Explore Jobs
Find Specific Jobs
Explore Careers
Explore Professions
Best Companies
Explore Companies
Cyber security analyst job growth summary. After extensive research, interviews, and analysis, Zippia's data science team found that:
The projected cyber security analyst job growth rate is 32% from 2018-2028.
About 35,500 new jobs for cyber security analysts are projected over the next decade.
Cyber security analyst salaries have increased 12% for cyber security analysts in the last 5 years.
There are over 8,895 cyber security analysts currently employed in the United States.
There are 64,387 active cyber security analyst job openings in the US.
The average cyber security analyst salary is $88,422.
Year![]() ![]() | # Of Jobs![]() ![]() | % Of Population![]() ![]() |
---|---|---|
2021 | 8,895 | 0.00% |
2020 | 13,440 | 0.00% |
2019 | 12,676 | 0.00% |
2018 | 22,093 | 0.01% |
2017 | 21,519 | 0.01% |
Year![]() ![]() | Avg. Salary![]() ![]() | Hourly Rate![]() ![]() | % Change![]() ![]() |
---|---|---|---|
2025 | $88,422 | $42.51 | +3.4% |
2024 | $85,509 | $41.11 | +2.3% |
2023 | $83,573 | $40.18 | +3.0% |
2022 | $81,160 | $39.02 | +3.1% |
2021 | $78,687 | $37.83 | +2.8% |
Rank![]() ![]() | State![]() ![]() | Population![]() ![]() | # of Jobs![]() ![]() | Employment/ 1000ppl ![]() ![]() |
---|---|---|---|---|
1 | District of Columbia | 693,972 | 611 | 88% |
2 | Virginia | 8,470,020 | 1,842 | 22% |
3 | Delaware | 961,939 | 213 | 22% |
4 | Maryland | 6,052,177 | 1,290 | 21% |
5 | Alaska | 739,795 | 149 | 20% |
6 | Alabama | 4,874,747 | 713 | 15% |
7 | Rhode Island | 1,059,639 | 157 | 15% |
8 | Vermont | 623,657 | 92 | 15% |
9 | Arizona | 7,016,270 | 968 | 14% |
10 | Minnesota | 5,576,606 | 796 | 14% |
11 | New Hampshire | 1,342,795 | 191 | 14% |
12 | Illinois | 12,802,023 | 1,621 | 13% |
13 | Georgia | 10,429,379 | 1,354 | 13% |
14 | Washington | 7,405,743 | 999 | 13% |
15 | Colorado | 5,607,154 | 744 | 13% |
16 | Connecticut | 3,588,184 | 466 | 13% |
17 | Nebraska | 1,920,076 | 254 | 13% |
18 | Montana | 1,050,493 | 134 | 13% |
19 | Pennsylvania | 12,805,537 | 1,505 | 12% |
20 | Oregon | 4,142,776 | 489 | 12% |
Rank![]() ![]() | City![]() ![]() | # of Jobs![]() ![]() | Employment/ 1000ppl ![]() ![]() | Avg. Salary![]() ![]() |
---|---|---|---|---|
1 | Newark | 6 | 18% | $88,415 |
2 | Springfield | 4 | 13% | $86,514 |
3 | Huntsville | 14 | 7% | $75,488 |
4 | Reston | 4 | 7% | $86,430 |
5 | Washington | 30 | 4% | $96,078 |
6 | Denver | 13 | 2% | $79,852 |
7 | Atlanta | 9 | 2% | $87,986 |
8 | Colorado Springs | 8 | 2% | $80,196 |
9 | Alexandria | 3 | 2% | $86,521 |
10 | Boston | 5 | 1% | $87,736 |
11 | San Francisco | 5 | 1% | $105,710 |
12 | Tampa | 4 | 1% | $83,003 |
13 | Arlington | 3 | 1% | $86,496 |
14 | Chicago | 10 | 0% | $82,567 |
15 | New York | 7 | 0% | $93,607 |
16 | San Diego | 6 | 0% | $95,108 |
17 | Phoenix | 5 | 0% | $89,254 |
Rider University
University of Alabama at Huntsville
Pace University
West Virginia State University
University of Maryland Global Campus
Pennsylvania State University - Altoona
Pennsylvania State University - Lehigh Valley
The University of Tampa
University of Tulsa
Zhengping Luo Ph.D.: Securing your first internship or job in your field can be challenging and sometimes frustrating. It's important to keep an open mind about all potential job opportunities in your field. While your first job may not be your dream job, gaining experience will improve your prospects as long as you remain in the field. Be patient, as you may face many rejections before landing a good position. It's worth noting that rejections are often not a reflection of your qualifications. Employers consider various factors when hiring, and many of which are often have nothing to do with your professional skills, so don't be discouraged. Simply keep moving forward without carrying the burden of past rejections. After securing your position, remain open to challenges, as they often provide opportunities to make a name for yourself and advance your career.
