Log In

Log In to Save

Sign Up to Save

Sign Up to Dismiss

or

The email and password you specified are invalid. Please, try again.

Email and password are mandatory

Forgot Password?

Don't have an account? Sign Up

reset password

Enter your email address and we will send you a link to reset your password.

Back to Log In

Become A Cyber Security Specialist

Where do you want to work?

To get started, tell us where you'd like to work.
Sorry, we can't find that. Please try a different city or state.

Working As A Cyber Security Specialist

  • Interacting With Computers
  • Getting Information
  • Analyzing Data or Information
  • Evaluating Information to Determine Compliance with Standards
  • Communicating with Supervisors, Peers, or Subordinates
  • Deal with People

  • Mostly Sitting

  • $107,610

    Average Salary

What Does A Cyber Security Specialist Do At Caci International

* Create and manages all cybersecurity documentation.
* Initiate and develop System Security Plans using Enterprise Mission Assurance Support System (eMASS).
* Initiates and maintains Risk Management Framework (RMF) for all client systems and manages the process through assessment and authorization.
* Maintain Army Portfolio Management System (APMS) records for all client IT systems.
* Manages security systems and analyzes potential threats and vulnerabilities to client systems.
* Provides expert level security analysis services for product, system, and network architecture designs.
* Analyze Assured Compliance Assessment Solution (ACAS) scan results and reports and develop and document mitigations and remediation for open findings.
* Conduct Annual FISMA Reporting Requirements for all IT systems
* Develop and maintain plan of actions and milestones for all client systems.
* Develop and maintain all Assess and Authorize artifacts for multiple systems and facilitate the processing of Authority to Operate documentation.
* Defines and resolves 'information ownership' issues and identifies levels of access to the systems user population.
* Advises management in the steps to take to investigate and resolve computer security incidents.
* Proposes and conducts research of new security technologies.
* Effectively prioritizes multiple high-visibility projects and coordinates resources.
* Develops tools for operational use and analyzes current threats to cybersecurity and systems.
* Ensures that the Information Systems Security policies, procedures, and practices as well as other systems user groups are adhered to

What Does A Cyber Security Specialist Do At The Boeing Company

* Integrate and test of cyber capabilities into an operational system
* Integrate technical parameters and assure compatibility of all physical, functional and program interfaces
* Perform various analyses to optimize total system of systems and/or system architecture
* Identify assets and assesses risks, threats, and vulnerabilities of the product assets in accordance with accepted industry, professional, and government standards to ensure security design integrity, availability, confidentiality and contract compliance
* Evaluate remediation recommendations and develop cost to mitigate estimates
* Employ system security processes, methods, and tools and assure their consistent application
* Resolve cross-functional technical issues
* Implement appropriate Accreditation and Authorization activities per JSIG DIACAP, DoD RMF, ICD 503, NISPOM, or DoD Overprint to the NISPOM as required by customers
* Coordinate with System Engineers, Software Engineers, network engineers, test and validation engineers and program management on security related activities and requirements
* Some travel (10%) may be required for meetings with customers, internal meetings, etc.
* Boeing is the world's largest aerospace company and leading manufacturer of commercial airplanes and defense, space and security systems.
* We are engineers and technicians.
* Skilled scientists and thinkers.
* Bold innovators and dreamers.
* Join us, and you can build something better for yourself, for our customers and for the world

What Does A Cyber Security Specialist Do At NRG Energy, Inc.

* _
* Insure compliance to all NERC
* CIP Standards at NRG s LaGen facilities.
* Primary responsibility for compliance at Medium and Low sites, and assist compliance efforts for High sites within LaGen.
* Be the lead for all CIP related Physical and Electronic Access control at BCII Gen.
* Work with IT/Network/Facilities/Transmission team members to insure security and compliance to CIP Standards.
* Be the primary contact for issues with Physical Security in all BCII Gen Physical Security Perimeters, including verifying those needing accesses, response to breaches and security system failures.
* Determination, verification and justification of all open ports and enabled services on Cyber Assets.
* Assessment of security patches and updates for all Cyber Assets.
* Deployment or mitigation of required security patches and updates to all Cyber Assets.
* Insure that Cyber Assets are protected by Antivirus/Antimalware applications; update as required.
* Insure required logging and alerting of Cyber Assets is functional; respond to detection of various types of alerts or breaches.
* Be the administrator for personnel needing electronic access, both local and remote, to Cyber Assets.
* Follow NRG s Policy and Procedure for reporting of Cyber or Physical Security Incidents.
* Assist in testing of the Incident reporting procedure annually.
* Perform and verify backups of Cyber Assets.
* Follow and assist others in following the NRG Policy and Procedures for Change Management.
* Perform Cyber Vulnerability Assessments as needed.
* Provide accurate documentation for all NERC evidence requirements; complete evidence collections tasks in NRG s workflow program in a timely manner.
* Assist with Compliance Requirements at other sites in the region as needed as well as being available to assist team members at other sites across the NRG fleet if needed.
* Work with team members on projects and new, innovative ideas.
* Working with various teams, prepare evidence needed for NERC Audits.
* Maintain great working relationships with site personnel and other teams.
* Some travel required- approximately 10
* Other duties as required.
* The ideal candidate is flexible, patient, forward thinking, innovative, and results oriented, with a high attention to detail.
* As a member of a highly functional team, will work well with others, serve as a resource to the team as well as contribute to the needs of the team.
* Socialize innovative ideas with the team and others.
* Remains open-minded when presented with new information and adjusts positively to change.
* Performs moderately complex work assignments under minimal supervision.
* Works to resolves moderately complex issue and seeks guidance from team members on escalated issues

What Does A Cyber Security Specialist Do At Longview International

* Ensure Information Assurance/Information security through vulnerability assessments, Risk Management Framework compliance, required patching, Certificate of Net-worthiness (CoN) testing and documentation and local area account processing.
* All work must be performed in accordance with AR 25
* DoD 8500
* and D0D 8510
* Must have strong experience with configuring and performing ACAS / Nessus IA vulnerability scans.
* Experience with performing IAVA Management activities.
* Must be able to perform remediation activities to elevate a security threat as necessary; including analysis and tracking threats from Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), vulnerability scanning solutions, anti-virus and anti-spyware protection systems, host based security systems (HBSS), digital forensics, managed firewalls, web-content filtering, web proxy services.
* Perform VPN configuration and maintenance for systems, networks, and applications.
* Perform vulnerability/risk analysis of computer systems and applications during all phases of the system development and life cycle.
* Ensure all Information Technology system(s) are brought into compliance with the latest Risk Management Framework standard and maintained at that level.
* Respond to new IM/IT projects effecting network operations such as: deployments, DISA STIG compliance, increase in security requirements, desktop data encryption deployment, and increased IAVA Scanning

What Does A Cyber Security Specialist Do At KPMG

* Effectively deliver Identity and Access Management (IAM) services, including Authoritative Source, Identity Management, Provisioning, Authentication, Authorization, Monitoring and Certifications, and Auditing and Reporting
* Assist with creation and execution of an IAM roadmap that meets requirements including, but not limited to, security for hybrid cloud deployment, B2B web services, mobile computing, fine grained access control, policy driven security, Identity Governance, Access Management, and Privileged access management, user provisioning/de-provisioning, and federation focusing on multiple protocols, such as Java or BeanShell coding
* Support the design and development of security solutions that adhere to applicable policies and comply with information security requirements
* Implement Role Based Access Controls (RBAC), including analytical role mining and entitlement analysis
* Provide support with respect to building, configuration, and architecture of one or more Identity platforms, such as SailPoint (IdentityIQ

Show More

Show Less

How To Become A Cyber Security Specialist

Most information security analyst positions require a bachelor’s degree in a computer-related field. Employers usually prefer analysts to have experience in a related occupation.

Education

Information security analysts usually need at least a bachelor’s degree in computer science, programming, or a related field. As information security continues to develop as a career field, many schools are responding with information security programs for prospective job seekers. These programs may become a common path for entry into the occupation. Currently, a well-rounded computer education is preferred.

Employers of information security analysts sometimes prefer applicants who have a Master's of Business Administration (MBA) in information systems. Programs offering the MBA in information systems generally require 2 years of study beyond the undergraduate level and include both business and computer-related courses.

Work Experience in a Related Occupation

Information security analysts generally need to have previous experience in a related occupation. Many analysts have experience in an information technology department, often as a network or systems administrator. Some employers look for people who have already worked in fields related to the one in which they are hiring. For example, if the job opening is in database security, they may look for a database administrator. If they are hiring in systems security, a computer systems analyst may be an ideal candidate.

Licenses, Certifications, and Registrations

There are a number of information security certifications available, and many employers prefer job candidates to have one. Certification validates the knowledge and best practices required from information security analysts. Some are general information security certificates, such as the Certified Information Systems Security Professional, and others have a narrow focus, such as penetration testing or systems auditing.

Advancement

Information security analysts can advance to become chief security officers or another type of computer and information systems manager.

Important Qualities

Analytical skills. Information security analysts must carefully study computer systems and networks and assess risks to determine how security policies and protocols can be improved.

Detail oriented. Because cyberattacks can be difficult to detect, information security analysts pay careful attention to their computer systems and watch for minor changes in performance.

Ingenuity. Information security analysts anticipate information security risks and implement new ways to protect their organizations’ computer systems and networks.

Problem-solving skills. Information security analysts respond to security alerts and uncover and fix flaws in computer systems and networks.

Show More

Show Less

Cyber Security Specialist jobs

Add To My Jobs

Cyber Security Specialist Typical Career Paths

Cyber Security Specialist Demographics

Gender

  • Male

    78.1%
  • Female

    19.4%
  • Unknown

    2.5%

Ethnicity

  • White

    82.1%
  • Hispanic or Latino

    7.4%
  • Asian

    7.3%
  • Unknown

    2.4%
  • Black or African American

    0.8%
Show More

Languages Spoken

  • Carrier

    100.0%

Cyber Security Specialist

Unfortunately we don’t have enough data for this section.

Cyber Security Specialist Education

Cyber Security Specialist

Unfortunately we don’t have enough data for this section.

Job type you want
Full Time
Part Time
Internship
Temporary

Top Skills for A Cyber Security Specialist

ProceduresSecurityOperationsEnsureComplianceVulnerabilityAssessmentsInformationSecurityAssuranceInformationSystemsSecurityPoliciesDODHbssNetworkSecurityIncidentResponseIntrusionDetectionAcasNistSecuritySystemFirewallSecurityStandardsSecurityIncidentsDisaStigs

Show More

Top Cyber Security Specialist Skills

  1. Procedures
  2. Security Operations
  3. Ensure Compliance
You can check out examples of real life uses of top skills on resumes here:
  • Evaluate impact of pending compliance standards on current organizational policies and procedures.
  • Provide Security Operations and firewall architecture and principles to classified and unclassified networks.
  • Monitor all site activities and ensure compliance within operational procedures and policies.
  • Perform network scanning and vulnerability assessments.
  • Assisted in the information security training program with security awareness articles.

Top Cyber Security Specialist Employers

Show More

Cyber Security Specialist Videos

A day in the life of IT security

Careers in Cybersecurity- Expert Advice From BlackHat & DEFCON

×