Description
Develop and oversee the implementation of information security procedures and policies. Build, maintain and upgrade security technology, such as firewalls, for the safe use of computer networks and the transmission and retrieval of information. Design and implement appropriate security controls to identify vulnerabilities and protect digital files and electronic infrastructures. Monitor and respond to computer security breaches, viruses, and intrusions, and perform forensic investigation. May oversee the assessment of information security systems.
Interests
- Conventional
- Investigative
- Realistic
Work Values
Work Styles
Tasks
- Assess the quality of security controls, using performance indicators.
- Conduct investigations of information security breaches to identify vulnerabilities and evaluate the damage.
- Coordinate documentation of computer security or emergency measure policies, procedures, or tests.
- Coordinate monitoring of networks or systems for security breaches or intrusions.
- Coordinate vulnerability assessments or analysis of information security systems.
Work Activities
Detailed Work Activities
Technology Skills
- Operating system software
- Project management software
- Development environment software
- Object or component oriented development software
- Data base user interface and query software
Skills
Knowledge
Most Common Education Level
The “Most Common Education Level” refers to the level of education held by the majority of workers in a given occupation. For example, if the highest percentage of workers in a role have an Associate’s Degree, that suggests this is the typical educational requirement. Knowing this helps you plan how many years of education you may need to pursue that career.
Certificates
Certificate name
Cisco Meraki Solutions SpecialistCertifying Organization
Cisco Systems, Inc.
Type
Product/Equipment
Certificate name
Certified Cyber Intelligence InvestigatorCertifying Organization
McAfee Institute
Type
Advanced
Certificate name
Check Point Certified Security Expert (CCSE)Certifying Organization
Check Point Software Technologies, Inc.
Type
Specialty
Certificate name
Check Point Certified Security Master EliteCertifying Organization
Check Point Software Technologies, Inc.
Type
Specialty
Certificate name
Cisco Certified CyberOps Professional CertificationCertifying Organization
Cisco Systems, Inc.
Type
Product/Equipment
Income Percentile
The income percentiles show how earnings are distributed within a profession. The 10th percentile means that 10% of workers earned less than that amount. The median (50th percentile) indicates that half of workers earned more, and half earned less. The 90th percentile reflects what the top 10% of earners in the field make.
Income Percentile | Income |
---|---|
Low (10%) | $NaN |
Median (50%) | $NaN |
High (90%) | $NaN |
Income by Experience
This table shows how income typically grows with experience—from entry level (0–2 years), to mid-level (3–7 years), to senior level (8+ years).
Experience | Income |
---|---|
Entry Level | $50,000 |
Mid Level | $100,000 |
Senior Level | $150,000 |
Employability
There are currently 470,900 jobs in this career path. Over the next 10 years, that number is expected to increase to 522,000 positions, reflecting a projected growth of 11%.
The Projected Job Growth figure refers to the expected increase or decrease in employment within a specific career field over a certain period of time.
Projected Job Growth of 11%
The career information and data on this site incorporates information from O*NET Web Services by the U.S. Department of Labor, Employment and Training Administration (USDOL/ETA), with ONET® being a registered trademark of USDOL/ETA. Used under the CC BY 4.0 license. O*NET® is a trademark of USDOL/ETA; CareerOneStop, sponsored by the U.S. Department of Labor, Employment and Training Administration (DOLETA) and the Minnesota Department of Employment and Economic Development (DEED); and the U.S. Bureau of Labor Statistics (BLS).