first commit
This commit is contained in:
78
areas/CyberSec/tryhackme-careers-in-cyber.md
Normal file
78
areas/CyberSec/tryhackme-careers-in-cyber.md
Normal file
@@ -0,0 +1,78 @@
|
||||
## Intro
|
||||
|
||||
Why get a career in cyber:
|
||||
- High Pay - jobs in security have high starting salaries
|
||||
- Exciting - work can include legally hacking systems or defending against cyber attacks
|
||||
- Be in demand - there are over 3.5 million unfilled cyber positions
|
||||
|
||||
## Security Analyst
|
||||
|
||||
Responsible for maintaining the security of an organization's data
|
||||
|
||||
### Responsibilities
|
||||
|
||||
- Working with various stakeholders to analyze the cyber security throughout the company
|
||||
- Compile ongoing reports about the safety of networks, documenting security issues and measures taken in response
|
||||
- Develop security plans, incorporating research on new attack tools and trends, and measures needed across teams to maintain data security
|
||||
|
||||
## Security Engineer
|
||||
|
||||
Design, monitor and maintain security controls, networks, and systems to help prevent cyberattacks
|
||||
|
||||
### Responsibilities
|
||||
|
||||
- Testing and screening security measures across software
|
||||
- Monitor networks and reports to update systems and mitigate vulnerabilities
|
||||
- Identify and implement systems needed for optimal security
|
||||
|
||||
## Incident Responder
|
||||
|
||||
Identifies and mitigates attacks whilst an attackers operations are still unfolding
|
||||
|
||||
### Responsibilities
|
||||
|
||||
- Developing and adopting a thorough, actionable incident response plan
|
||||
- Maintaining strong security best practices and supporting incident response measures
|
||||
- Post-incident reporting and preparation for future attacks, considering learnings and adaptations to take from incidents
|
||||
|
||||
## Digital Forensics Examiner
|
||||
|
||||
Responsible for using digital forensics to investigate incidents and crimes
|
||||
|
||||
### Responsibilities
|
||||
|
||||
- Collect digital evidence while observing legal procedures
|
||||
- Analyze digital evidence to find answers related to the case
|
||||
- Document your findings and report on the case
|
||||
|
||||
## Malware Analyst
|
||||
|
||||
Analyzes all types of malware to learn more about how they work and what they do
|
||||
|
||||
### Responsibilities
|
||||
|
||||
- Carry out static analysis of malicious programs, which entails reverse-engineering
|
||||
- Conduct dynamic analysis of malware samples by observing their activities in a controlled environment
|
||||
- Document and report all the findings
|
||||
|
||||
|
||||
## Penetration Tester
|
||||
|
||||
Responsible for testing technology products for security loopholes
|
||||
|
||||
### Responsibilities
|
||||
|
||||
- Conduct tests on computer systems, networks, and web-based applications
|
||||
- Perform security assessments, audits, and analyze policies
|
||||
- Evaluate and report on insights, recommending actions for attack prevention
|
||||
|
||||
|
||||
## Red Teamer
|
||||
|
||||
Plays the role of an adversary, attacking an organization and providing feedback from an enemies perspective
|
||||
|
||||
### Responsibilities
|
||||
|
||||
- Emulate the role of threat actor to uncover exploitable vulnerabilities, maintain access and avoid detection
|
||||
- Assess organizations' security controls, threat intelligence, and incident response procedures
|
||||
- Evaluate and report on insights, with actionable data for companies to avoid real-world instances
|
||||
Reference in New Issue
Block a user