Skip to main content

Careers

When you choose a career in information systems, you open the doors of both technology and business. As a result, the career opportunities are abundant. Some careers are more technical, requiring dedication to mastering the details, nuances, and changes in technology. Other careers are more business focused, existing to align business needs with powerful new technologies. No matter what excites you, you can find a career that matches your enthusiasm.

Business Analytics
Management
Cyber Security
Software Development
IT and Infrastructure
Pre-PhD

Business Intelligence Developer

Business intelligence developers make the data understandable for businesses!

Business intelligence (BI) leverages software tools to transform data into useful insights that helps facilitate business decisions. BI tools access and analyze data sets to present analytical findings in a visually appealing, human-readable format such as reports, summaries, dashboards, graphs, charts and maps. This provides users with detailed intelligence about the state of the business.

Michael20Thurston-small.jpg

Much of [my] time is spent on reviewing my logic, to make sure I understand the data and what the company needs. The rest of the time is spent in development, including writing queries for data extraction that are presented in charts and graphs to help business leaders make better decisions, or creating tools and data visualizations to make better sense of the data. Other meetings I have are group sessions where we review and write new code or mentoring.
Michael Thurston (BI Developer at Health Catalyst)"

BI developers will often work with unformatted data from CSV, XML, spreadsheet, or database files; find meaning in the data, possibly using statistical analysis tools; and then display the insights (using PowerBI, Tableau, and other tools) in a format that enables managers and executives to make decisions.

Throughout the BYU Information Systems program, you will learn about databases, the basics of statistical analysis, machine learning, predictive modeling, and graphical formatting using tools like Microsoft SQL Server, Tableau, Python, JMP, and Azure Machine Learning Studio. You will also learn how to analyze a business need, create a solution, and present the information in a convincing and compelling manner. Head over to the Try It Out page for a taste of BI.

Data Analyst

A data analyst is typically more mathematically and statistically literate than a BI developer. Data analysts know many statistical models and algorithms, and they understand the strengths and weaknesses of each one. They spend a lot of time analyzing trends and fitting models using various tools and writing their own code. As a result, data analysts pay attention to the details and are very good at reaching conclusions in mountains of data.

We teach our typical student the basics of data analysis, allowing them to test and try many different models. This includes experience with machine learning, neural networks, regressions, and computer statistical tools. For those more interested in data analytics, the Masters of Information Systems program offers the Business Intelligence & Analytics track, enabling a deeper dive into statistics, data analysis, and forecasting.

Database Administrator

A database administrator (DBA) is responsible for maintaining the integrity, accuracy, and availability of company data. They are highly trained professionals that know both theory and technical skills that allows them to organize data in an efficient manner.

DBAs work closely with information systems managers to customize database solutions to corporate needs. System DBAs oversee technical aspects of database administration, including debugging code and upgrading software while application DBAs focus on managing a specific application working with the database.

In the Information Systems program, you learn about many database styles, frameworks, limitations, and implementations. Additionally, you will have the opportunity to work with Microsoft SQL Server, Oracle, MySQL, PostgreSQL, and Cassandra databases. According to the Bureau of Labor Statistics, DBA employment is expected to rise by 11% through 2024. For an introduction to databases, check out the SQL Try It Out activity.

Project Manager

Arguably the most complete combination of technology, people, and business, project management is the matches highly technical tasks and projects to the people who possess the skills to perform, all of which promotes the company’s mission and increases the company’s revenue. Project managers have the ability to prioritize workflows, analyze employee strengths and weaknesses, and visualize the big-picture goal.

Rachelle-Morris1-2.jpg

When you go out into the world, there are projects that are worth millions of dollars with large budgets … I really appreciated being in a technical major so I could experience both project management and engineering.
Rachelle Morris (VP, Client Advisor at J.P. Morgan SLC)

Project managers don’t have to be technical experts, but it helps to be able to communicate with the technical employee he or she manages. The information systems program gives students a general understanding of technical aspects so the students can communicate effectively with technology subject matter experts of all kinds. The program also has a dedicated project management course, teaching students how to organize projects, workflow, and people. Learn more on our Try It Out page

Development Manager

The role of a development manager varies depending on the company and project, but their primary responsibility is to get the product released. They often manage a team of software engineers so these managers must understand the technology, and are generally software developers that have been promoted to a managerial role. These management roles could be found on any sort of technical team ranging from software to hardware, databases to enterprise infrastructure. An information systems degree prepares you to be proficient in these technologies and a highly skilled leader.

Brent_Anderson.jpg

Sometimes I work on programming projects, more often I am involved in design and architecture discussions, code review, and figuring out ways to improve our process. We wear a lot of hats in our department, so we also provide internal business process advisory, work with other departments on streamlining their workflows, [and] security testing to ensure our customer information is safe.
Brent Anderson (Technology Manager at Blender Bottle) MISM '15

Chief Information Officer (CIO)

A chief information officer (CIO) is the corporate executive in charge of information technology strategy and implementation. In addition to overseeing the hardware, software and data that helps other members of the C-suite do their jobs effectively, the CIO must research new technologies, strategize how technology can provide business value and address the risks associated with digital information. In many companies, CIOs report directly to the chief executive officer (CEO), and at some companies, the CIO sits on the executive board.

Security Analyst

In the realm of science and technology, cyber security is still relatively new, which makes it ever-changing and exciting. As a result, the role of a security analyst changes and varies widely. You could be in charge of protecting your organization from malicious attackers, hunting down threats and vulnerabilities that already exist in your systems, forensically analyzing the network after a breach to learn how and why an attack occurred, or training employees to identify threats and protect the company.

