What are the average salary ranges for jobs in the IT - Computers, Hardware? There are 754 jobs in IT - Computers, Hardware category. Average salaries can vary and range from $45,498 to $337,233. Salary ranges can differ significantly depending on the job, industry, location, required experience, specific skills, education, and other factors... Salaries listed below are U.S. national averages data from October 25, 2024.
Administers and executes the IT configuration management process. Responsible for the overall administration, configuration, maintenance, design, and improvement of the Configuration Management Database (CMDB). Conducts configuration auditing in areas such as software version control, integration construction, and release management. Typically requires a bachelor's degree. Typically reports to a m... View job details
Implements and supports the policies, procedures, and programs that ensure the recovery, security, and integrity of company data, databases, information systems, and technology in the event of a disruption or unanticipated disaster. Performs risk management analysis and documents disaster recovery plans. Identifies and secures the necessary off-site resources required for the organization's resump... View job details
Supervises a team of implementation specialists responsible for installing and deploying technical systems, software, hardware, or solutions. Ensures the team is following department policies and procedures. Manages and supports multiple implementation projects. Assesses client's requirements, develops scopes and cost estimates, and creates project plans and schedules. Ensures that implementations... View job details
Manages a team responsible for analyzing systems and networks to determine deviations from approved policies and configurations. Supports and coaches team members on effective methods to research and evaluate incident response procedures and capabilities. Conducts security scans, examines system configurations, and reviews documentation of incident response procedures. Analyzes identified maliciou... View job details
Analyzes systems and networks to determine deviations from approved policies and configurations. Evaluates incident response procedures and capabilities. Conducts security scans, examines system configurations, and reviews documentation of incident response procedures. Analyzes identified malicious network activity to determine weaknesses exploited, exploitation methods, and the effects on the sys... View job details
Analyzes systems and networks to determine deviations from approved policies and configurations. Evaluates incident response procedures and capabilities. Conducts security scans, examines system configurations, and reviews documentation of incident response procedures. Analyzes identified malicious network activity to determine weaknesses exploited, exploitation methods, and the effects on the sys... View job details
Analyzes systems and networks to determine deviations from approved policies and configurations. Evaluates incident response procedures and capabilities. Conducts security scans, examines system configurations, and reviews documentation of incident response procedures. Analyzes identified malicious network activity to determine weaknesses exploited, exploitation methods, and the effects on the sys... View job details
Analyzes systems and networks to determine deviations from approved policies and configurations. Evaluates incident response procedures and capabilities. Conducts security scans, examines system configurations, and reviews documentation of incident response procedures. Analyzes identified malicious network activity to determine weaknesses exploited, exploitation methods, and the effects on the sys... View job details
Analyzes systems and networks to determine deviations from approved policies and configurations. Evaluates incident response procedures and capabilities. Conducts security scans, examines system configurations, and reviews documentation of incident response procedures. Analyzes identified malicious network activity to determine weaknesses exploited, exploitation methods, and the effects on the sys... View job details
Analyzes systems and networks to determine deviations from approved policies and configurations. Evaluates incident response procedures and capabilities. Conducts security scans, examines system configurations, and reviews documentation of incident response procedures. Analyzes identified malicious network activity to determine weaknesses exploited, exploitation methods, and the effects on the sys... View job details
Salary.com's CompAnalyst platform offers:
($10,000-$30,000)
($30,000-$50,000)
($50,000-$80,000)
($80,000-$100,000)
($100,000+)