Software Engineering Insider
home button

 

Information Security Engineers Keeping IT Secure

information security key

Information security engineers apply security principles to all stages of the software engineering life cycle, from requirements analysis through development and on to deployment and beyond. Job duties can be varied; they include those traditionally associated with software engineering as well as those associated with IT.

As a security engineer, you may be responsible for selecting or creating security systems. Creating firewalls is a relatively common job expectation. Other duties may include risk assessment, configuration of systems, and identification of vulnerabilities.

Some employers may ask you to model security threats. You could even be expected to try to hack the system yourself.

You could even be expected to try to hack the system yourself.

You may also be the person who responds to real (and unplanned) incidents and documents them.

Southern New Hampshire University offers a top tier Online BS in Computer Science. Additional Online BS programs include Software Engineering, IS, Data Analysis, Information Security, Data Analytics, Cybersecurity, Game Programming and more. An Associate's in Computer Science as well as Master's programs are also offered. Click here to learn about the SNHU programs.

Education and Advancement

A career as an information security engineer typically requires a bachelor's degree. If you know the career is right for you, you can opt for degree in security systems or security engineering and information quality assurance.

Classes can include data structures, java and C++ programming, network security, risk analysis, audit, web security, and business continuity (keeping operations going despite risks and incidents). Information security programs are not all the same. Some programs include more classes in computer science and engineering while others include more coursework in IT or business.

You can also break into the field with a degree in computer science or a related field. You may choose to pursue information security in-depth at the master's level. There are prestigious programs offering advanced study in areas like cryptography.

Seeking Employment

The skill set can be broad. Employers may ask for skill with scripting and database languages. Some jobs will require domain-specific knowledge. If you’re involved with medical data, for example, you’ll need an understanding of HIPAA.

You should be able to discuss and write specialized technical topics in ways that are appropriate for different audiences.

Communication skills are often desired: You may need to educate others. You should be able to discuss and write specialized technical topics in ways that are appropriate for different audiences.

Computer Security Certifications

You can pursue certifications to demonstrate your expertise in security.

One of the most respected security certifications is the Information Systems Security Engineering Professional credential. This is for people who have been in the security industry for a while. You will need experience in at least two of the ten domains. Cryptography, security architecture and design, network and telecommunications security, and access control are among the domains.

Having the CISSP credential is a big accomplishment in and of itself, but you can pursue additional specialty concentrations later. There are three concentrations. The ISSEP is probably the most relevant for the security engineer. (Other concentrations are ideal for architects or managers.)

If you don't have the necessary experience, you can still take the exam and become an Associate.

There are a number of specific security-related competencies that you can get certified in. ISC2 offers certification in secure application development. You don't actually have to have security as your main job role to pursue certification as an ISC2 Certified Secure Software Lifecycle Professional -- you do need to have a few years of experience in the software industry under your belt, though. You might want to pursue this credential if you’re contemplating a career change.

The CISSP credential is a big accomplishment in and of itself.

Auditing is another area to pursue. Still other certifications ask you to demonstrate the ability to think like a hacker. The EC-Council Certified Ethical Hacker credential shows that you can do just that. Part of preventing security breaches is knowing what isn’t secure. Trusted professionals are hired to deliberately hack into websites, thus exposing the vulnerabilities.

If you’ve got some creativity as well as a good grasp of the technical issues, this can be a fascinating field.


ecpi
syracuse msce

Explore Related Careers....

Cyber Security Fun Facts

  • NASA Reported Being Hacked 13 Times in 2011
  • A Ponemon Research survey of 583 companies in the United States found that 90% had been hacked at least once between 2010 and 2011.
  • APWG reports that there were at least 83,083 phishing attacks in the second half of 2011.

Information Security Professional Certifications

What Can I Do With?


Find a Program...





 

Home  |   About Us   |  Contact  |   Privacy Policy  |   Terms of Use
© 2011-2024 SoftwareEngineerInsider.com. All Rights Reserved.

Wiley University Services maintains this website. We are an advertising-supported publisher and are compensated in exchange for placement of sponsored education offerings or by you clicking on certain links posted on our site. This compensation may impact how, where and in what order products appear within listing categories. We aim to keep this site current and to correct errors brought to our attention. Education does not guarantee outcomes including but not limited to employment or future earnings potential. View Advertiser Disclosure