Cybersecurity Engineering

He is a professional who applies his knowledge of science, mathematics and engineering; to the resolution of complex problems of computer security, to prevent risks and incidents in critical technological infrastructures that affect the privacy and integrity of data, unauthorized access, or vulnerabilities that jeopardize the continuity of computer services and systems. the organizations.
Why Cybersecurity Engineering?
We are in a process of accelerated digital transformation, in which the emerging information technologies drive global development. Technologies such as mobile devices that access the internet, the cloud, artificial intelligence, 3D printing, robotics or vehicular autonomy which rely on the internet of things promoting productivity and the well-being of humanity. However, these devices must comply with regulations and data privacy regulations and computer security in their design, which requires available specialists to support this growth to enterprises, organizations and governments.
Where can you start?
As a graduate of this career you can work in different sectors that use intelligence systems at a technological level such as telecommunications companies, private or public security institutions (Police and National Defense, Justice and Public Ministry), Critical Infrastructures (transport or energy), banks , audit organizations and technological services, among other related and complementary sectors that operate on technological platforms.
WHAT CAN YOU WORK?
- Designer of safe and resilient technological infrastructure and solutions.
- Malware analyst
- Specialist in forensic computer science.
- Analyst of risks and computer vulnerabilities.
- Analyst in the prevention and management of computer security incidents.
- Specialist in the management of IT security incident and critical infrastructure care centers.
- Cybersecurity specialist.
- Analysts and algorithm designers for multiple applications.
- Researchers and developers of new network security models, by studying their reliability and fault tolerance, and evaluating their performance.
- Compliance auditors and monitoring of computer systems.
- Manager / director / information security manager.
- ICT solutions specialist.