Using the NIST Cybersecurity Framework (Identify, Protect, Detect, Respond, Recover), a cybersecurity specialist plans, implements, and monitors hardware and/or software security measures for information systems and operational infrastructures.
Cybersecurity specialists can expect to make an average salary of $104,500 annually (or $108,800 in total compensation package). The highest earners for this role can expect to see around $115,800 annually (or $121,400 in total compensation).
*Current as of December 2022.
Integrity, Initiative, Dependability, Communication, Basic Computer Competencies, Logic, Critical & Analytical Thinking, Science & Technology, Problem Solving & Decision Making, Teamwork, Detail Orientation.
Defensive measures to detect, respond, and protect information, information systems, and networks from threats.
Apply techniques to prevent social engineering and tools of bad actors to detect and access network information
Methods and procedures that protect information systems and data by ensuring their availability, authentication, confidentiality, and integrity as well as the measure of common controls on information systems.
Implement the methodologies and security policies using encryption algorithms to maintain data integrity and data consistency
Methods, tools, and procedures, including development of information security plans to prevent information systems vulnerabilities and to provide or restore security of information systems and network services.
Implement defense-in-depth using intrusion detection and prevention systems (IDPS), firewall, Access Control List (ACL)
Architecture and typology of software, hardware, and networks, including LANS, WANS, and telecommunications systems, their components and associated protocols and standards, and how they operate and integrate with one another and with associated controlling software.
Implement different tools at different layers and how to use the protocols to analyze traffic flow on virtual and physical layers
Improve bandwidth through routing protocols
Principles, methods, and tools for assessing vulnerabilities and developing or recommending appropriate mitigation countermeasures.
Assess vulnerabilities of hardware and software using tools and methodologies to evaluate physical, virtual, and social environments
The pathway below represents an example career pathway in the ever-changing Digital Innovation Economy.
Here are the TechPoint programs and partner organizations for K-12 students to get training and experience in this field.
Here are the TechPoint programs and partner organizations for college students to get training experience in this field.
Here are the TechPoint programs and partner organizations for career changers and adult learners to get training and experience in this field.