Cyber Security Jobs 2016-10-27T16:08:01+00:00

Popular Cyber Security Jobs

There are many different cyber security jobs within the field that require a broad range of knowledge, skills, and abilities. According to the National Initiative for Cybersecurity Careers and Studies (NICCS), “cyber security professionals must have the ability to rapidly respond to threats as soon as they are detected.”1 Professionals must also possess a range of technical abilities to perform a variety of activities and be able to work in different locations and environments.

The work environment for cyber professionals is dynamic and exciting, with competitive salaries and growing opportunities. If you are thinking cyber security jobs, learning about the field’s unique requirements will help you determine whether it is a good fit for you.

1  NICCS

Information Security Analyst

People in this role often plan and implement security programs to protect computer networks and systems. They are known as gatekeepers or security guards of information systems.

Also Known As

Information Systems Security Professionals and Network Security Analysts

Computer Systems Analyst

Those in this role have knowledge of both business and IT. They merge business and IT initiatives within an organization to help businesses operate efficiently and effectively.

Also Known As

Systems Analyst or Cybersecurity Analyst

Computer System Administrator

Computer System Administrators oversee various components of an organization's computer systems. They also maintain an organization’s work flow and keep its lines of communication open.

Also Known As

System Administrators, Server Administrators, and Network Administrators

Information Systems Manager

People in this role determine IT goals of an organization and are responsible to implement computer systems to meet those goals.

Also Known As

Cybersecurity Managers, Cybersecurity Administrators, and System Managers

Learn more about these cyber security jobs below:

Graphic showing a map and a lock
Requirements:

An undergraduate degree is a must but many employers may also require advanced education in cybersecurity.

Job Responsibilities Include:

  • Plan and implement security programs to protect computer networks and systems
  • Stay up-to-date with current IT security standards and best practices
  • Technology savvy thinking
Requirements:

A bachelor’s degree in computer or information science, computer engineering, or electrical engineering is mandatory. Employers may also require administrators to be certified in the product they use.

Job Responsibilities Include:

  • Oversee the various components of an organization’s computer systems, from local area networks to intranets and other data communication systems
  • Determine the organization’s needs before systems are set up and then collect and evaluate performance data to ensure systems are working optimally
  • Maintain network security
Requirements:

A bachelor’s degree in computer or information science is mandatory though many employers may require a graduate degree in information systems or cybersecurity as well.

Job Responsibilities Include:

  • Plan, coordinate, and direct an organization’s computer activities
  • Assess the cost and benefits of new IT projects and justify expenditures to senior managers by determining personnel needs and the overall technology strategy of the enterprise
  • Oversee network and data security by establishing policies, procedures, and training
Requirements:

A bachelor’s degree in computer or information science, computer engineering, or electrical engineering is mandatory. Employers may also require administrators to be certified in the product they use.

Job Responsibilities Include:

  • Oversee the various components of an organization’s computer systems, from local area networks to intranets and other data communication systems
  • Determine the organization’s needs before systems are set up and then collect and evaluate performance data to ensure systems are working optimally
  • Maintain network security

Other Cyber Security Jobs

Overview: A CISO is an executive who is responsible for safeguarding data held by a company or organization.

Requirements: Many CISOs work their way up from IT positions after acquiring several years of experience in systems security and demonstrating managerial skills. In addition, IT management positions typically require at least a 4-year degree, and graduate degrees are becoming more common. Optional product and professional information security certifications are encouraged.

Job Responsibilities: Work with business managers, chief executive officers and IT managers to observe and monitor the security websites, applications, computers and databases. Establish company-wide security protocols that require user identification and passwords and protect networks from hackers. Keep current on antivirus software, firewalls and other security systems. Develop emergency procedures for handling security breaches, manage internal communication regarding system updates and provide estimates of budgetary requirements for technical upgrades.

 

Overview: Cryptographers analyze and decipher encrypted data to assist law enforcement or government agencies in solving crime, threats or security concerns.

Requirements: A bachelor’s degree in mathematics, computer science or related field is required. A graduate degree and security clearance are often required as well.

Job Responsibilities: Apply mathematical theories to solve problems in various industries, including engineering, business and science. Analyze and decipher encryption systems as well as develop new encryption algorithms. Develop statistical or mathematical models to analyze data and come up with methods to correct problems. Test these models for accuracy and reliability.

 

Overview: Computer forensic analysts combine their computer science background with their forensic skills to recover information from computers and storage devices.

Requirements: A bachelor’s degree in computer science or information technology is required, and a background in criminal justice does not hurt. A Certified Forensic Computer Examiner (CFCE) certification is also required.

Job Responsibilities: Recover data such as documents, photos and e-mails from computer hard drives and other data storage devices that have been deleted, damaged, or otherwise manipulated. Work on cyber crime cases and examine computers that may have been involved in other types of crime in order to find evidence of illegal activity.

Overview: Incident Responders investigate computer-related crimes within an organization.

