Explore jobs
Find specific jobs
Explore careers
Explore professions
Best companies
Explore companies
Senior security engineer job growth summary. After extensive research, interviews, and analysis, Zippia's data science team found that:
The projected senior security engineer job growth rate is 32% from 2018-2028.
About 35,500 new jobs for senior security engineers are projected over the next decade.
Senior security engineer salaries have increased 12% for senior security engineers in the last 5 years.
There are over 18,158 senior security engineers currently employed in the United States.
There are 69,850 active senior security engineer job openings in the US.
The average senior security engineer salary is $122,480.
| Year | # of jobs | % of population |
|---|---|---|
| 2021 | 18,158 | 0.01% |
| 2020 | 17,420 | 0.01% |
| 2019 | 16,116 | 0.00% |
| 2018 | 25,378 | 0.01% |
| 2017 | 24,718 | 0.01% |
| Year | Avg. salary | Hourly rate | % Change |
|---|---|---|---|
| 2026 | $122,480 | $58.88 | +3.4% |
| 2025 | $118,445 | $56.94 | +2.3% |
| 2024 | $115,763 | $55.66 | +3.0% |
| 2023 | $112,420 | $54.05 | +3.1% |
| 2022 | $108,995 | $52.40 | +2.8% |
| Rank | State | Population | # of jobs | Employment/ 1000ppl |
|---|---|---|---|---|
| 1 | District of Columbia | 693,972 | 557 | 80% |
| 2 | Delaware | 961,939 | 250 | 26% |
| 3 | Virginia | 8,470,020 | 2,050 | 24% |
| 4 | Minnesota | 5,576,606 | 1,144 | 21% |
| 5 | Alaska | 739,795 | 151 | 20% |
| 6 | Maryland | 6,052,177 | 1,178 | 19% |
| 7 | Vermont | 623,657 | 114 | 18% |
| 8 | Washington | 7,405,743 | 1,295 | 17% |
| 9 | Illinois | 12,802,023 | 2,106 | 16% |
| 10 | New Hampshire | 1,342,795 | 220 | 16% |
| 11 | Rhode Island | 1,059,639 | 166 | 16% |
| 12 | Alabama | 4,874,747 | 722 | 15% |
| 13 | Nebraska | 1,920,076 | 291 | 15% |
| 14 | Georgia | 10,429,379 | 1,477 | 14% |
| 15 | Arizona | 7,016,270 | 1,016 | 14% |
| 16 | Colorado | 5,607,154 | 778 | 14% |
| 17 | Oregon | 4,142,776 | 597 | 14% |
| 18 | Montana | 1,050,493 | 146 | 14% |
| 19 | North Dakota | 755,393 | 103 | 14% |
| 20 | Wyoming | 579,315 | 84 | 14% |
| Rank | City | # of jobs | Employment/ 1000ppl | Avg. salary |
|---|---|---|---|---|
| 1 | Dover | 12 | 32% | $111,580 |
| 2 | Annapolis | 11 | 28% | $110,615 |
| 3 | Hartford | 12 | 10% | $113,268 |
| 4 | Lansing | 10 | 9% | $112,805 |
| 5 | Springfield | 10 | 9% | $101,721 |
| 6 | Des Moines | 12 | 6% | $100,410 |
| 7 | Tallahassee | 12 | 6% | $103,543 |
| 8 | Little Rock | 11 | 6% | $100,128 |
| 9 | Baton Rouge | 11 | 5% | $100,074 |
| 10 | Montgomery | 11 | 5% | $104,517 |
| 11 | Atlanta | 20 | 4% | $104,432 |
| 12 | Boston | 22 | 3% | $113,667 |
| 13 | Washington | 21 | 3% | $116,407 |
| 14 | Urban Honolulu | 11 | 3% | $99,534 |
| 15 | Denver | 14 | 2% | $108,767 |
| 16 | Indianapolis | 13 | 2% | $97,168 |
| 17 | Sacramento | 11 | 2% | $155,683 |
| 18 | Phoenix | 17 | 1% | $118,132 |
Rider University
University of Alabama at Huntsville
Pace University
West Virginia State University
University of Maryland Global Campus
Pennsylvania State University - Altoona
Pennsylvania State University - Lehigh Valley
Northwood University
The University of Tampa

Albertus Magnus College

Medaille College
Texas A&M University San Antonio
Zhengping Luo Ph.D.: Cybersecurity is a rapidly evolving field deeply rooted in Computer Science. To excel as a cybersecurity expert, you must understand the underlying technology of information systems. Therefore, continuous learning and staying updated with the latest technologies are essential. Currently, generative models like large language models are on the rise. It won't be long before cybersecurity concerns expand to include artificial intelligence technologies. Thus, the ability to keep pace with technological advancements, such as AI, is crucial for cybersecurity professionals. Cybersecurity is still evolving, and programming/debugging skills remain crucial. In addition, strong communication and teamwork skills are increasingly essential for cybersecurity experts.