Scott-Hanson-small.jpg

Incident response is a challenging profession; it requires you to adapt quickly and know at least a little something about a broad swath of technologies … I love how there’s always a puzzle to be solved; the flashes of insight and discovery that happen along the way are sheer bliss … No one is going to pay you good money to solve straightforward, structured problems. Successful IS professionals thrive on tackling complex, unstructured problems. This will also make your career way more interesting.
Scott Hanson (Consultant for Kroll Cyber Security) MISM '08

There’s a saying in cyber security: “It’s not IF you get hacked, but WHEN.” As a result, the need for security analysts is on the rise. The IS program prepares students for security roles by introducing them to many attack scenarios and allowing them to get their hands into the code to see how hackers actually attack. There is also a security track for MISM students who want to emphasize in cyber security. Peaked your interest? Try It Out right now!

IT Auditor

A huge part of security is making sure the processes businesses follow are safe and up-to-date. An information technology auditor is responsible for the internal controls and risks within a company’s technology system. He or she actively monitors the system to ensure it follows policies and best practices, including laws and regulations pertaining to the organization’s industry. This usually involves studying the technologies used and identifying points of weaknesses. The auditor then prepares a report on his findings and recommends a suitable course of action. Their final reports include optional recommendations and mandatory corrective actions. IT auditors will deal with business ethics, risk management, organizational structure, business processes and governance oversight.

Chief Information Security Officer (CISO)

This executive role involves developing and deploying an information security strategy in order to protect the organization's staff, data, infrastructures and assets from hackers. CISOs have a whole range of responsibilities, ranging from hiring IT experts to support their work, to providing leadership and training to those less skilled than them. They will also manage individuals ensuring they are focusing on the right areas of strategy at the right time. A CISO must also spearhead the company's IT security hardware strategy and make sure these strategies are undertaken by the appropriate department, whether this is IT staff or other IT security staff.

Their role will involve innovating company-wide corporate security policies, standards and procedures and making sure staff across the board comply on a day-to-day basis. CISOs are expected to work with the entire organization to ensure everyone is working alongside each other and come up with a standardized strategy. This includes conversing regularly with senior management and employees to make sure all IT security policies are deployed, revised, sustained and overseen effectively.

Web Developer

From database to server to browser, web developers have their hands in the code every step of the way. Back-end developers are responsible for the technical construction of the website, including the basic framework and change management. Front-end developers are responsible for the look and feel of the site, using several technologies to align, color, and animate content. In the information systems program, you learn how to create and deploy websites from start to finish, which includes coding in languages like C#, JavaScript, HTML, CSS, and Python. You also learn how to create and enhance the user experience of your customers. For an introduction to web development, check out the Try It Out page.

Programmer/Software Engineer

Every business has computer programs that are purchased and need customization, or are developed in-house. Software engineers customize and build these programs to support business operations. In other settings, programmers don’t just support the business operations, the software they build is the product that brings in revenue to the firm. While it is very important to understand various coding languages, programmers must also understand the user needs and requirements that mold the software.

[I love] the flexibility – I can come into the office whenever. I am surrounded by smart people and I love learning from them. I also love the opportunity I have to work on such a large-scale website, Amazon.com. I enjoy collaborating with different people and working together to solve problems.
April Lin (Software Development Engineer at Amazon) BS '12

The BYU information systems program will teach you the concepts of programming in both scripting and object-oriented languages, giving you the foundation to succeed and develop a deep, technical understanding through internships and self-learning.

Network Administrator

Network and computer systems administrators are responsible for the day-to-day operation of an organization’s computer connectivity, or network. They organize, install, and support an organization’s computer systems, including local area networks (LANs), wide area networks (WANs), network segments, intranets, and other data communication systems. Additionally, network administrators manage an organization’s server, desktop, and mobile equipment. They ensure that email and data storage networks work properly. They also make sure that employees’ workstations are working efficiently and stay connected to the central computer network. Without them, the business loses connectivity and productivity halts. To begin understanding networks, visit the networking Try It Out section

Systems Architect

Systems architects define the architecture of a computerized system in order to fulfill certain requirements. Such definitions include: a breakdown of the system into components, the component interactions and interfaces (including with the environment, especially the user), and the technologies and resources to be used in the design. A system architect also analyzes and recommends the right combination of IT components to achieve a specific business, department, team, or functional goal. They objectively analyze desired processes and outcomes, and advise on the right combination of IT systems and components to achieve those goals. In short, system architects divide large and complex systems into manageable subsystems.

The information systems major is designed to give students networking, systems analysis, and enterprise infrastructure experience. Many of our students also learn valuable Amazon Web Services (AWS) skills that enable them to improve the organizations in which they work.

The BYU Masters in Information Systems Management program offers a Pre-PhD track to prepare students who wish to pursue a PhD program at another school. This opens the door for additional job opportunities.

Professor

Information systems professors teach university-level classes and prepare the next generation of technology and business professionals. They often have a lot of flexibility to pursue their passions. This includes teaching courses that they find interesting and conducting cutting-edge research on the field of choice. Additionally, professors can have unmatched job security.

The Pre-PhD track prepares students to succeed by teaching research and writing skills, encouraging students to participate in research opportunities on campus. To learn more about these opportunities you can view more information at http://whyphd.com/phdprep/.

Researcher

Some companies also hire individuals with PhD degrees because of their familiarity with academic research. These companies are on the cutting edge, trying to be the first to make the next big discovery or use existing technology in a new, profitable way. For example, research is being conducting in the following fields: block chain, artificial intelligence (AI), virtual reality (VR), and cyber security.