The booming tech industry has room for employees of all backgrounds. Are you wondering how to get into tech with a psychology degree? Read on.

According to CompTIA[1], the tech industry contributes more than $2 trillion to the national economy, over 10% of its total. Witnessing the incredible growth in this industry, you might be considering a career or industry change. 

Psychology degrees help you develop in-demand skills, allowing you to move between fields and positions. We highlight the technical and non-technical careers that may be available to you and offer some tips for how you might stand out in the process.

Transferable skills from psychology to tech

Psychology training equips learners with skills they can apply to many fields, including the technology industry. Graduates gain people skills useful to computer science careers[2], including: 

  • Communication 
  • Critical thinking
  • General analytical abilities
  • Leadership
  • Organization 

Psychology students also graduate with applicable hard skills, including:

  • Statistical analysis 
  • Research skills
  • Familiarity with client management systems 
  • Knowledge of human behavior 
  • R computer programming[3] language 

Technical roles available to psychology graduates in tech

The following computer science jobs[4] list showcases positions that may be well-suited to psychology graduates. Depending on the employer and the role, candidates may need particular training, skills, or experience. 

Information security analyst

Minimum degree required: Bachelor's 
Alternate job titles: Information security officer, network security analyst, information security specialist
Important characteristics: 

  • Good communicators with analytical and problem-solving skills
  • Creative people who are detail-oriented and understand how people think
  • Technically capable professionals with knowledge of business and security principles 

Information security analysts handle the cybersecurity[5] responsibilities for organizations. They assess systems to look for vulnerabilities and upgrade opportunities. They also monitor suspicious activity, study cybersecurity developments and trends,

Read more from our friends at ZDNet