Develop and oversee the implementation of information security procedures and policies. Build, maintain and upgrade security technology, such as firewalls, for the safe use of computer networks and the transmission and retrieval of information. Design and implement appropriate security controls to identify vulnerabilities and protect digital files and electronic infrastructures. Monitor and respond to computer security breaches, viruses, and intrusions, and perform forensic investigation. May oversee the assessment of information security systems.
Private for profit
State and local government
Private not for profit
Federal Government
Self-employed
No data available for this section.
Data supplied by Bureau of Labor Statistics, National Center of Education Statistics, Defense Manpower Data Center (View our update schedule). Contact any business, college or military service branch to answer additional questions.