Zhengping Luo Ph.D.: Maximizing your salary potential hinges on providing value in a market-driven economy. Make sure to focus on developing skills that are in high demand. One of the tips is to consider expanding your horizons beyond where you grow up or the place you received your degree. Explore opportunities in locations that value your talents and offer competitive compensation, such as different cities, states, or even nations. Additionally, don't limit yourself to familiar job roles; be open to new positions and industries. The evolving job market continually creates new and unforeseen opportunities. While striving for financial success is important, it's equally vital to consider long-term goals and personal fulfillment. Prioritize maximizing life experiences and other cherished values alongside financial goals.
Tommy Morris Ph.D.: Cybersecurity is an ever evolving landscape. The tools you use in your job will change as your career progresses. Make sure to understand the underlying concepts behind the tools and the attacks you are defending against so that you can easily adapt to change.
Tommy Morris Ph.D.: Be close to the money. Cybersecurity is an expense to many organizations and a profit center for others, the ones that sell cybersecurity software and services. Try to work on the side that profits from cybersecurity if you want to make money.
Tommy Morris Ph.D.: Two skills are critical for the short term and long term in cybersecurity careers. Short term (3-5 years) artificial intelligence and machine learning will be a big trend in cybersecurity. Take a class in AI/MLand try to understand it can serve as a tool in your toolbox. Longer term, cybersecurity professionals need to be prepared to work on cross functional teams and be good communicators.
Dr. Darren Hayes: Many students add 'Excellent communication skills' to their resume but cannot explain what they mean by this. If you can demonstrate this by showing a website that you created, detailing your skills, portfolio of special projects, and other key successes, then it shows that you went the extra mile. Excellent communication skills can also be demonstrated with a YouTube video that you created, a presentation you gave at an academic conference or at other speaking engagements. Graduates looking for a job with Homeland Security that can demonstrate excellent writing skills are in need. My students who possessed excellent writing skills, in addition to technical skills, generally ended up making a higher salary. Those in high-ranking positions are generally assigned reporting responsibilities that require a good command of the English language. Critical thinking is also vitally important.
Dr. Darren Hayes: Artificial intelligence - in terms of automating certain areas of cybersecurity, such as acquiring threat intelligence, malware detection and being alerted to network breaches. Ransomware continues to be the primary concern for most organizations and using AI to quickly identify those threats and quickly respond will be key. AI can also be used in investigations, such as photo searches to identify where a suspect is or to find a missing person. Knowledge of current events - especially geopolitical events. These events have repercussions for the most sophisticated (state-sponsored) cyber attacks. Knowledge of a second, third or fourth language, is helpful now and will continue to be important - especially from a cybersecurity perspective because investigations often include foreign nationals. Knowledge of malware is really important for homeland security and this area of expertise will continue to be in demand. Incident response will continue to be understaffed and therefore tremendous opportunities will continue for those who can respond to network breaches, forensically analyze systems, examine malware, etc. Other areas of importance include, machine learning, quantum computing, open source intelligence (OSINT), threat intelligence (especially related to critical infrastructure and SCADA), cryptocurrencies, IoT threats and IoT evidence, to name but a few.
West Virginia State University
Computer Science
Dr. Ali Al-Sinayyid PhD: Cloud Security: With the increasing adoption of cloud computing, expertise in securing cloud environments will be crucial. Artificial Intelligence and Machine Learning (AI/ML): Leveraging AI and ML for threat detection, anomaly detection, and predictive analytics will be essential in staying ahead of sophisticated cyber threats. Privacy and Data Protection: With the rise of data privacy regulations like the California Consumer Privacy Act (CCPA), as amended by the California Privacy Rights Act (CPRA), skills in privacy engineering, data protection, and compliance will be in high demand. IoT Security: As the Internet of Things (IoT) continues to expand, securing connected devices and IoT ecosystems will become increasingly important. Threat Intelligence and Cyber Threat Hunting: Proactive threat intelligence gathering and cyber threat hunting skills will be essential for identifying and mitigating advanced cyber threats before they cause significant damage.
Dr. Ali Al-Sinayyid PhD: Maximizing salary potential when starting your career in cybersecurity requires strategic planning and ongoing skill development. Here are some steps to consider: Certifications: Obtaining industry-recognized certifications such as CompTIA Security+, CISSP, CISM, CEH, or CCSP can enhance your marketability and salary potential. Practical Experience: Highlight hands-on experience through internships, co-op programs, research projects, or freelance work to showcase your skills and capabilities to potential employers. Negotiate Salary: Research industry salary benchmarks and be prepared to negotiate your salary based on your qualifications, experience, and the value you bring to the organization. Stay Updated on Industry Trends: Stay abreast of emerging trends, technologies, and market demand in cybersecurity to position yourself for lucrative opportunities and career advancement. Network and Build Relationships: Cultivate relationships with professionals in the field, participate in industry events, and leverage networking opportunities to uncover hidden job opportunities.
Dr. Ali Al-Sinayyid PhD: I advise any graduate of computer science entering the cybersecurity field, to focus on continuous learning and practical experience. Stay updated on emerging technologies, threats, and best practices through professional development courses, certifications, and participation in industry conferences and events. Also, you need to seek opportunities for hands-on experience through internships, research projects, or collaboration with industry partners. Finally, consider specializing in a niche area of cybersecurity to differentiate yourself and enhance your expertise.
Jesse Varsalone: Obtaining additional industry certifications like CompTIA Security+, CISSP (Certified Information Systems Security Professional), and OSCP (Offensive Security Certified Professional) can make you a more valuable employee. If you are focused in an area like SOC (Security Operations Center), you can make yourself more well-rounded by learning a different role such as penetration (pen) testing. Adding an additional sector of cybersecurity will make you a more valuable asset to your present company and help you understand your current work role even better.
Jesse Varsalone: Cybersecurity graduates will need to learn to work with Artificial Intelligence (AI) as it becomes more integrated into daily IT tasks for problem solving. The proliferation of IoT (Internet of Things) devices connected to the network will increase the need for cybersecurity professionals to focus on securing these devices. Even more importantly, common cybersecurity tasks like securing and hardening will be even more paramount if networks include critical infrastructure devices. Cyberattacks can have far-reaching financial implications and cause serious damage to the reputation of companies. Attacks can also include intellectual property loss or the disclosure of personal information. As compromises including ransomware attacks continue to plague companies and organizations, it will be essential for cybersecurity professionals to know how to detect, respond to, and remediate these cyberattacks.
Jesse Varsalone: There are several things you can do to be successful in your career. Athletes in the NBA and NFL are at the highest level of competition, but they still go to practice all the time and participate in off-season workouts. Anyone in cybersecurity should also practice their skills on a regular basis. Microsoft, VMware, and Oracle provide free virtualization options where you can use Microsoft and Linux virtual machines to practice using the operating systems. Hackthebox and Tryhackme are two cybersecurity training platforms on which you can practice cybersecurity skills with free tiers. Both can help solidify skills and help you gain knowledge in areas of cybersecurity where you might want to expand your skill set. Some of the other ways that you can jump-start your career besides frequent practice include various networking opportunities within the cybersecurity community. Your college or community college may have a cyber team that you can join. Another option might be a local BSides conference (dedicated to advancing information security knowledge-sharing) or a local hackerspace like Unallocated in the Fort Meade, Maryland area. BSides events offer lock picking villages, capture the flag (CTF’s) competitions, and training sessions are all provided at a low cost.
Syed Rizvi PhD: Proficiency in cloud security will be increasingly vital as cloud technologies see widespread adoption. Understanding how to secure cloud environments, data, and applications will be in high demand. Furthermore, the utilization of AI and ML technologies for both offensive and defensive cybersecurity strategies underscores the need for professionals well-versed in these areas. Familiarity with compliance frameworks such as GDPR, CCPA, and HIPAA is essential, given the evolving landscape of data privacy regulations globally. Additionally, the ability to swiftly gather, analyze, and respond to cyber threats in real-time will be paramount as threats become more sophisticated and prevalent.
