Occupation Summary

Information Security Engineers

O*NET 15-1299.05

Description:

Develop and oversee the implementation of information security procedures and policies. Build, maintain and upgrade security technology, such as firewalls, for the safe use of computer networks and the transmission and retrieval of information. Design and implement appropriate security controls to identify vulnerabilities and protect digital files and electronic infrastructures. Monitor and respond to computer security breaches, viruses, and intrusions, and perform forensic investigation. May oversee the assessment of information security systems.

Annual Wages:
$106,992.00
Employment Rate:
Employment is expected to increase by 28.88%.
Education Level:
Bachelor's Degree. According to O*Net, the majority of people employed in this occupation have this level of education.
Endorsement:
Business and Industry, Science Technology Engineering and Math (STEM)

  1. Assess the quality of security controls, using performance indicators.
  2. Conduct investigations of information security breaches to identify vulnerabilities and evaluate the damage.
  3. Coordinate documentation of computer security or emergency measure policies, procedures, or tests.
  4. Coordinate monitoring of networks or systems for security breaches or intrusions.
  5. Coordinate vulnerability assessments or analysis of information security systems.
  6. Develop information security standards and best practices.
  7. Develop or implement software tools to assist in the detection, prevention, and analysis of security threats.
  8. Develop or install software, such as firewalls and data encryption programs, to protect sensitive information.
  9. Develop response and recovery strategies for security breaches.
  10. Identify or implement solutions to information security problems.
  11. Identify security system weaknesses, using penetration tests.
  12. Oversee development of plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure or to meet emergency data processing needs.
  13. Oversee performance of risk assessment or execution of system tests to ensure the functioning of data processing activities or security measures.
  14. Provide technical support to computer users for installation and use of security products.
  15. Recommend information security enhancements to management.
  16. Review security assessments for computing environments or check for compliance with cybersecurity standards and regulations.
  17. Scan networks, using vulnerability assessment tools to identify vulnerabilities.
  18. Train staff on, and oversee the use of, information security standards, policies, and best practices.
  19. Troubleshoot security and network problems.
  20. Write reports regarding investigations of information security breaches or network evaluations.


National Industry Employment Patterns


Industry % of Information Security Engineers employed Annual Growth Rate
Computer systems design and related services 18 1.32
Management, scientific, and technical consulting services 5.7 1.04
Employment services 3.2 0.20
Colleges, universities, and professional schools 2.8 0.38
Software publishers 2.7 1.24
Insurance carriers 2.3 0.57
Architectural, engineering, and related services 2 0.54


Labor Market Information


2023 Statewide average hourly wage $51.44
2023 National average hourly wage $54.05
2022 National employment 449,400
2022 Texas employment 53,003
Texas projected employment by 2032 68,310
Texas projected annual employment and Turnover openings through 2032 5,280




TEXAS COUNTY MAP BY WORKFORCE DEVELOPMENT AREA
* Due to confidentiality rules, not all regions may have the data displayed. The sum of all the regions may not be equal to the state total.





Other Activities


No work importance values found.



No tools found.


Technology

Access software: IBM Tivoli software;

Application server software: Kubernetes; GitHub; Docker;

Authentication server software: Single sign-on SSO;

Cloud-based data access and sharing software: Platform as a service PaaS;

Cloud-based management software: Amazon Web Services AWS CloudFormation; Google Cloud software;

Configuration management software: IBM Terraform; Chef; Puppet;

Content workflow software: Atlassian JIRA;

Data base management system software: Elasticsearch; MongoDB; NoSQL;

Data base reporting software: Reporting software; Microsoft SQL Server Reporting Services SSRS;

Data base user interface and query software: Microsoft SQL Server; Microsoft Access; Amazon Web Services AWS software; IBM DB2; ServiceNow; Structured query language SQL;

Development environment software: Web application software; Ruby; Software libraries; Go; C; Microsoft Azure software; Microsoft PowerShell;

Electronic mail software: Microsoft Outlook;

Enterprise application integration software: Microsoft SQL Server Integration Services SSIS; Enterprise application integration EAI software; Jenkins CI;

Enterprise resource planning ERP software: Management information systems MIS;

Enterprise system management software: Splunk Enterprise; Tanium software;

Expert system software: Ansible software;

File versioning software: Git;

Geographic information system: Geographic information system GIS systems;

Graphics or photo imaging software: Microsoft Visio;

Internet directory services software: Network directory services software; Oracle Unified Directory; Microsoft Active Directory; Active directory software;

Network monitoring software: IBM QRadar SIEM; Microsoft Azure Sentinel; Tcpdump; Wireshark; Snort;

Network security and virtual private network VPN equipment software: Firewall software;

Network security or virtual private network VPN management software: IBM Resource Access Control Facility RACF; Intrusion detection system IDS;

Object or component oriented development software: C#; C++; Perl; Python; R; Oracle Java;

Office suite software: Microsoft Office software;

Operating system software: Operating system software; Microsoft Windows; Microsoft Windows Server; Bash; Apple iOS; Apple macOS; Linux; Shell script; Ubuntu; UNIX; UNIX Shell;

Presentation software: Microsoft PowerPoint;

Project management software: Microsoft Teams; Microsoft SharePoint; Atlassian Confluence;

Risk management data and analysis software: ArcSight Enterprise Threat and Risk Management; McAfee Enterprise Security Manager;

Spreadsheet software: Microsoft Excel;

Switch or router software: Border Gateway Protocol BGP;

Transaction security and virus protection software: Microsoft Defender Antivirus; Microsoft Security Esssentials; Tenable Nessus;

Transaction server software: IBM Middleware;

Web platform development software: JavaScript; JavaScript Object Notation JSON; React; PHP; RESTful API; Security assertion markup language SAML;

Word processing software: Collaborative editing software;


Related O*NET occupational titles for Information Security Engineers include:
  • 11-3021.00 Computer and Information Systems Managers
  • 15-1241.00 Computer Network Architects
  • 15-1231.00 Computer Network Support Specialists
  • 15-1211.00 Computer Systems Analysts
  • 15-1299.08 Computer Systems Engineers/Architects
  • 15-1242.00 Database Administrators
  • 15-1212.00 Information Security Analysts
  • 15-1244.00 Network and Computer Systems Administrators
  • 15-1299.04 Penetration Testers
  • 15-1252.00 Software Developers


No sources of additional information found.

Contact Texas Workforce Commission
Labor Market and Career Information  |  101 E. 15th Street, Annex Room 0252  |  Austin, Texas 78778
Official Website  |  1-800-822-PLAN (7526)  |  512.936.3200

** The information in this report may be derived from many sources like O*NET, BLS (Bureau of Labor Statistics), OOH (Occupational Outlook Handbook), and Career One Stop.