Requirements: A bachelor’s degree in computer science or an equivalent combination of education and work experience is usually required. A Certified Information Systems Security Professional (CISSP), GIAC Certified Incident Handler (GCIH), or GIAC Certified Forensic Analyst (GCFA) certification is preferred.

Job Responsibilities: Use computer forensic tools to examine and analyze electronic media in suspected computer hacking cases. Write detailed, easy-to-read reports. May be called to testify in court as a fact or expert witness. Work with outside departments to develop incident remediation solutions.

Overview: A penetration tester tries to break into or find possible exploits in different computer systems and software.

Job Responsibilities: Conduct formal tests on web-based applications, networks and other types of computer systems on a regular basis. Work on physical security assessments of servers, computer systems and networks. Conduct regular security audits from both a theoretical standpoint and a technical/hands-on standpoint. Work on the security of wireless networks, databases, software development and company secrets.

Overview: A security administrator is responsible for the maintenance of computer hardware and software that comprises a computer network.

Requirements:A bachelor’s degree with at least five years of related experience is required. Additional certification is usually preferred.

Job Responsibilities: Deploy, configure, maintain and monitor active network equipment. Concentrate on the overall health of the network, server deployment, and security. Ensures network (LAN/WAN, telecommunications, and voice)security access and protects against unauthorized access, modification or destruction.

Overview: A security analyst is responsible for maintaining the security and integrity of data.

Requirements: Requires at least a bachelor’s degree, but many employers may also require advanced education in cybersecurity.

Job Responsibilities: Plan and implement security programs to protect all computer networks and systems. Develop reports to share with administrators about the efficiency of security policies and recommend any changes. Stay up-to-date with current IT security standards and best practices. Plan and document all security information in the company.

Overview: A security architect is responsible for building computer security applications and maintaining them for a company’s computer system.

Requirements: A bachelor’s degree in computer science is required, but some employers seek candidates with knowledge of software engineering practices as well. Additional certification is usually preferred.

Job Responsibilities: Recommend ways to improve and update the security of the company’s computers. Recommend ways to improve a systems security through both hardware and software. Set user policies and protocols, monitor them, and enforce them. Set up countermeasures that protect the system when an unauthorized user attempts to gain access to the system.

Overview: A security auditor works with a company to provide an audit of security systems used by the company.

Requirements: At minimum, a bachelor’s degree must be earned, and certification is often highly recommended and may be required by some employers prior to hiring.

Job Responsibilities: Determine the integrity of the company’s security system. Test policies put forward by the company to determine whether there are risks associated with them. Interview members of the staff to learn about any security risks or other complications within the company. Provide the company with a detailed report of information systems.

 

Overview: A security consultant advises companies in securing and protecting their computer systems.

Requirements: A bachelor’s degree in information technology or related field is usually required, but some employers will accept an associate’s degree with many years of related experience. Additional certification is highly encouraged.

Job Responsibilities: Assess existing IT systems and infrastructures for weaknesses and then develop and implement IT security solutions to prevent unauthorized access, data modification or data loss.

Overview: A security director is a combination of security consultant, security manager and security advisor, and is responsible for ensuring security of a company’s computer system.

Requirements: A bachelor’s degree in computer science, information systems or related fields is required. Some companies require a master’s degree in related field. Suitable cyber certifications are also preferred.

Job Responsibilities: Establishes, plans and administers the overall policies, goals and procedures for the information technology security function within an organization. Initiates, implements and develops IT security and disaster recovery programs in accordance with organizational standards. Performs and evaluates IT technology risk on a regular time schedule and promotes IT security awareness within the organization.

Overview: The security engineer is responsible for designing, evaluating and testing the security of systems to ensure that the systems and data integrity of an organization is being maintained and up-to-date.

Requirements: A bachelor’s degree in computer science, software engineering or related field is required. An IT security certification such as CISSP is preferred.

Job Responsibilities: Ensure that sensitive data including confidential client data, trade secrets, and financial records is safeguarded from cyber attacks. Monitor computer security systems, visitors to the network and organizational users. Encrypt data in the systems as and when required. Maintain back ups and upgrade systems as and when required.

Infographic showing employers and estimated salary for information system managers and information system analysts

Overview: A cybersecurity manager protects information systems and computer networks from cyber attacks, intrusions, malware and various types of data breaches.

Requirements:Many cybersecurity manager jobs require a four-year degree in information technology, computer science, engineering or a related discipline. Some employers show preference to candidates with advanced degrees or industry certifications.

Job Responsibilities:Know where a network’s possible vulnerabilities lie. Stay on top of the methods cyber criminals use to infiltrate information systems and use expertise to avert these efforts. Protect organizations from losing data, such as customers’ credit card information and valuable trade secrets.

Overview: Security software developers are concerned with facets of the software development process, including the research, design, programming, testing and quality assurance of computer software.

