{"id":9964,"date":"2019-06-03T15:05:14","date_gmt":"2019-06-03T19:05:14","guid":{"rendered":"https:\/\/web.uri.edu\/cs\/?page_id=9964"},"modified":"2019-12-24T11:46:27","modified_gmt":"2019-12-24T16:46:27","slug":"careers","status":"publish","type":"page","link":"https:\/\/web.uri.edu\/cs\/academics\/minor-programs\/cyber-security-minor\/careers\/","title":{"rendered":"Cyber Security Careers"},"content":{"rendered":"<h1>Cyber Security Minor<\/h1>\n<section class=\"cl-wrapper cl-menu-wrapper\"><nav id=\"\" class=\"cl-menu  \" data-name=\"cyber-security-minor\" data-show-title=\"0\"><ul id=\"menu-cyber-security-minor\" class=\"cl-menu-list cl-menu-list-no-js\"><li id=\"menu-item-9790\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-9790\"><a href=\"https:\/\/web.uri.edu\/cs\/academics\/minor-programs\/cyber-security-minor\/\">Overview<\/a><\/li>\n<li id=\"menu-item-9787\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-9787\"><a href=\"https:\/\/web.uri.edu\/cs\/academics\/minor-programs\/cyber-security-minor\/curriculum\/\">Curriculum<\/a><\/li>\n<li id=\"menu-item-16996\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-16996\"><a href=\"https:\/\/web.uri.edu\/cs\/academics\/minor-programs\/cyber-security-minor\/current-minors\/\">Current Minors<\/a><\/li>\n<li id=\"menu-item-9970\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-9970\"><a href=\"https:\/\/web.uri.edu\/cs\/academics\/minor-programs\/cyber-security-minor\/careers\/\">Careers<\/a><\/li>\n<\/ul><\/nav><\/section>\n<h2>Cyber Security Careers<\/h2>\n<div class=\"cl-wrapper cl-card-wrapper\"><a class=\"cl-card   right\" href=\"https:\/\/www.cyberseek.org\" title=\"\"><div class=\"cl-card-container text\"><div class=\"cl-card-text\"><h2>Explore Cyber Careers<\/h2><p>CyberSeek.org offers insight into the current career opportunities and can help in identifying job roles and interests.<\/p><\/div><\/div><div class=\"cl-card-container button\">CyberSeek Website<\/div><\/a><\/div>\n<p>The threats posed by cyber terrorism and cyber crime have been well documented in the Center For Strategic and International Studies reports Securing Cyberspace for the 44th Presidency and Cybersecurity Two Years Later. These reports clearly expose the ominous threats to the nation\u2019s security, economy, and private citizen welfare posed by cyber terrorism and cyber crime \u2013 as well as the alarming lack of national capacity to defend against them. Highlighted are concerns that include a gross shortage of qualified cyber security professionals in the workforce including private sector information technology\/security, law enforcement, emergency management, and the military. According to ESG Research, 22% of mid-market (i.e., 500-1000 employees) and enterprise (i.e., 1000 employees or more) believe that they have a problematic shortage of information security skills within their IT organizations. Furthermore, of those organizations planning on hiring new IT staff positions in 2011, 35% plan to hire for information security positions.<\/p>\n<p>Interested in a career in cyber security?<br \/>\nWe can help you embark on a government or private sector career as a:<\/p>\n<ul>\n<li>Cyber Incident Response<\/li>\n<li>Vulnerability Detection and Assessment<\/li>\n<li>Networks and Systems Engineering<\/li>\n<li>Cyber Risk and Strategic Analysis<\/li>\n<li>Intelligence and Investigation<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Cyber Security Minor Cyber Security Careers &nbsp; The threats posed by cyber terrorism and cyber crime have been well documented in the Center For Strategic and International Studies reports Securing Cyberspace for the 44th Presidency and Cybersecurity Two Years Later. These reports clearly expose the ominous threats to the nation\u2019s security, economy, and private citizen [&hellip;]<\/p>\n","protected":false},"author":1962,"featured_media":0,"parent":9766,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"class_list":["post-9964","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/web.uri.edu\/cs\/wp-json\/wp\/v2\/pages\/9964","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/web.uri.edu\/cs\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/web.uri.edu\/cs\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/cs\/wp-json\/wp\/v2\/users\/1962"}],"replies":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/cs\/wp-json\/wp\/v2\/comments?post=9964"}],"version-history":[{"count":3,"href":"https:\/\/web.uri.edu\/cs\/wp-json\/wp\/v2\/pages\/9964\/revisions"}],"predecessor-version":[{"id":12825,"href":"https:\/\/web.uri.edu\/cs\/wp-json\/wp\/v2\/pages\/9964\/revisions\/12825"}],"up":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/cs\/wp-json\/wp\/v2\/pages\/9766"}],"wp:attachment":[{"href":"https:\/\/web.uri.edu\/cs\/wp-json\/wp\/v2\/media?parent=9964"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}