
POPULAR JOB TITLES IN CYBER SECURITY
- Application Security Administrator – Keep software / apps safe and secure.
- Artificial Intelligence Security Specialist – Use AI to combat cybercrime.
- Automotive Security Engineer – Protect cars from cyber intrusions.
- Blockchain Developer / Engineer – Code the future of secure transactions.
- Blue Team Member – Design defensive measures / harden operating systems.
- Bug Bounty Hunter – Freelance hackers find defects and exploits in code.
- Cybersecurity Scrum Master – Watch over and protect all data.
- Chief Information Security Officer (CISO) – Head honcho of cybersecurity.
- Chief Security Officer (CSO) – Head up all physical/info/cyber security.
- Cloud Security Architect – Secure apps and data in the cloud.
- Counterespionage Analyst – Thwart cyber spies from hostile nation states.
- Cryptanalyst – Decipher coded messages without a cryptographic key.
- Cryptographer – Develop systems to encrypt sensitive information.
- Cyber Insurance Policy Specialist – Consult on cyber risk and liability protection.
- Cyber Intelligence Specialist – Analyze cyber threats and defend against them.
- Cyber Operations Specialist – Conduct offensive cyberspace operations.
- Cybercrime Investigator – Solve crimes conducted in cyberspace.
- Cybersecurity Hardware Engineer – Develop security for computer hardware.
- Cybersecurity Lawyer – Attorney focused on info/cyber security and cybercrime.
- Cybersecurity Software Developer / Engineer – Bake security into applications.
- Data Privacy Officer – Ensure legal compliance related to data protection.
- Data Recovery Specialist – Recover hacked data from digital devices.
- Data Security Analyst – Protect information on computers and networks.
- Digital Forensics Analyst – Examine data containing evidence of cybercrime.
- Disaster Recovery Specialist – Plan for and respond to data and system catastrophes.
- Ethical / White Hat Hacker – Perform lawful security testing and evaluation.
- Governance Compliance & Risk (GRC) Manager – Oversee risk management.
- IIoT (Industrial Internet of Things) Security Specialist – Protect industrial control systems.
- Incident Responder – First response to cyber intrusions and data breaches.
- Information Assurance Analyst – Identify risks to information systems.
- Information Security Analyst – Plan and carry out infosecurity measures.
- Information Security Manager / Director – Oversee an IT security team(s).
- Intrusion Detection Analyst – Use security tools to find targeted attacks.
- IoT (Internet of Things) Security Specialist – Protect network-connected devices.
- IT Security Architect – Implement network and computer security.
- Malware Analyst – Detect and remediate malicious software.
- Mobile Security Engineer – Implement security for mobile phones and devices.
- Network Security Administrator – Secure networks from internal and external threats.
- Penetration Tester (Pen-Tester) – Perform authorized and simulated cyberattacks.
- PKI (Public Key Infrastructure) Analyst – Manage secure transfer of digital information.
- Red Team Member – Participate in real-world cyberattack simulations.
- SCADA (Supervisory control and data acquisition) Security Analyst – Secure critical infrastructures.
- Security Auditor – Conduct audits on an organization’s information systems.
- Security Awareness Training Specialist – Train employees on cyber threats.
- Security Operations Center (SOC) Analyst – Coordinate and report on cyber incidents.
- Security Operations Center (SOC) Manager – Oversee all SOC personnel.
- Source Code Auditor – Analyze software code to find bugs, defects, and breaches.
- Threat Hunter – Search networks to detect and isolate advanced threats.
- Virus Technician – Detect and remediate computer viruses and malware.
- Vulnerability Assessor – Find exploits in systems and applications.