Average information security analyst salary by state (2020)
State | Per hour | Per year |
---|---|---|
Alabama | $41.65 | $86,640 |
Alaska | $43.94 | $91,390 |
Arizona | $48.52 | $100,930 |
Arkansas | $43.03 | $89,500 |
California | $60.57 | $125,990 |
Colorado | $51.72 | $107,590 |
Connecticut | $49.63 | $103,230 |
Delaware | $55.49 | $115,420 |
District of Columbia | $57.43 | $119,460 |
Florida | $45.77 | $95,190 |
Georgia | $49.36 | $102,670 |
Hawaii | $44.20 | $91,930 |
Idaho | $47.16 | $98,090 |
Illinois | $51.61 | $107,340 |
Indiana | $40.11 | $83,430 |
Iowa | $41.26 | $85,820 |
Kansas | $43.28 | $90,030 |
Kentucky | $39.82 | $82,830 |
Louisiana | $36.70 | $76,340 |
Maine | $41.86 | $87,070 |
Maryland | $53.51 | $111,310 |
Massachusetts | $51.92 | $108,000 |
Michigan | $46.04 | $95,760 |
Minnesota | $49.88 | $103,750 |
Mississippi | $35.75 | $74,360 |
Missouri | $44.12 | $91,770 |
Montana | $37.30 | $77,590 |
Nebraska | $43.93 | $91,370 |
Nevada | $52.34 | $108,870 |
New Hampshire | $50.66 | $105,380 |
New Jersey | $59.27 | $123,280 |
New Mexico | $53.43 | $111,130 |
New York | $60.54 | $125,920 |
North Carolina | $50.79 | $105,640 |
North Dakota | $44.56 | $92,690 |
Ohio | $45.30 | $94,220 |
Oklahoma | $42.30 | $87,970 |
Oregon | $50.65 | $105,350 |
Pennsylvania | $50.33 | $104,680 |
Rhode Island | $46.82 | $97,380 |
South Carolina | $41.73 | $86,790 |
South Dakota | $45.94 | $95,560 |
Tennessee | $43.77 | $91,030 |
Texas | $54.52 | $113,400 |
Utah | $44.43 | $92,410 |
Vermont | $43.77 | $91,040 |
Virginia | $56.21 | $116,920 |
Washington | $54.08 | $112,480 |
West Virginia | $47.72 | $99,250 |
Wisconsin | $41.14 | $85,570 |
Wyoming | $37.91 | $78,850 |
All salary data courtesy of the Bureau of Labor Statistics. |
Cybersecurity analyst salary vs. other IT jobs (2020)
Job / Career | Per hour | Per year |
---|---|---|
Network and Computer Systems Administrators (BLS) | $89,460 | $43.01 |
Computer Programmer (BLS) | $95,640 | $45.98 |
Data Scientists (BLS) | $103,930 | $49.97 |
Information Security Analyst (BLS) | $107,580 | $51.72 |
Software Engineer / Developers (BLS) | $114,270 | $54.94 |
How to get paid more and advance
These salary ranges do not represent starting pay in entry-level positions. You’ll need to work hard and prove yourself to climb the ladder and reach the top rungs.
If you want to earn the highest salary in the field of cybersecurity, there are a few factors that play a significant role:
- Your education. In the field of cybersecurity, your education never ends. A bachelor’s degree in cyber security program can help you build strong foundational skills. Advancing your career may require earning a specialty Master of Science or Master of Business Administration (MBA) degree in the future.
- Certification. Getting certified in key areas can help you improve your qualifications for the job you’re looking for. Some employers may require certain certifications to consider you for an interview.
- Experience. Professional experience can speak volumes in an interview for a senior position. Much of the value of your first entry-level job comes in your personal and professional development earned through on-the-job experience.
Frequently Asked Questions
People who look at cybersecurity programs may also be interested in different types of IT degrees, such as a computer networking bachelor's degree. With this degree, students learn how to install, configure, administer and maintain elements of computer network systems including software, operating systems, and programming languages.
Another popular degree choice is an information technology (IT) degree program. This degree can help prepare students to install, maintain, manage, repair and secure complex computer network systems. IT technicians support customers who are experiencing computer-related problems and troubleshoot components, hardware and software, including printers, scanners, email and work processes.
Students with a stronger interest in building applications or learning to code may prefer to explore our software development or computer programming degree programs.
As part of a cybersecurity degree program, you will take classes that provide you a fundamental knowledge of networks and information software. Herzing’s curriculum includes course topics in:
- Cyber Law and Ethics
- Database Concepts and Applications
- Ethical Hacking
- IT Project Management
- Network and Server Operating Systems
- Network Defense
- Network Security
- Programming Logic
On average, it takes 32 months to earn your degree in cybersecurity from Herzing University and become a cybersecurity analyst. You may be able to decrease how much time it takes by transferring up to 90 prior approved college credits into our bachelor’s degree program.
Yes, it's worth it!
Today, cybersecurity is more important now than ever before. There are large amounts of sensitive data online, including personally identifiable information (PII), protected health information (PHI), and intellectual property, all of which needs protecting.
In addition to potential high earnings and a strong projected job outlook, the field can also be personally rewarding because you can help protect important data belonging to people and organizations. The field is growing, with more and more doors opening up to great career opportunities.
If you enjoy IT, problem solving, and enjoy technical challenges, take the first step with Herzing University and start your new career.
As with any skill, learning cybersecurity takes study, practice, and hard work. However, anyone who takes genuine interest in programming, how computer networks work, and security in the age of technology is capable of learning the fundamentals of cybersecurity.
Cybersecurity specialists develop and deploy the plans and software that keep data secure, private, sound, and accessible by the right people within a business or organization.
Information assurance professionals focus on the business more than the software. Instead of focusing on the design of the security, they focus more on determining what data to protect, to what extent, and whether the protections are effective. and whether the protections are effective.