Discovering Your IST Career Path

The career opportunities for College of IST graduates are nearly endless. Our alumni bring expertise and innovation to a variety of positions—from their first jobs to the executive suite—in business, health care, defense, technology, and countless other industries.

Below you can explore a variety of jobs accepted by recent IST graduates. Use these as a starting point to discover what opportunities might be available to you with a degree from the College of IST. Continue your exploration with resources found on the Career Exploration page.

NOTE: The below list of positions is for informational purposes only and is not a guarantee that an individual student will obtain one of these positions upon graduation.

|||||||||
Application Developer

Application Developers create, test, and program applications for computers and mobile devices. They collaborate to identify ideas and concepts for the general public, or to fill a specific need brought to them by a customer. They understand coding languages and how to apply them in a way to create new, fresh content and usable applications, and also help to test and fix any bugs found before the product is launched. Application Developers also might work with graphic artists, data specialists, and software experts.

Application Security Specialist

An Application Security Specialist is responsible for application security assessments, improvements to application security practices and processes, and education of security knowledge for the software development team to ensure delivery of secure applications.

Application Systems Analyst

An Application Systems Analyst takes on tasks and comes up with the whole solution--whether it is to build or buy software, how to implement it, and how to document and support it.

Business Systems Analyst/Consultant

This role can be defined as a bridge between a business' problems and technology solutions. For example, the business could have problems with its model, process, or method, and technology solutions could be the use of technology architecture, tools, or software application. System Analysts are required to analyze, transform, and ultimately resolve the business problems with the help of technology.

Chief Privacy Officer

A Chief Privacy Officer is an upper-level role and enterprise function whose primary responsibilities include management of company information policies and procedures, leading incident response associated with data breach notification preparation, and oversight of company privacy and compliance. The CPO has a more broad focus on the appropriate use of company data. Strong communication is a key skill, and public relations skills are also beneficial to successfully functioning in this role.

Client Security Inquiry Specialist

This role provides a single solution designed to help guard against emerging threats and other attacks; identify malware, such as spyware, rootkits, and viruses; and assess security state by checking for vulnerabilities. This role also determines the specific security configuration for client computers, including the frequency and type of scans; the default response to a specific threat; when to raise an alert; and how much control to give end-users over scans. They also use detailed reports and alerts to prioritize security issues.

Cloud and Infrastructure Services Consultant

Cloud consultants have a good understanding of how a business works and are able to support it using IT clouds. They are able to produce core architectural artifacts, such as governance models, security models, performance models, and data models. They have the foundation to make meaningful IT changes, which could include migrating a business to cloud computing platforms.

Computer Programmer/Analyst

A Computer Programmer writes and tests code that allows computer applications and software programs to function properly. This position turns the program designs created by software developers and engineers into instructions that a computer can follow.

Cyber Consultant/Penetration Tester

This role conducts manual penetration tests of networks, applications, web applications, servers, endpoints, wireless, and mobile technologies, and utilizes automated tools to conduct penetration testing. Cyber Consultants and Penetration Testers also analyze results to mitigate the risk of false positives, present findings on the cybersecurity posture of a technology, and provide recommendations to improve the existing security measures.

Cyber Intelligence Analyst

A Cyber Intelligence Analyst collects information about internet-based malware-related criminal activities and the people behind them; makes predictions about cyber criminals and their future activities; and creates threat intelligence reports that communicate the results of analyses to the people who need to know them, such as government decision-makers, security officials, or senior corporate officials.

Cybersecurity Analyst/Cyber Risk Consultant

This role is responsible for preserving and maintaining the security and secrecy of digital data for a company. They have knowledge in every aspect of information and internet security within the system of the company. They provide staff training on proper information management; adopt security measures whenever the company is sharing important information online; review flaws in the company’s security system, and recommend changes or upgrades to improve the company’s IT security systems.

Cybersecurity Engineer

This specialized field of engineering focuses on security aspects in the design of systems that need to be able to deal robustly with possible sources of disruption, ranging from natural disasters to malicious acts. It is similar to other systems engineering activities in that its primary motivation is to support the delivery of engineering solutions that satisfy predefined functional and user requirements, but with the added dimension of preventing misuse and malicious behavior. These constraints and restrictions are often asserted as a security policy.

Data Analyst

The main duties of a Data Analyst are to perform data collection, analysis, interpretation, and management duties; develop rules and methodologies for data collection and analysis; and ensure the integrity of project data. Data analysts consult with external clients and internal staff to determine data management needs and objectives, and may be responsible for database design, administration, security, and maintenance. They prepare presentations that reflect the results of data analysis, and coordinate with scientists and technical experts to design and develop statistical analysis methodologies.

