Information Security Engineers

electronic infrastructure firewall information system computer application use of computer networks test computer system operation implementation of information security procedures safe use of computer networks appropriate security control computer security breach
Where in the military? Select a military branch to see samples.
Cyber Defense Operations; Cyber Surety; Cyber Surety Craftsman; Cyber Surety Journeyman; Cyber Systems Operations Apprentice; Cyber Systems Operations Helper; Spectrum Defense Operations; Spectrum Defense Operations Apprentice, Spectrum Operations; Spectrum Defense Operations Craftsman, Spectrum Operations; Spectrum Defense Operations Helper, Spectrum Operations
Cyber Network Defender; Information Protection Technician; Network Systems Engineering; Signal Operations
Cybersecurity; Information Systems Management; Operations Systems Specialist
Command, Control, Communications, Computers and Intelligence (C4I) Officer; Cyber Network Operations Officer; Data Systems Chief; Information Security Technician; Intelligence Software/Security Engineer; Intelligence Surveillance Reconnaissance (ISR) Systems Engineer; Intelligence Technology and Data Chief; Network Engineering Officer
ADP Systems Security Officer; Computer Network Capability Development; Cryptologic Infrastructure Maintenance Director; Cyber RandD Specialist; Cyberspace Operations Planner; Electronic Warfare Manager; Information Systems Administrator; Information Systems Technician Submarines; Submarine Carry-On Equipment (COE) Privileged Access Technician; Submarine Carry-On Equipment (COE) Team Leader
No similar titles were found.
What they do:
Develop and oversee the implementation of information security procedures and policies. Build, maintain and upgrade security technology, such as firewalls, for the safe use of computer networks and the transmission and retrieval of information. Design and implement appropriate security controls to identify vulnerabilities and protect digital files and electronic infrastructures. Monitor and respond to computer security breaches, viruses, and intrusions, and perform forensic investigation. May oversee the assessment of information security systems.
On the job, you would:
  • Assess the quality of security controls, using performance indicators.
  • Conduct investigations of information security breaches to identify vulnerabilities and evaluate the damage.
  • Coordinate documentation of computer security or emergency measure policies, procedures, or tests.

Knowledge

Knowledge information for this career will be available soon.

Skills

Skills information for this career will be available soon.

Abilities

Abilities information for this career will be available soon.

Personality

Information for this career will be available soon.

Technology

You might use software like this on the job:

Operating system software

  • Bash Hot Technology In Demand
  • UNIX Hot Technology In Demand

Project management software

  • Microsoft SharePoint Hot Technology In Demand
  • Microsoft Teams

Development environment software

  • Microsoft Azure software Hot Technology In Demand
  • Microsoft PowerShell Hot Technology In Demand

Education

Education: (rated 4 of 5)

Get started on your career:

Find Training
Apprenticeship.gov

Job Outlook

Bright
New job opportunities are very likely in the future.
Local Salary Info
Find Jobs
See more details at O*NET OnLine about information security engineers.