Specialized Security Professional Titles

Standardized job titles, responsibilities, and expectations for specialized and cross-functional security professionals. These roles often span traditional offensive/defensive boundaries or focus on specific security domains.

How to use these tables: Levels are displayed as columns for easy vertical comparison. The attribute column stays fixed while you scroll horizontally.

Enterprise Vulnerability Management (EVM)

Strategic vulnerability identification, risk-based prioritization, and remediation enablement

EVM Analyst

Professionals who identify, assess, and drive remediation of security vulnerabilities across the enterprise. Focus on risk-based prioritization, threat intelligence integration, and enabling systemic remediation rather than transactional ticket management. Partner with asset owners to address root causes and improve organizational security posture.

NICE Framework: PR-VAM-001 Vulnerability Assessment Analyst strong Good overlap on vulnerability identification and prioritization.
Attribute Analyst 1 / Entry Analyst 2 / Junior Analyst 3 / Mid Analyst 4 / Senior / Lead Analyst 5 / Staff Analyst 6 / Senior Staff Analyst 7 / Principal
General Description Entry-level EVM analyst learning vulnerability assessment fundamentals and remediation workflows. Assists with scan execution, finding validation, and remediation tracking. Develops foundational understanding of vulnerability types, risk rating methodologies, and the importance of context-driven prioritization. Junior EVM analyst capable of independently executing vulnerability assessments and facilitating remediation efforts. Demonstrates proficiency in risk-based prioritization and can effectively communicate findings to technical stakeholders. Beginning to understand the importance of addressing root causes over individual findings. Experienced EVM analyst who drives strategic remediation initiatives and identifies systemic vulnerability patterns. Expert in risk-based prioritization integrating threat intelligence, business context, and exploitability data. Focuses on enabling root-cause remediation rather than individual ticket management. Mentors junior analysts and shapes program processes. Senior EVM analyst and program leader who defines vulnerability management strategy and drives organizational security improvement. Champions the philosophy that effective vulnerability management enables systemic remediation through automation, threat intelligence, and root-cause analysis rather than overwhelming teams with tickets. Leads major initiatives and represents the program to executive stakeholders. Distinguished EVM strategist who shapes organizational and industry approaches to vulnerability management. Recognized externally as thought leader in risk-based vulnerability prioritization and strategic remediation. Drives innovation in vulnerability intelligence, automation, and program effectiveness measurement. Elite EVM strategist with industry-defining influence in vulnerability management and risk prioritization. Operates at the intersection of deep expertise and organizational strategy. Shapes not only practice direction but industry approaches to vulnerability risk management. Legendary practitioner at the pinnacle of vulnerability management expertise. Globally recognized authority who defines how the industry approaches vulnerability risk identification, prioritization, and remediation. Combines unparalleled expertise with strategic vision.
Primary Responsibilities
  • Execute scheduled vulnerability scans under guidance
  • Validate and triage scan findings for false positives
  • Document vulnerabilities in tracking systems
  • Assist with remediation status tracking and follow-up
  • Learn vulnerability scoring systems (CVSS, EPSS, SSVC)
  • Support basic vulnerability reporting and metrics
  • Maintain scan schedules and asset group documentation
  • Escalate critical findings to senior analysts
  • Execute and manage vulnerability scans independently
  • Perform risk-based prioritization of findings
  • Facilitate remediation discussions with asset owners
  • Develop and maintain vulnerability analytics and reports
  • Track remediation progress and identify blockers
  • Integrate threat intelligence into prioritization decisions
  • Identify patterns indicating systemic issues
  • Contribute to SLA development and tracking
  • Support audit and compliance evidence gathering
  • Drive strategic remediation initiatives addressing root causes
  • Develop advanced vulnerability analytics and trending
  • Integrate threat intelligence for proactive prioritization
  • Identify and escalate systemic vulnerability patterns
  • Build relationships with key asset owner stakeholders
  • Mentor junior analysts on risk-based methodology
  • Develop program metrics and executive reporting
  • Lead remediation campaigns for critical vulnerabilities
  • Evaluate and recommend process improvements
  • Support risk acceptance and exception governance
  • Define EVM program strategy and multi-year roadmap
  • Drive organizational adoption of risk-based remediation
  • Develop automation strategies for remediation enablement
  • Lead critical vulnerability response and coordination
  • Present program metrics and strategy to executives
  • Mentor and develop EVM analyst team
  • Build strategic partnerships with IT and development teams
  • Drive continuous improvement in program maturity
  • Evaluate emerging vulnerability intelligence sources
  • Support M&A vulnerability assessment activities
  • Represent EVM in cross-functional security initiatives
  • Define multi-year EVM strategy and vision
  • Lead industry-impacting research and methodology development
  • Build strategic relationships with vulnerability intelligence providers
  • Develop next-generation prioritization methodologies
  • Represent organization at highest industry levels
  • Guide organizational investments in EVM capabilities
  • Shape industry standards and practices
  • Advise executive leadership on vulnerability risk strategy
  • Set multi-year vision for enterprise vulnerability management
  • Lead transformational methodology development
  • Build strategic alliances with vendors and intelligence providers
  • Influence industry standards and frameworks
  • Develop next-generation risk quantification approaches
  • Guide organizational strategy alongside executive leadership
  • Represent organization as premier thought leader
  • Define industry direction for vulnerability management
  • Lead transformational multi-year initiatives
  • Serve as ultimate strategic authority
  • Shape vulnerability disclosure and coordination policy
  • Build generational capabilities and practices
  • Guide organizational transformation
  • Represent organization at highest levels globally
Required Skills
  • Basic understanding of common vulnerability types
  • Familiarity with vulnerability scanners (Tenable, Qualys, Rapid7)
  • Understanding of CVSS scoring methodology
  • Basic networking and system administration knowledge
  • Documentation and attention to detail
  • Spreadsheet and data analysis basics
  • Understanding of patch management concepts
  • Proficiency with enterprise vulnerability scanners
  • Risk-based prioritization using CVSS, EPSS, and business context
  • Understanding of threat intelligence integration
  • Remediation workflow management
  • Data analysis and visualization
  • Stakeholder communication skills
  • Understanding of compensating controls
  • Basic knowledge of exploit availability and weaponization
  • Expert-level vulnerability assessment and prioritization
  • Threat intelligence integration and analysis
  • Root cause analysis for systemic issues
  • Advanced analytics and data visualization
  • Executive communication and reporting
  • Program metrics development
  • Stakeholder relationship management
  • Process improvement methodology
  • Mastery of enterprise vulnerability management
  • Strategic program development and leadership
  • Executive communication and influence
  • Automation and process optimization strategy
  • Team leadership and development
  • Vendor and tool evaluation
  • Business acumen and risk communication
  • Cross-functional collaboration and influence
  • World-class vulnerability management expertise
  • Strategic practice leadership
  • Executive presence and influence
  • Industry-wide recognition and relationships
  • Innovation and methodology development
  • Cross-functional leadership
  • Elite vulnerability management and risk expertise
  • Transformational leadership
  • Executive and board-level communication
  • Industry-shaping influence and relationships
  • Business strategy and risk quantification
  • Innovation leadership
  • Globally recognized expertise
  • Transformational strategic vision
  • Executive and government-level influence
  • Industry-defining thought leadership
  • Strategic business development
Preferred Skills
  • Familiarity with ticketing systems (ServiceNow, Jira)
  • Basic scripting ability (Python, PowerShell)
  • Understanding of common CVEs and exploit vectors
  • Cloud platform basics (AWS, Azure)
  • ITIL or service management exposure
  • Scripting for data analysis and automation
  • Dashboard development (Power BI, Tableau)
  • Cloud vulnerability assessment
  • Container and Kubernetes scanning
  • Application security scanning basics
  • Automation development for analysis workflows
  • Machine learning concepts for prioritization
  • Supply chain vulnerability assessment
  • Regulatory compliance mapping
  • Published vulnerability research or writing
  • Industry speaking or thought leadership
  • Vulnerability disclosure program experience
  • Bug bounty program management
  • Security metrics and KRI development
  • Board-level risk communication
  • Published vulnerability research or frameworks
  • Standards body participation (CVSS SIG, etc.)
  • Advisory roles with vendors or industry bodies
  • Academic affiliations
  • Major framework or methodology creator
  • Vendor advisory roles
  • Board positions
  • Academic appointments
  • Founded significant vulnerability frameworks or programs
  • Government or regulatory advisory
  • Major industry awards
  • Academic distinguished appointments
Mentorship Requirements Receives direct mentorship from Senior EVM analysts. Shadows on remediation discussions with asset owners. Expected to complete scanner training and certification within first 6 months. Learns risk-based prioritization philosophy. Receives guidance from Senior analysts on complex prioritization decisions. Expected to begin mentoring Entry-level analysts informally. Contributes to process documentation and training materials. Should be developing expertise in specific asset types or vulnerability classes. Primary mentor for Junior and Entry analysts. Leads training on risk-based prioritization methodology. Expected to develop program procedures and best practices. Establishes reputation as expert in vulnerability intelligence and prioritization. Primary mentor for Mid and Junior analysts. Responsible for analyst career development. Creates program training and development curriculum. Industry mentorship through community engagement. Shapes EVM best practices. Mentors Senior analysts and emerging leaders. Shapes organizational vulnerability management talent strategy. Industry-level mentorship through community engagement. Develops thought leaders in the space. Develops organizational leadership pipeline. Mentors future industry leaders. Legacy-building through lasting contributions to the field. Develops organizational and industry leadership. Mentors future industry leaders. Legacy-building through generational impact. May fund or sponsor research initiatives.
Impact Scope Individual contributor on scan execution and finding validation. Impact limited to assigned scan segments and documentation. Work is reviewed before stakeholder communication. Supports overall program metrics and coverage. Directly contributes to remediation outcomes. Responsible for accurate prioritization affecting asset owner workload. Analytics inform program decisions. Beginning to influence remediation strategies. Shapes program strategy and remediation outcomes. Root cause identification prevents future vulnerabilities. Analytics drive organizational security investment. Influences technology and process decisions. Defines program capabilities and strategic direction. Program effectiveness directly impacts organizational risk posture. Team development impacts security maturity. Executive relationships enable resource allocation. Industry and organizational transformation. Shapes how vulnerability management is practiced. Multi-year strategic outcomes. Influences industry standards and vendor roadmaps. Industry-defining impact. Organizational competitive differentiation through security posture. Multi-year strategic transformation. Shapes how vulnerability risk is understood and managed. Global industry impact. Defines how vulnerability management is practiced. Organizational transformation. Lasting contributions to cybersecurity risk management.
Autonomy & Decision Authority Works under close supervision. Follows established scan procedures and triage guidelines. Limited authority to close or disposition findings independently. Escalates prioritization questions to senior analysts. Works with moderate supervision. Can make routine prioritization decisions. Authority to facilitate remediation discussions. Escalates risk acceptance and exception requests. Works independently with strategic guidance. Makes significant prioritization and process decisions. Authority to approve risk acceptances within defined criteria. Consulted on program strategy and tooling decisions. High autonomy with strategic alignment. Makes significant program and investment decisions. Authority over EVM processes and standards. Trusted to represent program to executives and externally. Near-complete autonomy over domain. Strategic influence on organizational direction. Shapes investment and capability priorities. Makes decisions with significant organizational impact. Full autonomy over strategic domain. Executive-level decision authority. May have significant budget authority. Shapes organizational direction. Complete strategic autonomy. Executive-level authority. Shapes organizational strategy. May have significant influence over industry direction.
Communication & Stakeholders Primarily internal communication with EVM team. May assist with remediation ticket creation. Documents findings in tracking systems. Limited direct interaction with asset owners. Regular interaction with asset owners and IT teams. Presents findings in remediation meetings. Participates in risk discussions. Documents decisions for audit purposes. Regular communication with security leadership. Presents to technical and management audiences. Primary analyst contact for major remediation initiatives. Builds relationships with senior asset owners. Executive and board-level communication on risk posture. Represents program to organizational leadership. Industry conference presentations. Builds relationships with peers at other organizations. C-suite engagement on risk strategy. Industry-wide influence through publications and speaking. Vendor and standards body relationships. Media and analyst engagement. Peer engagement with executives and CISOs. Industry-defining thought leadership. Media and public presence. Board-level engagement. Global presence. Government and international engagement. Media thought leadership. Premier industry venues.
Degree / Experience Bachelor's degree in IT, Cybersecurity, Computer Science, or related field, OR 1-2 years of IT support or security operations experience, OR completion of vulnerability management training program. Bachelor's degree in IT, Cybersecurity, or related field, OR 2-4 years of vulnerability management or security operations experience. Demonstrated ability to drive remediation outcomes. Bachelor's degree in IT, Cybersecurity, or related field, OR 4-6 years of vulnerability management experience. Demonstrated track record of driving strategic remediation outcomes. May have Master's degree with less experience. Bachelor's or Master's degree in relevant field, OR 6-10 years of vulnerability management experience. Demonstrated program leadership and strategic impact. Industry recognition through speaking or publications. Advanced degree often expected, OR 10+ years of elite vulnerability management experience with demonstrated industry impact. Recognition is essential qualification. Advanced degree often present, but industry recognition is primary qualification. 12+ years of elite experience with transformational impact. Recognition is primary qualification. 15+ years with transformational impact. May be pioneers of major vulnerability frameworks or methodologies.
Certifications
  • CompTIA Security+
  • Vendor scanner certifications (Tenable, Qualys)
  • CompTIA CySA+
  • GIAC Foundational certifications
  • CompTIA CySA+
  • Vendor advanced scanner certifications
  • GIAC Vulnerability Assessment (GEVA) - if available
  • Cloud security fundamentals
  • CISSP or equivalent
  • GIAC certifications (GEVA, GPEN for context)
  • Advanced scanner certifications
  • Cloud security certifications
  • CISSP, CISM, or equivalent
  • Multiple technical certifications
  • Industry recognition may substitute
  • Leadership or management training
  • Certifications secondary to demonstrated expertise
  • May be certification or framework contributors
  • Industry awards and recognition
  • Published research and methodologies
  • Certifications irrelevant at this level
  • Known by reputation and body of work
  • Industry recognition and awards
  • Certifications irrelevant at this level
  • Known by reputation and legacy
  • May have frameworks or methods named after them
Salary: US Gov't $55,000 - $75,000 (GS-7 to GS-9) $70,000 - $95,000 (GS-9 to GS-11) $90,000 - $120,000 (GS-12 to GS-13) $115,000 - $150,000 (GS-14 to GS-15) $145,000 - $180,000 (GS-15 / SES equivalent) $165,000 - $200,000 (Senior SES equivalent) $180,000 - $220,000+ (Senior SES / Political appointee)
Salary: US Startup $60,000 - $80,000 $75,000 - $100,000 $100,000 - $140,000 $140,000 - $185,000 + equity $175,000 - $240,000 + significant equity $210,000 - $290,000 + major equity $260,000 - $380,000+ + founder-level equity
Salary: US Corporate $55,000 - $75,000 $70,000 - $95,000 $95,000 - $130,000 $130,000 - $175,000 $165,000 - $220,000 $195,000 - $260,000 $240,000 - $330,000+
Salary: Big Tech (Mag7) $120,000 - $190,000 $170,000 - $280,000 $250,000 - $400,000 $350,000 - $550,000 $500,000 - $800,000 $700,000 - $1,200,000 $1,000,000 - $2,500,000+
↑ Back to navigation

EVM Engineer

Technical professionals who build, deploy, and maintain enterprise vulnerability management platforms and infrastructure. Focus on scanner deployment, platform integration, automation development, and enabling analyst effectiveness through tooling and dashboards. Serve as architects for scanning infrastructure and the technical bridge to vendors.

NICE Framework: PR-VAM-001 Vulnerability Assessment Analyst partial Security Titles adds platform engineering and automation scope beyond NICE's assessment focus.
Attribute Eng 1 / Entry Eng 2 / Junior Eng 3 / Mid Eng 4 / Senior / Lead Eng 5 / Staff Eng 6 / Senior Staff Eng 7 / Principal
General Description Entry-level EVM engineer learning vulnerability scanning platform administration and deployment. Assists with scanner maintenance, agent deployments, and basic platform configuration. Develops foundational understanding of scanning technologies, network architecture requirements, and platform capabilities. Junior EVM engineer capable of independently managing scanner deployments and platform administration. Demonstrates proficiency in scanning infrastructure and can troubleshoot complex scanning issues. Beginning to develop automation skills and expertise in specific platform capabilities. Experienced EVM engineer who architects scanning infrastructure and develops platform integrations. Expert in scanner deployment strategies, API integrations, and automation development. Leads platform projects including M&A integrations and capability expansions. Mentors junior engineers and shapes platform standards. Senior EVM engineer and technical leader who defines platform strategy and architecture for enterprise vulnerability management. Leads complex platform initiatives, M&A integrations, and capability development. Serves as the escalation point for critical platform issues and the primary technical interface with scanning vendors. Distinguished EVM platform architect who defines organizational platform strategy and drives innovation. Recognized externally as expert in vulnerability management platform architecture and integration. Shapes how scanning infrastructure enables strategic vulnerability management programs. Elite EVM platform architect with industry-defining technical influence. Operates at the frontier of vulnerability scanning and assessment technology. Shapes how the industry approaches vulnerability detection infrastructure and data platforms. Legendary EVM platform engineer at the pinnacle of vulnerability scanning and assessment platform expertise. Globally recognized for transformational contributions to vulnerability detection technology. Defines how the industry approaches vulnerability scanning infrastructure.
Primary Responsibilities
  • Assist with vulnerability scanner maintenance and updates
  • Support scan engine and agent deployments
  • Monitor scanner health and availability
  • Troubleshoot basic scanning issues
  • Document platform configurations and procedures
  • Assist with credential management for authenticated scans
  • Support asset discovery and inventory activities
  • Maintain scanner infrastructure documentation
  • Deploy and configure vulnerability scanners
  • Manage scan engine placement and network connectivity
  • Administer scanning platforms and user access
  • Develop and maintain scan policies and configurations
  • Troubleshoot scanning failures and coverage gaps
  • Build basic reports and dashboards
  • Support integration with ticketing systems
  • Manage authenticated scanning credentials
  • Document architecture decisions and configurations
  • Architect scanning infrastructure for enterprise coverage
  • Lead scanner deployments for new environments and M&A
  • Develop platform integrations and automation
  • Build advanced dashboards and analytics capabilities
  • Optimize scan configurations for accuracy and performance
  • Mentor junior EVM engineers
  • Manage vendor relationships and technical escalations
  • Evaluate and pilot new scanning capabilities
  • Develop platform standards and best practices
  • Support critical vulnerability response with platform capabilities
  • Define EVM platform strategy and architecture roadmap
  • Lead enterprise-wide platform implementations
  • Architect integrations with security ecosystem
  • Develop automation enabling strategic remediation
  • Mentor and develop EVM engineering team
  • Manage strategic vendor relationships
  • Drive platform innovation and capability development
  • Support M&A technical due diligence and integration
  • Present platform strategy to executives
  • Represent platform engineering in cross-functional initiatives
  • Define multi-year platform strategy and vision
  • Lead platform innovation and research initiatives
  • Architect enterprise vulnerability data platforms
  • Build strategic partnerships with vendors
  • Develop next-generation scanning capabilities
  • Guide organizational platform investments
  • Represent organization at vendor advisory boards
  • Shape industry platform practices
  • Set multi-year technical vision for vulnerability platforms
  • Lead transformational platform initiatives
  • Build strategic technical alliances
  • Develop capabilities that redefine possible
  • Influence vendor product roadmaps
  • Guide organizational technical strategy
  • Serve as ultimate platform authority
  • Define industry technical direction for vulnerability platforms
  • Lead generational platform capability development
  • Serve as ultimate platform authority globally
  • Shape vendor product strategies
  • Build lasting technical contributions
  • Guide organizational transformation
  • Pioneer new approaches to vulnerability detection
Required Skills
  • Basic system administration (Windows, Linux)
  • Understanding of networking fundamentals
  • Familiarity with vulnerability scanning concepts
  • Basic troubleshooting skills
  • Documentation and procedure following
  • Understanding of enterprise IT environments
  • Basic scripting ability
  • Proficiency with vulnerability scanning platforms
  • Scanner deployment and architecture basics
  • Network troubleshooting for scan connectivity
  • Platform administration and configuration
  • Intermediate scripting (Python, PowerShell)
  • API interaction basics
  • Report and dashboard development
  • Change management processes
  • Expert-level scanning platform architecture
  • Advanced API integration development
  • Automation and orchestration development
  • Dashboard and visualization development
  • Strong programming skills (Python, Go, etc.)
  • Cloud scanning architecture
  • Vendor management and technical liaison
  • Project management fundamentals
  • Mastery of enterprise vulnerability scanning platforms
  • Strategic platform architecture
  • Team leadership and development
  • Vendor management and negotiation
  • Executive communication
  • Enterprise integration architecture
  • Automation strategy and implementation
  • Budget planning and management
  • World-class vulnerability platform expertise
  • Strategic platform leadership
  • Executive presence and influence
  • Industry-wide recognition
  • Innovation and capability incubation
  • Cross-functional technical leadership
  • Elite vulnerability platform expertise
  • Transformational technical leadership
  • Industry-wide technical influence
  • Executive presence and communication
  • Strategic vision and planning
  • Innovation at scale
  • Globally recognized platform expertise
  • Transformational capability development
  • Industry-defining influence
  • Strategic technical vision
  • Innovation leadership at global scale
Preferred Skills
  • Experience with virtualization platforms
  • Cloud platform basics (AWS, Azure)
  • Database fundamentals
  • API concepts
  • ITIL or change management exposure
  • Cloud scanning deployment (AWS, Azure, GCP)
  • Container scanning platforms
  • Database querying and reporting
  • Automation development
  • Integration platform experience
  • Data engineering and analytics pipelines
  • Machine learning for vulnerability analysis
  • Custom scanner plugin development
  • Infrastructure as code
  • Security data lake integration
  • Security product development experience
  • Open-source tool development
  • Conference speaking experience
  • Patent or IP development
  • Multi-vendor platform experience
  • Vendor advisory board participation
  • Published platform architecture work
  • Open-source scanning tools
  • Security data platform patents
  • Major platform framework development
  • Multiple vendor advisory roles
  • Security data platform patents
  • Academic research collaborations
  • Founded significant scanning platforms or tools
  • Major vulnerability detection innovations
  • Hall of fame recognition
  • Academic distinguished positions
Mentorship Requirements Receives direct mentorship from Senior EVM engineers. Shadows on platform deployments and integrations. Expected to complete vendor platform training and certification. Learns scanning architecture principles. Receives guidance from Senior engineers on complex deployments. Expected to begin mentoring Entry-level engineers informally. Contributes to platform documentation and procedures. Should be developing expertise in specific platform capabilities. Primary mentor for Junior and Entry engineers. Leads training on platform capabilities and architecture. Expected to develop platform standards and patterns. Establishes reputation as expert in scanning infrastructure. Primary mentor for multiple engineers. Responsible for engineering career development. Creates platform engineering development programs. Industry mentorship through vendor community engagement. Mentors Senior engineers and emerging technical leaders. Shapes platform engineering career paths. Industry-level mentorship through vendor communities. Develops technical leadership pipeline. Mentors future industry platform leaders. Legacy through platform innovations and people developed. Develops generational technical talent. Mentors future industry pioneers. Legacy through lasting technical contributions.
Impact Scope Individual contributor on platform maintenance tasks. Impact limited to assigned infrastructure components. Work is reviewed before production changes. Supports overall scanner coverage and reliability. Directly maintains scanning infrastructure reliability. Responsible for scanner coverage and health. Platform decisions impact analyst effectiveness. Beginning to influence platform architecture. Shapes scanning platform capabilities. Architecture decisions impact coverage and effectiveness. Integrations enable program automation. Influences technology investment decisions. Defines platform capabilities for organization. Strategic decisions impact long-term program effectiveness. Team development impacts engineering maturity. Vendor relationships affect cost and capability. Organizational platform differentiation. Industry-level impact through vendor relationships. Defines state-of-the-art in vulnerability scanning infrastructure. Industry-defining platform impact. Shapes how vulnerability scanning is practiced. Organizational competitive differentiation. Global technical impact. Defines vulnerability scanning capabilities. Lasting contributions to the field.
Autonomy & Decision Authority Works under close supervision. Follows established deployment and maintenance procedures. Limited authority to make platform changes independently. Escalates technical issues to senior engineers. Works with moderate supervision. Can make routine platform decisions. Authority to deploy standard configurations. Escalates architectural changes and integrations. Works independently with strategic guidance. Makes significant architecture and integration decisions. Authority over platform configuration standards. Consulted on platform roadmap and vendor selection. High autonomy with strategic alignment. Makes significant platform and investment decisions. Authority over platform standards and architecture. Trusted to represent organization with vendors. Near-complete technical autonomy. Strategic influence on platform direction. Shapes investment priorities. Makes decisions with significant organizational impact. Full technical autonomy. Strategic authority over platform direction. May have significant R&D budget authority. Shapes organizational strategy. Complete technical autonomy. Executive authority over platform domain. Shapes organizational and industry direction.
Communication & Stakeholders Primarily internal communication with EVM team. Documents work in ticketing systems. Participates in team meetings. Limited interaction with vendor support under guidance. Regular interaction with EVM analysts and IT teams. Coordinates with network and infrastructure teams. Engages vendor support on technical issues. Documents changes for team consumption. Regular communication with security leadership. Presents technical recommendations to stakeholders. Primary technical contact for vendor relationships. Coordinates with enterprise architecture. Executive-level communication on platform strategy. Represents engineering to organizational leadership. Vendor executive relationships. Industry event participation. C-level technical engagement. Vendor executive relationships. Industry conference keynotes. Shapes vendor product roadmaps. Industry-defining technical presence. Vendor strategic engagement. Premier conference keynotes. Media thought leadership. Global technical authority. Premier industry venues. Vendor and government engagement. Media presence.
Degree / Experience Bachelor's degree in IT, Computer Science, Cybersecurity, or related field, OR 1-2 years of system administration or IT operations experience, OR completion of relevant technical training program. Bachelor's degree in IT, Computer Science, or related field, OR 2-4 years of vulnerability management platform or security infrastructure experience. Demonstrated platform administration skills. Bachelor's degree in Computer Science, IT, or related field, OR 4-6 years of vulnerability management platform engineering experience. Demonstrated track record of successful platform implementations. Bachelor's or Master's degree in relevant field, OR 6-10 years of vulnerability management platform engineering experience. Demonstrated team leadership and strategic impact. Advanced degree often expected, OR 10+ years of elite vulnerability platform engineering with demonstrated industry impact. Recognition is essential. Advanced degree often present, but recognition is primary qualification. 12+ years of elite experience with transformational platform impact. Recognition is primary qualification. 15+ years with transformational impact. May be pioneers of major scanning platforms or techniques.
Certifications
  • CompTIA Security+
  • Vendor scanner administrator certifications
  • CompTIA Network+
  • Cloud fundamentals certifications
  • Advanced vendor scanner certifications
  • Cloud security certifications
  • Scripting and automation certifications
  • GIAC certifications relevant to infrastructure
  • Advanced vendor platform certifications
  • Cloud architect certifications
  • Programming and automation certifications
  • CISSP or equivalent for credibility
  • Multiple advanced platform certifications
  • Enterprise architecture certifications
  • Industry recognition may substitute
  • Leadership training
  • Certifications secondary to demonstrated expertise
  • May be certification developers
  • Known for platform innovations
  • Certifications irrelevant at this level
  • Known by technical contributions
  • Platform innovations may be named after them
  • Certifications irrelevant
  • Known by technical legacy
  • May have platforms or techniques named after them
Salary: US Gov't $60,000 - $80,000 (GS-9 to GS-11) $75,000 - $100,000 (GS-11 to GS-12) $95,000 - $125,000 (GS-12 to GS-13) $120,000 - $155,000 (GS-14 to GS-15) $150,000 - $185,000 (GS-15 / SES equivalent) $170,000 - $210,000 (Senior SES equivalent) $185,000 - $230,000+ (Senior SES / Technical fellow equivalent)
Salary: US Startup $70,000 - $90,000 $85,000 - $115,000 $115,000 - $155,000 $150,000 - $200,000 + equity $185,000 - $255,000 + significant equity $225,000 - $310,000 + major equity $275,000 - $400,000+ + founder-level equity
Salary: US Corporate $65,000 - $85,000 $80,000 - $110,000 $105,000 - $145,000 $140,000 - $185,000 $175,000 - $230,000 $205,000 - $280,000 $250,000 - $350,000+
Salary: Big Tech (Mag7) $120,000 - $190,000 $170,000 - $280,000 $250,000 - $400,000 $350,000 - $550,000 $500,000 - $800,000 $700,000 - $1,200,000 $1,000,000 - $2,500,000+
↑ Back to navigation

Application Security (AppSec / Product Security)

Secure software development, security testing, threat modeling, and developer enablement

AppSec Engineer

Technical professionals who secure applications throughout the software development lifecycle. Focus on code review, security testing, DevSecOps integration, and developer enablement. Combine defensive expertise (secure coding guidance, SAST/DAST tooling) with offensive skills (manual testing, proof-of-concept development) to identify and help remediate application vulnerabilities. Prioritize enablement over gatekeeping, helping developers build secure code rather than just finding problems.