Data Scientist

Data scientists work with providers and users of data to determine what questions to ask and figure out how to answer those questions using data. They often utilize machine learning and data mining techniques to develop predictive models for theorizing and forecasting. A data scientist might do the following tasks on a day-to-day basis: Find patterns and trends in datasets to uncover insights, Create algorithms and data models to forecast outcomes, and Deploy data and software tools such as Python, R, SAS, or SQL in data analysis.

Data Specialist

Also referred to as: Database Administrator, Database Analyst, Database Designer, Database Manager, or Data Engineer

Database professionals who design, implement, update, modify, maintain, and repair computer databases systems to meet the needs of the company.

Data Visualization Specialist

An IT professional with data visualization, visual analytics, and graphic design skills who creates new visualizations and visual analytical tools for targeted problems. The information visualization tools for data from targeted domains will enable better understanding of data, distillation of knowledge, exploratory data analysis, and augment data-driven decision making by bridging computational capacities of computing systems and analytical skills of human beings.

Enterprise Risk and Security Solutions Analyst

In business, Enterprise Risk Management is the collection of methods and processes used to manage risks, possible events, or circumstances that can have an influence on the enterprise in question. By identifying and proactively treating such potential effectors, an analyst protects the very existence, the resources (human and capital), the products and services, or the customers of the enterprise, as well as external effects on society, markets or the environment.

Federal Cyber Risk Analyst/Consultant

This position assists clients with identifying unauthorized activities and intrusions in their networks in real-time.

Information and Cybersecurity Analyst/System Security

This role designs and implements security measures that thwart attacks on computer systems, networks, and data.

Integration Consultant

An Integrations Manager oversees technology integrations with clients, partners, and others. This role is typically expected to manage complex integration projects and be able to communicate advanced engineering concepts to non-technical clients.

IT Analyst

This role analyzes and transmits the intellectual content of scientific, technological, or other specialized information. The specialist performs a variety of functions, or the work may be specialized in one functional area. Duties typically include acquisition, analysis of subject content of the documents acquired, and indexing and preparation of abstracts or extracts. Other responsibilities involve the direction, administration, or coordination of technical information services, technical illustrations, and graphical productions. Typical tasks include technology assessment, system assessment, research support, and specialized engineering services.

IT Auditor

Formerly known as Electronic Data Process Auditing, Information Technology Auditing developed largely as a result of the rise in technology in accounting systems, the need for IT control, and the impact of computers on the ability to perform attestation services. This role oversees technology audits, which involve a review of the current technology base of a firm. These audits are used to identify gaps, strengths to build on, and weaknesses to address.

IT Consultant

An IT Consultant advises clients on how to build and operate their IT network. Usually, a consulting firm is hired to solve problems and improve performance; however, they can also give advice on the business model, websites, and almost any computer-related aspect of the business. Consultants typically meet with the client to discuss the project, develop a proposal that contains fact-finding, perform analysis, and suggest or implement a solution. This may require site visits and hands-on work and training.

IT Operations Engineer

This position is responsible for the smooth functioning of the infrastructure and operational environments that support application deployment to internal and external customers, including the network infrastructure; server and device management; computer operations; IT infrastructure library management; and help desk services for an organization. IT operations typically include management, envisioning, planning, design, implementation, construction, deployment, distribution, verification, installation, instantiation, execution and maintenance. This role defines common processes and procedures, policies, roles, responsibilities, terminology, best practices and standards for running an enterprise.

IT Project Manager

This position coordinates the actions of cross-functional teams to manage technology projects that compliment both strategic and tactical organizational initiatives. From conceptualization through deployment, the IT project manager plays a key role in planning, executing, monitoring, and closing projects. An IT project manager is well versed in project delivery methodologies, such as Agile and Waterfall, and toolsets like project schedule tracking software with Gantt charts. They also are able to engage with stakeholders at all levels of an organization, as well as have strategic insight to understand how their solutions impact their organization.

IT Specialist

A specialist can focus in one of many information technology areas, such as programming, which is dynamic as new languages emerge. Networks are another specialized area and are becoming more important as new equipment allows computers to work efficiently in wider groups. A specialist may choose to focus on the internet, web design, or mobile computing.

Machine Learning Engineer

An IT professional that concentrates on research, development, and design of automated, data-driven AI systems that perform data classification, pattern recognition, and predictions.  The engineer will develop machine learning and data analysis algorithms that enable the AI systems to learn from large data sets and create predictive models.

Network and Systems Security Analyst

Network security refers to any activity designed to protect the usability and integrity of your network and data. It includes both hardware and software technologies. Effective network security manages access to the network. It targets a variety of threats and stops them from entering or spreading on your network.

Network Infrastructure Engineer

A Network Engineer, also known as network architect, designs and implements computer networks. Unlike network administrators, who perform day-to-day support, the network engineer focuses on high-level design and planning. Network engineers select the appropriate data communications components and configure them to meet user and corporate needs. The construction of a reliable and high-performing network integrating LAN, WAN, Internet, and intranet components entail network modeling and analysis.

