1 of 18

Careers with a Cyber Degree��WESTERN OREGON UNIVERSITY CRIMINAL JUSTICE DIVISION

2 of 18

General Information

The more common jobs are at the top of the categories with the unique or less common towards the end. Within each career there is a variety of jobs at the federal, state, county, and private level. For more information, specialized YouTube videos and resources have been included in the comments section of each slide.

**Very important: You should be well-prepared to pursue all jobs that a traditional CJ student generally pursues (such as those in policing, corrections, etc.). However, the added benefit of a CIE degree is that you will possess additional knowledge and skills that, could be argued, would make you more marketable.

Keep in Mind

The following jobs are just some examples, and when you are looking to apply for a specific job make sure to check the agencies specific requirements. With that said, the jobs are general, and the requirements/qualifications and pay may change with various skills that you may possess, or it may change with the number of years you have been in a position or years of experience in the field. If you don’t have the required degree or qualification for a certain job, some employers will still consider you if you can show how your degree can relate or help you in that position.

3 of 18

Cyber Security-Related Jobs

4 of 18

Investigative Analyst 1

1 Description

2 Median Salary

$77,726

3 Skills

4 Qualifications

Investigates a number of crimes, ranging from recovering file systems on computers that have been hacked or damaged to investigating crimes against children. Recovers data from computers that can be used in prosecuting crimes in court. Computer crime investigators must also write reports for and testify in court. Also, may work for large corporations to test security systems that are currently in place. Investigators do this by trying various ways to hack into the corporation's computer networks. At corporations, computer crime investigators also maximize optimal computer system performance levels.

Education Level

Percentage

Associate's Degree

2%

Bachelor's Degree

48%

Master's Degree

35%

Doctoral Degree

0%

Other

15%

Years of Experience

Percentage

0 to 2 years

35%

3 to 5 years

36%

6 to 8 years

16%

9+ years

13%

BASELINE SKILLS

A skill that is required across a broad range of occupations, including this one.

  • Communication Skills (25%)
  • Research (22%)
  • Writing (22%)
  • Problem Solving (13%)
  • Detail-Oriented (11%)

NECESSARY SKILLS

A skill that is requested frequently in this occupation but isn’t specific to it.

  • Python (20%)
  • Information Systems (19%)
  • Vaccination (13%)
  • Splunk (12%)
  • Computer Engineering (11%)

5 of 18

Data Scientist 2

1 Description

  • Work on the state-of-the-art large-scale data analytics and machine learning projects
  • Drive predictive analytics from billions of time series data points
  • Help define the analytical direction and influence the direction of the Engineering teams.
  • Use mathematical techniques to arrive at an answer using data. Translate analysis results into business recommendations.
  • Partner with Cybersecurity teams on projects to identify and articulate opportunities, see beyond the data to identify solutions that will raise the bar for decision making.
  • Extract actionable insights from broad, open-ended questions
  • Adapt machine learning and data mining algorithms to solve problems across several security teams
  • Use quantitative analysis and the presentation of data to see beyond the numbers and understand what can improve our processes.
  • Engage broadly with the organization to identify, prioritize, frame, and structure complex and ambiguous manufacturing related challenges, where advanced analytics projects or tools can have the biggest impact.

2 Median Salary

$150,000

Technical skills:

  • Familiarity with Big Data technologies such as Spark, Impala, Hadoop
  • Excellent understanding of statistical and machine learning models
  • Exceptional coding skills and experience with Python and Scala for data analysis.
  • Practical data wrangling skills (SQL, Python, Perl, R)
  • Familiarity with enterprise networks and systems.
  • Ability to work with remote teams/team-members

 

3 Skills

4 Qualifications

Advanced degree in Computer Science, Mechanical engineering, Statistics or related STEM field.

