How much does an Information Security Analyst make in the United States?
-
The average Information Security Analyst salary in the United States is $165,231 as of April 01, 2026. The range for our most popular Information Security Analyst positions (listed below) typically falls between $35,776 and $294,686. Keep in mind that salary ranges can vary widely depending on many important factors, including position, education, certifications, additional skills, and the number of years you have spent in your profession. With more online, real-time compensation data than any other website, Salary.com helps you determine your exact pay target.
Information Security Analyst's Annual Base Salary
| Job Title | Salary | Hourly Rate | Location | Date Updated |
| Information Security Analyst I | $77,855 | $37.43 | United States | April 01, 2026 |
| Information Security Analyst II | $96,284 | $46.29 | United States | April 01, 2026 |
| Information Security Analyst III | $123,377 | $59.32 | United States | April 01, 2026 |
| Information Security Analyst IV | $151,090 | $72.64 | United States | April 01, 2026 |
| Information Security Analyst V | $175,866 | $84.55 | United States | April 01, 2026 |
| Security Specialist | $75,400 | $36.25 | United States | April 01, 2026 |
| VP of Information Security | $265,645 | $127.71 | United States | April 01, 2026 |
| Information Security Director | $223,256 | $107.33 | United States | April 01, 2026 |
| Security Guard - Unarmed | $39,915 | $19.19 | United States | April 01, 2026 |
| Information Security Manager | $162,587 | $78.17 | United States | April 01, 2026 |
-
Responsible for ensuring the security of the organization's systems and information assets. Develops and implements security systems, guidelines, and strategies. Protects against unauthorized access, use, disclosure, disruption, modification, and/or destruction. Conducts audits and risk assessments. Evaluates internal operations and controls and makes recommendations based on the findings. Migrates non-compliant environments to compliant environments. Ensures compliance with data protection guidelines and applicable laws. Typically requires a bachelor's degree. Typically reports to a manager. Work is closely managed. Works on projects/matters of limited complexity in a support role. Typically requires 0-2 years of related experience. View Information Security Analyst I SalaryAlternate Job Titles:Data Security Analyst I, Information Security Specialist I, Information Systems Security Analyst I, Information Vulnerability/Risk Analyst I, InfoSec Analyst I, InfoSec Intrusion Investigation Analyst I, InfoSec/Access Control Analyst I, IS and Cyber Security Professional - Entry, Information Security Analyst I
-
Responsible for ensuring the security of the organization's systems and information assets. Develops and implements security systems, guidelines, and strategies. Protects against unauthorized access, use, disclosure, disruption, modification, and/or destruction. Conducts audits and risk assessments. Evaluates internal operations and controls and makes recommendations based on the findings. Migrates non-compliant environments to compliant environments. Ensures compliance with data protection guidelines and applicable laws. Typically requires a bachelor's degree. Typically reports to a manager. Occasionally directed in several aspects of the work. Gaining exposure to some of the complex tasks within the job function. Typically requires 2-4 years of related experience. View Information Security Analyst II SalaryAlternate Job Titles:Data Security Analyst II, Information Security Specialist II, Information Systems Security Analyst II, Information Vulnerability/Risk Analyst II, InfoSec Analyst II, InfoSec Intrusion Investigation Analyst II, InfoSec/Access Control Analyst II, IS and Cyber Security Professional - Intermediate, Information Security Analyst II
-
Responsible for ensuring the security of the organization's systems and information assets. Develops and implements security systems, guidelines, and strategies. Protects against unauthorized access, use, disclosure, disruption, modification, and/or destruction. Conducts audits and risk assessments. Evaluates internal operations and controls and makes recommendations based on the findings. Migrates non-compliant environments to compliant environments. Ensures compliance with data protection guidelines and applicable laws. Typically requires a bachelor's degree. Typically reports to a manager. Work is generally independent and collaborative in nature. Contributes to moderately complex aspects of a project. Typically requires 4-7 years of related experience. View Information Security Analyst III SalaryAlternate Job Titles:Data Security Analyst III, Information Security Specialist III, Information Systems Security Analyst III, Information Vulnerability/Risk Analyst III, InfoSec Analyst III, InfoSec Intrusion Investigation Analyst III, InfoSec/Access Control Analyst III, IS and Cyber Security Professional - Senior, Information Security Analyst III
-
Responsible for ensuring the security of the organization's systems and information assets. Develops and implements security systems, guidelines, and strategies. Protects against unauthorized access, use, disclosure, disruption, modification, and/or destruction. Conducts audits and risk assessments. Evaluates internal operations and controls and makes recommendations based on the findings. Migrates non-compliant environments to compliant environments. Ensures compliance with data protection guidelines and applicable laws. Typically requires a bachelor's degree. Typically reports to a manager. Work is highly independent. May assume a team lead role for the work group. A specialist on complex technical and business matters. Typically requires 7+ years of related experience. View Information Security Analyst IV SalaryAlternate Job Titles:Data Security Analyst IV, Information Security Specialist IV, Information Systems Security Analyst IV, Information Vulnerability/Risk Analyst IV, InfoSec Analyst IV, InfoSec Intrusion Investigation Analyst IV, InfoSec/Access Control Analyst IV, IS and Cyber Security Professional - Senior Specialist, Information Security Analyst IV
-
Responsible for ensuring the security of the organization's systems and information assets. Develops and implements security systems, guidelines, and strategies. Protects against unauthorized access, use, disclosure, disruption, modification, and/or destruction. Conducts audits and risk assessments. Evaluates internal operations and controls and makes recommendations based on the findings. Migrates non-compliant environments to compliant environments. Ensures compliance with data protection guidelines and applicable laws. Typically requires a bachelor's degree. Typically reports to a manager. Works autonomously. Goals are generally communicated in "solution" or project goal terms. May provide a leadership role for the work group through knowledge in the area of specialization. Works on advanced, complex technical projects or business issues requiring state of the art technical or industry knowledge. Typically requires 10+ years of related experience. View Information Security Analyst V SalaryAlternate Job Titles:Data Security Analyst V, Information Security Specialist V, Information Systems Security Analyst V, Information Vulnerability/Risk Analyst V, InfoSec Analyst V, InfoSec Intrusion Investigation Analyst V, InfoSec/Access Control Analyst V, IS and Cyber Security Professional - Expert Team Lead, Information Security Analyst V
