50 Cybersecurity Titles That Every Job Seeker Should Know About

50 Cybersecurity Titles That Every Job Seeker Should Know About

A special resource for cybercrime fighters and wannabes

– Steve Morgan

Northport, N.Y. — Feb. 1, 2019

There will be 3.5 million unfilled cybersecurity jobs by 2021 — enough to fill 50 NFL stadiums — according to Cybersecurity Ventures.

If you’re a student, parent, teacher, IT worker, or anyone interested in the cybersecurity field, then this handy list of 50 titles will provide insight into a myriad of possible career opportunities. There’s no fluff here — these are all unique and legitimate job titles in one of the fastest growing industries.

1.  Application Security Administrator – Keep software / apps safe and secure.

2. Artificial Intelligence Security Specialist – Use AI to combat cybercrime.

3. Automotive Security Engineer – Protect cars from cyber intrusions.

4. Blockchain Developer / Engineer – Code the future of secure transactions.

5. Blue Team Member – Design defensive measures / harden operating systems.

6. Bug Bounty Hunter – Freelance hackers find defects and exploits in code.

7. Cybersecurity Scrum Master – Watch over and protect all data.

8. Chief Information Security Officer (CISO) – Head honcho of cybersecurity.

9. Chief Security Officer (CSO) – Head up all physical/info/cyber security.

10. Cloud Security Architect – Secure apps and data in the cloud.

11. Counterespionage analyst – Thwart cyber spies from hostile nation states.

12. Cryptanalyst – Decipher coded messages without a cryptographic key.

13. Cryptographer – Develop systems to encrypt sensitive information.

14. Cyber Insurance Policy Specialist – Consult on cyber risk and liability protection.

15. Cyber Intelligence Specialist – Analyze cyber threats and defend against them.

16. Cyber Operations Specialist – Conduct offensive cyberspace operations.

17. Cybercrime Investigator – Solve crimes conducted in cyberspace.

18. Cybersecurity Hardware Engineer – Develop security for computer hardware.

19. Cybersecurity Lawyer – Attorney focused on info/cyber security and cybercrime.

20. Cybersecurity Software Developer / Engineer – Bake security into applications.

21. Data Privacy Officer – Ensure legal compliance related to data protection.

22. Data Recovery Specialist – Recover hacked data from digital devices.

23. Data Security Analyst – Protect information on computers and networks.

24. Digital Forensics Analyst – Examine data containing evidence of cybercrimes.

25. Disaster Recovery Specialist – Plan for and respond to data and system catastrophes.

26. Ethical / White Hat Hacker – Perform lawful security testing and evaluation.

27. Governance Compliance & Risk (GRC) Manager – Oversee risk management.

28. IIoT (Industrial Internet of Things) Security Specialist – Protect industrial control systems.

29. Incident Responder – First response to cyber intrusions and data breaches.

30. Information Assurance Analyst – Identify risks to information systems.

31. Information Security Analyst – Plan and carry out infosecurity measures.

32. Information Security Manager / Director – Oversee an IT security team(s).

33. Intrusion Detection Analyst – Use security tools to find targeted attacks.

34. IoT (Internet of Things) Security Specialist – Protect network connected devices.

35. IT Security Architect – Implement network and computer security.

36. Malware Analyst – Detect and remediate malicious software.

37. Mobile Security Engineer – Implement security for mobile phones and devices.

38. Network Security Administrator – Secure networks from internal and external threats.

39. Penetration Tester (Pen-Tester) – Perform authorized and simulated cyberattacks.

40. PKI (Public Key Infrastructure) Analyst – Manage secure transfer of digital information.

41. Red Team Member – Participate in real-world cyberattack simulations.

42. SCADA (Supervisory control and data acquisition) Security Analyst – Secure critical infrastructures.

43. Security Auditor – Conduct audits on an organization’s information systems.

44. Security Awareness Training Specialist – Train employees on cyber threats.

45. Security Operations Center (SOC) Analyst – Coordinate and report on cyber incidents.

46. Security Operations Center (SOC) Manager – Oversee all SOC personnel.

47. Source Code Auditor – Analyze software code to find bugs, defects, and breaches.

48. Threat Hunter – Search networks to detect and isolate advanced threats.

49. Virus Technician – Detect and remediate computer viruses and malware.

50. Vulnerability Assessor – Find exploits in systems and applications.

Check back next week to see an updated list with a hyperlink on each position for more detail. Meanwhile, some of the job descriptions are self-explanatory and a simple Internet search will explain more.

If 50 positions sound like a lot, then hold on. We’ve got some more cyber and crypto jobs coming your way. Stay tuned! Know of a job we should list? Send it to us.

– Steve Morgan is founder and Editor-in-Chief at Cybersecurity Ventures.

By Heidi Wrighton
Heidi Wrighton Heidi Wrighton