Job Description Templates
  • Search
  • Menu Menu

Information Security Engineers

CrowdSourceLawyers.com

Develop and oversee the implementation of information security procedures and policies. Build, maintain and upgrade security technology, such as firewalls, for the safe use of computer networks and the transmission and retrieval of information. Design and implement appropriate security controls to identify vulnerabilities and protect digital files and electronic infrastructures. Monitor and respond to computer security breaches, viruses, and intrusions, and perform forensic investigation. May oversee the assessment of information security systems.

This title represents an occupation for which data collection is currently underway.

View report: Summary  Details  Custom  My Next MoveEasy Read  My Next Move for VeteransVeterans  Mi Próximo PasoEspañol

Tasks  |  Detailed Work Activities  |  Job Zone  |  Credentials  |  Wages & Employment  |  Job Openings

Tasks

Show fewer All 20 displayed
  • Assess the quality of security controls using performance indicators.See more occupations related to this task.
  • Conduct investigations of information security breaches to identify vulnerabilities and evaluate the damage.See more occupations related to this task.
  • Coordinate documentation of computer security or emergency measure policies, procedures, or tests.See more occupations related to this task.
  • Coordinate monitoring of networks or systems for security breaches or intrusions.See more occupations related to this task.
  • Coordinate vulnerability assessments or analysis of information security systems.See more occupations related to this task.
  • Develop information security standards and best practices.See more occupations related to this task.
  • Develop or implement software tools to assist in the detection, prevention, and analysis of security threats.See more occupations related to this task.
  • Develop or install software, such as firewalls and data encryption programs, to protect sensitive information.See more occupations related to this task.
  • Develop response and recovery strategies for security breaches.See more occupations related to this task.
  • Identify or implement solutions to information security problems.See more occupations related to this task.
  • Identify security system weaknesses using penetration tests.See more occupations related to this task.
  • Oversee development of plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure or to meet emergency data processing needs.See more occupations related to this task.
  • Oversee performance of risk assessment or execution of system tests to ensure the functioning of data processing activities or security measures.See more occupations related to this task.
  • Provide technical support to computer users for installation and use of security products.See more occupations related to this task.
  • Recommend information security enhancements to management.See more occupations related to this task.
  • Review security assessments for computing environments or check for compliance with cybersecurity standards and regulations.See more occupations related to this task.
  • Scan networks using vulnerability assessment tools to identify vulnerabilities.See more occupations related to this task.
  • Train staff on and oversee the use of information security standards, policies, and best practices.See more occupations related to this task.
  • Troubleshoot security and network problems.See more occupations related to this task.
  • Write reports regarding investigations of information security breaches or network evaluations.See more occupations related to this task.

Find occupations related to multiple tasks

back to top

CrowdSourceLawyers.com

https://crowdsourcelawyers.com/job-description-templates/

Detailed Work Activities

Show fewer All 21 displayed
  • Manage information technology projects or system activities.See more occupations related to this activity.
  • Develop software or computer applications.See more occupations related to this activity.
  • Install computer software.See more occupations related to this activity.
  • Analyze security of systems, network, or data.See more occupations related to this activity.
  • Coordinate reporting or editing activities.See more occupations related to this activity.
  • Develop operating strategies, plans, or procedures.See more occupations related to this activity.
  • Develop performance metrics or standards related to information technology.See more occupations related to this activity.
  • Establish work standards.See more occupations related to this activity.
  • Evaluate potential of products, technologies, or resources.See more occupations related to this activity.
  • Evaluate utility of software or hardware technologies.See more occupations related to this activity.
  • Implement security measures for computer or information systems.See more occupations related to this activity.
  • Investigate illegal or suspicious activities.See more occupations related to this activity.
  • Monitor processes for compliance with standards.See more occupations related to this activity.
  • Provide technical guidance to other personnel.See more occupations related to this activity.
  • Read documents to gather technical information.See more occupations related to this activity.
  • Recommend changes to improve computer or information systems.See more occupations related to this activity.
  • Supervise information technology personnel.See more occupations related to this activity.
  • Test computer system operations to ensure proper functioning.See more occupations related to this activity.
  • Train personnel in technical or scientific procedures.See more occupations related to this activity.
  • Troubleshoot issues with computer applications or systems.See more occupations related to this activity.
  • Write reports or evaluations.See more occupations related to this activity.

Find occupations related to multiple detailed work activities

back to top

Job Zone

Title Job Zone Four: Considerable Preparation Needed
Education Most of these occupations require a four-year bachelor’s degree, but some do not.
Related Experience A considerable amount of work-related skill, knowledge, or experience is needed for these occupations. For example, an accountant must complete four years of college and work for several years in accounting to be considered qualified.
Job Training Employees in these occupations usually need several years of work-related experience, on-the-job training, and/or vocational training.
Job Zone Examples Many of these occupations involve coordinating, supervising, managing, or training others. Examples include real estate brokers, sales managers, database administrators, graphic designers, chemists, art directors, and cost estimators.
SVP Range (7.0 to < 8.0)

back to top

Credentials

Find Training Find Certifications Apprenticeship.gov

back to top

Wages & Employment Trends

Median wage data for Computer Occupations, All Other.
Employment data for Computer Occupations, All Other.
Industry data for Computer Occupations, All Other.

Median wages (2020) $44.65 hourly, $92,870 annual
State wages
 
Local wages
  
Employment (2020) 442,200 employees
Projected growth (2020-2030) Average (5% to 10%) Average (5% to 10%)
Projected job openings (2020-2030) 37,500
State trends
 
Top industries (2020)
Professional, Scientific, and Technical Services
Government

Source: Bureau of Labor Statistics 2020 wage data external site and 2020-2030 employment projections external site . “Projected growth” represents the estimated change in total employment over the projections period (2020-2030). “Projected job openings” represent openings due to growth and replacement.

back to top

Job Openings on the Web

Find Jobs

back to top


This page includes information from O*NET OnLine by the U.S. Department of Labor, Employment and Training Administration (USDOL/ETA). Used under the CC BY 4.0 license. O*NET® is a trademark of USDOL/ETA.

© Copyright | CrowdSourceLawyers
Scroll to top