-
Administers, coordinates, and evaluates security programs that support the strategy, policies, and standards established for the physical safety of all visitors, employees, or customers to the organization's facilities and the security of property and assets. Compiles data and analyzes results of audits, inspections, daily logs, and incident reports to assess security vulnerabilities, measure program effectiveness, and identify the need for additional resources. Coordinates any required security clearance processing or investigative research for employees or job candidates with applicable entities. Assists with the development of training, education programs, and communications on security policies and topics to ensure staff is prepared for potential security issues, crisis response, disaster recovery, evacuation, workplace violence, and other emergency events. Monitors communications and stays informed about local, state, provincial, or federal security-related information, directives, and events. May coordinate or assist with investigations and critical event responses in coordination with law enforcement and other officials. Understands law enforcement methods, tactics, and procedures. Typically requires a bachelor's degree or equivalent. Typically reports to a head of a unit/department. Occasionally directed in several aspects of the work. Gaining exposure to some of the complex tasks within the job function. Typically requires 2-4 years of related experience. View Security Specialist SalaryAlternate Job Titles:Corporate Safety & Security Analyst, Security SpecialistCategory : Facilities, Maintenance, and Repair
-
Plans and leads all information security activities within an organization. Responsible for determining the organization's information security policies and strategies. Provides leadership and oversight to the development, implementation, and enforcement of information security standards and procedures. Reviews risk evaluations, audits, and security incident investigations and presents information to senior leadership as needed. Stays current on the latest information security standards and best practices. Ensures compliance with data protection guidelines and applicable laws. May require a master's degree. Typically reports to top management. Manages a departmental function within a broader corporate function. Develops major goals to support broad functional objectives. Approves policies developed within various sub-functions and departments. Typically requires 8+ years of managerial experience. Comprehensive knowledge of the overall departmental function. View VP of Information Security SalaryAlternate Job Titles:VP of Data Security, VP of Information Security Risk, VP of Information Systems Security, VP of InfoSec, VP of InfoSec Intrusion, VP of InfoSec/Access Control, VP of IS and Cyber Security, VP, Information Security, VP of Information Security
-
Directs and leads the team responsible for ensuring the security of the organization's systems and information assets. Establishes and implements the overall strategies and procedures for the information security function. Develops and implements information security programs in accordance with organizational standards. Stays current on the latest information security standards and best practices. Ensures compliance with data protection guidelines and applicable laws. Requires a bachelor's degree. Typically reports to senior management. Manages a departmental sub-function within a broader departmental function. Creates functional strategies and specific objectives for the sub-function and develops budgets/policies/procedures to support the functional infrastructure. Typically requires 5+ years of managerial experience. Deep knowledge of the managed sub-function and solid knowledge of the overall departmental function. View Information Security Director SalaryAlternate Job Titles:Data and Cyber Security Director, Data Security Director, Information Systems Security Director, Information Vulnerability/Risk Director, InfoSec Director, InfoSec Intrusion Investigation Director, InfoSec/Access Control Director, IS and Cyber Security Director, Information Security Director
-
Provides security and guards buildings, grounds, materials, work sites, or other venues. Monitors security systems and responds to alarms, reports of issues, or requests for assistance. Patrols an assigned location. Follows required gate-keeping procedures such as verifying visitor credentials, conducting inspections, or preparing paperwork. May operate an access control or identity system to control building access. Completes shift activity logs and inputs to systems. Typically requires a high school diploma or equivalent. Requires Basic Life Support (BLS) certification. May require a Security Guard License. Typically reports to a supervisor. Works under the close direction of senior personnel in the functional area. Possesses a moderate understanding of general aspects of the job. May require 0-1 year of general work experience. View Security Guard - Unarmed SalaryAlternate Job Titles:Security Associate, Security Guard I, Security Patrol Specialist, Security Guard - Unarmed
-
Manages the team responsible for ensuring the security of the organization's systems and information assets. Oversees the development and implementation of security systems, guidelines, and strategies. Implements processes and procedures to protect the organization against unauthorized access, use, disclosure, disruption, modification, and/or destruction. Conducts and reviews audits and risk assessments. Reviews and evaluates internal operations and controls. Oversees the migration of non-compliant environments to compliant environments. Ensures compliance with data protection guidelines and applicable laws. Requires a bachelor's degree. Typically reports to a director. Manages subordinate staff in the day-to-day performance of their jobs. True first level manager. Ensures that project/department milestones/goals are met and adhering to approved budgets. Has full authority for personnel actions. Typically requires 5 years experience in the related area as an individual contributor. 1-3 years supervisory experience may be required. Extensive knowledge of the function and department processes. View Information Security Manager SalaryAlternate Job Titles:Data and Cyber Security Manager, Data Security Manager, Information Systems Security Manager, Information Vulnerability and Risk Mitigation Manager, InfoSec Intrusion Investigation Manager, InfoSec Manager, InfoSec/Access Control Manager, IS and Cyber Security Manager, Information Security ManagerCategories : IT - Manager , Executive and Management , IT - All , IT - Computers, Software , IT - Networking