Zhengping Luo Ph.D.: Maximizing your salary potential hinges on providing value in a market-driven economy. Make sure to focus on developing skills that are in high demand. One of the tips is to consider expanding your horizons beyond where you grow up or the place you received your degree. Explore opportunities in locations that value your talents and offer competitive compensation, such as different cities, states, or even nations. Additionally, don't limit yourself to familiar job roles; be open to new positions and industries. The evolving job market continually creates new and unforeseen opportunities. While striving for financial success is important, it's equally vital to consider long-term goals and personal fulfillment. Prioritize maximizing life experiences and other cherished values alongside financial goals.
Tommy Morris Ph.D.: Two skills are critical for the short term and long term in cybersecurity careers. Short term (3-5 years) artificial intelligence and machine learning will be a big trend in cybersecurity. Take a class in AI/MLand try to understand it can serve as a tool in your toolbox. Longer term, cybersecurity professionals need to be prepared to work on cross functional teams and be good communicators.
Dr. Darren Hayes: Add a cover letter, to accompany your resume, as many older people who review your resume expect you to include one. Don't just list your skills but mention some special projects that you were involved in, or your impact on an organization during an internship. These demonstrate the application of your skills and can be great talking points during an interview. Don't add a lot of acronyms to your resume and expect that the reviewer will know what those mean - spell everything out. Read about the organization that you are applying to before an interview - it shows that you care and are taking an interest while in the interview. Professional certifications, in addition to your degree, will give you an edge over other applicants. Additionally, participation in team competitions, such as capture the flag, demonstrates a willingness to learn beyond the classroom, hone your skills, and ability to work in a team setting. Cybersecurity, digital forensics, IT, are always evolving so you need to continue to evolve too. Therefore, you should have plans to continue learning, such as professional certifications, graduate degree, training classes and other continuing education options. Talk about your plans and goals in an interview and not just about what you have done.
Dr. Darren Hayes: Many students add 'Excellent communication skills' to their resume but cannot explain what they mean by this. If you can demonstrate this by showing a website that you created, detailing your skills, portfolio of special projects, and other key successes, then it shows that you went the extra mile. Excellent communication skills can also be demonstrated with a YouTube video that you created, a presentation you gave at an academic conference or at other speaking engagements. Graduates looking for a job with Homeland Security that can demonstrate excellent writing skills are in need. My students who possessed excellent writing skills, in addition to technical skills, generally ended up making a higher salary. Those in high-ranking positions are generally assigned reporting responsibilities that require a good command of the English language. Critical thinking is also vitally important.
Dr. Darren Hayes: Artificial intelligence - in terms of automating certain areas of cybersecurity, such as acquiring threat intelligence, malware detection and being alerted to network breaches. Ransomware continues to be the primary concern for most organizations and using AI to quickly identify those threats and quickly respond will be key. AI can also be used in investigations, such as photo searches to identify where a suspect is or to find a missing person. Knowledge of current events - especially geopolitical events. These events have repercussions for the most sophisticated (state-sponsored) cyber attacks. Knowledge of a second, third or fourth language, is helpful now and will continue to be important - especially from a cybersecurity perspective because investigations often include foreign nationals. Knowledge of malware is really important for homeland security and this area of expertise will continue to be in demand. Incident response will continue to be understaffed and therefore tremendous opportunities will continue for those who can respond to network breaches, forensically analyze systems, examine malware, etc. Other areas of importance include, machine learning, quantum computing, open source intelligence (OSINT), threat intelligence (especially related to critical infrastructure and SCADA), cryptocurrencies, IoT threats and IoT evidence, to name but a few.
