Non-Technical Roles

Subcategories:
  • Account Executive
  • Business Development Representative
  • Customer Success
  • Cloud Security Services Account Manager
  • Security Sales
  • Sales Manager
  • Sales Director
  • Sales Vice President
  • Chief Revenue Officer
Subcategories:

Security Product Owner

Subcategories:
  • Cyber Staffing Recruiter
  • Information Security Recruiter
Subcategory:
  • Cyber Law Liaison
Subcategory:
  • Cyber Auditor
Subcategories:
  • Assessment Report Writer
  • Policy and Procedure Writer
Subcategory:
  • Awareness Campaign Program Manager
Subcategory:
  • Customer Support Representative
  • Technical Support Representative
  • Customer Support Manager
  • Customer Support Director

Technical Roles

Subcategories:
  • Cloud Security Engineer
  • Embedded Security Engineer
  • Identity Access Management Engineer
  • Information Security Engineer
  • Network Security Engineer
  • SecOps Engineer
  • Security Consultant Intrusion Detection Analyst
  • Threat Hunter
Subcategories:
  • Security Software Engineer
  • Web Application Engineer
  • DevOps Engineer
Subcategories:
  • Cloud Security Analyst
  • Data Security Analyst
  • Network Security Analyst
  • Security Operations Center (SOC) Analyst
  • Vulnerability Management Analyst
Subcategories:
  • Bug Bounty
  • Cloud Security Tester
  • Ethical Hacker
  • Penetration Tester
  • Red Team Tester
Subcategories:
  • Cloud Security Adminstrator
  • System Security Adminstrator
  • Unix Security Administrator
  • Windows Security Administrator
Subcategories:
  • CSIRT Lead
  • Cybersecurity Investigator
  • Incident Handler
  • Incident Response Analyst
  • Incident Response Engineer
  • Cyber Threat Intelligence Analyst
  • Incident Response Specialist
Subcategories:
  • Adversary Researcher
  • Cyber Attack Researcher
  • Cybersecurity Researcher
  • IAM Researcher
  • IOT Security Researcher
  • Malware Researcher
  • Privacy Researcher
  • Social Engineering Reseacher
  • Security Hardware Vulnerability Researcher
  • Vulnerability Researcher
Subcategories:
  • Cloud Forensics Analyst
  • Computer Crime Specialist
  • Computer Forensic Investigator
  • Digital Forensics Analyst
  • Forensic Specialist
  • Memory Forensics Analyst
  • Mobile Device Forensics Analyst
  • Network Forensics Analyst
Subcategories:
  • Cyber Espionage Reverse Engineer
  • Cyber Technologies Reverse Engineer
  • Hardware Reverse Engineer
Subcategories:
  • Secure Code Auditor
  • Compliance Auditor
  • IT Security Auditor
  • Cloud Security Auditor
  • Network Security Auditor
  • Certification and Accreditation Auditor
Subcategories:
  • Network Vulnerability Assessor
  • Security Tester
  • Vulnerability Assessor
  • Vulnerability Tester
  • Web Application Vulnerability Assessor
Subcategories:
  • Cloud Encryption Engineer
  • Data Transmission Security Engineer
  • PKI Specialist
Subcategories:
  • Code Breaker
Subcategories:
  • IPS Analyst
Subcategories:
  • Network Access Control Analyst
Subcategories:
  • Malware Hunter
  • Malware Reverse Engineer
Subcategories:
  • Threat Analyst
Subcategories:
  • Sales Engineer
Subcategories:
  • Application Security Architect
  • Chief Security Architect
  • Cloud Security Architect
  • Endpoint Security Architect
  • Enterprise Security Architect
  • IAM Architect
  • Information Security Architect
  • Network Security Architect
  • Product Security Architect
  • Security Solutions Architect
  • SIEM Architect

Leadership Roles

Subcategories:
  • Founder
Subcategories:
  • Chief Executive Officer
Subcategories:
  • Chief Information Security Officer
Subcategories:
  • Chief Security Officer
Subcategories:
  • Data Privacy Officer
Subcategories:
  • Cloud Security Director
  • Head of IT Security
  • Information Security Director
  • Information Security Manager
  • Network Security Director
Subcategories:
  • Compliance and Risk Manager
Subcategory:
  • Technical Project Manager