Security Software Developer
software is often not built with security in mind. The Security Software Developer designs and integrates security into every aspect of the software development lifecycle
Security Architect Career Path
Create and build secure networks and computers for complex security frameworks. This is an ideal career path for the problem solver who enjoys solving puzzles
Security Consultant
Experts that evaluate cybersecurity threats, risks and problems to guide organizations in providing protection solutions. This is a very tech-savvy position
Information Security Analyst
Professionals that stand at the front line of defense for networks. They create and maintain firewalls and monitor network activities
Ethical Hacker
Are licensed professionals that try to hack a network with permission to find vulnerabilities. The try to find what is vulnerable and could be exploited by a malicious hacker
Computer Forensics Analyst
Professionals that focus on cyber crimes and partake in data recovery, intercepting data linked to crimes, and a detailed look into data trails
Chief Information Security Officer
Mid Executive position that oversees an organization's IT department. They are responsible for planning, managing, and directing all computer, network and data security needs
Penetration Tester
Highly skilled professionals that are typically ethical hackers and try to infiltrate a corporation's security measures (physical and electronic) with permission from the corporation. A penetration tester will use social engineering tactics to test the security of a company's employee practices
IT Security Consultant
Are typically outsourced contractors that advise organizations on cybersecurity objectives. They typically service smaller businesses on tighter budgets
Security Systems Administrator
The person in charge of daily operations for security controls ( installing, administering, maintaining, and troubleshooting) to include backing up data, network monitoring, user account management, and general security needs