West Virginia State University
Computer Science
Dr. Ali Al-Sinayyid PhD: Cloud Security: With the increasing adoption of cloud computing, expertise in securing cloud environments will be crucial. Artificial Intelligence and Machine Learning (AI/ML): Leveraging AI and ML for threat detection, anomaly detection, and predictive analytics will be essential in staying ahead of sophisticated cyber threats. Privacy and Data Protection: With the rise of data privacy regulations like the California Consumer Privacy Act (CCPA), as amended by the California Privacy Rights Act (CPRA), skills in privacy engineering, data protection, and compliance will be in high demand. IoT Security: As the Internet of Things (IoT) continues to expand, securing connected devices and IoT ecosystems will become increasingly important. Threat Intelligence and Cyber Threat Hunting: Proactive threat intelligence gathering and cyber threat hunting skills will be essential for identifying and mitigating advanced cyber threats before they cause significant damage.
Dr. Ali Al-Sinayyid PhD: Maximizing salary potential when starting your career in cybersecurity requires strategic planning and ongoing skill development. Here are some steps to consider: Certifications: Obtaining industry-recognized certifications such as CompTIA Security+, CISSP, CISM, CEH, or CCSP can enhance your marketability and salary potential. Practical Experience: Highlight hands-on experience through internships, co-op programs, research projects, or freelance work to showcase your skills and capabilities to potential employers. Negotiate Salary: Research industry salary benchmarks and be prepared to negotiate your salary based on your qualifications, experience, and the value you bring to the organization. Stay Updated on Industry Trends: Stay abreast of emerging trends, technologies, and market demand in cybersecurity to position yourself for lucrative opportunities and career advancement. Network and Build Relationships: Cultivate relationships with professionals in the field, participate in industry events, and leverage networking opportunities to uncover hidden job opportunities.
Dr. Ali Al-Sinayyid PhD: I advise any graduate of computer science entering the cybersecurity field, to focus on continuous learning and practical experience. Stay updated on emerging technologies, threats, and best practices through professional development courses, certifications, and participation in industry conferences and events. Also, you need to seek opportunities for hands-on experience through internships, research projects, or collaboration with industry partners. Finally, consider specializing in a niche area of cybersecurity to differentiate yourself and enhance your expertise.
Jesse Varsalone: Obtaining additional industry certifications like CompTIA Security+, CISSP (Certified Information Systems Security Professional), and OSCP (Offensive Security Certified Professional) can make you a more valuable employee. If you are focused in an area like SOC (Security Operations Center), you can make yourself more well-rounded by learning a different role such as penetration (pen) testing. Adding an additional sector of cybersecurity will make you a more valuable asset to your present company and help you understand your current work role even better.
Syed Rizvi PhD: The field of cybersecurity is in a constant state of evolution, emphasizing the importance of continuous learning and staying abreast of the latest trends, technologies, and threats. Graduates should prioritize networking within the industry, as it can provide avenues for mentorship, collaboration, and career growth. Attending industry events, joining professional organizations, and connecting with established professionals are effective strategies. Practical experience holds significant value in cybersecurity; thus, seeking internships, participating in cybersecurity competitions, and engaging in personal projects are recommended to hone skills and build a robust portfolio. Additionally, while technical prowess is essential, soft skills such as communication, problem-solving, and teamwork are equally prized. Nurturing these skills alongside technical expertise is essential for professional success.
Syed Rizvi PhD: Proficiency in cloud security will be increasingly vital as cloud technologies see widespread adoption. Understanding how to secure cloud environments, data, and applications will be in high demand. Furthermore, the utilization of AI and ML technologies for both offensive and defensive cybersecurity strategies underscores the need for professionals well-versed in these areas. Familiarity with compliance frameworks such as GDPR, CCPA, and HIPAA is essential, given the evolving landscape of data privacy regulations globally. Additionally, the ability to swiftly gather, analyze, and respond to cyber threats in real-time will be paramount as threats become more sophisticated and prevalent.
Syed Rizvi PhD: Acquiring certifications such as CISSP, CISM, CEH, and CRISC can demonstrate expertise and potentially lead to higher salaries within the industry. Graduates should consider specializing in niche areas within cybersecurity, such as penetration testing, incident response, or security architecture, where demand for skilled professionals is particularly high. Pursuing leadership roles, such as team lead or manager positions, can also yield higher salaries and increased responsibility. During salary negotiations, it is crucial to research industry standards and market rates for the specific role and location. Articulating one's skills, experience, and value proposition effectively can help justify desired salary expectations.
