Skip to main content

Infosec Job Roles

Cyber and information security job roles with requirements and descriptions.

The Senior Security Engineer is responsible for the overall management of large enterprise networks; this includes the planning, design, 24x7 management, and coordination of the corporate LAN/WAN. This position also manages network security and policies....
A Security Consultant is a sort of guide or security guru.An expert consultant designs and implements the best security solutions for an organization's needs...
A description for intermediate-level IT security jobs; You will be responsible for designing, testing, implementing and monitoring security measures for your company’s systems.Maintains an organization's automated security systems and employee identification card system. Serves as the point of contact for security system related issues. Provides training to employees on use and feature......
A Security Administrator is basically the point man/woman for cyber security systems.He will be responsible for installing, administering and troubleshooting an organization's security solutions...
The Security Administrator is responsible for the administration of the organisation’s information and data security policies and practices to ensure authorised users can readily access information and that the information is protected in terms of confidentiality, integrity and availability.A Security Administrator is basically the point man/woman for cyber security systems.You will like......
Working independently, the Cyber Security Operations Senior Manager leads the Cybersecurity Security Operations Center (CSOC) responsible for security event monitoring, management, response, and triage. This role will be responsible for CSOC strategy, enhancing capabilities, incident monitoring, detection, analysis, and handling. Associate will ensure that your network and systems a......
The Director, Information Security is responsible for defining, advocating, implementing, monitoring and enforcing information security standards and policies for four distinct TeleTech businesses in 25 countries on five continents.  Reporting to the VP, Chief Information Security Officer (CISO), the Director, Information Security will have responsibilities for maintaining the information sec......
The ethical hacker will be performing penetration testing or vulnerability assessment of web applications, mobile applications, thick clients, and performing code reviews for multi-protocol enterprise systems....
An information assurance analyst has several daily tasks that protect the corporate environment from hackers and cyber threats.Hackers and security experts who understand both white hat and black hat hacking.They keep up to date with the latest security alerts.They update and patch current systems, and they work with developers to review software for future deployments.During cyber......