5 of the Best IT Security Jobs and How to Get Them

By Robert Half on January 25, 2022 at 9:30am

Businesses are becoming increasingly more reliant on technology as they adopt new tools and digitize processes to support remote and hybrid teams, drive efficiency and innovation, and better serve their customers anytime, anywhere. The downside of all this technological change is that organizations are also at greater risk for cyberattacks and data breaches.

Cybersecurity incidents are not only disruptive but also costly. Recent research from Ponemon Institute conducted for IBM found that the average cost of a data breach reached $4.24 million per incident in 2021. That’s the highest level in 17 years.

Organizations need IT security experts to help protect their data and systems from attack by malicious actors. And according to Robert Half’s latest Salary Guide, cybersecurity and data privacy are among the top areas that firms are hiring for this year. So, if you’re thinking about pursuing an IT security role, now is a great time to explore your options.

What employers seek in IT security job candidates

IT security professionals with in-demand experience and valued certifications are likely to find numerous employment opportunities in the current hiring market. Most employers also require a bachelor’s degree in a relevant discipline, such as IT, computer science or business, for many IT security roles.

Here’s a look at five IT security-related jobs that many companies are looking to hire for this year — and what skills and experience you’ll likely need to be considered for them:

1. Systems security administrator

Systems security administrators maintain and support existing business system applications. This IT security job may be a blended role in small or midsize companies, combining systems administrator duties and the management of software and networking hardware. In larger organizations, this position focuses entirely on security, including the installation and maintenance of firewalls, virus protection and other measures. In both scenarios, the system security administrator helps to define best practices, report to management, and coordinate penetration testing to identify vulnerabilities.

Requirements: Candidates for the systems security administrator role must demonstrate knowledge of data systems security procedures and familiarity with relevant systems hardware and software. Good communication skills and the ability to work well in a team setting are also needed.

Credentials: Many employers prefer candidates with GIAC certifications for the system security administrator position.

2. Network security engineer

These IT security professionals are tasked with building an organization’s network security infrastructure. That work can include designing, integrating, and installing hardware and software to create the infrastructure from scratch, but it can also involve modifying an existing network to respond to emerging threats. The network security engineer also monitors threat detection and response activities and conducts routine analyses of security events, alerts and notifications.

Requirements: A network security engineer must be proficient in security technology and have extensive and current knowledge about cybersecurity threats and trends. These professionals must also know how to create and document security policies.

Credentials: For the network security engineer role, many employers will seek out candidates who have certifications such as the Certified Ethical Hacker (CEH), Certified Information Systems Security Professional (CISSP) and Cisco Certified Network Professional Security (CCNP Security).

3. Information systems security manager

Information systems security managers are responsible for leading a team of security administrators, analysts and other IT professionals to implement and continually improve an organization’s security policies, procedures and systems. These professionals also evaluate, test and select new security products and technologies for the business. They also typically manage security audits and vulnerability and threat assessments, and direct responses to network or system intrusions

Requirements: Most employers want professionals with an extensive background in systems and network security — at least five years of previous experience. As this IT security job is a management position, strong leadership and interpersonal skills are also a must.

Credentials: Most employers look for the CISSP or CompTIA Security+ certification.

4. Chief information security officer (CISO)

CISOs oversee measures to protect a company’s information and digital security and provide safeguards for an organization’s employees, systems and data. Professionals in this role usually have significant experience in areas such as data loss prevention, fraud prevention and data privacy, as well as demonstrated skills in business continuity and disaster recovery planning. Keen networking and communication skills are also required for the CISO position, as this technology executive is expected to lead information security initiatives and interface with clients.

Requirements: Technology professionals hired for the CISO role typically have at least 10 years of relevant IT experience. This IT security role also requires business acumen and an aptitude for long-term strategic thinking, along with the ability to plan, create and maintain complex security systems.

Credentials: Various compliance- and security-related certifications are valuable for the CISO role — which credentials are most needed will vary by employer.

5. IT auditor

IT auditors are responsible for performing detailed evaluation and internal control and audit reviews of computer information systems. They must have broad knowledge of the IT framework and intricate components of computer systems, as well as leadership experience overseeing teams working on various platforms, such as operating systems, networks, databases and enterprise resource planning (ERP) systems. The most experienced IT auditors are tasked with preparing reports and making recommendations to eliminate IT security risks.

Requirements: Professionals need excellent problem-solving and communication skills, plus solid knowledge of system architecture, to take on the IT auditor job. This role can provide a broad view of IT security issues across the organization.

Credentials: The Certified Information Systems Auditor (CISA) certification from ISACA is the broadly accepted standard certification for IT auditors.

Resources for IT salary research

If you’re interested in any of the roles listed above, or other IT security positions, you can take your research a step further by exploring the average starting salaries for these jobs, which are listed in the Robert Half Salary Guide. You can also use our Salary Calculator to get more insight on what salary you could potentially earn for these roles in your local market.

Also, for a quick look at the 15 highest-paying IT jobs in 2022, including information and data security roles, see this post.

And, when you’re ready to start your search for an IT security job, get in touch with the recruiters at Robert Half. We’re here to help!

More From the Blog...