The demand for cybersecurity professionals has increased rapidly. The U.S. Department of Labor estimates there will be 135,000 new jobs in this field by 2018. Missouri anticipates a 21 percent job growth through that time. Members of the Southeast Cybersecurity Advisory Committee report a regional need for cybersecurity professionals.
Cybersecurity employment opportunities are diverse and plentiful. The following careers are adapted from “The 20 Coolest Jobs in Information Security...and How they Make a Difference,” published by the SANS (SysAdmin, Audit, Network, Security) Institute, recognized as a leader in training cybersecurity professionals:
Analyze how intruders breach the infrastructure of systems/networks, identify system flaws and develop scenarios to deal with the problem.
Examine systems and networks to find security vulnerabilities and weaknesses in order to improve security.
Track user activity that could be used in civil/criminal litigation; they go deep into the system and trace problems as well as recommend fixes.
Are the first-line of defense during a breach when security has been compromised; they respond and mitigate a security incident and notify when the network can go back up.
Understand business and environmental conditions related to technology and translate this knowledge into security design that can withstand a cyber attack.
Examine malicious software and understand its threat, often requiring reverse-engineering, and communicate possible security issues with management.
Design, implement and manage the security of your network, and they build networks that provide functionality with critical security needed.
Research and investigate security threats, identify strategies to defend against attacks, and create policy that becomes the backbone of your organization.
Explore digital evidence involved in cybersecurity under attack and can be either ‘sworn’ law enforcement officers or employees.
Connect legal, regulatory and local organizational requirements with risk taking, financial confines and technology and then communicate where security is needed.
Think like attackers to develop code to reverse-engineering binaries, determine vulnerabilities and examine network traffic.
Are entrusted with a company’s security tools and software; they understand network traffic, protocol and Internet threats.
Guide law enforcement investigations into computer crimes and get convictions for those crimes.
Design, deploy and understand the delicate triangle of people, process and technology.
Are the starting point for developing firewalls and IPS technology by monitoring and blocking unwanted traffic from attackers.
Decide whether the application of the OS of the organization is safe and validate findings.
Measure and report on risks to the organization; they understand risk management and measure compliance with policies, procedures and standards.
Develop and implement secure software that makes a difference in the security software that runs the world.
In an application developer organization constantly improve security within the development lifecycle and persuade colleagues to avoid security pitfalls in software development.
Ensure long-term recovery plans are tested and guide your organization when disaster strikes.