Home / The Internet Wants You!

The Internet Wants You!

News stories across the country have been talking about big companies getting “hacked,” or security breaches costing millions of dollars in cleanup and lost revenue due to tarnished reputations. Educational institutions like ASU are not immune to the constant barrage of attempted attacks that come with running a large-scale, public computing network.

If you’ve ever wanted to be part of the solution by preventing such attacks from succeeding or learning how to better secure systems, maybe a career in information security is right for you. Information security is a fast growing field with a strong need for talent. There have been a million job openings in the field in 2016, and a 74% increase in postings over the last 5 years (Forbes).

There are several career paths within the information security umbrella. From deep-level penetration testing/ethical hacking to the tough policy and risk-based decisions that confront an organization’s Chief Information Security Officer (CISO), today’s information security jobs are becoming more specialized as the industry grows. At the same time, the complexity and advanced technology used by attackers expand continually, requiring constant development and knowledge growth from security professionals. The threat landscape of today’s internet changes every day, and that is one thing that makes the industry exciting and full of opportunities.

Here are some examples of Information Security roles and duties here at ASU:

  • Information Security Specialist - A combination of incident response and security analyst, this position primarily provides an operational role as part of the information security team. As an analyst, they pore through system and network logs, threat intelligence, and user questions, identifying any events that could become incidents and impact university functions or services. As part of incident response, they take necessary actions to contain incidents, and work with university personnel from various units to determine causes and implement new measures to provide better security. Additionally, they provide answers, training, and awareness to ASU faculty and staff on information security issues.

  • Security System Architect - The security architect’s role is to proactively ensure that our networks, systems, and technologies are secured and hardened against attack. They conduct security reviews of new and existing applications, projects, and network components, as well as evaluate and test new technologies for managing our enterprise securely.

  • Chief Information Security Officer (CISO) - The CISO is the ultimate decision-maker in the information security realm. They must carefully weigh the risks posed to the university by threats and attackers, and create and enforce the policies, standards, and guidelines necessary to protect the institution. They also budget and plan the information security strategy program in accordance with the missions and goals of the overall University Technology Office and Arizona State University.

If you are interested in a position in information security, please browse these additional resources, especially the ASU jobs site, as any open information security positions at ASU may be found there:

Additional Information Security career resources:

  • The ASU Information Security Office is responsible for securing the open information-sharing environment that is ASU, and maintains a website with policies, security tips, best practices, and more: https://getprotected.asu.edu

  • The ASU Information Assurance Center (part of the School of Computing, Informatics, & Decision Systems Engineering in the Ira A. Fulton Schools of Engineering) offers degree concentrations, research opportunities, and is certified by the NSA and DHS: http://ia.asu.edu/

  • All job opportunities offered at ASU, including full-time and part-time staff positions as well as student workers can be found at the ASU Jobs site: https://www.asu.edu/asujobs

  • The ASU Global Security Initiative is a research-driven cooperative between the Office of Knowledge Enterprise Development and the Ira A. Fulton Schools of Engineering: https://globalsecurity.asu.edu/

Sources: http://techcrunch.com/2015/02/25/target-says-credit-card-data-breach-cost-it-162m-in-2013-14/

http://www.forbes.com/sites/stevemorgan/2016/01/02/one-million-cybersecurity-job-openings-in-2016/#f07e00c7d274