Careers with a Cyber Degree��WESTERN OREGON UNIVERSITY CRIMINAL JUSTICE DIVISION
General Information
The more common jobs are at the top of the categories with the unique or less common towards the end. Within each career there is a variety of jobs at the federal, state, county, and private level. For more information, specialized YouTube videos and resources have been included in the comments section of each slide.
**Very important: You should be well-prepared to pursue all jobs that a traditional CJ student generally pursues (such as those in policing, corrections, etc.). However, the added benefit of a CIE degree is that you will possess additional knowledge and skills that, could be argued, would make you more marketable.
Keep in Mind
The following jobs are just some examples, and when you are looking to apply for a specific job make sure to check the agencies specific requirements. With that said, the jobs are general, and the requirements/qualifications and pay may change with various skills that you may possess, or it may change with the number of years you have been in a position or years of experience in the field. If you don’t have the required degree or qualification for a certain job, some employers will still consider you if you can show how your degree can relate or help you in that position.
Cyber Security-Related Jobs
Investigative Analyst 1
1 Description
2 Median Salary
$77,726
3 Skills
4 Qualifications
Investigates a number of crimes, ranging from recovering file systems on computers that have been hacked or damaged to investigating crimes against children. Recovers data from computers that can be used in prosecuting crimes in court. Computer crime investigators must also write reports for and testify in court. Also, may work for large corporations to test security systems that are currently in place. Investigators do this by trying various ways to hack into the corporation's computer networks. At corporations, computer crime investigators also maximize optimal computer system performance levels.
Education Level | Percentage |
Associate's Degree | 2% |
Bachelor's Degree | 48% |
Master's Degree | 35% |
Doctoral Degree | 0% |
Other | 15% |
Years of Experience | Percentage |
0 to 2 years | 35% |
3 to 5 years | 36% |
6 to 8 years | 16% |
9+ years | 13% |
BASELINE SKILLS
A skill that is required across a broad range of occupations, including this one.
NECESSARY SKILLS
A skill that is requested frequently in this occupation but isn’t specific to it.
Data Scientist 2
1 Description
2 Median Salary
$150,000
Technical skills:
3 Skills
4 Qualifications
Advanced degree in Computer Science, Mechanical engineering, Statistics or related STEM field.
Detective
Information Security (INFOSEC) 3
1 Description
Information security analysts are heavily involved with creating their organization’s disaster recovery plan, a procedure that IT employees follow in case of emergency. These plans allow for the continued operation of an organization’s IT department. The recovery plan includes preventive measures such as regularly copying and transferring data to an offsite location. It also involves plans to restore proper IT functioning after a disaster. Analysts continually test the steps in their recovery plans.
Information security analysts must stay up to date on IT security and on the latest methods attackers are using to infiltrate computer systems. Analysts need to research new security technology to decide what will most effectively protect their organization.
2 Median Salary
$102,600
Analytical skills. Information security analysts study computer systems and networks and assess risks to determine improvements for security policies and protocols.
Communication skills. Information security analysts must be able to explain information security needs and potential threats to technical and nontechnical audiences within their organizations.
Creative skills. Information security analysts must anticipate information security risks and implement new ways to protect their organizations’ computer systems and networks.
Detail oriented. Because cyberattacks may be difficult to detect, information security analysts must pay careful attention to computer systems and watch for minor changes in performance.
Problem-solving skills. Information security analysts must respond to security alerts and uncover and fix flaws in computer systems and networks.
3 Skills
4 Qualifications
As security threats to businesses and government agencies increase, the information security analyst role is becoming increasingly important. Generally, this is not an entry-level position. A bachelor’s degree in computer science, programming, or engineering is a minimal requirement, and many companies further require a master's degree and many years' network experience.
Information security analysts work with various members of an organization. They must be able to communicate security measures and threats to people from a wide variety of technical and non-technical backgrounds.
Software Engineer 4
1 Description
A software engineering professional is someone who designs, develops, tests, and maintains software applications. Software engineers develop software solutions for end users based on engineering principles and programming languages.
Techopedia defines software engineering as “the process of analyzing user needs and designing, constructing, and testing end-user applications that will satisfy these needs through the use of software programming languages. It applies engineering principles to software development. In contrast to simple programming, software engineering is used for larger and more complex software systems, which are used as critical systems for businesses and organizations.”
2 Median Salary
$71,912
Computer programming and coding
Software development
Object oriented design
Software testing and debugging
Verbal/written communication
Logical thinking
Teamwork
3 Skills
4 Qualifications
The software engineer job description starts with background requirements. Someone looking to get into this role will need a bachelor’s degree in software, math, or science. Applicants would also be expected to have broad experience with computer systems and applications such as C++ or Java.
Depending on the specific scope of the role, the skills required will vary, but employers will look for candidates who can offer strategic problem solving, strong analytical skills, collaboration, adaptability, a willingness to learn, innovation, and communication.
Professor 5
1 Description
A Cybersecurity Professor or Instructor is responsible for developing and using effective teaching strategies to educate students of abilities on the subject of cybersecurity. These professionals may work at training institutions, undergraduate or graduate level, or assist in research in their specialism. By educating others on aspects of cybersecurity, Professors and Instructors act as an ambassador for the industry.
2 Median Salary
$97, 586
3 Skills
4 Qualifications
PhD in cybersecurity, computer science, or a closely related field is preferred, though consideration will be given to applicants with a Master's degree in cybersecurity, computer science, or closely related field who also have industry experience in a technical field.
Forensic Computer Analyst 6
1 Description
2 Median Salary
$74, 805
3 Skills
4 Qualifications
A Bachelors degree in computer science, or a related field, is the minimal requirement; however, an advanced degree is recommended. Certification is also required:
�Here are some of the most common certifications*:
Vendor-neutral certification (covering best practices in a specific area)
Vendor-specific certification (covering specialized training in a specific developer’s software platforms)
Fraud Investigator 7
1 Description
Most fraud investigators work in corporate or government-based institutions. Duties vary greatly, and the skills required include: conducting independent research of claims, examining the evidence, interviewing victims, and questioning potential perpetrators.
With the rise of identity theft and cybercrime, fraud investigators interview victims of fraudulent electronic transactions and interact directly with complainants and law enforcement officials. Additionally, fraud investigators communicate with employers, witnesses, and complainants. Along with the criminal justice system, they serve and execute search warrants, conduct surveillance, collect evidence, and make statements under oath in courtroom testimonies. Fraud investigators also work with attorneys and prosecutors in consultative legal capacities.
2 Median Salary
$54,997
3 Skills
4 Qualifications
Step 1: Earn a bachelor’s degree in forensic accounting, criminal justice, or a related field (four years).
Step 2: Get some experience in the field (one to three years).
Step 3: Pursue certification through a professional organization (less than one year):
There are two main certifying organizations for fraud investigation professionals: the Association of Certified Fraud Examiners (ACFE) and the International Association of Special Investigations Units (IASIU).
Step 4: Pursue a master’s degree program and/or doctorate degree (two to four years, optional).
Ethical Hacker 8
1 Description
Also known as “white hats,” ethical hackers are security experts that perform these security assessments. The proactive work they do helps to improve an organization’s security posture. With prior approval from the organization or owner of the IT asset, the mission of ethical hacking is opposite from malicious hacking.
2 Median Salary
0–1 year experience: $89,058
3 Skills
4 Qualifications
Generally speaking, more education tends to correlate with higher salaries. In penetration and vulnerability testing, 67 percent of job listings request at least a bachelor's degree and 23 percent require a master's degree or higher [2]. While this ultimately depends on the company and your unique circumstances, having a graduate degree could lead to higher-paying roles as an ethical hacker.
Earning a certification in ethical hacking or cybersecurity can validate your skills to potential employers, which could translate to an increase in pay. According to Payscale, those with a Certified Ethical Hacker (CEH) credential earn a median base pay of $80,513
Cyber Security (GOV or Private)9
1 Description
A Cyber Security Specialist’s responsibilities include using their skills to detect insecure features and malicious activities within our networks and infrastructure. They will implement customized application security assessments for client-based asset risk, corporate policy compliance as well as conduct vulnerability assessment. They should have an advanced understanding of TCP/IP, common networking ports and protocols, traffic flow, system administration, OSI model, defense-in-depth and common security elements.
The specialist’s focus is not only limited to assessing whether vulnerabilities exist but also how those risks could be mitigated which can help provide organizations with more confidence about system stability going forward.
2 Median Salary
$73,795
Proven work experience as a Cyber Security Specialist or similar role
Hands-on experience analyzing high volumes of logs, network data and other attack artifacts
Experience with vulnerability scanning solutions
Proficiency with antivirus and security software
Bachelor’s degree in Computer Science, Information Systems, or equivalent education or work experience
3 Skills
4 Qualifications
Air Marshal
FBI (Cyber Special) Agent 10
1 Description
Special Agent jobs within the Cyber Division will involve the following functions:
2 Median Salary
$52,000
Collaboration
Communication
Adaptability
Initiative
Interpersonal ability
Leadership
Organization
Judgement
Specialized skill set
3 Skills
4 Qualifications
Candidates matriculating from institutions that have been designated as one of the Centers of Academic Excellence often have an extra edge during the hiring process:
Threat Intelligence 11
1 Description
A threat intelligence analyst (TIA) analyzes and detects cyber threats and malware impacting an enterprise. They investigate the level of threat posed by an attack and consequently enable organizations to take informed cybersecurity-based business decisions. These professionals are aware of the cybersecurity risks of concern for different industry verticals and help secure the critical assets that need protection. Threat intelligence analysts prioritize threats and focus on the most severe ones.
