Develop and oversee the implementation of information security procedures and policies. Build, maintain and upgrade security technology, such as firewalls, for the safe use of computer networks and the transmission and retrieval of information. Design and implement appropriate security controls to identify vulnerabilities and protect digital files and electronic infrastructures. Monitor and respond to computer security breaches, viruses, and intrusions, and perform forensic investigation. May oversee the assessment of information security systems.
Work Activities
- Education Bachelor's degree
- Work Experience No work experience
- Training No on-the-job training
-
Looking for technical training programs?
Check out these programs:
: They do well at jobs that need:
-
Access software
-
Application server software
-
Authentication server software
-
Cloud-based data access and sharing software
-
Cloud-based management software
-
Configuration management software
-
Content workflow software
-
Data base management system software
-
Data base reporting software
-
Data base user interface and query software
-
Development environment software
-
Electronic mail software
-
Enterprise application integration software
-
Enterprise resource planning ERP software
-
Enterprise system management software
-
Expert system software
-
File versioning software
-
Geographic information system
-
Graphics or photo imaging software
-
Internet directory services software
-
Network monitoring software
-
Network security and virtual private network VPN equipment software
-
Network security or virtual private network VPN management software
-
Object or component oriented development software
-
Office suite software
-
Operating system software
-
Presentation software
-
Project management software
-
Risk management data and analysis software
-
Spreadsheet software
-
Switch or router software
-
Transaction security and virus protection software
-
Transaction server software
-
Web platform development software
-
Word processing software