Cyber Careers

The federal government is hiring! The Office of Personnel Management has new information available for job seekers about cybersecurity openings around the country. Whether you’re looking for an executive or entry level position, in IT or in administration, see why a federal job might be the right choice for you.

Find out more about federal CyberCareers and apply today!

In-Demand Careers in Cyber Security

Cyber security is booming and currently job postings for cyber security professionals is outpacing most other areas of Information Technology. There is expected to be a shortage of shortage of trained cyber security professionals (Read More).   A cyber security certificate or an associates of applied science degree with a concentration in cyber security from Lord Fairfax Community College can start you right in a fast-growing field.

Cyber Security Employment Opportunities

Learn about internships and jobs in cyber security, including positions posted by companies looking to hire LFCC students. Plus, find out how LFCC career coaches can review your resume, cover letter, prepare for interviews and help you find job openings.

Cyber Security Roles and Job Titles

To better describe the scope of those positions, employers often precede the above titles with qualifying terms like “Cyber”, “Information”, “Computer”, “Network”, “IT”, and “Applications”. This results in fuller job titles such as IT Security Engineer, Information Security Analyst, Network Security Administrator, IT Security Consultant, etc.. Special variations of titles are sometimes preferred, such as Information Assurance Analyst, and Security Software Developer. Also, some security jobs are even more specialized, such as cryptographer, intrusion detection specialist, and computer security incident responder. Click here to see 20 cool information security & cybersecurity jobs from the SANS Institute.

Additional terms are sometimes used to convey rank, such as Senior IT Security Consultant, and Chief Information Security Officer. Graduates of the new program will normally qualify for such high ranks after several years of on-the-job experience.

Common  Job Titles

  • Security Analyst – Analyzes and assesses vulnerabilities in the infrastructure (software, hardware, networks), investigates available tools and countermeasures to remedy the detected vulnerabilities, and recommends solutions and best practices. Analyzes and assesses damage to the data/infrastructure as a result of security incidents, examines available recovery tools and processes, and recommends solutions. Tests for compliance with security policies and procedures. May assist in the creation, implementation, and/or management of security solutions.
  • Security Engineer – Performs security monitoring, security and data/logs analysis, and forensic analysis, to detect security incidents, and mounts incident response. Investigates and utilizes new technologies and processes to enhance security capabilities and implement improvements.
  • Security Architect – Designs a security system or major components of a security system, and may head a security design team building a new security system.
  • Security Administrator – Installs and manages organization-wide security systems. May also take on some of the tasks of a security analyst in smaller organizations.
  • Security Software Developer – Develops security software, including tools for monitoring, traffic analysis, intrusion detection, virus/spyware/malware detection, anti-virus software, and so on. Also integrates/implements security into applications software.
  • Cryptographer/Cryptologist – Uses encryption to secure information or to build security software. Also works as researcher to develop stronger encryption algorithms.
  • Cryptanalyst – Analyzes encrypted information to break the code/cipher or to determine the purpose of malicious software.
  • Chief Information Security Officer – A high-level management position responsible for the entire information security division/staff. The position may include hands-on technical work.
  • Security Consultant/Specialist – Broad titles that encompass any one or all of the other roles/titles, tasked with protecting computers, networks, software, data, and/or information systems against viruses, worms, spyware, malware, intrusion detection, unauthorized access, denial-of-service attacks, and an ever increasing list of attacks by hackers acting as individuals or as part of organized crime or foreign governments.

Very Specialized Roles

  • Intrusion Detection Specialist – Monitors networks, computers, and applications in large organizations, looking for events and traffic indicators that signal intrusion. Determines the damage caused by detected intrusions, identifies how an intrusion occurred, and recommends safeguards against similar intrusions. Also does penetration testing to identify vulnerabilities and recommend safeguards as preemptive measures.
  • Computer Security Incident Responder – As a team member usually, prepares for and mounts rapid response to security threats and attacks such as viruses and denial-of-service attacks.
  • Source Code Auditor – Reviews software source code to identify potential security issues and vulnerabilities that could be exploited by hackers to gain unauthorized access to data and system resources.
  • Virus Technician – Analyzes newly discovered computer viruses, and designs and develops software to defend against them.
  • Penetration Tester (also known as Ethical Hacker or Assurance Validator) – Scans for and identifies vulnerabilities, and exploits them to provide hard evidence that they are vulnerabilities. When penetration-testing large infrastructures such as power grids, utility systems, and nuclear facilities, large teams of penetration testers, called Red Teams, are employed.
  • Vulnerability Assessor – Scans for, identifies and assesses vulnerabilities in IT systems including computers, networks, software systems, information systems, and applications software.

To know more email the center at [email protected]. Like us on Facebook also

Sidebar search form