Description
Develop and oversee the implementation of information security procedures and policies. Build, maintain and upgrade security technology, such as firewalls, for the safe use of computer networks and the transmission and retrieval of information. Design and implement appropriate security controls to identify vulnerabilities and protect digital files and electronic infrastructures. Monitor and respond to computer security breaches, viruses, and intrusions, and perform forensic investigation. May oversee the assessment of information security systems.
Interests
- Conventional
- Investigative
- Realistic
Work Values
Work Styles
Tasks
- Assess the quality of security controls, using performance indicators.
- Conduct investigations of information security breaches to identify vulnerabilities and evaluate the damage.
- Coordinate documentation of computer security or emergency measure policies, procedures, or tests.
- Coordinate monitoring of networks or systems for security breaches or intrusions.
- Coordinate vulnerability assessments or analysis of information security systems.
Work Activities
This information is currently unavailable.
Detailed Work Activities
This information is currently unavailable.
Technology Skills
- Operating system software
- Project management software
- Development environment software
- Object or component oriented development software
- Data base user interface and query software
Abilities
This information is currently unavailable.
Skills
This information is currently unavailable.
Knowledge
This information is currently unavailable.
Most Common Education Level
The “Most Common Education Level” refers to the level of education held by the majority of workers in a given occupation. For example, if the highest percentage of workers in a role have an Associate’s Degree, that suggests this is the typical educational requirement. Knowing this helps you plan how many years of education you may need to pursue that career.
Certificates
Certificate name
Certified Counterintelligence Threat AnalystCertifying Organization
McAfee Institute
Type
Advanced
Certificate name
Certified Information Systems Security ProfessionalCertifying Organization
International Information Systems Security Certification Consortium, Inc.
Type
Advanced
Certificate name
Information Systems Security Architecture ProfessionalCertifying Organization
International Information Systems Security Certification Consortium, Inc.
Type
Advanced
Certificate name
Cisco Meraki Solutions SpecialistCertifying Organization
Cisco Systems, Inc.
Type
Product/Equipment
Income Percentile
The income percentiles show how earnings are distributed within a profession. The 10th percentile means that 10% of workers earned less than that amount. The median (50th percentile) indicates that half of workers earned more, and half earned less. The 90th percentile reflects what the top 10% of earners in the field make.
Income Percentile | Annual Income |
---|---|
Low (10%) | N/A |
Median (50%) | N/A |
High (90%) | N/A |
Income by Experience
This table shows how income typically grows with experience—from entry level (0–2 years), to mid-level (3–5 years), to senior level (6–8 years), to expert level (8+ years).
Experience | Income |
---|---|
Entry Level | N/A |
Mid Level | N/A |
Senior Level | N/A |
Expert Level | N/A |
Employability
There are currently 470,900 jobs in this career path. Over the next 10 years, that number is expected to increase to 522,000 positions, reflecting a projected growth of 11%.
The Projected Job Growth figure refers to the expected increase or decrease in employment within a specific career field over a certain period of time.
Projected Job Growth of 11%
Related Careers
The career information and data on this site incorporates information from O*NET Web Services, Lightcast, CareerOneStop, and the U.S. Bureau of Labor Statistics (BLS). For more details regarding the data sources and the specific information sourced, click here.