NICE Framework: SP-DEV-002 Secure Software Assessor strong NICE focuses on assessment; Security Titles also includes SDLC integration and developer enablement.
Attribute Eng 1 / Entry Eng 2 / Junior Eng 3 / Mid Eng 4 / Senior / Lead Eng 5 / Staff Eng 6 / Senior Staff Eng 7 / Principal
General Description Entry-level AppSec engineer learning application security fundamentals and secure development practices. Assists with security assessments, tool operation, and developer support. Develops foundational understanding of common vulnerabilities, secure coding principles, and application security testing methodologies. Junior AppSec engineer capable of independently conducting security assessments and supporting development teams. Demonstrates proficiency with security testing tools and can identify vulnerabilities through both automated and manual techniques. Can use Burp Suite or ZAP to validate findings and demonstrate basic proof-of-concepts to developers. Experienced AppSec engineer who independently conducts comprehensive application security assessments and drives secure development practices. Expert in both automated tooling and manual testing techniques, able to develop sophisticated proof-of-concepts that clearly demonstrate risk. Leads threat modeling sessions, mentors junior engineers, and builds relationships with development teams as a trusted security partner. Senior AppSec engineer and team leader who defines application security strategy and leads high-impact initiatives. Expert in sophisticated attack techniques, able to identify and demonstrate complex vulnerability chains. Champions the enablement philosophy, building programs that scale security through developer education and tooling rather than creating bottlenecks. Represents AppSec to executive stakeholders. Distinguished AppSec engineer who shapes organizational and industry approaches to application security. Recognized externally as thought leader in secure development, application testing, or DevSecOps. Drives innovation in assessment methodologies, tooling, and developer enablement programs. Elite AppSec engineer with industry-defining influence in application security and secure development. Operates at the intersection of deep technical expertise and organizational strategy. Shapes not only practice direction but industry approaches to building secure software. Legendary practitioner at the pinnacle of application security expertise. Globally recognized authority who defines how the industry approaches secure software development, application testing, and DevSecOps. Combines unparalleled technical expertise with strategic vision.
Primary Responsibilities
  • Assist with SAST/DAST tool operation and triage
  • Learn to identify common vulnerabilities (OWASP Top 10)
  • Support code review activities under guidance
  • Document security findings and remediation guidance
  • Assist developers with basic security questions
  • Maintain security testing documentation
  • Learn secure coding practices for common languages
  • Shadow senior engineers on threat modeling sessions
  • Conduct security code reviews with guidance
  • Operate and tune SAST/DAST/SCA tools
  • Validate findings using Burp Suite or ZAP Proxy
  • Develop basic proof-of-concept exploits for validation
  • Provide remediation guidance to developers
  • Support threat modeling activities
  • Triage and prioritize security findings
  • Contribute to secure coding guidelines
  • Assist with security champion program activities
  • Lead application security assessments end-to-end
  • Conduct advanced manual penetration testing of applications
  • Develop proof-of-concept exploits demonstrating business impact
  • Lead threat modeling sessions with development teams
  • Design and implement DevSecOps pipeline integrations
  • Mentor junior AppSec engineers
  • Build secure coding guidelines and training content
  • Develop and tune security scanning policies
  • Support security champion program development
  • Evaluate and pilot new security testing tools
  • Define AppSec program strategy and roadmap
  • Lead security assessments of critical applications
  • Develop advanced exploitation techniques and methodologies
  • Build and scale security champion programs
  • Design enterprise DevSecOps architecture
  • Mentor and develop AppSec engineering team
  • Present application risk to executive leadership
  • Drive adoption of secure development practices
  • Evaluate and select security testing platforms
  • Support M&A application security due diligence
  • Contribute to thought leadership (blogs, talks, tools)
  • Define multi-year AppSec strategy and vision
  • Lead industry-impacting research and methodology development
  • Build strategic relationships with development leadership
  • Develop next-generation security testing capabilities
  • Represent organization at highest industry levels
  • Guide organizational investments in AppSec capabilities
  • Shape industry standards and practices
  • Advise executive leadership on application risk strategy
  • Set multi-year vision for enterprise application security
  • Lead transformational methodology development
  • Build strategic alliances with vendors and platform providers
  • Influence industry standards and frameworks
  • Develop next-generation secure development approaches
  • Guide organizational strategy alongside executive leadership
  • Represent organization as premier thought leader
  • Define industry direction for application security
  • Lead transformational multi-year initiatives
  • Serve as ultimate strategic authority
  • Shape secure development standards and practices globally
  • Build generational capabilities and methodologies
  • Guide organizational transformation
  • Represent organization at highest levels globally
Required Skills
  • Understanding of common web vulnerabilities (OWASP Top 10)
  • Basic programming in at least one language (Python, Java, JavaScript, etc.)
  • Familiarity with SAST/DAST concepts
  • Understanding of HTTP, REST APIs, and web architecture
  • Basic knowledge of authentication and authorization
  • Documentation and communication skills
  • Willingness to learn both offensive and defensive techniques
  • Proficiency with SAST tools (Checkmarx, SonarQube, Semgrep)
  • Proficiency with DAST tools (Burp Suite, ZAP, Invicti)
  • Manual web application testing techniques
  • Code review for security in 1-2 languages
  • Understanding of secure coding practices
  • API security testing fundamentals
  • Basic threat modeling participation
  • Developer communication and empathy
  • Expert-level web application penetration testing
  • Advanced Burp Suite/ZAP techniques and extensions
  • Code review expertise in multiple languages
  • Threat modeling methodologies (STRIDE, PASTA, etc.)
  • DevSecOps and CI/CD security integration
  • API security testing (REST, GraphQL, gRPC)
  • Strong programming skills for tool development
  • Executive-ready vulnerability communication
  • Mastery of application security testing
  • Advanced exploitation and vulnerability chaining
  • Strategic program development and leadership
  • Executive communication and influence
  • Team leadership and development
  • Vendor evaluation and management
  • DevSecOps strategy and architecture
  • Security metrics and risk communication
  • World-class application security expertise
  • Strategic practice leadership
  • Executive presence and influence
  • Industry-wide recognition and relationships
  • Innovation and methodology development
  • Cross-functional leadership
  • Elite application security and development expertise
  • Transformational leadership
  • Executive and board-level communication
  • Industry-shaping influence and relationships
  • Business strategy and risk quantification
  • Innovation leadership
  • Globally recognized expertise
  • Transformational strategic vision
  • Executive and government-level influence
  • Industry-defining thought leadership
  • Strategic business development
Preferred Skills
  • Exposure to Burp Suite or ZAP Proxy
  • CTF or web hacking challenge experience
  • Basic understanding of CI/CD pipelines
  • Familiarity with cloud platforms
  • Bug bounty participation
  • SCA tools (Snyk, Dependabot, Black Duck)
  • CI/CD security integration
  • Container security basics
  • Mobile application security fundamentals
  • Scripting for security automation
  • Mobile application security testing
  • Cloud-native application security
  • Custom security tool development
  • Security research and CVE discovery
  • Conference speaking or published research
  • Published security research or CVEs
  • Conference speaking experience
  • Open-source security tool development
  • Bug bounty program management
  • Security product development experience
  • Published security research or frameworks
  • OWASP project leadership
  • Advisory roles with vendors or industry bodies
  • Bug bounty platform advisory
  • Major OWASP project founder or leader
  • Vendor advisory roles
  • Published books on application security
  • Academic appointments
  • Founded significant security frameworks or tools
  • Government or regulatory advisory
  • Major industry awards
  • Academic distinguished appointments
Mentorship Requirements Receives direct mentorship from Senior AppSec engineers. Shadows on security assessments and code reviews. Expected to complete secure coding training and tool certifications within first 6 months. Learns the enablement-focused philosophy of helping developers. Receives guidance from Senior engineers on complex assessments. Expected to begin mentoring Entry-level engineers informally. Contributes to documentation and training materials. Should be developing expertise in specific languages or vulnerability classes. Primary mentor for Junior and Entry engineers. Leads training on assessment methodologies and tools. Expected to develop team procedures and best practices. Establishes reputation as expert in specific application types or vulnerability classes. Primary mentor for Mid and Junior engineers. Responsible for team career development. Creates assessment methodology training programs. Industry mentorship through community engagement. Shapes AppSec engineering practices. Mentors Senior engineers and emerging leaders. Shapes organizational AppSec talent strategy. Industry-level mentorship through community engagement. Develops thought leaders in the space. Develops organizational leadership pipeline. Mentors future industry leaders. Legacy-building through lasting contributions to the field. Develops organizational and industry leadership. Mentors future industry leaders. Legacy-building through generational impact. May fund or sponsor research initiatives.
Impact Scope Individual contributor on assigned triage and documentation tasks. Impact limited to supporting assessment activities. Work is reviewed before developer communication. Supports overall application security coverage. Directly contributes to application security outcomes. Responsible for accurate finding validation and prioritization. Remediation guidance impacts developer productivity. Beginning to influence security practices. Shapes application security practices for assigned products or teams. Assessment quality directly impacts product security. Threat models influence architectural decisions. Developer enablement improves security culture. Defines AppSec capabilities and strategic direction. Program effectiveness directly impacts product security posture. Team development impacts security organization maturity. Executive relationships enable security investment. Industry and organizational transformation. Shapes how application security is practiced. Multi-year strategic outcomes. Influences industry standards and vendor roadmaps. Industry-defining impact. Organizational competitive differentiation through secure software practices. Multi-year strategic transformation. Shapes how application security is understood and practiced. Global industry impact. Defines how application security is practiced. Organizational transformation. Lasting contributions to secure software development.
Autonomy & Decision Authority Works under close supervision. Follows established assessment procedures and triage guidelines. Limited authority to disposition findings independently. Escalates vulnerability questions to senior engineers. Works with moderate supervision. Can make routine triage decisions. Authority to validate and close false positives. Escalates complex vulnerabilities and architectural concerns. Works independently with strategic guidance. Makes significant assessment and prioritization decisions. Authority over tool configuration and scanning policies. Consulted on security architecture and tool selection. High autonomy with strategic alignment. Makes significant program and investment decisions. Authority over AppSec processes and standards. Trusted to represent program to executives and externally. Near-complete autonomy over domain. Strategic influence on organizational direction. Shapes investment and capability priorities. Makes decisions with significant organizational impact. Full autonomy over strategic domain. Executive-level decision authority. May have significant budget authority. Shapes organizational direction. Complete strategic autonomy. Executive-level authority. Shapes organizational strategy. May have significant influence over industry direction.
Communication & Stakeholders Primarily internal communication with AppSec team. May assist with documenting remediation guidance. Limited direct interaction with development teams initially. Regular interaction with development teams. Presents findings and remediation guidance. Participates in security review meetings. Documents findings for developer consumption. Regular communication with development leadership. Presents to technical and management audiences. Primary AppSec contact for assigned development teams. Builds relationships with engineering managers. Executive-level communication on application risk. Represents AppSec to organizational leadership. Industry conference presentations. Builds relationships with peers at other organizations. C-suite engagement on application risk strategy. Industry-wide influence through publications and speaking. Vendor and standards body relationships. Media and analyst engagement. Peer engagement with executives and CISOs. Industry-defining thought leadership. Media and public presence. Board-level engagement. Global presence. Government and international engagement. Media thought leadership. Premier industry venues.
Degree / Experience Bachelor's degree in Computer Science, Software Engineering, Cybersecurity, or related field, OR 1-2 years of software development or security experience, OR completion of application security training program. Bachelor's degree in Computer Science, Software Engineering, or related field, OR 2-4 years of application security or software development experience. Demonstrated ability to find and validate vulnerabilities. Bachelor's degree in Computer Science, Software Engineering, or related field, OR 4-6 years of application security experience. Demonstrated track record of comprehensive security assessments. May have Master's degree with less experience. Bachelor's or Master's degree in relevant field, OR 6-10 years of application security experience. Demonstrated program leadership and strategic impact. Industry recognition through research or speaking. Advanced degree often expected, OR 10+ years of elite application security experience with demonstrated industry impact. Recognition is essential qualification. Advanced degree often present, but industry recognition is primary qualification. 12+ years of elite experience with transformational impact. Recognition is primary qualification. 15+ years with transformational impact. May be pioneers of major application security methodologies or tools.
Certifications
  • CompTIA Security+
  • GIAC Web Application Defender (GWEB)
  • Certified Secure Software Lifecycle Professional (CSSLP) - in progress
  • eWPT (eLearnSecurity Web Penetration Tester)
  • GIAC Web Application Penetration Tester (GWAPT)
  • eWPT or eWPTX
  • OSCP (helpful for offensive validation)
  • CSSLP
  • GWAPT, GWEB
  • OSWE (Offensive Security Web Expert)
  • CSSLP
  • Cloud security certifications
  • OSWE, OSCP
  • GWAPT, GWEB
  • CISSP or CSSLP
  • Industry recognition may substitute
  • Certifications secondary to demonstrated expertise
  • May be certification or framework contributors
  • OWASP leadership or similar
  • Industry awards and recognition
  • Certifications irrelevant at this level
  • Known by reputation and body of work
  • May have methodologies named after them
  • Certifications irrelevant at this level
  • Known by reputation and legacy
  • May have OWASP projects or methodologies named after them
Salary: US Gov't $65,000 - $85,000 (GS-9 to GS-11) $80,000 - $105,000 (GS-11 to GS-12) $100,000 - $130,000 (GS-12 to GS-13) $120,000 - $155,000 (GS-14 to GS-15) $150,000 - $185,000 (GS-15 / SES equivalent) $170,000 - $210,000 (Senior SES equivalent) $185,000 - $230,000+ (Senior SES / Technical fellow equivalent)
Salary: US Startup $75,000 - $100,000 $95,000 - $130,000 $125,000 - $165,000 $155,000 - $205,000 + equity $190,000 - $260,000 + significant equity $230,000 - $320,000 + major equity $280,000 - $400,000+ + founder-level equity
Salary: US Corporate $70,000 - $95,000 $90,000 - $120,000 $115,000 - $155,000 $145,000 - $190,000 $180,000 - $240,000 $215,000 - $290,000 $260,000 - $360,000+
Salary: Big Tech (Mag7) $120,000 - $190,000 $170,000 - $280,000 $250,000 - $400,000 $350,000 - $550,000 $500,000 - $800,000 $700,000 - $1,200,000 $1,000,000 - $2,500,000+
↑ Back to navigation

AppSec Architect

Strategic technical leaders who design secure application architectures, develop security standards, and build frameworks for secure software development. Focus on threat modeling, secure design patterns, SSDLC program development, and enterprise-wide application security strategy. Enable development organizations to build security into applications from design through deployment.

NICE Framework: SP-DEV-001 Software Developer SP-ARC-002 Security Architect partial NICE has no dedicated AppSec architecture role. Closest is a combination of secure development and general security architecture.
Attribute Architect 1 / Entry Architect 2 / Junior Architect 3 / Mid Architect 4 / Senior / Lead Architect 5 / Staff Architect 6 / Senior Staff Architect 7 / Principal
General Description Entry-level AppSec architect learning secure design principles and application security architecture. Assists with threat modeling, security design reviews, and documentation. Develops foundational understanding of secure architecture patterns, SSDLC frameworks, and application security standards. Junior AppSec architect capable of contributing to secure design work and conducting threat modeling with guidance. Demonstrates proficiency in security architecture patterns and can participate in design reviews. Understands the importance of enabling secure development without creating friction. Experienced AppSec architect who independently leads secure design initiatives and threat modeling programs. Expert in security architecture patterns across multiple technology stacks. Develops security standards and frameworks that enable developers to build secure applications efficiently. Mentors junior architects and shapes organizational security design practices. Senior AppSec architect who sets direction for enterprise application security architecture. Leads complex, high-impact architecture initiatives and serves as the escalation point for difficult design challenges. Drives security architecture strategy and builds frameworks that scale secure development across the organization. Distinguished AppSec architect who defines organizational application security architecture vision and strategy. Recognized externally as industry expert in secure design, threat modeling, or SSDLC frameworks. Shapes how secure software architecture is practiced and drives innovation in security-by-design approaches. Elite AppSec architect with industry-defining influence in application security architecture and secure design. Operates at the intersection of deep architectural expertise and organizational strategy. Shapes not only practice direction but industry approaches to building secure software at scale. Legendary practitioner at the pinnacle of application security architecture expertise. Globally recognized authority who defines how the industry approaches secure software design, SSDLC, and security-by-design. Combines unparalleled architectural depth with strategic vision and transformational leadership.
Primary Responsibilities
  • Assist with threat modeling documentation
  • Learn secure design patterns and anti-patterns
  • Support security design review activities
  • Document security architecture decisions
  • Research secure development frameworks
  • Assist with security standards documentation
  • Learn application security architecture concepts
  • Shadow senior architects on design reviews
  • Conduct threat modeling sessions with support
  • Contribute to security architecture designs
  • Perform security design reviews
  • Develop secure design patterns and templates
  • Create security architecture documentation
  • Support SSDLC framework development
  • Assess third-party and API integrations
  • Contribute to security standards development
  • Support developer education on secure design
  • Lead threat modeling programs and complex sessions
  • Design security architecture for critical applications
  • Develop enterprise secure design standards
  • Create reusable security architecture patterns
  • Build SSDLC frameworks and processes
  • Mentor junior AppSec architects
  • Evaluate and recommend security technologies
  • Lead security architecture reviews
  • Develop security champion technical training
  • Support secure by design initiatives
  • Define enterprise AppSec architecture strategy
  • Lead complex, enterprise-wide architecture initiatives
  • Develop organizational threat modeling programs
  • Build security architecture governance frameworks
  • Mentor and develop architecture team
  • Present architecture strategy to executives
  • Drive secure by design culture
  • Evaluate emerging technologies and architectures
  • Support M&A architecture due diligence
  • Build strategic relationships with development leadership
  • Contribute to industry architecture practices
  • Define application security architecture vision and strategy
  • Lead architecture innovation and research
  • Develop next-generation secure design frameworks
  • Build strategic architecture partnerships
  • Guide organizational security transformation
  • Create thought leadership content
  • Represent organization in industry forums
  • Advise executive leadership on architecture strategy
  • Shape industry architecture standards
  • Set multi-year vision for enterprise application security architecture
  • Lead transformational architecture initiatives
  • Shape industry secure design standards
  • Build strategic technology alliances
  • Influence platform and vendor security roadmaps
  • Guide organizational transformation
  • Serve as ultimate architecture authority
  • Define industry direction for application security architecture
  • Lead transformational multi-year initiatives
  • Serve as ultimate architecture authority
  • Shape secure development standards globally
  • Build lasting architecture contributions
  • Guide organizational and industry transformation
  • Represent organization at highest levels globally
  • Influence regulatory and standards bodies
Required Skills
  • Understanding of software architecture principles
  • Knowledge of common security design patterns
  • Familiarity with threat modeling concepts
  • Understanding of authentication and authorization architectures
  • Basic knowledge of cryptography applications
  • Documentation and diagramming skills
  • Software development background
  • Threat modeling methodologies (STRIDE, PASTA, etc.)
  • Secure design patterns and principles
  • Authentication and authorization architecture
  • API security design
  • Cloud security architecture fundamentals
  • Data protection and privacy architecture
  • Security standards development
  • Developer-friendly communication
  • Expert threat modeling and risk assessment
  • Advanced security architecture design
  • Cloud-native security architecture
  • Zero trust architecture implementation
  • Identity and access management architecture
  • Security standards and framework development
  • Strategic planning and roadmapping
  • Executive communication
  • Mastery of application security architecture
  • Enterprise architecture strategy
  • Team leadership and development
  • Strategic planning and governance
  • Executive communication and influence
  • Vendor and technology evaluation
  • Cross-functional collaboration
  • Change management
  • World-class application security architecture expertise
  • Strategic vision and leadership
  • Executive and board-level communication
  • Industry influence and recognition
  • Innovation and framework development
  • Cross-organizational leadership
  • Elite application security architecture expertise
  • Transformational leadership and vision
  • Executive and board-level influence
  • Industry-shaping thought leadership
  • Business strategy and technology alignment
  • Innovation leadership
  • Globally recognized architecture expertise
  • Transformational leadership and vision
  • Executive and board-level influence
  • Industry-shaping thought leadership
  • Strategic business impact
Preferred Skills
  • Experience as software developer or architect
  • Cloud architecture fundamentals
  • API design experience
  • Microservices architecture exposure
  • TOGAF or other EA framework basics
  • Microservices security patterns
  • Zero trust architecture concepts
  • Identity architecture
  • Container and Kubernetes security design
  • Regulatory compliance mapping
  • Enterprise architecture frameworks
  • Security architecture frameworks (SABSA)
  • Published architecture work
  • Regulatory and compliance architecture
  • M&A security architecture
  • Industry thought leadership
  • Published architecture frameworks
  • Board-level communication
  • Architecture practice development
  • Standards body participation
  • Published architecture frameworks
  • OWASP architecture project leadership
  • Standards body participation
  • Advisory board roles
  • Academic affiliations
  • Major framework or methodology creator
  • Vendor advisory roles
  • Published books on secure architecture
  • Academic appointments
  • Founded architecture frameworks or methodologies
  • Government or regulatory advisory
  • Major industry awards
  • Academic distinguished appointments
Mentorship Requirements Receives direct mentorship from Senior AppSec architects. Shadows on threat modeling and design reviews. Expected to complete secure architecture training. Learns to balance security with developer experience. Receives guidance from Senior architects on complex designs. Expected to begin mentoring Entry-level team members. Contributes to architecture standards and patterns. Should be developing expertise in specific architecture domains. Primary mentor for Junior and Entry architects. Leads architecture training and knowledge sharing. Expected to develop architecture patterns and standards. Establishes reputation as expert in specific architecture domains. Primary mentor for Mid and Junior architects. Responsible for architecture team development. Creates architecture career paths and programs. Industry mentorship through community engagement. Mentors Senior architects and emerging leaders. Shapes architecture career paths organization-wide. Industry-level mentorship through community engagement. Develops architecture thought leaders. Develops organizational architecture leadership pipeline. Mentors future industry leaders. Legacy-building through lasting contributions to the field. Develops organizational and industry architecture leadership pipeline. Mentors future industry leaders. Legacy-building through generational impact. May sponsor architecture education initiatives.
Impact Scope Individual contributor on documentation and research. Impact limited to supporting architecture deliverables. Work is reviewed by senior architects. Contributes to architecture team effectiveness. Directly contributes to secure design quality. Responsible for specific architecture components. Design decisions impact application security posture. Beginning to influence architecture standards. Shapes security architecture for major applications and platforms. Standards and patterns improve organizational security posture. Influences technology strategy and investment. Developer enablement improves security culture. Defines application security architecture for organization. Strategic decisions impact long-term security posture. Team development impacts organizational maturity. Architecture standards enable secure development at scale. Organizational and industry-level impact. Defines how application security architecture is practiced. Shapes organizational security transformation. Influences industry standards and practices. Industry-defining architecture impact. Organizational competitive differentiation through secure design practices. Multi-year strategic transformation. Shapes how secure software is designed. Global industry architecture impact. Defines how secure software is designed. Organizational transformation and long-term success. Creates lasting contributions to the profession.
Autonomy & Decision Authority Works under close supervision. Follows established architecture standards and templates. Limited authority to make design decisions independently. Escalates architecture questions to senior team. Works with moderate supervision. Can make design decisions within defined scope. Authority to approve standard patterns. Escalates novel or high-risk design decisions. Works independently with strategic guidance. Makes significant architecture and design decisions. Authority over security standards and patterns. Consulted on major technology and security decisions. High autonomy with strategic alignment. Makes significant architecture and strategy decisions. Authority over architecture standards and governance. Trusted to represent organization on architecture matters. Near-complete architecture autonomy. Strategic decision-making authority. Influences organizational direction. Authority over architecture vision. Trusted advisor to executive leadership. Full autonomy over architecture strategic domain. Executive-level decision authority. May have significant investment authority. Shapes organizational direction. Complete autonomy over architecture domain. Executive-level decision authority. Shapes organizational and industry direction. May have significant influence over standards and regulations.
Communication & Stakeholders Primarily internal communication with architecture team. Documents findings and research. Participates in design review meetings as observer. Limited stakeholder interaction outside immediate team. Regular interaction with development teams and architects. Presents design recommendations. Participates in architecture review boards. Documents designs for developer consumption. Regular communication with development and security leadership. Presents to executive stakeholders. Engages with enterprise architecture. Documents standards for organization. Executive-level communication on architecture strategy. Presents to steering committees and governance boards. Represents architecture to organizational leadership. Builds relationships with industry peers. C-suite and board-level engagement. Industry-wide influence through publications. Standards body and industry forum participation. Media and analyst engagement. Peer engagement with executives and CTOs. Industry-defining thought leadership. Media and public presence. Board-level engagement. Global industry presence. Regulatory and government engagement. Media thought leadership. Premier industry and academic venues.
Degree / Experience Bachelor's degree in Computer Science, Software Engineering, or related field, OR 3-4 years of software development experience with security exposure. Understanding of application architecture concepts. Bachelor's degree in Computer Science, Software Engineering, or related field, OR 4-6 years of software architecture or application security experience. Demonstrated ability to contribute to secure designs. Bachelor's degree in relevant field with strong experience, OR Master's degree with moderate experience, OR 6-8 years of application security architecture experience. Demonstrated track record of successful architecture initiatives. Master's degree preferred, OR Bachelor's with 8-12 years of application security architecture experience. Demonstrated strategic impact and team leadership. Industry recognition through publications or speaking. Master's degree or higher often expected, OR 12+ years of application security architecture experience with demonstrated industry impact. Industry recognition is essential qualification. Advanced degree often present, but industry recognition is primary qualification. 14+ years of elite experience with transformational impact. Advanced degree often present, but industry recognition is primary qualification. 15+ years of elite experience with transformational impact. May be founders of major secure design frameworks or methodologies.
Certifications
  • CSSLP
  • GWEB
  • Cloud architecture certifications
  • TOGAF Foundation
  • CSSLP
  • GWEB
  • Cloud security architecture certifications
  • SABSA Foundation
  • CSSLP
  • SABSA Chartered Architect
  • CISSP-ISSAP
  • Cloud architect certifications
  • CISSP-ISSAP
  • SABSA Chartered Master
  • Industry recognition may substitute
  • Enterprise architecture certifications
  • Multiple advanced architecture certifications
  • Industry recognition supersedes certifications
  • Published frameworks or methods
  • Standards body participation
  • Certifications irrelevant at this level
  • Known by reputation and body of work
  • May have frameworks named after them
  • Certifications irrelevant at this level
  • Known by reputation and body of work
  • May have frameworks or methods named after them
  • Industry hall of fame recognition
Salary: US Gov't $85,000 - $110,000 (GS-11 to GS-12) $100,000 - $130,000 (GS-12 to GS-13) $120,000 - $155,000 (GS-13 to GS-14) $145,000 - $180,000 (GS-14 to GS-15) $170,000 - $215,000 (GS-15 / SES equivalent) $190,000 - $240,000 (Senior SES equivalent) $210,000 - $270,000+ (Senior SES equivalent)
Salary: US Startup $100,000 - $135,000 $120,000 - $160,000 $150,000 - $200,000 $185,000 - $250,000 + equity $220,000 - $300,000 + significant equity $270,000 - $370,000 + major equity $320,000 - $450,000+ + major equity
Salary: US Corporate $95,000 - $125,000 $115,000 - $150,000 $140,000 - $185,000 $175,000 - $230,000 $210,000 - $280,000 $250,000 - $340,000 $300,000 - $400,000+
Salary: Big Tech (Mag7) $120,000 - $190,000 $170,000 - $280,000 $250,000 - $400,000 $350,000 - $550,000 $500,000 - $800,000 $700,000 - $1,200,000 $1,000,000 - $2,500,000+
↑ Back to navigation

Cloud Security (CloudSec)

Multi-cloud security architecture, IAM, DevSecOps, and enabling secure cloud adoption

Cloud Security Engineer

Technical professionals who implement, configure, and maintain security controls in cloud environments. Focus on IAM, network security, CSPM/CWPP tooling, container and Kubernetes security, and infrastructure as code security. Combine deep platform expertise with automation skills to secure cloud workloads at scale. Prioritize enablement over blocking, helping organizations adopt cloud securely rather than slowing them down.

NICE Framework: PR-INF-001 Cyber Defense Infrastructure Support Specialist tenuous NICE predates cloud-native security as a standalone discipline. PR-INF-001 is the closest general infrastructure role.
Attribute Eng 1 / Entry Eng 2 / Junior Eng 3 / Mid Eng 4 / Senior / Lead Eng 5 / Staff Eng 6 / Senior Staff Eng 7 / Principal
General Description Entry-level cloud security engineer learning cloud security fundamentals and platform-specific controls. Assists with security configurations, policy implementation, and monitoring. Develops foundational understanding of shared responsibility, IAM, network security, and cloud-native security services in one major cloud platform. Junior cloud security engineer capable of independently implementing security controls and managing cloud security tooling. Demonstrates proficiency in one major cloud platform with developing knowledge of another. Can configure IAM policies, network security, and operate CSPM/CWPP tools effectively. Experienced cloud security engineer who independently designs and implements comprehensive cloud security solutions. Deep expertise in primary platform with working knowledge of another. Expert in IAM, network security, container security, and security automation. Leads cloud security initiatives, mentors junior engineers, and partners with DevOps teams to enable secure cloud adoption. Senior cloud security engineer and team leader who defines cloud security strategy and leads high-impact initiatives. Multi-cloud expertise with deep knowledge across platforms. Champions automation-first approaches and builds security programs that enable rather than block cloud adoption. Represents cloud security to executive stakeholders and drives organizational cloud security maturity. Distinguished cloud security engineer who shapes organizational and industry approaches to cloud security. Recognized externally as thought leader in cloud-native security, multi-cloud architecture, or DevSecOps. Drives innovation in cloud security automation, tooling, and enabling secure cloud adoption at enterprise scale. Elite cloud security engineer with industry-defining influence in cloud security and DevSecOps. Operates at the intersection of deep technical expertise and organizational strategy. Shapes not only practice direction but industry approaches to securing cloud infrastructure at scale. Legendary practitioner at the pinnacle of cloud security expertise. Globally recognized authority who defines how the industry approaches cloud security, DevSecOps, and securing cloud-native infrastructure. Combines unparalleled technical expertise with strategic vision.
Primary Responsibilities
  • Assist with cloud security configurations and policies
  • Learn IAM fundamentals and access management
  • Support security group and network policy management
  • Monitor cloud security alerts and findings
  • Document cloud security configurations
  • Assist with CSPM tool operation and triage
  • Learn infrastructure as code security basics
  • Shadow senior engineers on security implementations
  • Implement IAM policies and access controls
  • Configure cloud network security (security groups, NACLs, firewalls)
  • Operate and tune CSPM tools (Prisma Cloud, Wiz, etc.)
  • Develop security baselines and hardening guides
  • Review and remediate cloud security findings
  • Support container and Kubernetes security basics
  • Implement infrastructure as code security scanning
  • Assist with cloud security incident response
  • Contribute to security automation development
  • Design and implement cloud security architectures
  • Develop advanced IAM strategies and policies
  • Lead container and Kubernetes security implementations
  • Build cloud security automation and pipelines
  • Implement cloud-native security services
  • Mentor junior cloud security engineers
  • Lead cloud security assessments and reviews
  • Develop security guardrails for cloud platforms
  • Partner with DevOps on secure pipeline development
  • Evaluate and implement CSPM/CWPP solutions
  • Define cloud security engineering strategy and roadmap
  • Lead multi-cloud security architecture implementations
  • Build enterprise cloud security automation frameworks
  • Develop cloud security guardrails and landing zones
  • Mentor and develop cloud security engineering team
  • Present cloud security posture to executives
  • Drive adoption of cloud-native security services
  • Evaluate and select cloud security platforms
  • Lead cloud security incident response for major events
  • Support M&A cloud security due diligence
  • Contribute to thought leadership (blogs, talks, tools)
  • Define multi-year cloud security strategy and vision
  • Lead industry-impacting research and tool development
  • Build strategic relationships with cloud providers
  • Develop next-generation cloud security capabilities
  • Represent organization at highest industry levels
  • Guide organizational investments in cloud security
  • Shape industry standards and practices
  • Advise executive leadership on cloud risk strategy
  • Set multi-year vision for enterprise cloud security
  • Lead transformational methodology development
  • Build strategic alliances with CSPs and vendors
  • Influence industry standards and frameworks
  • Develop next-generation cloud security approaches
  • Guide organizational strategy alongside executive leadership
  • Represent organization as premier thought leader
  • Define industry direction for cloud security
  • Lead transformational multi-year initiatives
  • Serve as ultimate strategic authority
  • Shape CSP security roadmaps and standards
  • Build generational capabilities and methodologies
  • Guide organizational transformation
  • Represent organization at highest levels globally
Required Skills
  • Understanding of one major cloud platform (AWS, Azure, or GCP)
  • Basic knowledge of cloud IAM concepts
  • Familiarity with cloud networking (VPCs, security groups)
  • Understanding of shared responsibility model
  • Basic scripting ability (Python, Bash)
  • Familiarity with infrastructure as code concepts
  • Documentation and communication skills
  • Proficiency in one major cloud platform security
  • IAM policy development and least privilege
  • Cloud network security configuration
  • CSPM/CWPP tool operation and triage
  • Infrastructure as code (Terraform, CloudFormation)
  • Scripting for automation (Python, Go)
  • Container security fundamentals
  • Understanding of cloud logging and monitoring
  • Expert-level security in primary cloud platform
  • Working knowledge of second cloud platform
  • Advanced IAM and identity federation
  • Kubernetes security and service mesh
  • Security automation and GitOps
  • Infrastructure as code security at scale
  • Cloud security architecture patterns
  • Strong programming skills for tooling
  • Multi-cloud security expertise (AWS, Azure, GCP)
  • Enterprise cloud security architecture
  • Strategic program development and leadership
  • Executive communication and influence
  • Team leadership and development
  • Vendor evaluation and management
  • Cloud security automation at scale
  • Identity architecture and zero trust
  • World-class cloud security expertise
  • Strategic practice leadership
  • Executive presence and influence
  • Industry-wide recognition and relationships
  • Innovation and capability development
  • Cross-functional leadership
  • Elite cloud security and DevSecOps expertise
  • Transformational leadership
  • Executive and board-level communication
  • Industry-shaping influence and relationships
  • Business strategy and risk quantification
  • Innovation leadership
  • Globally recognized expertise
  • Transformational strategic vision
  • Executive and government-level influence
  • Industry-defining thought leadership
  • Strategic business development
Preferred Skills
  • Cloud platform certification (Associate level)
  • Exposure to Terraform or CloudFormation
  • Container basics (Docker)
  • Linux system administration
  • Basic understanding of CI/CD pipelines
  • Working knowledge of second cloud platform
  • Kubernetes security basics
  • CI/CD pipeline security
  • Secrets management tools
  • Cloud-native security services
  • Multi-cloud security experience
  • Serverless security
  • Cloud security tool development
  • Zero trust implementation in cloud
  • Published cloud security research
  • Published cloud security research or tools
  • Conference speaking experience
  • Open-source cloud security contributions
  • Cloud security product development
  • Startup or consulting experience
  • Published cloud security research or frameworks
  • CSP advisory or partnership roles
  • Major open-source cloud security tools
  • Industry working group participation
  • Major framework or tool creator
  • CSP advisory board participation
  • Published books on cloud security
  • Academic appointments
  • Founded significant cloud security tools or companies
  • Government or regulatory advisory
  • Major industry awards
  • Academic distinguished appointments
Mentorship Requirements Receives direct mentorship from Senior cloud security engineers. Shadows on security implementations and reviews. Expected to achieve cloud platform certification within first 6 months. Learns enablement-focused philosophy of accelerating secure cloud adoption. Receives guidance from Senior engineers on complex implementations. Expected to begin mentoring Entry-level engineers informally. Contributes to documentation and procedures. Should be developing deep expertise in primary platform. Primary mentor for Junior and Entry engineers. Leads training on cloud security practices. Expected to develop team procedures and automation. Establishes reputation as expert in specific cloud security domains. Primary mentor for Mid and Junior engineers. Responsible for team career development. Creates cloud security training programs. Industry mentorship through community engagement. Shapes cloud security engineering practices. Mentors Senior engineers and emerging leaders. Shapes organizational cloud security talent strategy. Industry-level mentorship through community engagement. Develops thought leaders in the space. Develops organizational leadership pipeline. Mentors future industry leaders. Legacy-building through lasting contributions to the field. Develops organizational and industry leadership. Mentors future industry leaders. Legacy-building through generational impact. May fund or sponsor research initiatives.
Impact Scope Individual contributor on assigned configuration tasks. Impact limited to supporting security operations. Work is reviewed before implementation. Supports overall cloud security coverage. Directly implements security controls protecting cloud workloads. Responsible for configuration accuracy and policy effectiveness. Beginning to influence cloud security practices. Shapes cloud security practices for organization. Security implementations directly impact cloud posture. Automation improves team efficiency. Enables secure cloud adoption at scale. Defines cloud security capabilities and strategic direction. Program effectiveness directly impacts organizational cloud posture. Team development impacts security maturity. Executive relationships enable security investment. Industry and organizational transformation. Shapes how cloud security is practiced. Multi-year strategic outcomes. Influences CSP security roadmaps. Industry-defining impact. Organizational competitive differentiation through cloud security capabilities. Multi-year strategic transformation. Shapes how cloud security is practiced. Global industry impact. Defines how cloud security is practiced. Organizational transformation. Lasting contributions to securing cloud infrastructure.
Autonomy & Decision Authority Works under close supervision. Follows established procedures and security baselines. Limited authority to make configuration changes independently. Escalates security decisions to senior engineers. Works with moderate supervision. Can make routine security configuration decisions. Authority to implement approved baselines. Escalates architectural changes and exceptions. Works independently with strategic guidance. Makes significant security design decisions. Authority over security tooling and automation. Consulted on cloud security architecture decisions. High autonomy with strategic alignment. Makes significant program and investment decisions. Authority over cloud security standards and tooling. Trusted to represent organization externally. Near-complete autonomy over domain. Strategic influence on organizational direction. Shapes investment and capability priorities. Makes decisions with significant organizational impact. Full autonomy over strategic domain. Executive-level decision authority. May have significant budget authority. Shapes organizational direction. Complete strategic autonomy. Executive-level authority. Shapes organizational strategy. May have significant influence over industry direction.
Communication & Stakeholders Primarily internal communication with cloud security team. Documents configurations and procedures. Limited direct interaction with cloud platform teams initially. Regular interaction with cloud platform and DevOps teams. Participates in security reviews. Documents findings and recommendations for stakeholders. Regular communication with cloud platform and security leadership. Presents to technical and management audiences. Primary cloud security contact for assigned platforms or projects. Executive-level communication on cloud security. Represents cloud security to organizational leadership. Industry conference presentations. Builds relationships with CSP security teams. C-suite engagement on cloud risk strategy. Industry-wide influence through publications and speaking. CSP executive relationships. Media and analyst engagement. Peer engagement with executives and CISOs. Industry-defining thought leadership. Media and public presence. Board-level engagement. Global presence. Government and international engagement. Media thought leadership. Premier industry venues.
Degree / Experience Bachelor's degree in Computer Science, IT, Cybersecurity, or related field, OR 1-2 years of cloud operations or IT experience, OR completion of cloud security training program. Bachelor's degree in relevant field, OR 2-4 years of cloud security or cloud engineering experience. Demonstrated ability to implement cloud security controls. Bachelor's degree in relevant field, OR 4-6 years of cloud security experience. Demonstrated track record of complex cloud security implementations. May have Master's degree with less experience. Bachelor's or Master's degree in relevant field, OR 6-10 years of cloud security experience. Demonstrated program leadership and strategic impact. Industry recognition through research or speaking. Advanced degree often expected, OR 10+ years of elite cloud security experience with demonstrated industry impact. Recognition is essential qualification. Advanced degree often present, but industry recognition is primary qualification. 12+ years of elite experience with transformational impact. Recognition is primary qualification. 15+ years with transformational impact. May be pioneers of major cloud security tools or methodologies.
Certifications
  • AWS Solutions Architect Associate or equivalent
  • CompTIA Security+
  • CompTIA Cloud+
  • AZ-900 / AWS Cloud Practitioner
  • AWS Security Specialty or equivalent
  • CKS (Certified Kubernetes Security Specialist)
  • Platform-specific security certifications
  • HashiCorp Terraform Associate
  • AWS Security Specialty + another platform cert
  • CKS
  • CCSP
  • Advanced platform certifications
  • Multiple cloud security specialty certifications
  • CCSP
  • CISSP
  • Industry recognition may substitute
  • Certifications secondary to demonstrated expertise
  • May be certification or framework contributors
  • Industry awards and recognition
  • Published research and tools
  • Certifications irrelevant at this level
  • Known by reputation and body of work
  • May have tools or methodologies named after them
  • Certifications irrelevant at this level
  • Known by reputation and legacy
  • May have tools or frameworks named after them
Salary: US Gov't $65,000 - $85,000 (GS-9 to GS-11) $80,000 - $110,000 (GS-11 to GS-12) $105,000 - $140,000 (GS-12 to GS-13) $130,000 - $165,000 (GS-14 to GS-15) $155,000 - $195,000 (GS-15 / SES equivalent) $175,000 - $220,000 (Senior SES equivalent) $195,000 - $250,000+ (Senior SES / Technical fellow equivalent)
Salary: US Startup $80,000 - $105,000 $100,000 - $140,000 $135,000 - $180,000 $170,000 - $225,000 + equity $210,000 - $285,000 + significant equity $250,000 - $340,000 + major equity $300,000 - $420,000+ + founder-level equity
Salary: US Corporate $75,000 - $100,000 $95,000 - $130,000 $125,000 - $165,000 $160,000 - $210,000 $195,000 - $260,000 $235,000 - $310,000 $280,000 - $380,000+
Salary: Big Tech (Mag7) $125,000 - $200,000 $180,000 - $295,000 $260,000 - $420,000 $370,000 - $580,000 $525,000 - $840,000 $735,000 - $1,260,000 $1,050,000 - $2,625,000+
↑ Back to navigation