Syed Rizvi PhD: The field of cybersecurity is in a constant state of evolution, emphasizing the importance of continuous learning and staying abreast of the latest trends, technologies, and threats. Graduates should prioritize networking within the industry, as it can provide avenues for mentorship, collaboration, and career growth. Attending industry events, joining professional organizations, and connecting with established professionals are effective strategies. Practical experience holds significant value in cybersecurity; thus, seeking internships, participating in cybersecurity competitions, and engaging in personal projects are recommended to hone skills and build a robust portfolio. Additionally, while technical prowess is essential, soft skills such as communication, problem-solving, and teamwork are equally prized. Nurturing these skills alongside technical expertise is essential for professional success.
Syed Rizvi PhD: Acquiring certifications such as CISSP, CISM, CEH, and CRISC can demonstrate expertise and potentially lead to higher salaries within the industry. Graduates should consider specializing in niche areas within cybersecurity, such as penetration testing, incident response, or security architecture, where demand for skilled professionals is particularly high. Pursuing leadership roles, such as team lead or manager positions, can also yield higher salaries and increased responsibility. During salary negotiations, it is crucial to research industry standards and market rates for the specific role and location. Articulating one's skills, experience, and value proposition effectively can help justify desired salary expectations.
Pennsylvania State University - Altoona
Computer/Information Technology Administration And Management
Syed Rizvi: Proficiency in cloud security will be increasingly vital as cloud technologies see widespread adoption. Understanding how to secure cloud environments, data, and applications will be in high demand. Furthermore, the utilization of AI and ML technologies for both offensive and defensive cybersecurity strategies underscores the need for professionals well-versed in these areas. Familiarity with compliance frameworks such as GDPR, CCPA, and HIPAA is essential, given the evolving landscape of data privacy regulations globally. Additionally, the ability to swiftly gather, analyze, and respond to cyber threats in real-time will be paramount as threats become more sophisticated and prevalent.
Syed Rizvi: Acquiring certifications such as CISSP, CISM, CEH, and CRISC can demonstrate expertise and potentially lead to higher salaries within the industry. Graduates should consider specializing in niche areas within cybersecurity, such as penetration testing, incident response, or security architecture, where demand for skilled professionals is particularly high. Pursuing leadership roles, such as team lead or manager positions, can also yield higher salaries and increased responsibility. During salary negotiations, it is crucial to research industry standards and market rates for the specific role and location. Articulating one's skills, experience, and value proposition effectively can help justify desired salary expectations.
Syed Rizvi: The field of cybersecurity is in a constant state of evolution, emphasizing the importance of continuous learning and staying abreast of the latest trends, technologies, and threats. Graduates should prioritize networking within the industry, as it can provide avenues for mentorship, collaboration, and career growth. Attending industry events, joining professional organizations, and connecting with established professionals are effective strategies. Practical experience holds significant value in cybersecurity; thus, seeking internships, participating in cybersecurity competitions, and engaging in personal projects are recommended to hone skills and build a robust portfolio. Additionally, while technical prowess is essential, soft skills such as communication, problem-solving, and teamwork are equally prized. Nurturing these skills alongside technical expertise is essential for professional success.
Pennsylvania State University - Lehigh Valley
Curriculum And Instruction
Kermit Burley M.Ed.: I would tell any graduate who is just beginning their career to be certain to always give 100% effort and perhaps even just a bit more. You are doing this not only for your supervisor, but for yourself. This skill will eventually become a habit and will ultimately set you apart from your competition. Many graduates new to a job or position will frequently wait to have their supervisor tell them what to do. The truly successful graduate will always seek to solve problems and then do more than what is expected. And believe me, having been a supervisor many times in my career, this high effort person will be noticed and rewarded.