Requirements: A bachelor’s degree in computer science and strong computer programming skills are required. Additions industry certification is usually preferred.

Job Responsibilities:Develop the applications that allow people to do specific tasks on a computer. Address security, software assurance, and survivability throughout the development process.

Overview: Security specialists work with companies to build secure computer systems.

Requirements: A bachelor’s degree in computer science or information systems is excellent preparation for this occupation. Additional certification is usually preferred.

Job Responsibilities: Question managers and staff about their current security methods. Find out what information the company wants to protect. Learn what information employees should be able to access. Plan the security system and regularly train staff on how to use security software and properly use computers to prevent any problems.

Overview: Security auditors work with companies to provide an audit of their security systems.

Requirements:At minimum, a bachelor’s degree in computer science or related field must be earned. Certification is often highly recommended and may be required by some employers.

Job Responsibilities: Determine the integrity of computer security systems. Test policies put forward by a company to determine whether there are risks associated with them. Interview members of the staff to learn about any security risks or other complications within the company.

Overview: A vulnerability assessor reviews and analyzes a computer network for possible security vulnerabilities and loopholes.

Requirements: A bachelor’s degree in computer science, software engineering related field is required. Certified Vulnerability Assessor Certification (CVA) is recommended and preferred by most employers.

Job Responsibilities: Assess the security strength of computer networks. Find vulnerabilities that can compromise the overall security, privacy and operations of a network.Provide detailed assessment to network administrators so they can evaluate the security architecture and defense of a network against vulnerabilities and threats.

Overview: Network security engineers build and maintain IT security solutions for an organization.

Requirements: A bachelor’s degree in computer science is required. A master’s of technology in computer science may also be required. Certified training in network security based operating systems also preferred.

Job Responsibilities: Implement, maintain and integrate the corporate WAN, LAN, and server architecture. Implement and administer network security hardware and software. Enforce network security policy and comply with requirements of external security audits and recommendations. Maintain and administer perimeter security systems such as firewalls and intrusion detection systems.

Overview: An information system auditor performs detailed evaluation and internal control and audit reviews of computer information systems.

Requirements: A bachelor’s degree in computer science or business related field is required. Cert Information Systems Auditor (CISA), or Cert Internal Auditor (CIA) preferred and often required.

Job Responsibilities: Develop and maintain audit software. Consult with administrators and staff on computer information systems operational issues. Perform informal control reviews to include system development standards, operating procedures, system security, programming controls, communication controls, backup and disaster recovery, and system maintenance.

Overview: An application programmer is someone who has acquired high-level skills in a variety of computer programming languages and uses those skills to modify and create new software applications.

Requirements: A bachelor’s degree in computer science, computer programming or computer application development is required. Additional certification is usually preferred.

Job Responsibilities: Review, analyze and modify application systems including encoding, testing, debugging and documentation. Analyze and resolve problems associated with application systems. Detect, diagnose and report related problems.

Overview: Database administrators perform all activities related to maintaining a successful database environment.

Requirements: A bachelor’s degree in an information- or computer-related subject such as compute science is required. Before becoming a database administrator, candidates usually have some related work experience.

Job Responsibilities: Design, implement and maintain database systems. Establish policies and procedures pertaining to the management, security, maintenance and use of the database management system. Train employees in database management and use. Stay abreast of emerging technologies and new design approaches.

Overview: A security architect is responsible for maintaining the security of a company’s computer system.

Requirements: A bachelor’s degree in computer science or computer engineering is required, along with specific training and certification in security architecture.

Job Responsibilities: Review computer systems and gain an understanding of how the systems are used, who is using them and where the weak points are. Anticipate the moves and tactics of hackers. Stay current in order to improve outdated systems and make recommendations to strengthen security on relatively new ones. Set policies and enforce them, regularly checking for compliance.

Overview: A security specialist prevents cyber attacks on information systems and keeps criminals from gaining access financial information, military secrets and other confidential data.

Requirements: A bachelor’s degree in computer science, information systems or related discipline is required. Employers may show preference to candidates with experience, industry certifications, or both.

Job Responsibilities: Design, install and manage security mechanisms that protect networks and information systems against hackers, breaches, viruses and spyware. Respond to incidents, investigate violations and recommend enhancements to plug potential security gaps. Research data, learn about new technologies and gather information on the latest risks.

 

Overview: Information assurance technicians ensure that the right information gets to the right people at the right time through the use of risk management, architecture, system safety and security.

Requirements: A bachelor’s degree in computer science, information technology or related field is usually required.A Certified Information Systems Security Professional (CISSP) or GIAC Security Leadership Certificate (GSLC) certification is preferred.

Job Responsibilities: Assure information and manage risks related to the use, processing, storage, and transmission of information or data and the processes used for those purposes. Protect the integrity, availability, authenticity, non-repudiation and confidentiality of user data. Use physical, technical and administrative controls to accomplish these tasks.

Infographic showing employers and estimated salaries for computer system analysts and network and computer system admins