Cloud Security Architect

Strategic technical leaders who design cloud security architectures, develop security frameworks, and build strategies for securing cloud infrastructure at enterprise scale. Focus on landing zone design, multi-cloud strategy, zero trust architecture, and enabling secure cloud adoption. Partner with enterprise architecture and cloud platform teams to embed security into cloud foundations.

NICE Framework: SP-ARC-002 Security Architect partial NICE's general architecture role has no cloud specificity. Cloud security architecture is not addressed.
Attribute Architect 1 / Entry Architect 2 / Junior Architect 3 / Mid Architect 4 / Senior / Lead Architect 5 / Staff Architect 6 / Senior Staff Architect 7 / Principal
General Description Entry-level cloud security architect learning cloud security architecture principles and framework development. Assists with security design reviews, documentation, and reference architecture development. Develops foundational understanding of cloud security patterns, shared responsibility implementation, and enterprise cloud strategy. Junior cloud security architect capable of contributing to security design work and conducting architecture reviews with guidance. Demonstrates proficiency in cloud security patterns and can participate in landing zone and security framework development. Understands the importance of enabling secure cloud adoption. Experienced cloud security architect who independently leads cloud security design initiatives and develops enterprise security frameworks. Expert in multi-cloud security patterns with deep knowledge of landing zones, identity architecture, and zero trust implementation. Mentors junior architects and shapes organizational cloud security architecture practices. Senior cloud security architect who sets direction for enterprise cloud security architecture. Leads complex, high-impact architecture initiatives across multi-cloud environments. Drives cloud security strategy and builds frameworks that enable secure cloud adoption at enterprise scale. Represents cloud security architecture to executive stakeholders. Distinguished cloud security architect who defines organizational cloud security architecture vision and strategy. Recognized externally as industry expert in cloud security architecture, multi-cloud strategy, or zero trust. Shapes how cloud security architecture is practiced and drives innovation in securing cloud infrastructure at scale. Elite cloud security architect with industry-defining influence in cloud security architecture and strategy. Operates at the intersection of deep architectural expertise and organizational strategy. Shapes not only practice direction but industry approaches to securing cloud infrastructure at enterprise scale. Legendary practitioner at the pinnacle of cloud security architecture expertise. Globally recognized authority who defines how the industry approaches cloud security architecture, multi-cloud strategy, and securing cloud-native infrastructure. Combines unparalleled architectural depth with strategic vision and transformational leadership.
Primary Responsibilities
  • Assist with cloud security architecture documentation
  • Learn cloud security design patterns and anti-patterns
  • Support security design review activities
  • Research cloud security frameworks and standards
  • Document security architecture decisions
  • Assist with landing zone security documentation
  • Learn multi-cloud security concepts
  • Shadow senior architects on design reviews
  • Contribute to cloud security architecture designs
  • Conduct security architecture reviews
  • Develop cloud security reference architectures
  • Support landing zone security design
  • Create security architecture documentation
  • Assess cloud security tool architectures
  • Support multi-cloud security strategy development
  • Contribute to cloud security standards
  • Participate in enterprise architecture reviews
  • Lead cloud security architecture design initiatives
  • Design enterprise landing zone security
  • Develop multi-cloud security frameworks
  • Create cloud security reference architectures
  • Build zero trust architecture for cloud
  • Mentor junior cloud security architects
  • Lead cloud security architecture reviews
  • Develop cloud security standards and patterns
  • Support cloud security transformation initiatives
  • Evaluate cloud security platform architectures
  • Define enterprise cloud security architecture strategy
  • Lead complex, multi-cloud architecture initiatives
  • Develop organizational cloud security frameworks
  • Build cloud security architecture governance
  • Mentor and develop architecture team
  • Present architecture strategy to executives
  • Drive cloud security transformation programs
  • Evaluate emerging cloud technologies and architectures
  • Support M&A cloud architecture due diligence
  • Build strategic relationships with CSPs
  • Contribute to industry architecture practices
  • Define cloud security architecture vision and strategy
  • Lead architecture innovation and research
  • Develop next-generation cloud security frameworks
  • Build strategic CSP architecture partnerships
  • Guide organizational cloud transformation
  • Create thought leadership content
  • Represent organization in industry forums
  • Advise executive leadership on cloud architecture strategy
  • Shape industry architecture standards
  • Set multi-year vision for enterprise cloud security architecture
  • Lead transformational architecture initiatives
  • Shape industry cloud security standards
  • Build strategic CSP and technology alliances
  • Influence CSP security roadmaps
  • Guide organizational transformation
  • Serve as ultimate architecture authority
  • Define industry direction for cloud security architecture
  • Lead transformational multi-year initiatives
  • Serve as ultimate architecture authority
  • Shape CSP security strategies globally
  • Build lasting architecture contributions
  • Guide organizational and industry transformation
  • Represent organization at highest levels globally
  • Influence regulatory and standards bodies
Required Skills
  • Understanding of cloud architecture principles
  • Knowledge of cloud security design patterns
  • Familiarity with shared responsibility model
  • Basic understanding of IAM architecture
  • Cloud networking concepts
  • Documentation and diagramming skills
  • Understanding of one major cloud platform
  • Cloud security architecture patterns
  • Landing zone and account strategy design
  • IAM architecture and identity federation
  • Cloud network security architecture
  • Security framework development
  • Multi-cloud concepts
  • Zero trust principles in cloud
  • Architecture documentation and communication
  • Expert cloud security architecture design
  • Multi-cloud security strategy
  • Landing zone and account architecture
  • Zero trust architecture implementation
  • Identity and access management architecture
  • Cloud security framework development
  • Strategic planning and roadmapping
  • Executive communication
  • Mastery of cloud security architecture
  • Enterprise architecture strategy
  • Team leadership and development
  • Strategic planning and governance
  • Executive communication and influence
  • CSP relationship management
  • Cross-functional collaboration
  • Change management
  • World-class cloud security architecture expertise
  • Strategic vision and leadership
  • Executive and board-level communication
  • Industry influence and recognition
  • Innovation and framework development
  • Cross-organizational leadership
  • Elite cloud security architecture expertise
  • Transformational leadership and vision
  • Executive and board-level influence
  • Industry-shaping thought leadership
  • Business strategy and technology alignment
  • Innovation leadership
  • Globally recognized architecture expertise
  • Transformational leadership and vision
  • Executive and board-level influence
  • Industry-shaping thought leadership
  • Strategic business impact
Preferred Skills
  • Cloud platform certification
  • Enterprise architecture exposure
  • Infrastructure as code experience
  • TOGAF or cloud framework basics
  • Prior cloud engineering experience
  • Working knowledge of multiple clouds
  • Container and Kubernetes architecture
  • Data security architecture
  • Compliance architecture mapping
  • Enterprise architecture frameworks
  • Enterprise architecture frameworks
  • Cloud security architecture frameworks
  • Published architecture work
  • Regulatory compliance architecture
  • M&A cloud security architecture
  • Industry thought leadership
  • Published architecture frameworks
  • Board-level communication
  • CSP advisory participation
  • Standards body participation
  • Published architecture frameworks
  • CSP advisory board participation
  • Standards body leadership
  • Advisory board roles
  • Academic affiliations
  • Major framework or methodology creator
  • CSP advisory board leadership
  • Published books on cloud security
  • Academic appointments
  • Founded architecture frameworks or methodologies
  • Government or regulatory advisory
  • Major industry awards
  • Academic distinguished appointments
Mentorship Requirements Receives direct mentorship from Senior cloud security architects. Shadows on architecture reviews and design sessions. Expected to complete cloud architecture training. Learns to balance security with cloud adoption enablement. Receives guidance from Senior architects on complex designs. Expected to begin mentoring Entry-level team members. Contributes to architecture standards and patterns. Should be developing expertise in specific cloud security domains. Primary mentor for Junior and Entry architects. Leads architecture training and knowledge sharing. Expected to develop architecture patterns and standards. Establishes reputation as expert in specific cloud security domains. Primary mentor for Mid and Junior architects. Responsible for architecture team development. Creates architecture career paths and programs. Industry mentorship through community engagement. Mentors Senior architects and emerging leaders. Shapes architecture career paths organization-wide. Industry-level mentorship through community engagement. Develops architecture thought leaders. Develops organizational architecture leadership pipeline. Mentors future industry leaders. Legacy-building through lasting contributions to the field. Develops organizational and industry architecture leadership pipeline. Mentors future industry leaders. Legacy-building through generational impact. May sponsor architecture education initiatives.
Impact Scope Individual contributor on documentation and research. Impact limited to supporting architecture deliverables. Work is reviewed by senior architects. Contributes to architecture team effectiveness. Directly contributes to security design quality. Responsible for specific architecture components. Design decisions impact cloud security posture. Beginning to influence architecture standards. Shapes cloud security architecture for major initiatives. Standards and patterns improve organizational cloud security posture. Influences technology strategy and investment. Enables secure cloud adoption at scale. Defines cloud security architecture for organization. Strategic decisions impact long-term cloud security posture. Team development impacts organizational maturity. Architecture standards enable secure cloud at scale. Organizational and industry-level impact. Defines how cloud security architecture is practiced. Shapes organizational cloud transformation. Influences industry standards and CSP roadmaps. Industry-defining architecture impact. Organizational competitive differentiation through cloud security architecture. Multi-year strategic transformation. Shapes how cloud security is designed. Global industry architecture impact. Defines how cloud security is designed. Organizational transformation and long-term success. Creates lasting contributions to the profession.
Autonomy & Decision Authority Works under close supervision. Follows established architecture standards and templates. Limited authority to make design decisions independently. Escalates architecture questions to senior team. Works with moderate supervision. Can make design decisions within defined scope. Authority to approve standard patterns. Escalates novel or high-risk design decisions. Works independently with strategic guidance. Makes significant architecture and design decisions. Authority over cloud security standards and patterns. Consulted on major technology and cloud security decisions. High autonomy with strategic alignment. Makes significant architecture and strategy decisions. Authority over architecture standards and governance. Trusted to represent organization on architecture matters. Near-complete architecture autonomy. Strategic decision-making authority. Influences organizational direction. Authority over architecture vision. Trusted advisor to executive leadership. Full autonomy over architecture strategic domain. Executive-level decision authority. May have significant investment authority. Shapes organizational direction. Complete autonomy over architecture domain. Executive-level decision authority. Shapes organizational and industry direction. May have significant influence over standards and CSP roadmaps.
Communication & Stakeholders Primarily internal communication with architecture team. Documents findings and research. Participates in design review meetings as observer. Limited stakeholder interaction outside immediate team. Regular interaction with cloud platform and enterprise architecture teams. Presents design recommendations. Participates in architecture review boards. Documents designs for stakeholder consumption. Regular communication with cloud platform and security leadership. Presents to executive stakeholders. Engages with enterprise architecture. Documents standards for organization. Executive-level communication on architecture strategy. Presents to steering committees and governance boards. Represents architecture to organizational leadership. Builds relationships with CSP architecture teams. C-suite and board-level engagement. Industry-wide influence through publications. Standards body and industry forum participation. Media and analyst engagement. Peer engagement with executives and CTOs. Industry-defining thought leadership. Media and public presence. Board-level engagement. Global industry presence. Regulatory and government engagement. Media thought leadership. Premier industry and academic venues.
Degree / Experience Bachelor's degree in Computer Science, IT, or related field, OR 3-4 years of cloud engineering or architecture experience with security exposure. Understanding of cloud architecture concepts. Bachelor's degree in relevant field, OR 4-6 years of cloud architecture or security experience. Demonstrated ability to contribute to cloud security designs. Bachelor's degree with strong experience, OR Master's degree with moderate experience, OR 6-8 years of cloud security architecture experience. Demonstrated track record of successful architecture initiatives. Master's degree preferred, OR Bachelor's with 8-12 years of cloud security architecture experience. Demonstrated strategic impact and team leadership. Industry recognition through publications or speaking. Master's degree or higher often expected, OR 12+ years of cloud security architecture experience with demonstrated industry impact. Industry recognition is essential qualification. Advanced degree often present, but industry recognition is primary qualification. 14+ years of elite experience with transformational impact. Advanced degree often present, but industry recognition is primary qualification. 15+ years of elite experience with transformational impact. May be founders of major cloud security frameworks or methodologies.
Certifications
  • AWS Solutions Architect Professional or equivalent
  • CCSP (in progress acceptable)
  • Cloud platform security certifications
  • TOGAF Foundation
  • CCSP
  • Multiple cloud platform certifications
  • SABSA Foundation
  • TOGAF Certified
  • CCSP
  • CISSP-ISSAP
  • Multiple cloud platform professional certs
  • SABSA Chartered Architect
  • CCSP, CISSP-ISSAP
  • SABSA Chartered Master
  • Industry recognition may substitute
  • Enterprise architecture certifications
  • Multiple advanced architecture certifications
  • Industry recognition supersedes certifications
  • Published frameworks or methods
  • Standards body participation
  • Certifications irrelevant at this level
  • Known by reputation and body of work
  • May have frameworks named after them
  • Certifications irrelevant at this level
  • Known by reputation and body of work
  • May have frameworks or methods named after them
  • Industry hall of fame recognition
Salary: US Gov't $90,000 - $115,000 (GS-11 to GS-12) $110,000 - $140,000 (GS-12 to GS-13) $130,000 - $165,000 (GS-13 to GS-14) $155,000 - $195,000 (GS-14 to GS-15) $180,000 - $230,000 (GS-15 / SES equivalent) $205,000 - $260,000 (Senior SES equivalent) $230,000 - $300,000+ (Senior SES equivalent)
Salary: US Startup $110,000 - $145,000 $135,000 - $175,000 $165,000 - $220,000 $200,000 - $270,000 + equity $245,000 - $330,000 + significant equity $295,000 - $400,000 + major equity $350,000 - $480,000+ + major equity
Salary: US Corporate $105,000 - $135,000 $125,000 - $165,000 $155,000 - $200,000 $190,000 - $250,000 $230,000 - $300,000 $275,000 - $360,000 $320,000 - $430,000+
Salary: Big Tech (Mag7) $125,000 - $200,000 $180,000 - $295,000 $260,000 - $420,000 $370,000 - $580,000 $525,000 - $840,000 $735,000 - $1,260,000 $1,050,000 - $2,625,000+
↑ Back to navigation

Digital Forensics

Evidence acquisition, artifact analysis, incident response forensics, and legal proceedings support

Forensic Analyst

Technical professionals who conduct digital forensic examinations to support incident response, insider threat investigations, HR matters, and legal proceedings. Focus on evidence acquisition, artifact analysis, timeline reconstruction, and producing court-ready documentation. Maintain strict chain of custody and apply scientific methodology to ensure defensible, reproducible findings. Corporate forensics teams are typically small, requiring practitioners to be versatile across disk, memory, mobile, and cloud forensics as they advance.

NICE Framework: IN-FOR-002 Cyber Defense Forensics Analyst direct
Attribute Analyst 1 / Entry Analyst 2 / Junior Analyst 3 / Mid Analyst 4 / Senior / Lead Analyst 5 / Staff Analyst 6 / Senior Staff Analyst 7 / Principal
General Description Entry-level forensic analyst learning digital forensics fundamentals and evidence handling procedures. Assists with evidence acquisition, basic analysis, and documentation under direct supervision. Develops foundational understanding of file systems, forensic artifacts, chain of custody requirements, and forensic tool operation. Focuses primarily on Windows disk forensics with exposure to other platforms. Junior forensic analyst capable of independently conducting routine forensic examinations with guidance on complex matters. Demonstrates proficiency in Windows forensics and developing skills in memory analysis. Can perform complete acquisitions, analyze common artifacts, and produce examination reports. Begins exposure to macOS and Linux forensics. Experienced forensic analyst who independently conducts complex forensic examinations across multiple platforms. Expert in Windows forensics with strong capabilities in memory analysis, macOS, and developing Linux skills. Leads forensic support for major incidents and produces reports suitable for legal proceedings. May provide testimony in depositions or HR hearings. Begins developing mobile forensics capabilities. Senior forensic analyst and team leader who defines forensic capabilities and leads high-profile investigations. Expert across disk, memory, mobile, and cloud forensics. Handles the most sensitive investigations including executive matters, major breaches, and cases with significant legal exposure. Provides expert testimony in legal proceedings. Represents forensics to executive stakeholders and external parties. Distinguished forensic analyst who shapes organizational and industry forensic practices. Recognized externally as thought leader in digital forensics, incident response forensics, or emerging forensic domains. Handles investigations with existential organizational risk. Drives innovation in forensic methodology and tooling. Elite forensic practitioner with industry-defining influence in digital forensics. Operates at the intersection of deep forensic expertise and organizational strategy. Shapes not only practice direction but industry approaches to digital investigations, evidence handling, and forensic methodology. Legendary practitioner at the pinnacle of digital forensics expertise. Globally recognized authority who defines how the industry approaches digital investigations, evidence handling, and forensic science. Combines unparalleled technical expertise with strategic vision. May have pioneered forensic methodologies or tools used industry-wide.
Primary Responsibilities
  • Assist with forensic evidence acquisition and imaging
  • Learn proper chain of custody procedures
  • Perform basic file system analysis under guidance
  • Document forensic activities and findings
  • Maintain forensic workstation and tool updates
  • Learn Windows artifact analysis fundamentals
  • Assist with evidence storage and management
  • Shadow senior analysts on examinations
  • Support basic data recovery tasks
  • Conduct forensic acquisitions independently
  • Perform Windows artifact analysis and timeline reconstruction
  • Analyze memory captures for malware and artifacts
  • Write forensic examination reports
  • Support incident response with forensic analysis
  • Maintain chain of custody documentation
  • Perform basic malware triage
  • Assist with HR and policy violation investigations
  • Learn macOS and Linux forensic fundamentals
  • Support eDiscovery collections when required
  • Lead complex forensic examinations end-to-end
  • Conduct advanced memory and malware analysis
  • Perform cross-platform forensics (Windows, macOS, Linux)
  • Develop mobile device forensics capabilities
  • Write reports for legal and executive audiences
  • Provide forensic support for major incident response
  • Mentor junior forensic analysts
  • Develop and refine forensic procedures
  • Coordinate with legal counsel on litigation holds
  • Support law enforcement coordination when required
  • Provide deposition or hearing testimony
  • Lead high-profile and sensitive investigations
  • Define forensic program strategy and capabilities
  • Conduct expert-level analysis across all platforms
  • Provide expert witness testimony in legal proceedings
  • Mentor and develop forensic analyst team
  • Coordinate with law enforcement on criminal matters
  • Lead forensic aspects of major incident response
  • Manage relationships with external forensic vendors
  • Present forensic findings to executives and board
  • Develop forensic lab capabilities and architecture
  • Support M&A due diligence forensic assessments
  • Manage eDiscovery coordination for litigation
  • Define multi-year forensic strategy and vision
  • Lead industry-impacting research and methodology development
  • Handle investigations with critical organizational impact
  • Build strategic relationships with law enforcement and regulators
  • Develop next-generation forensic capabilities
  • Represent organization at highest industry levels
  • Guide organizational investments in forensic capabilities
  • Shape industry forensic standards and practices
  • Advise executive leadership on investigative matters
  • Set multi-year vision for enterprise forensic capabilities
  • Lead transformational methodology development
  • Build strategic alliances with law enforcement and industry
  • Influence industry standards and legal frameworks
  • Develop next-generation investigative approaches
  • Guide organizational strategy alongside executive leadership
  • Represent organization as premier forensic authority
  • Advise on matters of national or industry significance
  • Define industry direction for digital forensics
  • Lead transformational multi-year initiatives
  • Serve as ultimate forensic authority
  • Shape legal and regulatory frameworks for digital evidence
  • Build generational capabilities and methodologies
  • Guide organizational transformation
  • Represent organization at highest levels globally
  • Advise government and law enforcement at highest levels
Required Skills
  • Understanding of Windows file systems (NTFS, FAT)
  • Basic knowledge of forensic imaging concepts
  • Familiarity with forensic tools (EnCase, FTK, Autopsy)
  • Understanding of chain of custody requirements
  • Basic Windows artifact knowledge (Registry, Event Logs)
  • Documentation and report writing skills
  • Attention to detail and methodical approach
  • Proficiency in Windows forensic analysis
  • Memory forensics fundamentals (Volatility)
  • Timeline analysis and reconstruction
  • Forensic report writing for technical audiences
  • Understanding of anti-forensics techniques
  • Basic malware triage and identification
  • Multiple forensic tool proficiency
  • Evidence handling and court requirements
  • Expert Windows forensic analysis
  • Advanced memory forensics and malware analysis
  • macOS forensic proficiency
  • Linux forensics fundamentals
  • Mobile forensics basics (iOS, Android)
  • Legal-ready report writing
  • Testimony and deposition preparation
  • Advanced timeline and artifact correlation
  • Mastery of cross-platform forensics
  • Mobile forensics expertise (iOS, Android)
  • Cloud forensics proficiency (M365, Google, AWS, Azure)
  • Expert witness testimony experience
  • Strategic program development
  • Executive communication and influence
  • Team leadership and development
  • Legal and regulatory coordination
  • Law enforcement liaison experience
  • World-class forensic expertise across all platforms
  • Strategic practice leadership
  • Executive presence and influence
  • Industry-wide recognition and relationships
  • Innovation and methodology development
  • Cross-functional leadership
  • Expert testimony at highest levels
  • Elite forensic expertise across all domains
  • Transformational leadership
  • Executive and board-level communication
  • Industry-shaping influence and relationships
  • Legal and regulatory expertise
  • Innovation leadership
  • Globally recognized forensic expertise
  • Transformational strategic vision
  • Executive and government-level influence
  • Industry-defining thought leadership
  • Legal and policy expertise
Preferred Skills
  • Exposure to Linux file systems
  • Basic scripting ability (Python, PowerShell)
  • Understanding of disk structures and partitioning
  • Familiarity with hashing and integrity verification
  • CTF or forensics challenge experience
  • macOS forensics basics
  • Linux forensics basics
  • Network forensics exposure
  • Scripting for forensic automation
  • eDiscovery tool familiarity
  • Cloud forensics fundamentals (M365, AWS)
  • Network forensics and packet analysis
  • Custom forensic tool development
  • eDiscovery platform proficiency
  • Malware reverse engineering basics
  • Published forensic research or tools
  • Malware reverse engineering
  • Forensic lab design and architecture
  • eDiscovery program management
  • Conference speaking experience
  • Published forensic research or frameworks
  • Forensic tool or methodology development
  • Law enforcement advisory relationships
  • Academic affiliations or teaching
  • Industry working group participation
  • Major methodology or tool creator
  • Government or law enforcement advisory
  • Published books on digital forensics
  • Academic appointments
  • Founded significant forensic tools or methodologies
  • Government advisory at national level
  • Major industry awards
  • Academic distinguished appointments
Mentorship Requirements Receives direct mentorship from Senior forensic analysts. Shadows on all examinations initially. Expected to complete forensic tool training and achieve foundational certification within first year. Learns the critical importance of evidence integrity and defensible processes. Receives guidance from Senior analysts on complex cases. Expected to begin assisting Entry-level analysts. Contributes to procedure documentation. Should be developing expertise in specific artifact types or investigation categories. Primary mentor for Junior and Entry analysts. Leads training on examination techniques. Expected to develop team procedures and playbooks. Establishes reputation as expert in specific forensic domains or investigation types. Primary mentor for Mid and Junior analysts. Responsible for team career development. Creates forensic training programs and certification paths. Industry mentorship through community engagement. Shapes organizational forensic practices. Mentors Senior analysts and emerging leaders. Shapes organizational forensic talent strategy. Industry-level mentorship through community engagement. Develops thought leaders in the forensics space. Develops organizational leadership pipeline. Mentors future industry leaders. Legacy-building through lasting contributions to the field of digital forensics. Develops organizational and industry leadership. Mentors future industry leaders. Legacy-building through generational impact on digital forensics. May fund or sponsor forensic research.
Impact Scope Individual contributor on assigned acquisition and documentation tasks. Impact limited to supporting examination activities. All findings reviewed before inclusion in reports. Supports overall forensic team capacity. Directly contributes to investigation outcomes. Responsible for accurate analysis and documentation. Reports may be used in HR actions or legal proceedings. Beginning to influence forensic procedures. Shapes forensic practices for the organization. Complex examination findings directly impact legal outcomes and incident response. Procedural improvements enhance team capabilities. May influence security detection through forensic insights. Defines forensic capabilities and strategic direction. Investigation outcomes directly impact organizational risk and legal exposure. Team development impacts security maturity. Expert testimony can determine case outcomes. Industry and organizational transformation. Shapes how digital forensics is practiced. Multi-year strategic outcomes. Influences forensic tool development and standards. Industry-defining impact. Organizational competitive differentiation through forensic capabilities. Multi-year strategic transformation. Shapes how digital forensics is practiced globally. Global industry impact. Defines how digital forensics is practiced worldwide. Shapes legal frameworks for digital evidence. Creates lasting contributions to investigative science.
Autonomy & Decision Authority Works under close supervision. Follows established forensic procedures strictly. No authority to make independent evidentiary decisions. Escalates all findings and anomalies to senior analysts. Works with moderate supervision. Can make routine analytical decisions. Authority to conduct standard examinations independently. Escalates complex findings, legal matters, and scope decisions. Works independently with strategic guidance. Makes significant analytical and procedural decisions. Authority over examination methodology. Consulted on case strategy and legal coordination. High autonomy with strategic alignment. Makes significant program and investigation decisions. Authority over forensic standards and procedures. Trusted to handle the most sensitive matters independently. Near-complete autonomy over domain. Strategic influence on organizational direction. Shapes investment and capability priorities. Makes decisions with significant organizational and legal impact. Full autonomy over strategic domain. Executive-level decision authority. May have significant budget authority. Shapes organizational direction on investigative matters. Complete strategic autonomy. Executive-level authority. Shapes organizational strategy. Significant influence over industry direction and legal standards.
Communication & Stakeholders Primarily internal communication with forensic team. Documents activities in case management systems. Limited direct interaction with IR team or legal initially. May assist with evidence handoffs. Regular interaction with IR team and security operations. Presents findings to technical audiences. Coordinates with HR on employee investigations. May interact with legal counsel on case requirements. Regular communication with legal, HR, and security leadership. Presents findings to executive stakeholders. Primary forensic contact for IR team. Coordinates with external counsel on litigation matters. May interface with law enforcement. Executive-level communication on investigations and capabilities. Represents forensics to legal leadership and external counsel. Coordinates with law enforcement agencies. May present to board on significant matters. C-suite engagement on investigative strategy. Industry-wide influence through publications and speaking. Law enforcement and regulatory relationships. Media engagement on forensic matters. Peer engagement with executives and general counsel. Industry-defining thought leadership. Media and public presence on forensic matters. Government and regulatory engagement. Global presence. Government and international engagement. Media thought leadership. Premier industry and legal venues. Congressional or parliamentary testimony.
Degree / Experience Bachelor's degree in Computer Science, Digital Forensics, Criminal Justice, or related field, OR 1-2 years of IT experience with forensics exposure, OR completion of digital forensics training program. Bachelor's degree in relevant field, OR 2-4 years of digital forensics or IT security experience. Demonstrated ability to conduct forensic examinations and produce quality reports. Bachelor's degree in relevant field, OR 4-6 years of digital forensics experience. Demonstrated track record of complex examinations and legal proceedings support. May have Master's degree with less experience. Bachelor's or Master's degree in relevant field, OR 6-10 years of digital forensics experience. Demonstrated program leadership and expert testimony experience. Industry recognition through research or speaking. Advanced degree often expected, OR 10+ years of elite forensic experience with demonstrated industry impact. Recognition is essential qualification. Advanced degree often present, but industry recognition is primary qualification. 12+ years of elite experience with transformational impact. Recognition is primary qualification. 15+ years with transformational impact. May be pioneers of foundational forensic methodologies or tools.
Certifications
  • CompTIA Security+
  • GIAC Certified Forensic Examiner (GCFE)
  • EnCase Certified Examiner (EnCE) - in progress
  • AccessData Certified Examiner (ACE)
  • GCFE or GCFA
  • EnCE
  • CFCE (Certified Forensic Computer Examiner)
  • GIAC Certified Forensic Analyst (GCFA)
  • GCFA, GCFE
  • EnCE
  • GIAC Network Forensic Analyst (GNFA)
  • Cellebrite Certified Operator (CCO) or similar mobile cert
  • Multiple GIAC forensics certifications
  • EnCE, CCE, or equivalent
  • Mobile forensics certifications
  • Cloud platform certifications helpful
  • Certifications secondary to demonstrated expertise
  • May be certification or methodology contributors
  • Industry awards and recognition
  • Expert witness credentials
  • Certifications irrelevant at this level
  • Known by reputation and body of work
  • May have methodologies named after them
  • Certifications irrelevant at this level
  • Known by reputation and legacy
  • May have tools or methodologies named after them
Salary: US Gov't $55,000 - $75,000 (GS-7 to GS-9) $70,000 - $95,000 (GS-9 to GS-11) $90,000 - $120,000 (GS-11 to GS-13) $115,000 - $150,000 (GS-13 to GS-14) $140,000 - $175,000 (GS-15 / SES equivalent) $165,000 - $210,000 (Senior SES equivalent) $185,000 - $240,000+ (Senior SES / Technical fellow equivalent)
Salary: US Startup $65,000 - $90,000 $85,000 - $115,000 $110,000 - $150,000 $145,000 - $195,000 + equity $180,000 - $245,000 + significant equity $220,000 - $300,000 + major equity $270,000 - $380,000+ + founder-level equity
Salary: US Corporate $60,000 - $85,000 $80,000 - $110,000 $105,000 - $140,000 $135,000 - $180,000 $170,000 - $230,000 $205,000 - $275,000 $250,000 - $340,000+
Salary: Big Tech (Mag7) $110,000 - $170,000 $155,000 - $250,000 $225,000 - $360,000 $315,000 - $495,000 $450,000 - $720,000 $630,000 - $1,080,000 $900,000 - $2,250,000+
↑ Back to navigation

Cyber Threat Intelligence (CTI)

Threat actor tracking, organization-specific risk analysis, and intelligence-driven defense

CTI Analyst

Intelligence professionals who produce actionable threat intelligence tailored to their organization's specific risk landscape. Focus on threat actor tracking, campaign analysis, and intelligence products (strategic, operational, tactical) that inform security decisions. Go beyond republishing external reports by correlating internal data sources to identify organization-specific threats—understanding who the real targets are based on access, exposure, and observed targeting patterns, not just titles. Intelligence serves decisions; if it doesn't inform action, it's just information.

NICE Framework: AN-TWA-001 Threat/Warning Analyst AN-ASA-002 All-Source Analyst direct
Attribute Analyst 1 / Entry Analyst 2 / Junior Analyst 3 / Mid Analyst 4 / Senior / Lead Analyst 5 / Staff Analyst 6 / Senior Staff Analyst 7 / Principal
General Description Entry-level CTI analyst learning intelligence fundamentals and collection techniques. Assists with open-source intelligence gathering, indicator processing, and report development. Develops foundational understanding of threat actors, attack frameworks, and analytic tradecraft. Begins learning how to correlate external threats with internal organizational context. Junior CTI analyst capable of independently producing tactical intelligence products and conducting structured analysis. Demonstrates proficiency in OSINT collection and threat actor research. Begins correlating external threat data with internal telemetry to identify organization-specific risks. Can produce indicator-focused intelligence and contribute to operational reporting. Experienced CTI analyst who independently produces comprehensive intelligence assessments across strategic, operational, and tactical levels. Expert at correlating internal organizational data with external threat intelligence to identify true risk—understanding that the person with 80% of patent access who receives 30% of phishing attempts may be a higher-value target than the CEO. Leads threat actor tracking and provides intelligence that directly informs security investment and defensive priorities. Senior CTI analyst and team leader who defines intelligence strategy and leads high-impact analysis. Expert at thinking like an attacker to identify organizational risk—correlating access patterns, targeting data, business context, and threat actor capabilities to produce intelligence that truly reflects threats to the specific organization. Builds intelligence programs that go beyond external report aggregation to deliver unique, actionable organizational insight. Distinguished CTI analyst who shapes organizational and industry intelligence practices. Recognized externally as thought leader in threat intelligence, threat actor research, or specific threat domains. Produces intelligence that transforms how the organization understands and responds to threats. Drives innovation in threat correlation and organization-specific risk identification. Elite CTI practitioner with industry-defining influence in threat intelligence. Operates at the intersection of deep intelligence expertise and organizational strategy. Shapes not only practice direction but industry approaches to understanding and responding to sophisticated threats. Legendary practitioner at the pinnacle of threat intelligence expertise. Globally recognized authority who defines how the industry understands sophisticated threats, threat actors, and adversary operations. Combines unparalleled intelligence expertise with strategic vision. May have named major threat actors or developed foundational intelligence methodologies.
Primary Responsibilities
  • Conduct open-source intelligence (OSINT) collection
  • Process and validate indicators of compromise
  • Monitor threat feeds and vendor reports
  • Assist with intelligence report drafting
  • Learn MITRE ATT&CK framework mapping
  • Document threat actor profiles and TTPs
  • Support indicator enrichment activities
  • Shadow senior analysts on intelligence production
  • Learn internal systems and data sources
  • Produce tactical intelligence products independently
  • Conduct threat actor and campaign research
  • Correlate external threats with internal targeting data
  • Analyze phishing campaigns targeting the organization
  • Map threat actor TTPs to MITRE ATT&CK
  • Develop and maintain threat actor profiles
  • Support threat hunting with intelligence
  • Contribute to operational intelligence reports
  • Brief SOC and IR teams on relevant threats
  • Participate in intelligence sharing communities
  • Produce strategic, operational, and tactical intelligence
  • Lead internal threat correlation and targeting analysis
  • Identify high-value targets based on access and exposure
  • Conduct comprehensive threat actor investigations
  • Brief executive and technical stakeholders
  • Develop intelligence requirements with stakeholders
  • Mentor junior CTI analysts
  • Lead threat hunting hypothesis development
  • Build relationships with ISAC and industry peers
  • Develop collection strategies for priority intelligence
  • Assess organization-specific threat landscape
  • Define CTI program strategy and priorities
  • Lead strategic threat assessments
  • Build comprehensive internal threat correlation capabilities
  • Develop organization-specific threat models
  • Mentor and develop CTI analyst team
  • Present threat landscape to executives and board
  • Build industry intelligence sharing relationships
  • Lead intelligence support for major incidents
  • Develop intelligence requirements framework
  • Evaluate and select intelligence sources and vendors
  • Publish thought leadership and research
  • Define multi-year CTI strategy and vision
  • Lead industry-impacting threat research
  • Build strategic intelligence partnerships
  • Develop next-generation threat correlation capabilities
  • Represent organization at highest industry levels
  • Guide organizational investments in intelligence
  • Shape industry intelligence practices
  • Advise executive leadership on threat strategy
  • Lead threat attribution at highest confidence levels
  • Set multi-year vision for enterprise threat intelligence
  • Lead transformational research and methodology development
  • Build strategic alliances with government and industry
  • Influence industry standards and frameworks
  • Develop next-generation intelligence approaches
  • Guide organizational strategy alongside executive leadership
  • Represent organization as premier intelligence authority
  • Lead attribution on nation-state and advanced threats
  • Define industry direction for threat intelligence
  • Lead transformational multi-year initiatives
  • Serve as ultimate intelligence authority
  • Shape government and industry threat understanding
  • Build generational capabilities and methodologies
  • Guide organizational transformation
  • Represent organization at highest levels globally
  • Advise government at national security levels
Required Skills
  • OSINT collection techniques and tools
  • Understanding of common threat actors and motivations
  • Basic knowledge of MITRE ATT&CK framework
  • Familiarity with indicator types (hashes, IPs, domains)
  • Understanding of malware categories and attack chains
  • Documentation and writing skills
  • Analytical thinking and attention to detail
  • Tactical intelligence production
  • Threat actor research and profiling
  • Campaign analysis and tracking
  • MITRE ATT&CK mapping proficiency
  • Internal data correlation (SIEM, email security, etc.)
  • Structured analytic techniques
  • Intelligence writing for technical audiences
  • Threat intelligence platform operation
  • Multi-level intelligence production (strategic to tactical)
  • Internal data source integration and analysis
  • Advanced threat actor tracking and attribution
  • Stakeholder communication across all levels
  • Intelligence requirements development
  • Collection planning and management
  • Advanced analytic tradecraft
  • Industry threat landscape expertise
  • Intelligence program strategy and leadership
  • Advanced internal-external threat correlation
  • Threat modeling from attacker perspective
  • Executive communication and influence
  • Team leadership and development
  • Vendor and source evaluation
  • Cross-functional partnership
  • Industry relationship building
  • World-class threat intelligence expertise
  • Strategic practice leadership
  • Executive presence and influence
  • Industry-wide recognition and relationships
  • Innovation and methodology development
  • Cross-functional leadership
  • Elite threat intelligence expertise
  • Transformational leadership
  • Executive and board-level communication
  • Industry-shaping influence and relationships
  • Geopolitical and strategic analysis
  • Innovation leadership
  • Globally recognized intelligence expertise
  • Transformational strategic vision
  • Executive and government-level influence
  • Industry-defining thought leadership
  • Geopolitical and national security expertise
Preferred Skills
  • SOC or security operations background
  • Intelligence community or military intel experience
  • Foreign language proficiency
  • Scripting basics (Python)
  • Familiarity with threat intelligence platforms
  • Malware analysis basics
  • Network traffic analysis
  • Dark web monitoring
  • ISAC participation
  • Scripting for collection automation
  • IC or military all-source analysis background
  • Malware reverse engineering
  • Geopolitical analysis
  • Published threat research
  • Conference speaking
  • Published threat research or attribution work
  • IC senior analyst or leadership background
  • Conference keynotes or major presentations
  • Government or law enforcement relationships
  • Academic or training development
  • Published threat research or frameworks
  • Named threat actor attribution work
  • Government advisory relationships
  • Academic affiliations
  • Industry working group leadership
  • Named major threat actor discoveries
  • Government advisory at senior levels
  • Published books on threat intelligence
  • Academic appointments
  • Named major threat actors or campaigns
  • Government advisory at national level
  • Major industry awards
  • Academic distinguished appointments
Mentorship Requirements Receives direct mentorship from Senior CTI analysts. Shadows on intelligence production and stakeholder briefings. Expected to complete analytic tradecraft training. Learns the organization's business, assets, and threat landscape to ground intelligence in internal context. Receives guidance from Senior analysts on complex analysis. Expected to begin mentoring Entry-level analysts informally. Contributes to collection plans and procedures. Should be developing expertise in specific threat actors or industry threats. Primary mentor for Junior and Entry analysts. Leads training on analytic tradecraft and internal correlation. Expected to develop team procedures and intelligence standards. Establishes reputation as expert in specific threat actors or threat domains. Primary mentor for Mid and Junior analysts. Responsible for team career development. Creates analytic training programs. Industry mentorship through community engagement. Shapes organizational intelligence practices. Mentors Senior analysts and emerging leaders. Shapes organizational CTI talent strategy. Industry-level mentorship through community engagement. Develops thought leaders in the intelligence space. Develops organizational leadership pipeline. Mentors future industry leaders. Legacy-building through lasting contributions to the threat intelligence field. Develops organizational and industry leadership. Mentors future industry leaders. Legacy-building through generational impact on threat intelligence. May fund or sponsor research.
Impact Scope Individual contributor on collection and processing tasks. Impact limited to supporting intelligence production. Work is reviewed before dissemination. Supports overall intelligence coverage. Directly contributes to organizational threat awareness. Responsible for accurate tactical intelligence. Analysis informs detection and hunting activities. Beginning to influence security priorities based on threat landscape. Shapes organizational threat understanding. Intelligence directly informs security strategy and investment. Targeting analysis identifies organizational risk beyond obvious assumptions. Intelligence products drive defensive priorities. Defines intelligence capabilities and strategic direction. Program effectiveness directly impacts organizational threat posture. Team development impacts security maturity. Executive relationships enable threat-informed investment. Industry and organizational transformation. Shapes how threat intelligence is practiced. Multi-year strategic outcomes. Influences how threats are understood industry-wide. Industry-defining impact. Organizational competitive differentiation through intelligence capabilities. Multi-year strategic transformation. Shapes how threats are understood globally. Global industry impact. Defines how threats are understood worldwide. Shapes government and industry response to threats. Creates lasting contributions to intelligence practice.
Autonomy & Decision Authority Works under close supervision. Follows established collection and processing procedures. Limited authority to make analytic judgments independently. Escalates potential threats and findings to senior analysts. Works with moderate supervision. Can make routine analytic judgments. Authority to produce tactical intelligence products. Escalates strategic assessments and high-confidence attributions. Works independently with strategic guidance. Makes significant analytic judgments including attribution assessments. Authority over collection priorities and intelligence standards. Consulted on threat-informed defense strategy. High autonomy with strategic alignment. Makes significant program and analytic decisions. Authority over intelligence standards and priorities. Trusted to represent organization on intelligence matters. Near-complete autonomy over domain. Strategic influence on organizational direction. Shapes investment and capability priorities. Makes decisions with significant organizational impact. Full autonomy over strategic domain. Executive-level decision authority. May have significant budget authority. Shapes organizational direction on threat matters. Complete strategic autonomy. Executive-level authority. Shapes organizational strategy. Significant influence over industry and government threat understanding.
Communication & Stakeholders Primarily internal communication with CTI team. Documents collection and findings. Limited direct interaction with intelligence consumers initially. May assist with indicator sharing. Regular interaction with SOC and detection teams. Briefs technical audiences on threats. Participates in intelligence sharing. Documents analysis for internal consumption. Regular communication with security and business leadership. Briefs executives on strategic threats. Primary CTI contact for stakeholder groups. Represents organization in intelligence sharing communities. Executive-level communication on threat landscape. Board briefings on strategic threats. Represents organization in senior intelligence sharing forums. Media engagement on threat topics. C-suite engagement on threat strategy. Industry-wide influence through publications and speaking. Government and law enforcement relationships. Media engagement on major threats. Peer engagement with executives and CISOs. Industry-defining thought leadership. Government and international engagement. Media presence on major threats. Global presence. Government and international engagement. Media thought leadership. Premier intelligence and national security venues.
Degree / Experience Bachelor's degree in Intelligence Studies, International Relations, Computer Science, Cybersecurity, or related field, OR 1-2 years of SOC or security operations experience, OR military/IC intelligence background transitioning to private sector. Bachelor's degree in relevant field, OR 2-4 years of CTI, SOC, or intelligence experience. Demonstrated ability to produce finished intelligence products. Bachelor's degree in relevant field, OR 4-6 years of CTI or intelligence experience. Demonstrated track record of high-quality finished intelligence. May have Master's degree or IC background with less corporate experience. Bachelor's or Master's degree in relevant field, OR 6-10 years of CTI or intelligence experience. Demonstrated program leadership and thought leadership. IC senior analyst background highly valued. Advanced degree often expected, OR 10+ years of elite CTI or IC experience with demonstrated industry impact. Recognition is essential qualification. Advanced degree often present, but industry recognition is primary qualification. 12+ years of elite experience with transformational impact. Recognition is primary qualification. 15+ years with transformational impact. May be pioneers of threat intelligence discipline or major discoveries.
Certifications
  • CompTIA Security+
  • GIAC Cyber Threat Intelligence (GCTI)
  • SANS FOR578 (CTI course)
  • CompTIA CySA+
  • GCTI
  • GREM (helpful for malware understanding)
  • CTIA (Certified Threat Intelligence Analyst)
  • FOR578
  • GCTI
  • GREM
  • CISSP (helpful)
  • Industry recognition may substitute
  • Multiple GIAC certifications
  • Industry recognition often substitutes
  • Published research credentials
  • CISSP or similar
  • Certifications secondary to demonstrated expertise
  • Known by body of research and attribution work
  • Industry awards and recognition
  • May be methodology contributors
  • Certifications irrelevant at this level
  • Known by reputation and body of work
  • May have threat actors or methodologies associated with their name
  • Certifications irrelevant at this level
  • Known by reputation and legacy
  • May have threat actors named by their research
Salary: US Gov't $55,000 - $75,000 (GS-7 to GS-9) $70,000 - $95,000 (GS-9 to GS-11) $90,000 - $120,000 (GS-11 to GS-13) $115,000 - $150,000 (GS-13 to GS-14) $140,000 - $175,000 (GS-15 / SES equivalent) $165,000 - $210,000 (Senior SES equivalent) $185,000 - $240,000+ (Senior SES / Technical fellow equivalent)
Salary: US Startup $65,000 - $90,000 $85,000 - $115,000 $110,000 - $150,000 $145,000 - $195,000 + equity $180,000 - $245,000 + significant equity $220,000 - $300,000 + major equity $270,000 - $380,000+ + founder-level equity
Salary: US Corporate $60,000 - $85,000 $80,000 - $110,000 $105,000 - $140,000 $135,000 - $180,000 $170,000 - $230,000 $205,000 - $275,000 $250,000 - $340,000+
Salary: Big Tech (Mag7) $110,000 - $170,000 $155,000 - $250,000 $225,000 - $360,000 $315,000 - $495,000 $450,000 - $720,000 $630,000 - $1,080,000 $900,000 - $2,250,000+
↑ Back to navigation

CTI Engineer

Technical professionals who build and maintain the infrastructure that enables threat intelligence operations. Focus on TIP deployment, feed integration, enrichment automation, MITRE ATT&CK operationalization, and detection content development. Bridge the gap between raw intelligence and defensive action by building systems that correlate internal telemetry with external threats. Skills overlap significantly with Detection Engineering; some organizations combine these functions.

NICE Framework: AN-TWA-001 Threat/Warning Analyst partial NICE lacks a CTI platform/engineering role. AN-TWA-001 covers analysis but not the TIP infrastructure and automation focus.
Attribute Eng 1 / Entry Eng 2 / Junior Eng 3 / Mid Eng 4 / Senior / Lead Eng 5 / Staff Eng 6 / Senior Staff Eng 7 / Principal
General Description Entry-level CTI engineer learning intelligence platform operations and automation fundamentals. Assists with feed integration, indicator processing, and basic platform administration. Develops foundational understanding of TIPs, indicator formats, and how intelligence flows into defensive systems. Junior CTI engineer capable of independently managing feed integrations and developing basic automation. Demonstrates proficiency with TIP administration and can build enrichment workflows. Begins developing detection content from intelligence and understands the connection between intel and defensive action. Experienced CTI engineer who independently designs and implements intelligence infrastructure and automation. Expert at building systems that correlate internal organizational data with external threat intelligence. Strong detection engineering capabilities—can translate threat actor TTPs into high-fidelity detections. Mentors junior engineers and shapes platform strategy. Senior CTI engineer and team leader who defines intelligence infrastructure strategy. Expert at building systems that transform intelligence into defensive action—from automated enrichment to detection deployment to threat hunting enablement. Bridges intelligence and detection engineering to maximize defensive value of threat intelligence. Champions internal threat correlation that identifies organization-specific risk. Distinguished CTI engineer who shapes organizational and industry approaches to intelligence infrastructure and operationalization. Recognized externally for technical innovation in threat intelligence platforms, detection engineering from intel, or threat correlation systems. Drives next-generation capabilities. Elite CTI engineer with industry-defining influence in intelligence infrastructure and threat operationalization. Operates at the intersection of deep technical expertise and organizational strategy. Shapes how the industry builds and operates intelligence platforms. Legendary practitioner at the pinnacle of intelligence engineering expertise. Globally recognized authority who defines how the industry builds threat intelligence infrastructure and operationalizes intelligence for defense. May have created foundational tools or platforms used industry-wide.
Primary Responsibilities
  • Assist with threat intelligence platform administration
  • Process and normalize indicator feeds
  • Learn STIX/TAXII and indicator formats
  • Support feed integration and troubleshooting
  • Document platform configurations and procedures
  • Assist with indicator enrichment workflows
  • Learn MITRE ATT&CK framework structure
  • Shadow senior engineers on platform development
  • Monitor platform health and data quality
  • Manage threat feed integrations and normalization
  • Develop indicator enrichment automation
  • Build basic detection rules from intelligence
  • Administer threat intelligence platforms
  • Create MITRE ATT&CK mappings for threats
  • Develop intelligence sharing workflows (STIX/TAXII)
  • Build dashboards and intelligence visualizations
  • Support internal threat correlation data pipelines
  • Troubleshoot integration issues
  • Document technical procedures and architectures
  • Design intelligence platform architectures
  • Build advanced internal-external threat correlation systems
  • Develop detection content from threat intelligence
  • Create sophisticated enrichment and automation pipelines
  • Lead MITRE ATT&CK coverage mapping initiatives
  • Mentor junior CTI engineers
  • Evaluate and integrate new intelligence sources
  • Build threat hunting data pipelines
  • Develop intelligence sharing capabilities
  • Create intelligence operationalization frameworks
  • Define CTI engineering strategy and roadmap
  • Lead enterprise intelligence platform architecture
  • Build organization-specific threat correlation capabilities
  • Develop detection engineering programs from intelligence
  • Mentor and develop CTI engineering team
  • Present engineering strategy to leadership
  • Evaluate and select intelligence platforms
  • Build strategic vendor relationships
  • Lead intelligence infrastructure for major initiatives
  • Drive MITRE ATT&CK coverage maturity
  • Contribute to open-source intelligence tooling
  • Define multi-year intelligence engineering vision
  • Lead industry-impacting tool and platform development
  • Build strategic technology partnerships
  • Develop next-generation threat correlation capabilities
  • Represent organization at highest technical levels
  • Guide organizational investments in intelligence infrastructure
  • Shape industry standards and tools
  • Advise leadership on intelligence technology strategy
  • Set multi-year vision for enterprise intelligence infrastructure
  • Lead transformational platform development
  • Build strategic alliances with vendors and industry
  • Influence industry standards and frameworks
  • Develop next-generation operationalization approaches
  • Guide organizational strategy alongside leadership
  • Represent organization as premier technical authority
  • Define industry direction for intelligence engineering
  • Lead transformational multi-year initiatives
  • Serve as ultimate technical authority
  • Shape how intelligence infrastructure is built globally
  • Build generational capabilities and platforms
  • Guide organizational transformation
  • Represent organization at highest levels globally
Required Skills
  • Basic understanding of threat intelligence platforms
  • Familiarity with indicator formats (STIX, OpenIOC)
  • Basic scripting ability (Python)
  • Understanding of APIs and data integration
  • Knowledge of SIEM and security tools basics
  • Documentation skills
  • Troubleshooting and problem-solving
  • TIP administration and configuration
  • Feed integration and normalization
  • Python scripting for automation
  • STIX/TAXII implementation
  • Basic detection rule development
  • API integration development
  • MITRE ATT&CK operationalization
  • Data pipeline basics
  • Intelligence platform architecture
  • Advanced Python development
  • Detection engineering (SIEM, EDR rules)
  • Internal data correlation and analysis
  • Data pipeline engineering
  • MITRE ATT&CK coverage analysis
  • Intelligence sharing standards mastery
  • Cross-team technical leadership
  • Intelligence infrastructure strategy
  • Enterprise platform architecture
  • Detection engineering program development
  • Internal threat correlation at scale
  • Team leadership and development
  • Executive communication
  • Vendor evaluation and management
  • Cross-functional program leadership
  • World-class intelligence engineering expertise
  • Strategic technical leadership
  • Executive presence and influence
  • Industry-wide recognition
  • Innovation and platform development
  • Cross-functional technical leadership
  • Elite intelligence engineering expertise
  • Transformational technical leadership
  • Executive and board-level communication
  • Industry-shaping influence
  • Strategic technology vision
  • Innovation leadership
  • Globally recognized technical expertise
  • Transformational strategic vision
  • Executive and government-level influence
  • Industry-defining thought leadership
  • Strategic technology development
Preferred Skills
  • Experience with specific TIPs (MISP, OpenCTI, ThreatConnect)
  • SOC or detection engineering exposure
  • Database basics
  • MITRE ATT&CK familiarity
  • Network security fundamentals
  • SIEM query and detection development
  • Multiple TIP platform experience
  • Malware analysis basics
  • Cloud platform experience
  • Data engineering fundamentals
  • Data engineering and analytics platforms
  • Machine learning basics for threat detection
  • Malware analysis and reverse engineering
  • Cloud-native security tooling
  • Published tools or detection content
  • Published intelligence tools
  • Conference speaking
  • Open-source project leadership
  • Detection content frameworks
  • Data engineering at scale
  • Major open-source intelligence tool author
  • Published research or frameworks
  • Vendor advisory roles
  • Industry working group leadership
  • Founded major intelligence tools or platforms
  • Vendor advisory board leadership
  • Published books or major frameworks
  • Academic appointments
  • Founded significant intelligence platforms or tools
  • Government advisory
  • Major industry awards
  • Academic distinguished appointments
Mentorship Requirements Receives direct mentorship from Senior CTI engineers. Shadows on platform development and integration work. Expected to achieve platform certifications within first year. Learns how intelligence operationalization works. Receives guidance from Senior engineers on complex integrations. Expected to begin mentoring Entry-level engineers informally. Contributes to platform documentation. Should be developing expertise in specific platforms or detection development. Primary mentor for Junior and Entry engineers. Leads training on platform development and detection engineering. Expected to develop team standards and best practices. Establishes reputation as expert in specific platforms or detection domains. Primary mentor for Mid and Junior engineers. Responsible for team career development. Creates engineering training programs. Industry mentorship through community engagement. Shapes organizational CTI engineering practices. Mentors Senior engineers and emerging leaders. Shapes organizational CTI engineering talent strategy. Industry-level mentorship. Develops thought leaders in intelligence engineering. Develops organizational technical leadership pipeline. Mentors future industry leaders. Legacy-building through lasting contributions to intelligence engineering. Develops organizational and industry leadership. Mentors future industry leaders. Legacy-building through generational impact. May fund or sponsor tool development.
Impact Scope Individual contributor on assigned platform tasks. Impact limited to supporting engineering activities. Work is reviewed before deployment. Supports overall intelligence infrastructure. Directly contributes to intelligence platform capabilities. Responsible for reliable feed integration and data quality. Automation work improves analyst efficiency. Detection content protects the organization. Shapes intelligence platform capabilities. Detection content directly protects organization. Internal correlation systems identify organizational risk. Automation enables analyst focus on high-value work. Defines intelligence engineering capabilities. Platform decisions impact long-term intelligence effectiveness. Detection program improves organizational security posture. Team development impacts security maturity. Industry and organizational transformation. Shapes how intelligence infrastructure is built. Multi-year strategic outcomes. Influences vendor roadmaps and industry tools. Industry-defining impact. Organizational differentiation through intelligence capabilities. Multi-year strategic transformation. Shapes how intelligence systems are built globally. Global industry impact. Defines how intelligence systems are built. Organizational transformation. Creates lasting contributions to the field.
Autonomy & Decision Authority Works under close supervision. Follows established procedures for platform operations. Limited authority to make configuration changes independently. Escalates issues to senior engineers. Works with moderate supervision. Can make routine platform decisions. Authority to implement standard integrations. Escalates architectural changes and complex development. Works independently with strategic guidance. Makes significant architecture and development decisions. Authority over platform standards and detection strategies. Consulted on intelligence infrastructure investment. High autonomy with strategic alignment. Makes significant platform and investment decisions. Authority over engineering standards and detection strategies. Trusted to represent organization on technical intelligence matters. Near-complete autonomy over domain. Strategic influence on organizational direction. Shapes investment priorities. Makes decisions with significant organizational impact. Full autonomy over strategic domain. Executive-level decision authority. Significant investment authority. Shapes organizational direction. Complete strategic autonomy. Executive-level authority. Shapes organizational strategy. Significant influence over industry direction.
Communication & Stakeholders Primarily internal communication with CTI team. Documents configurations and procedures. Limited direct interaction with consumers of intelligence systems. Regular interaction with CTI analysts and SOC teams. Participates in platform planning discussions. Documents technical decisions. Coordinates with security tool teams. Regular communication with CTI and security leadership. Presents technical strategies. Primary engineering contact for intelligence platform decisions. Coordinates across security teams. Executive-level communication on intelligence infrastructure. Represents engineering in strategic planning. Builds industry relationships with vendors and peers. May speak at conferences. C-suite engagement on intelligence technology. Industry-wide influence. Vendor and standards relationships. Media engagement on technical topics. Peer engagement with executives. Industry-defining thought leadership. Media and public presence. Vendor and standards leadership. Global presence. Government and international engagement. Media thought leadership. Premier technical venues.
Degree / Experience Bachelor's degree in Computer Science, IT, Cybersecurity, or related field, OR 1-2 years of security operations or IT experience, OR SOC background with interest in automation. Bachelor's degree in relevant field, OR 2-4 years of CTI engineering, detection engineering, or security automation experience. Demonstrated ability to build integrations and automation. Bachelor's degree in relevant field, OR 4-6 years of CTI engineering, detection engineering, or security automation experience. Demonstrated track record of complex platform development. May have Master's degree with less experience. Bachelor's or Master's degree in relevant field, OR 6-10 years of CTI engineering, detection engineering, or security platform experience. Demonstrated program leadership and technical innovation. Advanced degree often expected, OR 10+ years of elite CTI engineering experience with demonstrated industry impact. Recognition is essential qualification. Advanced degree often present, but recognition is primary qualification. 12+ years of elite experience with transformational impact. Recognition is primary qualification. 15+ years with transformational impact. May be pioneers of intelligence platforms or operationalization approaches.
Certifications
  • CompTIA Security+
  • Platform-specific certifications
  • Python basics
  • GCTI (helpful)
  • Platform certifications (MISP, OpenCTI, etc.)
  • GCTI
  • Cloud certifications helpful
  • GCIA or detection-focused certs
  • GCTI, GCIA
  • Cloud architecture certifications
  • Platform expert certifications
  • Detection engineering credentials
  • Multiple advanced certifications
  • Industry recognition often substitutes
  • Platform expert status
  • Published tools or frameworks
  • Certifications secondary to demonstrated expertise
  • Known by tools and contributions
  • Industry awards and recognition
  • Certifications irrelevant at this level
  • Known by reputation and contributions
  • May have platforms named after them
  • Certifications irrelevant at this level
  • Known by reputation and legacy
  • Tools or platforms named after them
Salary: US Gov't $60,000 - $80,000 (GS-9 to GS-11) $75,000 - $100,000 (GS-11 to GS-12) $95,000 - $125,000 (GS-12 to GS-13) $120,000 - $155,000 (GS-13 to GS-14) $145,000 - $180,000 (GS-15 / SES equivalent) $170,000 - $215,000 (Senior SES equivalent) $190,000 - $250,000+ (Senior SES / Technical fellow equivalent)
Salary: US Startup $70,000 - $95,000 $90,000 - $125,000 $120,000 - $160,000 $155,000 - $205,000 + equity $190,000 - $260,000 + significant equity $235,000 - $320,000 + major equity $280,000 - $400,000+ + founder-level equity
Salary: US Corporate $65,000 - $90,000 $85,000 - $115,000 $115,000 - $150,000 $145,000 - $190,000 $180,000 - $245,000 $220,000 - $290,000 $265,000 - $360,000+
Salary: Big Tech (Mag7) $110,000 - $170,000 $155,000 - $250,000 $225,000 - $360,000 $315,000 - $495,000 $450,000 - $720,000 $630,000 - $1,080,000 $900,000 - $2,250,000+
↑ Back to navigation

Cyber Fraud

Fraud detection, investigation, prevention, and fraud platform engineering across financial crime and account security

Fraud Analyst

Professionals who detect, investigate, and prevent cyber-enabled fraud including account takeover, payment fraud, business email compromise, identity theft, and transaction manipulation. Focus on fraud pattern detection, investigation, loss prevention, and working with law enforcement on criminal referrals. Operate at the intersection of cybersecurity, financial crime, and customer protection — balancing friction reduction with loss mitigation. Corporate fraud teams range from small bank operations units to massive trust-and-safety organizations at fintechs and payment processors.

NICE Framework: IN-FOR-001 Cyber Crime Investigator partial NICE's Cyber Crime Investigator is law-enforcement-flavored. Commercial fraud roles focus on detection, prevention, and loss reduction rather than criminal prosecution.
Attribute Analyst 1 / Entry Analyst 2 / Junior Analyst 3 / Mid Analyst 4 / Senior Analyst 5 / Staff Analyst 6 / Senior Staff Analyst 7 / Principal
General DescriptionEntry-level fraud analyst learning fraud detection fundamentals, alert triage, and case management procedures. Reviews flagged transactions and accounts using established fraud rules and decision trees. Develops foundational understanding of common fraud typologies, payment systems, and Know Your Customer (KYC) concepts. Works under close supervision and focuses on queue-based alert review.Junior fraud analyst capable of independently investigating routine fraud cases and identifying common attack patterns. Demonstrates proficiency with fraud detection tools and can differentiate true fraud from false positives with reasonable accuracy. Begins conducting end-to-end investigations for standard case types and contributing to rule tuning through feedback on alert quality.Experienced fraud analyst who independently handles complex, high-value, and multi-vector fraud investigations. Leads investigations into organized fraud rings, sophisticated BEC schemes, and cross-channel attacks. Produces regulatory filings and works directly with law enforcement on criminal referrals. Identifies systemic fraud trends and recommends detection improvements. Mentors junior team members on investigation methodology.Senior fraud analyst and subject matter expert who leads the most complex and sensitive fraud investigations. Serves as the primary escalation point for novel fraud schemes, high-loss events, and cross-functional fraud issues. Deep expertise in multiple fraud domains with the ability to connect disparate signals across channels and products. Drives fraud strategy improvements and partners with engineering on detection system enhancements. May lead a small team or functional area within fraud operations.Staff-level fraud analyst who operates as a force multiplier across the fraud organization. Designs investigation frameworks, defines fraud taxonomies, and builds systems (analytical, procedural, or organizational) that improve detection and response for the entire team. Bridges fraud operations with engineering, data science, and product to ensure fraud intelligence informs technical solutions. Leads cross-functional initiatives and drives measurable improvements in fraud loss rates.Senior Staff fraud analyst who shapes how the fraud function operates across the organization. Defines fraud risk appetite, establishes operating models, and drives strategic decisions on fraud prevention investment. Operates as a trusted advisor to executive leadership on fraud exposure and mitigation. Leads transformational initiatives — such as standing up new fraud operations for emerging products, redesigning fraud operating models, or leading enterprise-wide fraud technology migrations. Industry-recognized expertise in financial crime.Principal fraud analyst — an industry-defining expert whose work shapes how organizations and the broader financial ecosystem approach fraud prevention. Creates methodologies, frameworks, and strategies adopted well beyond their own organization. Advises regulators, shapes industry standards, and publishes research that advances the field. Drives innovations in fraud detection that set new benchmarks for the industry. Operates at the intersection of fraud, cybersecurity, and financial regulation with unmatched depth of expertise.
Primary Responsibilities
  • Review and disposition fraud alerts from rules engines and scoring systems
  • Verify flagged transactions against customer history and behavioral patterns
  • Escalate suspicious cases to senior analysts for further investigation
  • Document case findings in fraud case management systems
  • Process chargeback and dispute claims following standard procedures
  • Assist with account verification and identity validation checks
  • Learn payment system fundamentals (ACH, wire, card networks)
  • Maintain queue SLAs and throughput targets
  • Flag emerging patterns observed during alert review
  • Independently investigate routine fraud cases end-to-end
  • Analyze account takeover attempts and credential abuse patterns
  • Conduct link analysis to identify fraud rings and connected accounts
  • Provide feedback on rule performance and false positive rates
  • Prepare Suspicious Activity Report (SAR) narratives for review
  • Investigate chargeback and dispute claims requiring deeper analysis
  • Perform device fingerprint and session analysis for ATO detection
  • Monitor fraud queues and prioritize cases by risk and loss exposure
  • Assist with periodic fraud trend reporting
  • Support customer-facing teams with fraud-related escalations
  • Lead complex fraud investigations involving organized fraud rings
  • Investigate sophisticated BEC, payroll diversion, and vendor fraud schemes
  • Author and file Suspicious Activity Reports independently
  • Conduct deep-dive analysis of emerging fraud trends and attack vectors
  • Develop and refine fraud detection rules and scoring thresholds
  • Coordinate with law enforcement on criminal referrals and evidence packages
  • Mentor junior analysts on investigation techniques and case quality
  • Perform root cause analysis on fraud losses to identify control gaps
  • Present fraud trend analysis and loss metrics to management
  • Collaborate with product and engineering on fraud control requirements
  • Support regulatory examinations and audit inquiries related to fraud
  • Lead investigation of novel, high-loss, and executive-visibility fraud events
  • Serve as escalation point for complex cases across the fraud team
  • Drive fraud detection strategy for assigned product areas or channels
  • Partner with fraud engineering on model feature development and rule design
  • Develop investigation playbooks and standard operating procedures
  • Lead fraud loss forecasting and trend analysis for leadership
  • Manage law enforcement relationships and coordinate multi-agency cases
  • Conduct fraud risk assessments for new products and features
  • Represent fraud operations in cross-functional risk discussions
  • Lead regulatory exam preparation and response for fraud programs
  • Coach and develop mid-level analysts toward advanced investigation skills
  • Design and implement fraud investigation frameworks used across the organization
  • Develop fraud taxonomies and classification systems for consistent reporting
  • Lead cross-functional fraud reduction initiatives spanning multiple teams
  • Translate fraud patterns and intelligence into engineering requirements
  • Define and track fraud KPIs, loss metrics, and operational dashboards
  • Build and maintain fraud intelligence sharing relationships with industry peers
  • Drive fraud model governance and champion feedback processes
  • Lead fraud program assessments and maturity evaluations
  • Develop training curricula and career development paths for fraud analysts
  • Advise product teams on fraud-resistant design patterns
  • Author fraud research and trend reports for executive consumption
  • Define organizational fraud risk appetite and tolerance frameworks
  • Design fraud operating models for new business lines and products
  • Lead enterprise fraud technology strategy and platform selection
  • Advise executive leadership on fraud exposure, trends, and investment priorities
  • Drive fraud program transformation initiatives
  • Establish fraud governance frameworks and escalation structures
  • Lead cross-enterprise fraud risk assessments
  • Represent the organization to regulators on fraud program effectiveness
  • Build strategic partnerships with industry bodies and law enforcement agencies
  • Define fraud analytics strategy and champion data-driven detection
  • Shape organizational hiring, development, and retention strategy for fraud talent
  • Create fraud prevention methodologies and frameworks adopted industry-wide
  • Advise regulators, law enforcement agencies, and policymakers on fraud trends
  • Drive innovation in fraud detection approaches and set industry benchmarks
  • Lead industry working groups and standards bodies on financial crime
  • Publish original research on emerging fraud vectors and countermeasures
  • Define the long-term strategic vision for enterprise fraud prevention
  • Serve as the organization's foremost authority on fraud risk
  • Evaluate and shape emerging technologies for fraud prevention (AI/ML, identity, biometrics)
  • Advise on enterprise risk architecture decisions that affect fraud exposure
  • Drive strategic partnerships with payment networks, consortiums, and technology providers
  • Represent the organization at major industry conferences and regulatory forums
Required Skills
  • Understanding of common fraud types (account takeover, card fraud, identity theft)
  • Basic knowledge of payment systems and transaction flows
  • Familiarity with fraud case management platforms (Actimize, Verafin, or similar)
  • Attention to detail and pattern recognition ability
  • Basic understanding of KYC and identity verification concepts
  • Documentation and report writing skills
  • Ability to follow decision trees and standard operating procedures
  • Proficiency in fraud case management and investigation workflows
  • Understanding of account takeover (ATO) attack methods and indicators
  • Ability to conduct link analysis across accounts, devices, and transactions
  • Knowledge of payment fraud schemes (card testing, BIN attacks, refund abuse)
  • Familiarity with SAR filing requirements and BSA obligations
  • Basic data querying skills (SQL) for transaction analysis
  • Understanding of device fingerprinting and behavioral analytics concepts
  • Fraud loss calculation and impact assessment
  • Expert knowledge of multiple fraud typologies and attack vectors
  • Advanced link analysis and fraud network mapping techniques
  • Proficiency in SQL and data analysis for fraud pattern identification
  • SAR filing expertise and BSA/AML regulatory knowledge
  • Understanding of synthetic identity fraud detection
  • Knowledge of mobile and digital channel fraud schemes
  • Ability to prepare law enforcement referral packages
  • Experience with fraud analytics platforms (SAS, Actimize, Feedzai)
  • Cross-channel fraud investigation (card, ACH, wire, P2P)
  • Deep expertise across multiple fraud domains (payments, identity, ATO, BEC)
  • Advanced analytical skills including statistical analysis of fraud patterns
  • Expert knowledge of BSA/AML regulations and regulatory expectations
  • Ability to assess fraud risk in new products and business initiatives
  • Strong understanding of fraud detection model concepts and scoring systems
  • Experience managing law enforcement relationships and case referrals
  • Investigation leadership and case management for complex, multi-party fraud
  • Fraud loss forecasting and metrics development
  • Proficiency with fraud analytics platforms and BI tools
  • Comprehensive expertise across fraud operations, strategy, and analytics
  • Ability to design investigation methodologies and analytical frameworks
  • Strong data analysis skills including Python or R for fraud analytics
  • Understanding of fraud detection model development and validation
  • Experience building fraud metrics programs and executive reporting
  • Knowledge of industry fraud intelligence sharing (FS-ISAC, fraud consortiums)
  • Ability to translate operational fraud insights into technical requirements
  • Project leadership for complex, multi-team initiatives
  • Fraud program assessment and maturity modeling
  • Executive-level understanding of fraud risk across financial products and channels
  • Experience designing fraud operating models and organizational structures
  • Ability to define fraud technology strategy and evaluate platforms
  • Deep regulatory knowledge across BSA/AML, UDAAP, and consumer protection
  • Strategic planning and business case development for fraud investments
  • Experience representing fraud programs to regulators and board-level audiences
  • Ability to lead organizational change and transformation programs
  • Advanced understanding of fraud detection architectures and ML model governance
  • Industry relationship building and intelligence network development
  • Industry-recognized expertise in fraud prevention and financial crime
  • Ability to create novel methodologies and frameworks that advance the discipline
  • Deep understanding of global fraud trends, regulatory landscape, and technology evolution
  • Executive communication and influence at the board and regulatory level
  • Strategic vision for multi-year fraud prevention transformation
  • Expertise spanning cyber fraud, financial crime, identity, and payments
  • Track record of published research or industry standard contributions
  • Ability to evaluate emerging technologies and their fraud implications
  • Cross-industry relationship network spanning financial services, technology, and government
Preferred Skills
  • Exposure to Bank Secrecy Act (BSA) and anti-money laundering basics
  • Familiarity with chargeback reason codes and dispute processes
  • Basic spreadsheet and data analysis skills
  • Understanding of social engineering tactics
  • Customer service or banking operations experience
  • Experience with identity verification platforms (Socure, Jumio, Onfido)
  • Familiarity with chargeback representment processes
  • Understanding of business email compromise (BEC) investigation
  • Exposure to dark web monitoring for compromised credentials
  • Basic knowledge of graph analysis for fraud networks
  • OSINT techniques for fraud investigation
  • Understanding of machine learning model outputs and score interpretation
  • Experience with cryptocurrency-related fraud
  • Knowledge of merchant fraud and acquiring-side risk
  • Data visualization for fraud trend reporting
  • Experience with fraud risk assessments for fintech or payment products
  • Understanding of machine learning model lifecycle for fraud detection
  • Knowledge of international fraud typologies and cross-border schemes
  • Experience with regulatory examination processes (OCC, FDIC, FinCEN)
  • Project management skills for fraud prevention initiatives
  • Experience with fraud consortium data and collaborative intelligence
  • Understanding of graph databases and network analysis for fraud detection
  • Knowledge of real-time decisioning architectures
  • Experience building fraud analyst training programs
  • Published fraud research or conference presentations
  • Experience building fraud operations from the ground up
  • Knowledge of international fraud regulatory frameworks (EU PSD2, UK FCA)
  • Board-level presentation and communication skills
  • Experience with M&A fraud due diligence and integration
  • Published thought leadership on fraud prevention
  • Experience advising government agencies or regulatory bodies on fraud policy
  • Background spanning multiple financial services sectors (banking, fintech, payments, insurance)
  • Academic contributions or teaching in fraud, financial crime, or cybersecurity
  • Experience with international fraud coordination and cross-border investigations
  • Patent or innovation portfolio in fraud detection technology
Mentorship RequirementsReceives direct mentorship from Senior fraud analysts. Shadows on complex investigations and SAR filings. Expected to complete fraud operations onboarding and learn primary case management tooling within first 3 months. Develops understanding of fraud typologies through guided case review.Receives guidance from Senior analysts on complex or high-value cases. Expected to begin assisting Entry-level analysts with case review. Contributes to SOPs and decision tree refinements. Should be developing expertise in specific fraud typologies.Mentors Analyst 1 and 2 on investigation methodology and case quality. Provides feedback on SAR narratives and case documentation. May lead case review sessions. Receives guidance from Staff-level analysts on strategic fraud initiatives and novel attack vectors.Actively mentors mid-level analysts and develops their expertise. Conducts case reviews and provides strategic guidance on complex investigations. May serve as functional lead for a fraud domain. Receives guidance from Staff-level on organizational strategy and cross-team initiatives.Mentors Senior analysts and develops future leaders. Drives professional development strategy for the fraud team. Creates learning resources and investigation guides. Engages with external fraud community to bring in industry best practices.Mentors Staff-level analysts and shapes leadership development across the fraud function. Sponsors cross-functional development opportunities. Serves as an industry mentor through ACFE or similar organizations. Influences hiring standards and career frameworks.Mentors senior leaders across the industry, not just within the organization. Shapes the profession through conference keynotes, publications, and standards contributions. Sponsors development of next-generation fraud leaders. May serve on ACFE or industry advisory boards.
Impact ScopeIndividual contributor on alert queue. Impact limited to correctly dispositioning assigned alerts and escalating true positives. All complex findings reviewed before action. Contributes to team throughput and detection rate metrics.Directly contributes to fraud loss prevention through case investigation. Responsible for accurate case disposition and timely escalation of emerging patterns. SAR narratives support regulatory compliance. Beginning to influence alert rule quality through feedback.Leads high-impact investigations that directly reduce fraud losses. Rule tuning recommendations affect detection rates across the organization. Law enforcement referrals can result in criminal prosecution of fraud actors. Trend analysis shapes fraud prevention strategy.Directly responsible for fraud prevention strategy in assigned areas. Investigation outcomes affect organizational loss rates and regulatory standing. Product fraud assessments influence go-to-market decisions. Playbooks and SOPs define how the broader team operates.Cross-team influence on fraud detection and prevention. Frameworks and methodologies define how fraud investigations are conducted org-wide. Metrics and dashboards shape leadership decision-making. Industry intelligence sharing contributes to broader fraud ecosystem defense.Organization-wide influence on fraud strategy, risk appetite, and operating model. Decisions directly affect fraud loss rates, customer experience, and regulatory standing. Technology strategy shapes multi-year fraud prevention capabilities. Industry engagement contributes to sector-wide fraud resilience.Industry-wide influence on fraud prevention strategy and methodology. Frameworks and research shape how organizations across the sector approach fraud. Regulatory engagement influences policy that affects the entire financial ecosystem. Sets the standard for fraud prevention excellence.
Autonomy & Decision AuthorityWorks under close supervision following established decision trees. Authority to approve or decline low-value transactions per policy thresholds. Escalates all high-value, unusual, or ambiguous cases. No authority to file regulatory reports or contact law enforcement.Works with moderate supervision. Authority to investigate and close standard fraud cases independently. Can approve or decline transactions within defined value thresholds. Escalates high-value cases, novel patterns, and regulatory reporting decisions.Works independently on most investigations. Authority to file SARs and make account-level fraud decisions within policy. Can recommend rule changes and threshold adjustments. Escalates novel fraud vectors, high-profile cases, and policy exceptions to leadership.Works with high autonomy on investigations and fraud strategy. Authority to make high-value case decisions within policy. Can approve rule deployments and threshold changes. Escalates policy changes, resource requests, and enterprise-risk-level issues to leadership.High autonomy in defining fraud strategy and investigation approaches. Authority to set operational standards and approve process changes. Influences technology investment decisions for fraud tooling. Escalates enterprise risk decisions and budget requests to leadership.Operates with significant strategic autonomy. Authority to set fraud policy and operating standards. Influences enterprise budget allocation for fraud prevention. Escalates board-level risk decisions and regulatory matters to executive leadership.Operates with full strategic autonomy. Trusted to represent the organization's fraud position to external stakeholders. Authority to commit the organization on fraud-related industry initiatives. Reports to and advises the most senior executive leadership.
Communication & StakeholdersPrimarily internal communication with fraud operations team. Documents findings in case management system. Limited interaction with customers for verification callbacks. May participate in shift handoffs.Regular interaction with fraud operations and risk teams. Presents case findings to team leads. Coordinates with customer support on account actions. May interact with bank partners on chargeback disputes.Regular interaction with risk leadership, compliance, and product teams. Presents fraud trend reports to management. Direct communication with law enforcement agencies. Coordinates with bank partners and payment networks on fraud cases.Regular communication with fraud leadership, compliance, product, and engineering. Presents to senior management on fraud trends and program effectiveness. Interacts with regulators during examinations. Represents fraud operations in enterprise risk forums.Regular communication with VP-level leadership and executive stakeholders. Presents fraud program status and strategy to senior management. Represents the organization in industry fraud forums. Coordinates with peer organizations on fraud intelligence.Regular communication with C-suite and board risk committees. Represents fraud program to regulators and law enforcement leadership. Engages with industry bodies at the executive level. Advises product and business leadership on fraud-related strategic decisions.Engages with board members, C-suite executives, regulators, and law enforcement leadership. Keynotes industry conferences. Advises peer organizations and industry bodies. Direct relationships with payment network and consortium leadership.
Degree / ExperienceBachelor's degree in Criminal Justice, Finance, Business, or related field, OR 1-2 years of banking, customer service, or financial operations experience, OR completion of fraud analyst training program.Bachelor's degree in relevant field, OR 2-4 years of fraud operations, banking, or financial crime experience. Demonstrated ability to investigate fraud cases and produce quality documentation.Bachelor's degree plus 4-6 years of fraud investigation experience, OR 6-8 years of progressive fraud operations experience with demonstrated expertise in complex investigations.Bachelor's degree plus 6-8 years of fraud investigation experience, OR 8-10 years of progressive fraud experience with demonstrated leadership in complex investigations and strategy development.Bachelor's or Master's degree plus 8-12 years of fraud experience, OR 10-14 years of progressive fraud and financial crime experience with demonstrated cross-functional leadership and strategic impact.Master's degree or equivalent plus 12-16 years of fraud and financial crime experience, OR 14-18 years of progressive experience with demonstrated organizational leadership, strategic impact, and industry recognition.Master's or doctoral degree plus 15+ years of fraud and financial crime experience, OR 18+ years of progressive experience with industry-wide recognition, published contributions, and demonstrated influence on fraud prevention practices beyond a single organization.
Certifications
  • Association of Certified Fraud Examiners (ACFE) - Fraud Fundamentals
  • Certified Anti-Money Laundering Specialist (CAMS) - Associate level
  • CompTIA Security+ (if coming from IT path)
  • Financial Crime Compliance (FCC) certifications
  • Certified Fraud Examiner (CFE)
  • Certified Anti-Money Laundering Specialist (CAMS)
  • ACFE Certified Financial Crimes Investigator (CFCI)
  • GIAC Financial Forensics and Fraud Investigation (GFFI)
  • Certified Fraud Examiner (CFE)
  • Certified Anti-Money Laundering Specialist (CAMS)
  • GIAC Financial Forensics and Fraud Investigation (GFFI)
  • Certified Financial Crime Specialist (CFCS)
  • Certified Fraud Examiner (CFE)
  • Certified Anti-Money Laundering Specialist (CAMS)
  • Certified Financial Crime Specialist (CFCS)
  • GIAC Financial Forensics and Fraud Investigation (GFFI)
  • Certified Information Systems Security Professional (CISSP) - for cyber-fraud focus
  • Certified Fraud Examiner (CFE)
  • Certified Anti-Money Laundering Specialist (CAMS)
  • Certified Financial Crime Specialist (CFCS)
  • Certified Information Systems Security Professional (CISSP)
  • ACFE Fellow or recognized fraud thought leader
  • Certified Fraud Examiner (CFE)
  • Certified Anti-Money Laundering Specialist (CAMS)
  • Certified Financial Crime Specialist (CFCS)
  • CISSP or CISM (for cyber-fraud intersection)
  • Industry advisory board memberships
  • Certified Fraud Examiner (CFE) - Fellow
  • Certified Anti-Money Laundering Specialist (CAMS)
  • Industry advisory board and standards body memberships
  • Published author or frequent conference speaker
  • Recognized as industry thought leader in financial crime prevention
Salary: US Gov't$50,000 - $70,000 (GS-7 to GS-9)$65,000 - $90,000 (GS-9 to GS-11)$85,000 - $115,000 (GS-12 to GS-13)$110,000 - $150,000 (GS-14 to GS-15)$130,000 - $175,000 (GS-14 to GS-15)$145,000 - $190,000 (GS-15 to SES)$160,000 - $200,000 (GS-15 to SES)
Salary: US Startup$50,000 - $70,000$65,000 - $90,000$90,000 - $120,000$120,000 - $160,000$150,000 - $200,000$180,000 - $240,000$200,000 - $280,000
Salary: US Corporate$50,000 - $75,000$70,000 - $100,000$95,000 - $130,000$130,000 - $175,000$160,000 - $220,000$195,000 - $260,000$220,000 - $300,000
Salary: Big Tech (Mag7)$110,000 - $165,000$150,000 - $240,000$220,000 - $350,000$300,000 - $480,000$360,000 - $550,000$450,000 - $650,000$550,000 - $750,000
↑ Back to navigation

Fraud Engineer

Technical professionals who build and maintain fraud detection platforms, develop machine learning models for anomaly detection, design rules engines, and create real-time scoring systems. Focus on the technical infrastructure that enables fraud detection at scale. Combine software engineering, data engineering, and applied machine learning to build systems that score millions of transactions in real time while balancing precision and recall to minimize both fraud losses and customer friction.

NICE Framework: No direct mapping tenuous No NICE equivalent. Fraud detection engineering combines data science, software engineering, and security — a discipline NICE does not address.
Attribute Eng 1 / Entry Eng 2 / Junior Eng 3 / Mid Eng 4 / Senior Eng 5 / Staff Eng 6 / Senior Staff Eng 7 / Principal
General DescriptionEntry-level fraud engineer learning the fundamentals of fraud detection systems, rules engines, and transaction scoring pipelines. Assists with rule implementation, basic feature engineering, and monitoring of fraud detection system health. Develops foundational understanding of real-time streaming architectures, fraud model concepts, and the business logic behind fraud decisioning. Works under close supervision on well-defined tasks.Junior fraud engineer who independently develops and deploys fraud detection rules, builds data pipelines for fraud features, and maintains components of the fraud scoring platform. Demonstrates proficiency in at least one area of the fraud tech stack (rules engine, feature store, or model serving) and can implement moderately complex detection logic. Begins contributing to model feature engineering and understands the feedback loop between fraud operations and detection systems.Experienced fraud engineer who designs and builds significant components of the fraud detection platform. Leads development of fraud scoring services, feature pipelines, or rules engine capabilities. Combines engineering depth with growing fraud domain knowledge to make effective trade-offs between detection performance, latency, and customer experience. Contributes to ML model development and evaluation. Mentors junior engineers on fraud system design patterns.Senior fraud engineer and technical leader who owns major components or subsystems of the fraud detection platform. Deep expertise in real-time scoring, ML model lifecycle, or fraud rules infrastructure with the ability to make complex trade-offs between competing requirements. Drives technical strategy for their domain and serves as the escalation point for the most challenging production and design problems. Partners closely with fraud analysts, data scientists, and product teams to align platform capabilities with business needs.Staff fraud engineer who operates as a force multiplier across the fraud engineering organization. Designs systems, frameworks, and technical strategies that other engineers build upon. Defines the fraud platform architecture and drives cross-cutting technical initiatives that improve the entire fraud detection capability. Bridges fraud engineering with broader infrastructure, data platform, and ML platform teams. Recognized as the technical authority on fraud detection systems within the organization.Senior Staff fraud engineer who shapes how fraud detection engineering operates at the organizational and industry level. Defines the technical vision for fraud platforms that process billions of transactions, designs novel detection architectures, and drives strategic technology decisions that affect the entire fraud function. Operates as a peer to fraud leadership, translating business strategy into technical roadmaps. Recognized externally as a leader in fraud detection engineering.Principal fraud engineer — an industry-defining technologist whose work advances the state of the art in fraud detection systems. Creates architectures, algorithms, and engineering approaches adopted across the industry. Operates at the frontier of fraud detection technology — pioneering applications of new ML techniques, designing detection systems for novel fraud vectors, and solving problems no existing playbook addresses. Advises industry bodies, publishes influential research, and shapes how the next generation of fraud platforms are built.
Primary Responsibilities
  • Implement fraud detection rules based on analyst specifications
  • Monitor fraud scoring system health and alert on anomalies
  • Assist with data pipeline maintenance for fraud feature stores
  • Write unit tests for fraud rules and scoring logic
  • Support basic feature engineering for fraud models
  • Document fraud system configurations and rule logic
  • Assist with rule deployment and rollback procedures
  • Learn real-time streaming frameworks and event processing
  • Support data quality checks on fraud-related data feeds
  • Develop and deploy fraud detection rules and policies independently
  • Build and maintain data pipelines for fraud feature computation
  • Implement feature engineering for fraud detection models
  • Optimize rule performance and reduce false positive rates
  • Build monitoring dashboards for fraud system metrics
  • Participate in fraud model evaluation and back-testing
  • Integrate third-party fraud signals and data enrichment APIs
  • Support A/B testing framework for fraud policy changes
  • Troubleshoot production issues in fraud scoring pipelines
  • Collaborate with fraud analysts on rule requirements and performance feedback
  • Design and build fraud scoring services and real-time decision APIs
  • Develop machine learning features and model training pipelines
  • Lead development of rules engine capabilities and policy frameworks
  • Optimize fraud system latency and throughput for real-time scoring
  • Build model monitoring and performance tracking systems
  • Design experiments and A/B tests for fraud policy changes
  • Conduct model back-testing and performance evaluation
  • Architect data pipelines for high-volume transaction processing
  • Mentor junior engineers on fraud platform development
  • Drive technical debt reduction in fraud systems
  • Collaborate with data scientists on model deployment and serving
  • Own technical design and roadmap for major fraud platform subsystems
  • Lead fraud ML model lifecycle — training, validation, deployment, monitoring
  • Design real-time scoring architectures that meet latency and throughput SLAs
  • Drive fraud platform reliability, scalability, and operational excellence
  • Serve as technical escalation point for complex production incidents
  • Partner with fraud leadership on detection strategy and technology investment
  • Design fraud data architecture and feature store strategy
  • Lead evaluation and integration of fraud technology vendors
  • Establish engineering standards and best practices for the fraud team
  • Drive fraud model governance and regulatory compliance requirements
  • Coach and develop mid-level engineers toward technical leadership
  • Define fraud platform architecture and long-term technical strategy
  • Design cross-cutting systems: feature stores, model serving, experiment frameworks
  • Lead fraud engineering's most complex and ambiguous technical challenges
  • Drive standardization of fraud engineering practices across teams
  • Establish fraud model evaluation frameworks and champion model governance
  • Architect fraud data infrastructure for scalability and regulatory compliance
  • Lead technical due diligence on fraud technology acquisitions and partnerships
  • Define fraud system SLAs, reliability targets, and observability standards
  • Bridge fraud engineering with ML platform, data platform, and infrastructure teams
  • Drive build-vs-buy decisions for fraud technology components
  • Represent fraud engineering in company-wide technical leadership forums
  • Define the multi-year technical vision for fraud detection platforms
  • Design novel fraud detection architectures (real-time graph, behavioral, ensemble)
  • Drive strategic technology decisions affecting the entire fraud organization
  • Lead enterprise-wide initiatives at the intersection of fraud, ML, and infrastructure
  • Advise executive leadership on fraud technology capabilities and investments
  • Shape industry standards for fraud detection engineering practices
  • Drive build-vs-buy strategy for fraud technology at the enterprise level
  • Architect cross-organization data sharing and consortium participation
  • Evaluate emerging technologies (LLMs, foundation models) for fraud applications
  • Define fraud engineering organizational structure and team topology
  • Represent the organization's fraud engineering capabilities externally
  • Pioneer novel fraud detection architectures and algorithms
  • Define the strategic direction for fraud technology at the industry level
  • Create engineering approaches and frameworks adopted beyond the organization
  • Advise industry bodies and regulators on fraud detection technology evolution
  • Publish research that advances fraud detection engineering practices
  • Evaluate and shape application of emerging technologies to fraud detection
  • Drive cross-industry collaboration on fraud detection challenges
  • Solve the hardest unsolved problems in fraud detection at scale
  • Serve as the organization's foremost technical authority on fraud systems
  • Shape academic and industry research agenda for fraud detection
  • Advise C-suite and board on long-term fraud technology strategy
Required Skills
  • Proficiency in Python or Java for backend development
  • Basic SQL skills for querying transaction and event data
  • Understanding of software development fundamentals (version control, testing, CI/CD)
  • Basic knowledge of streaming concepts (Kafka, event-driven architecture)
  • Familiarity with fraud detection concepts (rules, scores, thresholds)
  • Understanding of basic statistics and data analysis
  • Ability to read and implement technical specifications
  • Strong Python and SQL skills for data engineering and analytics
  • Experience with streaming data platforms (Kafka, Kinesis)
  • Understanding of fraud detection rules engines and decision logic
  • Basic machine learning knowledge (classification, feature importance)
  • Familiarity with feature stores and real-time feature computation
  • Experience with cloud infrastructure (AWS, GCP, or Azure)
  • Understanding of API design and integration patterns
  • Data pipeline development and orchestration (Airflow, Dagster)
  • Strong software engineering skills with distributed systems experience
  • Machine learning model development (XGBoost, neural networks for fraud)
  • Real-time feature computation and serving at scale
  • Experience with fraud-specific scoring architectures and latency constraints
  • Advanced SQL and data modeling for transactional data
  • Stream processing frameworks (Flink, Spark Streaming, Kafka Streams)
  • Model evaluation metrics relevant to fraud (precision-recall trade-offs)
  • Performance optimization for low-latency scoring systems
  • Understanding of fraud operations workflows and analyst needs
  • Expert-level distributed systems design for real-time scoring
  • Deep experience with fraud ML model development and production deployment
  • Advanced understanding of fraud detection architectures (rules, models, hybrid)
  • Ability to optimize P50/P99 latency for high-throughput scoring systems
  • Experience with model governance, validation, and regulatory requirements (SR 11-7)
  • Technical leadership and architecture decision-making
  • Production incident management for mission-critical fraud systems
  • Understanding of fraud economics and business impact of detection trade-offs
  • Platform scalability design for transaction volumes in the millions per hour
  • Expert-level architecture for large-scale real-time scoring and decisioning systems
  • Deep expertise across ML lifecycle — training infrastructure, serving, monitoring
  • Ability to design systems that balance fraud detection, latency, and cost at scale
  • Experience defining technical strategy for engineering organizations
  • Advanced knowledge of fraud detection approaches (behavioral, network, identity)
  • Understanding of regulatory requirements affecting fraud technology (SR 11-7, GDPR)
  • Technical leadership across multiple engineering teams
  • Ability to evaluate and influence emerging fraud detection technologies
  • Production excellence for mission-critical financial systems
  • Industry-leading expertise in fraud detection system architecture
  • Ability to design fraud platforms at massive scale (billions of daily events)
  • Strategic technology vision spanning fraud, ML, data, and infrastructure
  • Experience driving organizational-level technical transformation
  • Deep understanding of fraud economics and business model implications
  • Ability to evaluate and integrate cutting-edge detection technologies
  • Executive communication on technical strategy and investment trade-offs
  • Understanding of global regulatory landscape affecting fraud technology
  • Track record of building high-performing fraud engineering teams
  • Industry-recognized expertise in fraud detection system engineering
  • Ability to create novel architectures and approaches that advance the field
  • Deep understanding of ML research applicable to fraud (adversarial ML, few-shot learning)
  • Strategic vision spanning technology evolution, business models, and regulation
  • Track record of influential publications, patents, or open-source contributions
  • Ability to identify and solve industry-level fraud detection challenges
  • Executive-level communication and influence across industry stakeholders
  • Expertise spanning real-time systems, machine learning, and fraud domain knowledge
  • Cross-industry relationship network in fraud technology and ML research
Preferred Skills
  • Exposure to machine learning concepts
  • Familiarity with cloud platforms (AWS, GCP, Azure)
  • Basic knowledge of graph databases or network analysis
  • Understanding of REST APIs and microservices
  • Exposure to real-time data processing frameworks (Spark Streaming, Flink)
  • Experience with fraud-specific platforms (Featurespace, Feedzai, Sardine)
  • Knowledge of graph analysis for fraud network detection
  • Familiarity with containerization and orchestration (Docker, Kubernetes)
  • Understanding of real-time scoring latency requirements
  • Exposure to model monitoring and drift detection
  • Experience with graph neural networks or network-based fraud detection
  • Knowledge of device fingerprinting and behavioral biometrics integration
  • Familiarity with explainable AI for fraud decisioning
  • Experience with fraud vendor evaluation and integration (Socure, Sift, Sardine)
  • Understanding of privacy requirements affecting fraud data usage
  • Experience with fraud detection at payments scale (Stripe, Square, Adyen-class volumes)
  • Knowledge of consortium-based fraud detection and data sharing architectures
  • Experience with real-time graph computation for fraud network detection
  • Understanding of privacy-preserving machine learning techniques
  • Patent or publication in fraud detection technology
  • Experience building fraud platforms processing billions of events daily
  • Knowledge of federated learning or privacy-preserving fraud detection
  • Patent portfolio in fraud detection or real-time scoring technology
  • Experience with fraud technology at multiple organizations or scales
  • Contributions to open-source fraud detection or ML infrastructure
  • Experience with fraud platform architecture at multiple large-scale organizations
  • Contributions to industry standards for fraud detection technology
  • Academic collaborations or advisory roles in fraud ML research
  • Experience evaluating AI/ML startups in the fraud space
  • Board or advisory committee participation in fintech or fraud technology
  • Academic research background in ML, distributed systems, or security
  • Experience spanning multiple industry segments (banking, payments, e-commerce, crypto)
  • Advisory roles with government agencies on fraud technology
  • Founding or co-founding role in fraud technology ventures
  • Standards body leadership in financial technology
Mentorship RequirementsReceives direct mentorship from Senior fraud engineers. Pairs on development tasks and code reviews. Expected to complete onboarding on fraud platform architecture and tools within first 3 months. Develops understanding of fraud domain through collaboration with fraud analysts.Receives guidance from Senior engineers on architecture decisions and complex implementations. Expected to begin reviewing code from Entry-level engineers. Contributes to technical documentation. Should be developing depth in a specific area of the fraud platform.Mentors Eng 1 and Eng 2 on fraud platform development patterns. Leads code reviews and provides technical design feedback. Receives guidance from Staff engineers on architecture decisions and cross-platform initiatives. Contributes to engineering hiring and onboarding.Actively mentors mid-level engineers and develops technical leaders. Conducts architecture reviews and provides strategic technical guidance. May serve as tech lead for a fraud engineering squad. Receives strategic guidance from Staff engineers on cross-platform initiatives.Mentors Senior engineers and develops technical leaders. Shapes engineering culture and technical standards. Drives hiring bar for fraud engineering. Engages with external technical community through publications, conferences, or open-source contributions.Mentors Staff engineers and shapes technical leadership across the organization. Defines engineering career frameworks and growth expectations. Engages with the external fraud engineering community through thought leadership. Sponsors development of next-generation technical leaders.Mentors senior leaders across the industry. Shapes the fraud engineering profession through publications, standards, and community leadership. Sponsors research collaborations with academia. May hold adjunct or advisory positions at universities.
Impact ScopeIndividual contributor on assigned development tasks. Impact limited to implementing and testing specific rules or features. All code reviewed before deployment. Contributes to overall platform stability and rule coverage.Directly contributes to fraud detection effectiveness through rule and feature development. Pipeline reliability work affects system availability. Rule optimization measurably impacts false positive rates and detection coverage. Beginning to influence technical direction within their component area.Leads development of platform components that process millions of transactions. Scoring system performance directly affects fraud detection rates and customer experience. Model features and evaluation work shapes detection capability. Technical decisions influence platform scalability.Owns subsystems that directly determine fraud detection effectiveness and reliability. Architecture decisions affect platform scalability for years. Technology strategy shapes engineering investment and vendor relationships. Standards and practices define how the fraud engineering team builds software.Cross-team influence on fraud detection infrastructure and architecture. Platform decisions affect engineering productivity and fraud detection capability at scale. Technical strategy shapes multi-year investment. Standards and frameworks define how the entire fraud engineering organization builds and operates systems.Organization-wide influence on fraud detection technology and architecture. Technical vision shapes multi-year platform evolution. Strategic decisions affect engineering team structure, vendor relationships, and technology investments. Industry engagement influences how fraud detection engineering is practiced more broadly.Industry-wide influence on fraud detection technology and architecture. Novel approaches and publications shape how organizations across the sector build fraud systems. Regulatory engagement influences technology requirements affecting the entire industry. Defines what excellence looks like in fraud detection engineering.
Autonomy & Decision AuthorityWorks under close supervision on well-scoped tasks. Follows established development practices and deployment procedures. No authority to deploy rules to production independently. Escalates technical decisions and design questions to senior engineers.Works with moderate supervision. Authority to deploy rules and features following established review processes. Can make implementation decisions within defined patterns. Escalates architecture decisions, production incidents, and cross-system changes.Works independently on component design and implementation. Authority to make technical decisions within their domain. Can approve and deploy platform changes following established processes. Escalates cross-service architecture decisions and major technology choices.High autonomy on technical decisions within their domain. Authority to approve architecture designs and technology choices for their subsystems. Can drive vendor selection processes. Escalates cross-platform architecture decisions, major infrastructure investments, and org-level technical strategy.Significant autonomy on technical strategy and architecture decisions. Authority to set technical direction for fraud engineering. Influences engineering investment and resource allocation. Escalates organizational strategy, major budget decisions, and cross-divisional technical conflicts to engineering leadership.Operates with broad strategic autonomy on fraud technology decisions. Authority to set technical direction and influence organizational structure. Drives major technology investment decisions. Escalates enterprise strategy and cross-divisional resource allocation to executive leadership.Full strategic autonomy on fraud technology vision and innovation. Trusted to represent the organization's technical position to any external stakeholder. Authority to commit the organization on industry technology initiatives. Reports to and advises the most senior technical and business leadership.
Communication & StakeholdersPrimarily internal communication with fraud engineering team. Participates in standups and sprint ceremonies. Limited interaction with fraud analysts initially. Documents work in engineering ticketing systems.Regular interaction with fraud analysts and data scientists. Participates in cross-functional fraud reviews. Communicates technical status in sprint ceremonies. May present technical work to the broader fraud team.Regular interaction with fraud analysts, data scientists, and product managers. Presents technical designs to the engineering team. Communicates with fraud leadership on system capabilities and trade-offs. Participates in cross-team technical reviews.Regular communication with fraud leadership, product management, and engineering leadership. Presents technical strategy to senior management. Interfaces with fraud technology vendors. Represents fraud engineering in cross-functional technical forums.Regular communication with engineering leadership and VP-level stakeholders. Presents technical strategy to senior management. Represents fraud engineering to external partners and at industry conferences. Coordinates with ML platform, infrastructure, and data engineering leadership.Regular communication with VP and C-suite leadership. Presents technology strategy to executive management and board. Represents the organization at major industry and engineering conferences. Advises peer organizations on fraud engineering practices.Engages with C-suite, board members, regulators, and industry leaders. Keynotes major engineering and financial crime conferences. Advises peer organizations, startups, and academic researchers. Direct relationships with industry body and standards leadership.
Degree / ExperienceBachelor's degree in Computer Science, Software Engineering, Data Science, or related field, OR 1-2 years of software development experience, OR completion of software engineering bootcamp with demonstrated backend and data skills.Bachelor's degree in Computer Science or related field, OR 2-4 years of software engineering or data engineering experience with exposure to fraud or risk systems.Bachelor's or Master's degree in Computer Science or related field plus 4-6 years of experience, OR 6-8 years of software/data engineering experience with demonstrated expertise in real-time scoring or fraud systems.Bachelor's or Master's degree plus 7-10 years of experience in software engineering, ML engineering, or data engineering, OR 9-12 years of progressive experience with demonstrated technical leadership in real-time systems or fraud platforms.Master's degree or equivalent plus 10-14 years of experience, OR 12-16 years of progressive engineering experience with demonstrated technical leadership, architecture expertise, and cross-organizational influence.Master's or doctoral degree plus 14-18 years of experience, OR 16-20 years of progressive engineering experience with demonstrated industry influence, architectural innovation, and organizational leadership in fraud or real-time systems.Doctoral degree or equivalent plus 15+ years of experience, OR 18+ years of progressive engineering experience with industry-wide recognition, published contributions, and demonstrated influence on fraud detection technology beyond a single organization.
Certifications
  • AWS Cloud Practitioner or equivalent cloud certification
  • Relevant programming certifications or bootcamp completion
  • Coursera/Udacity machine learning fundamentals
  • CompTIA Security+ (for security context)
  • AWS Solutions Architect Associate or equivalent
  • Google Professional Data Engineer
  • Apache Kafka certification
  • Machine learning certifications (Stanford ML, fast.ai)
  • AWS Solutions Architect Professional or equivalent
  • Google Professional Machine Learning Engineer
  • Certified Kubernetes Administrator (CKA)
  • Relevant ML and data engineering certifications
  • AWS Solutions Architect Professional or equivalent senior cloud certification
  • Google Professional Machine Learning Engineer
  • Relevant advanced ML or systems engineering certifications
  • Industry conference presentations or published work
  • Senior cloud architecture certifications
  • Published work or patents in fraud detection technology
  • Conference presentations at major engineering or ML venues
  • Open-source contributions to relevant projects
  • Published patents or papers in fraud detection technology
  • Industry conference keynotes and invited talks
  • Advisory board positions in fraud or ML technology companies
  • Recognized industry thought leader in fraud engineering
  • Published patents and research papers in fraud detection
  • Major conference keynotes and invited talks
  • Standards body leadership or advisory committee chairs
  • Recognized as a top industry expert in fraud detection engineering
  • Academic appointments or advisory positions
Salary: US Gov't$55,000 - $75,000 (GS-7 to GS-9)$70,000 - $95,000 (GS-9 to GS-11)$90,000 - $120,000 (GS-12 to GS-13)$115,000 - $155,000 (GS-14 to GS-15)$135,000 - $180,000 (GS-15 to SES)$155,000 - $195,000 (GS-15 to SES)$170,000 - $210,000 (GS-15 to SES)
Salary: US Startup$70,000 - $100,000$90,000 - $130,000$120,000 - $170,000$155,000 - $210,000$180,000 - $250,000$220,000 - $300,000$250,000 - $350,000
Salary: US Corporate$65,000 - $95,000$85,000 - $120,000$110,000 - $155,000$145,000 - $195,000$175,000 - $240,000$210,000 - $280,000$240,000 - $320,000
Salary: Big Tech (Mag7)$130,000 - $185,000$175,000 - $275,000$250,000 - $400,000$340,000 - $520,000$400,000 - $600,000$500,000 - $700,000$600,000 - $800,000
↑ Back to navigation

Operational Technology Security (OT Security)

ICS/SCADA security, industrial protocol protection, IT/OT convergence, and critical infrastructure defense

OT Security Engineer

Technical professionals who secure industrial control systems (ICS), SCADA systems, PLCs, DCS, HMIs, and operational technology environments. Focus on OT network segmentation, asset discovery, vulnerability management in environments where patching is constrained, safety system integrity, and bridging the IT/OT security gap. Distinct from IT security engineers — OT environments have unique constraints around availability, safety, and legacy protocols. Many practitioners come from control systems engineering or industrial automation backgrounds rather than traditional IT security.

NICE Framework: PR-INF-001 Cyber Defense Infrastructure Support Specialist partial NICE's infrastructure support role is IT-focused. OT security engineering involves unique constraints around safety systems, legacy protocols, and availability requirements that NICE does not address.
Attribute Eng 1 / Entry Eng 2 / Junior Eng 3 / Mid Eng 4 / Senior Eng 5 / Staff Eng 6 / Senior Staff Eng 7 / Principal
General DescriptionEntry-level OT security engineer learning the fundamentals of industrial control system security and operational technology environments. Assists with OT asset inventories, network monitoring, and basic vulnerability assessments. Develops foundational understanding of ICS architectures, industrial protocols, and the critical differences between IT and OT security — including why availability and safety always take priority over confidentiality.Junior OT security engineer capable of performing basic OT security tasks independently. Can operate passive monitoring tools, conduct guided vulnerability assessments in OT environments, and assist with network segmentation projects. Understands why OT patching requires careful coordination with operations and maintenance windows, and can communicate effectively with both IT security and plant operations teams.Experienced OT security engineer who independently conducts comprehensive ICS security assessments, leads network segmentation projects, and manages OT vulnerability programs. Expert in balancing security controls with operational availability and safety requirements. Understands the operational impact of security decisions on production processes and can design compensating controls when patching is not feasible. Leads coordination between IT security, OT engineering, and plant operations.Senior OT security engineer and subject matter expert who leads complex, multi-facility OT security programs. Drives IEC 62443 compliance programs, develops OT security standards, and leads incident response in critical infrastructure environments. Deep expertise in industrial control systems enables them to understand the full attack chain from IT network intrusion through to safety system compromise. Trusted advisor to plant operations leadership on cyber-physical risk.Staff-level OT security engineer with cross-team influence who builds OT security frameworks and methodologies used across the entire organization. Drives convergence of IT and OT security operations while respecting the unique requirements of operational technology. Develops reference architectures, assessment frameworks, and maturity models that standardize OT security practices across diverse facilities, industries, and control system vendors.Organization-wide OT security authority who defines the strategic direction for operational technology security across the enterprise. Drives enterprise IT/OT convergence strategy while ensuring OT-specific safety and availability requirements are preserved. Recognized internally and externally as a leading authority on ICS/OT security. Shapes the organization's approach to securing critical infrastructure against nation-state and sophisticated threats.Industry-defining OT security expert whose work shapes how the entire field approaches industrial control system security. Contributions fundamentally advance the state of OT security through novel research, standards development, or transformative security architectures. Known throughout the ICS security community as a top authority. May hold named positions such as Distinguished Engineer or Fellow. Influence extends across industry, government, and academia.
Primary Responsibilities
  • Assist with OT asset inventory and documentation
  • Monitor OT network traffic using passive monitoring tools
  • Learn industrial protocols (Modbus, DNP3, EtherNet/IP, OPC UA)
  • Support OT vulnerability scanning under supervision
  • Document OT network topologies and data flows
  • Assist with OT security policy compliance checks
  • Shadow senior engineers during ICS security assessments
  • Maintain documentation of PLCs, HMIs, and SCADA systems
  • Operate OT network monitoring and asset discovery tools
  • Conduct OT vulnerability assessments with guidance
  • Assist with OT network segmentation planning and implementation
  • Analyze OT network traffic for anomalies and unauthorized communications
  • Support OT patch management coordination with operations teams
  • Maintain OT asset inventory databases with current firmware versions
  • Assist with OT firewall rule reviews and DMZ configurations
  • Document OT security incidents and support response activities
  • Help enforce USB and removable media policies in OT environments
  • Lead OT security assessments and gap analyses for facilities
  • Design and implement OT network segmentation aligned to the Purdue Model
  • Manage OT vulnerability management programs including compensating controls
  • Conduct deep packet inspection and protocol analysis of ICS traffic
  • Develop OT-specific incident response procedures and playbooks
  • Implement and tune OT network monitoring and anomaly detection
  • Lead OT security aspects of change management processes
  • Mentor junior OT security engineers
  • Evaluate and deploy OT security tools and technologies
  • Conduct risk assessments considering both cyber and safety impacts
  • Lead enterprise-wide OT vulnerability management and risk reduction programs
  • Drive IEC 62443 compliance and zone/conduit modeling across facilities
  • Lead OT incident response and coordinate with ICS-CERT and sector ISACs
  • Design secure architectures for new industrial systems and facility expansions
  • Develop OT security standards, policies, and technical guidelines
  • Conduct advanced threat hunting in OT environments
  • Evaluate safety system (SIS) cyber protections and air-gap integrity
  • Lead vendor security assessments for ICS/SCADA product acquisitions
  • Develop and deliver OT security training for operations staff
  • Advise leadership on OT security investment priorities and risk posture
  • Build enterprise OT security frameworks and maturity models
  • Drive IT/OT security operations center (SOC) convergence strategy
  • Develop OT security reference architectures for new facility designs
  • Lead cross-functional OT security initiatives spanning multiple business units
  • Create OT-specific threat intelligence programs and sharing mechanisms
  • Define OT security metrics, KPIs, and reporting for executive dashboards
  • Architect secure remote access solutions for multi-site OT environments
  • Lead OT security aspects of M&A due diligence and integration
  • Develop and maintain OT security testbed and simulation environments
  • Drive OT security automation and orchestration initiatives
  • Define enterprise-wide OT security strategy and multi-year roadmap
  • Lead IT/OT convergence strategy ensuring safety and availability preservation
  • Establish OT security governance frameworks across all business units
  • Drive organizational response to nation-state OT threats (PIPEDREAM, TRITON, Industroyer)
  • Define OT security requirements for enterprise digital transformation initiatives
  • Lead OT security aspects of enterprise risk management and insurance
  • Establish OT security vendor strategy and technology partnerships
  • Represent the organization to government agencies on critical infrastructure protection
  • Drive OT security innovation and emerging technology adoption
  • Advise C-suite on OT cyber-physical risk and business continuity
  • Shape industry direction for OT/ICS security through research and standards
  • Define next-generation OT security architectures and methodologies
  • Lead industry-wide responses to critical OT threats and vulnerabilities
  • Contribute to national and international ICS security standards (IEC 62443, NIST)
  • Advise government agencies on critical infrastructure cyber defense
  • Drive fundamental innovation in OT security detection and response
  • Publish groundbreaking research on ICS vulnerabilities and defenses
  • Shape organizational security strategy at the highest level
  • Build and lead world-class OT security research and engineering teams
  • Define the future of secure industrial automation and Industry 4.0
Required Skills
  • Basic understanding of ICS/SCADA architectures
  • Familiarity with industrial protocols (Modbus, DNP3, EtherNet/IP)
  • Understanding of the Purdue Model for ICS network segmentation
  • Basic networking fundamentals (TCP/IP, VLANs, firewalls)
  • Awareness of IT vs. OT security differences
  • Documentation and communication skills
  • Willingness to learn industrial processes and safety concepts
  • Proficiency with OT monitoring platforms (Claroty, Nozomi Networks, or Dragos)
  • Understanding of industrial protocols and their security implications
  • OT network segmentation concepts and firewall configuration
  • Basic vulnerability assessment in ICS environments
  • Understanding of OT patch management constraints and compensating controls
  • Knowledge of common ICS attack vectors and TTPs
  • Ability to read and interpret network diagrams and PLC logic
  • Communication skills for bridging IT security and operations teams
  • Expert-level OT network monitoring and anomaly detection
  • Advanced knowledge of industrial protocols and their vulnerabilities
  • OT network architecture and segmentation design (Purdue Model levels 0-5)
  • ICS vulnerability management with compensating controls strategies
  • OT incident response procedures and forensics basics
  • IEC 62443 and NIST SP 800-82 compliance requirements
  • Understanding of safety instrumented systems (SIS) and their protection
  • Proficiency with multiple OT security platforms (Claroty, Nozomi, Dragos)
  • Risk assessment methodologies adapted for OT environments
  • Deep expertise in ICS/SCADA security across multiple vendor platforms
  • IEC 62443 compliance implementation and zone/conduit modeling
  • Advanced OT threat hunting and incident response
  • Safety instrumented system (SIS) security and SIL assessment
  • OT security program development and maturity assessment
  • Multi-facility OT security architecture and standards
  • Advanced industrial protocol analysis and vulnerability research
  • MITRE ATT&CK for ICS framework application
  • Executive-level risk communication for cyber-physical threats
  • Vendor management and ICS product security assessment
  • Enterprise-scale OT security program design and implementation
  • IT/OT SOC convergence strategy and implementation
  • OT security maturity assessment and roadmap development
  • Multi-vendor ICS platform expertise (Siemens, Rockwell, Honeywell, Schneider Electric, ABB)
  • OT threat intelligence analysis and operationalization
  • Cross-industry OT security knowledge (energy, manufacturing, water, transportation)
  • OT security automation and orchestration (SOAR adaptation for OT)
  • Advanced OT network architecture across complex multi-site environments
  • Strategic risk communication for boards and C-suite
  • M&A OT security due diligence methodology
  • Enterprise OT security strategy development and execution
  • IT/OT convergence leadership with deep understanding of both domains
  • Nation-state OT threat landscape and advanced persistent threat defense
  • Critical infrastructure regulatory landscape across sectors
  • OT security governance and organizational design
  • Enterprise risk management for cyber-physical systems
  • Executive and board communication on OT risk
  • OT security innovation and emerging technology evaluation (IIoT, 5G, edge)
  • Multi-sector OT security expertise
  • Vendor and technology partnership strategy
  • Industry-recognized OT security expertise and thought leadership
  • Deep expertise across multiple industrial sectors and control system platforms
  • Original research contributions to ICS security
  • Standards development experience (IEC 62443, NIST SP 800-82, ISA)
  • Government advisory experience on critical infrastructure protection
  • Ability to anticipate and address emerging OT threat landscapes
  • Vision for secure industrial digital transformation
  • Executive influence and strategic communication at the highest levels
  • Building and leading elite OT security teams
  • Cross-disciplinary expertise spanning cybersecurity, control systems, and safety engineering
Preferred Skills
  • Exposure to PLCs or HMI programming (Siemens, Allen-Bradley, etc.)
  • Basic familiarity with OT monitoring tools (Claroty, Nozomi Networks, Dragos)
  • Understanding of safety instrumented systems (SIS) concepts
  • Background in electrical engineering or control systems
  • Familiarity with IEC 62443 standard framework
  • Experience with Tenable.ot or similar OT vulnerability management
  • Familiarity with ICS-CERT advisories and vulnerability tracking
  • Basic understanding of PLC programming (ladder logic, function blocks)
  • Wireshark protocol analysis with OT protocol dissectors
  • Exposure to safety instrumented systems and SIL ratings
  • PLC/DCS programming and configuration experience
  • Industrial networking protocols (PROFINET, HART, Foundation Fieldbus)
  • NERC CIP compliance experience (for energy sector)
  • OT forensics and evidence preservation in industrial environments
  • Secure remote access design for OT environments
  • Experience with TRITON/TRISIS-style safety system attacks
  • Red team assessment experience targeting ICS environments
  • NERC CIP, TSA Pipeline Security, or sector-specific regulation expertise
  • Industrial process knowledge (power generation, manufacturing, water treatment)
  • Testbed and simulation environment design for OT security validation
  • OT security product evaluation and vendor strategy
  • Digital twin and simulation technology for security testing
  • OT cloud connectivity security (IIoT, edge computing)
  • Machine learning applications for OT anomaly detection
  • International OT security standards beyond IEC 62443
  • Published research or thought leadership in OT security
  • Government advisory board participation (CISA, sector coordinating councils)
  • OT security program design for global organizations
  • Operational technology insurance and risk transfer strategy
  • Digital transformation security architecture for industrial organizations
  • Named researcher with published CVEs or advisories in ICS products
  • Author of widely adopted OT security tools, frameworks, or methodologies
  • Academic collaboration and research direction
  • Patent holder in OT security technology
  • International standards committee leadership
Mentorship RequirementsReceives direct mentorship from Senior OT security engineers. Shadows on ICS security assessments and OT network reviews. Expected to develop understanding of industrial processes and safety implications within first 6 months. Must learn why traditional IT security approaches often fail in OT environments.Receives guidance from Senior OT security engineers on complex assessments and incident response. Expected to begin understanding plant operations workflows and maintenance windows. Should be developing relationships with control system engineers and operators. Begins informal mentoring of Entry-level engineers.Mentors Junior and Entry-level OT security engineers. Expected to guide others on OT-specific constraints and risk management. Develops training materials on OT security concepts. Serves as a bridge between traditional IT security thinking and OT operational realities.Mentors Mid and Junior engineers. Develops OT security career paths and training programs. Provides technical leadership across the OT security team. Expected to contribute to industry knowledge sharing through conference presentations or working groups.Mentors Senior and Mid-level OT security engineers across the organization. Develops organization-wide OT security training curricula. Guides career development for OT security professionals. Expected to contribute to industry through SANS, ISA, or similar organizations.Mentors Staff and Senior engineers on strategic thinking and leadership. Develops the next generation of OT security leaders within the organization. Expected to actively contribute to the broader OT security community through publications, conference keynotes, and standards development.Mentors at all levels across the organization and industry. Develops OT security talent pipelines through academic partnerships and training programs. Influences the next generation of OT security professionals through publications, teaching, and community engagement. Expected to give back to the industry at a fundamental level.
Impact ScopeIndividual contributor on assigned asset inventory and documentation tasks. Impact limited to supporting OT security assessment activities. Work is reviewed before implementation in production OT environments due to safety criticality.Directly contributes to OT security monitoring and vulnerability management. Responsible for accurate asset inventory and monitoring coverage. Work impacts security posture of specific facilities or production lines. Beginning to influence OT security practices within assigned scope.Responsible for OT security posture across assigned facilities or regions. Assessment findings directly influence capital investment and remediation priorities. Network segmentation designs protect critical infrastructure processes. Decisions impact production availability and safety.Impacts OT security strategy and risk posture across multiple facilities or business units. Standards and architectures protect critical infrastructure operations. Incident response actions have direct implications for public safety and operational continuity. Influences capital expenditure decisions for security improvements.Influences OT security practices across the entire organization. Frameworks and reference architectures adopted across all facilities. IT/OT convergence decisions affect enterprise security operations. Work impacts organizational risk posture for critical infrastructure.Shapes the entire organization's OT security posture and strategy. Decisions affect critical infrastructure protection at an enterprise scale. IT/OT convergence strategy impacts every business unit. External engagement influences sector-wide security practices.Industry-wide impact on OT security practices and standards. Research and frameworks adopted across critical infrastructure sectors globally. Influences national and international policy on critical infrastructure protection. Contributions fundamentally advance the field of ICS security.
Autonomy & Decision AuthorityWorks under close supervision. Follows established OT security procedures strictly — OT environments have zero tolerance for unplanned disruptions. No authority to make changes to production OT networks or systems. Escalates all findings to senior engineers.Works with moderate supervision. Can make routine monitoring and triage decisions. Authority to escalate OT security alerts based on established criteria. Must coordinate with operations before any active assessment activities. Escalates complex vulnerabilities and potential safety impacts.Works independently on most OT security tasks. Authority to lead assessments, design segmentation architectures, and recommend compensating controls. Makes risk-based decisions on vulnerability prioritization. Escalates decisions that could impact production availability or safety systems.High autonomy in technical OT security decisions. Authority to define OT security standards and approve compensating controls. Makes risk acceptance recommendations to leadership. Can authorize emergency security measures during OT incidents. Decisions are reviewed for strategic alignment, not technical correctness.Operates with high autonomy across organizational boundaries. Authority to define enterprise OT security standards and reference architectures. Influences capital budget allocation for OT security programs. Makes strategic technology decisions for OT security tooling. Reports to senior security or operations leadership.Operates as the organization's highest OT security technical authority. Authority to set enterprise OT security policy and strategy. Influences board-level risk decisions related to operational technology. Can direct emergency response across all OT environments. Strategic decisions are aligned with CISO and CTO.Fully autonomous in defining OT security technical direction. Authority to commit organizational resources to strategic security initiatives. Decisions shape industry standards and best practices. Peer to senior executives on matters of critical infrastructure security.
Communication & StakeholdersPrimarily internal communication with OT security team. Limited interaction with plant operators and control system engineers initially. Documents findings for team review.Regular interaction with plant operations and control system engineering teams. Presents monitoring findings and vulnerability status. Participates in change management meetings. Communicates with IT security teams on IT/OT boundary issues.Regular engagement with facility managers, control system engineers, and IT security leadership. Presents risk assessments and remediation plans to plant management. Coordinates with vendors on ICS patches and updates. Communicates with regulatory bodies on compliance matters.Regular engagement with facility directors, VP of Operations, and CISO. Presents OT risk posture to executive leadership and board committees. Coordinates with government agencies (CISA, ICS-CERT) and sector ISACs. Represents the organization at industry conferences and working groups.Regular engagement with CISO, CTO, VP Operations, and business unit leaders. Presents OT security strategy to board risk committees. Represents the organization in industry working groups and government advisory bodies. Coordinates across business units and regional operations.Direct engagement with CISO, CTO, COO, and board of directors. Represents the organization to CISA, DHS, and sector-specific regulators. Keynotes at industry conferences (S4, SANS ICS Summit). Participates in government advisory councils and standards bodies.Engages with CEOs, boards of directors, government officials, and international standards bodies. Keynotes at premier ICS security conferences (S4, SANS ICS Summit, DEF CON ICS Village). Advises national cybersecurity leadership. Publishes widely cited research and frameworks.
Degree / ExperienceBachelor's degree in Electrical Engineering, Control Systems Engineering, Industrial Engineering, Computer Science, Cybersecurity, or related field, OR 1-2 years of OT/ICS experience or IT security experience with demonstrated interest in OT.Bachelor's degree in Electrical Engineering, Control Systems Engineering, Computer Science, or related field, OR 2-4 years of OT/ICS experience or IT security experience with OT exposure. Demonstrated understanding of industrial processes.Bachelor's degree in Electrical Engineering, Control Systems Engineering, Computer Science, or related field with 4-6 years of OT security or related experience, OR equivalent combination of industrial engineering and security experience.Bachelor's or Master's degree in Electrical Engineering, Control Systems Engineering, Computer Science, or related field with 7-10 years of OT security experience, OR extensive industrial control systems experience combined with security expertise.Bachelor's or Master's degree in Electrical Engineering, Control Systems Engineering, Computer Science, or related field with 10-14 years of OT security and industrial systems experience, OR equivalent depth from combined engineering and security career.Master's degree or equivalent in Electrical Engineering, Control Systems, Computer Science, or related field with 14-18 years of OT security and industrial systems experience. Recognized as an authority in OT security.Master's or Ph.D. in Electrical Engineering, Control Systems, Computer Science, or related field with 18+ years of OT security experience, OR equivalent through exceptional and recognized contributions to ICS security. Industry recognition is paramount.
Certifications
  • CompTIA Security+
  • GIAC Global Industrial Cyber Security Professional (GICSP) - in progress
  • ISA/IEC 62443 Cybersecurity Certificate Program - Fundamentals
  • Certified SCADA Security Architect (CSSA) - in progress
  • GICSP (GIAC Global Industrial Cyber Security Professional)
  • ISA/IEC 62443 Cybersecurity Certificate Program
  • Certified SCADA Security Architect (CSSA)
  • CompTIA Security+ (if not already held)
  • GICSP (GIAC Global Industrial Cyber Security Professional)
  • GRID (GIAC Response and Industrial Defense)
  • ISA/IEC 62443 Cybersecurity Certificate Program
  • Certified SCADA Security Architect (CSSA)
  • GICSP (GIAC Global Industrial Cyber Security Professional)
  • GRID (GIAC Response and Industrial Defense)
  • ISA/IEC 62443 Cybersecurity Expert
  • CISSP with ICS domain knowledge
  • CSSA (Certified SCADA Security Architect)
  • GICSP and GRID
  • ISA/IEC 62443 Cybersecurity Expert
  • CISSP
  • CSSA (Certified SCADA Security Architect)
  • Relevant sector certifications (NERC CIP, etc.)
  • GICSP, GRID, and advanced SANS ICS certifications
  • ISA/IEC 62443 Cybersecurity Expert
  • CISSP or CISM
  • Relevant sector-specific certifications
  • Industry recognition and advisory board memberships
  • Certifications are secondary to demonstrated expertise and industry recognition
  • GICSP, GRID, and advanced ICS security certifications
  • ISA Fellow or equivalent professional recognition
  • Standards committee memberships (IEC, ISA, NIST)
  • Advisory board positions with government agencies or industry bodies
Salary: US Gov't$60,000 - $85,000 (GS-9 to GS-11)$75,000 - $100,000 (GS-11 to GS-12)$95,000 - $125,000 (GS-12 to GS-13)$120,000 - $160,000 (GS-14 to GS-15)$140,000 - $175,000 (GS-14 to GS-15)$150,000 - $191,000 (GS-15 to SES)$170,000 - $191,000+ (GS-15 Step 10 to SES)
Salary: US Startup$75,000 - $100,000$90,000 - $120,000$115,000 - $155,000$150,000 - $200,000$175,000 - $230,000$210,000 - $280,000$250,000 - $350,000+
Salary: US Corporate$70,000 - $95,000$85,000 - $115,000$110,000 - $150,000$150,000 - $200,000$180,000 - $240,000$220,000 - $280,000$260,000 - $350,000+
Salary: Big Tech (Mag7)$130,000 - $200,000$170,000 - $270,000$250,000 - $400,000$350,000 - $530,000$400,000 - $600,000$500,000 - $720,000$600,000 - $1,000,000+
↑ Back to navigation

OT Security Architect

Strategic technical leaders who design security architectures for converged IT/OT environments. Focus on Purdue Model implementation, IEC 62443 compliance, OT network architecture, secure remote access for industrial environments, and aligning OT security with enterprise security strategy. Architects bridge the gap between traditional enterprise security architecture and the unique safety, availability, and protocol requirements of industrial control systems.

