As CenturyLink and Qwest merge companies, we are working hard to combine our systems. By supplying your service address zip code we will be able to get you to the right location. Thank you for your patience during the merger process.
Log in with your account username and password so that we can show you the pricing options available to you. Don't have an account yet? Select
"Enroll Now" on the My CenturyLink Login page to create one now.
A username is required.
A password is required.
We had an unexpected error, please try again.
By inputting your account information and clicking the "Show My Options" button, you provide consent to CenturyLink to access your account information, including the services you subscribe to, to respond to your inquiry and inform you of CenturyLink's products and services. You may deny us permission by proceeding no further and your denial will have no affect on your current services. Under federal law, it is your right and our duty to protect your account information.
Careers in Cybersecurity: What’s Out There?
October 28, 2020
By Rocio M.R.
With the digital workforce in full swing, companies and employees are becoming more aware of the importance of cybersecurity for their networks. As businesses expand their offerings online and employees rely on digital platforms to collaborate and complete their work, the risk of private information being threatened increases. While employees in the workforce and individuals at home need to understand how to keep their information online safe on a personal level, companies also need to be knowledgeable on this topic as their businesses expand.
Several studies show the great demand for roles in cybersecurity based on today’s digital climate. According to Forbes, there will be approximately 3.5 million unfilled positions in cybersecurity by 2021. They’ve reported on studies that estimate three in 10 cybersecurity professionals enter the field with a background outside of the world of IT. In addition, two-thirds out of 20,000 respondents believe that organizations lack the cybersecurity talent they need against potential threats. These staggering statistics reveal the high demand of cybersecurity jobs in the United States based on a heat map. You’ll notice based on this graph of the United States that there is much greater demand than supply in our country for cybersecurity jobs. In fact, you can find nearly exact numbers and models of how many positions are open by state and the types of certifications required for each position. Thus, if you have a drive to explore cybersecurity career opportunities, there are several different types of positions that might be a great fit and ones that could truly change the landscape of an organization’s operations.
Types of cybersecurity jobs
Careers in cybersecurity require individuals who would consider themselves critical thinkers, quick learners, analytical, clear communicators, and researchers. Like most jobs, you should expect to be able to roll with the punches, but also be sure to stay in-the-know regarding the latest technological trends, updates to networks, and more importantly, understanding how hackers think. Your work may consist of monitoring network activity or implementing various kinds of security plans for a company. Of course, you don’t have to understand all of these intricacies off the bat. Below we cover the wide range of job titles and areas of expertise that might be needed for any of these cybersecurity jobs.
An entry-level position in the field might have a title of IT technician or security specialist. Someone in an entry-level position might help administer technology systems, aid in web administration, or even help with the daily operations related to IT for a business. Even if you enter at the entry-level, there is plenty of room for growth. You might find yourself leading a team of your own in the future based on the knowledge you acquire from working in this competitive field.
A mid-level position might hold a title of cybersecurity consultant or analyst. Roles such as these require more high-skill knowledge of the field and they will likely wear many hats. In these positions, consultants will understand how to think a few steps ahead; they will understand how a hacker might think and how to defend against such attacks. People in such positions will know how to offer best practices to businesses and individuals on how to maintain safe networks and databases.
Higher-level positions may hold titles such as cybersecurity architect or engineer, which happen to be one of the most sought out positions in the world of cybersecurity jobs. Individuals in these positions are really the brains behind implementing solutions in the event of an attack. They have the intel on how to respond to security breaches with established procedures, and will likely be able to manage teams of IT specialists and other cybersecurity personnel to ensure that cybersecurity processes run smoothly. If you have an educational background in engineering and consider yourself an excellent communicator and team leader, this might be an excellent fit for you.
The field of cybersecurity won’t be leaving us anytime soon. In fact, we can only expect the digital workforce to expand, and thus, lead to even more gaps and nuances in how we secure our networks, sensitive information, and how we respond to ever-changing technological landscapes. Whether you’re on the market for a career change and have toyed with the idea of going into cybersecurity, or this is the first time you’ve ever heard of the cybersecurity field, we hope it’s inspired you to learn more.
For recommendations on other tech and lifestyle topics such as these, be sure to visit our social channels such as Facebook and LinkedIn.
This blog is provided for informational purposes only and may require additional research and substantiation by the end user. In addition, the information is provided "as is" without any warranty or condition of any kind, either express or implied. Use of this information is at the end user's own risk. CenturyLink does not warrant that the information will meet the end user's requirements or that the implementation or usage of this information will result in the desired outcome of the end user.