Information Technology Careers | Cyber Security Architect

Cyber Security Architect

Career Area: Information Technology

Occupation Group: Network and Systems Engineering

Salary

Percentile wages tell how much a certain percentage of an overall population in a geographic area or within a given industry or field makes. The percentile wage estimate is the value of a wage below which a certain percent of workers fall.

An example would be the 25th percentile, 25 percent of workers employed in that occupation earn less and 75 percent earn more than the estimated wage value. At the 75th percentile, 75 percent of workers employed in that occupation earn less and 25 percent earn more than the estimated wage value.

A typical Cyber Security Architect earns the following wages (national and state):

State

The average salary in North Carolina for those pursuing this career is $124,693

*The salaries depicted here are representative of the range of salaries posted in job listings over the past year. Living wage in North Carolina is $30,000.

National

The average salary in the United States for those pursuing this career is $123,854

*The salaries depicted here are representative of the range of salaries posted in job listings over the past year. Living wage in North Carolina is $30,000.

What Does a Professional in this Career Do?

Builds and develops systems that protect the security of large databases, including databases with customer information and patient files. Includes understanding of client computer systems, potential weak points in security, and monitoring and response to security issues.

Employment Trends

The job demand and job growth statistics shown here were derived from job posts over the past year. Expected job growth projections are extrapolated from year-over-year job post listing history.

Job demand and job growth is expected at the following rates:

LocationGrowth
North Carolina307+33.2%
Nationwide6112+28.5%

Skills

A professional in this position typically utilizes the following skills in the course of everyday work in this exciting and challenging field:

Baseline Skills

The following are baseline skills every Cyber Security Architect is expected to have in order to experience success in this field:

  • Communication Skills: The ability to convey information to another effectively and efficiently.
  • Teamwork / Collaboration: Experience working in collaborative efforts with a team to achieve a common goal or to complete a task in the most effective and efficient way.
  • Planning: Working experience with the process of thinking about and organizing the activities required to achieve desired goals.
  • Research: Experience performing creative and systematic work to understand a product, market, or customer, either before building a new solution, or to troubleshoot an existing issue
  • Problem Solving: Problem solving consists of using generic or ad hoc methods, in an orderly manner, for finding solutions to problems.

Specialized Skills

These skills are specific to working in this career:

  • Information Security: Information security, sometimes shortened to InfoSec, is the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information.
  • Network Security: Network security consists of the policies and practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.
  • Cryptography: Experience of the practice of developing techniques for secure communication in the presence of third parties.
  • Information Systems: An information system (IS) is an organized system for the collection, organization, storage and communication of information.
  • Authentication: Authentication is the act of confirming the truth of an attribute of a single piece of data claimed true by an entity.

Distinguishing Skills

Any Cyber Security Architect that possesses the following skills will stand out against the competition:

  • Cloud Computing: Working experience of Cloud Computing, which is an information technology (IT) paradigm that enables ubiquitous access to shared pools of configurable system resources and higher-level services that can be rapidly provisioned with minimal management effort, often over the Internet.
  • Public Key Infrastructure (PKI): Working experience of Public Key Infrastructure (PKI), which is a set of roles, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption. The purpose of a PKI is to facilitate the secure electronic transfer of information for a range of network activities such as e-commerce, internet banking and confidential email. It is required for activities where simple passwords are an inadequate authentication method and more rigorous proof is required to confirm the identity of the parties involved in the communication and to validate the information being transferred.
  • Data Loss Prevention: Working experience of Data Loss Prevention. Data loss prevention software detects potential data breaches/data ex-filtration transmissions and prevents them by monitoring, detecting and blocking sensitive data while in-use (endpoint actions), in-motion (network traffic), and at-rest (data storage). The terms data loss and data leak are related and are often used interchangeably. Data loss incidents turn into data leak incidents in cases where media containing sensitive information is lost and subsequently acquired by an unauthorized party. However, a data leak is possible without losing the data on the originating side. Other terms associated with data leakage prevention are information leak detection and prevention (ILDP), information leak prevention (ILP), content monitoring and filtering (CMF), information protection and control (IPC) and extrusion prevention system (EPS), as opposed to intrusion prevention system.
  • Vulnerability analysis: Working experience of Vulnerability analysis, which is the process of identifying, quantifying, and prioritizing (or ranking) the vulnerabilities in a system. Examples of systems for which vulnerability assessments are performed include, but are not limited to, information technology systems, energy supply systems, water supply systems, transportation systems, and communication systems. Such assessments may be conducted on behalf of a range of different organizations, from small businesses up to large regional infrastructures.
  • PCI (Payment Card Industry): Working experience of PCI (Payment Card Industry), which refers to the industries related to automated teller machines (ATMs), point of sale (POS) terminals, credit, debit, prepaid and electronic money cards, and other associated industries.

Salary Boosting Skills

A professional who wishes to excel in this career path may consider developing the following highly valued skills:

  • Cloud Security Application: Working experience of Cloud Security Application, which is related to designing and implementing application security in a cloud environment. This includes securing platforms and Software as a Service (SaaS).

Experience

This position typically requires the following level of experience. The numbers presented in the pie charts below were derived from actual job posts over the past year. Not all job postings list experience requirements.

Experience Required%
0 to 2 years3%
3 to 5 years37%
6 to 8 years26%

Many of the programs offered through NC State are designed for working professionals who need additional credentials to enhance existing work experience.

Students who do not have the expected level of experience may wish to look into internship and employment opportunities.

Common Job Titles

It is possible to find work in this field in positions commonly listed as the following job titles:

  • Security Architect
  • Information Security Architect
  • Cyber Security Architect
  • Senior Security Architect
  • It Security Architect

Similar Occupations

If you are interested in exploring similar occupations, you may want to research the following job titles: