{"id":135,"date":"2021-12-08T17:05:16","date_gmt":"2021-12-08T17:05:16","guid":{"rendered":"http:\/\/he-cyberdegrees-org-sonic.lndo.site\/?p=135"},"modified":"2022-12-08T13:05:32","modified_gmt":"2022-12-08T13:05:32","slug":"what-is-a-cryptographer","status":"publish","type":"post","link":"https:\/\/www.cyberdegrees.org\/jobs\/cryptographer\/","title":{"rendered":"Cryptographer Career Overview"},"content":{"rendered":"<p>Cryptographers help ensure computer and network security by writing algorithms to safeguard data through encryption. These professionals work in the cybersecurity sector, which <a href=\"https:\/\/cybersecurityventures.com\/jobs\/\" target=\"_blank\" rel=\"noopener\">Cybercrime Magazine<\/a> projects will see 3.5 million job openings from 2021-2025, indicating consistent demand in the field.<\/p>\r\n<p>Tech-savvy individuals with strong problem-solving skills may want to pursue work as cryptographers. Similar roles include information security analyst, penetration tester, and security architect. <br \/><br \/>Cryptographers typically work in finance, tech, or government organizations handling important information. A cryptographer usually needs a bachelor's degree in <a href=\"https:\/\/www.cyberdegrees.org\/resources\/cybersecurity-vs-computer-science\/\">computer science or a related field<\/a>. Some professionals earn cybersecurity certifications to demonstrate dedication to their work.<\/p>\r\n<p>This guide offers information on cryptographers, including common work responsibilities, available career pathways, education requirements, and similar roles in the field.<\/p>\r\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"history\" id=\"history\"><\/a>\n\n\r\n<h2>History of Cryptographers<\/h2>\r\n<p>Before the digital age, handwritten ciphers and codes protected sensitive information. The first recorded use potentially took place among Spartan military leaders in 400 B.C. In American history, encoded messages created by Navajo code talkers allowed the Marine Corps to organize operations without the enemy intercepting any communications.<\/p>\r\n<p>The earliest instance of modern-day cryptography dates back to the early 1970s when IBM submitted an algorithm to the U.S. government to safeguard financial transactions between banks and the Federal Reserve.<\/p>\r\n<p>As hackers and bad actors continue to become more skilled in using advanced<a href=\"https:\/\/www.cyberdegrees.org\/resources\/most-common-cyber-attacks\/\"> techniques to break codes<\/a>, cryptographers have also increased the complexity of their work.<\/p>\r\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"careers\" id=\"careers\"><\/a>\n\n\r\n<h2>Similar Specializations and Career Paths<\/h2>\r\n<p>A cryptographer's job description also applies to other similar roles in data protection. Most employers only require a bachelor's-level education for roles in this field, typically emphasizing experience, abilities, and <a href=\"https:\/\/www.cyberdegrees.org\/resources\/certifications\/\">industry certifications<\/a> more than education alone. For example, <a href=\"https:\/\/www.cyberdegrees.org\/jobs\/security-architect\/\">security architects<\/a> typically must accrue significant experience on the job before advancing to become cryptographers.<\/p>\r\n<p><a href=\"https:\/\/www.cyberdegrees.org\/jobs\/chief-information-security-officer-ciso\/\">Chief information security officers<\/a> (CISOs) also need years of IT experience. These executive-level professionals can also pursue <a href=\"https:\/\/www.isc2.org\/Certifications\/CISSP\" target=\"_blank\" rel=\"noopener\">certified information systems security professional<\/a> or <a href=\"https:\/\/ciso.eccouncil.org\/\" target=\"_blank\" rel=\"noopener\">certified chief information security officer<\/a> credentials to demonstrate their knowledge and pursue higher salaries. <a href=\"https:\/\/www.bls.gov\/ooh\/management\/top-executives.htm#tab-5\" target=\"_blank\" rel=\"noopener\">According to the U.S. Bureau of Labor Statistics<\/a> (BLS), chief executives like CISOs earn a <a href=\"https:\/\/www.bls.gov\/ooh\/management\/top-executives.htm\" target=\"_blank\" rel=\"noopener\">median salary<\/a> of $179,250 as of May 2021.<\/p>\r\n\r\n<figure>\r\n<table class=\"sonic-table\">\r\n<tbody>\r\n<tr>\r\n<th>\r\n<strong>Career<\/strong>\r\n<\/th>\r\n<th>\r\n<strong>Description<\/strong>\r\n<\/th>\r\n<th>\r\n<strong>Required Education<\/strong>\r\n<\/th>\r\n<th>\r\n<strong>Required Experience<\/strong>\r\n<\/th>\r\n<th>\r\n<strong>Average Annual Salary<\/strong>\r\n<\/th>\r\n<\/tr>\r\n<tr>\r\n<td data-table=\"Career\">\r\n<p><a href=\"https:\/\/www.cyberdegrees.org\/jobs\/security-analyst\/\"><strong>Information Security Analyst<\/strong><\/a><\/p>\r\n<\/td>\r\n<td data-table=\"Description\">\r\n<p>Security analysts use software to maintain organizations' security and protect networks against intrusions.