X
This feature is available to paying subscribers. Click here to learn about our subscription plans.

Employers of Cyber Security majors in UT

Information Security Analysts
Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses.

Computer Network Architects
Design and implement computer and information networks, such as local area networks (LAN), wide area networks (WAN), intranets, extranets, and other data communications networks. Perform network modeling, analysis, and planning. May also design network and computer security measures. May research and recommend network and data communications hardware and software.

Database Administrators
Administer, test, and implement computer databases, applying knowledge of database management systems. Coordinate changes to computer databases. May plan, coordinate, and implement security measures to safeguard computer databases.

Displaying 1 - 16 of 16 companies
X
This feature is available to paying subscribers. Click here to learn about our subscription plans.
Company City State
Heroic Security LLC
Heroic Cybersecurity
Coded Instruction Security Corporation
Cisc Systems
Symantec Corporation
Symantec
Cisco Systems, Inc.
Cisco Systems
Cisco Systems, Inc.
Cisco Systems
H-11 Digital Forensics Company LLC
Northrop Grumman Systems Corporation
Aegis Cyber Security and Forensics, LLC
J&S Security Tools LLC
Northrop Grumman
Vidant Cybersecurity, Inc.
Silent Break Security LLC
Apex Cyber and Network Solutions, LLC
Paladin Security, LLC
Paladin Security
Eclipse It Security, Inc
Dpfe (digital Photographic Forensic Evidence)
Displaying 1 - 16 of 16 companies
X
This feature is available to paying subscribers. Click here to learn about our subscription plans.