Information Security Engineers
Develop and oversee the implementation of information security procedures and policies. Build, maintain and upgrade security technology, such as firewalls, for the safe use of computer networks and the transmission and retrieval of information. Design and implement appropriate security controls to identify vulnerabilities and protect digital files and electronic infrastructures. Monitor and respond to computer security breaches, viruses, and intrusions, and perform forensic investigation. May oversee the assessment of information security systems.
45 alternate job titles:
Salary Information
Information Security Engineers: $108,970 (median) per year.
Starting salary (10th percentile).
Required expreience: Varies by Company
Data source: U.S. Bureau of Labor Statistics
Daily Tasks & Responsibilities
| Task Description | Category |
|---|---|
| Evaluate utility of software or hardware technologies. | Analysis |
| Evaluate potential of products, technologies, or resources. | Analysis |
| Analyze security of systems, network, or data. | Analysis |
| Investigate illegal or suspicious activities. | General |
| Establish work standards. | General |
| Install computer software. | General |
| Implement security measures for computer or information systems. | General |
| Provide technical guidance to other personnel. | General |
| Recommend changes to improve computer or information systems. | General |
| Read documents to gather technical information. | General |
| Test computer system operations to ensure proper functioning. | General |
| Train personnel in technical or scientific procedures. | General |
| Troubleshoot issues with computer applications or systems. | General |
| Write reports or evaluations. | General |
| Coordinate reporting or editing activities. | Management |
| Manage information technology projects or system activities. | Management |
| Supervise information technology personnel. | Management |
| Develop performance metrics or standards related to information technology. | Development |
| Develop software or computer applications. | Development |
| Develop operating strategies, plans, or procedures. | Development |
| Monitor processes for compliance with standards. | Maintenance |
Technology Requirements
| Technology | Description |
|---|---|
| Amazon Web Services AWS software | Data base user interface and query software |
| Elasticsearch | Data base management system software |
| IBM DB2 | Data base user interface and query software |
| Microsoft Access | Data base user interface and query software |
| Microsoft SQL Server | Data base user interface and query software |
| Microsoft SQL Server Reporting Services SSRS | Data base reporting software |
| MongoDB | Data base management system software |
| NoSQL | Data base management system software |
| ServiceNow | Data base user interface and query software |
| Structured query language SQL | Data base user interface and query software |
| ArcSight Enterprise Threat and Risk Management | Risk management data and analysis software |
| McAfee Enterprise Security Manager | Risk management data and analysis software |
| Platform as a service PaaS | Cloud-based data access and sharing software |
| Reporting software | Data base reporting software |
| Bash | Operating system software |
| Kubernetes | Application server software |
| Linux | Operating system software |
| Microsoft Active Directory | Internet directory services software |
| Microsoft Azure software | Development environment software |
| Microsoft PowerShell | Development environment software |
| Oracle Java | Object or component oriented development software |
| Python | Object or component oriented development software |
| Splunk Enterprise | Enterprise system management software |
| UNIX | Operating system software |
| Amazon Web Services AWS CloudFormation | Cloud-based management software |
| Ansible software | Expert system software |
| Apple iOS | Operating system software |
| Apple macOS | Operating system software |
| Atlassian Confluence | Project management software |
| Atlassian JIRA | Content workflow software |
| Border Gateway Protocol BGP | Switch or router software |
| C | Development environment software |
| C# | Object or component oriented development software |
| C++ | Object or component oriented development software |
| Chef | Configuration management software |
| Docker | Application server software |
| Git | File versioning software |
| GitHub | Application server software |
| Go | Development environment software |
| IBM Terraform | Configuration management software |
| JavaScript | Web platform development software |
| JavaScript Object Notation JSON | Web platform development software |
| Jenkins CI | Enterprise application integration software |
| Microsoft Excel | Spreadsheet software |
| Microsoft Office software | Office suite software |
| Microsoft Outlook | Electronic mail software |
| Microsoft PowerPoint | Presentation software |
| Microsoft SQL Server Integration Services SSIS | Enterprise application integration software |
| Microsoft SharePoint | Document management software |
| Microsoft Teams | Project management software |
| Microsoft Visio | Graphics or photo imaging software |
| Microsoft Windows | Operating system software |
| Microsoft Windows Server | Operating system software |
| PHP | Web platform development software |
| Perl | Object or component oriented development software |
| Puppet | Configuration management software |
| R | Object or component oriented development software |
| React | Web platform development software |
| Red Hat Enterprise Linux | Operating system software |
| Ruby | Development environment software |
| Shell script | Operating system software |
| UNIX Shell | Operating system software |
| Firewall software | Network security and virtual private network VPN equipment software |
| Operating system software | Operating system software |
| Single sign-on SSO | Authentication server software |
| Active directory software | Internet directory services software |
| Collaborative editing software | Word processing software |
| Enterprise application integration EAI software | Enterprise application integration software |
| Google Cloud software | Cloud-based management software |
| IBM Middleware | Transaction server software |
| IBM QRadar SIEM | Network monitoring software |
| IBM Resource Access Control Facility RACF | Network security or virtual private network VPN management software |
| IBM Tivoli software | Access software |
| Intrusion detection system IDS | Network security or virtual private network VPN management software |
| Management information systems MIS | Enterprise resource planning ERP software |
| Microsoft Azure Sentinel | Network monitoring software |
| Microsoft Defender Antivirus | Transaction security and virus protection software |
| Microsoft Security Esssentials | Transaction security and virus protection software |
| Network directory services software | Internet directory services software |
| Oracle Unified Directory | Internet directory services software |
| RESTful API | Web platform development software |
| Security assertion markup language SAML | Web platform development software |
| Snort | Network monitoring software |
| Software libraries | Development environment software |
| Tanium software | Enterprise system management software |
| Tcpdump | Network monitoring software |
| Tenable Nessus | Transaction security and virus protection software |
| Ubuntu | Operating system software |
| Web application software | Development environment software |
| Wireshark | Network monitoring software |
| Geographic information system GIS systems | Geographic information system |
Relevant Certifications
Industry certifications that may be valuable for this career role:
| Certification | Issuing Organization | Practice Test |
|---|---|---|
| Certified Application Security Engineer | EC-Council | Not Available |
| Certified Information Systems Security Professional | International Information Systems Security Certification Consortium, Inc. | Not Available |
| Certified Information Systems Security Professional - Architecture | International Information Systems Security Certification Consortium, Inc. | Not Available |
| Certified Information Systems Security Professional - Engineering | International Information Systems Security Certification Consortium, Inc. | Not Available |
| Certified Information Systems Security Professional - Management | International Information Systems Security Certification Consortium, Inc. | Not Available |
| Cisco Certified CyberOps Professional Certification | Cisco Systems, Inc. | Not Available |
| Cisco Meraki Solutions Specialist | Cisco Systems, Inc. | Not Available |