<\/p>\r\n<\/td>\r\n<td data-table=\"Required Education\">\r\n<p>Bachelor's degree, though some employers only require experience and\/or certifications<\/p>\r\n<\/td>\r\n<td data-table=\"Required Experience\">\r\n<p>Several years in IT roles<\/p>\r\n<\/td>\r\n<td data-table=\"Average Annual Salary\">\r\n<p>$113,270<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-table=\"Career\">\r\n<p><a href=\"https:\/\/www.cyberdegrees.org\/jobs\/penetration-tester\/\"><strong>Penetration Tester<\/strong><\/a><\/p>\r\n<\/td>\r\n<td data-table=\"Description\">\r\n<p>Also known as \"ethical hackers,\" penetration testers probe networks and computer systems for flaws and exploitable vulnerabilities.<\/p>\r\n<\/td>\r\n<td data-table=\"Required Education\">\r\n<p>Bachelor's degree<\/p>\r\n<\/td>\r\n<td data-table=\"Required Experience\">\r\n<p>A few years in simulated and real-world environments<\/p>\r\n<\/td>\r\n<td data-table=\"Average Annual Salary\">\r\n<p>$88,260<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-table=\"Career\">\r\n<p><a href=\"https:\/\/www.cyberdegrees.org\/jobs\/security-architect\/\"><strong>Security Architect<\/strong><\/a><\/p>\r\n<\/td>\r\n<td data-table=\"Description\">\r\n<p>Security architects create and oversee digital security measures for organizations.<\/p>\r\n<\/td>\r\n<td data-table=\"Required Education\">\r\n<p>Bachelor's degree<\/p>\r\n<\/td>\r\n<td data-table=\"Required Experience\">\r\n<p>5-10 years in IT or database administration<\/p>\r\n<\/td>\r\n<td data-table=\"Average Annual Salary\">\r\n<p>$129,190<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-table=\"Career\">\r\n<p><a href=\"https:\/\/www.cyberdegrees.org\/jobs\/chief-information-security-officer-ciso\/\"><strong>Chief Information Security Officer<\/strong><\/a><\/p>\r\n<\/td>\r\n<td data-table=\"Description\">\r\n<p>CISOs handle the financial side of data protection, including developing policies and managing information security teams.<\/p>\r\n<\/td>\r\n<td data-table=\"Required Education\">\r\n<p>Bachelor's degree<\/p>\r\n<\/td>\r\n<td data-table=\"Required Experience\">\r\n<p>10+ years of experience in computer science or IT<\/p>\r\n<\/td>\r\n<td data-table=\"Average Annual Salary\">\r\n<p>$179,520<\/p>\r\n<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<small><p style=\"text-align: right;\"><strong>Source<\/strong>: BLS, Payscale (June 2022)<\/p><\/small>\r\n<\/figure>\r\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-primary-700 \">\n    <a target=\"_self\" href=\"https:\/\/www.cyberdegrees.org\/jobs\/\" class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Explore more careers in cybersecurity<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\r\n<section class=\"-mx-4 md:-mx-1\/2vw py-12 md:py-16 mt-12 md:my-16 relative md:left-1\/2 md:right-1\/2 md:w-screen bg-gray-50\">\n    <div class=\"container content\">\n        \r\n<sonic-editorial-listings degree=\"\" category=\"\" subject=\"\" limit=\"3\"><\/sonic-editorial-listings>\r\n\n    <\/div>\n<\/section>\n\r\n\r\n<h2>What Is the Job Description of a Cryptographer?<\/h2>\r\n<p>Cryptographers secure computer systems by creating algorithms and ciphers to encrypt data. They also analyze existing encryption systems to <a href=\"https:\/\/www.cyberdegrees.org\/jobs\/vulnerability-assessor\/\">identify weaknesses and vulnerabilities<\/a>.<\/p>\r\n<p>Cryptographers develop and test techniques, implementing new or revamped encryption solutions. By working with organizations and institutions, they incorporate security needs with industry standards, ensuring highly secure data transmission.<\/p>\r\n<p>Cryptographers may also carry out the duties of a cryptanalyst. As cryptanalysts, cryptology professionals decrypt data, breaking down algorithms and ciphers to access information. By decrypting messages and coding systems, cryptanalysts better understand how to avoid security gaps.<\/p>\r\n<p>These professionals have knowledge and skills in industries requiring high levels of confidentiality. By encrypting and decrypting data, cryptographers and cryptanalysts protect individuals, groups, businesses, and organizations.<\/p>\r\n<p>Cryptographers <a href=\"https:\/\/www.cyberdegrees.org\/resources\/government-cyber-security-careers\/\">work for the government<\/a>, especially to secure military data and protect national security. They maintain the integrity of electronic medical records and personal health information for healthcare companies and organizations. They also encrypt financial data like bank records, e-commerce activity, and credit and debit card information.<\/p>\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"skills\" id=\"skills\"><\/a>\n\n\r\n<div class=\"grid md:grid-cols-2 lg:grid-cols-2 gap-5 my-8\"> \n  \r\n<div>\r\n<h3>Key Soft Skills for Cryptographers<\/h3>\r\n<ul style=\"list-style-type: none; border-left: 5px solid #1271E4\">\r\n<li><strong>Communication:<\/strong> Cryptographers often work with other information security professionals, which requires them to communicate clearly with team members. Cryptographers may need to simplify technical information for professionals in other departments.<\/li>\r\n<li><strong>Organization:<\/strong> When handling lengthy ciphers and algorithms, cryptographers must stay organized. This skill allows them to work independently and maintain consistency in their output.<\/li>\r\n<li><strong>Problem-Solving:<\/strong> Cracking codes requires cryptographers to possess strong analytical skills. Individuals who excel with problem-solving can use this ability to strengthen their organizations' security measures.<\/li>\r\n<li><strong>Collaboration:<\/strong> Cryptographers work in information security teams, which may result in high-stress, high-stakes scenarios and environments. Working together and cooperating with others allows cryptographers to deliver the best possible outcomes.<\/li>\r\n<\/ul>\r\n<\/div>\r\n\r\n<div>\r\n<h3>Key Hard Skills for Cryptographers<\/h3>\r\n<ul style=\"list-style-type: none; border-left: 5px solid #12C7C4\">\r\n<li><strong>Programming Language Fluency:<\/strong> Cryptographers must know coding languages such as Java, Python, .NET, and C# to create ciphers and crack codes. Other typical programming languages for cryptographers include PHP, C++, Ruby on Rails, and Perl.<\/li>\r\n<li><strong>Encryption Knowledge:<\/strong> These professionals use public and private key encryption knowledge to secure organizations' information. Cryptographers create digital signatures to verify data's authenticity by linking it to a specific entity.<\/li>\r\n<li><strong>Math Skills:<\/strong> Cybersecurity professionals apply their abilities in mathematics and statistics to identify any malicious attempts to gain access to safeguarded data. Specific fields that can help cryptographers work include linear algebra and combinatorics.<\/li>\r\n<li><strong>Familiarity with IT:<\/strong> A strong working <a href=\"https:\/\/www.cyberdegrees.org\/listings\/top-online-masters-in-information-technology-programs\/\">knowledge of IT<\/a>, including an understanding of network architecture and project management, allows cryptographers to easily shift between different work areas.<\/li>\r\n<\/ul>\r\n<\/div>\r\n\n<\/div>\n\r\n\r\n<h3>A Day in the Life of a Cryptographer<\/h3>\r\n<p>A cryptographer's job description can vary based on their organization and project focus. Still, their goal of safeguarding sensitive data through encryption remains the same.<\/p>\r\n<p>These professionals search for and test weaknesses in existing networks. They maintain companies' information security systems and offer ideas for possible improvements. Cryptographers may also train new employees and other staff members on their organization's encryption efforts.<\/p>\r\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-primary-700 \">\n    <a target=\"_self\" href=\"https:\/\/www.cyberdegrees.org\/careers\/cryptographer\/day-in-the-life\" class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Learn more about a typical day for a cryptographer<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"salary\" id=\"salary\"><\/a>\n\n\r\n<h2>Cryptographer Salary and Career Outlook<\/h2>\r\n<p>With an <a href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/home.htm\" target=\"_blank\" rel=\"noopener\">estimated 13% growth<\/a> in employment between 2020 and 2030, computer and information technology occupations are projected for strong gains. <a href=\"https:\/\/www.payscale.com\/research\/US\/Job=Cryptologist\/Salary\" target=\"_blank\" rel=\"noopener\">According to Payscale<\/a>, cryptographers earn average salaries just over $73,000.<\/p>\r\n<p>Cryptographers work for government, technology, and financial entities. The <a href=\"https:\/\/www.defense.gov\/Explore\/News\/Article\/Article\/943220\/senior-officials-dod-supports-strong-encryption-for-defense-commercial-security\/\" target=\"_blank\" rel=\"noopener\">Department of Defense<\/a> and the <a href=\"https:\/\/www.nsa.gov\/about\/\" target=\"_blank\" rel=\"noopener\">National Security Agency<\/a> employ cryptographic professionals to protect military, national security, and cybersecurity systems and data.<\/p>\r\n<p>Information technology companies like Microsoft, Amazon, and Apple need cryptographers to protect their data alongside that of their users and consumers. Banks, investment firms, and accounting companies also rely on cryptographers to secure confidential financial information.<\/p>\r\n\r\n<sonic-callout theme=\"primary-light\">\r\n    <center>\r\n        <sonic-icon icon='currency-dollar' type='solid' size='large' color='#1271E4'><\/sonic-icon> \r\n        <hr style=\"background:  #1271E4; border:0; height:3px\" \/>\r\n        <p><strong>$73,067<\/strong><\/p>\r\n        <p>Average Salary<\/p>\r\n        <p>Source: <a href=\"https:\/\/www.payscale.com\/research\/US\/Job=Cryptologist\/Salary\" target=\"_blank\" rel=\"noopener\">Payscale<\/a><\/p>\r\n\r\n    <\/center>\r\n<\/sonic-callout>\r\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-primary-700 \">\n    <a target=\"_self\" href=\"https:\/\/www.cyberdegrees.org\/careers\/cryptographer\/career-and-salary\" class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">See how location affects salary for cryptographers<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\r\n\n<section>\n\t<div class=\"text-center mb-8\">\n\t\t<sonic-tooltip class=\"block text-xs text-center mb-4\" label=\"Learn More About Our Partners\">\n\t\t\t<span>CyberDegrees.org is an advertising-supported site. Featured or trusted partner programs and all school search, finder, or match results are for schools that compensate us. This compensation does not influence our school rankings, resource guides, or other editorially-independent information published on this site.<\/span>\n\t\t<\/sonic-tooltip>\n\t<\/div>\n\t<div class=\"bootcamp-widget rounded bg-white box-border pb-10\">\n\t\t<img decoding=\"async\" loading=\"lazy\" class=\"m-auto -mt-8\" src=\"https:\/\/res.cloudinary.com\/highereducation\/image\/upload\/w_120,h_82,c_fill,f_auto,fl_lossy,q_auto\/v1622734180\/BestColleges.com\/sonic\/icon-click.svg\" width=\"120\" height=\"82\" alt=\"\"\/>\n\t\t<h3 class=\"text-center text-2xl md:text-3xl font-bold mt-8 md:mt-12 mb-2 md:mb-3 px-4\">Match me with a bootcamp.<\/h3>\n\t\t<p class=\"text-center text-base mb-8 px-3\">Find programs with your skills, schedule, and goals in mind.<\/p>\n\t\t<div class=\"text-center w-full\">\n\t\t\t<a href=\"\/discover\" rel=\"nofollow noopener noreferrer\" target=\"_blank\" class=\"sonic-btn bg-primary-800 hover:bg-primary-900 focus:bg-primary-900 uppercase mx-auto w-64 font-heading\" data-tracking=\"&#x7B;&quot;log&quot;&#x3A;true,&quot;event&quot;&#x3A;&quot;click&quot;,&quot;beam&quot;&#x3A;&quot;ElementClicked&quot;,&quot;data&quot;&#x3A;&#x7B;&quot;position&quot;&#x3A;&quot;PRIMARY&quot;,&quot;location&quot;&#x3A;&quot;BOOTCAMP&#x20;MATCH&#x20;WIDGET&quot;,&quot;elementType&quot;&#x3A;&quot;LINK&quot;,&quot;text&quot;&#x3A;&quot;MATCH&#x20;ME&#x20;TO&#x20;A&#x20;BOOTCAMP&quot;&#x7D;,&quot;actionOutcome&quot;&#x3A;&quot;INTERNALLINK&quot;&#x7D;\">Match me to a bootcamp<\/a>\n\t\t<\/div>\n\t<\/div>\n<\/section>\n\n\n\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"how-to\" id=\"how-to\"><\/a>\n\n\r\n<h2>How to Become a Cryptographer<\/h2>\r\n<p>The path to a career in cryptography begins with a bachelor's <a href=\"https:\/\/www.cyberdegrees.org\/listings\/computer-science\/best-programs\/\">degree in computer science<\/a>, computer engineering, or related field. Coursework develops foundational knowledge and skills in mathematics, computer and information technology systems, and programming languages. Aspiring cryptographers need strong mathematical skills. They may complete a double major, studying mathematics alongside a computer-related discipline. A math major emphasizes the data structures, abstract algebra, and algorithms essential for a career in cryptology.<\/p>\r\n<p>Most cryptography jobs require at least five years of experience in computer and information technology security. Entry-level positions as software programmers,<a href=\"https:\/\/www.cyberdegrees.org\/jobs\/security-analyst\/\"> information security analysts<\/a>, or computer system analysts build familiarity with information technology security hardware and software. A mid-level role as an information technology manager or network and computer systems administrator can also give future cryptographers insight into information technology design, organization, and leadership.<\/p>\r\n<p>Many employers prefer to hire cryptographers with a master's or doctoral degree. Graduate programs in cybersecurity, mathematics, or <a href=\"https:\/\/cyberdegrees.org\/listings\/computer-engineering\/best-programs\/\">computer engineering<\/a> lead to positions in cryptography. Non-technical degrees in economics, English, or public administration can facilitate a career in the field alongside extensive computer-related experience. Graduate programs also build research and analytical skills applicable to cryptography.<\/p>\r\n\r\n\r\n<ul style=\"list-style-type: none; border-left: 3px solid #1271E4\">\r\n<li><sonic-icon icon='chevron-double-right' type='solid' size='small' color='#1222B6'><\/sonic-icon> <a href=\"https:\/\/www.cyberdegrees.org\/careers\/cryptographer\/how-to-become\"><strong>Steps to Becoming a Cryptographer<\/strong><\/a><\/li>\r\n<p>This guide offers a step-by-step pathway to launching a career in cryptography.<\/p>\r\n\r\n<li><sonic-icon icon='chevron-double-right' type='solid' size='small' color='#1222B6'><\/sonic-icon> <a href=\"https:\/\/cyberdegrees.org\/listings\/computer-engineering\/best-programs\/\"><strong>Computer Engineering Degree Programs<\/strong><\/a><\/li>\r\n<p>Readers interested in developing and designing computer systems can explore possible degrees on this page.<\/p>\r\n\r\n<li><sonic-icon icon='chevron-double-right' type='solid' size='small' color='#1222B6'><\/sonic-icon> <a href=\"https:\/\/www.cyberdegrees.org\/listings\/computer-science\/best-programs\/\"><strong>Computer Science Degree Programs<\/strong><\/a><\/li>\r\n<p>A degree in computer science offers a strong foundation for many different tech careers.