What cyber security jobs are available and what training do you need? These resources and job descriptions will help aspiring cyber security professionals identify the best roles for them and allow employers to better communicate their expectations. Credit: Thinkstock As the security threat landscape evolves, so do the roles that security professionals play. Chief security officers (CSOs) and chief information security officers (CISOs) are seeing the scope of their responsibilities expand. Other professionals, such as security analysts and engineers, are finding they need to know more about working with other groups within their organizations. Newer roles such as malware analyst and incident responder are emerging to better combat threats.The effectiveness of any security-focused job depends on clear definitions of roles and strong communication up and down the line as to the tasks and responsibilities for which each player is responsible. Job hunters will also want to see a well-defined job description. Crafting a good cyber security job description is a big challenge, because each company has different needs and has its own expectations for each role on the security team.Cyber security job descriptionsHaving a common baseline for cyber security jobs provides a good starting point for companies as they assign duties and responsibilities. It also helps anyone looking for a job in security to identify the roles for which they are best suited. The articles below are intended to help management build job descriptions for key cyber security jobs and also provide information on salaries and certifications typically required for each role. They also discuss requirements that are specific to certain industries such as healthcare and finance. CISO job descriptionThe chief information security officer has a big, mission critical job. Make sure you spell out the CISO’s duties and expectations for the role.Security analyst job descriptionA thorough, clear job description will ensure that security analysts stay on the same page with management expectations. Security architect job descriptionA good information security architect straddles the business and technical worlds. Writing a solid, clear job description ensures that both sides understand the role. Security engineer job descriptionThe IT security engineer is on the front line of protecting a company’s assets from threats. The job requires strong technical, organizational and communication skills.How to get a job in cyber securityWhat cyber security jobs are available and what training do you need? We interviewed top practitioners in a range of security roles to provide a first-hand narrative of the path they took and the skills and experience that a particular security role requires.How to become a chief information security officer (CISO)A CISO typically has a technical information security or IT risk background, but the path that leads to the role can vary greatly. Here’s how one CISO landed his first job in the position.How to become a malware analystThe proliferation of ransomware and other attacks has increased demand for experts who can analyze how the software works and devise a response.How to become a security architectWhile the path to security architect varies, anyone considering the role should have a passion for IT infrastructure and protecting data. How to become a security engineerThe role is a fairly new one in many companies, and qualified candidates are in high demand. Learn how one IT security engineer landed his current job, the skills and training that helped him get there, and where his sights are set now.How to become a security consultantThe move to security consultant can be rewarding and challenging (in a good way), but be prepared to market and sell yourself and your services.How to become an incident responderA wide range of technical skills and curiosity about the mechanics and goals of an attack are key for effective incidence response.How to become a security software developerDevelopers with a security focus will be in strong demand, especially for financial, cloud and internet of things applications. How to become a security systems administratorThere are many more openings for security systems administrators than qualified applicants. That creates opportunities for IT professionals willing to get the training and certification.How to become an information assurance analystThis in-demand role calls for a rare combination of superior communication skills and security chops. Learn how one information assurance analyst landed his current job, the skills and training that helped him get there, and where his sights are set now.How to become a data security strategistData security strategist is a fast-growing career, and one that will get even hotter as data from AI and IoT initiatives pours into enterprises. Related content news UK Cyber Security Council CEO reflects on a year of progress Professor Simon Hepburn sits down with broadcaster ITN to discuss Council’s work around cybersecurity professional standards, careers and learning, and outreach and diversity. By Michael Hill Sep 27, 2023 3 mins Government Government Government news FIDO Alliance certifies security of edge nodes, IoT devices Certification demonstrates that products are at low risk of cyberthreats and will interoperate securely. By Michael Hill Sep 27, 2023 3 mins Certifications Internet Security Security Hardware news analysis Web app, API attacks surge as cybercriminals target financial services The financial services sector has also experienced an increase in Layer 3 and Layer 4 DDoS attacks. By Michael Hill Sep 27, 2023 6 mins Financial Services Industry Cyberattacks Application Security news Immersive Labs adds custom 'workforce exercising' for each organizational role With the new workforce exercising capability, CISOs will be able to see each role’s cybersecurity readiness, risk areas, and exercise progress. By Shweta Sharma Sep 27, 2023 3 mins Security Software Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe