Overview
Responsibilities
T-A-S-K
Education
Income & Employability
Video Resources
Related Careers

Description

Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. Assess system vulnerabilities for security risks and propose and implement risk mitigation strategies. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses.

Interests

  • Conventional
  • Investigative

Learn More about Interests

Work Values

  • Working Conditions
  • Independence
  • Support

Learn More about Work Values

Work Styles

  • Attention to Detail
  • Dependability
  • Integrity
  • Analytical Thinking
  • Cooperation

Learn More about Work Styles

Tasks

  • Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
  • Monitor current reports of computer viruses to determine when to update virus protection systems.
  • Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.
  • Perform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures.
  • Modify computer security files to incorporate new software, correct errors, or change individual access status.

Work Activities

  • Working with Computers
  • Getting Information
  • Identifying Objects, Actions, and Events
  • Evaluating Information to Determine Compliance with Standards
  • Analyzing Data or Information

Detailed Work Activities

  • Using computers and computer systems (including hardware and software) to program, write software, set up functions, enter data, or process information.
  • Observing, receiving, and otherwise obtaining information from all relevant sources.
  • Identifying information by categorizing, estimating, recognizing differences or similarities, and detecting changes in circumstances or events.
  • Using relevant information and individual judgment to determine whether events or processes comply with laws, regulations, or standards.
  • Identifying the underlying principles, reasons, or facts of information by breaking down information or data into separate parts.
  • Compiling, coding, categorizing, calculating, tabulating, auditing, or verifying information or data.
  • Entering, transcribing, recording, storing, or maintaining information in written or electronic/magnetic form.
  • Keeping up-to-date technically and applying new knowledge to your job.
  • Providing information to supervisors, co-workers, and subordinates by telephone, in written form, e-mail, or in person.
  • Analyzing information and evaluating results to choose the best solution and solve problems.

Technology Skills

  • Web platform development software
  • Data base user interface and query software
  • Transaction security and virus protection software
  • Network monitoring software
  • Development environment software

Abilities

  • Deductive Reasoning
  • Inductive Reasoning
  • Oral Comprehension
  • Problem Sensitivity
  • Written Comprehension

Skills

  • Reading Comprehension
  • Critical Thinking
  • Active Listening
  • Complex Problem Solving
  • Speaking

Knowledge

  • Computers and Electronics
  • English Language
  • Administration and Management
  • Engineering and Technology
  • Telecommunications

Most Common Education Level

The “Most Common Education Level” refers to the level of education held by the majority of workers in a given occupation. For example, if the highest percentage of workers in a role have an Associate’s Degree, that suggests this is the typical educational requirement. Knowing this helps you plan how many years of education you may need to pursue that career.

Certificates

Certifying Organization

IBM Corporation

Type

Product/Equipment

Certifying Organization

International Association of Privacy Professionals

Type

Product/Equipment

Certificate name

Counterintelligence

Certifying Organization

Department of Defense

Type

Advanced

Certifying Organization

IBM Corporation

Type

Product/Equipment

Certifying Organization

IBM Corporation

Type

Product/Equipment

Income Percentile

The income percentiles show how earnings are distributed within a profession. The 10th percentile means that 10% of workers earned less than that amount. The median (50th percentile) indicates that half of workers earned more, and half earned less. The 90th percentile reflects what the top 10% of earners in the field make.

Income PercentileAnnual Income
Low (10%)$88,126
Median (50%)$116,280
High (90%)$148,617

Income by Experience

This table shows how income typically grows with experience—from entry level (0–2 years), to mid-level (3–5 years), to senior level (6–8 years), to expert level (8+ years).

ExperienceIncome
Entry Level $98,111
Mid Level $117,447
Senior Level $128,432
Expert Level $149,135

Employability

There are currently 180,700 jobs in this career path. Over the next 10 years, that number is expected to increase to 239,800 positions, reflecting a projected growth of 33%.

The Projected Job Growth figure refers to the expected increase or decrease in employment within a specific career field over a certain period of time.

Projected Job Growth of 33%

Related Careers

The career information and data on this site incorporates information from O*NET Web Services, Lightcast, CareerOneStop, and the U.S. Bureau of Labor Statistics (BLS). For more details regarding the data sources and the specific information sourced, click here.

footer logo

Your One Stop Shop For All Career Resources

Whether you are exploring new career paths, building your resume, or preparing for your next opportunity, our tools, templates, and guidance are designed to help you navigate your career journey with clarity and confidence.

instagram
linkedin
tiktok
youtube