  • 3+ years of Data or Machine learning Science experience working on highly complex problems in a dynamic setting
  • Strong programming skills, especially in Python, Scala or C/C++ with 3+ years of relevant experience in a programming intensive role.
  • Experience with security information and event management (SIEM) systems and concepts like denial-of-service (DoS) or distributed denial-of-service (DDoS) attacks.
  • Technical expertise and in-depth knowledge in one or more of the following Data Science topics: Anomaly detection and signal processing, time-series data analysis and modeling, Conventional Machine Learning methods, Deep learning and CNNs, text mining, sentiment analysis, information retrieval, etc.
  • Proficiency with a deep learning framework such as TensorFlow, Keras, Pytorch, Caffe, MXNet, etc.
  • Proven track record of developing and deploying algorithms for a production-ready anomaly detection, or prediction systems using languages and big data platforms such as Python, C/C++, or Java.
  • Excellent communication and presentation skills.

6 of 18

Detective

Information Security (INFOSEC) 3

1 Description

Information security analysts are heavily involved with creating their organization’s disaster recovery plan, a procedure that IT employees follow in case of emergency. These plans allow for the continued operation of an organization’s IT department. The recovery plan includes preventive measures such as regularly copying and transferring data to an offsite location. It also involves plans to restore proper IT functioning after a disaster. Analysts continually test the steps in their recovery plans.

Information security analysts must stay up to date on IT security and on the latest methods attackers are using to infiltrate computer systems. Analysts need to research new security technology to decide what will most effectively protect their organization.

2 Median Salary

$102,600

Analytical skills. Information security analysts study computer systems and networks and assess risks to determine improvements for security policies and protocols.

Communication skills. Information security analysts must be able to explain information security needs and potential threats to technical and nontechnical audiences within their organizations.

Creative skills. Information security analysts must anticipate information security risks and implement new ways to protect their organizations’ computer systems and networks.

Detail oriented. Because cyberattacks may be difficult to detect, information security analysts must pay careful attention to computer systems and watch for minor changes in performance.

Problem-solving skills. Information security analysts must respond to security alerts and uncover and fix flaws in computer systems and networks.

 

3 Skills

4 Qualifications

As security threats to businesses and government agencies increase, the information security analyst role is becoming increasingly important. Generally, this is not an entry-level position. A bachelor’s degree in computer science, programming, or engineering is a minimal requirement, and many companies further require a master's degree and many years' network experience.

Information security analysts work with various members of an organization. They must be able to communicate security measures and threats to people from a wide variety of technical and non-technical backgrounds.

7 of 18

Software Engineer 4

1 Description

A software engineering professional is someone who designs, develops, tests, and maintains software applications. Software engineers develop software solutions for end users based on engineering principles and programming languages.

Techopedia defines software engineering as “the process of analyzing user needs and designing, constructing, and testing end-user applications that will satisfy these needs through the use of software programming languages. It applies engineering principles to software development. In contrast to simple programming, software engineering is used for larger and more complex software systems, which are used as critical systems for businesses and organizations.”

2 Median Salary

$71,912

Computer programming and coding

Software development

Object oriented design

Software testing and debugging

Verbal/written communication

Logical thinking

Teamwork

3 Skills

4 Qualifications

The software engineer job description starts with background requirements. Someone looking to get into this role will need a bachelor’s degree in software, math, or science. Applicants would also be expected to have broad experience with computer systems and applications such as C++ or Java

Depending on the specific scope of the role, the skills required will vary, but employers will look for candidates who can offer strategic problem solving, strong analytical skills, collaboration, adaptability, a willingness to learn, innovation, and communication. 

8 of 18

Professor 5

1 Description

A Cybersecurity Professor or Instructor is responsible for developing and using effective teaching strategies to educate students of abilities on the subject of cybersecurity. These professionals may work at training institutions, undergraduate or graduate level, or assist in research in their specialism. By educating others on aspects of cybersecurity, Professors and Instructors act as an ambassador for the industry.

