With your Master of Science in Cybersecurity from Utica College, you'll have the technical skills and specialized expertise to join the front lines in the battle against cybercrime. Plus, the curriculum will help you prepare to take advantage of testing for professional certifications like CompTIA A+, Security+ or Network+, and the CISSP, opening up even more opportunities.
Master's in Cybersecurity: Career Outlook
Protect the world's data from cybercriminals and thrive.
- Top 10% of computer and information security analysts earn more than $158,860 annually1
- 32% Job Growth Projected, 2018–20282
- 350% Growth in Open Cybersecurity Positions from 2013–20213
With a median salary of $99,730 in 2019 and a predicted growth in jobs of 32 percent by 2028, there is no shortage of career potential.2 Because data breaches are increasing and a shortage of qualified experts persists, your new skills will put you in high demand.
As you build your skills through our industry-responsive curriculum and choose a specialization in either Electronic Crime, Intelligence, Malware Analysis, Computer Forensics, Cyber Operations, Cyber Policy, or Data Analytics, you'll open doors to several high-paying roles:
Information Security Analyst
Create systems to protect sensitive data, infrastructure, and business processes from cyberattacks. Minimize damage from ongoing attempts to steal or corrupt data while anticipating future threats.4
With a high-level understanding of the principles and technical tactics of cyberattacks and defense, build the structure, systems, and teams to anticipate, monitor, deter, or disrupt security breaches before they occur.5
Chief Security Officer
Take on the demanding task of ensuring all security teams, protocols, and systems are contributing to a successful and productive business or organization. Duties may include interfacing with organizational leadership to explain security protocols, managing high-level teams, or coaching departmental heads on best practices.6
Additional roles for cybersecurity experts:
- IT Risk Manager
- Cyber Operations Analyst
- Principal Consultant Cybersecurity
- Supplier Security Compliance Manager
Request More Information
We'd love to get to know you and hear more about your educational and professional goals. If you'd like to learn more about one of our programs, fill out this form and we'll be in touch:
Specializations: Find Your Cybersecurity Niche
To further tailor your degree to the career you want, hone specific skills with a Master of Science in Cybersecurity specialization:
Master of Science in Cybersecurity - Computer Forensics
Pursue your passion for collecting and preparing evidence for computer crimes such as fraud, child pornography and cyber espionage with courses that emphasize a comprehensive understanding of the forensic tools and techniques used to investigate and analyze network-related incidents and preserve digital evidence.
Master of Science in Cybersecurity - Cyber Operations
Gain the critical knowledge needed through a hands-on, lab-oriented curriculum that includes an in-depth examination of cyber tactics, techniques, and procedures, so you can better protect and defend organizations from cyber attacks.
Master of Science in Cybersecurity - Electronic Crime
Master the technical, legal, and ethical aspects of electronic crime, white collar crime and fraud investigation with a focus on risk and compliance, legal issues, fraud management, and advanced fraud analysis techniques.
Master of Science in Cybersecurity - Intelligence
Pursue your interest in cyber intelligence and counterintelligence, cyber counterterrorism and cyber counter sabotage with courses that focus on global and national cybersecurity policy analysis, the protection of critical infrastructures, as well as operations involving cyber threats and defense.
Master of Science in Cybersecurity - Malware Analysis
Pursue your interest in the technical aspects of malware analysis with courses that focus on the basics of malware, identification of malware, and mitigation of the effects of malware.
Master of Science in Cybersecurity - Cyber Policy
Understand the policies and practices of cybersecurity so you can become a leader in this emerging field. You'll graduate ready to help organizations manage security risks and protect assets.
Master of Science in Cybersecurity - Data Analytics
Explore concepts in business intelligence, data analytics, and data science. Learn how to analyze big data to make strategic decisions, and advance in this fast-growing field.
Key Skills Employers Need
A deep understanding of cybersecurity tools, techniques and technologies
Familiarity with traditional intelligence methods and procedures as applied to the cybersecurity domain
Critical thinking and information application related to the discipline of cybersecurity, including intelligence, computer forensics, cyber operations, electronic crime, and malware analysis
Applied knowledge of legal and technical aspects of a cybercrime investigation and the application of computer forensic tools
Ethical decision-making skills in cybersecurity management
The ability to identify and minimize damage from malware
Risk-assessment and management methods related to cybersecurity and national critical infrastructures
Cyber defense and attack methods
Beyond the Degree
We have the tools to help you make your next career move:
Work with your program director and professors for professional mentorship and support.
Job Search Assistance
Build your résumé, do mock interviews, and find new opportunities in your area.
Have our experts review your résumé and LinkedIn and learn to stand out from the crowd.
UC Career Connect
Register for events, create a visual profile for employers, and apply for jobs and internships through our online portal.
1Information Security Analysts – Pay. (2018, April 13). Retrieved January 7, 2019, from https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm#tab-5
2Information Security Analysts – Summary. (2018, April 13). Retrieved January 7, 2019, from https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm#tab-1
3Cybersecurity Jobs Report 2017 Edition (Rep.). (n.d.). Retrieved January 7, 2019, from Herjavec Group website: https://www.herjavecgroup.com/wp-content/uploads/2018/07/HG-and-CV-The-Cybersecurity-Jobs-Report-2017.pdf
4Average Information Security Analyst Salary. (n.d.). Retrieved January 7, 2019, from https://www.payscale.com/research/US/Job=Information_Security_Analyst/Salary
5Average Security Architect, IT Salary. (n.d.). Retrieved January 7, 2019, from https://www.payscale.com/research/US/Job=Security_Architect,_IT/Salary
6Average Chief Security Officer (CSO) Salary. (n.d.). Retrieved January 7, 2019, from https://www.payscale.com/research/US/Job=Chief_Security_Officer_(CSO)/Salary