Search Salaries

Click on job titles to view salary data, or select 2 jobs to compare.

Salaries

View salary and benefits information
Alternate job titles: Network Risk and Security Assessment Senior Analyst

Ensures the security of an organization's networks and systems. Performs network security assessments and risk analysis, and makes recommendations to improve network security. Investigates security incidents and breaches. Recommends and deploys appropriate security products and solutions for various network platforms. Configures and maintains firewalls and other network security tools and software. May conduct security trainings with employees. Typically requires a bachelor's degree. Typically reports to a manager or head of a unit/department. Work is generally independent and collaborative in more...



Alternate job titles: Information Security Analyst III | Information Systems Security Analyst III | Information Vulnerability/Risk Analyst III | InfoSec Intrusion Investigation Analyst III | IS and Cyber Security Professional - Senior | IS Security Analyst III

The Data Security Analyst III protects against unauthorized access, modification, or destruction and develops IT security policies and standards. Completes tasks designed to ensure security of the organization's systems and information assets. Being an Data Security Analyst III understands internet architecture and firewall configuration to protect system security. Works with end users to determine needs of individual departments. In addition, Data Security Analyst III may need to authorize user access and familiar with domain structures and digital signatures. Requires a bachelor's degree or more...


Alternate job titles: Penetration Tester III |

The Security Threat Analyst III conducts manual and automated penetration tests including black-box, gray-box, and white-box. Performs penetration testing to assess and identify security vulnerabilities of networks, applications, and systems. Being a Security Threat Analyst III documents testing results and presents suggestions for the development of countermeasures, security improvements, and mitigation strategies. Evaluates findings and performs root cause analysis to identify weaknesses, misconfigurations, or other flaws in the environment that could lead to security compromises. In additio more...


Alternate job titles: Threat Assessment Analyst III |

The Security Research Analyst III identifies and researches new potential threats using public and private information, open-source intelligence (OSINT), and other effective research techniques. Assesses risks and threats such as crime or terrorism to protect an organization's employees, property, affairs, brand, and events. Being a Security Research Analyst III assists decision-making in crises. Establishes clear, effective, and proactive plans for avoiding or mitigating newly emerged or evolving threats. In addition, Security Research Analyst III investigates incidents that expose potential more...



Alternate job titles: Cyber Incident Response Specialist III |

The Cyber Security Analyst III maintains system cybersecurity monitoring operations, and performs cyber incident triage to determine scope, urgency, and potential impact of the incident. Investigates, reports, and responds to detected cyber incidents. Being a Cyber Security Analyst III proactively searches for threats using a variety of Computer Network Defense (CND) tools, including intrusion detection system alerts, firewall and network traffic logs, and host system logs. Identifies the specific vulnerability and makes recommendations for remediation. In addition, Cyber Security Analyst III more...


Alternate job titles: Network Security System Analyst III | Network Risk and Security Assessment Senior Analyst

The Network Risk and Security Analyst III performs network security assessments and risk analysis, and makes recommendations to improve network security. Ensures the security of an organization's networks and systems. Being a Network Risk and Security Analyst III recommends and deploys appropriate security products and solutions for various network platforms. Investigates security incidents and breaches. In addition, Network Risk and Security Analyst III configures and maintains firewalls and other network security tools and software. May conduct security trainings with employees. Typically re more...



Alternate job titles: Information Security Analyst III | Information Vulnerability/Risk Analyst III | InfoSec Intrusion Investigation Analyst III | IS and Cyber Security Professional - Senior | IS Security Analyst III

The Information Systems Security Analyst III protects against unauthorized access, modification, or destruction and develops IT security policies and standards. Completes tasks designed to ensure security of the organization's systems and information assets. Being an Information Systems Security Analyst III understands internet architecture and firewall configuration to protect system security. Works with end users to determine needs of individual departments. In addition, Information Systems Security Analyst III may need to authorize user access and familiar with domain structures and digital more...


Alternate job titles: Information Systems Security Analyst III | Information Vulnerability/Risk Analyst III | InfoSec Intrusion Investigation Analyst III | IS and Cyber Security Professional - Senior | IS Security Analyst III

Completes tasks designed to ensure security of the organization's systems and information assets. Protects against unauthorized access, modification, or destruction and develops IT security policies and standards. Works with end users to determine needs of individual departments. Understands internet architecture and firewall configuration to protect system security. May need to authorize user access and familiar with domain structures and digital signatures. Requires a bachelor's degree or its equivalent. Typically reports to a manager. Contributes to moderately complex aspects of a project. more...


Analyzes systems and networks to determine deviations from approved policies and configurations. Evaluates incident response procedures and capabilities. Conducts security scans, examines system configurations, and reviews documentation of incident response procedures. Analyzes identified malicious network activity to determine weaknesses exploited, exploitation methods, and the effects on the system. Typically requires a bachelor's degree in computer science. Typically reports to a manager. Work is generally independent and collaborative in nature. Contributes to moderately complex aspects of more...



Responsible for the detection, prevention, and mitigation of situations involving fraudulent transactions. Researches and analyzes potential customer fraud cases to identify and prevent future fraud. Reviews and responds to complex fraudulent service requests and identifies fraudulent transactions using various research methods. Follows standard procedures to document a loss and prepares a summary and reconciliation. Communicates the status and resolution of the incident to the customer and/or bank. Identifies areas that need increased security procedures or software to protect customer accoun more...


Hot Topics for HR Professionals

Participation Made Easy

Simplify survey management, participation, and analysis with a single, centralized library for all your compensation data sources. Streamline your survey selection, data loading, participation, and analysis. Automatically participate in surveys with one-click exports to third-party survey participation templates.

Work Together Seamlessly

An accurate job description starts with collaboration.

With JobArchitect you can share job descriptions with hiring managers and others in your organization and easily manage the review and approval process using the centralized command center.

Industry Surveys

Get comprehensive, reliable US compensation data for your specific industry, company size, and labor market.

Browse our complete catalog, showcasing more than 30 regional and global surveys with all the information and data points you need to get pay right.

Hot Topics for Job Salary Data

Adjust Employee Salary

Individualize employee pay based on unique job requirements and personal qualifications.

Price My Industry Jobs

Get the latest market pricing for benchmark jobs and jobs in your industry.

For Employers

Individualize employee pay based on unique job requirements and personal qualifications.

Get the latest market pricing for benchmark jobs and jobs in your industry.

For Employees

Analyze the market and your qualifications to negotiate your salary with confidence.

Search thousands of open positions to find your next opportunity.