Occupation

Security Management Specialists

Conduct security assessments for organizations, and design security systems and processes. May specialize in areas such as physical security or the safety of employees and facilities.

Also Known As: Cyber Risk Consultant, Cybersecurity Consultant, Industrial Security Specialist, Information Security Consultant, Information Security Officer, Information Technology Security Specialist (IT Security Specialist), Personal Protection Specialist, Personal Security Specialist +19 more

Video

Education & Training

Job Zone 4 Job Zone Four: Considerable Preparation Needed
Education: Most of these occupations require a four-year bachelor's degree, but some do not.
Experience: A considerable amount of work-related skill, knowledge, or experience is needed for these occupations. For example, an accountant must complete four years of college and work for several years in accounting to be considered qualified.
On-the-Job Training: Employees in these occupations usually need several years of work-related experience, on-the-job training, and/or vocational training.

Technology & Tools

Hot Technologies

  • Adobe Acrobat
  • Amazon Web Services AWS software
  • JavaScript
  • Linux
  • Microsoft Access
  • Microsoft Active Directory
  • Microsoft Azure software
  • Microsoft Excel
  • Microsoft Office software
  • Microsoft Outlook
  • Microsoft PowerPoint
  • Microsoft PowerShell
  • Microsoft SharePoint
  • Microsoft Visio
  • Microsoft Windows
  • Microsoft Word
  • Oracle Java
  • SAP software
  • ServiceNow
  • Splunk Enterprise
  • Structured query language SQL

Software (51)

  • ArcSight Enterprise Threat and Risk Management
  • Chinotec Technologies Paros
  • Cisco Systems CiscoWorks
  • Customer information control system CICS
  • CyberArk
  • Database software
  • Firewall software
  • IBM Tivoli software
  • Intrusion prevention system IPS
  • Kismet
  • Management information systems MIS
  • McAfee
  • Metasploit
  • Network directory services software
  • Nmap
  • NortonLifeLock cybersecurity software
  • Operating system software
  • Oracle Business Intelligence Enterprise Edition
  • Photo editing software
  • Physical access management software
  • SAP Crystal Reports
  • Secure web gateway software
  • Single sign-on SSO
  • Social networking software
  • Symantec PGP
  • Tenable Nessus
  • TrueCrypt
  • Videoconferencing software
  • Virtual private networking VPN software
  • Web browser software

Tools & Equipment (17)

  • Approach detection systems
  • Audioconferencing equipment
  • Card readers
  • Closed circuit television CCTV monitoring systems
  • Computer network routers
  • Computer server equipment
  • Desktop computers
  • Digital video recorders
  • Electronic access control systems
  • Intrusion detection systems
  • Magnetometers
  • Mechanical access control systems
  • Network video recorders
  • Personal computers
  • Tablet computers
  • Videoconferencing equipment
  • X ray screening equipment

Related Occupations

Show all 20 related occupations

Real Talk

Hear from real Security Management Specialistss about their work: