Database InfoSec: Top Database Security Jobs (W11)

When it comes to database security within an organization, whether it be physical or logical, each must be implemented and maybe even designed and developed by a security employee. Well, what do those employees do? How much are they paid? But mostly, what are their job titles? Below are the top 5 database security jobs titles.

#1: Chief Information Security Officer (CISO)

Job Description: “Executive management whose primary task is to oversee the general operations of an organization’s IT security department and other related staff. The organization’s overall security is the foremost concern of the CISO. As such, persons who aspire to become a CISO must demonstrate a strong background in IT strategy and security architecture” (Bisson, 2015).

Salary: CISOs make a median salary of $130k.

CISO also possess people and communication skills, which they are expected to use when assembling and managing a team of IT security experts, as well as when consulting with other organizational executives and/or federal agencies depending on the nature of their workplace, according to Bisson (2015).

#2: Database Administrator (DBA)

Job Description: “Directs and/or performs all activities related to maintaining a successful database environment. Responsibilities include designing, implementing, and maintaining the database system; establishing policies and procedures pertaining to the management, security, maintenance, and use of the database management system; and training employees in database management and use” (Rouse, 2005).

Salary: DBAs pull in about $80,000 a year.

“A DBA is expected to stay abreast of emerging technologies and new design approaches. Typically, a DBA has either a degree in Computer Science and some on-the-job training with a particular database product or more extensive experience with a range of database products. A DBA is usually expected to have experience with one or more of the major database management products, such as Structured Query Language, SAP, and Oracle-based database management software” (Rouse, 2005).

#3: Security Manager

Job Description: According to Bisson (2015), a Security Manager is a mid-level employee who is tasked with managing an organization’s IT security policy. Soft skills, such as leadership and strong interpersonal and communication skills, are therefore crucial for successful Security Managers (Bisson, 2015).

Salary: Security Managers make on about $100k average, but those in larger businesses can make about $145k.

Security Managers “test and implement new security tools, lead security awareness campaigns, and administer both department budgets and staff schedules. Security Managers are expected to have a thorough background in programming, enterprise architecture, and IT strategy. However, a deep familiarity with these areas of focus is not generally required” (Bisson, 2015).

#4: Information Assurance Analyst

Job Description: Info Analyst focus mostly on security risk assessment, and design, plan, and deploy variations to existing software architecture.

Salary: $55k – $80k

“An information assurance analyst has several daily tasks that protect the corporate environment from hackers and cyber threats. They are usually former hackers and security experts who understand both white hat and black hat hacking. They are often ethical hackers, and they keep up to date with the latest security alerts. They update and patch current systems, and they work with developers to review software for future deployments. During cyber threats, the information assurance analyst is able to triage issues and find the best resolution to mitigate any damages” (INFOSEC INSTITUTE, 2017).

#5: Security Consultant

Job Description: External expert who assist organizations with implementing the best security solutions according to their needs.

Salary: Security Consultants expect to start off at an estimate pay around $45,000, but can earn as much as approximately $150,000/year.

“Those who wish to become Security Consultants must be knowledgeable in a wide range of security standards, security systems and authentication protocols. In order to succeed, they must also be willing to develop an in-depth picture of the organization for which they are working, which includes interviewing management and other executives, as well as familiarizing themselves with the organization’s corporate policies. Security Consultants can then use this knowledge to implement a set of security tools they see fit depending on an organization’s needs. They are also commonly responsible for testing these systems and updating them when needed” (Bisson, 2015).

 

References

Bisson, D. (2015, May 4). The Top 10 Highest Paying Jobs in Information Security – Part 1. Retrieved from Tripwire.com: https://www.tripwire.com/state-of-security/off-topic/the-top-10-highest-paying-jobs-in-information-security-part-1/

INFOSEC INSTITUTE. (2017). Become a Information Assurance Analyst. Retrieved from http://resources.infosecinstitute.com/job-titles/information-assurance-analyst/#gref

Rouse, M. (2005, November). database administrator (DBA) . Retrieved from http://searchsqlserver.techtarget.com/definition/database-administrator

 

 

 

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s