IST graduates bring expertise and innovation to a variety of positions—from their first jobs to the executive suite—in business, health care, defense, technology, and countless other industries. Use the information below as a starting point to discover what opportunities might be available to you with a degree from the College of IST.
NOTE: The below list of positions is for informational purposes only and is not a guarantee that an individual student will obtain one of these positions upon graduation.
AI Engineer
Builds AI models from the ground up and explains results to product managers and stakeholders.
AI Researcher
Develops new AI algorithms and methods, often in collaboration with academic or research institutions.
AI Software Developer
Develops AI software by designing algorithms, writing code, and collaborating with teams to build intelligent systems that solve complex problems or automate tasks.
Application Developer
Designs, builds, and tests apps, collaborating with clients and teams to meet needs, fix bugs, and ensure functional, user-friendly products.
Application Security Specialist
Conducts security assessments, improves application security practices, and educates development teams to ensure delivery of secure, reliable software.
Application Systems Analyst
Analyzes needs, determines build-or-buy solutions, and oversees implementation, documentation, and support of software systems.
Big Data Engineer
Builds systems to manage large data sets, leveraging platforms like Hadoop or Spark, and integrates data for accessibility by data scientists and analysts.
Business Intelligence Analyst
Designs and implements systems for data-driven decision-making, building dashboards, reports, and visualizations using business intelligence tools to present integrated business insights.
Business Systems Analyst/Consultant
Analyzes business problems and designs technology solutions, bridging gaps through architecture, tools, or software applications to resolve issues and improve processes.
Chief Privacy Officer
Manages information policies, leads data breach response, and oversees privacy and compliance, ensuring appropriate use of company data with strong communication and public relations skills.
Client Security Inquiry Specialist
Provides solutions to guard against emerging threats, identifies malware, assesses security vulnerabilities, configures client security settings, and prioritizes issues through reports and alerts.
Cloud and Infrastructure Services Consultant
Supports businesses by leveraging IT clouds, producing architectural artifacts like governance, security, and performance models, and facilitating cloud migrations for meaningful IT changes.
Cloud Database Engineer
Designs and manages cloud databases (AWS, Azure, Google Cloud), focusing on scalability, performance, and integration with on-premises systems.
Cloud Integration Specialist
Connects on-premises systems with cloud services, setting up and maintaining integrations while focusing on security, data flow, and performance.
Computer Forensics Specialist
Assists law enforcement in cyber crimes by evaluating attacks, collecting evidence, and extracting data to identify the attack type, perpetrator, and stolen information.
Computer Programmer/Analyst
Writes and tests code to ensure applications and software function properly, converting program designs into executable instructions for computers.
Counter-Terrorism Analyst
Analyzes intelligence data on terrorist groups, discerns relevant information, and assesses their plans and capabilities to communicate findings effectively.
Cyber Consultant/Penetration Tester
Conducts manual and automated penetration tests on networks, applications, and technologies, analyzes results, mitigates false positives, and provides recommendations to improve security measures.
Cyber Intelligence Analyst
Collects and analyzes information on internet-based malware crimes, predicts cyber criminal activities, and creates threat intelligence reports for decision-makers and security officials.
Cybersecurity Analyst/Cyber Risk Consultant
Maintains digital data security, trains staff on information management, adopts security measures for online sharing, reviews system flaws, and recommends IT security improvements.
Cybersecurity Engineer
Focuses on designing systems resilient to disruptions, from natural disasters to malicious acts, ensuring solutions meet functional requirements while preventing misuse through security policies.
Cybersecurity GRC (Governance, Risk, and Compliance) Consultant
Enhances cybersecurity by focusing on governance, risk management, and compliance, developing policies, mitigating risks, and ensuring adherence to industry standards and regulations.
Cyberthreat Advisor
Analyzes the threat landscape and recommends security measures to help companies understand and prepare for cyber risks.
Data Analyst
Gathers, cleans, and interprets data to provide insights, collaborating across functions to integrate data and create a cohesive view of operations.
Data Architect
Designs the structure for an organization's data, ensuring scalable, secure databases and efficient data flow between systems for easy management across integrated platforms.
Data Engineer
Builds and maintains data pipelines to collect, store, and integrate data from various sources, supporting analytics and business intelligence across systems.
Data Governance Specialist
Creates policies and strategies for managing data across systems, ensuring compliance, improving data quality, and securing data in complex distributed environments.
Data Integration Specialist
Consolidates and synchronizes data from multiple sources, using ETL tools to build and maintain pipelines that feed into data warehouses or distributed databases.
Data Intelligence Engineer
Designs, builds, and manages systems that extract insights from large datasets, combining data engineering with analytics, machine learning, and AI to enable data-driven decision-making.
Data Scientist
Collaborates with data providers and users to define questions and use machine learning and data mining to develop predictive models, uncover insights, and forecast outcomes.
Data Specialist
Manages, secures, and optimizes databases, ensuring data integrity, backup, recovery, and high availability, with a focus on distributed systems across multiple locations or cloud environments.
Data Visualization Specialist
Creates visualizations and analytical tools to address targeted problems, enhancing data understanding, knowledge distillation, and decision-making by bridging computational systems with human analytical skills.
Distributed Systems Engineer
Builds and manages distributed computing environments, designing fault-tolerant, high-availability systems that support large-scale data integration and management across multiple locations.
Enterprise Integration Engineer
Designs, develops, and maintains connections between enterprise systems (ERP, CRM, etc.) using APIs, middleware, and cloud platforms. Manages complex integrations and communicates technical concepts to non-technical stakeholders.
Enterprise Resource Planning (ERP) Consultant
Implements and optimizes ERP systems like SAP, Oracle, or Microsoft Dynamics, integrating business functions and customizing solutions to meet enterprise clients' unique needs.
Enterprise Risk and Security Solutions Analyst
Identifies, assesses, and manages risks, protecting the enterprise’s resources, products, services, and external impacts on society and markets.
Ethics and Compliance Officer
Ensures ethical use of IT systems, data, and processes by aligning with laws, regulations, standards, and policies to protect the organization’s reputation and mitigate legal risks.
ETL Developer
Builds and manages processes to extract, transform, and load data between databases, data warehouses, and enterprise systems, ensuring data quality in distributed environments.
Federal Cyber Risk Analyst/Consultant
Assists clients in identifying unauthorized activities and intrusions in their networks in real-time.
Incident Responder
Documents and reports incidents related to cybersecurity, IT operations, or physical security, gathering accurate information and creating detailed reports on the event’s nature, impact, and causes.
Information and Cybersecurity Analyst/System Security
Designs and implements security measures to protect computer systems, networks, and data from attacks.
Information Architect
Organizes, structures, and designs information within digital products to ensure usability, accessibility, and effectiveness, creating logical content structures for seamless user navigation and interaction.
Intelligence Research Analyst
Collects, evaluates, analyzes, and interprets information to provide insights that support decision-making in national security, law enforcement, business strategy, or competitive intelligence.
IT Analyst
Analyzes and transmits specialized information, including acquiring, analyzing, indexing, and preparing abstracts. Manages technical information services, technology assessment, research support, and engineering services.
IT Auditor
Evaluates IT infrastructure to ensure effectiveness, security, and compliance, identifying vulnerabilities, assessing risks, and recommending improvements to strengthen controls and mitigate threats.
IT Consultant
Advises clients on building and operating IT networks, solving problems, improving performance, and offering solutions for business models, websites, and other IT aspects. Conducts analysis, proposals, and training.
IT Operations Engineer
Ensures the smooth functioning of infrastructure and operations supporting application deployment, including network, server management, ITIL, and help desk services. Defines processes, policies, roles, and best practices for enterprise operations.
IT Project Manager
Coordinates cross-functional teams to manage technology projects, overseeing planning, execution, monitoring, and closure. Expert in Agile, Waterfall, and project tracking tools, with strategic insight into organizational impact.
IT Specialist
Specializes in areas like programming, networks, internet, web design, or mobile computing, adapting to new technologies and trends as they emerge in each field.
