Seguridad Informatica Profession
Seguridad Informatica Profession
Seguridad Informatica Profession
Security consultant
"A security consultant is the IT equivalent of Obi-Wanadvisor, guide and all-round
security guru," according to CyberDegrees.org. People in this role design and
implement the strongest possible security solutions based on the needs and threats
facing an individual company, and day-to-day tasks may vary widely. A security
consultant might determine the most effective way to protect computers, networks,
software, data, and information systems against attacks, perform vulnerability testing
and risk analyses, test security solutions, respond to any incidents, and update security
systems as needed, depending on the terms of their contract.
3. Security engineer
Security engineers are intermediate-level positions that build and maintain IT security
solutions for a company. These professionals develop security for the organization's
systems and projects, and also handle any technical problems that arise. Security
engineers are often responsible for configuring and installing firewalls and intrusion
detection systems, performing vulnerability testing, developing automation scripts to
track incidents, and testing security solutions.
4. Security architect
The senior-level security architect position involves designing, building, and overseeing
the implementation of network and computer security for a company. Security
architects must plan, research, and design strong security architectures for all IT
projects, perform security assessments, respond to incidents, develop requirements for
LANs, WANs, VPNs, routers, firewalls, and other network devices, as well as design
PKIs, among other tasks.
5. Incident responder
An incident responder (sometimes called a computer security incident response team
engineer or an intrusion analyst) is essentially a cyber firefighter, and must rapidly
address security threats and incidents within a company. "In your role as a first
responder, you will be using a host of forensics tools to find the root cause of a
problem, limit the damage and see that it never happens again," according
to CyberDegrees.org. "Like a firefighter, part of your job will also involve education and
prevention." This involves actively monitoring systems and networks for attacks,
identifying security vulnerabilities, performing malware analysis and reverse
engineering, and establishing protocols for communication within an organization and
with law enforcement during a security incident.
7. Penetration tester
Penetration testers, also know as ethical hackers, are responsible for legally hacking
into an organization's applications, networks, and systems to discover and later patch
security vulnerabilities. This role involves creating and performing formal penetration
tests, conducting physical security assessments of servers, systems, and network
devices, using social engineering to discover security flaws, and incorporating business
considerations into security strategies.
8. Security analyst
A security analyst detects and prevents cyberthreats for a company. This might involve
planning, implementing, and upgrading security measures and controls, performing risk
analyses, conducting internal and external security audits, managing network, intrusion
detection, and prevention systems, and coordinating security plans with third party
vendors.