Information security is an exciting and rapidly growing field for individuals who are interested in protecting users and their data. In an effort to map out the industry as a possible career choice, we recently conducted research into the top 10 infosec jobs based on overall pay grade. We now continue with the second part of our two-part series.
#5: Security Engineer
A Security Engineer is a mid-level employee who is responsible for building and maintaining the IT security solutions of an organization. In this capacity, Security Engineers configure firewalls, test new security solutions, and investigate intrusion incidents, among other duties, all while reporting to the Security Manager.
Candidates who aspire to become Security Engineers must possess a strong technical background in vulnerability and penetrating testing, virtualization security, application and encryption technologies, and network and web-related protocols. The more tools and concepts with which a Security Engineer is familiar, the more they can help troubleshoot any problems with an organization’s security systems.
Security Engineers make a median salary of $86,996, according to PayScale’s 2015 estimates. Those who enter the field of information security as Security Engineers can expect to make at least $57,000. However, some can earn as much as $128,000 a year.
#4: Security Manager
A Security Manager is a mid-level employee who is tasked with managing an organization’s IT security policy. Soft skills, such as leadership and strong interpersonal and communication skills, are therefore crucial for successful Security Managers.
Individuals who are interested in becoming a Security Manager must be prepared to create and execute security strategies based on the input from the Security Director and/or the CISO. They must also test and implement new security tools, lead security awareness campaigns, and administer both department budgets and staff schedules.
Security Managers make on average a salary of $103,827. They can expect to earn (Read more...)
This is a Security Bloggers Network syndicated blog post authored by David Bisson. Read the original post at: The State of Security