Skip navigation

Information Security Engineers - 15-1299.05

O*NET-SOC Description

Develop and oversee the implementation of information security procedures and policies. Build, maintain and upgrade security technology, such as firewalls, for the safe use of computer networks and the transmission and retrieval of information. Design and implement appropriate security controls to identify vulnerabilities and protect digital files and electronic infrastructures. Monitor and respond to computer security breaches, viruses, and intrusions, and perform forensic investigation. May oversee the assessment of information security systems.

Sample of Reported Job Titles

No information available.

SOC Occupation Groups

15-0000 Computer and Mathematical Occupations
15-1200 Computer Occupations
15-1290 Miscellaneous Computer Occupations
15-1299.00 Computer Occupations, All Other
15-1299.05 Information Security Engineers

Related Occupations

Tasks

  • Assess the quality of security controls, using performance indicators.
  • Conduct investigations of information security breaches to identify vulnerabilities and evaluate the damage.
  • Coordinate documentation of computer security or emergency measure policies, procedures, or tests.
  • Coordinate monitoring of networks or systems for security breaches or intrusions.
  • Coordinate vulnerability assessments or analysis of information security systems.
  • Develop information security standards and best practices.
  • Develop or implement software tools to assist in the detection, prevention, and analysis of security threats.
  • Develop or install software, such as firewalls and data encryption programs, to protect sensitive information.
  • Develop response and recovery strategies for security breaches.
  • Identify or implement solutions to information security problems.
  • Identify security system weaknesses, using penetration tests.
  • Oversee development of plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure or to meet emergency data processing needs.
  • Oversee performance of risk assessment or execution of system tests to ensure the functioning of data processing activities or security measures.
  • Provide technical support to computer users for installation and use of security products.
  • Recommend information security enhancements to management.
  • Review security assessments for computing environments or check for compliance with cybersecurity standards and regulations.
  • Scan networks, using vulnerability assessment tools to identify vulnerabilities.
  • Train staff on, and oversee the use of, information security standards, policies, and best practices.
  • Troubleshoot security and network problems.
  • Write reports regarding investigations of information security breaches or network evaluations.

Detailed Work Activities

  • Analyze security of systems, network, or data.
  • Coordinate reporting or editing activities.
  • Develop operating strategies, plans, or procedures.
  • Develop performance metrics or standards related to information technology.
  • Develop software or computer applications.
  • Establish work standards.
  • Evaluate potential of products, technologies, or resources.
  • Evaluate utility of software or hardware technologies.
  • Implement security measures for computer or information systems.
  • Install computer software.
  • Investigate illegal or suspicious activities.
  • Manage information technology projects or system activities.
  • Monitor processes for compliance with standards.
  • Provide technical guidance to other personnel.
  • Read documents to gather technical information.
  • Recommend changes to improve computer or information systems.
  • Supervise information technology personnel.
  • Test computer system operations to ensure proper functioning.
  • Train personnel in technical or scientific procedures.
  • Troubleshoot issues with computer applications or systems.
  • Write reports or evaluations.

Military Crosswalk Titles

  • ADP Systems Security Officer (Navy - Commissioned or Warrant Officer)
  • Command, Control, Communications, Computers and Intelligence (C4I) Officer (Marine Corps - Commissioned Officer only)
  • Communication Security Manager (Navy - Enlisted)
  • Communication Security Officer (Navy - Commissioned or Warrant Officer)
  • Computer Network Capability Development (Navy - Commissioned or Warrant Officer)
  • Computer Network Operations (Navy - Commissioned or Warrant Officer)
  • Cryptologic Infrastructure Maintenance Director (Navy - Enlisted)
  • Cryptologic Infrastructure Maintenance Supervisor (Navy - Enlisted)
  • Cyber (Coast Guard - Commissioned Officer only)
  • Cyber Capabilities Development Officer (Army - Commissioned Officer only)
  • Cyber Defense Analyst (Navy - Enlisted)
  • Cyber Defense Analyst – Host (CDA-Host) (Navy - Enlisted)
  • Cyber Defense Incident Responder (Navy - Enlisted)
  • Cyber Defense Operations (Air Force - Enlisted)
  • Cyber Defense Operations Superintendent (Air Force - Enlisted)
  • Cyber Network Defender (Army - Enlisted)
  • Cyber Network Defense Infrastructure Specialist (CNDIS) (Navy - Enlisted)
  • Cyber Network Operations Officer (Marine Corps - Commissioned Officer only)
  • Cyber RandD Specialist (Navy - Enlisted)
  • Cyber Research and Development Specialist (Navy - Enlisted)
  • Cyber Threat Emulation Operator (CTEO) (Navy - Enlisted)
  • Cybersecurity (Coast Guard - Commissioned Officer only)
  • Cyberspace Defense Warrant Officer (Army - Warrant Officer only)
  • Cyberspace Operations Planner (Navy - Enlisted)
  • Cyberspace Warfare Operator (Marine Corps - Enlisted)
  • Data Systems Chief (Marine Corps - Enlisted)
  • Defensive Cyberspace Warfare Officer (Marine Corps - Warrant Officer only)
  • Director of Communications (Navy - Commissioned or Warrant Officer)
  • Electromagnetic Spectrum Operations (EMSO) Planner (Marine Corps - Commissioned Officer only)
  • Electronic Warfare Manager (Navy - Enlisted)
  • Electronic Warfare Specialist (Navy - Enlisted)
  • Electronic Warfare Technician (Navy - Enlisted)
  • Information Security Technician (Marine Corps - Enlisted)
  • Information Systems Administrator (Navy - Enlisted)
  • Information Systems Management (Coast Guard - Warrant Officer only)
  • Information Systems Technician (Navy - Enlisted)
  • Information Systems Technician Submarines (Navy - Enlisted)
  • Information Technology Manager Submarines (Navy - Enlisted)
  • Intelligence Software/Security Engineer (Marine Corps - Enlisted)
  • Intelligence Surveillance Reconnaissance (ISR) Systems Engineer (Marine Corps - Enlisted)
  • Intelligence Technology and Data Chief (Marine Corps - Enlisted)
  • Network Analyst (Marine Corps - Enlisted)
  • Network Engineering Officer (Marine Corps - Warrant Officer only)
  • Network Systems Engineering (Army - Commissioned Officer only)
  • Operations Systems Specialist (Coast Guard - Warrant Officer only)
  • RL - Special Duty Officer - Cyber Warfare Engineer (Navy - Commissioned Officer only)
  • Signal Operations (Army - Commissioned Officer only)
  • Spectrum Defense Operations (Air Force - Enlisted)
  • Spectrum Defense Operations Apprentice (Air Force - Enlisted)
  • Spectrum Defense Operations Apprentice, Spectrum Operations (Air Force - Enlisted)
  • Spectrum Defense Operations Helper (Air Force - Enlisted)
  • Spectrum Defense Operations Helper, Spectrum Operations (Air Force - Enlisted)
  • Submarine Carry-On Equipment (COE) Privileged Access Technician (Navy - Enlisted)
  • Submarine Carry-On Equipment (COE) Supervisor (Navy - Enlisted)
  • Submarine Carry-On Equipment (COE) Team Leader (Navy - Enlisted)
  • Surface Cryptologic Carry-On Program (CCOP) Director (Navy - Enlisted)
  • Surface Cryptologic Carry-On Program (CCOP) Installer (Navy - Enlisted)
  • Vulnerability Assessment Analyst (Navy - Enlisted)

Apprenticeship Crosswalk Titles

  • Cyber Defense Incident Responder

DOT Crosswalk Titles

No information available.