<\/p>\r\n\r\n<li><sonic-icon icon='chevron-double-right' type='solid' size='small' color='#1222B6'><\/sonic-icon> <a href=\"https:\/\/www.cyberdegrees.org\/resources\/cybersecurity-vs-computer-science\/\"><strong>Cybersecurity vs. Computer Science Programs<\/strong><\/a><\/li>\r\n<p>This guide explores the similarities and differences between cybersecurity and computer science degrees.<\/p>\r\n\r\n<li><sonic-icon icon='chevron-double-right' type='solid' size='small' color='#1222B6'><\/sonic-icon> <a href=\"https:\/\/www.cyberdegrees.org\/listings\/bachelors-degrees\/\"><strong>Bachelor's in Cybersecurity Programs<\/strong><\/a><\/li>\r\n<p>Readers can explore this guide about the typical education requirement in cybersecurity.<\/p>\r\n\r\n<li><sonic-icon icon='chevron-double-right' type='solid' size='small' color='#1222B6'><\/sonic-icon> <a href=\"https:\/\/www.cyberdegrees.org\/listings\/masters-degrees\/\"><strong>Master's in Cybersecurity Programs<\/strong><\/a><\/li>\r\n<p>Individuals looking to expand their knowledge of safeguarding data can consult this guide on master's degrees in cybersecurity.<\/p>\r\n\r\n<li><sonic-icon icon='chevron-double-right' type='solid' size='small' color='#1222B6'><\/sonic-icon> <a href=\"https:\/\/www.cyberdegrees.org\/listings\/doctoral-degrees\/\"><strong>Doctoral Degrees in Cybersecurity<\/strong><\/a><\/li>\r\n<p>This guide details Ph.D. degrees in cybersecurity &mdash; the highest level of education in the field.<\/p>\r\n\r\n<li><sonic-icon icon='chevron-double-right' type='solid' size='small' color='#1222B6'><\/sonic-icon> <a href=\"https:\/\/www.cyberdegrees.org\/listings\/cyber-security-bootcamps\/\"><strong>Guide to Cybersecurity Bootcamps<\/strong><\/a><\/li>\r\n<p>Bootcamps offer a fast, intensive way to develop specific industry knowledge.<\/p>\r\n<\/ul>\r\n\r\n\r\n<h3>Professional Organizations for Cryptographers<\/h3>\r\n<ul style=\"list-style-type: none;\">\r\n<li><sonic-icon icon='plus' type='solid' size='small' color='#12C7C4'><\/sonic-icon> <a href=\"https:\/\/www.iacr.org\/\" target=\"_blank\" rel=\"noopener\"><strong>International Association for Cryptologic Research<\/strong><\/a><strong>:<\/strong> The IACR, a nonprofit cryptology organization established in 2013, offers its members access to journal publications, a database of information on cryptology conferences, and a job board listing current openings in the field.<\/li>\r\n<li><sonic-icon icon='plus' type='solid' size='small' color='#12C7C4'><\/sonic-icon> <a href=\"https:\/\/www.nist.gov\/\" target=\"_blank\" rel=\"noopener\"><strong>National Institute of Standards and Technology<\/strong><\/a><strong>: <\/strong>NIST, a government agency within the U.S. Department of Commerce, has developed cryptography standards in technology for over 50 years. Explore news and read about upcoming events on the NIST website.<\/li>\r\n<li><sonic-icon icon='plus' type='solid' size='small' color='#12C7C4'><\/sonic-icon> <a href=\"https:\/\/www.cryptogram.org\/\" target=\"_blank\" rel=\"noopener\"><strong>American Cryptogram Association<\/strong><\/a><strong>: <\/strong>This nonprofit organization promotes the art of breaking codes and ciphers. Members can connect with like-minded individuals and collaborate to sharpen their code-breaking skills with its Cryptogram magazine.<\/li>\r\n<li><sonic-icon icon='plus' type='solid' size='small' color='#12C7C4'><\/sonic-icon> <a href=\"https:\/\/www.nsa.gov\/\" target=\"_blank\" rel=\"noopener\"><strong>National Security Agency<\/strong><\/a><strong>: <\/strong>This government agency employs cryptographers to handle and safeguard national interests. The NSA website lists available jobs and provides information on student programs for aspiring cryptographers.<\/li>\r\n<\/ul>\r\n\r\n\r\n<section class=\"-mx-4 md:-mx-1\/2vw py-12 md:py-16 mt-12 md:my-16 relative md:left-1\/2 md:right-1\/2 md:w-screen bg-gray-50\">\n    <div class=\"container content\">\n        \r\n<sonic-editorial-listings degree=\"\" category=\"\" subject=\"\" limit=\"3\"><\/sonic-editorial-listings>\r\n\n    <\/div>\n<\/section>\n\r\n\r\n<h2>Learn More About Cryptographers<\/h2>\r\n<div class=\"grid md:grid-cols-2 lg:grid-cols-4 gap-5 my-8\"> \n  \r\n\r\n    \n\n  \n<div class=\"card card-base flex flex-col w-full rounded-lg shadow-lg bg-white overflow-hidden relative \">\n  <div class=\"flex-shrink-0 relative\">\n        <img decoding=\"async\"\n      class=\"w-full object-cover h-28\"\n      src=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/v1664375549\/CyberDegrees.org\/student-working-on-computer_5979d2c4b\/student-working-on-computer_5979d2c4b.jpg?_i=AA\"\n      loading=\"lazy\"\n      alt=\"1\"\n srcset=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/v1664375549\/CyberDegrees.org\/student-working-on-computer_5979d2c4b\/student-working-on-computer_5979d2c4b.jpg?_i=AA 2121w, https:\/\/res.cloudinary.com\/highereducation\/images\/w_300,h_200,c_scale\/f_auto,q_auto\/v1664375549\/CyberDegrees.org\/student-working-on-computer_5979d2c4b\/student-working-on-computer-300x200.jpg?_i=AA 300w, https:\/\/res.cloudinary.com\/highereducation\/images\/w_1024,h_683,c_scale\/f_auto,q_auto\/v1664375549\/CyberDegrees.org\/student-working-on-computer_5979d2c4b\/student-working-on-computer-1024x683.jpg?