Search Salaries

Click on job titles to view salary data, or select 2 jobs to compare.

Salaries

View salary and benefits information

Plans and designs security solutions and capabilities that enable the organization to identify, protect, detect, respond, and recover from cyber threats and vulnerabilities. Defines and develops security requirements using risk assessments, threat modeling, testing, and analysis of existing systems. Develops security integration plans to protect existing infrastructure and to incorporate future solutions. Creates action plans for policy creation and governance, system hardening, monitoring, incident response, disaster recovery, and emerging cybersecurity threats. Utilizes security information more...



Alternate job titles: Web Security Administrator | Web Application Security/Access Administrator

The Web and Cyber Security - Specialist defines network security issues, develops plans and procedures, and ensures safety and privacy of their newly developed internet and intranet sites. Develops, implements, and maintains firewall technologies that secure an organization's website. Being a Web and Cyber Security - Specialist reviews security logs and violation reports. Creates, modifies and deletes user profiles and other access controls. In addition, Web and Cyber Security - Specialist requires a bachelor's degree in a related area. Typically reports to a manager. Working as a Web and Cybe more...


Alternate job titles: Cyber Incident Response Specialist IV |

The Cyber Security Analyst IV maintains system cybersecurity monitoring operations, and performs cyber incident triage to determine scope, urgency, and potential impact of the incident. Investigates, reports, and responds to detected cyber incidents. Being a Cyber Security Analyst IV proactively searches for threats using a variety of Computer Network Defense (CND) tools, including intrusion detection system alerts, firewall and network traffic logs, and host system logs. Identifies the specific vulnerability and makes recommendations for remediation. In addition, Cyber Security Analyst IV doc more...


Alternate job titles: Information Security Analyst IV | Information Systems Security Analyst IV | Information Vulnerability/Risk Analyst IV | InfoSec Intrusion Investigation Analyst IV | IS Security Analyst IV

The IS and Cyber Security Professional - Senior Specialist collaborates with a team of information security analysts to provide subject matter expertise on application development, database design, and network maintenance. Designs and implements information security standards for applications and databases. Being an IS and Cyber Security Professional - Senior Specialist assesses client needs against security concerns and resolves information security risk issues. Researches and advocates the latest technologies and solutions to support the security requirements of internal and external custome more...



Leads a team of cybersecurity professionals that plan and design security solutions that enable the organization to identify, protect, detect, respond, and recover from cyber threats and vulnerabilities. Utilizes the latest tools, techniques, and training in cyber security architecture to create and design the organization's cyber security policies and procedures. Develops the organization's strategic vision for cyber security architecture and establishes priorities and strategies consistent with business goals. Partners with stakeholders to encourage the adoption of security-compatible softwa more...


Directs a team of cybersecurity professionals that plan and design security solutions that enable the organization to identify, protect, detect, respond, and recover from cyber threats and vulnerabilities. Utilizes the latest tools, techniques, and training in cyber security architecture to create and design the organization's cyber security policies and procedures. Assists in the development of the organization's strategic vision for cyber security architecture and establishes priorities and strategies consistent with business goals. Partners with stakeholders to encourage the adoption of sec more...



Alternate job titles: Cyber Security Architect III |

The Cyber Security Systems Designer III defines and develops security requirements using risk assessments, threat modeling, testing, and analysis of existing systems. Plans and designs security solutions and capabilities that enable the organization to identify, protect, detect, respond, and recover from cyber threats and vulnerabilities. Being a Cyber Security Systems Designer III designs action plans for policy creation and governance, system hardening, monitoring, incident response, disaster recovery, and emerging cybersecurity threats. Develops security integration plans to protect existin more...


Plans and designs security solutions and capabilities that enable the organization to identify, protect, detect, respond, and recover from cyber threats and vulnerabilities. Defines and develops security requirements using risk assessments, threat modeling, testing, and analysis of existing systems. Develops security integration plans to protect existing infrastructure and to incorporate future solutions. Creates action plans for policy creation and governance, system hardening, monitoring, incident response, disaster recovery, and emerging cybersecurity threats. Utilizes security information more...


Plans and designs security solutions and capabilities that enable the organization to identify, protect, detect, respond, and recover from cyber threats and vulnerabilities. Defines and develops security requirements using risk assessments, threat modeling, testing, and analysis of existing systems. Develops security integration plans to protect existing infrastructure and to incorporate future solutions. Creates action plans for policy creation and governance, system hardening, monitoring, incident response, disaster recovery, and emerging cybersecurity threats. Utilizes security information more...



Plans and designs security solutions and capabilities that enable the organization to identify, protect, detect, respond, and recover from cyber threats and vulnerabilities. Defines and develops security requirements using risk assessments, threat modeling, testing, and analysis of existing systems. Develops security integration plans to protect existing infrastructure and to incorporate future solutions. Creates action plans for policy creation and governance, system hardening, monitoring, incident response, disaster recovery, and emerging cybersecurity threats. Utilizes security information more...


Hot Topics for HR Professionals

Fill the Gaps

With CompAnalyst Market Data you have access to the largest and most reliable HR-reported compensation data set. Market price hot jobs, industry-specific positions, and even combine jobs to map to your specific needs, drastically reducing your data gaps.

Bring Order to Chaos

Without a well-defined process it is nearly impossible to manage job descriptions effectively.

JobArchitect gives you the flexibility to design a workflow for your organization or upload an existing one. With our centralized command center, you can track progress and job description status with ease. And your revision history is automatically documented, giving you insight into how a position has evolved over time and a paper trail to support audits.

Compdata Surveys

Get comprehensive data and unparalleled insights into total rewards practices across the US for the industries and pay markets you care about most.

Hot Topics for Job Salary Data

Adjust Employee Salary

Individualize employee pay based on unique job requirements and personal qualifications.

Price My Industry Jobs

Get the latest market pricing for benchmark jobs and jobs in your industry.

For Employers

Individualize employee pay based on unique job requirements and personal qualifications.

Get the latest market pricing for benchmark jobs and jobs in your industry.

For Employees

Analyze the market and your qualifications to negotiate your salary with confidence.

Search thousands of open positions to find your next opportunity.