Security Consultant, (Computing / Networking / Information Technology) Average Salary

Job Satisfaction

We have no job satisfaction data for this job. Do you work as Security Consultant, (Computing / Networking / Information Technology) ? Start the survey
national salary data
National Employer Data
There is not enough data available to display this chart. Is this your job? Help us build our database by providing information about this job title. Start here.

Security Consultant, (Computing / Networking / Information Technology) Job Listings

Search for more jobs:

Job Description for Security Consultant, (Computing / Networking / Information Technology)

Security consultants (computing/networking/information technology) often work in large organizations and educational institutions that have large digitized databases.

Security consultants must be adaptable to each industry they may specifically cater to. They must have good organization and communication skills.

They must design and/or improve a system that protects the institution against internal and external theft of data; protecting data from terrorist organizations may also be a concern.

Security consultants also conceive emergency plans for clients. When planning, they start by assessing potential threats and then develop the process by which the company will implement the system during certain emergencies or natural disasters.

Most companies expect security consultants to have at least bachelor's degree and three to five years of professional experience. A bachelor's degree in computer science is particularly preferred in the computing, networking, or information technology field. Engineering degrees are also useful, as well as CAD experience. A common certification for security analysts is through the International Association of Professional Security Consultants (IAPSC).
Security Consultant, (Computing / Networking / Information Technology) Tasks
  • Educate business about polices, procedure and standards.
  • Assist in risk analysis and mitigation techniques.
  • Interface with clients and technically manage security projects.
  • Assess vulnerability, including preforming penetration tests.
  • Provide incident response and forensics.

Key Stats

1-4 years
5-9 years
10-19 years

Find Out Exactly What You Should Be Paid

United States (change)

Comp Managers: Start Here »

Subscribe to Our Newsletter

Salary and career advice to put you a step ahead.
newsletter icon


Get Career Tips & Advice

Want to Get More Specific? Get a Salary Report Customized for YOU

Tell us about your current job and your skillset, and we’ll let you know how much employers are paying in your area.

PayScale Research