Ten Top-Paying Tech Security Jobs

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12
Next Next

Lead Security Engineer

Depending on the organization, lead security engineers might find themselves tasked with securing any number of operating environments; one recent job posting on Dice, for example, included an organization's telephony and videoconference systems as part of the candidate's responsibilities. Whether the organization wants its lead security engineer to focus on apps or hardware, though, the job's constants typically include reviewing code and procedures to detect security vulnerabilities, spreading awareness of those potential vulnerabilities to employees and implementing security tools to protect the organization.

Average salary: $174,375

Without a doubt, the endless number of major data breaches over the past few years has driven home the fact that organizations must step up their game in protecting both corporate and customer data. According to a new analysis of Dice salary data, that need has translated into salaries for certain tech professionals that greatly exceed the baseline for tech-pro salaries.

Lead software security engineers, directors of security, security consultants and others tasked with repelling cyber threats can expect to earn six-figure salaries per year — so long as their skills, experience and certifications prove to be a match for very demanding roles that are continuously evolving. Additionally, a review of Dice's job postings makes it clear that those tech professionals who take the time to earn certifications such as CISA, CRISC, CISM and Certified Ethical Hacker (CEH) will find themselves more highly sought-after by employers.

With that in mind, here's a list of the top 10 security jobs, ordered by average salary for 2015.

 

Related Topics : A Big Market for Big Data Jobs, Midmarket CIO, IT Management Automation, SharePoint, Technology Markets

 
More Slideshows

infra97-290x195 7 Tips to Improve Data Backup and Ensure Business Continuity

With today's modern solutions, enterprises should be able to transform backup and recovery from a low-level legacy IT function to a modern function delivering continuity and value to the entire business. ...  More >>

NETSCOUTShadowIT0x 6 Tips for Combating Shadow IT Once and for All

To mitigate the risks of shadow IT, organizations must demonstrate the necessary agility and high quality of complex service assurance that users are looking for. ...  More >>

IT_Man85-290x195 Business in the Front, Balance All Around: Working with Gen Z

In order to attract Gen Z talent, employers will need to take into account that this group of the workforce may expect a different set of benefits. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.