10 Hot Information Security Careers

Profiles of the Top Opportunities for Security Pros
10 Hot Information Security Careers
2010 was a year of heightened demand for security professionals. As such, the nation's businesses, academic institutions and government agencies are focused as never before on developing a pipeline for qualified information security professionals.

In 2011, we will continue to see information security as a major growth industry, offering professionals a whole spectrum of job roles from which to choose.

Information Security Media Group has compiled a list of 10 of the hottest information security careers in 2011 and beyond, all viewable in an interactive slideshow.

For each career option, we have provided information on salary, qualification and academic institutions to which professionals can turn for education in their chosen field. Note: Our listed institutions are just a sampling and do not represent a comprehensive list of all available options.

Click here to view The 10 Hottest Careers in Information Security.

Beyond the slide show, don't miss a look back at these leading career stories:

About the Author

Upasana Gupta

Upasana Gupta

Contributing Editor, CareersInfoSecurity

Upasana Gupta oversees CareersInfoSecurity and shepherds career and leadership coverage for all Information Security Media Group's media properties. She regularly writes on career topics and speaks to senior executives on a wide-range of subjects, including security leadership, privacy, risk management, application security and fraud. She also helps produce podcasts and is instrumental in the global expansion of ISMG websites by recruiting international information security and risk experts to contribute content, including blogs. Upasana previously served as a resource manager focusing on hiring, recruiting and human resources at Icons Inc., an IT security advisory firm affiliated with ISMG. She holds an MBA in human resources from Maharishi University of Management, Fairfield, Iowa.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.