Professionals in information management and IT security: career prospects for graduates

Graduates of this degree program have a unique skill set that allows them to analyze, design, and implement secure ICT architectures and security structures while applying a holistic perspective and taking social aspects into account. This ensures a sustainable and secure flow of information/exchange of data within companies and across company boundaries. Consequently, the career prospects for professionals in information management and IT security are very good.

Where are graduates employed?

  • Services in information and communication technology
  • Development of computer software and Web applications
  • Financial and insurance services
  • Energy sector
  • Public administration

What jobs and functions do graduates perform?

  • IT/information security specialist
  • Data security expert
  • Penetration tester
  • Software developer for secure applications software
  • Web developer for secure Web platforms
  • IT security and information security consultant
  • IT (security) architect
  • IT manager
  • EDP manager
  • IT coordinator
  • IT project manager
  • IT tester
  • Chief information officer (CIO)
  • CERT employee
  • IT risk manager
  • Information security officer
  • Entrepreneur

What are some of their typical tasks and activities?

  • Implementing company-wide security management
  • Drafting and developing security policies
  • Identifying and defending against potential internal and external threats, and planning security architectures within companies
  • Performing penetration tests and audits
  • Developing security structures at tactical and operational levels
  • Implementing, maintaining, and applying change management to security measures
  • Performing risk analyses and carrying out risk management
  • Preparing for certifications
  • Planning the utilization of Web 2.0 and Enterprise 2.0 solutions
  • Developing secure software in Web, Web 2.0, desktop, and Enterprise environments
  • Planning the utilization of cloud services
  • Planning, monitoring, and regulating the flow of information within companies
  • Designing integration strategies for cross-company IT systems