Featured Advice
What are your interests?



The Investigative person will usually find a particular area of science to be of interest. They are inclined toward intellectual and analytical activities and enjoy observation and theory. They may prefer thought to action, and enjoy the challenge of solving problems with clever technology. They will often follow the latest developments in their chosen field, and prefer mentally stimulating environments.

Occupation Details

logo imagelogo image

IT Security Specialist

Job Zone

Most of these occupations require qualifications at NFQ Levels 7 or 8 (Ordinary / Honours Degrees) but some do not.

Related Experience
A considerable amount of work-related skill, knowledge, or experience is needed for these occupations. For example, you may need to complete three - four years of college and work for several years in the career area to be considered qualified.

Job Training
Employees in these occupations usually need several years of work-related experience, on-the-job training, and/or vocational training.

Job Zone Examples
Many of these occupations involve coordinating, supervising, managing, or training others. Examples include accountants, sales managers, computer programmers, chemists, environmental engineers, criminal investigators, and financial analysts.

€32k > 75
IT Security Specialist
Salary Range
(thousands per year)*
€32 - 75
Related Information:
Typical salary range is:
Graduate/Starting: 42
Senior/Potential: 75+
Data Source(s):
Smart Futures / Payscale.com

Last Updated: March, 2017

* The lower figures typically reflect starting salaries. Higher salaries are awarded to those with greater experience and responsibility. Positions in Dublin sometimes command higher salaries.
Shortage Indicator

Shortage of the following skills have been identified in the National Skills Bulletin 2017

InfoSec (IT security), IoT (internet of things), BYOD (bring your own device), data/information security; IT internal audit

Occupational Category

ICT Specialist & Project Managers

Also included in this category:

Technical directors (computer services); data centre managers; IT managers; IT support managers; programme managers (computing); project leaders (software design).

Number Employed:


Part time workers: 4%
Aged over 55: 5%
Male / Female: 75 / 25%
Non-Nationals: 17%
With Third Level: 90%
Return to List
Saves this course to your Career File if you are registered.

At a Glance... header image

Implements and monitors security protocols at the development stages of software systems, networks and data centres.

Videos & Interviews header image

Follow the links below to watch videos related to this occupation:

Note: you will be leaving the CareersPortal Site

Go..Search YouTube for IT Security Specialist videos

The Work header image

IT Security is fast becoming one of the most important roles in the tech sector as cybercriminals and hackers become more and more sophisticated.

Any computer connected to the Internet is vulnerable to cyber-attacks. Cyber security is the technique used to protect computers and networks from these types of intrusions and from criminal attack.

Specialists in cybersecurity are among the most sought-after professionals in the tech sector, as business and governments seek to fight off an increasingly daring and ruthless group of global cybercriminals and hackers. With some of the world’s biggest firms and banks as well as governments under constant fire of threats, skilled, clever and dedicated security specialists work in a field that demands a mix of artistry and technical expertise. They need to be one step ahead of the hackers and organised criminals at all times.

Alternative job titles for this role include:

  • Cybersecurity specialist
  • Network security specialist
  • Information security specialist
  • Cybersecurity software engineers

The Work

  • Implements security protocol at the development stages of software systems, networks and data centres
  • Looks for vulnerabilities and risks in hardware and software
  • Finds the best way to secure the IT infrastructure of an organisation
  • Builds firewalls into network infrastructures
  • Constantly monitors for attacks and intrusion
  • When the cybersecurity specialist finds a potential threat or attempted breach, close off the security vulnerability
  • Identifies the perpetrator and liaises with the police if necessary

There is strong demand for skilled, qualified IT security specialists both in Ireland and around the world as the threat from cybercriminals and hackers grows. There is great potential for career progression, especially in larger organisations and financial service providers. There is also scope for experienced security professionals to set up their own business as consultants.

Why it matters

Months after American hackers demonstrated how easily they could disable an electric car while it was in motion, carmakers are under growing pressure to do something about the threat. U.S. senators are asking carmakers to provide updates on what they were doing to protect motorists from unwanted intrusions. The Canadian military are now looking for car hackers to study “the security of automotive vehicles, including understanding their vulnerabilities and assessing the potential mitigation measures”. Similarly, Tesla and General Motors are hiring security researchers to help them secure their vehicles before release.

Typical employers of IT Security Specialists  include:

  • Network providers
  • Government
  • Banks
  • Schools and universities
  • Airlines
  • Any large organisation with a database
  • Security consultancy firms

 Smart Future

Personal Qualitiesheader image

Skills and qualities required for this role include:

  • Strong IT skills and knowledge including hardware, software and networks
  • Attention to detail
  • Ability to use logic and reasoning to identify the strengths and weaknesses of IT systems
  • A forensic approach to challenges
  • A deep understanding on how hackers work and ability to keep up with the fast pace of change in the criminal cyber-underworld
  • Ability to seek out vulnerabilities in IT infrastructures

Entry Routesheader image

Most positions in cyber security require at least a bachelors degree. Employers are seeking to hire employees with proficiency in:

  • Firewalls
  • Network Security
  • UNIX
  • CISA
  • Cryptography
  • Cisco
  • Transmission Control Protocol/Internet Protocol (TCP/IP)
  • System and Network Configuration
  • Scanners

 Relevant qualifications for a career in this area include Degrees in:

  • IT security
  • Computer programming
  • Computer science
  • Information science
  • Computer engineering
  • Software engineering.