Network Security Engineer

A Network Engineer/Security Engineer is responsible for the implementation, maintenance, and integration of the corporate WAN, LAN, and server architecture. This position also implements and administers network security hardware and software, enforcing the network security policy and complying with requirements of external security audits and recommendations. Additionally, the position may perform analysis of network security needs and contribute to design, integration, and installation of hardware and software; troubleshooting and correcting network problems; and maintaining perimeter security systems.

Penetration Tester/Ethical Hacker

A penetration tester probes for and exploits security vulnerabilities in web-based applications, networks, and systems. In other words, this position gets paid to legally hack. This role uses a series of penetration tools – some predetermined, some self-designed – to simulate real-life cyberattacks. The ultimate aim is to help an organization improve its security.

Quality Engineering and Assurance Analyst

The Quality Assurance Analyst is responsible for supporting the planning, design, and execution of system testing on simple to complex implementations. The QA Analyst works collaboratively within the IT department and business units to execute and validate test cases based upon system requirements. This position also develops test plans, cases, scripts and reports on multiple projects; performs testing on various software, telecommunications, and reporting systems; and validates that user expectations are achieved during the testing process.

Security Analyst/Security Consultant/Information Assurance

This position determines effective ways to protect computers, networks, software, data, and information systems against any possible attacks. They may interview staff and heads of department to determine security issues; perform vulnerability testing, risk analyses, and security assessments; research security standards, security systems and authentication protocols; and prepare cost estimates and identify integration issues for IT project managers. They also plan, research, and design robust security architectures for IT projects; test security solutions; and deliver technical reports and formal papers on test findings.

Security Engineer

A Security Engineer focuses on the security aspects in the design of systems that need to be able to deal robustly with possible sources of disruption, ranging from natural disasters to malicious acts. It is similar to other systems engineering roles in that the primary objective is to support the delivery of engineering solutions that satisfy pre-defined functional and user requirements, but with the added dimension of preventing misuse and malicious behavior. These constraints and restrictions are often asserted as a security policy.

Security Solutions Analyst

A Security Solutions Analyst performs work necessary to develop, implement, and manage elements of the company's information security, governance, and risk management programs in the most effective way to protect computers, networks, software, data, and information systems against possible attacks. They analyze business processes to identify security risks and develop specifications for solutions and assist with design, vetting, and implementation of technical and procedural solutions to protect cardholder and proprietary information.

Software Developer/Software Engineer

A Software Developer designs, develops, and maintains the operation of database-driven ASP .NET/C# Web applications, with a specific emphasis on usability, performance, and scalability. Additional responsibilities include developing web applications by studying existing technology architecture; programming objects, events, functions, error trapping, and data verification; and adhering and contributing to development policies, procedures, and standards.

Systems Administrator/Systems Engineer

This interdisciplinary field focuses on how to design and manage complex systems over their life cycles. Systems engineers utilize systems thinking principles to organize this body of knowledge. Issues such as requirements engineering, reliability, logistics, coordination of different teams, testing and evaluation, maintainability and many other disciplines necessary for successful system development, design, implementation, and ultimate decommission become more difficult when dealing with large or complex projects. Systems engineering overlaps technical and human-centered disciplines from many engineering and related fields.

Technical Risk Advisor/Risk Assurance

This role monitors the risk universe for all technology subjects of risk including scoping, the performance of risk assessments, conclusions, and the implementation and verification of management’s corrective actions. They document processes, oversee testing of controls, and provide support for remediation efforts; provide technical support to business and technology teams regarding the implementation of technology controls; and investigate and implement improved controls for technology areas.

Technology Advisor/Analyst

A technical advisor is an individual who is an expert in a particular field of knowledge, hired to provide detailed information and advice to people working in that field. For example, a construction company might hire a technical expert in fluid dynamics to advise them if seeking to move a small water course, or a company operating in adventure education will frequently hire technical experts to ensure that their policies and procedures are robust enough to handle the hazards they are going to face.

Technology Specialist

This role provides a high level of resolution support to multiple business customer types, adapting to their varying needs and requirements; delivers efficient customer support on large accounts, with the ability to be proficient in customer-facing systems; and applies technical knowledge to resolve customer issues and provide assistance on evolving technologies through effective troubleshooting.

User Interface/User Experience (UI/UX) Designer

A UI/UX Designer creates the look and feel of features and products to be distributed on a company’s websites and mobile apps for a wide range of platforms and devices. This role understands user needs, behaviors, motivations, and pain points through the analysis of existing research and usability testing; collaborates with other UI designers, UX designers, product managers, and developers to translate research findings into visual designs, prototypes, and functional apps; and provides final, detailed design specifications and assets for developers to implement.