NICE Framework: SP-ARC-002 Security Architect partial NICE's architecture role is IT-focused. OT security architecture requires specialized knowledge of Purdue Model, IEC 62443, and industrial protocol security.
Attribute Architect 1 / Entry Architect 2 / Junior Architect 3 / Mid Architect 4 / Senior Architect 5 / Staff Architect 6 / Senior Staff Architect 7 / Principal
General DescriptionEntry-level OT security architect learning the principles of industrial control system architecture and security design for operational technology environments. Assists with architecture documentation, Purdue Model assessments, and security design reviews. Develops foundational understanding of how industrial systems are architected and why their security requirements differ fundamentally from IT systems.Junior OT security architect capable of contributing to OT security design work and conducting Purdue Model assessments with guidance. Demonstrates proficiency in OT network architecture patterns and can participate in design reviews for industrial environments. Understands the critical importance of maintaining safety and availability in all architectural decisions.Experienced OT security architect who independently designs comprehensive security architectures for industrial environments. Leads Purdue Model implementations, IEC 62443 zone and conduit modeling, and OT network redesign projects. Expert in balancing security architecture decisions with operational constraints — understanding that every architecture change in OT carries safety and availability implications that do not exist in IT environments.Senior OT security architect and trusted authority who defines OT security architecture strategy for the organization. Leads complex, multi-site architecture programs including IT/OT convergence, IEC 62443 compliance architectures, and secure digital transformation for industrial operations. Deep expertise across multiple industrial sectors and control system platforms enables holistic architecture decisions that protect both cyber and physical domains.Staff-level OT security architect with cross-organizational influence who develops OT security architecture frameworks, reference architectures, and design principles used enterprise-wide. Drives the architectural vision for secure industrial digital transformation. Ensures that OT security architecture evolves to address emerging threats while maintaining the safety and reliability guarantees that critical infrastructure demands.Organization-wide OT security architecture authority who sets the architectural vision for securing all operational technology and critical infrastructure across the enterprise. Defines the strategic approach to IT/OT convergence, industrial digital transformation, and critical infrastructure resilience. Recognized internally and externally as a leading authority on OT security architecture. Shapes how the organization thinks about the intersection of cybersecurity, safety, and industrial operations.Industry-defining OT security architect whose architectural thinking shapes how the entire field approaches securing industrial control systems and critical infrastructure. Contributions fundamentally advance OT security architecture through novel frameworks, transformative reference architectures, or groundbreaking approaches to IT/OT convergence. Known throughout the ICS security community as a top architectural authority. Influence extends across industry, government, and standards bodies worldwide.
Primary Responsibilities
  • Assist with documenting existing OT network architectures
  • Learn Purdue Model concepts and zone/conduit mapping
  • Support security design reviews for OT projects
  • Document OT security architecture decisions and rationale
  • Research IEC 62443 standards and compliance requirements
  • Assist with OT asset classification and criticality assessment
  • Learn industrial network design principles
  • Shadow senior architects on OT security architecture reviews
  • Conduct Purdue Model assessments for existing OT environments
  • Contribute to OT network segmentation architecture designs
  • Perform security design reviews for OT projects and upgrades
  • Develop zone and conduit diagrams per IEC 62443
  • Create OT security architecture documentation and standards
  • Assess OT remote access solutions for security gaps
  • Support OT DMZ design between IT and OT networks
  • Evaluate OT security products for architectural fit
  • Contribute to OT security reference architectures
  • Design OT security architectures for new facilities and major upgrades
  • Lead IEC 62443 zone and conduit modeling and compliance architecture
  • Architect OT network segmentation and microsegmentation strategies
  • Design secure IT/OT DMZ architectures and data exchange patterns
  • Lead security architecture reviews for ICS/SCADA projects
  • Develop OT security reference architectures for the organization
  • Design secure remote access architectures for multi-site OT environments
  • Architect OT data integration patterns (historian, MES, ERP connectivity)
  • Mentor junior OT security architects
  • Evaluate and architect solutions for OT security monitoring platforms
  • Define OT security architecture strategy across the enterprise
  • Lead multi-site OT security architecture programs and transformations
  • Architect enterprise IT/OT convergence with safety preservation
  • Drive IEC 62443 compliance architecture across all facilities
  • Design security architectures for Industry 4.0 and digital transformation
  • Lead architecture governance for all OT security projects
  • Develop enterprise OT security architecture standards and patterns
  • Architect threat-informed defenses against nation-state OT threats
  • Lead OT security architecture aspects of M&A integration
  • Advise leadership on OT security architecture investment priorities
  • Develop enterprise OT security architecture frameworks and principles
  • Drive architectural vision for secure industrial digital transformation
  • Create OT security reference architectures adopted across all facilities
  • Lead architectural evaluation of emerging OT technologies and threats
  • Define OT security architecture requirements for enterprise platforms
  • Architect enterprise-wide OT visibility and monitoring architectures
  • Drive OT security architecture standardization across diverse operations
  • Lead cross-functional architecture initiatives spanning IT, OT, and safety
  • Define architecture review processes and governance for OT security
  • Shape OT security vendor roadmaps through strategic partnerships
  • Set enterprise-wide OT security architecture vision and strategy
  • Define architectural principles for secure IT/OT convergence
  • Lead OT security architecture for enterprise digital transformation
  • Establish OT security architecture governance across all business units
  • Drive architectural response to evolving nation-state OT threats
  • Define OT security architecture requirements for M&A and new ventures
  • Shape OT security product and technology market through vendor engagement
  • Advise C-suite on OT security architecture implications for business strategy
  • Lead industry architecture working groups and standards development
  • Drive innovation in OT security architecture for next-generation industrial systems
  • Define next-generation OT security architecture paradigms
  • Shape industry direction for critical infrastructure security architecture
  • Lead development of international OT security architecture standards
  • Drive fundamental innovation in OT security architecture methodologies
  • Advise national governments on critical infrastructure architecture strategy
  • Define architectural approaches for securing next-generation industrial systems
  • Publish transformative OT security architecture research and frameworks
  • Shape organizational security architecture strategy at the highest level
  • Build and lead world-class OT security architecture teams
  • Define the architectural future of secure industrial automation
Required Skills
  • Understanding of network architecture principles
  • Familiarity with the Purdue Model for ICS networks
  • Basic knowledge of industrial control system components (PLCs, HMIs, SCADA, DCS)
  • Understanding of network segmentation concepts
  • Knowledge of firewall and DMZ architecture
  • Documentation and diagramming skills (Visio, draw.io)
  • Basic understanding of industrial protocols
  • Purdue Model assessment and zone/conduit mapping methodology
  • OT network segmentation design principles
  • Industrial firewall and DMZ architecture (Palo Alto, Fortinet OT, Tofino)
  • IEC 62443 zone and conduit modeling
  • Understanding of industrial protocol flows across Purdue levels
  • OT remote access architecture (jump servers, secure enclaves)
  • Security design review methodology for OT environments
  • Communication skills for translating between IT and OT stakeholders
  • Comprehensive Purdue Model architecture design and implementation
  • IEC 62443 compliance architecture and zone/conduit methodology
  • Advanced OT network segmentation and microsegmentation
  • IT/OT DMZ architecture with data diodes and unidirectional gateways
  • Multi-site OT security architecture design
  • Secure remote access architecture for industrial environments
  • OT data flow architecture (historians, MQTT, OPC UA security)
  • Industrial firewall and IDS/IPS architecture
  • Safety system isolation architecture
  • Risk-based architecture decision making for OT environments
  • Enterprise-scale OT security architecture strategy and design
  • Multi-site, multi-sector OT architecture expertise
  • IT/OT convergence architecture with safety and availability guarantees
  • IEC 62443 architecture across complex organizational structures
  • Industry 4.0 and IIoT security architecture
  • Advanced threat modeling for critical infrastructure
  • MITRE ATT&CK for ICS integration into architecture decisions
  • Executive-level architecture communication and strategic planning
  • OT vendor ecosystem architecture strategy (Siemens, Rockwell, Honeywell, Schneider Electric)
  • Architecture governance and standards development
  • Enterprise OT security architecture framework development
  • Cross-industry OT security architecture patterns (energy, manufacturing, water, transportation)
  • Architectural leadership for secure industrial digital transformation
  • Advanced IT/OT/IoT convergence architecture
  • OT security architecture governance and review processes
  • Emerging technology architecture assessment (AI/ML in OT, edge, 5G)
  • Enterprise-scale OT monitoring and detection architecture
  • Strategic vendor and technology partnership architecture
  • Board-level architecture strategy communication
  • Architecture for resilience and recovery of critical OT systems
  • Enterprise OT security architecture vision and strategy leadership
  • IT/OT convergence architecture at enterprise scale
  • Critical infrastructure resilience architecture
  • Advanced threat-informed OT security architecture
  • Architecture governance for global industrial operations
  • Executive and board-level architecture strategy communication
  • Industry-shaping architectural thought leadership
  • Next-generation industrial security architecture (autonomous systems, AI, edge)
  • Global regulatory and standards landscape for OT security architecture
  • Architecture for enterprise-wide cyber-physical risk management
  • Industry-recognized OT security architecture expertise and vision
  • Architectural innovation across multiple industrial sectors
  • Original contributions to OT security architecture methodology
  • International standards development leadership (IEC 62443, ISA, NIST)
  • Government advisory on critical infrastructure architecture policy
  • Vision for architectural evolution of industrial cybersecurity
  • Cross-disciplinary architecture spanning cyber, physical, and safety domains
  • Executive influence and strategic communication at the highest levels
  • Building and leading elite OT security architecture teams
  • Defining architectural paradigms adopted across the industry
Preferred Skills
  • Background in control systems or industrial engineering
  • Familiarity with IEC 62443 standard framework
  • Experience with enterprise architecture frameworks (TOGAF, SABSA)
  • Basic understanding of safety systems and SIL concepts
  • Exposure to OT vendor platforms (Siemens, Rockwell, Honeywell)
  • Experience with industrial networking (PROFINET, EtherNet/IP infrastructure)
  • Data diode and unidirectional gateway technology
  • OT historian and data integration architecture
  • Cloud connectivity patterns for industrial IoT
  • Safety system architecture and SIS isolation
  • Industrial wireless security architecture (ISA100.11a, WirelessHART)
  • Edge computing and IIoT security architecture
  • NERC CIP architecture requirements (for energy sector)
  • Virtualization and thin client architecture for OT
  • Disaster recovery architecture for critical OT systems
  • Architecture for converged IT/OT security operations centers
  • 5G and private LTE architecture for industrial environments
  • Digital twin architecture for security validation
  • Architecture for regulated OT environments (nuclear, pipeline, grid)
  • Zero trust architecture adaptation for OT networks
  • Zero trust architecture for OT environments
  • Architecture for autonomous industrial systems
  • Global OT security architecture across international operations
  • Architecture for OT security in cloud-connected industrial environments
  • Safety and security architecture co-design methodologies
  • Published OT security architecture research or frameworks
  • Government advisory experience on critical infrastructure architecture
  • Architecture for nuclear, defense, or high-consequence OT environments
  • International OT security architecture standards leadership
  • Architecture innovation for Industry 5.0 concepts
  • Author of widely adopted OT security architecture frameworks
  • Named architect of transformative industrial security implementations
  • Academic collaboration on OT security architecture research
  • Patent holder in OT security architecture technology
  • International standards committee chair or leadership
Mentorship RequirementsReceives direct mentorship from Senior OT security architects. Shadows on architecture reviews and Purdue Model assessments. Expected to develop foundational understanding of industrial processes and safety considerations within first 6 months. Must learn how OT architecture constraints differ from IT.Receives guidance from Senior OT security architects on complex architecture decisions. Expected to develop expertise in specific industrial sectors or vendor platforms. Should be building relationships with control system engineers and enterprise architects. Begins contributing to architecture review processes.Mentors Junior and Entry-level architects. Expected to guide others on OT-specific architecture constraints and design patterns. Develops architecture standards and templates. Serves as a bridge between enterprise architecture and OT engineering.Mentors Mid and Junior architects. Develops OT security architecture career paths and skills frameworks. Provides architectural leadership across the organization. Expected to contribute to industry through standards bodies, publications, and conference presentations.Mentors Senior and Mid-level architects across the organization. Develops OT security architecture training and skill development programs. Guides career development for OT security architects. Expected to contribute to industry architecture standards through ISA, IEC, or NIST.Mentors Staff and Senior architects on strategic architectural thinking. Develops the next generation of OT security architecture leaders. Expected to contribute to the broader community through publications, keynotes, and standards leadership. Shapes the architectural profession within OT security.Mentors at all levels across the organization and industry. Develops OT security architecture talent through academic partnerships and training. Influences the next generation of OT security architects through publications, teaching, and community. Expected to advance the architectural profession in OT security.
Impact ScopeIndividual contributor on documentation and research tasks. Impact limited to supporting architecture deliverables. Work is reviewed by senior architects before use in design decisions. Contributes to architecture team effectiveness.Directly contributes to OT security architecture deliverables. Zone and conduit models inform segmentation decisions. Design reviews impact the security of new OT projects. Beginning to influence architecture standards within assigned scope.Responsible for OT security architecture across assigned facilities or regions. Architecture designs directly shape the security posture of critical infrastructure. Segmentation and DMZ designs protect operational processes. Reference architectures adopted across multiple facilities.Impacts OT security architecture strategy across the enterprise. Architecture decisions shape security posture of critical infrastructure at scale. IT/OT convergence architecture affects every business unit. Influences multi-year capital investment in OT security.Influences OT security architecture direction across the entire organization. Reference architectures and frameworks adopted globally. Architecture decisions shape critical infrastructure protection strategy. Vendor partnership architecture impacts industry product direction.Shapes the entire organization's OT security architecture direction. Architectural decisions affect critical infrastructure protection at enterprise scale. Convergence architecture impacts every business unit and facility. External engagement influences industry-wide architecture practices.Industry-wide impact on OT security architecture practices and standards. Architectural frameworks adopted across critical infrastructure sectors globally. Influences national and international policy on critical infrastructure architecture. Contributions fundamentally advance how industrial systems are secured.
Autonomy & Decision AuthorityWorks under close supervision. Follows established architecture standards and templates. No authority to make OT architecture decisions independently. Escalates all design questions to senior architects.Works with moderate supervision. Can conduct assessments and produce architecture documentation independently. Authority to identify gaps and recommend improvements. Escalates significant architecture decisions and anything impacting safety systems.Works independently on most OT security architecture tasks. Authority to design architectures, select technology approaches, and define standards. Makes risk-based architecture decisions. Escalates decisions with significant safety or availability impact.High autonomy in OT security architecture decisions. Authority to define enterprise architecture standards and approve designs. Makes strategic technology and vendor architecture decisions. Decisions are reviewed for business alignment, not technical correctness.Operates with high autonomy across organizational boundaries. Authority to define enterprise OT security architecture principles and standards. Influences major capital investment decisions for OT security infrastructure. Makes strategic architecture decisions that shape multi-year programs.Operates as the organization's highest OT security architecture authority. Authority to set enterprise OT security architecture policy and direction. Influences board-level decisions on OT technology and security investment. Strategic architecture decisions aligned with CISO, CTO, and COO.Fully autonomous in defining OT security architecture direction. Authority to commit organizational resources to architectural innovation. Decisions shape industry architecture standards and practices. Peer to senior executives on matters of critical infrastructure architecture.
Communication & StakeholdersPrimarily internal communication with OT security architecture team. Documents findings and research. Participates in architecture review meetings as observer. Limited stakeholder interaction outside immediate team.Regular interaction with OT engineering, plant operations, and IT architecture teams. Presents assessment findings and architecture recommendations. Participates in project design reviews. Communicates with vendors on product architecture.Regular engagement with facility managers, enterprise architects, and IT/OT leadership. Presents architecture designs to project stakeholders and leadership. Coordinates with ICS vendors on product integration architecture. Communicates with compliance teams on IEC 62443 requirements.Regular engagement with CISO, CTO, VP Operations, and enterprise architecture leadership. Presents OT security architecture strategy to executive leadership and board committees. Coordinates with government agencies on critical infrastructure architecture guidance. Represents the organization at industry architecture forums.Regular engagement with CISO, CTO, COO, and enterprise architecture leadership. Presents architecture strategy to board risk and technology committees. Represents the organization at industry standards bodies and architecture forums. Coordinates across business units on architecture alignment.Direct engagement with CISO, CTO, COO, and board of directors. Represents the organization to government agencies on critical infrastructure architecture. Keynotes at premier industry conferences (S4, SANS ICS Summit, RSA). Leads industry architecture working groups and standards committees.Engages with CEOs, boards of directors, government officials, and international standards bodies. Keynotes at premier conferences (S4, SANS ICS Summit, RSA, Black Hat). Advises national cybersecurity leadership on architecture. Publishes widely cited architectural research and frameworks.
Degree / ExperienceBachelor's degree in Electrical Engineering, Control Systems Engineering, Computer Science, or related field, OR 3-4 years of OT/ICS experience or IT architecture experience with interest in OT. Understanding of industrial system architecture concepts.Bachelor's degree in Electrical Engineering, Control Systems Engineering, Computer Science, or related field, OR 4-6 years of OT/ICS or IT architecture experience with demonstrated OT knowledge. Understanding of industrial processes and safety considerations.Bachelor's or Master's degree in Electrical Engineering, Control Systems Engineering, Computer Science, or related field with 6-9 years of OT security architecture or related experience, OR equivalent combination of industrial engineering and security architecture experience.Bachelor's or Master's degree in Electrical Engineering, Control Systems Engineering, Computer Science, or related field with 10-14 years of OT security architecture or related experience, OR extensive architecture experience across industrial control systems and cybersecurity.Master's degree in Electrical Engineering, Control Systems, Computer Science, or related field with 14-18 years of OT security architecture and industrial systems experience, OR equivalent depth from combined engineering and security architecture career.Master's degree or equivalent in Electrical Engineering, Control Systems, Computer Science, or related field with 16-20 years of OT security architecture and industrial systems experience. Recognized as an authority in OT security architecture.Master's or Ph.D. in Electrical Engineering, Control Systems, Computer Science, or related field with 20+ years of OT security architecture experience, OR equivalent through exceptional and recognized contributions to OT security architecture. Industry recognition is paramount.
Certifications
  • ISA/IEC 62443 Cybersecurity Certificate Program - Fundamentals
  • GICSP (in progress)
  • Network architecture certifications (CCNA, etc.)
  • TOGAF Foundation
  • GICSP (GIAC Global Industrial Cyber Security Professional)
  • ISA/IEC 62443 Cybersecurity Certificate Program
  • Network architecture certifications (CCNP Security, etc.)
  • Certified SCADA Security Architect (CSSA)
  • GICSP (GIAC Global Industrial Cyber Security Professional)
  • ISA/IEC 62443 Cybersecurity Expert
  • CISSP or CCSP
  • CSSA (Certified SCADA Security Architect)
  • SABSA or TOGAF
  • ISA/IEC 62443 Cybersecurity Expert
  • GICSP and GRID
  • CISSP-ISSAP (Information Systems Security Architecture Professional)
  • SABSA Chartered Security Architect
  • CSSA (Certified SCADA Security Architect)
  • ISA/IEC 62443 Cybersecurity Expert
  • CISSP-ISSAP
  • SABSA Chartered Security Architect (SCF)
  • GICSP and GRID
  • Industry recognition and standards committee participation
  • ISA/IEC 62443 Cybersecurity Expert
  • CISSP-ISSAP
  • SABSA Chartered Security Architect (SCF)
  • Industry recognition and standards body leadership
  • Advisory board positions with government or industry bodies
  • Certifications are secondary to demonstrated expertise and industry recognition
  • ISA/IEC 62443 committee leadership or equivalent
  • CISSP-ISSAP or equivalent
  • Standards body leadership positions
  • Named Fellow or Distinguished Architect recognition
Salary: US Gov't$80,000 - $105,000 (GS-11 to GS-12)$90,000 - $115,000 (GS-12 to GS-13)$110,000 - $140,000 (GS-13 to GS-14)$130,000 - $165,000 (GS-14 to GS-15)$145,000 - $180,000 (GS-15)$155,000 - $191,000 (GS-15 to SES)$175,000 - $191,000+ (GS-15 Step 10 to SES)
Salary: US Startup$95,000 - $125,000$110,000 - $145,000$140,000 - $180,000$170,000 - $230,000$200,000 - $260,000$230,000 - $300,000$270,000 - $380,000+
Salary: US Corporate$90,000 - $120,000$105,000 - $140,000$135,000 - $175,000$170,000 - $225,000$200,000 - $260,000$240,000 - $300,000$280,000 - $380,000+
Salary: Big Tech (Mag7)$140,000 - $220,000$200,000 - $320,000$300,000 - $450,000$380,000 - $550,000$450,000 - $650,000$550,000 - $750,000$650,000 - $1,100,000+
↑ Back to navigation

Physical Security

Converged physical-cyber security engineering, access control systems, surveillance, and facility security architecture

Physical Security Engineer

Technical professionals who design, implement, and maintain converged physical-cyber security systems. Focus on access control systems (card readers, biometrics), video surveillance (CCTV/IP cameras, VMS platforms), intrusion detection, visitor management, and the cybersecurity of physical security infrastructure (IoT devices, building automation, security system networks). This is the technical/engineering side where physical security meets cybersecurity — securing the devices, networks, and integrations that protect physical spaces.

NICE Framework: No direct mapping tenuous NICE does not address physical security or converged physical-cyber security. This discipline sits at the intersection of physical security engineering and cybersecurity.
Attribute Eng 1 / Entry Eng 2 / Junior Eng 3 / Mid Eng 4 / Senior Eng 5 / Staff Eng 6 / Senior Staff Eng 7 / Principal
General DescriptionEntry-level physical security engineer learning the fundamentals of converged physical-cyber security systems. Assists with installation, configuration, and maintenance of access control, video surveillance, and intrusion detection systems. Develops foundational understanding of how physical security devices operate on IP networks and the cybersecurity implications of connected physical security infrastructure.Junior physical security engineer capable of independently performing system installations, basic configurations, and troubleshooting for access control and video surveillance systems. Demonstrates proficiency with at least one major access control platform and understands the network security implications of physical security devices on the corporate network. Beginning to assess the cyber-attack surface of physical security infrastructure.Experienced physical security engineer who independently designs and implements converged physical-cyber security systems for facilities. Expert in multiple access control and VMS platforms with a strong understanding of how physical security devices create cybersecurity risk. Leads installation projects, conducts security assessments of physical security infrastructure, and ensures proper network segmentation and hardening of physical security systems. Bridges the gap between physical security operations and IT/cybersecurity teams.Senior physical security engineer with deep expertise in converged physical-cyber security systems across enterprise environments. Leads complex multi-facility deployments, architects physical security network infrastructure, and drives the integration of physical security data into the cybersecurity monitoring stack. Serves as the technical authority on physical security system cybersecurity, defining hardening standards and ensuring physical security infrastructure does not become a vector for cyberattack. Recognized subject matter expert bridging physical security operations, facilities engineering, and cybersecurity.Staff-level physical security engineer with cross-organizational influence on converged physical-cyber security practices. Defines the technical strategy for physical security infrastructure as a component of the overall cybersecurity program. Builds frameworks for assessing and managing cyber risk across physical security systems at enterprise scale. Drives convergence initiatives that break down silos between physical security, IT, and cybersecurity organizations. Recognized internally and beginning to be known externally as a domain expert in physical-cyber convergence.Senior Staff physical security engineer serving as the organization-wide authority on converged physical-cyber security engineering. Sets the multi-year technical vision for how physical security infrastructure integrates into the broader cybersecurity program. Drives transformational initiatives such as zero-trust physical access, AI-driven surveillance analytics, and fully converged security operations centers. Influences organizational structure and investment priorities at the intersection of physical and cyber security.Principal physical security engineer operating at the apex of converged physical-cyber security engineering. Defines industry direction for how physical security infrastructure is secured, monitored, and integrated into cybersecurity programs. Shapes standards, frameworks, and technologies adopted across the field. Recognized globally as a defining voice in physical-cyber convergence, influencing vendor product development, government policy, and industry best practices. May hold distinguished engineer or fellow-equivalent titles.
Primary Responsibilities
  • Assist with installation and cabling of access control panels, card readers, and door hardware
  • Support IP camera deployment including network configuration and basic VMS setup
  • Perform routine maintenance on physical security systems (firmware checks, battery replacements, sensor testing)
  • Document physical security device inventories and network assignments
  • Monitor physical security system health dashboards for alerts and failures
  • Assist senior engineers with access control database management (adding/removing cardholders)
  • Learn to troubleshoot common issues with card readers, cameras, and door controllers
  • Maintain cable documentation and as-built drawings for security system installations
  • Install and configure access control systems including controllers, readers, and credential enrollment
  • Deploy and configure IP cameras with appropriate VMS integration and recording policies
  • Troubleshoot physical security system issues (door faults, camera failures, network connectivity)
  • Perform firmware updates and patching on physical security devices
  • Configure VLANs and network segmentation for physical security device networks
  • Manage cardholder databases and access level assignments
  • Conduct basic vulnerability assessments on physical security infrastructure
  • Support visitor management system operations and integrations
  • Maintain system documentation and standard operating procedures
  • Design and implement access control systems for new facilities or major renovations
  • Lead video surveillance system deployments including camera placement, analytics configuration, and storage sizing
  • Conduct cybersecurity assessments of physical security networks and devices
  • Implement network segmentation and hardening for physical security infrastructure
  • Integrate physical security systems with IT infrastructure (Active Directory, HR systems, SIEM)
  • Design and configure intrusion detection and alarm monitoring systems
  • Evaluate and pilot new physical security technologies and vendors
  • Mentor junior engineers on system design and cybersecurity best practices
  • Develop standard configurations and hardening guides for physical security devices
  • Manage physical security system upgrades and migration projects
  • Architect converged physical-cyber security systems for enterprise facilities and data centers
  • Lead cybersecurity hardening programs for physical security infrastructure across the organization
  • Design integration between physical security events and SIEM/SOAR platforms
  • Develop enterprise standards for physical security device procurement, deployment, and lifecycle management
  • Conduct advanced penetration testing and red team assessments of physical security systems
  • Lead incident response for physical security system compromises or breaches
  • Design and implement converged SOC workflows incorporating physical security telemetry
  • Evaluate emerging physical security technologies for enterprise adoption
  • Drive physical security system migrations and platform consolidation projects
  • Serve as technical escalation point for complex physical security engineering issues
  • Define the enterprise technical strategy for converged physical-cyber security engineering
  • Build frameworks for cyber risk assessment and management of physical security infrastructure
  • Drive cross-functional convergence initiatives between physical security, IT, and cybersecurity teams
  • Establish engineering standards for physical security device lifecycle management and cybersecurity hygiene
  • Design reference architectures for converged physical-cyber security across facility types
  • Lead technical due diligence on physical security technology acquisitions and vendor relationships
  • Develop and deliver training programs on physical security system cybersecurity
  • Contribute to incident response playbooks for converged physical-cyber attack scenarios
  • Advise security leadership on emerging physical-cyber convergence threats and technologies
  • Represent the organization at industry conferences and working groups on physical security cybersecurity
  • Set the multi-year technical vision for converged physical-cyber security engineering
  • Drive transformational convergence initiatives (zero-trust physical access, AI-driven analytics, converged SOC)
  • Define organizational investment priorities for physical security technology modernization
  • Lead enterprise-wide programs for physical security infrastructure cyber resilience
  • Architect next-generation converged security platforms integrating physical and cyber telemetry
  • Advise executive leadership on converged security risks, investment, and organizational design
  • Establish partnerships with physical security technology vendors for co-development and early access
  • Represent the organization as a thought leader at major industry conferences
  • Drive policy development for converged physical-cyber security governance
  • Evaluate and respond to nation-state threats targeting physical security infrastructure
  • Define industry direction for converged physical-cyber security engineering
  • Shape standards and frameworks adopted across the physical security and cybersecurity industries
  • Drive breakthrough innovations in converged security technology and architecture
  • Advise C-suite and board on physical-cyber convergence as a strategic imperative
  • Influence government policy and regulation on physical security cybersecurity
  • Publish research and thought leadership advancing the state of the art in convergence
  • Establish the organization as the industry leader in physical-cyber security convergence
  • Architect reference designs adopted by the broader industry
  • Guide the global physical security engineering community through standards bodies, publications, and conferences
  • Identify and respond to paradigm-shifting threats and technologies in the physical security domain
Required Skills
  • Basic understanding of IP networking (TCP/IP, VLANs, DHCP, DNS)
  • Familiarity with physical access control concepts (card readers, credentials, door controllers)
  • Basic knowledge of video surveillance systems (IP cameras, NVRs, VMS)
  • Understanding of low-voltage wiring and structured cabling
  • Familiarity with Windows and Linux operating systems
  • Basic knowledge of cybersecurity principles (CIA triad, least privilege)
  • Documentation and organizational skills
  • Proficiency with at least one access control platform (Lenel/LenelS2, Genetec Security Center, AMAG Symmetry)
  • Working knowledge of VMS platforms (Milestone XProtect, Genetec, Exacq)
  • IP camera configuration (Axis, Hanwha, Verkada) including stream settings and analytics
  • Network fundamentals including VLAN configuration and firewall rules for security devices
  • Physical security device troubleshooting (Wiegand, OSDP protocols)
  • Understanding of credential technologies (HID iCLASS, SEOS, mobile credentials)
  • Basic cybersecurity assessment of IoT and physical security devices
  • SQL database basics for access control system management
  • Expert-level proficiency with multiple access control platforms (Lenel/LenelS2, Genetec, AMAG)
  • Advanced VMS configuration including video analytics, license plate recognition, and facial detection
  • Network security for physical security systems (segmentation, encryption, monitoring)
  • Cybersecurity risk assessment of IoT and physical security devices
  • OSDP implementation and encrypted reader communication
  • Integration design (API, SDK, middleware) between physical security and IT systems
  • Project management for physical security system deployments
  • Understanding of NIST, ICS-CERT, and IoT security frameworks as applied to physical security
  • Enterprise-scale physical security system architecture (multi-site, high availability)
  • Advanced cybersecurity assessment of physical security systems (penetration testing, firmware analysis)
  • SIEM integration with physical security data sources (access events, video analytics, alarms)
  • Physical security network architecture (dedicated VLANs, firewalls, monitoring, micro-segmentation)
  • Deep knowledge of credential technologies (smart cards, mobile credentials, biometrics) and their vulnerabilities
  • API and middleware development for physical security system integration
  • Risk assessment frameworks applied to converged physical-cyber threats
  • Project leadership for complex multi-stakeholder deployments
  • Understanding of regulatory requirements (NERC CIP, ITAR, HSPD-12, FICAM)
  • Enterprise physical security architecture across diverse facility types (offices, data centers, manufacturing)
  • Cyber risk quantification for physical security infrastructure
  • Advanced integration architecture (physical security to SIEM, SOAR, identity governance)
  • Threat modeling for converged physical-cyber attack scenarios
  • Vendor and technology evaluation at enterprise scale
  • Cross-functional leadership and influence without direct authority
  • Technical writing for standards, frameworks, and reference architectures
  • Understanding of global physical security regulations and standards (GDPR privacy for CCTV, country-specific access control requirements)
  • Visionary technical leadership in converged physical-cyber security
  • Enterprise security architecture spanning physical, cyber, and operational technology domains
  • Executive communication and strategic influence
  • Technology roadmap development for physical security modernization
  • Deep understanding of emerging threats to physical security infrastructure (supply chain, firmware, AI)
  • Cross-domain expertise spanning access control, video analytics, intrusion detection, and cybersecurity
  • Organizational design for converged security operations
  • Financial modeling and business case development for security technology investments
  • World-class expertise in converged physical-cyber security systems
  • Ability to shape industry standards and influence vendor product roadmaps
  • Deep technical mastery across physical access control, surveillance, intrusion detection, and cybersecurity
  • Published body of work advancing the field of physical-cyber convergence
  • Executive presence and ability to influence at the highest organizational and industry levels
  • Understanding of geopolitical and nation-state dimensions of physical security threats
  • Innovation track record in security technology
  • Ability to attract, develop, and retain top talent in a niche discipline
Preferred Skills
  • Exposure to access control platforms (Lenel/LenelS2, AMAG, HID Global)
  • Familiarity with IP camera manufacturers (Axis Communications, Hanwha, Verkada)
  • Basic understanding of PoE (Power over Ethernet) networks
  • Knowledge of physical security standards (UL 294, UL 2050)
  • Home lab or hands-on experience with IoT devices
  • Experience with OSDP (Open Supervised Device Protocol) implementation
  • Familiarity with building management system (BMS) integration
  • Network scanning tools (Nmap, Wireshark) for physical security networks
  • Understanding of encryption for physical security communications
  • Experience with intercom and mass notification systems
  • Penetration testing of physical security systems and devices
  • Building automation system (BAS) security and integration
  • PSIM platform experience (Genetec Mission Control, CNL PSIM)
  • Scripting for physical security automation (Python, PowerShell)
  • Experience with converged SOC operations
  • Cloud-hosted physical security platforms (Verkada, Brivo, OpenPath)
  • Industrial control system (ICS) security as related to building systems
  • Physical security red teaming (badge cloning, tailgating, lock bypass combined with cyber exploitation)
  • Machine learning and AI for video analytics and anomaly detection
  • Cloud architecture for physical security (hybrid deployments)
  • Zero-trust architecture principles applied to physical access control
  • Published research or presentations on physical security cybersecurity
  • Experience with government classified facility requirements (ICD 705, SCIF construction)
  • IoT security research and vulnerability disclosure
  • Supply chain security for physical security devices
  • Digital forensics for physical security systems
  • Patent or published innovation in physical security technology
  • Experience with classified or high-security facility programs (DOE, DoD, intelligence community)
  • Advisory relationships with physical security industry vendors and standards bodies
  • Knowledge of international physical security standards (ISO 27001 Annex A physical controls, EN 50600)
  • Experience with autonomous security systems and robotics
  • Advisory board membership with major physical security vendors
  • Government advisory roles on critical infrastructure physical security
  • Patent portfolio in physical security or convergence technology
  • Academic affiliations or adjunct positions in security engineering
  • Track record of building physical-cyber convergence programs from zero to industry-leading
Mentorship RequirementsReceives direct mentorship from Senior physical security engineers. Shadows on system installations and commissioning projects. Expected to complete vendor training for primary access control and VMS platforms within first 6 months. Learns the convergence philosophy of treating physical security devices as part of the cybersecurity attack surface.Receives guidance from Senior engineers on complex system integrations and cybersecurity assessments. Expected to begin mentoring Entry-level engineers informally on installations. Contributes to documentation and training materials. Should be developing expertise in specific platforms or convergence areas.Mentors junior engineers on system design, installation, and cybersecurity assessment. Expected to develop specialization in either a platform ecosystem or convergence domain. Receives guidance from Staff engineers on enterprise architecture decisions and complex integration challenges.Mentors Mid and Junior engineers on architecture, convergence, and cybersecurity assessment. Expected to guide team members in developing convergence expertise. Contributes to organizational training on physical-cyber security risks. May mentor across teams (physical security, IT, cybersecurity).Mentors Senior engineers toward Staff-level technical leadership. Develops convergence expertise across teams. Expected to create mentorship opportunities that span physical security and cybersecurity disciplines. Guides career development for engineers working in the convergence space.Mentors Staff and Senior engineers on technical vision and strategic thinking. Creates development paths for convergence specialization across the engineering organization. Expected to attract and retain talent in the physical-cyber convergence space. Serves as a career role model for the discipline.Mentors at all levels across the organization and industry. Creates the intellectual framework that shapes how the next generation of convergence professionals develop. Expected to contribute to academic and professional education in the field. Attracts top talent to the discipline through reputation and vision.
Impact ScopeIndividual contributor on assigned installation and maintenance tasks. Impact limited to supporting system deployments under supervision. Work is reviewed before systems go live. Supports overall physical security infrastructure uptime.Directly contributes to physical security system availability and integrity. Responsible for accurate system configurations and device health. Beginning to identify cybersecurity risks in physical security infrastructure. Supports facility security operations.Leads physical security system implementations for individual facilities or campuses. Design decisions directly impact facility security posture and cybersecurity risk. Defines standard configurations used across the organization. Influences convergence practices between physical security and cybersecurity teams.Enterprise-wide impact on physical security engineering standards and cybersecurity posture. Architectural decisions affect all facilities and set precedent for future deployments. Directly influences the organization's converged security strategy. Recognized authority on physical security system cybersecurity.Organization-wide influence on physical security engineering practices and convergence strategy. Frameworks and standards adopted across all facilities. Technical decisions set the direction for multi-year physical security programs. Beginning to influence industry practices through external engagement.Defines the technical trajectory for physical-cyber convergence across the entire organization. Decisions shape multi-year investment and staffing plans. Influences vendor product roadmaps through strategic partnerships. Recognized as an industry authority in the convergence domain.Industry-defining impact on physical-cyber security convergence. Standards and architectures influence organizations globally. Technical vision shapes vendor product development and government policy. Recognized as one of the foremost authorities in the field worldwide.
Autonomy & Decision AuthorityWorks under close supervision. Follows established installation procedures and maintenance checklists. Limited authority to make configuration changes independently. Escalates all system issues and access requests to senior engineers.Works with moderate supervision. Can make routine configuration and maintenance decisions. Authority to troubleshoot and resolve standard system issues. Escalates complex integrations, architectural decisions, and cybersecurity findings.Works independently on system design and implementation. Makes technical decisions on platform configuration, network architecture, and device hardening. Authority to approve standard deployments. Escalates enterprise-wide architectural changes and significant budget decisions.Works independently with strategic guidance. Makes architectural decisions for physical security systems. Authority to define technical standards and approve designs. Escalates decisions with significant budget impact or organizational policy implications.Operates with high autonomy on technical strategy. Makes decisions that affect enterprise physical security architecture. Authority to define standards and approve technology selections. Escalates decisions with significant organizational or budgetary scope.Operates with near-full autonomy on technical vision. Makes decisions shaping the future of converged security engineering for the organization. Authority to define architecture, standards, and technology direction. Partners with executive leadership on strategic investment.Full technical autonomy. Operates as the ultimate technical authority on physical-cyber convergence. Decisions influence industry direction. Partners with executive leadership as a co-equal on technical strategy within the convergence domain.
Communication & StakeholdersPrimarily internal communication with physical security engineering team. May assist with documenting system configurations. Limited direct interaction with facilities management or security operations initially.Regular interaction with facilities management and security operations teams. Presents system status and maintenance needs. Participates in project planning meetings. Coordinates with IT networking teams on device connectivity.Regular interaction with facilities management, security operations, IT networking, and cybersecurity teams. Presents project plans and security assessments to management. Coordinates with vendors and integrators. Communicates convergence risks to both physical security and cyber audiences.Communicates with Director/VP-level stakeholders on physical security strategy and risk. Presents to CISO and security leadership on convergence initiatives. Coordinates with external vendors, integrators, and industry groups. Translates between physical security, facilities, and cybersecurity audiences.Regular communication with CISO, VP of Security, and facilities leadership. Presents to executive leadership on convergence strategy and risk. Engages with industry bodies (ASIS International, SIA). Communicates complex convergence concepts to diverse technical and non-technical audiences.Direct engagement with C-suite (CISO, CTO, COO) on converged security strategy. Represents the organization to board of directors on physical security risk. Keynotes at industry conferences. Engages with government agencies and standards bodies at leadership level.Engages with CEO, board of directors, and industry leadership. Keynotes at major conferences (ASIS, ISC West, RSA, Black Hat). Advises government agencies and policymakers. Publishes for both industry and academic audiences. Communicates with media as a recognized industry authority.
Degree / ExperienceBachelor's degree in Electrical Engineering, Computer Science, Information Technology, or related field, OR 1-2 years of experience in physical security installation, low-voltage systems, or IT infrastructure, OR completion of vendor-specific training programs (Lenel, Genetec, Milestone).Bachelor's degree in Electrical Engineering, Computer Science, or related field, OR 2-4 years of physical security system installation and maintenance experience. Demonstrated proficiency with at least one major access control or VMS platform.Bachelor's degree in Electrical Engineering, Computer Science, or related field, OR 4-7 years of physical security engineering experience with demonstrated convergence expertise. Industry certifications in both physical security and cybersecurity.Bachelor's or Master's degree in Electrical Engineering, Computer Science, Cybersecurity, or related field, OR 7-10 years of progressive physical security engineering experience with demonstrated convergence expertise and technical leadership.Master's degree in Engineering, Cybersecurity, or related field, OR 10-15 years of progressive physical security engineering and cybersecurity experience with demonstrated cross-organizational impact and thought leadership.Master's degree or PhD in Engineering, Cybersecurity, or related field, OR 15-20 years of progressive experience in physical security engineering and cybersecurity with demonstrated industry-level thought leadership and organizational transformation.Advanced degree (Master's or PhD) in Engineering, Computer Science, or related field, OR 20+ years of exceptional experience in physical security engineering and cybersecurity with globally recognized contributions to the field. Demonstrated industry-shaping impact.
Certifications
  • CompTIA Security+
  • CompTIA Network+
  • Lenel/LenelS2 Certified Technician
  • Axis Communications Certified Professional
  • ASIS Physical Security Professional (PSP)
  • Genetec Security Center Certified Professional
  • Milestone XProtect Certified Integration Technician
  • CompTIA Security+
  • HID Global Certified Installer
  • ASIS Physical Security Professional (PSP)
  • ASIS Certified Protection Professional (CPP)
  • CISSP or SSCP
  • Genetec Security Center Certified Expert
  • Certified Information Systems Auditor (CISA)
  • ASIS Certified Protection Professional (CPP)
  • CISSP
  • ASIS Physical Security Professional (PSP)
  • GICSP (Global Industrial Cyber Security Professional)
  • Certified TEMPEST Professional (CTP) - for government roles
  • CISSP
  • ASIS Certified Protection Professional (CPP)
  • GICSP (Global Industrial Cyber Security Professional)
  • CISM (Certified Information Security Manager)
  • Board certifications from SIA (Security Industry Association)
  • CISSP
  • ASIS Certified Protection Professional (CPP)
  • CISM
  • Board-level certifications or industry recognition
  • Published author or frequent keynote speaker in physical security cybersecurity
  • CISSP
  • ASIS Certified Protection Professional (CPP)
  • Industry fellow or distinguished engineer designations
  • Recognized through awards, publications, or standards committee leadership
Salary: US Gov't$50,000 - $70,000 (GS-7 to GS-9)$65,000 - $90,000 (GS-9 to GS-11)$80,000 - $115,000 (GS-12 to GS-13)$110,000 - $150,000 (GS-14 to GS-15)$130,000 - $170,000 (GS-14 to GS-15)$150,000 - $185,000 (GS-15 to SES)$165,000 - $191,900 (GS-15 step 10 to SES)
Salary: US Startup$55,000 - $75,000$70,000 - $95,000$90,000 - $120,000$120,000 - $160,000$140,000 - $185,000$170,000 - $230,000$200,000 - $280,000
Salary: US Corporate$55,000 - $80,000$70,000 - $100,000$90,000 - $130,000$130,000 - $175,000$160,000 - $220,000$200,000 - $280,000$250,000 - $350,000
Salary: Big Tech (Mag7)$110,000 - $175,000$150,000 - $250,000$220,000 - $360,000$300,000 - $500,000$380,000 - $580,000$500,000 - $700,000$600,000 - $900,000
↑ Back to navigation