2 Median Salary

$97, 586

  • knowledge of current trends in IT
  • excellent communicator (written and verbal communication skills)
  • excellent organizational and time management skills
  • student centered
  • ability to present technology information in an understandable format
  • ability to administer Windows-based network environments
  • knowledge of Linux (RHEL, SELinux, Kali or Parrot)

 

3 Skills

4 Qualifications

PhD in cybersecurity, computer science, or a closely related field is preferred, though consideration will be given to applicants with a Master's degree in cybersecurity, computer science, or closely related field who also have industry experience in a technical field.

9 of 18

Forensic Computer Analyst 6

1 Description

  • Conduct analysis of log files, evidence, and other information to determine best methods for identifying the perpetrator(s) of a network intrusion. (T0027)
  • Confirm what is known about an intrusion and discover new information, if possible, after identifying intrusion via dynamic analysis. (T0036)
  • Provide technical summary of findings in accordance with established reporting procedures. (T0075)
  • Examine recovered data for information of relevance to the issue at hand. (T0103)
  • Perform file signature analysis. (T0167)
  • Perform file system forensic analysis. (T0286)
  • Collect and analyze intrusion artifacts (e.g., source code, malware, and system configuration) and use discovered data to enable mitigation of potential cyber defense incidents within the enterprise. (T0432)

2 Median Salary

$74, 805

  • Knowledge of Various Technology
  • Digital Storage Devices
  • Computer Operating Systems
  • Computer Programming
  • Malware Types
  • Ethical Issues regarding Data
  • Legal Issues regarding Data
  • Ability to learn new things
  • Analytical Thinking
  • Critical Thinking
  • Communication Skills
  • Problem-solving Skills

3 Skills

4 Qualifications

A Bachelors degree in computer science, or a related field, is the minimal requirement; however, an advanced degree is recommended. Certification is also required:

Here are some of the most common certifications*:

Vendor-neutral certification (covering best practices in a specific area)

  • Certified Forensic Computer Examiner (CFCE) – offered by The International Association of Computer Investigative Specialists
  • Certified Computer Examiner (CCE) – offered by The International Society of Forensic Computer Examiners
  • Global Information Assurance Certification (GIAC) – offered by The SysAdmin Audit, Network, Security (SANS) Institute

Vendor-specific certification (covering specialized training in a specific developer’s software platforms)

  • EnCase Certified Engineer (EnCE) – offered by Guidance Software
  • AccessData Certified Examiner (ACE) – offered by AccessData

10 of 18

Fraud Investigator 7

1 Description

Most fraud investigators work in corporate or government-based institutions. Duties vary greatly, and the skills required include: conducting independent research of claims, examining the evidence, interviewing victims, and questioning potential perpetrators.

With the rise of identity theft and cybercrime, fraud investigators interview victims of fraudulent electronic transactions and interact directly with complainants and law enforcement officials. Additionally, fraud investigators communicate with employers, witnesses, and complainants. Along with the criminal justice system, they serve and execute search warrants, conduct surveillance, collect evidence, and make statements under oath in courtroom testimonies. Fraud investigators also work with attorneys and prosecutors in consultative legal capacities.

2 Median Salary

$54,997

  • A genuine interest in maintaining legal, financial, and ethical standards
  • A degree in forensic accounting, criminal justice, or a related field 
  • Previous military or law enforcement experience 
  • Knowledge of Internet-based crimes, legal and corporate investigation, and financial investigation 
  • Inquisitiveness 
  • Persistence
  • Patience
  • Exceptional writing and speaking skills

3 Skills

4 Qualifications

Step 1: Earn a bachelor’s degree in forensic accounting, criminal justice, or a related field (four years).

Step 2: Get some experience in the field (one to three years).

Step 3: Pursue certification through a professional organization (less than one year):

There are two main certifying organizations for fraud investigation professionals: the Association of Certified Fraud Examiners (ACFE) and the International Association of Special Investigations Units (IASIU).

Step 4: Pursue a master’s degree program and/or doctorate degree (two to four years, optional).

