Cybersecurity Job Category: Cyber Administration
Cyber Warriors that work as “Cyber Administrators” provide the customer support, system administration, and maintenance necessary to ensure effective and efficient information technology (IT) system performance and security. Cyber Administrations is one of the largest cybersecurity job categories. The Cyber Administration category sub-specialties include the following:
Customer Service and Technical Support Technician
Addresses problems; installs, configures, troubleshoots, and provides maintenance and training in response to customer requirements or inquiries (e.g., tiered-level customer support). Typically provides initial incident information to the Incident Response (IR) Specialty.
Data Administration Specialist
This includes both data administration and data analysis. The data specialist develops and administers databases and/or data management systems that allow for the storage, query, protection, and utilization of data. The Data analysis role examines data from multiple disparate sources with the goal of providing security and privacy insight. Designs and implements custom algorithms, workflow processes, and layouts for complex, enterprise-scale data sets used for modeling, data mining, and research purposes.
Knowledge Management Specialist
This position is responsible for management and administration processes and tools that enable the organization to identify, document, and access intellectual capital and information content.
Network Services Technician
This person installs, configures, tests, operates, maintains, and manages networks and their firewalls, including hardware (e.g., hubs, bridges, switches, multiplexers, routers, cables, proxy servers, and protective distributor systems) and software that permit the sharing and transmission of all spectrum transmissions of information to support the security of information and information systems.
System administrators are responsible for setting up and maintaining a system or specific components of a system (e.g. for example, installing, configuring, and updating hardware and software; establishing and managing user accounts; overseeing or conducting backup and recovery tasks; implementing operational and technical security controls; and adhering to organizational security policies and procedures).
The Systems analyst studies an organization’s current computer systems and procedures, and designs information systems solutions to help the organization operate more securely, efficiently, and effectively. Brings business and information technology (IT) together by understanding the needs and limitations of both.
To learn more about becoming a Cyber Warrior, check out the College Recon Guide to Cybersecurity Careers.
About the author
Terry Howell is a retired Coast Guard veteran, where he served for 20 years.
He is currently the Executive Director for Veterans' Legacies, a non-profit that works to preserve veterans personal stories to help educate our youth.
Terry is also the author of The Military Advantage, an annually updated guide to military and veteran benefits.