Colleges by Location
Colleges by Fields of Study
Colleges by Tuition Range
Colleges by GPA Range
College by SAT Range
Colleges by ACT Score
Graduate Schools by Location
Graduate Schools by Fields of Study
Graduate School by Degree Type
Paying for Graduate School
Online Graduate Programs
Test Preparation
Career Planning
College Planning
Graduate School Planning
Applying to Graduate School
- More
| Median Wage (USD, 2024) | Projected Job Openings (2023-2033) | Projected Growth (2023-2033) | |
|---|---|---|---|
| National Statistics | $108,970 | 34800 | 10.8% |
| State Statistics | - | - | - |
| City Statistics | - | - | - |
Experience Requirements Overview
- Job Zone Four: Considerable Preparation Needed
- A considerable amount of work-related skill, knowledge, or experience is needed for these occupations. For example, an accountant must complete four years of college and work for several years in accounting to be considered qualified.
- Most of these occupations require a four-year bachelor's degree, but some do not.
- Employees in these occupations usually need several years of work-related experience, on-the-job training, and/or vocational training.
Education, Training and Experience
Required Level of Education: Bachelor's Degree
Related Work Experience: Over 4 years, up to and including 6 years
On-Site or In-Plant Training: N.A.
On-the-Job Training: Over 3 months, up to and including 6 months
Detailed Work Activities
- Evaluate utility of software or hardware technologies.
- Investigate illegal or suspicious activities.
- Coordinate reporting or editing activities.
- Manage information technology projects or system activities.
- Manage information technology projects or system activities.
Tasks
- Identify security system weaknesses, using penetration tests.
- Coordinate monitoring of networks or systems for security breaches or intrusions.
- Assess the quality of security controls, using performance indicators.
- Train staff on, and oversee the use of, information security standards, policies, and best practices.
- Scan networks, using vulnerability assessment tools to identify vulnerabilities.
- Develop response and recovery strategies for security breaches.
- Conduct investigations of information security breaches to identify vulnerabilities and evaluate the damage.
- Develop or install software, such as firewalls and data encryption programs, to protect sensitive information.
- Oversee development of plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure or to meet emergency data processing needs.
- Identify or implement solutions to information security problems.
- Develop information security standards and best practices.
- Recommend information security enhancements to management.
- Oversee performance of risk assessment or execution of system tests to ensure the functioning of data processing activities or security measures.
- Coordinate vulnerability assessments or analysis of information security systems.
- Review security assessments for computing environments or check for compliance with cybersecurity standards and regulations.
- Troubleshoot security and network problems.
- Coordinate documentation of computer security or emergency measure policies, procedures, or tests.
- Develop or implement software tools to assist in the detection, prevention, and analysis of security threats.
- Write reports regarding investigations of information security breaches or network evaluations.
- Provide technical support to computer users for installation and use of security products.
Work Styles
Achievement/Effort
Job requires establishing and maintaining personally challenging achievement goals and exerting effort toward mastering tasks.
Persistence
Initiative
Leadership
Cooperation
Concern for Others
Social Orientation
Self-Control
Stress Tolerance
Adaptability/Flexibility
Dependability
Attention to Detail
Integrity
Independence
Innovation
Analytical Thinking
Data Source: This page includes information from the O*NET 30.0 Database by the U.S. Department of Labor, Employment and Training Administration (USDOL/ETA). Used under the CC BY 4.0 license. O*NET® is a trademark of USDOL/ETA. This page includes Employment Projections program, Occupational Employment and Wage Statistics program, U.S. Bureau of Labor Statistics.