.
Intelligence Analysts
Medium48.00%
Gather, analyze, or evaluate information from a variety of sources, such as law enforcement databases, surveillance, intelligence networks or geographic information systems. Use intelligence data to anticipate and prevent organized crime activities, such as terrorism.
Loss Prevention Managers
Medium47.31%
Plan and direct policies, procedures, or systems to prevent the loss of assets. Determine risk exposure or potential liability, and develop risk control measures.
Business Continuity Planners
Medium49.03%
Develop, maintain, or implement business continuity and disaster recovery strategies and solutions, including risk assessments, business impact analyses, strategy selection, and documentation of business continuity and disaster recovery procedures. Plan, conduct, and debrief regular mock-disaster exercises to test the adequacy of existing plans and strategies, updating procedures and plans regularly. Act as a coordinator for continuity efforts after a disruption event.
Fraud Examiners, Investigators and Analysts
Medium44.97%
Obtain evidence, take statements, produce reports, and testify to findings regarding resolution of fraud allegations. May coordinate fraud detection and prevention activities.
Web Administrators
Medium53.44%
Manage web environment design, deployment, development and maintenance activities. Perform testing and quality assurance of web sites and web applications.
Gambling Surveillance Officers and Gambling Investigators
Medium52.56%
Observe gambling operation for irregular activities such as cheating or theft by either employees or patrons. Investigate potential threats to gambling assets such as money, chips, and gambling equipment. Act as oversight and security agent for management and customers.
Retail Loss Prevention Specialists
Medium46.99%
Implement procedures and systems to prevent merchandise loss. Conduct audits and investigations of employee activity. May assist in developing policies, procedures, and systems for safeguarding assets.

AI Readiness Accelerator

A practical course designed for small and medium businesses to master AI and automation. Learn how to identify opportunities, implement AI tools, and streamline your operations for a future-proof business. No technical background required!

Learn More

AI Prompt Guides

Unlock industry- and job-specific prompt guides to get the most out of AI tools. Our guides are tailored for your sector and role, helping you craft effective prompts for real-world results. Stay ahead with expert strategies!

Browse Guides

AI Prompt Tool

Find, try, and share expert prompts and automations for key jobs and tasks. Access a growing library from our experts and the community, and test prompts with your own data. Discover new ways to automate and innovate!

Try the Tool