X
This feature is available to paying subscribers only. Click here to learn about our subscription plans.

Employers of Cyber Security majors in UT

Information Security Analysts
Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses.

Computer Network Architects
Design and implement computer and information networks, such as local area networks (LAN), wide area networks (WAN), intranets, extranets, and other data communications networks. Perform network modeling, analysis, and planning. May also design network and computer security measures. May research and recommend network and data communications hardware and software.

Database Administrators
Administer, test, and implement computer databases, applying knowledge of database management systems. Coordinate changes to computer databases. May plan, coordinate, and implement security measures to safeguard computer databases.

Displaying 1 - 13 of 13 companies
Company City State
Coded Instruction Security Corporation
Cisc Systems
Cisco Systems, Inc.
Cisco Systems
Cisco Systems, Inc.
Cisco Systems
H-11 Digital Forensics Company LLC
Northrop Grumman Systems Corporation
Symantec Software Corporation
Northrop Grumman
Symantec Corporation
Symantec
Aegis Cyber Security and Forensics, LLC
J&S Security Tools LLC
Apex Cyber and Network Solutions, LLC
Silent Break Security
Dpfe (digital Photographic Forensic Evidence)
Displaying 1 - 13 of 13 companies
X
This feature is available to paying subscribers only. Click here to learn about our subscription plans.