Kermit Burley M.Ed.: The easiest way to maximize your salary potential is to graduate with an outstanding GPA and undergraduate career that includes at least one minor, several certifications and involvement in clubs, activities and volunteer opportunities during your undergraduate experience. When I was at Hewlett Packard, I frequently had the opportunity to interview recent college graduates and I always asked them what they did in college besides attending classes. Way too often, graduates would only attend classes and then go home. Granted, many of our students have to work while attending college, and when I was interviewing those recent graduates, I always took that into account, and I valued it highly. However, the graduates that I tended to hire also managed to pack in an activity, club or two, to their very busy days. And why did I value these activities so highly? Simply put, it showed initiative, which I have discovered is a very rare trait indeed. When I uncovered this in an applicant, they went to the top of my Must hire" list.
I also firmly believe that an outstanding internship experience is vital when attempting to maximize your salary potential. In our Cyber and IT programs here at Penn State Lehigh Valley, we require an internship for graduation, and I also highly encourage my students to find more than one internship. In an internship you get to "try on" a company and see if it is a fit for you. Having multiple internships also gives our students a window into how different companies work and also allows our students to see different corporate cultures to find their individual "fit" A really successful internship almost always leads to a job offer and usually an offer that the company will maximize in order to keep a student with high potential that also has proven their worth within their company during their internship."
Kermit Burley M.Ed.: In my fields of Cyber and Information Technology we truly need the abilities to be always learning and always preparing for the next great breakthrough or the next big threat. So, adaptability and a willingness to always be learning are essential for success. Of course, our greatest challenge now and certainly in the next 3-5 years will be AI. (Artificial Intelligence) It is already upon us and has the potential to revolutionize our field and the entire landscape of what we do. The ability to stay ahead of that very steep hill will require constant innovation and an ability to accurately anticipate what is coming just around the corner. What I also see is an increased need for "people" skills, the ability to lead a team of people to achieve goals and budgetary requirements. All too often graduates in Cyber and IT are stereotyped as not having any people skills at all and preferring to work alone. This stereotype must end and those graduates who possess people skills will be in great demand not only in the next 3-5 years, but for decades to come.
The University of Tampa
Information and Technology Management Department
Louis Bobelis: Cybersecurity is emerging as one of the hottest and most desirable job industries globally, so I feel student graduates must stick out far beyond just what their degree provides them with. As an IT-based profession, Industry Standard Certificates play a crucial role in the hiring process because it assures the individual as the basic knowledge set required to fulfill a "base-level" qualification. In the current job market, I would say it is almost mandatory to have a CompTIA Security+ in order to be competitive. SSCP, CEH, OSCP, CCSP, and CySA+ are other great options but may be more difficult for graduates.
Louis Bobelis: I feel the most important soft skill is character. Being outspoken and able to explain technical cyber incidents decisively and clearly for non-IT-oriented people in your organization is especially important when you are in more senior-level positions.
Louis Bobelis: An ability to triage events and understand a cyber investigation process. Understand how to sandbox a file and locate IOCs (Indicators of Compromise) within the file. Knowing and understanding the MITRE Kill Chain and other Cybersecurity standards.
Louis Bobelis: In this industry, certificates truly do go a long way, and in some organizations, you cannot elevate or find growth without acquiring specific certifications. This is not always the case and showing your worth in your internal organization by coming up with ideas that can make the current processes more efficient is always a great way to attract promotion.
University of Tulsa
School of Accounting and CIS at the Collins College of Business
Sal Aurigemma Ph.D.: Students graduating with Information Systems and related degrees usually have little problem finding employment upon graduation. However, the pandemic upended that paradigm for some. For those who recently graduated and are still looking for employment, keep the faith and develop your technical skills. Developers should show prospective employers that they are familiar with agile programming methodologies and modern DevOps stacks and processes. Data analysts should be focused on presenting their ability to work with structured and unstructured data, effectively query data using SQL & NoSQL, and, most importantly, provide actionable insight by making data accessible and relatable to decision-makers at all levels of an organization. Those interested in cloud architecture and cyber security careers have to keep current on their skills and certifications. Cloud engineers need to stay aware of the constant changes happening at the major providers (AWS, Azure, GCP) and, as with all other IT fields, provide tangible evidence of your skills via real projects that you have worked on. Prospective cyber security analysts should first focus on identifying their first specialization because there are too many security roles to learn them all at once, especially as beginners. Two popular entry-level cyber security jobs include information security consultant and Security Operations Center (SOC). Both of these roles require a sound foundation in networking fundamentals, vulnerability identification and mitigation, and an understanding of organizationally relevant security and privacy frameworks and regulations.