Search Salaries

Click on job titles to view salary data, or select 2 jobs to compare.

Salaries

View salary and benefits information
Alternate job titles: Information Security Analyst II | Information Systems Security Analyst II | Information Vulnerability/Risk Analyst II | InfoSec Intrusion Investigation Analyst II | IS and Cyber Security Professional - Intermediate

The Data Security Analyst II protects against unauthorized access, modification, or destruction and develops IT security policies and standards. Completes tasks designed to ensure security of the organization's systems and information assets. Being an Data Security Analyst II implements policies or procedures and tracks compliance throughout the organization. Works with end users to determine needs of individual departments. In addition, Data Security Analyst II typically requires a bachelor's degree or its equivalent. Typically reports to a manager. Being an Data Security Analyst II gains exp more...



Alternate job titles: Data Analytics Analyst II

Supports operations and conducts data analytics projects to provide information and insights to stakeholders for decision-making or solution development. Implements data standards and deploys automation tools to extract, synthesize, and validate data from different sources and transform data into usable metrics. Constructs data sets, monitors data quality, troubleshoots and resolves database issues to ensure data integrity. Utilizes scripting and querying tools like Python, R or SQL, data visualization/BI tools, statistical methods, and data modeling to produce reports, data files, and dashboa more...


Alternate job titles: Data Security Analyst II | Information Systems Security Analyst II | Information Vulnerability/Risk Analyst II | InfoSec Intrusion Investigation Analyst II | IS and Cyber Security Professional - Intermediate

Completes tasks designed to ensure security of the organization's systems and information assets. Protects against unauthorized access, modification, or destruction and develops IT security policies and standards. Works with end users to determine needs of individual departments. Implements policies or procedures and tracks compliance throughout the organization. Typically requires a bachelor's degree or its equivalent. Typically reports to a manager. Gains exposure to some of the complex tasks within the job function. Occasionally directed in several aspects of the work. Typically requires 2 more...


Alternate job titles: Information Security Analyst IV | Information Systems Security Analyst IV | Information Vulnerability/Risk Analyst IV | InfoSec Intrusion Investigation Analyst IV | IS and Cyber Security Professional - Senior Specialist

The Data Security Analyst IV collaborates with a team of information security analysts to provide subject matter expertise on application development, database design, and network maintenance. Designs and implements information security standards for applications and databases. Being an Data Security Analyst IV assesses client needs against security concerns and resolves information security risk issues. Researches and advocates the latest technologies and solutions to support the security requirements of internal and external customers. In addition, Data Security Analyst IV trains security aw more...



Alternate job titles: Information Security Analyst V | Information Systems Security Analyst V | Information Vulnerability/Risk Analyst V | InfoSec Intrusion Investigation Analyst V | IS and Cyber Security Professional - Expert Team Lead

The Data Security Analyst V designs and implements information security standards for applications and databases. Identifies potential information and network or internet security vulnerabilities. Being an Data Security Analyst V ensures site security and provides consultation on security issues staying abreast of current malware and other potential internet security threats. Conducts analysis, investigates and recommends security technologies. In addition, Data Security Analyst V typically requires a bachelor's degree. Typically reports to a manager. Being an Data Security Analyst V works on more...


Alternate job titles: Information Security Analyst III | Information Systems Security Analyst III | Information Vulnerability/Risk Analyst III | InfoSec Intrusion Investigation Analyst III | IS and Cyber Security Professional - Senior

The Data Security Analyst III protects against unauthorized access, modification, or destruction and develops IT security policies and standards. Completes tasks designed to ensure security of the organization's systems and information assets. Being an Data Security Analyst III understands internet architecture and firewall configuration to protect system security. Works with end users to determine needs of individual departments. In addition, Data Security Analyst III may need to authorize user access and familiar with domain structures and digital signatures. Requires a bachelor's degree or more...



Alternate job titles: Information Security Analyst I | Information Systems Security Analyst I | Information Vulnerability/Risk Analyst I | InfoSec Intrusion Investigation Analyst I | IS and Cyber Security Professional - Entry

The Data Security Analyst I protects against unauthorized access, modification, or destruction. Completes tasks designed to ensure security of the organization's systems and information assets. Being an Data Security Analyst I implements policies or procedures and tracks compliance throughout the organization. Works with end users to determine needs of individual departments. In addition, Data Security Analyst I typically requires a bachelor's degree or its equivalent. Typically reports to a manager. Being an Data Security Analyst I works on projects/matters of limited complexity in a support more...


Alternate job titles: Network Risk and Security Analyst II

Ensures the security of an organization's networks and systems. Performs network security assessments and risk analysis, and makes recommendations to improve network security. Investigates security incidents and breaches. Recommends and deploys appropriate security products and solutions for various network platforms. Configures and maintains firewalls and other network security tools and software. May conduct security trainings with employees. Typically requires a bachelor's degree. Typically reports to a manager or head of a unit/department. Occasionally directed in several aspects of the wo more...


Alternate job titles: Threat Assessment Analyst II

The Security Research Analyst II identifies and researches new potential threats using public and private information, open-source intelligence (OSINT), and other effective research techniques. Assesses risks and threats such as crime or terrorism to protect an organization's employees, property, affairs, brand, and events. Being a Security Research Analyst II assists decision-making in crises. Establishes clear, effective, and proactive plans for avoiding or mitigating newly emerged or evolving threats. In addition, Security Research Analyst II investigates incidents that expose potential iss more...



Alternate job titles: Enterprise Data Management Analyst II | MDM Analyst - Experienced

Creates, implements, and maintains master data management solutions that enable users to optimize system capabilities. Uses knowledge of end-to-end data processes to analyze, cleanse, and enrich master data elements, and ensure that data flows efficiently and consistently between users and stakeholders. Provides data governance and ensures data integrity by coordinating data management efforts across the organization. Troubleshoots issues related to master data management and identifies opportunities for improving data management processes. Requires a bachelor's degree. Typically reports to a more...


Hot Topics for HR Professionals

Make Decisions With Confidence

CompAnalyst delivers faster decision making, and new insights into your pay practices. You can explore new intersections between market, company, and employee data with enhanced data integrations.With powerful tools and streamlined workflows, you can price jobs quickly and access the information you need to get pay right.

Make it Simple

Creating job descriptions can be challenging, but it doesn't have to be.

With JobArchitect you can easily build and standardize your job descriptions using your existing content, format and branding or use one of the templates from our extensive library. And you can access CompAnalyst® job summaries or search across local job postings to write descriptions with ease.

To simplify things further, we make it easy to publish job postings from an approved job description.

Global Insights

Get comprehensive data and insights from your peers in the global pay markets you care about most. Connect your global teams to the pricing intelligence they need to recruit and retain talent in 100 countries.

Hot Topics for Job Salary Data

Adjust Employee Salary

Individualize employee pay based on unique job requirements and personal qualifications.

Price My Industry Jobs

Get the latest market pricing for benchmark jobs and jobs in your industry.

For Employers

Individualize employee pay based on unique job requirements and personal qualifications.

Get the latest market pricing for benchmark jobs and jobs in your industry.

For Employees

Analyze the market and your qualifications to negotiate your salary with confidence.

Search thousands of open positions to find your next opportunity.