Popular Careers

Career Development

Career development resources for aspiring professionals.

Career Change Center

Career change guides, tutorials and resources for professionals in transition.

Job Search Resources

Job search resources, websites, guides and directories for job seekers.


Career and Education Opportunities for Computer Security Specialists in Westminster, Colorado

Many educational and employment opportunities exist for computer security specialists in the Westminster, Colorado area. The national trend for computer security specialists sees this job pool growing by about 23.2% over the next eight years. In general, computer security specialists plan, coordinate, and implement security measures for information systems to regulate access to computer data files and prevent unauthorized modification, destruction, or disclosure of information.

Computer security specialists earn approximately $34 hourly or $71,950 per year on average in Colorado. Nationally they average about $31 hourly or $66,310 yearly. Earnings for computer security specialists are not quite as good as earnings in the general category of Computer in Colorado and not quite as good as general Computer category earnings nationally. Computer security specialists work in a variety of jobs, including: information technology specialist, information security manager, and certified information systems security professional .

There are fourteen schools within twenty-five miles of Westminster where you can study to be a computer security specialist, among sixty-four schools of higher education total in the Westminster area. Computer security specialists usually hold a Bachelor's degree, so you can expect to spend about four years studying to be a computer security specialist if you already have a high school diploma.

CAREER DESCRIPTION: Computer Security Specialist

In general, computer security specialists plan, coordinate, and implement security measures for information systems to regulate access to computer data files and prevent unauthorized modification, destruction, or disclosure of information.

Computer security specialists talk with users to consider issues such as computer data access needs and programming changes. They also document computer security and emergency measures policies and tests. Equally important, computer security specialists have to train users and promote security awareness to insure system security and to further optimize server and network efficiency. They are often called upon to direct implementation of computer system plans with establishment personnel and outside vendors. They are expected to monitor use of data files and regulate access to protect data in computer files. Finally, computer security specialists monitor current reports of computer viruses to establish when to update virus protection systems.

Every day, computer security specialists are expected to be able to listen to and understand others in meetings. They need to read and understand documents and reports. It is also important that they articulate ideas and problems.

It is important for computer security specialists to encrypt data transmissions and erect firewalls to conceal confidential data as it is being transmitted and to keep out tainted digital transfers. They are often called upon to inspect violations of computer security procedures and consider procedures with violators to insure violations are not repeated. Somewhat less frequently, computer security specialists are also expected to monitor current reports of computer viruses to establish when to update virus protection systems.

Computer security specialists sometimes are asked to modify computer security files to incorporate new software or change individual access status. and perform risk assessments and execute tests of data processing systems to insure functioning of data processing efforts and security measures. And finally, they sometimes have to inspect violations of computer security procedures and consider procedures with violators to insure violations are not repeated.

Like many other jobs, computer security specialists must have exceptional integrity and be able to absorb the factors involved and a problem and provide a well thought out solution.

Similar jobs with educational opportunities in Westminster include:

  • Applications Programmer. Develop, create, and modify general computer applications software or specialized utility programs. Analyze user needs and develop software solutions. Design software or customize software for client use with the aim of optimizing operational efficiency. May analyze and design databases within an application area, working individually or coordinating database development as part of a team.
  • Computer Programmer. Convert project specifications and statements of problems and procedures to detailed logical flow charts for coding into computer language. Develop and write computer programs to store, locate, and retrieve specific documents, data, and information. May program web sites.
  • Computer Scientist. Conduct research into fundamental computer and information science as theorists, designers, or inventors. Solve or develop solutions to problems in the field of computer hardware and software.
  • Computer Support Specialist. Provide technical assistance to computer system users. Answer questions or resolve computer problems for clients in person, via telephone or from remote location. May provide assistance concerning the use of computer hardware and software, including printing, and operating systems.
  • Computer Systems Analyst. Analyze science, engineering, and all other data processing problems for application to electronic data processing systems. Analyze user requirements, procedures, and problems to automate or improve existing systems and review computer system capabilities, workflow, and scheduling limitations. May analyze or recommend commercially available software. May supervise computer programmers.
  • Computer Systems Engineer. Research, design, and test operating systems-level software, compilers, and network distribution software for medical, industrial, and general computing applications. Set operational specifications and formulate and analyze software requirements. Apply principles and techniques of computer science, engineering, and mathematical analysis.
  • Data Base Design Analyst. Coordinate changes to computer databases, test and implement the database applying knowledge of database management systems. May plan, coordinate, and implement security measures to safeguard computer databases.
  • Network Operations Analyst. Determine user requirements and design specifications for computer networks. Plan and implement network upgrades.
  • Network Systems and Data Communications Analyst. Analyze, design, and evaluate network systems, such as local area networks (LAN), wide area networks (WAN), Internet, intranet, and other data communications systems. Perform network modeling, analysis, and planning. Research and recommend network and data communications hardware and software. Includes telecommunications specialists who deal with the interfacing of computer and communications equipment. May supervise computer programmers.
  • Network and Computer Systems Administrator. Install, configure, and support an organization's local area network (LAN), wide area network (WAN), and Internet system or a segment of a network system. Maintain network hardware and software. Monitor network to ensure network availability to all system users and perform necessary maintenance to support network availability. May supervise other network support and client server specialists and plan, coordinate, and implement network security measures.
  • Software Engineer. Design and develop solutions to complex applications problems, system administration issues, or network concerns. Perform systems management and integration functions.

EDUCATIONAL OPPORTUNITIES: Computer Security Specialist Training

Front Range Community College - Westminster, CO

Front Range Community College, 3645 W 112th Ave, Westminster, CO 80031. Front Range Community College is a large college located in Westminster, Colorado. It is a public school with primarily 2-year programs and has 15,480 students. Front Range Community College has a less than one year program in Information Science/Studies which graduated twelve students in 2008.

University of Colorado Denver - Denver, CO

University of Colorado Denver, , Denver, CO 80217-3364. University of Colorado Denver is a large university located in Denver, Colorado. It is a public school with primarily 4-year or above programs. It has 17,510 students and an admission rate of 68%. University of Colorado Denver has 2 areas of study related to Computer Security Specialist. They are:

  • Computer and Information Sciences, bachelor's degree, master's degree, and doctor's degree which graduated sixteen, thirty, and four students respectively in 2008.
  • Information Science/Studies, master's degree which graduated 28 students in 2008.

Colorado Technical University - Greenwood Village, CO

Colorado Technical University, 5775 Denver Tech Ctr Blvd, Greenwood Village, CO 80111-3201. Colorado Technical University is a small university located in Greenwood Village, Colorado. It is a private for-profit school with primarily 4-year or above programs and has 1,010 students. Colorado Technical University has an associate's degree and a bachelor's degree program in Information Science/Studies which graduated one and fourteen students respectively in 2008.

Colorado Christian University - Lakewood, CO

Colorado Christian University, 8787 West Alameda Avenue, Lakewood, CO 80226. Colorado Christian University is a small university located in Lakewood, Colorado. It is a private not-for-profit school with primarily 4-year or above programs. It has 2,583 students and an admission rate of 32%. Colorado Christian University has a bachelor's degree program in Computer and Information Sciences.

Regis University - Denver, CO

Regis University, 3333 Regis Blvd, Denver, CO 80221-1099. Regis University is a large university located in Denver, Colorado. It is a private not-for-profit school with primarily 4-year or above programs. It has 11,238 students and an admission rate of 44%. Regis University has 2 areas of study related to Computer Security Specialist. They are:

  • Computer and Information Sciences, bachelor's degree, postbaccalaureate certificate, and master's degree which graduated forty-nine, fifty-four, and ninety-three students respectively in 2008.
  • Information Science/Studies, bachelor's degree which graduated 1 student in 2008.

Westwood College-Denver North - Denver, CO

Westwood College-Denver North, 7350 N Broadway, Denver, CO 80221. Westwood College-Denver North is a medium sized college located in Denver, Colorado. It is a private for-profit school with primarily 4-year or above programs. It has 5,843 students and an admission rate of 99%. Westwood College-Denver North has 2 areas of study related to Computer Security Specialist. They are:

  • Computer Systems Networking and Telecommunicationsááá(NEW, bachelor's degree which graduated 31 students in 2008.
  • Computer and Information Systems Security, bachelor's degree which graduated 51 students in 2008.

Arapahoe Community College - Littleton, CO

Arapahoe Community College, 5900 S. Santa Fe Dr., Littleton, CO 80160-9002. Arapahoe Community College is a medium sized college located in Littleton, Colorado. It is a public school with primarily 2-year programs and has 7,088 students. Arapahoe Community College has 4 areas of study related to Computer Security Specialist. They are:

  • Computer and Information Sciences, less than one year and associate's degree which graduated one and one students respectively in 2008.
  • Computer Systems Networking and Telecommunicationsááá(NEW, associate's degree which graduated 5 students in 2008.
  • System, Networking, and LAN/WAN Management/Manager, less than one year which graduated 5 students in 2008.
  • Computer and Information Sciences & Support Services, Other Specialties, associate's degree which graduated 2 students in 2008.

National American University-Denver - Denver, CO

National American University-Denver, 1325 S. Colorado Boulevard, Suite 100, Denver, CO 80222-3308. National American University-Denver is a small university located in Denver, Colorado. It is a private for-profit school with primarily 4-year or above programs and has 268 students. National American University-Denver has a bachelor's degree program in System, Networking, and LAN/WAN Management/Manager which graduated one student in 2008.

University of Denver - Denver, CO

University of Denver, 2199 S. University Blvd, Denver, CO 80208. University of Denver is a large university located in Denver, Colorado. It is a private not-for-profit school with primarily 4-year or above programs. It has 11,409 students and an admission rate of 64%. University of Denver has 2 areas of study related to Computer Security Specialist. They are:

  • Information Science/Studies, master's degree which graduated 62 students in 2008.
  • Computer Systems Analysis/Analyst, bachelor's degree which graduated 4 students in 2008.

DeVry University-Colorado - Westminster, CO

DeVry University-Colorado, 1870 West 122nd Avenue, Ste. 316, Westminster, CO 80234-2010. DeVry University-Colorado is a small university located in Westminster, Colorado. It is a private for-profit school with primarily 4-year or above programs. It has 1,081 students and an admission rate of 93%. DeVry University-Colorado has 2 areas of study related to Computer Security Specialist. They are:

  • Computer Systems Analysis/Analyst, bachelor's degree which graduated 11 students in 2008.
  • Computer Systems Networking and Telecommunicationsááá(NEW, associate's degree, bachelor's degree, and master's degree which graduated sixteen, seven, and one students respectively in 2008.

Emily Griffith Opportunity School - Denver, CO

Emily Griffith Opportunity School, 1250 Welton Street, Denver, CO 80204-2197. Emily Griffith Opportunity School is a small school located in Denver, Colorado. It is a public school with primarily less-than 2-year programs and has 2,148 students. Emily Griffith Opportunity School has a one to two year program in Computer Systems Networking and Telecommunicationsááá(NEW which graduated one student in 2008.

ITT Technical Institute-Thornton - Thornton, CO

ITT Technical Institute-Thornton, 500 E 84th Ave Ste B12, Thornton, CO 80229-5338. ITT Technical Institute-Thornton is a small school located in Thornton, Colorado. It is a private for-profit school with primarily 4-year or above programs. It has 750 students and an admission rate of 47%. ITT Technical Institute-Thornton has 2 areas of study related to Computer Security Specialist. They are:

  • Computer Systems Networking and Telecommunicationsááá(NEW, associate's degree which graduated 46 students in 2008.
  • Computer and Information Systems Security, bachelor's degree which graduated 27 students in 2008.

Westwood College-Denver South - Denver, CO

Westwood College-Denver South, 3150 S Sheridan Blvd, Denver, CO 80227. Westwood College-Denver South is a small college located in Denver, Colorado. It is a private for-profit school with primarily 4-year or above programs. It has 404 students and an admission rate of 98%. Westwood College-Denver South has 2 areas of study related to Computer Security Specialist. They are:

  • Computer Systems Networking and Telecommunicationsááá(NEW, bachelor's degree which graduated 7 students in 2008.
  • Computer and Information Systems Security, bachelor's degree which graduated 12 students in 2008.

Community College of Denver - Denver, CO

Community College of Denver, 1111 W. Colfax Ave., Denver, CO 80204-2026. Community College of Denver is a medium sized college located in Denver, Colorado. It is a public school with primarily 2-year programs and has 8,006 students. Community College of Denver has less than one year, one to two year, and associate's degree programs in Computer and Information Sciences which graduated two, one, and four students respectively in 2008.

CERTIFICATIONS

Systems Security Certified Practitioner: The SSCP is ideal for those working towards positions such as Network Security Engineers, Security Systems Analysts, or Security Administrators.

For more information, see the (ISC)2 Americas website.

Certification and Accreditation Professional: The Certification and Accreditation Professional (CAP) credential is an objective measure of the knowledge, skills and abilities required for personnel involved in the process of certifying and accrediting security of information systems.

For more information, see the (ISC)2 Americas website.

Certified Fraud Examiner: The ACFE established and administers the Certified Fraud Examiner (CFE) designation.

For more information, see the Association of Certified Fraud Examiners website.

Certified Confidentiality Officer: Professional certification validates your training and experience in your present career.

For more information, see the Business Espionage Controls and Countermeasures Association website.

CIW Associate: Certified CIW Associates possess the basic hands-on skills and knowledge that Internet professionals are expected to understand and use.

For more information, see the Certified Internet Web Professionals website.

CIW Security Analyst: Security Analysts protect an organization's assets and operations.

For more information, see the Certified Internet Web Professionals website.

Certified Wireless Network Administrator: The CWNA certification is the foundation level enterprise Wi-Fi certification for the CWNP Program, and CWNA is required for your CWSP and CWNE certifications.

For more information, see the Certified Wireless Network Professional website.

Server+ Certification: For individuals who wish to demonstrate expertise with advanced PC hardware issues such as RAID, SCSI, multiple CPUs, SANs, and more.

For more information, see the Computing Technology Industry Association (CompTIA) website.

Certified Technical Trainer: CompTIA CTT+ is an international, vendor-neutral certification that covers core instructor skills, including preparation, presentation, communication, facilitation and evaluation in both a classroom and virtual classroom environment.

For more information, see the Computing Technology Industry Association (CompTIA) website.

CompTIA PDI Certification: Servicing and supporting devices and technologies associated with the printing and document imaging industry requires extensive training to ensure qualified, able technicians.

For more information, see the Computing Technology Industry Association (CompTIA) website.

Certified Cyber-Crime Expert: High-profile cases of corporate malfeasance and increased attention paid to cybercrime and cyberterrorism have elevated electronic evidence discovery to an indispensable component of any organization's security plan.

For more information, see the E-Business Process Solutions website.

Certified Network Systems Technician: Certified Network Systems Technician is a network professional who is expected to obtain knowledge of computer.

For more information, see the ETA International website.

Certified Web Specialist : Certified Web Specialists are expected to obtain knowledge of customer inabilities and lack of experience to solve problems related to the operation, maintenance and upgrading of World Wide Web home pages.

For more information, see the ETA International website.

Fiber Optics Designer: The Electronics Technicians Association 40-hour certified Fiber Optics Designer (FOD) training program is an optical designer certification that will provide an in-depth knowledge of optical local area networks.

For more information, see the ETA International website.

Stay Sharp Program - Google Hacking and Defense: Network and system security administrators, hands-on security managers, information security officers, intrusion detection and vulnerability assessment personnel, any personnel responsible for the secure configuration of Internet facing systems and the protection of Intellectual Property within their organizations that need an understanding of typical security exposures that Google uncovers, how to use Google hacking as an evaluation tool and common techniques used by Google hackers.

For more information, see the Global Information Assurance Certification website.

Stay Sharp Program - Defeating Rogue Access Points: Security professionals who are concerned about the weaknesses of wireless networks.

For more information, see the Global Information Assurance Certification website.

Securing Solaris - The Gold Standard: The Solaris Gold certificate focuses on the hardening of Solaris 8 & 9 systems following the CIS benchmark.

For more information, see the Global Information Assurance Certification website.

Stay Sharp Program - Mastering Packet Analysis: Network administrators, information security analysts, intrusion detection and prevention analysts and network auditors that need an in-depth understanding of how to assess network protocols and use powerful network analysis tools.

For more information, see the Global Information Assurance Certification website.

Ethics in IT: All IT professionals including: Systems administrators, auditors, information security officers, programmers, systems analysts, database administrators, Information service providers, contractors, consultants.

For more information, see the Global Information Assurance Certification website.

IBM Certified SOA Associate: This entry level certification is intended for individuals who work on SOA projects, such as architects, technical sales people, sales people, administrators, application developers, business analysts, project managers, system integrators, business integrators, managers, project sponsors and others.

For more information, see the IBM Corporation website.

Computer Hacking Forensic Investigator: Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks.

For more information, see the International Council of E-Commerce Consultants website.

Certified Ethical Hacker: The CEH Program certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.

For more information, see the International Council of E-Commerce Consultants website.

Licensed Penetration Tester: The licensed penetration tester is a program which trains security professionals to analyze the security posture of a network exhaustively and recommend corrective measures authoritatively.

For more information, see the International Council of E-Commerce Consultants website.

Network Security Administrator: The EC-Council's NSA certification looks at the network security in defensive mode.

For more information, see the International Council of E-Commerce Consultants website.

EC-Council Certified Security Analyst: EC-Council Certified Security Analyst (ECSA) complements the Certified Ethical Hacker (CEH) certification by exploring the analytical phase of ethical hacking.

For more information, see the International Council of E-Commerce Consultants website.

EC Council Certified Secure Programmer: EC-Council's Certified Secure Programmer is being offered to provide the essential and fundamental skills to programmers and application developers in secure programming.

For more information, see the International Council of E-Commerce Consultants website.

Security 5 Certification: The Security5 Certification is the entry level for anyone interested in learning computer networking and security basics.

For more information, see the International Council of E-Commerce Consultants website.

Certified Information Systems Security Practitioner: The Systems Security Certified Practitioner (SSCP) credential offers information security tacticians, with implementation orientations, the opportunity to demonstrate their level of competence with the seven domains of the compendium of best practices for information security.

For more information, see the International Information Systems Security Certification Consortium, Inc. website.

Associate of International Information Systems Security Certification Consortium: Associate of (ISC) status is available to those who have gained competence in key areas of industry knowledge and information security concepts and can pass either the CISSP® or SSCP® examinations, but lack the years of practical work experience required for full accreditation.

For more information, see the International Information Systems Security Certification Consortium, Inc. website.

Certification and Accreditation Professional: The CAP credential is an objective measure of the knowledge, skills and abilities required for personnel involved in the Certification and Accreditation process.

For more information, see the International Information Systems Security Certification Consortium, Inc. website.

Certified Web Professional - E-Commerce Specialist: A CWP E-Commerce Specialist is an expert in standards, technologies and practices in electronic commerce.

For more information, see the International Webmasters Association website.

Certified Web Professional - Enterprise Developer: A CWP Enterprise Developer builds n-tier database and legacy connectivity solutions for Web applications, using Java, Java application programming interfaces (APIs), Java Database Connectivity (JDBC) solutions, middleware tools, and distributed object models.

For more information, see the International Webmasters Association website.

Certified Web Professional - Internetworking Specialist: A CWP Internetworking Specialist defines network architecture, identifies infrastructure components, monitors and analyzes network performance.

For more information, see the International Webmasters Association website.

Certified Web Professional - Security Specialist: A CWP Security Specialist implements security policy, identifies security threats and develops countermeasures using firewalls and attack-recognition technologies.

For more information, see the International Webmasters Association website.

Certified Web Professional - Server Administrator: A CWP Server Administrator manages and tunes E-Commerce infrastructure including Web servers, FTP, news, and mail servers for mid-size to large businesses.

For more information, see the International Webmasters Association website.

Juniper Networks Certified Internet Specialist: The JNCIS-E exam is designed for networking professionals with advanced knowledge of, and experience with, the Juniper Networks E-series platforms.

For more information, see the Juniper Networks website.

Microsoft Certified Professional Developer: For individuals who wish to distinguish themselves as an expert in Windows development, Web application development, or enterprise applications development.

For more information, see the Microsoft Corporation website.

Microsoft Certified Systems Administrator: The Microsoft Certified Systems Administrator (MCSA) credential validates your ability to manage and troubleshoot network environments in the Windows operating system.

For more information, see the Microsoft Corporation website.

Level I: Network Performance Technologies : Gain network performance expertise through in-depth analysis of networking protocols and their role in delivering application performance.

For more information, see the NetQoS website.

Security Certified Network Professional: The SCNP program focuses on defensive security technologies, such as Firewalls and Intrusion Detection.

For more information, see the Security Certified Program website.

WOW Certified Professional Web Administrator: WOW Certification is a powerful opportunity for individuals aspiring to be or already working as a Web professional.

For more information, see the World Organization of Webmasters website.

WOW Certified Web Administrator Apprentice: Web Administrator Apprentices are aware of the fundamental concepts for the hardware and software infrastructure supporting Internet communications.

For more information, see the World Organization of Webmasters website.

LOCATION INFORMATION: Westminster, Colorado

Westminster, Colorado
Westminster, Colorado photo by Nyttend

Westminster is located in Adams County, Colorado. It has a population of over 107,056, which has grown by 6.1% over the last ten years. The cost of living index in Westminster, 96, is near the national average. New single-family homes in Westminster are valued at $376,500 on average, which is far greater than the state average. In 2008, sixty-two new homes were built in Westminster, down from one hundred forty-six the previous year.

The three most popular industries for women in Westminster are health care, educational services, and professional, scientific, and technical services. For men, it is construction, professional, scientific, and technical services, and computer and electronic products. The average travel time to work is about 27 minutes. More than 31.3% of Westminster residents have a bachelor's degree, which is higher than the state average. The percentage of residents with a graduate degree, 9.3%, is lower than the state average.

The unemployment rate in Westminster is 6.2%, which is less than Colorado's average of 6.6%.

The percentage of Westminster residents that are affiliated with a religious congregation, 30.4%, is less than both the national and state average. The most prominent religious groups are the Catholic Church, the LDS (Mormon) Church and the Lutheran Church.

Westminster is home to the The Golf Courses at Hyland Hills and the The Plaza at Westminster. Visitors to Westminster can choose from Comfort Suites, LA Quinta - Inns- Westminster Mall and Doubletree Hotel Denver Boulder for temporary stays in the area.