_i=AA 1024w, https:\/\/res.cloudinary.com\/highereducation\/images\/w_768,h_512,c_scale\/f_auto,q_auto\/v1664375549\/CyberDegrees.org\/student-working-on-computer_5979d2c4b\/student-working-on-computer-768x512.jpg?_i=AA 768w, https:\/\/res.cloudinary.com\/highereducation\/images\/w_1536,h_1024,c_scale\/f_auto,q_auto\/v1664375549\/CyberDegrees.org\/student-working-on-computer_5979d2c4b\/student-working-on-computer-1536x1024.jpg?_i=AA 1536w, https:\/\/res.cloudinary.com\/highereducation\/images\/w_2048,h_1365,c_scale\/f_auto,q_auto\/v1664375549\/CyberDegrees.org\/student-working-on-computer_5979d2c4b\/student-working-on-computer-2048x1365.jpg?_i=AA 2048w\" sizes=\"(max-width: 2121px) 100vw, 2121px\" \/>\n              <div class=\"w-12 absolute p-2.5 -bottom-6 left-1\/2 transform -translate-x-1\/2 bg-white rounded-3xl flex align-middle justify-center\">\n        <sonic-icon class=\"text-center\" icon=\"code\" type=\"outline\" color=\"#000000\" size=\"small\"><\/sonic-icon>\n      <\/div>\n      <\/div>\n  <div class=\"flex flex-col p-8 mt-2\">\n    <h3 class=\"text-xl font-bold text-gray-900 text-center tracking-tight\">Certifications for Cryptographers<\/h3>\n        <div class=\"text-gray-500 text-sm\">\r\n    Cryptographers can seek certification to demonstrate their value to employers and expand their knowledge. Consult this page for information on these credentials.\r\n    <\/div>\n            <a class=\"sonic-btn button button--no-theme js-card-button\" href=\"https:\/\/www.cyberdegrees.org\/careers\/cryptographer\/certifications\" target=\"_self\">Learn More<\/a>\n      <\/div>\n<\/div>\n\n\n\n\n\r\n\r\n    \n\n  \n<div class=\"card card-base flex flex-col w-full rounded-lg shadow-lg bg-white overflow-hidden relative \">\n  <div class=\"flex-shrink-0 relative\">\n        <img decoding=\"async\"\n      class=\"w-full object-cover h-28\"\n      src=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/v1664378988\/CyberDegrees.org\/woman-hacker-programmer-on-computer_59617f5cc\/woman-hacker-programmer-on-computer_59617f5cc.jpg?_i=AA\"\n      loading=\"lazy\"\n      alt=\"1\"\n srcset=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/v1664378988\/CyberDegrees.org\/woman-hacker-programmer-on-computer_59617f5cc\/woman-hacker-programmer-on-computer_59617f5cc.jpg?_i=AA 2121w, https:\/\/res.cloudinary.com\/highereducation\/images\/w_300,h_200,c_scale\/f_auto,q_auto\/v1664378988\/CyberDegrees.org\/woman-hacker-programmer-on-computer_59617f5cc\/woman-hacker-programmer-on-computer-300x200.jpg?_i=AA 300w, https:\/\/res.cloudinary.com\/highereducation\/images\/w_1024,h_683,c_scale\/f_auto,q_auto\/v1664378988\/CyberDegrees.org\/woman-hacker-programmer-on-computer_59617f5cc\/woman-hacker-programmer-on-computer-1024x683.jpg?_i=AA 1024w, https:\/\/res.cloudinary.com\/highereducation\/images\/w_768,h_512,c_scale\/f_auto,q_auto\/v1664378988\/CyberDegrees.org\/woman-hacker-programmer-on-computer_59617f5cc\/woman-hacker-programmer-on-computer-768x512.jpg?_i=AA 768w, https:\/\/res.cloudinary.com\/highereducation\/images\/w_1536,h_1024,c_scale\/f_auto,q_auto\/v1664378988\/CyberDegrees.org\/woman-hacker-programmer-on-computer_59617f5cc\/woman-hacker-programmer-on-computer-1536x1024.jpg?_i=AA 1536w, https:\/\/res.cloudinary.com\/highereducation\/images\/w_2048,h_1365,c_scale\/f_auto,q_auto\/v1664378988\/CyberDegrees.org\/woman-hacker-programmer-on-computer_59617f5cc\/woman-hacker-programmer-on-computer-2048x1365.jpg?_i=AA 2048w\" sizes=\"(max-width: 2121px) 100vw, 2121px\" \/>\n              <div class=\"w-12 absolute p-2.5 -bottom-6 left-1\/2 transform -translate-x-1\/2 bg-white rounded-3xl flex align-middle justify-center\">\n        <sonic-icon class=\"text-center\" icon=\"code\" type=\"outline\" color=\"#000000\" size=\"small\"><\/sonic-icon>\n      <\/div>\n      <\/div>\n  <div class=\"flex flex-col p-8 mt-2\">\n    <h3 class=\"text-xl font-bold text-gray-900 text-center tracking-tight\">Day in the Life of a Cryptographer<\/h3>\n        <div class=\"text-gray-500 text-sm\">\r\n    Insight into a day in the life of a cryptographer can help you determine if the field is right for you. Take a look at the ins and outs of this exciting and rewarding career.\r\n    <\/div>\n            <a class=\"sonic-btn button button--no-theme js-card-button\" href=\"https:\/\/www.cyberdegrees.org\/careers\/cryptographer\/day-in-the-life\" target=\"_self\">Learn More<\/a>\n      <\/div>\n<\/div>\n\n\n\n\n\r\n    \n\n  \n<div class=\"card card-base flex flex-col w-full rounded-lg shadow-lg bg-white overflow-hidden relative \">\n  <div class=\"flex-shrink-0 relative\">\n        <img decoding=\"async\"\n      class=\"w-full object-cover h-28\"\n      src=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/v1664383456\/CyberDegrees.org\/female-hacker-on-computer_5945b90a7\/female-hacker-on-computer_5945b90a7.jpg?_i=AA\"\n      loading=\"lazy\"\n      alt=\"1\"\n srcset=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/v1664383456\/CyberDegrees.org\/female-hacker-on-computer_5945b90a7\/female-hacker-on-computer_5945b90a7.jpg?