2 Median Salary
$110,675
Formal degree in related field
Experience
IT certifications
Knowledge of diverse disciplines
Strategic
Organized
Interpersonal skills
Innovative
3 Skills
4 Qualifications
Potential employers look for candidates with relevant experience of around three to five years in threat analysis and report writing. Additionally, possessing some work experience in information technology (IT), security, data analysis, incident response, vulnerability management, penetration testing, and ethical hacking can benefit a threat intelligence professional.
Some employers may also demand experience in strategy, research, and writing and seek candidates with good presentation skills. These analysts are expected to present threat information to a wider audience which includes a mix of seniority levels with different technical expertise.
�The right degree, experience, and relevant certification can help you upskill and grab the attention of employers. Some standard IT certifications that can prove beneficial for aspiring threat intelligence analysts include:
IT Security Engineer 12
1 Description
Cybersecurity engineers can vary depending on their professional expertise and specialization. For example, companies hire cybersecurity engineers for application security, cloud security, network security, and information security based on their business needs. Across these job roles, cybersecurity engineers have two broad responsibilities: checking for vulnerabilities and implementing corrective measures.
These corrective measures can be purchased from the market (like firewalls, intrusion prevention detection systems, etc.) or built from scratch (like a security patch for an application). Cybersecurity engineers ultimately report to the chief information officer or the chief security officer, along with the ITOps lead, network engineering lead, and any other mid-management technical roles.
2 Median Salary
$97,780
Knowledge of programming language
Understanding of operating systems
Ethical hacking skills
Forensic skills
Problem solving
Project management
Communication
Collaboration
Life-long learner
3 Skills
4 Qualifications
Penetration Tester 13
1 Description
Penetration testers source flaws and weaknesses in existing, active systems such as websites, data storage systems, and other IT assets. Penetration testing is often confused with vulnerability testing. In actuality, these are two distinct cybersecurity specializations. Vulnerability testers look for system flaws and weaknesses during a security program’s design and setup phases. While penetration testing and vulnerability testing are both critical, they have unique responses and strategies.
At a high level, pen testers help their clients avoid the loss of consumer confidence and public relations fallout that accompany network security hacks. They also help them implement sound digital security measures that fit within set budgetary constraints.
2 Median Salary
$118,734
Knowledge of computer networks
Familiarity with exploits and vulnerabilities
Life-long learner
Knowledge of web communications and security
Ability to write code
Report writing
Team player
Public speaking
3 Skills
4 Qualifications
Bachelor’s degree in computer science, IT, cybersecurity, or computer engineering
For reference, here are the certs that are most relevant for a career in penetration testing services:
Crimes Against Children Specialization 14
1 Description
Helps state and local law enforcement agencies develop an effective response to cyber enticement and child pornography cases. This help encompasses forensic and investigative components, training and technical assistance, victim services and community education.
2 Median Salary
$491,116
3 Skills
4 Qualifications
A bachelor’s degree in criminal justice or cybersecurity is typically required, according to Cybersecurity Guide. A bachelor’s degree in computer science may also be desirable. An advanced degree is usually not a must, but it may give you an edge over the competition and demonstrate your career dedication and willingness to learn more about the cyber industry.
Certified Information Systems Security Professional (CISSP) and the Certified Ethical Hacker (CEH) certifications may be helpful
Air Marshal
Cryptographer 15
1 Description
A cryptographer is someone who writes (or cracks) the encryption code used for data security. Computer-encrypted data uses exceptionally long, advanced encryption algorithms that are incredibly hard and time-consuming for people to break. It's why today, online encryption governs the data exchange between web servers and web browsers and is critical to stable online transactions, secure communications, and safe data exchanges.
2 Median Salary
$145,000
3 Skills
4 Qualifications
To become a cryptographer you must first earn a bachelor’s degree in computer science, information technology, cybersecurity, or mathematics. All of these disciplines teach the technical, quantitative, and logic skills needed for making and breaking complex computerized codes.
If you’re considering working for the military or Department of Defense, you may also want to study linguistics or a foreign language since your role may interact with foreign communication signals. Additionally, advanced degrees such as a Master of Science in Cybersecurity and Information Assurance help to give you an edge in securing higher-paying, more competitive jobs. And many of these preferred roles require at least five years of experience.
Whatever role you choose, cryptologists must maintain subject matter expertise and relevance through continuous learning. Strategies and technologies are constantly changing. So to keep up, you can join professional organizations like the International Association for Cryptologic Research or earn a job-specific certification like the ECES.