Information Systems Security Specialization

Information Systems Security Careers Overview

Careers in information systems security are on the rise as cyber attacks and identity theft have become more common and hackers have become increasingly sophisticated. These cyber security specialists plan, coordinate, and implement an organization's information security to protect their systems against cyber crime. The technical and logic skills and the hands-on experience you'll gain at DeVry University can help open the door to rewarding opportunities in the world of information systems security.

Professional Responsibilities


Career Options

Professional Responsibilities

When you earn your bachelor's degree in Computer Information Systems (CIS) from DeVry University with a specialization in Information Systems Security, you'll be equipped to perform a broad range of information systems security duties in a large number of industries. Professional responsibilities of these experts, also known as information systems auditor, information systems security analyst, information systems security officer, information technology strategic planner, and disaster recovery analyst, include:

  • Developing and implementing security procedures, standards, and policies and ensure compliance with laws and regulations
  • Establishing disaster recovery strategies
  • Developing new antivirus software to protect systems
  • Monitoring networks for security breaches
  • Rolling out a new system
  • Recovering data after a security breach
  • Gathering data and evidence to be used in prosecuting cyber crime

Information systems security careers are found across all industries, including:

  • Business
  • Education
  • Government
  • Healthcare technology
  • Insurance
  • Manufacturing
  • Retail
Career Options

DeVry University graduates in Computer Information Systems with a specialization in Information Systems Security will be prepared for careers in areas such as:

  • Cyber security
  • Information assurance
  • Business information security
  • Information security analysis
  • Intelligence analysis
  • Information systems strategy