Menu
  • Employee Resources
  • Language
    Stay

Careers in Cybersecurity

Three people sitting at computers

A few years ago, the dining room table conversation may not have included terms like hackers, cyber criminals, ransomware and data breaches. However, over the past two years the world has seen massive scale attacks on internet services like Amazon, Spotify and Netflix. Ransomware attacks seizing public transit systems and potentially compromising user information as well as disrupting municipal operations and massive loss of over 143 million personal records including credit card, address and social security information.

In 2016 Denver Post published an article that there were over 10,000 cybersecurity jobs here in Denver that need to be filled. A year later, 9News published a similar article. As more companies decide to call the Denver home, what will that number look like in 2018?! The threat of attacks and the abundance of jobs mean that careers and cybersecurity can be lucrative if an individual is interested.

Cybersecurity is not yet a typical career path, but could be an incredibly inclusive and diverse option as graduates start to seek out education or even post-graduation work! Here is just a small sampling of the options available  in the Cybersecurity career field.
 

  1. Security Analyst

    • Professionals who plan and carry out security measures to protect their organization’s networks, systems, data and users. Their responsibilities are continually expanding and adapt as number and complexity of Cyber Attacks continue to evolve. Often technical in focus, requiring a passion for technology, software and computers.

  2. Privacy Analyst

    • Privacy Analysts are often more of a business aligned position ensuring the organization complies with local, state and federal laws and regulations. Many privacy analysts ride the line between technical and non-technical as data continues to be housed and stored online.

  3. Information Security Officer

    • Often times a management level position, in charge of all aspects of cybersecurity. This role often leads small to large technical teams in implementing the controls, policies and procedures to protect organizations from cyber-criminals and cyber attacks.

  4. Security Engineer

    • In this role, professionals are often responsible for configuring and installing firewalls and intrusion detection systems. Security Engineers can also be tasked with performing vulnerability testing, developing automation scripts to track incidents, and testing security solutions. Often times a purely technical position, requiring knowledge of complex topics like networking.

  5. Security Architect

    • This role is often a more senior level position in which the professional is responsible for the planning, research, and design strong security architectures for an organization’s complex IT environment. The role may also perform security assessments, respond to incidents, develop requirements for network devices, as well as design how computers and systems communicate on the internet.

  6. Incident Responder

    • Think of this role as cyber firefighter. Incident Responders must rapidly address security threats and incidents within a company often time after they occur. The role requires a professional to actively monitoring systems and networks for attacks, identifying security vulnerabilities and establishing protocols for communication within an organization and with law enforcement during a security incident. Their work is used to educate users and system administrators as to better ways to protect the organization’s environment from future attacks.

  7. Forensics

    • Think of this role as the cyber detective. This role involves conducting security incident investigations, recovering and examining data from devices, compiling evidence for legal cases, and advising law enforcement on the credibility of acquired data. Often times these experts are recruited by large corporations, law enforcement agencies, legal firms, health care providers, and government.

  8. Leadership (CISO / BISO)

    • This position is executive level and works closely with other executives in the organization (CEO, CFO, CTO, CIO..etc). This position focuses on helping develop an organizational culture and centralized strategy to manage risk and security.  The title Business Information Security Officer will helps to ensure that each line of business works toward a central goal, designed to minimize risk, maximize protection and increase the value of the organization’s business information assets.

  9. Auditor

    • Auditors are often hired by consulting firms and government organizations to plan, execute, and lead security audits across regulated companies, evaluate the efficiency, effectiveness, and compliance of operational processes with local, state or federal security policies, government regulations, and help develop and administer risk-focused examinations for IT systems.

  10. Sales / Marketing

    • As we continue to pursue security, companies are creating tools to make the responsibilities quicker and easier to achieve. Many of these companies require sales and marketing professionals to ensure their produce hit their markets.

 

December 7, 2017 | By CSilberman | Category: ITS

District News

The Apple Awards honors and celebrates excellence in education. This year, more than 5,000 nominations were submitted. 188 Apple Representatives from schools and departments were then selected by the Foundation in January. Of this outstanding group of education leaders, five individuals were awarded with an Apple Award. 

High school students across Douglas County, and many students in respective feeder schools, are once again learning that a little kindness can go a long way. Again this year, our high schools hosted Wish Weeks to make dreams come true for Make-A-Wish Foundation beneficiaries.

The Douglas County School District (DCSD) Board of Education has named Thomas S. Tucker, Ph.D. as the sole finalist to lead our 68,000-student district as superintendent on a unanimous vote.