_i=AA 2121w, https:\/\/res.cloudinary.com\/highereducation\/images\/w_300,h_200,c_scale\/f_auto,q_auto\/v1664383456\/CyberDegrees.org\/female-hacker-on-computer_5945b90a7\/female-hacker-on-computer-300x200.jpg?_i=AA 300w, https:\/\/res.cloudinary.com\/highereducation\/images\/w_1024,h_683,c_scale\/f_auto,q_auto\/v1664383456\/CyberDegrees.org\/female-hacker-on-computer_5945b90a7\/female-hacker-on-computer-1024x683.jpg?_i=AA 1024w, https:\/\/res.cloudinary.com\/highereducation\/images\/w_768,h_512,c_scale\/f_auto,q_auto\/v1664383456\/CyberDegrees.org\/female-hacker-on-computer_5945b90a7\/female-hacker-on-computer-768x512.jpg?_i=AA 768w, https:\/\/res.cloudinary.com\/highereducation\/images\/w_1536,h_1024,c_scale\/f_auto,q_auto\/v1664383456\/CyberDegrees.org\/female-hacker-on-computer_5945b90a7\/female-hacker-on-computer-1536x1024.jpg?_i=AA 1536w, https:\/\/res.cloudinary.com\/highereducation\/images\/w_2048,h_1365,c_scale\/f_auto,q_auto\/v1664383456\/CyberDegrees.org\/female-hacker-on-computer_5945b90a7\/female-hacker-on-computer-2048x1365.jpg?_i=AA 2048w\" sizes=\"(max-width: 2121px) 100vw, 2121px\" \/>\n              <div class=\"w-12 absolute p-2.5 -bottom-6 left-1\/2 transform -translate-x-1\/2 bg-white rounded-3xl flex align-middle justify-center\">\n        <sonic-icon class=\"text-center\" icon=\"code\" type=\"outline\" color=\"#000000\" size=\"small\"><\/sonic-icon>\n      <\/div>\n      <\/div>\n  <div class=\"flex flex-col p-8 mt-2\">\n    <h3 class=\"text-xl font-bold text-gray-900 text-center tracking-tight\">How to Become a Cryptographer<\/h3>\n        <div class=\"text-gray-500 text-sm\">\r\n    Do you need a degree? What about certification? Will a bootcamp provide the background you need? Learn how to get started in cryptography.\r\n    <\/div>\n            <a class=\"sonic-btn button button--no-theme js-card-button\" href=\"https:\/\/www.cyberdegrees.org\/careers\/cryptographer\/how-to-become\" target=\"_self\">Learn More<\/a>\n      <\/div>\n<\/div>\n\n\n\n\n\r\n\r\n    \n\n  \n<div class=\"card card-base flex flex-col w-full rounded-lg shadow-lg bg-white overflow-hidden relative \">\n  <div class=\"flex-shrink-0 relative\">\n        <img decoding=\"async\"\n      class=\"w-full object-cover h-28\"\n      src=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/v1664383450\/CyberDegrees.org\/engineers-working-on-computer_59673c226\/engineers-working-on-computer_59673c226.jpg?_i=AA\"\n      loading=\"lazy\"\n      alt=\"1\"\n srcset=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/v1664383450\/CyberDegrees.org\/engineers-working-on-computer_59673c226\/engineers-working-on-computer_59673c226.jpg?_i=AA 2120w, https:\/\/res.cloudinary.com\/highereducation\/images\/w_300,h_200,c_scale\/f_auto,q_auto\/v1664383450\/CyberDegrees.org\/engineers-working-on-computer_59673c226\/engineers-working-on-computer-300x200.jpg?_i=AA 300w, https:\/\/res.cloudinary.com\/highereducation\/images\/w_1024,h_683,c_scale\/f_auto,q_auto\/v1664383450\/CyberDegrees.org\/engineers-working-on-computer_59673c226\/engineers-working-on-computer-1024x683.jpg?_i=AA 1024w, https:\/\/res.cloudinary.com\/highereducation\/images\/w_768,h_512,c_scale\/f_auto,q_auto\/v1664383450\/CyberDegrees.org\/engineers-working-on-computer_59673c226\/engineers-working-on-computer-768x512.jpg?_i=AA 768w, https:\/\/res.cloudinary.com\/highereducation\/images\/w_1536,h_1024,c_scale\/f_auto,q_auto\/v1664383450\/CyberDegrees.org\/engineers-working-on-computer_59673c226\/engineers-working-on-computer-1536x1024.jpg?_i=AA 1536w, https:\/\/res.cloudinary.com\/highereducation\/images\/w_2048,h_1366,c_scale\/f_auto,q_auto\/v1664383450\/CyberDegrees.org\/engineers-working-on-computer_59673c226\/engineers-working-on-computer-2048x1366.jpg?_i=AA 2048w\" sizes=\"(max-width: 2120px) 100vw, 2120px\" \/>\n              <div class=\"w-12 absolute p-2.5 -bottom-6 left-1\/2 transform -translate-x-1\/2 bg-white rounded-3xl flex align-middle justify-center\">\n        <sonic-icon class=\"text-center\" icon=\"code\" type=\"outline\" color=\"#000000\" size=\"small\"><\/sonic-icon>\n      <\/div>\n      <\/div>\n  <div class=\"flex flex-col p-8 mt-2\">\n    <h3 class=\"text-xl font-bold text-gray-900 text-center tracking-tight\">Salary and Career Outlook for Cryptographers<\/h3>\n        <div class=\"text-gray-500 text-sm\">\r\n    How much can you earn? Find out about salary and career progression for new cryptographers.\r\n    <\/div>\n            <a class=\"sonic-btn button button--no-theme js-card-button\" href=\"https:\/\/www.cyberdegrees.org\/careers\/cryptographer\/career-and-salary\" target=\"_self\">Learn More<\/a>\n      <\/div>\n<\/div>\n\n\n\n\n\r\n\r\n\n<\/div>\n\r\n\r\n\r\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"faq\" id=\"faq\"><\/a>\n\n\r\n<h2>Frequently Asked Questions About Cryptographers<\/h2>\r\n<hr style=\"background:  #1222B6; border:0; height:7px\" \/>\r\n\r\n<h3><strong>What is a cryptographer?<\/strong><\/h3>\r\n<p>A cryptographer is a cybersecurity professional who uses encryption codes to protect data and other sensitive information. These individuals may also break existing codes to better understand algorithms and their use in information security.<\/p>\r\n<h3><strong>Is cryptography a good career?<\/strong><\/h3>\r\n<p>Cryptographers may enjoy higher than average salaries. <a href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-analysts.htm\" target=\"_blank\" rel=\"noopener\">The BLS reports<\/a> that information security analysts, a similar cybersecurity career to cryptographers, earn a median income of $102,600, much higher than the $45,760 for all other workers.<\/p>\r\n<h3><strong>Are cryptographers in demand?<\/strong><\/h3>\r\n<p>Yes. The BLS projects an encouraging 33% <a href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-analysts.htm\" target=\"_blank\" rel=\"noopener\">employment growth rate<\/a> for information security analysts from 2020-2030. Other research suggests continued growth in the cybersecurity sector for the near future.<\/p>\r\n<h3><strong>What do cryptographers do daily?<\/strong><\/h3>\r\n<p>Cryptographers use codes and algorithms to encrypt sensitive data daily. This work requires them to handle specific ciphers and security improvements through software maintenance and updates.<\/p>\r\n\r\n\r\n<section class=\"-mx-4 md:-mx-1\/2vw py-12 md:py-16 mt-12 md:my-16 relative md:left-1\/2 md:right-1\/2 md:w-screen bg-gray-50\">\n    <div class=\"container content\">\n        \r\n<h2>Reviewed by: Darnell Kenebrew<\/h2>\r\n<div class=\"biography flex flex-col justify-center md:justify-start md:flex-row items-center rounded-lg shadow-lg p-8 bg-white \">\n        <img decoding=\"async\" class=\"object-cover mb-8 rounded-lg max-h-60 md:mb-0\" src=\"https:\/\/res.cloudinary.com\/highereducation\/image\/upload\/v1651676190\/Darnell_Kenebrew.png\" alt=\"Portrait of Darnell Kenebrew\" height=\"240\" loading=\"lazy\">\n    <div class=\"md:ml-8\">\n    <h4 class=\"mb-1 font-bold leading-6 biography__title\">Darnell Kenebrew<\/h4>\n        <div class=\"mt-4 text-lg leading-6 text-gray-700 md:mb-0 md:pb-0\">\n      \r\n<p slot=\"contentRight\"> \r\n    <a href=\"https:\/\/www.linkedin.com\/in\/darnellkenebrew\/\" target=\"_blank\" rel=\"noopener\">Darnell Kenebrew<\/a> is a first-generation graduate from San Francisco State University's class of 2020. He graduated with a bachelor's in computer science, which helped him kick off a career in tech and pursue roles within data and engineering.\r\nCurrently, he's a data analytics engineer at Meta and an executive captain for COOP Careers &mdash; a nonprofit for overcoming underemployment. Kenebrew strongly believes in giving people a chance and that everyone should have an equal opportunity within the job market. He believes that COOP Careers helps this equality materialize.\r\nKenebrew is passionate about how the industry is shaped with data and how data can be leveraged in many aspects of business decisions to meet goals. In addition, he's passionate about inclusion, community, education, and using data for good. He hopes that he can pivot business decisions to make a positive, meaningful impact and that his work will positively impact end-users, as well as meet business goals.\r\n<br>\r\nDarnell Kenebrew is a paid member of the Red Ventures Education Integrity Network.\r\n<br \/>\r\n<i>Page last reviewed<\/i><i>Jul 6, 2022<\/i>\r\n\r\n<\/p>\r\n\r\n\n    <\/div>\n      <\/div>\n<\/div>\n\n\n\r\n\n    <\/div>\n<\/section>\n","protected":false},"excerpt":{"rendered":"Interested in a cryptographer career? Read on to discover more about cryptographers, from salary to education, daily duties, and certification requirements.","protected":false},"author":5,"featured_media":2123,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"templates\/template-dcs.php","format":"standard","meta":{"_cloudinary_featured_overwrite":false,"footnotes":""},"categories":[1],"states":[],"resources-overview":[],"degrees":[],"jobs-overview":[31],"rankings":[],"class_list":["post-135","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","jobs-overview-guide"],"acf":[],"menu_order":0,"_links":{"self":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts\/135","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/comments?post=135"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts\/135\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/media\/2123"}],"wp:attachment":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/media?parent=135"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/categories?post=135"},{"taxonomy":"states","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/states?post=135"},{"taxonomy":"resources-overview","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/resources-overview?post=135"},{"taxonomy":"degrees","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/degrees?post=135"},{"taxonomy":"jobs-overview","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/jobs-overview?post=135"},{"taxonomy":"rankings","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/rankings?post=135"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}