Want A Career In Cybersecurity?

With a growing cyber threat landscape and an estimated 1 million unfilled cybersecurity jobs worldwide, the field is wide open for both recent graduates and people looking to make a career change.

Job postings in the cybersecurity field have gone up 74% over the past five years, and US News and World Report ranked a career in information security analysis fifth on its list of best technology jobs. Average salaries nationally are $88,890, and significantly higher in cities such as San Francisco and New York.

"The job prospects are excellent," says Deborah Hurley, a professor for Brown University's executive master in cybersecurity program, "the demand far outstrips the supply."

Here are 10 different job options to explore in the cybersecurity field, with job description information from CyberDegrees.org.

1. Security Consultant
"A security consultant is the IT equivalent of Obi-Wan, advisor, guide and all-round security guru," according to CyberDegrees.org. People in this role design and implement the strongest possible security solutions based on the needs and threats facing an individual company, and day-to-day tasks may vary widely. 
A security consultant might determine the most effective way to protect computers, networks, software, data, and information systems against attacks, perform vulnerability testing and risk analyses, test security solutions, respond to any incidents, and update security systems as needed, depending on the terms of their contract. 
2. Chief Information Security Officer
The chief information security officer (CISO) is the leader of all security initiatives in a company. While these tech professionals were traditionally seen as security enforcers, they are now often considered strategists helping the enterprise avoid cyber-crime. 
CISOs typically appoint and guide a team of security experts, create a strategic plan for the deployment of information security technologies and programs, develop corporate security policies, and monitor security vulnerabilities, among a number of other tasks. 
3. Security Engineer
Security engineers are intermediate-level positions that build and maintain IT security solutions for a company. These professionals develop security for the organisation's systems and projects, and also handle any technical problems that arise. 
Security engineers are often responsible for configuring and installing firewalls and intrusion detection systems, performing vulnerability testing, developing automation scripts to track incidents, and testing security solutions.
4. Security Architect
The senior-level security architect position involves designing, building, and overseeing the implementation of network and computer security for a company. 
Security architects must plan, research, and design strong security architectures for all IT projects, perform security assessments, respond to incidents, develop requirements for LANs, WANs, VPNs, routers, firewalls, and other network devices, as well as design PKIs, among other tasks. 
5. Incident Responder
An incident responder (sometimes called a computer security incident response team engineer or an intrusion analyst) is essentially a cyber firefighter, and must rapidly address security threats and incidents within a company. "In your role as a first responder, you will be using a host of forensics tools to find the root cause of a problem, limit the damage and see that it never happens again," according to CyberDegrees.org. "Like a firefighter, part of your job will also involve education and prevention." 
This involves actively monitoring systems and networks for attacks, identifying security vulnerabilities, performing malware analysis and reverse engineering, and establishing protocols for communication within an organisation and with law enforcement during a security incident.
6. Computer Forensics Expert
A computer forensics expert acts as a digital detective, accessing and analysing evidence from computers, networks, and data storage devices. 
On a day-to-day basis, this role involves conducting security incident investigations, recovering and examining data from devices, compiling evidence for legal cases, and advising law enforcement on the credibility of acquired data. 
These experts often work for large corporations, law enforcement agencies, legal firms, private consulting firms, and the government. 
7. Penetration Tester
Penetration testers, also known as ethical hackers, are responsible for legally hacking into an organisation's applications, networks, and systems to discover and later patch security vulnerabilities. 
This role involves creating and performing formal penetration tests, conducting physical security assessments of servers, systems, and network devices, using social engineering to discover security flaws, and incorporating business considerations into security strategies.
8. Security Analyst
A security analyst detects and prevents cyber-threats for a company. 
This might involve planning, implementing, and upgrading security measures and controls, performing risk analyses, conducting internal and external security audits, managing network, intrusion detection, and prevention systems, and coordinating security plans with third party vendors.
9. Security Software Developer
These tech professionals develop security software and integrate security into applications software during the design and development process. 
Depending on the specific position and company, a security software developer might oversee a team of developers in the creation of secure software tools, develop a company-wide software security strategy, participate in the lifecycle development of software systems, support software deployments to customers, and test their work for vulnerabilities. 
10. Security Auditor
A security auditor is a mid-level role responsible for examining the safety and effectiveness of company computer systems and their security components, and then issuing a detailed report outlining the success of the system and any changes or improvements that could be made. These professionals plan, execute, and lead security audits across a company, evaluate the efficiency, effectiveness, and compliance of operational processes with corporate security policies and any government regulations, and develop and administer risk-focused exams for IT systems.

TechRepublic:

You Might Also Read:

GCHQ Approved: Ten Cyber Degree Courses:

Who Needs A Computer Science Degree Anyway?:

Cybersecurity Threats Are Changing Recruitment:

 

 

« Intelligence-Led Policing Gets Automated
Cybersecurity Is A Bigger Issue Than Brexit »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

CyberPolicy

CyberPolicy

CyberPolicy is a cyber protection solution for small businesses. It combines three important components against cyber threats - Cyber Plan, Cybersecurity and Cyber Insurance.

Allegro Software

Allegro Software

Allegro provide secure software for the Internet of Things.

BeDefended

BeDefended

BeDefended is an Italian company operating in IT Security and specialized in Cloud and Application Security with years of experience in penetration testing, consulting, training, and research.

Seavus

Seavus

Seavus is a software development and consulting company with a proven track-record in providing successful enterprise-wide business solutions including Managed Security Services.

Safetica

Safetica

Safetica Technologies is a Czech software company that delivers data protection solutions for businesses of all types and sizes.

MicroEJ

MicroEJ

MicroEJ is a software vendor of cost-driven solutions for embedded and IoT devices.

IntelliGenesis

IntelliGenesis

IntelliGenesis provide comprehensive cyber, data science, analysis, and software development services that provide tailored, secure solutions for your critical data and intelligence needs.

SoloKeys

SoloKeys

SoloKeys provides the first open-source FIDO2 security key: Protect your online accounts against unauthorized access by using the most secure login method.

Ross & Baruzzini

Ross & Baruzzini

Ross & Baruzzini delivers integrated technology, consulting, and engineering solutions for safe, sustainable, and resilient facilities.

SpireTec Solutions

SpireTec Solutions

SpireTec Solutions is an IT management training company offering 1500+ courses with state of art training facilities backed by a team of industry experts in various domains including cybersecurity.

Numen Cyber Technology

Numen Cyber Technology

Numen Cyber Technology is committed to becoming a Threat Discovery and Response expert for corporate customers.

Tidal Cyber

Tidal Cyber

We formed Tidal for one simple reason—we believe that defenders need and deserve tools and services that make achieving the benefits of threat-informed defense practical and sustainable.

Sonet.io

Sonet.io

Sonet.io is built for IT leaders that want a great experience for their remote workers, while enhancing security and observability.

D.med Software

D.med Software

D.med Software is a company with a focus on cybersecurity for embedded software and cloud applications for the medical industry.

Cyber & Data Protection

Cyber & Data Protection

Cyber & Data Protection Limited supports Charities, Educational Trusts and Private Schools, Hospitality and Legal organisations by keeping their data secure and usable.

CLEAR

CLEAR

With more than 17 million members and a growing network of partners across the world, CLEAR's identity platform is transforming the way people live, work, and travel.

Instil Software

Instil Software

Instil helps technology brands transform, innovate and disrupt their markets with category-defining software products that challenge us to think, feel and act in new ways.