11 of 18

Ethical Hacker 8

1 Description

Also known as “white hats,” ethical hackers are security experts that perform these security assessments. The proactive work they do helps to improve an organization’s security posture. With prior approval from the organization or owner of the IT asset, the mission of ethical hacking is opposite from malicious hacking.

2 Median Salary

0–1 year experience: $89,058

  • 1-3 years experience: $96,814
  • 4-6 years experience: $109,005
  • 7-9 years experience: $121,620

  • Footprinting and reconnaissance
  • Scanning networks
  • Vulnerability analysis
  • System hacking
  • Malware threats
  • Social engineering
  • Session hijacking
  • Evading intrusion detection systems, firewalls, and honeypots
  • Hacking web servers
  • Hacking web applications
  • Hacking wireless networks
  • Hacking mobile applications
  • IoT hacking
  • Cloud computing
  • Cryptography

3 Skills

4 Qualifications

Generally speaking, more education tends to correlate with higher salaries. In penetration and vulnerability testing, 67 percent of job listings request at least a bachelor's degree and 23 percent require a master's degree or higher [2]. While this ultimately depends on the company and your unique circumstances, having a graduate degree could lead to higher-paying roles as an ethical hacker.

Earning a certification in ethical hacking or cybersecurity can validate your skills to potential employers, which could translate to an increase in pay. According to Payscale, those with a Certified Ethical Hacker (CEH) credential earn a median base pay of $80,513

12 of 18

Cyber Security (GOV or Private)9

1 Description

A Cyber Security Specialist’s responsibilities include using their skills to detect insecure features and malicious activities within our networks and infrastructure. They will implement customized application security assessments for client-based asset risk, corporate policy compliance as well as conduct vulnerability assessment. They should have an advanced understanding of TCP/IP, common networking ports and protocols, traffic flow, system administration, OSI model, defense-in-depth and common security elements.

The specialist’s focus is not only limited to assessing whether vulnerabilities exist but also how those risks could be mitigated which can help provide organizations with more confidence about system stability going forward.

2 Median Salary

$73,795

Proven work experience as a Cyber Security Specialist or similar role

Hands-on experience analyzing high volumes of logs, network data and other attack artifacts

Experience with vulnerability scanning solutions

Proficiency with antivirus and security software

Bachelor’s degree in Computer Science, Information Systems, or equivalent education or work experience

 

3 Skills

4 Qualifications

  • Bachelor’s degree plus 3 years of relevant experience
  • Master’s degree plus 1 year of relevant experience
  • Doctoral degree and no experience
  • Associate degree plus 5 years of in-depth experience clearly related to the position

13 of 18

Air Marshal

FBI (Cyber Special) Agent 10

1 Description

Special Agent jobs within the Cyber Division will involve the following functions:

  • Investigate a data theft, corruption or attempted attack using digital forensics

  • Interview suspects and personnel relevant to a cyber-attack

  • Maintain constant awareness of emerging and developing methods of cyber intrusions

  • Develop partnerships with leading computer experts and organizations to help create security systems and analyze malicious code

  • Identify and recruit the most qualified and talented counter-intrusion experts

  • Maintain the security systems of the FBI and related agencies

2 Median Salary

$52,000

Collaboration

Communication

Adaptability

Initiative

Interpersonal ability

Leadership

Organization

Judgement

Specialized skill set

 

3 Skills

4 Qualifications

  • Have a bachelor’s degree in Computer Science or a bachelor’s and at least 30 hours study in computer science, statistics, and mathematics (including 15 hours in integral and differential calculus)
  • Be no younger than 23 and no older than 37
  • Pass a rigorous background check
  • Pass a basic fitness test
  • Preferably hands-on experience in programming, networking, cryptography, or computer security

Candidates matriculating from institutions that have been designated as one of the Centers of Academic Excellence often have an extra edge during the hiring process:

