Security Engineer, Information Systems Average Salary

Job Satisfaction

We have no job satisfaction data for this job. Do you work as Security Engineer, Information Systems ? Start the survey
national salary data
National Employer Data
There is not enough data available to display this chart. Is this your job? Help us build our database by providing information about this job title. Start here.

Security Engineer, Information Systems Job Listings

Search for more jobs:

Job Description for Security Engineer, Information Systems

A security engineer for information systems holds a technical job involving the designing of new security software and infrastructure, as well as the testing of existing infrastructure to ensure there are no vulnerabilities. The job is team-oriented, since creating software solutions requires the expertise of many engineers. Although some engineers may work outdoors, a systems engineer generally spends most of their time in the office interacting with colleagues and supervisors. Almost every institution (such as finance, healthcare, manufacturing, and retail organizations have security engineers focused on protecting their information technology (IT) installations from incidents such as hacking. Security engineers for information systems generally work full time in an office setting, although overtime may be required to work on complex tasks and on deadlines. If there is a security breach, the professional may need to work on demand (which may include weekends and evening hours) to fix the breach.

A bachelor's degree in an engineering field - particularly focused on computer science - is generally required for this position. At times, a graduate degree may also be required depending on the position (for example, a managerial - versus entry-level - position). Experience in a related position is generally required or preferred.

Security Engineer, Information Systems Tasks
  • Develop plans to safeguard computer files and contribute in building security architecture.
  • Maintain existing capabilities and implement appropriate up to date security technologies.
  • Ensure the integrity of host computers, multiple databases and secure data transfers.

Key Stats

Less than 1 year
5-9 years
10-19 years

Find Out Exactly What You Should Be Paid

United States (change)

Employers: Start Here »

Subscribe to Our Newsletter

Salary and career advice to put you a step ahead.
newsletter icon


Get Career Tips & Advice

Want to Get More Specific? Get a Salary Report Customized for YOU

Tell us about your current job and your skillset, and we’ll let you know how much employers are paying in your area.

PayScale Research