If you’re interested in a career in cyber security, these are the typical roles in the industry. Click on the tabs below to find out more about the roles and the skills you’ll need for them.
Alternatively, look at the Inspired Careers website here and/or take a look at the PDF of Job Roles – Inspired Careers to give you some inspiration.
Front line Defenders managing networks and mobile devices. Examples are managing network to keep attackers out; testing other’s networks to assess their security and advising on making them less vulnerable; incident managers; forensics analysts unpicking what happened; analysts of new malware/production of countermeasures. (Please note: the e-crime unit has now been absorbed into the NCA)
Risk Analysts and Managers need to understand which threats will have the worst business impact and advise Boards in non-technical language why and how they should spend on reducing these risks. Risk managers may be non-technical or technical people. Some audit networks and ensure compliance and legal issues are dealt with.
Policy Makers and Strategists define how a company deals with different security risks and meets its legal obligations and gets these policies implemented. Private sector has CISOs (Chief Information Security Officers) often supported by a team. Government has ITSOs (IT security officers) and DSOs (Departmental security officers).
Operations and Security Managers protect data on networks, laptops and mobile devices, they may manage encryption and other protective measures like firewall rules.
Engineering, Architecture and Design Designing secure code and applications; architecting a secure system or creating new security tools are all essential parts of cyber security but nothing stays still so you will need to keep changing fast.
Education Training and Awareness are demanding whether the job is about training newcomers, keeping experts up to date or enabling staff or customers to benefit fully from technology they are using.
Research may be highly technical or more policy or psychology orientated. Areas include – Complex models to help understand and manage risks. invention of new technologies or new ways to apply them to reduce risks; looking for the next “big thing”.
Lawyers specialising in the advice and prosecution of data security and Internet crime. The need for expert advice is growing with high levels of crime and penalties for organisations that don’t protect data sufficiently.
The Chief Technology Officer (CTO) leads and oversees a company’s long term technology strategy.