Technical and Non-Technical Cybersecurity jobs

A vast majority of people might think the only way to get a job in Security, is if you know how to code and are a lover becoming a hacker. While there are a plethora of cybersecurity jobs that require technical skills, there are also others that mainly emphasizes on problem solving, analytic, strategy and writing, leadership, and business risk skills.

In many ways, cybersecurity is similar to engineering or healthcare. There are so many different paths you can specialize in, from mobile device forensics and incident response to penetration testing, endpoint security or security awareness.

Many might not realize they probably hold the skills that are transferable to this in-demand field, experts said.

According to Cybersecurity Ventures, the global shortage of cybersecurity professionals is expected to reach 3.5 million unfilled positions by 2021. That means more people are encouraged to explore the possibilities and opportunities into the field.

The technical skills that is necessary can be self-taught by attaining certain IT/Security certifications using online resources or if a company is willing to train you on the job.

Salaries for cybersecurity staff range from $90,000 to more than $200,000 for more experienced employees, including jobs such as information risk managers and security engineers, according to career information company Glassdoor.

Here are just a few job titles that shows the diversity of roles in Cybersecurity.


Penetration Tester

Perform security tests on networks, web-based applications, and computer systems.

Information Security Analyst/ Security Engineer

Protect computer networks by monitoring for and responding to threats. develop security plans and policies. Performs security monitoring, security and data/logs analysis, and forensic analysis, to detect security incidents, and mounts incident response. Investigates and utilizes new technologies and processes to enhance security capabilities and implement improvements.

Security Architect 

Design, build and implement enterprise-class or major components of a security system for a production environment. They may also head a security design team building a new security system.


Uses encryption to secure information or to build security software. Also works as researcher to develop stronger encryption algorithms.


Cyber Insurance Policy Specialist

Consult on cyber risk and liability protection. They provide direct support to improve a companies cybersecurity posture by identifying, verifying, and understanding cyber events in order to respond effectively, develop mitigation strategies, and deliver timely products that address and incorporate stakeholder needs.

Information Security Governance Analyst

Plays a vital role in achieving the security objectives of organizations; not only for current needs but also to ensure well-drafted mitigation plans for future challenges from new emerging technology.

Information Security Product Manager

Responsible for maintaining the product road map, creating concept documents, business and use cases for new solutions, services, features and functions to support customer demand, growth strategies and profitability targets.

Cyber Security Writing

Develop and implement customized technical documents; gather information about needs, objectives, functions, features and requirements from security teams. News entities, online publications, blogs and cyber security organizations need strong writers with passion and expertise to report on the constantly evolving cyber space.

The misconception of having to be a highly skilled coder and hacker to break into the field is troubling, and CYCO - A Cybersecurity Collective is making it easier for those who want to enter the workforce or just become more aware of the field by providing training, education, and awareness in the cyber world.