Southeast Missouri State University

Cybersecurity Employment Opportunities

The demand for cybersecurity professionals has increased rapidly. The U.S. Department of Labor estimates there will be 135,000 new jobs in this field by 2018. Missouri anticipates a 21 percent job growth through that time. Members of the Southeast Cybersecurity Advisory Committee report a regional need for cybersecurity professionals.

Cybersecurity employment opportunities are diverse and plentiful. The following careers are adapted from “The 20 Coolest Jobs in Information Security...and How they Make a Difference,” published by the SANS (SysAdmin, Audit, Network, Security) Institute, recognized as a leader in training cybersecurity professionals:

Computer Forensics Experts

Analyze how intruders breach the infrastructure of systems/networks, identify system flaws and develop scenarios to deal with the problem.

System, Network, and/or Web Penetration Testers

Examine systems and networks to find security vulnerabilities and weaknesses in order to improve security.

Forensics Analysts

Track user activity that could be used in civil/criminal litigation; they go deep into the system and trace problems as well as recommend fixes.

Incident Responders

Are the first-line of defense during a breach when security has been compromised; they respond and mitigate a security incident and notify when the network can go back up.

Security Architects

Understand business and environmental conditions related to technology and translate this knowledge into security design that can withstand a cyber attack.

Malware Analysts

Examine malicious software and understand its threat, often requiring reverse-engineering, and communicate possible security issues with management.

Network Security Engineers

Design, implement and manage the security of your network, and they build networks that provide functionality with critical security needed.

Security Analysts

Research and investigate security threats, identify strategies to defend against attacks, and create policy that becomes the backbone of your organization.

Computer Crime Investigators

Explore digital evidence involved in cybersecurity under attack and can be either ‘sworn’ law enforcement officers or employees.

CISO/ISO or Directors of Security

Connect legal, regulatory and local organizational requirements with risk taking, financial confines and technology and then communicate where security is needed.

Application Penetration Testers

Think like attackers to develop code to reverse-engineering binaries, determine vulnerabilities and examine network traffic.

Security Operations Center Analysts

Are entrusted with a company’s security tools and software; they understand network traffic, protocol and Internet threats.

Prosecutors Specializing in InfoSec Crime

Guide law enforcement investigations into computer crimes and get convictions for those crimes.

Technical Directors and Deputy CISO

Design, deploy and understand the delicate triangle of people, process and technology.

Intrusion Analysts

Are the starting point for developing firewalls and IPS technology by monitoring and blocking unwanted traffic from attackers.

Vulnerability Researchers/Exploit Developers

Decide whether the application of the OS of the organization is safe and validate findings.

Security Auditors

Measure and report on risks to the organization; they understand risk management and measure compliance with policies, procedures and standards.

Security-Savvy Software Developers

Develop and implement secure software that makes a difference in the security software that runs the world.

Security Mavens

In an application developer organization constantly improve security within the development lifecycle and persuade colleagues to avoid security pitfalls in software development.

Disaster Recovery/Business Continuity Analysts/Managers

Ensure long-term recovery plans are tested and guide your organization when disaster strikes.

 
 
 
APPLY VISIT DONATE