Information Security Engineers

Statistics
National
State
City
State
City
$108,970
Median Wage (USD, 2023)
34800
Projected Job Openings (2023-2033)
10.8%
Projected Growth (2023-2033)

Develop and oversee the implementation of information security procedures and policies. Build, maintain and upgrade security technology, such as firewalls, for the safe use of computer networks and the transmission and retrieval of information. Design and implement appropriate security controls to identify vulnerabilities and protect digital files and electronic infrastructures. Monitor and respond to computer security breaches, viruses, and intrusions, and perform forensic investigation. May oversee the assessment of information security systems.

Experience Requirements Overview

  • Job Zone Four: Considerable Preparation Needed
  • A considerable amount of work-related skill, knowledge, or experience is needed for these occupations. For example, an accountant must complete four years of college and work for several years in accounting to be considered qualified.
  • Most of these occupations require a four-year bachelor's degree, but some do not.
  • Employees in these occupations usually need several years of work-related experience, on-the-job training, and/or vocational training.

Education, Training and Experience

Required Level of Education: Bachelor's Degree

Related Work Experience: Over 4 years, up to and including 6 years

On-Site or In-Plant Training: N.A.

On-the-Job Training: Over 3 months, up to and including 6 months

Detailed Work Activities

  • Evaluate utility of software or hardware technologies.
  • Investigate illegal or suspicious activities.
  • Coordinate reporting or editing activities.
  • Manage information technology projects or system activities.
  • Manage information technology projects or system activities.

Tasks

  • Identify security system weaknesses, using penetration tests.
  • Coordinate monitoring of networks or systems for security breaches or intrusions.
  • Assess the quality of security controls, using performance indicators.
  • Train staff on, and oversee the use of, information security standards, policies, and best practices.
  • Scan networks, using vulnerability assessment tools to identify vulnerabilities.

Work Styles

Achievement/Effort

Job requires establishing and maintaining personally challenging achievement goals and exerting effort toward mastering tasks.

Persistence

Initiative

Leadership

Cooperation

Concern for Others

Social Orientation

Self-Control

Stress Tolerance

Adaptability/Flexibility

Dependability

Attention to Detail

Integrity

Independence

Innovation

Analytical Thinking

Data Source: This page includes information from the O*NET 28.0 Database by the U.S. Department of Labor, Employment and Training Administration (USDOL/ETA). Used under the CC BY 4.0 license. O*NET® is a trademark of USDOL/ETA. This page includes Employment Projections program, Occupational Employment and Wage Statistics program, U.S. Bureau of Labor Statistics.