Interested in Joining?
The insurance industry is hiring students of ALL majors for ALL functional areas.
Are you interested in a career that is stable, rewarding, and limitless? Could you benefit from expanding your networking, increasing exposure to educational and professional development opportunities, building your resume, and improving your leadership skills? Then Gamma Iota Sigma is for you!
Interested in Joining?
The insurance industry is hiring students of ALL majors for ALL functional areas.
Are you interested in a career that is stable, rewarding, and limitless? Could you benefit from expanding your networking, increasing exposure to educational and professional development opportunities, building your resume, and improving your leadership skills? Then Gamma Iota Sigma is for you!
Advisory Council
The Advisory Council consist of Sustaining Partner Companies
The Advisory Council help leads the strategic direction of Gamma Iota Sigma to grow and sustain a robust and diverse student talent pipeline, ensuring the industry's vibrant future.
What They Do:
Information security analysts plan and carry out security measures to protect an organization’s computer networks and systems. Their responsibilities are continually expanding as the number of cyberattacks increases.
Typical Duties:
-
Monitor their organization’s networks for security breaches and investigate a violation when one occurs
-
Install and use software, such as firewalls and data encryption programs, to protect sensitive information
-
Prepare reports that document security breaches and the extent of the damage caused by the breaches
-
Conduct penetration testing, which is when analysts simulate attacks to look for vulnerabilities in their systems before they can be exploited
-
Research the latest information technology (IT) security trends
-
Develop security standards and best practices for their organization
-
Recommend security enhancements to management or senior IT staff
-
Help computer users when they need to install or learn about new security products and procedures
Why It's Important:
It is important that every organisation has a cyber risk management plan in place. A risk management strategy helps to inform decision-makers of the cyber risks associated with day to day operations or new ventures. A cyber risk assessment will assess and establish the likelihood of any cyber-attacks that the business is currently vulnerable to. Knowing the key threats to your business means that money and time are spent in the right places. This will help prevent the risks identified in your assessment
Important Skills:
Analytical Skills
Detail Oriented
Ingenuity
Problem-solving Skills
Salary Range
The median annual wage: $99,730
The lowest 10% ~ $57,810
The highest 10% ~ $158,860
Professional Designations:
Certified Ethical Hacker (CEH)
CompTIA Security+
Certified Information System Security Professional (CISSP)
Certified Information Security Manager (CISM)
Certified Information Systems Auditor (CISA)
NIST Cybersecurity Framework (NCSF)
Certified Cloud Security Professional (CCSP)
Computer Hacking Forensic Investigator (CHFI)
Cisco Certified Network Associate (CCNA) Security
(Mouse over yellow box to close)
Additional Resources: