Skip to main content
GCU Logo Mobile
Apply NowRequest Info
  • GCU Login
GCU LoginRequest Info
Grand Canyon University logo in bold purple uppercase text on a white background
  • Degree Programs
    • Areas of Study
      • Business
      • Teaching
      • Language
      • Counseling
      • Psychology
      • Healthcare
      • Nursing
      • Criminal Justice
      • Legal Studies
      • Engineering
      • Science
      • Technology
      • Theology
      • Ministry
      • Digital Arts
      • Digital Media
      • Fine Arts
    • Locations
      • Campus
      • Online
      • Evening
    • Degree Level
      • Bachelor's
      • Master's
      • Doctoral
      • Certificates
      • Bridge
      • Post-Master's
    • Other Course Options
      • Minors
      • Individual Courses
      • High School Dual Enrollment
      • Current Teacher Continuing Education
      All Majors & Programs
      All Majors & Programs
  • Academics
    • Colleges
      • Doctoral
      • Arts & Media
      • Business
      • Education
      • Engineering & Technology
      • Humanities & Social Sciences
      • Natural Sciences
      • Nursing & Health Care
      • Theology
      • Honors
    • More About GCU
      • Academic Catalog & Policies
      • University Accreditation & Regulation
      • Educational Alliances
      • Faculty Directory
      • Office of Assessment
      • Provost Message
      Academics
      Academics
  • Admissions
    • Admissions
      • Admission Requirements
      • Visit Campus
      • Undergraduate Admissions
      • College Transfer Center
      • Graduate & Doctoral Admissions
      • Campus Resources
      Admissions
      Admissions
  • Tuition & Financial Aid
    • Tuition
      • Online & Evening
      • On-Campus
      • Housing & Meal Costs
      • Other Fees
      • Cost of Attendance
    • Financial Aid
      • FAFSA
      • Scholarships & Grants
      • Student Loans
      Tuition & Financial Aid
      Tuition & Financial Aid
  • Why GCU
    • Student Journey
      • Online Learning
      • Campus Life
      • Evening Classes
      • Hybrid Learning
      • Military & Veteran
      • ROTC
      • International Students
      • Native American
    • Our Story
      • University Spirit & Traditions
      • Christian Identity & Mission
      • History & Campus Growth
      • Community Outreach
    • About
      • Leadership Team
      • Campus Locations
      • Blog
      • Offices
      • Contact
      • Media & Branding
      Why GCU
      Why GCU
Apply NowRequest Info

Read time 12 minutes

Photo of Sarah Kidd leaning against a wall
Sarah Kidd

Published on Apr 28, 2023


In This Article
  • Overview
  • Cybersecurity Jobs and Career Paths for Cybersecurity Graduates
  • Types of Cybersecurity Jobs in Demand
In This Article
Overview
Cybersecurity Jobs and Career Paths for Cybersecurity Graduates
Types of Cybersecurity Jobs in Demand
Written By
Photo of Sarah Kidd leaning against a wall
View Profile
Sarah Kidd

Student Writer


Tags
Computer Programming|CS and IT|Cybersecurity|Information Technology|Leadership and Management|Master of Business Administration|STEM in Focus|World of Engineering
Related Articles In
Engineering & Technology
Instructor observes two students wearing headsets and working on computers in a dark room, focusing on game design and game development projects.

Game Designer vs. Game Developer: Which Path Is Right for You?

Learn the key differences in game designer vs. game developer roles — from creativity to coding — and find out which career path best fits your skills and goals.

10/28/2025

|

4 min read

Student operates drill press in workshop while others work with machinery, illustrating hands-on learning in mechanical engineering technology.

Mechanical Engineering vs. Mechanical Engineering Technology

Explore the key differences between mechanical engineering vs. mechanical engineering technology degrees. Discover which program may be right for you at GCU.

10/27/2025

|

5 min read

Professional working on AI code at dual-monitor setup in modern office, highlighting tech skills and career opportunities in artificial intelligence.

Exploring AI Careers: Turning Advanced Skills Into Practical Impact

Discover how to equip yourself to lead the AI-driven future with technical skills and practical impact across industries like healthcare, finance, law, retail and cybersecurity.

10/20/2025

|

7 min read

We're here to help.

I'm Ready to ApplyI Need More Information
GCU Logo White
1-855-GCU-LOPELive Chat
3300 West Camelback Road  - 
Phoenix, AZ 85017
Grand Canyon University © 2025
All Rights Reserved
  • Majors & Programs
  • Admission
  • Financial Resources
  • Academic Calendar
  • Academic Catalog & Policies
  • Online Learning
  • Why GCU
  • Contact Us
  • Careers
  • Title IX
  • Media & Licensing
  • Consumer Information
  • Financial Disclosures
  • Privacy Policy
  • Cost of Attendance
Find Your Purpose Logo
Video from GCU
FacebookTwitter/XLinkedInInstagramYouTube
  • Current Students
    |
  • Alumni
    |
  • Athletics
    |
  • Arena
    |
  • GCU News
    |
  • Lope Shops
    |
  • GCBC
    |
  • Canyon Promotions
    |
  • Lope House
    |
  • GCU Golf

Privacy / Cookie Disclaimer: Our site uses cookies to personalize content, to provide social media features/ads and to analyze site traffic. We share information about your use of this site with our social media, advertising and analytics teams who may combine it with other information that you’ve provided to them. By continuing to navigate this site you are consenting to the collection of information via our use of cookies. For more information on our cookie collection and use please visit our Privacy Policy.

Share This Story
FacebookTwitter/XLinkedInShare via Email

  1. Home/
  2. Blog/
  3. Engineering & Technology/
  4. Types of Cybersecurity Jobs

Types of Cybersecurity Jobs

Cybersecurity employee working on cyberdefense
Start your GCU
journey today.
Step 1: Educational Interests
This helps us connect you with the right enrollment counselor to help you through the process.
Make a selection
Select One
Bachelor's
Master's
Doctoral
Bridge
Make a selection
First select a degree level
Make a selection
First select a degree level and how you would like to attend
Make a selection
First select degree level, modality, and area of interest
Make a selection
Select One
Yes
No
Make a selection
Select One
Yes
No
Make a selection
Select One
Yes
No
West Valley (Phoenix, AZ) ABSN
Select One
Albuquerque, NM ABSN
Boise (Meridian, ID) ABSN
Denver (Englewood, CO) ABSN
East Valley (Chandler, AZ) ABSN
Las Vegas (Henderson, NV) ABSN
Miramar (Miami, FL) ABSN
Orlando (Lake Mary, FL) ABSN
Salt Lake (Sandy, UT) ABSN
St. Louis, MO ABSN
Sun City, AZ ABSN
Tucson, AZ ABSN
West Valley (Phoenix, AZ) ABSN
Make a selection
Select One
Still in High School
High School Diploma or GED
Some College
Associate Degree or over 60 credits
Bachelor's Degree
Master's Degree or Higher
Bachelor's with Cert. & Experience
BS in Nursing
Make a selection
Select One
2029
2028
2027
2026
2025
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
1959
1958
1957
1956
1955
1954
1953
1952
1951
1950
1949
1948
1947
1946
1945
1944
1943
1942
1941
1940
1939
1938
1937
1936
1935
U.S. Citizen
U.S. Citizen
Non-U.S. Citizen
No military affiliation
Make a selection
No military affiliation
Active
Spouse
Retired
Veteran
United States
United States
Afghanistan
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua And Barbuda
Argentina
Armenia
Aruba
Australia
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belgium
Belize
Benin
Bermuda
Bhutan
Bolivia
Bosnia And Herzegovina
Botswana
Bouvet Island
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cambodia
Cameroon
Canada
Cape Verde
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos (keeling) Islands
Colombia
Comoros
Congo
Congo, The Democratic Republic Of The
Cook Islands
Costa Rica
Cote D'ivoire
Croatia
Cuba
Cyprus
Czech Republic
Denmark
Djibouti
Dominica
Dominican Republic
East Timor
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Ethiopia
Falkland Islands (malvinas)
Faroe Islands
Fiji
Finland
France
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Germany
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guinea
Guinea-bissau
Guyana
Haiti
Heard Island And Mcdonald Islands
Holy See (vatican City State)
Honduras
Hong Kong
Hungary
Iceland
India
Indonesia
Iran, Islamic Republic Of
Iraq
Ireland
Israel
Italy
Jamaica
Japan
Jordan
Kazakstan
Kenya
Kiribati
Korea, Democratic People's Republic Of
Korea, Republic Of
Kosovo
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Libyan Arab Jamahiriya
Liechtenstein
Lithuania
Luxembourg
Macau
Macedonia, The Former Yugoslav Republic Of
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia, Federated States Of
Moldova, Republic Of
Monaco
Mongolia
Montenegro
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands
Netherlands Antilles
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
Northern Mariana Islands
Norway
Oman
Pakistan
Palau
Palestinian Territory, Occupied
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Reunion
Romania
Russian Federation
Rwanda
Saint Helena
Saint Kitts And Nevis
Saint Lucia
Saint Pierre And Miquelon
Saint Vincent And The Grenadines
Samoa
San Marino
Sao Tome And Principe
Saudi Arabia
Senegal
Serbia
Seychelles
Sierra Leone
Singapore
Slovakia
Slovenia
Solomon Islands
Somalia
South Africa
South Georgia And The South Sandwich Islands
Spain
Sri Lanka
Sudan
Suriname
Svalbard And Jan Mayen
Swaziland
Sweden
Switzerland
Syrian Arab Republic
Taiwan, Province Of China
Tajikistan
Tanzania, United Republic Of
Thailand
Togo
Tokelau
Tonga
Trinidad And Tobago
Tunisia
Turkey
Turkmenistan
Turks And Caicos Islands
Tuvalu
Uganda
Ukraine
United Arab Emirates
United Kingdom
United States
United States Minor Outlying Islands
Uruguay
Uzbekistan
Vanuatu
Venezuela
Viet Nam
Virgin Islands, British
Virgin Islands, U.s.
Wallis And Futuna
Western Sahara
Yemen
Zambia
Zimbabwe

By clicking submit, you give GCU consent to use automated technology to call and text you regarding educational services. Your consent is not required to receive educational services. GCU will never sell your information. By submitting this form, you agree to GCU's privacy policy.

Related Resources

Online Degrees
Admission
Scholarships & Grants
Transfer Center
Unlock Your Potential

Speak with a University Counselor today.

Apply Now

The views and opinions expressed in this article are those of the author’s and do not necessarily reflect the official policy or position of Grand Canyon University. Any sources cited were accurate as of the publish date.

Cybersecurity Jobs and Career Paths for Cybersecurity Graduates

In today’s technological world, cybersecurity specialists are needed more than ever, as more and more organizations require increased security for their networks and a reliable way to discern whether networks are secure. Careers in information security, cybersecurity and research are needed in a variety of fields, such as science and business. In this guide, you’ll learn how to work in cybersecurity and what cybersecurity degrees are needed.

Computer and Information Research Managers

Also known as IT project managers, computer and information research managers are responsible for directing operations within a cybersecurity firm. They usually identify what an organization needs and take the steps necessary to provide for that need, such as by installing software systems and upgrades, testing network security, budgeting and providing qualified personnel.

Becoming a computer and information research manager requires a bachelor’s degree in computer and information technology or engineering technologies and possibly a graduate degree, usually a Master of Business Administration. You would also need five or more years of work experience before you can work as a computer and information research manager.2

Computer Systems Analysts

Computer systems analysts, also known as “systems architects,” devise new ways to improve systems. To do this, they speak with managers to determine what changes must be made to their existing networks, then either locate or design the technology and upgrades needed to improve the networks. These changes may include creating new systems or supervising new upgrades. Computer systems analysts also test these new systems and train other people to use them.

To become a computer systems analyst, you will need a bachelor’s degree, which can be in a variety of subjects. The most common are computer and information technology and mathematics, but people with an education in business or management information systems are also able to find jobs in this field. You can also major in liberal arts and obtain experience in programming or another technology field, although this pathway to a career as a computer systems analyst is less common.3 

Computer Information Security Officers

The primary responsibility of a chief information security officer (CISO) is to manage the IT security division of a company, which includes planning and coordinating all aspects of computer, network and data security. To achieve this, the CISO is tasked with recruiting top cybersecurity experts to their team. This role requires a comprehensive understanding of IT security and strategy, as well as the ability to effectively communicate with various stakeholders.

Although a CISO can be employed with only a bachelor's degree in cyber or information security, having a Master of Science in Cybersecurity degree or an MBA in a related field can enhance your earning potential. 

Information Security Analysts

Information security analysts (ISAs) are responsible for the protection of an organization's computer systems and networks. They plan and execute programs and other measures, including installing and using software for data encryption and firewalls. Additionally, ISAs help design and execute plans and methods for the recovery of data and systems following a cyberattack. ISAs stay on top of the latest industry trends and cyber threats, which involves researching new security technologies and networking with other professionals.

Some bachelor's degrees now allow students to specialize in information security. An information security analyst generally holds a bachelor's degree, and more of them are specializing in information security at the undergraduate level.

IT Security Consultants

IT security consultants are critical to modern business operations by providing guidance to clients on the most efficient and cost-effective methods for safeguarding their organization's cybersecurity objectives. They evaluate different aspects of the system, such as software and networking equipment, to enhance network performance.

IT security consultants differ from security analysts by specializing in a certain field, allowing them to advise on a variety of issues within that field. Whereas security analysts typically specialize in one specific area within a field and may offer advice related to that specific area only. IT security consultants may entail long and flexible work hours, as well as frequent traveling to various client sites. Over time, this role can be rewarding, particularly due to the flexibility it offers.

Security Architects

Security architects play a critical role in maintaining an organization's network security. They can be found across various sectors such as businesses, government agencies, and nonprofits. Apart from designing and managing security systems, they are also responsible for devising and executing security policies and protocols that govern the access of computer, network and data systems by employees and other authorized personnel.

Typically, a security architect must possess a bachelor's degree in cybersecurity. However, due to the leadership responsibilities that accompany the role, employers often prefer candidates with prior experience.

Computer Network Architects

Also known as “network engineers,” computer network architects build data communication networks. These networks can include local area networks, which can be small connections between offices, or wide area networks and intranets that may include cloud infrastructure and other large projects. Computer network architects plan these networks, provide upgrades for hardware and software, predict what a network may need in the future and research new ways to improve networks.

If you’re interested in how to work in cybersecurity, this is an excellent option. Aspiring computer network architects need a bachelor’s degree in computer and information technology or engineering, and some employers require a Master of Business Administration in information systems. You will also need at least five years of work experience in the information technology field — most often as a network and computer system administrator, database administrator or computer systems analyst — before you can work as a computer network architect. You may also need to be certified in the products you specialize in. You can obtain this certification from software companies or vendors for specific products.4

Penetration Testers

To expose cybersecurity weaknesses so that they may be reinforced, penetration testers gain permission to exploit discovered vulnerabilities within a computer or network, including operating systems, utilities, applications and improper configurations. 

Penetration testers often hold bachelor's degrees in cybersecurity. Because they work with sensitive material, they may often be required to train in advanced methodologies and techniques within the industry.

Computer and Information Research Scientists

Computer and information research scientists work with software to improve its use by researching problems and conducting experiments to test systems. They may also create new programming languages and systems to make the use of software systems easier for programmers.

These professionals may use their knowledge to improve business, science and other fields. To become a computer and information research scientist, professionals should have a master’s degree or higher in computer science, computer engineering or information technology.5 

Cybersecurity was once a career path that was only applicable to government agencies and defense contractors. However, now many businesses and corporations hire cybersecurity experts to work on-staff. Industries like healthcare, finance and retail all work with cybersecurity professionals to ensure their technology systems are protected from cyberattacks.

Cybersecurity jobs are growing rapidly. Since 2013, the demand for cybersecurity professionals has grown three times faster than the demand for IT professionals, as the number of cybersecurity job postings has grown by 94%, whereas job postings for IT have only grown by 30%.1 The increased demand for cybersecurity experts means the career paths they follow can be lucrative.

Cybersecurity specialists can start out by earning a Bachelor of Science in Cybersecurity degree before moving into advanced coursework once they are on the job. The more formal training a cybersecurity expert has in the field, the higher the salary they can negotiate. 

Let's take a look at some of the different types of cybersecurity jobs in the workforce.

Types of Cybersecurity Jobs in Demand

Demand for cybersecurity specialists has increased over the last few years, largely because of the rise of cybercrime across the world. In the past, companies relied on old networks to support their businesses, and many of these companies still rely on these same networks today. With new technology becoming more available and easier to access, these networks are now highly vulnerable to cyberattacks. In response, the demand for cybersecurity specialists rose to combat this wave of cybercrime.

The rise in demand for cybersecurity specialists also caused the cybersecurity field to grow. Over time, cybersecurity came to encompass more roles, including software development, auditing and technical support. This expansion of the field created more jobs and increased demand.6

For example, some cybersecurity jobs with a high demand for new workers include jobs in information security, penetration testing and computer and information research.

  • Information security analysts: According to the U.S. Bureau of Labor Statistics (BLS) Occupational Outlook Handbook, job growth for information security analysts is expected to increase by about 35% from 2021 to 2031, much faster than the average for all professions. This accounts for an estimated increase of 56,500 jobs in the field.7 Information security analysts may also earn a substantial salary. According to the BLS, in May 2021, information security analysts earned a median annual salary of $102,600.8 
  • Penetration testers: These professionals and other quality assurance analysts are also in high demand, as the BLS reports that job growth for software developers, quality assurance analysts and testers is expected to increase by about 25% from 2021 to 2031. This is much faster than the average for all professions, and it accounts for an estimated increase of 411,400 jobs in the field.9 According to the BLS, software developers, quality assurance analysts and testers earned a median salary of $109,020 in May 2021.10 
  • Computer and information research scientists: Like many other cybersecurity jobs, there is a robust demand for computer and information research scientists in today’s workforce. According to the BLS, the job growth rate for computer and information research scientists is estimated to increase by about 21% from 2021 to 2031. This is much faster than the average for all professions and accounts for an estimated increase of 7,100 jobs in this field.11 In May 2021, computer and information research scientists earned a median salary of $131,490 per year, according to the BLS.12

Are you interested in pursuing one of these careers in cybersecurity? You can get started on this path by completing the form on this page and enrolling at Grand Canyon University (GCU). GCU is pleased to offer the Bachelor of Science in Cybersecurity and the Bachelor of Science in Information Technology with an Emphasis in Cybersecurity, which will provide you with fundamental knowledge in security architecture design, security frameworks and protecting networks from cyberattacks. With this knowledge and skill set, you can pursue many different types of cybersecurity jobs in a rapidly growing workforce. 

 

1 Recruiting Watchers for the Virtual Walls: The State of Cybersecurity Hiring, Recruiting Watchers for the Virtual Walls: The State of Cybersecurity Hiring, in March 2023

2 U.S. Bureau of Labor Statistics, Occupational Outlook Handbook, Computer and Information Systems Managers in January 2023. 

3 U.S. Bureau of Labor Statistics, Occupational Outlook Handbook, Computer Systems Analysts in January 2023. 

4 U.S. Bureau of Labor Statistics, Occupational Outlook Handbook, Computer Network Architects in January 2023. 

5 U.S. Bureau of Labor Statistics, Occupational Outlook Handbook, Computer and Information Research Scientists in January 2023. 

6 ClearanceJobs, Cybersecurity Remains a Top In-Demand Job But Finding Good Help Isn’t Easy in January 2023. 

7 COVID-19 has adversely affected the global economy and data from 2020 and 2021 may be atypical compared to prior years. The pandemic may impact the predicted future workforce outcomes indicated by the U.S. Bureau of Labor Statistics as well. Accordingly, data shown is effective September 2022, which can be found here: U.S. Bureau of Labor Statistics, Occupational Outlook Handbook, Information Security Analysts, retrieved on Jan. 12, 2023. 

8 The earnings referenced were reported by the U.S. Bureau of Labor Statistics (“BLS”), Information Security Analysts as of May 2021, retrieved on Oct. 11, 2022. Due to COVID-19, data from 2020 and 2021 may be atypical compared to prior years. The pandemic may also impact the predicted future workforce outcomes indicated by the BLS. BLS calculates the median using salaries of workers from across the country with varying levels of education and experience and does not reflect the earnings of GCU graduates as information security analysts. It does not reflect the earnings of workers in one city or region of the country. It also does not reflect a typical entry-level salary. Median income is the statistical midpoint for the range of salaries in a specific occupation. It represents what you would earn if you were paid more money than half the workers in an occupation, and less than half the workers in an occupation. It may give you a basis to estimate what you might earn at some point if you enter this career. You may also wish to compare median salaries if you are considering more than one career path. Grand Canyon University can make no guarantees on individual graduates’ salaries as the employer the graduate chooses to apply to, and accept employment from, determines salary not only based on education, but also individual characteristics and skills and fit to that organization (among other categories) against a pool of candidates. 

9 COVID-19 has adversely affected the global economy and data from 2020 and 2021 may be atypical compared to prior years. The pandemic may impact the predicted future workforce outcomes indicated by the U.S. Bureau of Labor Statistics as well. Accordingly, data shown is effective September 2022, which can be found here: U.S. Bureau of Labor Statistics, Occupational Outlook Handbook, Software Developers, Quality Assurance Analysts and Testers, retrieved on Jan. 12, 2023. 

10 The earnings referenced were reported by the U.S. Bureau of Labor Statistics (“BLS”), Software Developers, Quality Assurance Analysts and Testers as of May 2021, retrieved on Oct. 11, 2022. Due to COVID-19, data from 2020 and 2021 may be atypical compared to prior years. The pandemic may also impact the predicted future workforce outcomes indicated by the BLS. BLS calculates the median using salaries of workers from across the country with varying levels of education and experience and does not reflect the earnings of GCU graduates software developers, quality assurance analysts and testers. It does not reflect the earnings of workers in one city or region of the country. It also does not reflect a typical entry-level salary. Median income is the statistical midpoint for the range of salaries in a specific occupation. It represents what you would earn if you were paid more money than half the workers in an occupation, and less than half the workers in an occupation. It may give you a basis to estimate what you might earn at some point if you enter this career. You may also wish to compare median salaries if you are considering more than one career path. Grand Canyon University can make no guarantees on individual graduates’ salaries as the employer the graduate chooses to apply to, and accept employment from, determines salary not only based on education, but also individual characteristics and skills and fit to that organization (among other categories) against a pool of candidates. 

11 COVID-19 has adversely affected the global economy and data from 2020 and 2021 may be atypical compared to prior years. The pandemic may impact the predicted future workforce outcomes indicated by the U.S. Bureau of Labor Statistics as well. Accordingly, data shown is effective September 2022, which can be found here: U.S. Bureau of Labor Statistics, Occupational Outlook Handbook, Computer and Information Research Scientists, retrieved on April 18, 2023.

12 The earnings referenced were reported by the U.S. Bureau of Labor Statistics (“BLS”), Computer and Information Research Scientists as of May 2021, retrieved on Oct. 11, 2022. Due to COVID-19, data from 2020 and 2021 may be atypical compared to prior years. The pandemic may also impact the predicted future workforce outcomes indicated by the BLS. BLS calculates the median using salaries of workers from across the country with varying levels of education and experience and does not reflect the earnings of GCU graduates as computer and information research scientists. It does not reflect the earnings of workers in one city or region of the country. It also does not reflect a typical entry-level salary. Median income is the statistical midpoint for the range of salaries in a specific occupation. It represents what you would earn if you were paid more money than half the workers in an occupation, and less than half the workers in an occupation. It may give you a basis to estimate what you might earn at some point if you enter this career. You may also wish to compare median salaries if you are considering more than one career path. Grand Canyon University can make no guarantees on individual graduates’ salaries as the employer the graduate chooses to apply to, and accept employment from, determines salary not only based on education, but also individual characteristics and skills and fit to that organization (among other categories) against a pool of candidates. 

 

Approved by an instructor for the College of Science, Engineering and Technology on Feb. 1, 2023.