  • Center of Academic Excellence in Cyber Defense Education (CAE-CDE) for schools offering four-year and graduate degrees
  • Center of Academic Excellence in Cyber Defense Two-Year Education (CAE-2Y) for community colleges offering two-year degrees
  • Center of Academic Excellence in Cyber Defense Research (CAE-R) for research institutes

14 of 18

Threat Intelligence 11

1 Description

A threat intelligence analyst (TIA) analyzes and detects cyber threats and malware impacting an enterprise. They investigate the level of threat posed by an attack and consequently enable organizations to take informed cybersecurity-based business decisions. These professionals are aware of the cybersecurity risks of concern for different industry verticals and help secure the critical assets that need protection. Threat intelligence analysts prioritize threats and focus on the most severe ones.

2 Median Salary

$110,675

Formal degree in related field

Experience

IT certifications

Knowledge of diverse disciplines

Strategic

Organized

Interpersonal skills

Innovative

 

3 Skills

4 Qualifications

Potential employers look for candidates with relevant experience of around three to five years in threat analysis and report writing. Additionally, possessing some work experience in information technology (IT), security, data analysis, incident response, vulnerability management, penetration testing, and ethical hacking can benefit a threat intelligence professional.

Some employers may also demand experience in strategy, research, and writing and seek candidates with good presentation skills. These analysts are expected to present threat information to a wider audience which includes a mix of seniority levels with different technical expertise.

�The right degree, experience, and relevant certification can help you upskill and grab the attention of employers. Some standard IT certifications that can prove beneficial for aspiring threat intelligence analysts include:

  • Certified Information Systems Security Professional (CISSP)
  • GIAC Certified Incident Handler (GCIH)
  • GIAC Cyber Threat Intelligence (GCTI)
  • GIAC Reverse Engineering Malware (GREM)
  • Certified Incident Handler Engineer (CIHE)
  • Information Systems Security Engineering Professional (ISSEP)

15 of 18

IT Security Engineer 12

1 Description

Cybersecurity engineers can vary depending on their professional expertise and specialization. For example, companies hire cybersecurity engineers for application security, cloud security, network security, and information security based on their business needs. Across these job roles, cybersecurity engineers have two broad responsibilities: checking for vulnerabilities and implementing corrective measures. 

These corrective measures can be purchased from the market (like firewallsintrusion prevention detection systems, etc.) or built from scratch (like a security patch for an application). Cybersecurity engineers ultimately report to the chief information officer or the chief security officer, along with the ITOps lead, network engineering lead, and any other mid-management technical roles. 

2 Median Salary

$97,780

Knowledge of programming language

Understanding of operating systems

Ethical hacking skills

Forensic skills

Problem solving

Project management

Communication

Collaboration

Life-long learner

3 Skills

4 Qualifications

  1.  At least a bachelor’s degree either in cybersecurity or a closely related field such as mathematics, computer science with a cybersecurity emphasis, or information management.

  • Career tracks that are more senior or management-oriented might require a master’s or PhD in security engineering or extensive work experience.

  • Certification: The cybersecurity field often requires applicants and employees to complete a professional certification in specialized fields within the broader industry. 

16 of 18

Penetration Tester 13

1 Description

Penetration testers source flaws and weaknesses in existing, active systems such as websites, data storage systems, and other IT assets. Penetration testing is often confused with vulnerability testing. In actuality, these are two distinct cybersecurity specializations. Vulnerability testers look for system flaws and weaknesses during a security program’s design and setup phases. While penetration testing and vulnerability testing are both critical, they have unique responses and strategies.

At a high level, pen testers help their clients avoid the loss of consumer confidence and public relations fallout that accompany network security hacks. They also help them implement sound digital security measures that fit within set budgetary constraints.