Physical Security Architect

Strategic technical leaders who design converged physical-cyber security architectures for facilities, campuses, and enterprise environments. Focus on physical security information management (PSIM), security operations center design (converged SOC), physical access control architecture, and integrating physical security data into the cybersecurity monitoring stack. Define how organizations approach the convergence of physical and logical security at the architectural level.

NICE Framework: SP-ARC-002 Security Architect tenuous NICE's architecture role is purely cyber-focused. Converged physical-cyber security architecture is not addressed in the framework.
Attribute Architect 1 / Entry Architect 2 / Junior Architect 3 / Mid Architect 4 / Senior Architect 5 / Staff Architect 6 / Senior Staff Architect 7 / Principal
General DescriptionEntry-level physical security architect learning the fundamentals of physical security system design and convergence architecture. Assists with documenting existing physical security architectures, creating system diagrams, and understanding how physical security systems integrate with IT and cybersecurity infrastructure. Develops foundational knowledge of access control architectures, video surveillance system design, and the principles of physical-cyber convergence.Junior physical security architect capable of producing architectural documentation and contributing to system designs for physical security deployments. Demonstrates understanding of how physical security systems are architected at the facility level and can identify integration points with IT and cybersecurity infrastructure. Develops competency in translating security requirements into physical security system designs.Experienced physical security architect who independently designs converged physical-cyber security architectures for facilities and campuses. Expert in translating organizational security requirements into comprehensive physical security system designs that integrate with the cybersecurity infrastructure. Leads design projects, defines integration architectures between physical security and IT systems, and ensures that architectural decisions support both physical protection and cybersecurity objectives.Senior physical security architect with deep expertise in enterprise-scale converged physical-cyber security architecture. Designs end-to-end convergence strategies spanning physical access control, surveillance, building automation, and cybersecurity monitoring. Leads architectural programs across multiple facilities and regions, defines enterprise standards, and architects the integration layer between physical security operations and cybersecurity programs. Serves as the go-to authority on how physical security architecture supports and integrates with the broader security architecture.Staff-level physical security architect with cross-organizational influence on converged security architecture strategy. Defines the architectural vision for how physical security integrates into the enterprise security architecture. Builds convergence frameworks, reference architectures, and architectural governance that are adopted across the organization. Bridges organizational silos between physical security, cybersecurity, IT, and facilities to create unified architectural approaches. Recognized internally as the definitive authority on physical-cyber convergence architecture.Senior Staff physical security architect serving as the organization-wide authority on converged physical-cyber security architecture. Defines the long-term architectural strategy for physical-cyber convergence that fundamentally shapes how the organization protects its people, assets, and information. Drives transformational architectural initiatives including fully converged security operations, unified identity architectures spanning physical and logical access, and AI-driven physical security platforms. Influences organizational structure, investment strategy, and industry standards at the highest levels.Principal physical security architect operating at the pinnacle of converged physical-cyber security architecture. Defines the future of how physical and cyber security converge at the architectural level, shaping standards, frameworks, and design paradigms adopted across the industry. Recognized globally as a preeminent authority on convergence architecture whose work influences how organizations worldwide approach the unification of physical and cyber security. May hold distinguished architect, fellow, or chief architect equivalent titles.
Primary Responsibilities
  • Document existing physical security system architectures and network topologies
  • Create system diagrams for access control, video surveillance, and intrusion detection deployments
  • Assist with requirements gathering for physical security system design projects
  • Learn physical security design standards and reference architectures
  • Support senior architects with site surveys and facility assessments
  • Maintain architecture documentation repositories and standards libraries
  • Study integration patterns between physical security and IT/cybersecurity systems
  • Assist with vendor evaluation documentation and technology comparison matrices
  • Develop physical security system designs for individual facilities under guidance
  • Create detailed architecture documents including network diagrams, riser diagrams, and integration specifications
  • Conduct site surveys and assess existing physical security infrastructure
  • Identify integration points between physical security and IT/cybersecurity systems
  • Participate in design reviews and provide documentation support
  • Evaluate physical security products and technologies against architectural requirements
  • Design network architectures for physical security device segments
  • Support the development of physical security design standards and templates
  • Document convergence touchpoints in architectural designs
  • Design comprehensive physical security architectures for facilities and campus environments
  • Architect integration between physical security systems and cybersecurity infrastructure (SIEM, SOAR, IAM)
  • Lead architectural design reviews for physical security projects
  • Define reference architectures for standard facility types (offices, data centers, labs)
  • Design physical security network architectures with appropriate segmentation and monitoring
  • Evaluate and select physical security platforms and technologies for organizational adoption
  • Develop convergence architecture patterns connecting physical and logical access control
  • Create migration architectures for legacy physical security system modernization
  • Mentor junior architects on design methodology and convergence principles
  • Conduct architectural risk assessments for physical security systems
  • Design enterprise-scale converged physical-cyber security architectures spanning multiple regions
  • Architect the integration layer between physical security operations and cybersecurity monitoring programs
  • Define enterprise architecture standards for physical security platform selection and deployment
  • Lead converged SOC architecture design integrating physical and cyber telemetry
  • Architect identity convergence solutions unifying physical and logical access control
  • Drive physical security platform consolidation and modernization strategies
  • Conduct enterprise-level architectural risk assessments for physical security infrastructure
  • Design disaster recovery and business continuity architectures for physical security systems
  • Evaluate and shape vendor product architectures through strategic partnership engagement
  • Serve as architectural escalation point for complex convergence design challenges
  • Define the enterprise architectural vision for physical-cyber security convergence
  • Build convergence architecture frameworks and reference architectures adopted organization-wide
  • Establish architectural governance for physical security system design and integration
  • Drive cross-organizational architectural alignment between physical security, cybersecurity, and IT
  • Architect next-generation converged security platforms and operational models
  • Lead architectural due diligence for M&A activities related to physical security
  • Define technology roadmaps for physical security platform evolution and convergence
  • Advise security leadership on architectural implications of emerging convergence technologies
  • Represent the organization in industry architecture forums and standards bodies
  • Drive the architectural integration of physical security into zero-trust security models
  • Define the long-term architectural strategy for physical-cyber security convergence
  • Drive transformational convergence architecture initiatives across the enterprise
  • Architect fully converged security operations models unifying physical and cyber domains
  • Shape organizational investment priorities for convergence technology and architecture
  • Influence physical security industry standards and architectural best practices
  • Advise executive leadership on convergence architecture as a competitive and risk differentiator
  • Lead architectural innovation programs exploring emerging convergence paradigms
  • Establish strategic vendor architecture partnerships for co-development of convergence platforms
  • Drive policy and governance frameworks for converged security architecture
  • Assess and respond to emerging nation-state threats to physical security architecture
  • Define the future of converged physical-cyber security architecture as an industry discipline
  • Shape global standards and frameworks for physical-cyber security convergence architecture
  • Drive paradigm-shifting innovations in converged security architecture and operations
  • Advise C-suite and board on convergence architecture as a fundamental organizational capability
  • Influence government policy and international standards for converged security architecture
  • Publish seminal work advancing the field of physical-cyber convergence architecture
  • Establish the organization as the global leader in convergence architecture
  • Create architectural frameworks and design patterns adopted across the industry
  • Guide the global community of convergence architecture professionals
  • Anticipate and architect for paradigm shifts in physical security technology (autonomous systems, AI, quantum)
Required Skills
  • Understanding of physical security system components (access control, video, intrusion detection)
  • Basic network architecture concepts (VLANs, subnets, firewalls, DMZ)
  • Familiarity with architecture diagramming tools (Visio, draw.io, Lucidchart)
  • Basic understanding of physical access control system architecture (controllers, panels, readers)
  • Knowledge of IP-based video surveillance architecture (cameras, NVRs, VMS)
  • Understanding of cybersecurity fundamentals as applied to physical security
  • Documentation and technical writing skills
  • Physical security system design for individual facilities (access control, video, intrusion detection)
  • Network architecture for physical security systems (segmentation, bandwidth, redundancy)
  • Proficiency with at least one access control platform architecture (Lenel, Genetec, AMAG)
  • Video surveillance system sizing (camera count, storage, bandwidth calculations)
  • Understanding of physical security integration protocols (OSDP, ONVIF, BACnet)
  • Architecture documentation standards and methods
  • Basic understanding of PSIM and command-and-control center design
  • Cybersecurity principles for physical security network design
  • Multi-system physical security architecture (access control, VMS, intrusion, intercom, visitor management)
  • Enterprise network architecture for physical security with defense-in-depth principles
  • Integration architecture between physical security platforms and enterprise IT systems
  • PSIM architecture and converged command-and-control center design
  • Deep knowledge of physical security protocols (OSDP, ONVIF, SIA DC-05, BACnet)
  • Cybersecurity architecture principles applied to physical security systems
  • Architectural decision records, trade-off analysis, and design justification
  • Vendor platform architecture expertise across multiple major providers
  • Understanding of identity convergence (physical and logical access unification)
  • Enterprise physical security architecture across global multi-site environments
  • Converged SOC architecture incorporating physical security, cyber, and operational technology data streams
  • Identity convergence architecture (PACS integration with IAM, IdP, FICAM)
  • PSIM and security command center architecture at enterprise scale
  • Advanced network architecture for segmented physical security environments
  • Architectural governance and standards development
  • Risk-based architectural decision making across physical and cyber domains
  • Executive-level communication of architectural strategy and risk
  • Understanding of global regulatory and compliance requirements for physical security systems
  • Enterprise security architecture spanning physical, cyber, and operational technology
  • Architectural framework development for converged security
  • Technology strategy and roadmap development for physical security convergence
  • Cross-functional architectural governance and standards
  • Executive communication and architectural storytelling
  • Vendor ecosystem architecture and strategic technology partnerships
  • Emerging technology assessment (AI, cloud, IoT) for physical security convergence
  • Organizational design for converged security architecture functions
  • Visionary architectural leadership in converged physical-cyber security
  • Enterprise architecture across physical, cyber, OT, and IT domains
  • Executive influence and strategic communication
  • Technology vision and roadmap development spanning 5-10 year horizons
  • Deep expertise in architectural patterns for converged security operations
  • Industry standards development and architectural thought leadership
  • Organizational transformation through architectural innovation
  • Financial and business acumen for architectural investment justification
  • World-class expertise in converged physical-cyber security architecture
  • Ability to define industry architectural standards and influence global adoption
  • Deep mastery of architecture across physical security, cybersecurity, and operational technology domains
  • Published body of architectural work advancing the convergence field
  • Executive presence and influence at the highest organizational and industry levels
  • Understanding of geopolitical dimensions of physical security architecture
  • Track record of architectural innovation that has shaped industry practice
  • Ability to attract, develop, and inspire top architectural talent globally
Preferred Skills
  • Exposure to enterprise access control platforms (Lenel/LenelS2, Genetec, AMAG)
  • Familiarity with PSIM concepts
  • Basic understanding of building information modeling (BIM)
  • Knowledge of physical security design standards (ASIS, CPTED)
  • Exposure to cloud architecture concepts
  • Experience with Genetec Security Center architecture
  • Familiarity with converged SOC design concepts
  • Knowledge of high-availability and redundancy patterns for physical security systems
  • Understanding of identity management integration (PACS to IAM)
  • Experience with cloud and hybrid physical security architectures
  • SABSA or TOGAF enterprise security architecture methodology
  • Data center physical security architecture
  • Cloud-native physical security architecture (Verkada, Brivo, OpenPath)
  • Experience with government facility security requirements (ICD 705, UFC 4-010-01)
  • Video analytics architecture (edge vs. server, AI/ML workloads)
  • Converged SOC architecture and operations design
  • Experience with critical infrastructure physical security architecture (energy, transportation, government)
  • Zero-trust architecture principles applied to physical access control
  • AI/ML architecture for video analytics and physical security anomaly detection
  • IoT security architecture for building automation and smart building convergence
  • Experience with SCIF, SAPF, or other classified facility design requirements
  • Published architectural frameworks or reference architectures for convergence
  • Experience with national-scale physical security architectures
  • Standards committee leadership (ASIS, SIA, ONVIF)
  • Academic or research contributions to convergence architecture
  • Experience building physical-cyber convergence programs from inception
  • Published architectural frameworks adopted beyond the organization
  • Experience with national security or critical infrastructure architectural programs
  • Advisory relationships with major physical security and cybersecurity vendors
  • Academic contributions to security architecture
  • Experience building and leading enterprise architecture teams
  • Advisory or board positions with major physical security and cybersecurity organizations
  • Government advisory roles on critical infrastructure security architecture
  • Patent portfolio in convergence architecture or security technology
  • Academic appointments or research affiliations in security architecture
  • Track record of building convergence architecture disciplines from inception to industry recognition
Mentorship RequirementsReceives direct mentorship from Senior physical security architects. Shadows on design reviews and architectural assessments. Expected to develop proficiency in architecture documentation and diagramming within first 6 months. Learns the principles of converged security architecture.Receives guidance from Senior architects on complex design decisions and enterprise-scale architecture. Expected to begin mentoring Entry-level architects on documentation and design methods. Contributes to standards development and design template maintenance. Should be developing expertise in specific architectural domains.Mentors Junior architects on design methodology, integration architecture, and convergence principles. Expected to develop specialization in a convergence domain. Receives guidance from Staff architects on enterprise-scale strategy and emerging technology assessment.Mentors Mid and Junior architects on enterprise architecture thinking and convergence strategy. Expected to develop architectural leaders who can operate independently on facility-level design. Contributes to the profession through publishing, presenting, or standards committee participation.Mentors Senior architects toward Staff-level strategic thinking. Develops architectural talent across organizational boundaries. Expected to create mentorship programs that bridge physical security and cybersecurity architecture disciplines. Guides the professional development of the convergence architecture community.Mentors Staff and Senior architects on strategic architectural vision. Creates development pathways for convergence architecture specialization across the organization. Expected to attract and develop top architectural talent. Serves as a career exemplar for the convergence architecture discipline.Mentors at all levels across the organization and industry. Creates the intellectual and architectural frameworks that define how convergence architects develop professionally. Expected to contribute to academic and professional education in convergence architecture. Attracts top architectural talent globally through reputation and vision.
Impact ScopeIndividual contributor on documentation and design support tasks. Impact limited to supporting architectural activities under direct guidance. Work is reviewed by senior architects before incorporation into designs. Supports overall architecture documentation quality.Contributes to facility-level physical security designs. Responsible for accurate architectural documentation. Design work impacts individual facility security posture and IT integration. Beginning to influence design standards and templates.Leads architectural design for multi-facility physical security programs. Design decisions define the convergence approach for facility types across the organization. Influences technology standards and vendor relationships. Shapes how physical security data flows into the cybersecurity monitoring stack.Enterprise-wide architectural impact across all facilities and regions. Defines the convergence blueprint that shapes multi-year investment and deployment. Architecture decisions set technology direction for the physical security program. Influences vendor product direction through strategic engagement.Organization-wide impact on convergence architecture strategy and direction. Frameworks and standards define how all facilities approach physical-cyber integration. Architectural vision shapes multi-year investment priorities. Beginning to influence industry architectural approaches through external engagement.Defines the architectural trajectory for physical-cyber convergence at the organizational level. Decisions shape multi-year investment, organizational design, and technology direction. Influences vendor product architecture and industry standards. Recognized as an industry authority on convergence architecture.Industry-defining impact on physical-cyber convergence architecture. Frameworks and design paradigms influence organizations and governments worldwide. Architectural vision shapes vendor platforms, industry standards, and regulatory approaches. Recognized as one of the foremost convergence architecture authorities globally.
Autonomy & Decision AuthorityWorks under close supervision. Follows established documentation standards and templates. Limited authority to make design decisions independently. Escalates all architectural questions to senior architects.Works with moderate supervision. Can make design decisions for standard facility deployments. Authority to produce architectural documentation independently. Escalates novel design challenges, enterprise-scope decisions, and significant vendor selections.Works independently on facility and campus-level architectural design. Makes technology selection and integration decisions within established standards. Authority to approve designs and lead architectural reviews. Escalates enterprise-wide platform changes and significant strategic shifts.Works independently with strategic alignment. Makes enterprise-level architectural decisions for physical security systems. Authority to define standards, select platforms, and approve designs. Escalates decisions with organization-wide policy or significant financial implications.Operates with high autonomy on architectural strategy. Makes decisions shaping enterprise convergence architecture direction. Authority to define frameworks, governance, and technology standards. Escalates decisions with significant organizational restructuring or strategic implications.Operates with near-full autonomy on architectural strategy. Makes decisions that define the future of converged security architecture for the organization. Authority to set architectural vision, governance, and technology direction. Partners with C-suite on strategic investment decisions.Full architectural autonomy. Operates as the ultimate authority on convergence architecture. Decisions influence industry direction and standards. Partners with executive leadership as a co-equal on architectural strategy within the convergence domain.
Communication & StakeholdersPrimarily internal communication with architecture and engineering teams. May assist with preparing presentation materials for design reviews. Limited direct interaction with stakeholders outside the physical security team.Regular interaction with engineering teams, facilities management, and IT architecture. Presents design options to project stakeholders. Participates in vendor demonstrations and evaluations. Coordinates with cybersecurity architecture on integration designs.Regular interaction with security leadership, facilities management, IT architecture, and cybersecurity teams. Presents architectural designs and recommendations to Director-level stakeholders. Coordinates with external integrators and vendors on solution architecture. Leads design review meetings.Communicates with VP/CISO-level stakeholders on architecture strategy and investment. Presents to executive leadership on convergence architecture and roadmaps. Engages with major vendors at executive level. Coordinates across physical security, cybersecurity, IT, and facilities organizations.Regular engagement with CISO, CTO, and VP-level leadership on architecture strategy. Presents to executive committees on convergence architecture and investment. Engages with industry bodies and standards organizations. Communicates architectural vision to diverse audiences across the organization.Direct engagement with C-suite and board-level stakeholders on convergence architecture strategy. Keynotes at major industry conferences. Engages with government and standards bodies at leadership level. Communicates architectural vision and risk to the broadest organizational and industry audiences.Engages with CEO, board of directors, and global industry leadership. Keynotes at the most prestigious security conferences (RSA, ASIS Global, ISC West). Advises government agencies and international standards bodies. Publishes for industry, academic, and policy audiences. Recognized as a global thought leader.
Degree / ExperienceBachelor's degree in Computer Science, Electrical Engineering, Architecture, or related field, OR 1-2 years of experience in physical security design, IT architecture, or systems engineering, OR completion of relevant vendor architecture certification programs.Bachelor's degree in Computer Science, Electrical Engineering, or related field, OR 2-4 years of physical security design or IT architecture experience. Demonstrated ability to produce quality architectural documentation and designs.Bachelor's or Master's degree in Computer Science, Engineering, or related field, OR 5-8 years of physical security design or enterprise architecture experience with demonstrated convergence expertise.Bachelor's or Master's degree in Computer Science, Engineering, or related field, OR 8-12 years of progressive experience in physical security architecture and cybersecurity with demonstrated enterprise-scale design leadership.Master's degree in Computer Science, Engineering, or related field, OR 12-16 years of progressive experience in security architecture with demonstrated enterprise-scale convergence leadership and thought leadership.Master's degree or PhD in Computer Science, Engineering, or related field, OR 16-20 years of progressive experience in security architecture with demonstrated industry-level thought leadership and organizational transformation in physical-cyber convergence.Advanced degree (Master's or PhD) in Computer Science, Engineering, or related field, OR 20+ years of exceptional experience in security architecture with globally recognized contributions to convergence architecture. Demonstrated industry-defining impact.
Certifications
  • CompTIA Security+
  • CompTIA Network+
  • ASIS Physical Security Professional (PSP) - in progress
  • TOGAF Foundation (for architecture methodology)
  • ASIS Physical Security Professional (PSP)
  • Genetec Security Center Certified Architect
  • CompTIA Security+
  • TOGAF Certified
  • Lenel/LenelS2 Certified Designer
  • ASIS Certified Protection Professional (CPP)
  • ASIS Physical Security Professional (PSP)
  • CISSP
  • TOGAF Certified Practitioner
  • SABSA Chartered Security Architect (SCF)
  • CISSP-ISSAP (Information Systems Security Architecture Professional)
  • ASIS Certified Protection Professional (CPP)
  • SABSA Chartered Security Architect (SCF or SCP)
  • TOGAF Certified Practitioner
  • CISM
  • CISSP-ISSAP
  • ASIS Certified Protection Professional (CPP)
  • SABSA Chartered Security Architect (SCP)
  • CISM
  • Industry recognition through publications or standards leadership
  • CISSP-ISSAP
  • ASIS Certified Protection Professional (CPP)
  • SABSA Chartered Security Architect (Master)
  • Industry fellow or distinguished architect designations
  • Recognized through architectural publications or standards leadership
  • CISSP-ISSAP
  • ASIS Certified Protection Professional (CPP)
  • SABSA Chartered Security Architect (Master)
  • Industry fellow, distinguished architect, or equivalent recognition
  • Recognized through seminal publications, standards leadership, or architectural innovation
Salary: US Gov't$55,000 - $75,000 (GS-7 to GS-9)$70,000 - $95,000 (GS-9 to GS-11)$90,000 - $120,000 (GS-12 to GS-13)$115,000 - $155,000 (GS-14 to GS-15)$135,000 - $175,000 (GS-14 to GS-15)$155,000 - $191,900 (GS-15 to SES)$170,000 - $191,900 (GS-15 step 10 to SES)
Salary: US Startup$60,000 - $80,000$75,000 - $100,000$100,000 - $135,000$130,000 - $170,000$150,000 - $200,000$180,000 - $250,000$220,000 - $300,000
Salary: US Corporate$60,000 - $85,000$75,000 - $110,000$100,000 - $145,000$140,000 - $190,000$175,000 - $240,000$220,000 - $300,000$270,000 - $380,000
Salary: Big Tech (Mag7)$120,000 - $185,000$165,000 - $270,000$240,000 - $380,000$320,000 - $520,000$400,000 - $600,000$520,000 - $720,000$650,000 - $950,000
↑ Back to navigation
0 Compare
Click to expand