Cryptographer CISA

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

CAREER PROFILE:

ABC
CRYPTOGRAPHER/
CRYPTANALYST DE F
AKA
ENCRYPTION
EXPERT
DEGREE REQUIRED? COMMON JOB DUTIES

Yes Protect important information from interception,


copying, modification and/or deletion
Master’s Degree
Focusing on Mathematics or Evaluate, analyze and target weaknesses in cryptographic
Computer Science is Encouraged security systems and algorithms
Design robust security systems to prevent vulnerabilities
MEDIAN SALARY
Develop statistical and mathematical models to analyze
+$100,000 data and solve security problems

JOB GROWTH Test computational models for reliability and accuracy


Investigate, research and test new cryptology theories and
21% applications
Probe for weaknesses in communication lines (e.g. wireless
SOFT SKILLS network, secure telephone, cellphones, email, etc.)
Intelligent, Analytical & Creative Ensure message transmission data (e.g. wireless network,
secure telephone, cellphones, email, etc.) are not
Capable of Tackling illegally accessed or altered in transit
Complex Mathematical Problems
Decode cryptic messages and coding systems for
Trustworthiness military, political and/or law enforcement agencies

for more info


OPERATIONAL PLANNING CYBER linkedin.com/company/cyberorg
BER LEADERSHIP SYSTEMS ANALYSIS
NISTRATION DIGITAL
SOFTWARE DEVELOPMENT
CYBER.ORG offers grant-funded cyber curricula ,
professional development, and career resources.

CYBER DEFENSE ANALYSIS


Our goal is to empower educators and grow

DEFENSE INFRASTRUCTURE SUPPORT NETWORK SERVICES CYBER


the cyber workforce of tomorrow.

@cyberdotorg
CIDENT RESPONSE VULNERABILITY ASSESSMENT AND
CYBER DEFENSE INFRASTRUCTURE SUPPORT NETWORK SERVICES
TECHNOLOGY RESEARCH AND DEVELOPMENT
THREAT ANALYSIS

@cyber_dot_org
TARGETS
RAINING EDUCATION
TEST AND EVALUATION SYSTEMS

@cyberdotorg
AL ADVICE AND ADVOCACY CYBERSECURITY MANAGEMENT PROGRAM
VE CYBER LEADERSHIP SYSTEMS ANALYSIS TEST AND
N TRAINING EDUCATION AND

info@CYBER.org
ATA ADMINISTRATION DIGITAL
GETS THREAT ANALYSIS
MS ADMINISTRATION STRATEGIC PLANNING

www.CYBER.org
DENT RESPONSE VULNERABILITY ASSESSMENT
ALL SOURCE ANALYSIS EXPLOITATION ANALYSIS
YSTEMS ADMINISTRATION STRATEGIC PLANNING

You might also like