2 Median Salary

$118,734

Knowledge of computer networks

Familiarity with exploits and vulnerabilities

Life-long learner

Knowledge of web communications and security

Ability to write code

Report writing

Team player

Public speaking

3 Skills

4 Qualifications

Bachelor’s degree in computer science, IT, cybersecurity, or computer engineering

For reference, here are the certs that are most relevant for a career in penetration testing services:

  • Certified Cloud Security Professional (CCSP)–Associate of (ISC)² designation
  • Systems Security Certified Practitioner (SSCP)–Associate of (ISC)² designation
  • Certified Encryption Specialist (EC-Council ECES)
  • A+ (CompTIA)
  • Cybersecurity Analyst Certification, CySA+ (CompTIA)
  • Network Vulnerability Assessment Professional (CompTIA)
  • Network Security Professional (CompTIA)
  • Security Analytics Professional (CompTIA)
  • Security+ (CompTIA)
  • Project+ (CompTIA)
  • PenTest+ (CompTIA)
  • IT Operations Specialist (CompTIA)
  • Secure Infrastructure Specialist (CompTIA)
  • ITIL®1 Foundation
  • Network+ (CompTIA)

17 of 18

Crimes Against Children Specialization 14

1 Description

Helps state and local law enforcement agencies develop an effective response to cyber enticement and child pornography cases. This help encompasses forensic and investigative components, training and technical assistance, victim services and community education.

2 Median Salary

$491,116

  • Experience with evidence documentation (for use in court)
  • Experience in E-crimes, intelligence analysis, threat and/or cybercrime research, and open-source intelligence gathering
  • Proficiency in SQL
  • Cloud computing experience
  • Experience working with federal, state and foreign law enforcement or national security agencies
  • Exposure to software development lifecycle
  • Experience with IT investigations and digital forensics
  • Knowledge of information security basics

 

3 Skills

4 Qualifications

A bachelor’s degree in criminal justice or cybersecurity is typically required, according to Cybersecurity Guide. A bachelor’s degree in computer science may also be desirable. An advanced degree is usually not a must, but it may give you an edge over the competition and demonstrate your career dedication and willingness to learn more about the cyber industry.

Certified Information Systems Security Professional (CISSP) and the Certified Ethical Hacker (CEH) certifications may be helpful

18 of 18

Air Marshal

Cryptographer 15

1 Description

A cryptographer is someone who writes (or cracks) the encryption code used for data security. Computer-encrypted data uses exceptionally long, advanced encryption algorithms that are incredibly hard and time-consuming for people to break. It's why today, online encryption governs the data exchange between web servers and web browsers and is critical to stable online transactions, secure communications, and safe data exchanges.

2 Median Salary

$145,000

  • A knowledge of IT security hardware, software, and solutions.
  • Fluency in source code programming languages such as C#, C++, .NET, Java, Perl, PHP, Python, or Ruby on Rails.
  • Experience within IT support and using computer operating systems like UNIX, Linux, and MS Windows.
  • The ability to create source code.
  • Skills in symmetric cryptography—message authentication codes, hash functions, and symmetric encryption.
  • A basic understanding of complexity, information, and number theories.
  • A knowledge in public key and private key encryption, key exchange, and digital signatures.
  • The ability to use decryption methods to add even more security to your organization.�Strong math skills in discrete mathematics, and linear or matrix algebra.�Proficiency in data structures and cryptographic algorithms.

 

3 Skills

4 Qualifications

To become a cryptographer you must first earn a bachelor’s degree in computer science, information technology, cybersecurity, or mathematics. All of these disciplines teach the technical, quantitative, and logic skills needed for making and breaking complex computerized codes.

If you’re considering working for the military or Department of Defense, you may also want to study linguistics or a foreign language since your role may interact with foreign communication signals. Additionally, advanced degrees such as a Master of Science in Cybersecurity and Information Assurance help to give you an edge in securing higher-paying, more competitive jobs. And many of these preferred roles require at least five years of experience.  

Whatever role you choose, cryptologists must maintain subject matter expertise and relevance through continuous learning. Strategies and technologies are constantly changing. So to keep up, you can join professional organizations like the International Association for Cryptologic Research or earn a job-specific certification like the ECES.