Machine Learning Engineer
Focuses on research, development, and design of automated AI systems for data classification, pattern recognition, and predictions, developing machine learning algorithms to create predictive models.
Natural Language Processing Specialist
Develops AI models for language-related applications like speech recognition, chatbots, and text analytics.
Network and Systems Security Analyst
Protects the usability and integrity of networks and data, using hardware and software technologies to manage access and prevent threats from entering or spreading.
Network Defense Analyst
Analyzes data from cyber defense tools (e.g., IDS alerts, firewalls, network logs) to identify and mitigate threats within the environment.
Network Infrastructure Engineer
Designs and implements computer networks, focusing on high-level planning and selection of data communication components to meet user and corporate needs, including LAN, WAN, Internet, and intranet integration.
Network Security Engineer
Implements, maintains, and integrates corporate WAN, LAN, and server architecture. Administers network security hardware/software, enforces security policies, and supports external audits, troubleshooting, and perimeter security.
Penetration Tester/Ethical Hacker
Probes and exploits security vulnerabilities in web applications, networks, and systems using penetration tools to simulate cyberattacks, helping organizations improve their security.
Product Designer
Oversees the design process from start to finish, improving products, brainstorming solutions, gathering stakeholder input, and liaising between designers, engineers, and researchers to create mock-ups.
Quality Engineering and Assurance Analyst
Supports planning, design, and execution of system testing, collaborating with IT and business units to validate test cases, develop plans, and ensure user expectations are met.
Risk Assurance Associate
Identifies, assesses, and mitigates risks by reviewing controls, generating reports, and providing recommendations to enhance risk management practices within an organization.
Security Administrator
Installs, administers, and troubleshoots security solutions, while writing security policies and training documents for colleagues on security procedures.
Security Analyst
Determines effective methods to protect computers, networks, and data, conducting vulnerability testing, risk analyses, and security assessments, while designing secure architectures and delivering technical reports.
Security Engineer
Focuses on designing systems to handle disruptions, from natural disasters to malicious acts, ensuring engineering solutions meet requirements while preventing misuse through security policies.
Security Operations Center Analyst
Secures, monitors, responds to incidents, recovers systems, remediates issues, ensures compliance, and coordinates activities to maintain security and system integrity.
Security Software Developer
Secures, designs, develops, and implements software solutions focused on protecting digital systems from cyber threats, analyzing vulnerabilities, creating defenses, and embedding security measures.
Security Solutions Analyst
Secures, develops, implements, and manages information security, governance, and risk programs, analyzing business processes, identifying security risks, and designing solutions to protect data and systems.
Software Engineer
Applies programming languages and engineering principles to design, develop, test, and maintain software applications and systems. Collaborates with cross-functional teams to analyze user needs, create efficient algorithms, and implement scalable solutions.
Solutions Architect
Shapes and plans large-scale integrations and tech solutions, leveraging deep systems architecture knowledge to align technologies and streamline business operations.
Systems Administrator
Designs and manages complex systems across their life cycles, applying systems thinking to address requirements, reliability, logistics, testing, and coordination in large-scale, interdisciplinary projects.
Systems Analyst
Selects, evaluates, and implements technology solutions to meet business needs, collaborating with stakeholders to design integrations and ensure compatibility with existing IT infrastructure.
Technical Risk Advisor
Scopes and monitors technology risks, performs assessments, oversees control testing, supports remediation, and provides technical guidance to improve and implement effective technology controls.
Technology Advisor
Provides expert advice and detailed information in a specialized field, guiding organizations to ensure safe, effective practices and informed decision-making in complex or high-risk scenarios.
Technology Specialist
Supports diverse business customers by resolving issues, adapting to varying needs, using customer-facing systems, and applying technical knowledge to troubleshoot evolving technologies.
Usability Engineer
Improves user-friendliness of software, hardware, and websites by applying computer science and psychology principles to identify and solve usability issues.
User Interface/User Experience Designer
Creates the look and feel of features across web and mobile platforms by understanding user needs, translating research into visual designs, and delivering detailed specs for development.