Cyber Security Jobs

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 14

Cyber Security Jobs

The Importance of Cyber Security Everyday Cyber


attacks are
becoming more
common and
• With respect to IT, security plays a crucial role in more damaging.

protecting company resources from unauthorized


access.

• A company’s priority should always be the protection


of sensitive information, making professions within
the field of security more critical and sought after.

2
Career Paths in Cyber Security Image Credit:
Cyberseek
(2018)

• Security branches off


into many different
pathways.

• These pathways can


vary from security
monitoring to ethical
hacking.

3
Career Paths in Cyber Security There are many
more security
positions and it
is important to
The primary areas of concern consist of the following: find the one that
interests you.
• Security Analyst
• Penetration Tester
• Bounty Hunters
• Security Architect
• Application Security Engineer

4
Security Analyst
• Security analysts play a key role in keeping an
organization’s sensitive information secure.

• They will often spend a lot of their time monitoring


network activities within the company, checking for
any suspicious activities that may result in malicious
attacks.

• When an attack does occur, security analyst have a


role in mitigating those attacks.

5
Penetration Tester Penetration
Testers are also
called “ethical
• The responsibilities of a Penetration Tester involve hackers” as they
use their talents
finding any vulnerabilities or exploits with a given a in hacking to
target. secure
organizations.

• These targets could be Networks, Web Applications,


Desktop, etc.

• The goal of finding vulnerabilities enables companies


to create plans to mitigate those vulnerabilities which
in turn can prevent a risk of an attack.
6
Bug Bounty Hunter

• Bug Bounty Hunters are essentially like Penetration


testers, where their role is to find vulnerabilities.

• However, their job revolves around completing bug


bounty programs on their own time rather then being
hired as an employee.

• This program involves companies setting out rewards


to individuals that are successful in finding a
vulnerability.
7
Bug Bounty Hunter Continued

This program is also set out to the public where anyone


could part take in the program.
• Sites like HackerOne provide an easy way to find
companies with the bug bounty program.
• Companies that are involved with HackerOne
include: Android, Buzzfeed, Facebook, etc.

8
Security Architect

• Security Architects are responsible for designing,


testing, and implementing security systems within an
organization’s network.

• They often will review current security systems where


they will make recommendation on new solutions to
implement or upgrade.

9
Application Security Engineer

• Application Security Engineers assist in helping secure


software applications that are developed and offered
by organizations to consumers or employees.

• This position is more on the coding side of IT as they


are expected to review code of a software product.

• Being an application security engineer you will also


use penetration testing techniques to find
vulnerabilities.

10
Application Security Engineer vs
Penetration Tester

• This position can be very similar to that of a


Penetration Tester.

• The difference is the Penetration Tester tests an entire


environment, while the Application Security Engineer
test single software products.

11
Skills for Cyber Security Careers Remember, there
are a lot of ways
to get into cyber
security. A lot of
Skills we generally would see in these positions include: people come
from both
technical and
• Communication Skills • Security Principles non-technical
disciplines.
• Team Work • Risk Analysis
• Problem Solving Skills • Network Protocols
• Programming Skills • Intrusion Detection
• Ethical Hacking • Scripting

12
References

• (2018). Retrieved from Cyberseek: https://www.cyberseek.org/pathway.html

• (2019). Retrieved from Forbes:


https://www.forbes.com/sites/forbestechcouncil/2019/02/22/want-to-learn-coding-
check-out-these-resources-recommended-by-tech-experts/#1f568a065d6f

• (2019). Retrieved from Tech Target:


https://searchsecurity.techtarget.com/definition/penetration-testing

• (2020). Retrieved from HackerOne: https://www.hackerone.com/branding

• GMERCYU. (2020). Retrieved from GMERCYU:


https://www.gmercyu.edu/academics/learn/cs-cis-it-difference

• Khuspe, S. (2020). Retrieved from Cyberprime: https://cyberprime.net/getting-


started-with-web-application-penetration-testing/

13
References Continued

• O'Hara, K. (2019). Retrieved from Monster:


https://www.monster.com/career-advice/article/future-of-Cyber Security-jobs

• Perrin, J. (2016). Retrieved from https://www.le-vpn.com/last-mcafee-security-report-


or-how-everyone-can-easily-become-a-cybercriminal/

• Sobers, R. (2020). Retrieved from Varonis: https://www.varonis.com/blog/Cyber


Security-careers/

• Zhang, E. (2019). Retrieved from Digital Guardian:


https://digitalguardian.com/blog/what-security-analyst-responsibilities-qualifications-
and-more

• (2020). Retrieved from Penta: https://www.penta.ie/services/it-architects/

14

You might also like