Pennsylvania State University - Altoona
Computer/Information Technology Administration And Management
Syed Rizvi: Acquiring certifications such as CISSP, CISM, CEH, and CRISC can demonstrate expertise and potentially lead to higher salaries within the industry. Graduates should consider specializing in niche areas within cybersecurity, such as penetration testing, incident response, or security architecture, where demand for skilled professionals is particularly high. Pursuing leadership roles, such as team lead or manager positions, can also yield higher salaries and increased responsibility. During salary negotiations, it is crucial to research industry standards and market rates for the specific role and location. Articulating one's skills, experience, and value proposition effectively can help justify desired salary expectations.
Pennsylvania State University - Lehigh Valley
Curriculum And Instruction
Kermit Burley M.Ed.: In my fields of Cyber and Information Technology we truly need the abilities to be always learning and always preparing for the next great breakthrough or the next big threat. So, adaptability and a willingness to always be learning are essential for success. Of course, our greatest challenge now and certainly in the next 3-5 years will be AI. (Artificial Intelligence) It is already upon us and has the potential to revolutionize our field and the entire landscape of what we do. The ability to stay ahead of that very steep hill will require constant innovation and an ability to accurately anticipate what is coming just around the corner. What I also see is an increased need for "people" skills, the ability to lead a team of people to achieve goals and budgetary requirements. All too often graduates in Cyber and IT are stereotyped as not having any people skills at all and preferring to work alone. This stereotype must end and those graduates who possess people skills will be in great demand not only in the next 3-5 years, but for decades to come.
Northwood University
Computer And Information Sciences
Professor David Sanford: Workers like that they are challenged to solve problems and lead technological innovations.
They appreciate the diversity of projects
They enjoy the need for continuous improvement and education
Many see the global impact of their work.
They also desire and appreciate the need for versatile skills
A competitive salary is also an item that employees like
Workers dislike that the work can be stressful
Dealing with tight deadlines and/ or cybersecurity concerns.
This is a positive and a negative: The need to constantly stay up to date with technology can be a bit overwhelming for some.
There may be times of isolation, and
The unexpected system failures can be frustrating as they often require extra hours or the need to be on-call.
The multiple responsibilities and managing repetitive tasks are also issues workers point out in this field.
In short, the workplace offers exciting opportunities but comes with its fair share of pressures and challenges. Different people have different experiences based on their roles and personal preferences.
The University of Tampa
Information and Technology Management Department
Louis Bobelis: I feel the most important soft skill is character. Being outspoken and able to explain technical cyber incidents decisively and clearly for non-IT-oriented people in your organization is especially important when you are in more senior-level positions.

Albertus Magnus College
Business Administration and Management Department
David Garaventa: The skills/attributes required across a variety of jobs in the IT fields.
David Garaventa: Here is where I can be a little more specific, but mostly in terms of certifications. Certifications and micro-credentials indicate two things to an employer: First, you must have an established, verified set of knowledge and skills that you bring to the table. If it is an industry-respected certification, it brings a lot of credibility regarding your knowledge and skills around a specific platform or application. The second thing that certifications and micro-credentials demonstrate to an employer is that you are willing to continue to grow and develop your skills in your field. Technology is progressing so rapidly that the things you knew last year may no longer be relevant today. And as a result, having the ability and desire to continue learning, adapting, and attaining certifications is a great way to show your ongoing commitment to your profession.

Medaille College
Homeland Security Program
Dr. Steven MacMartin: Overall, in general? Health care, elementary school teachers, daycare, researchers at the PhD level and also low level, entry/service jobs - fast food, restaurant, bar, etc. Homeland Security specifically - really none. Jobs in the Homeland Security field have remained largely unaffected by the pandemic, and the pandemic isn't really directly related to specific Homeland Security jobs. (Maybe in the research and technology fields.). A side effect of the pandemic has been to focus a little on cyber security issues and those jobs could expand in law enforcement and Homeland Security areas.
Dr. Steven MacMartin: Absolutely - writing and oral presentation. A secondary skill that is helpful is academic research skills. But definitely writing skills.
Dr. Steven MacMartin: Salaries have steadily risen over time. A person at my level in government is currently making $20,000/year more than I was making when I retired 10 years ago. The same can be said for many areas of law enforcement, but not all.
Izzat Alsmadi: All certificates related to the earlier fields, specially data science and cyber security.
Izzat Alsmadi: It really depends on person interests, skills and expectations.
Izzat Alsmadi: For IT data science and cyber security will continue to grow for sure in the next few years.
Applications in smart phones, cloud computing, IoT will also see continuous interests.