Cyber Security Careers

Cyber Security Careers

Cyber Security Careers banner

According to the FBI, the threat of cyber attacks are “incredibly serious—and growing.” Given the scope of modern cyber security threats, today’s businesses rely on larger and more sophisticated security teams to keep sensitive data safe. This is true not only for large corporations, but also for small businesses that may seek outsourced assistance from security firms.

Professor James Sheusi, who teaches at Johnson & Wales University Providence and online, said IT security professionals’ skill sets must include “networking skills near the top, but also soft skills like ability to train employees, organizational skills like project management, and some sales skills to convince management that investment in IT security needs to be proactive and ongoing.”

The following are among the most critical stakeholders involved in successful security protocol:

Information Security Analysts often represent the first line of cyber defense. They may be responsible for installing firewalls, enacting data encryption efforts, or investigating signs of security breaches. With the security industry experiencing explosive growth, it should come as no surprise that information security analysts are in high demand. The Bureau of Labor Statistics (BLS) reports a job outlook of 28 percent between 2016 and 2026, with 100,000 new jobs expected. In 2017, the median pay for information security analysts reached $95,510 per year.

Cloud Architects build and manage cloud computing networks, addressing everything from front-end platforms to cloud storage. This role grows ever more complex, especially as today’s businesses adopt multi-cloud strategies. Analyzing the Role and Skills of the Cloud Architect explains that cloud architecture is increasingly seen as a multi-year proposition, rather than a short-term project. As such, many businesses regard the role of cloud architect as mandatory within their IT departments.

Penetration Testers, sometimes referred to as ‘ethical hackers,’ these individuals simulate cyberattacks in hopes of revealing system vulnerabilities. Essentially, penetration testers are given the go-ahead to legally hack systems — and they’re rewarded handsomely for their efforts. According to PayScale, the average penetration tester earns an annual $81,164. Job outlook is only expected to improve, with a Research and Markets forecast indicating that the penetration testing market will be worth $1.7 billion by 2021.

Cryptography Engineers support Network Security Services (NSS) and associated security-enabled applications. They draw on advanced encryption skills to not only address current threats, but also to stay one step ahead of emerging digital risks. To succeed, prospective crypto engineers must have a detailed understanding of cryptography and experience in software development, as well as the ability to thrive in a fast-paced work environment.

Digital Forensics Experts study traces of cybercrimes in hopes of catching perpetrators, recovering lost data, or preventing future attacks. It’s an exciting, ever-changing field with significant room for growth — especially given recent developments in the prevalence and sophistication of cybercrime.

Digital security experts are in high demand, with companies offering competitive pay to those capable of staying ahead of emerging threats. Professor Sheui said that both the undergraduate and graduate degrees prepare students for careers in this field. “I wrote two of the courses, Business Continuity Planning and Risk Management and Incident Response, which are part of the MBA – Information Security/Assurance program, ideal for managers in the security analyst field.” He continued that the other job titles listed above—cloud architect, penetration tester, cryptography engineer, and digital forensics expert—employ skills taught in the undergrad program.

Contact Johnson & Wales University College of Online Education to learn more about the IT degree programs we offer that can help you compete in the world of digital security. Please complete the “Request Info” form on this page, call 855-JWU-1881, or email: [email protected]

Step 1Step 1 of 2
*Required Field Step 1 of 2
Step 2

By clicking Get Started below, I consent to receive recurring marketing/promotional e-mails, phone calls, and SMS/text messages from Johnson & Wales University (JWU) about any educational/programmatic purpose (which relates to my inquiry of JWU) at the e-mail/phone numbers (landline/mobile) provided, including calls or texts made using an automatic telephone dialing system and/or artificial/prerecorded voice messages. My consent applies regardless of my inclusion on any state, federal, or other do-not-call lists. Consent is not a condition for receipt of any good or service. Carrier charges may apply. Terms and conditions apply.

« Previous Step 2 of 2
Request info