The average salary for jobs that require the skills of Data Security Software is $160,272 based on United States National Average.
Core compensation
Manages the team responsible for investigating and responding to cyber incidents. Administers all aspects of technical incident response from initiation to conclusion. Assesses the nature of the incident and determines what resources are needed to resolve the situation. Manages and coordinates all efforts to contain and resolve the incident. Reviews reports and other documentation to make recommen... View job details
Oversees the team responsible for analyzing and responding to cyber incidents. Administers all aspects of technical incident response from initiation to conclusion. Assesses the nature of the incident and determines what resources are needed to resolve the situation. Manages and coordinates all efforts to contain and resolve the incident. Reviews reports and other documentation to recommend improv... View job details
Investigates, reports, and responds to detected cyber incidents. Maintains system cybersecurity monitoring operations, and performs cyber incident triage to determine scope, urgency, and potential impact of the incident. Identifies the specific vulnerability and makes recommendations for remediation. Proactively searches for threats using a variety of Computer Network Defense (CND) tools, includin... View job details
Investigates, reports, and responds to detected cyber incidents. Maintains system cybersecurity monitoring operations, and performs cyber incident triage to determine scope, urgency, and potential impact of the incident. Identifies the specific vulnerability and makes recommendations for remediation. Proactively searches for threats using a variety of Computer Network Defense (CND) tools, includin... View job details
Investigates, reports, and responds to detected cyber incidents. Maintains system cybersecurity monitoring operations, and performs cyber incident triage to determine scope, urgency, and potential impact of the incident. Identifies the specific vulnerability and makes recommendations for remediation. Proactively searches for threats using a variety of Computer Network Defense (CND) tools, includin... View job details
Investigates, reports, and responds to detected cyber incidents. Maintains system cybersecurity monitoring operations, and performs cyber incident triage to determine scope, urgency, and potential impact of the incident. Identifies the specific vulnerability and makes recommendations for remediation. Proactively searches for threats using a variety of Computer Network Defense (CND) tools, includin... View job details
Investigates, reports, and responds to detected cyber incidents. Maintains system cybersecurity monitoring operations, and performs cyber incident triage to determine scope, urgency, and potential impact of the incident. Identifies the specific vulnerability and makes recommendations for remediation. Proactively searches for threats using a variety of Computer Network Defense (CND) tools, includin... View job details
Manages a team responsible for analyzing systems and networks to determine deviations from approved policies and configurations. Supports and coaches team members on effective methods to research and evaluate incident response procedures and capabilities. Conducts security scans, examines system configurations, and reviews documentation of incident response procedures. Analyzes identified maliciou... View job details
Analyzes systems and networks to determine deviations from approved policies and configurations. Evaluates incident response procedures and capabilities. Conducts security scans, examines system configurations, and reviews documentation of incident response procedures. Analyzes identified malicious network activity to determine weaknesses exploited, exploitation methods, and the effects on the sys... View job details
Analyzes systems and networks to determine deviations from approved policies and configurations. Evaluates incident response procedures and capabilities. Conducts security scans, examines system configurations, and reviews documentation of incident response procedures. Analyzes identified malicious network activity to determine weaknesses exploited, exploitation methods, and the effects on the sys... View job details
Inform your career path by finding your customized salary.