Information Security Engineers

electronic infrastructure firewall information system computer application use of computer networks test computer system operation implementation of information security procedures safe use of computer networks appropriate security control computer security breach
Where in the military? Select a military branch to see samples.
Cyber Defense Operations; Cyber Defense Operations Superintendent; Spectrum Defense Operations; Spectrum Defense Operations Apprentice; Spectrum Defense Operations Apprentice, Spectrum Operations; Spectrum Defense Operations Helper; Spectrum Defense Operations Helper, Spectrum Operations
Cyber Capabilities Development Officer; Cyber Network Defender; Cyberspace Defense Warrant Officer; Network Systems Engineering; Signal Operations
Cyber; Cybersecurity; Information Systems Management; Operations Systems Specialist
Command, Control, Communications, Computers and Intelligence (C4I) Officer; Cyber Network Operations Officer; Cyberspace Warfare Operator; Data Systems Chief; Defensive Cyberspace Warfare Officer; Information Security Technician; Intelligence Software/Security Engineer; Intelligence Surveillance Reconnaissance (ISR) Systems Engineer; Intelligence Technology and Data Chief; Network Analyst
ADP Systems Security Officer; Computer Network Capability Development; Cryptologic Infrastructure Maintenance Supervisor; Cyber Defense Incident Responder; Cyber Research and Development Specialist; Director of Communications; Electronic Warfare Technician; Information Systems Technician Submarines; Submarine Carry-On Equipment (COE) Privileged Access Technician; Surface Cryptologic Carry-On Program (CCOP) Director
No similar titles were found.
What they do:
Develop and oversee the implementation of information security procedures and policies. Build, maintain and upgrade security technology, such as firewalls, for the safe use of computer networks and the transmission and retrieval of information. Design and implement appropriate security controls to identify vulnerabilities and protect digital files and electronic infrastructures. Monitor and respond to computer security breaches, viruses, and intrusions, and perform forensic investigation. May oversee the assessment of information security systems.
On the job, you would:
  • Assess the quality of security controls, using performance indicators.
  • Conduct investigations of information security breaches to identify vulnerabilities and evaluate the damage.
  • Coordinate documentation of computer security or emergency measure policies, procedures, or tests.


Knowledge information for this career will be available soon.


Skills information for this career will be available soon.


Abilities information for this career will be available soon.


People interested in this work like activities that include data, detail, and regular routines.


You might use software like this on the job:

Operating system software

  • Apple iOS Hot Technology
  • Microsoft Windows Server Hot Technology In Demand

Project management software

  • Microsoft SharePoint Hot Technology
  • Microsoft Teams Hot Technology

Development environment software

  • Go Hot Technology
  • Microsoft PowerShell Hot Technology In Demand


Education: (rated 4 of 5)

Get started on your career:

Find Training

Job Outlook

New job opportunities are very likely in the future.
Local Salary Info
Find Jobs
See more details at O*NET OnLine about information security engineers.