All are common gateways to a career in IT Security. Alternative routes may apply to students with related courses, general computing certification or diploma level qualifications. Courses in Computer Forensics and Security, or Digital Forensics and Cyber Security can also be found at at the Institutes of Technology countrywide.

Further details on eligibility requirements for third level entry following FET /QQI qualification, see CAO course search.

Last Updated: November, 2015

Related Occupationsheader image

Contactsheader image


Organisation: Irish Software Association
Address: Confederation House, 84/86 Lower Baggot St. Dublin 2
Tel: (01) 605 1500
Email: Click here
Url Click here


Organisation: ICS - The Society for Chartered IT Professionals in Ireland
Address: 87-89 Pembroke Road, Dublin 4
Tel: (01) 644 7820
Email: Click here
Url Click here


Organisation: Irish Internet Association
Address: The Digital Hub, 157 Thomas Street, Dublin 8
Tel: (01) 542 4154
Email: Click here
Url Click here

Search for Jobs

Industry Expert

Career Articles

Cybersecurity and Computer Forensics

Career Guidance

This occupation is popular with people who have the following Career Interests...

...and for people who like working in the following Career Sectors:

Computers & ICT
Security, Defence & Law Enforcement

Search for Related Courses from Qualifax - the National Learners Database


Higher Ed & CAO Course suggestions
If you are interested in this occupation, then the following courses may also be of interest. Note that these course suggestions are not intended to indicate that they lead directly to this occupation, only that they are related in some way and may be worth exploring.
Courses found: 124
Applied Computing
Applied Computing
Arts (Digital Arts and Technology)
Arts (Film and Digital Media)
Arts - Computer Science
Arts - Computer Science
Arts - Information and Communication Studies
Arts - Information Technology
Automotive and Automation Systems
Bachelor of Science in Computing (Cavan Institute)
Business Information Management
Cloud and Networks
Computational Thinking (Computer Science, Maths & Philosophy
Computer Applications
Computer Engineering
Computer Engineering
Computer Engineering in Mobile Systems
Computer Forensics & Security
Computer Forensics & Security
Computer Games Development
Computer Games Development
Computer Networks and Cloud Infrastructure
Computer Networks and Systems Management
Computer Science
Computer Science
Computer Science
Computer Science
Computer Science (Infrastructure)
Computer Science (International)
Computer Science / Multimedia, Mobile and Web Development (through Arts)
Computer Science / Multimedia, Mobile and Web Development (through Arts)
Computer Science / Multimedia, Mobile and Web Development (through Science)
Computer Science / Multimedia, Mobile and Web Development (through Science)
Computer Science and Business
Computer Science and Information Technology
Computer Science and Language
Computer Security and Digital Forensics
Computer Systems
Computer Systems and Networking
Computing & Multimedia
Computing (Information Technology)
Computing (Information Technology)
Computing (Smart Technologies)
Computing - Cloud Computing
Computing - Common Entry
Computing - Games Design and Development (Thurles)
Computing - Games Development
Computing - Software Development
Computing - Web and Mobile Technology
Computing and Digital Media
Computing and Digital Media
Computing in Games Development
Computing in Software Development
Computing in Software Development
Computing Science
Computing Science
Computing Science (Cloud Computing)
Computing Science (Games Development)
Computing Science (Network Management)
Computing Science (Software Development)
Computing Technologies (Common Entry)
Computing with Games Development
Computing with Games Development
Computing with Languages
Computing with Media Development
Computing with Media Development
Computing with Software Development
Computing with Software Development
Creative Computing
Creative Digital Media
Cybercrime and IT Security
Cybercrime and IT Security
Data Analytics
Digital Forensics and Cyber Security
Digital Forensics and Cyber Security
Engineering Software
Engineering Software
Enterprise Computing
Games Development
Information Systems/Information Technology
Information Technology
Information Technology
Information Technology
Information Technology - Online Flexible Learning
Information Technology Management
Information Technology Management
Information Technology Management
Interactive Digital Media
Internet of Things
Internet of Things
Internet Systems Development
Internet Systems Development
IT Management
Media Development
Multimedia Applications Development
Multimedia Web Development
Networking Technologies
Psychology and Computing
Robotics and Intelligent Devices
Softeware and Electronic Engineering
Software and Electronic Engineering
Software Design (Game Development or Cloud Computing)
Software Development
Software Development
Software Development
Software Development
Software Development
Software Development (Mobile Apps and Connected Devices)
Software Systems Development
Software Systems Development
Web Development