## Intro Why get a career in cyber: - High Pay - jobs in security have high starting salaries - Exciting - work can include legally hacking systems or defending against cyber attacks - Be in demand - there are over 3.5 million unfilled cyber positions ## Security Analyst Responsible for maintaining the security of an organization's data ### Responsibilities - Working with various stakeholders to analyze the cyber security throughout the company - Compile ongoing reports about the safety of networks, documenting security issues and measures taken in response - Develop security plans, incorporating research on new attack tools and trends, and measures needed across teams to maintain data security ## Security Engineer Design, monitor and maintain security controls, networks, and systems to help prevent cyberattacks ### Responsibilities - Testing and screening security measures across software - Monitor networks and reports to update systems and mitigate vulnerabilities - Identify and implement systems needed for optimal security ## Incident Responder Identifies and mitigates attacks whilst an attackers operations are still unfolding ### Responsibilities - Developing and adopting a thorough, actionable incident response plan - Maintaining strong security best practices and supporting incident response measures - Post-incident reporting and preparation for future attacks, considering learnings and adaptations to take from incidents ## Digital Forensics Examiner Responsible for using digital forensics to investigate incidents and crimes ### Responsibilities - Collect digital evidence while observing legal procedures - Analyze digital evidence to find answers related to the case - Document your findings and report on the case ## Malware Analyst Analyzes all types of malware to learn more about how they work and what they do ### Responsibilities - Carry out static analysis of malicious programs, which entails reverse-engineering - Conduct dynamic analysis of malware samples by observing their activities in a controlled environment - Document and report all the findings ## Penetration Tester Responsible for testing technology products for security loopholes ### Responsibilities - Conduct tests on computer systems, networks, and web-based applications - Perform security assessments, audits, and analyze policies - Evaluate and report on insights, recommending actions for attack prevention ## Red Teamer Plays the role of an adversary, attacking an organization and providing feedback from an enemies perspective ### Responsibilities - Emulate the role of threat actor to uncover exploitable vulnerabilities, maintain access and avoid detection - Assess organizations' security controls, threat intelligence, and incident response procedures - Evaluate and report on insights, with actionable data for companies to avoid real-world instances