78 lines
2.8 KiB
Markdown
78 lines
2.8 KiB
Markdown
## Intro
|
|
|
|
Why get a career in cyber:
|
|
- High Pay - jobs in security have high starting salaries
|
|
- Exciting - work can include legally hacking systems or defending against cyber attacks
|
|
- Be in demand - there are over 3.5 million unfilled cyber positions
|
|
|
|
## Security Analyst
|
|
|
|
Responsible for maintaining the security of an organization's data
|
|
|
|
### Responsibilities
|
|
|
|
- Working with various stakeholders to analyze the cyber security throughout the company
|
|
- Compile ongoing reports about the safety of networks, documenting security issues and measures taken in response
|
|
- Develop security plans, incorporating research on new attack tools and trends, and measures needed across teams to maintain data security
|
|
|
|
## Security Engineer
|
|
|
|
Design, monitor and maintain security controls, networks, and systems to help prevent cyberattacks
|
|
|
|
### Responsibilities
|
|
|
|
- Testing and screening security measures across software
|
|
- Monitor networks and reports to update systems and mitigate vulnerabilities
|
|
- Identify and implement systems needed for optimal security
|
|
|
|
## Incident Responder
|
|
|
|
Identifies and mitigates attacks whilst an attackers operations are still unfolding
|
|
|
|
### Responsibilities
|
|
|
|
- Developing and adopting a thorough, actionable incident response plan
|
|
- Maintaining strong security best practices and supporting incident response measures
|
|
- Post-incident reporting and preparation for future attacks, considering learnings and adaptations to take from incidents
|
|
|
|
## Digital Forensics Examiner
|
|
|
|
Responsible for using digital forensics to investigate incidents and crimes
|
|
|
|
### Responsibilities
|
|
|
|
- Collect digital evidence while observing legal procedures
|
|
- Analyze digital evidence to find answers related to the case
|
|
- Document your findings and report on the case
|
|
|
|
## Malware Analyst
|
|
|
|
Analyzes all types of malware to learn more about how they work and what they do
|
|
|
|
### Responsibilities
|
|
|
|
- Carry out static analysis of malicious programs, which entails reverse-engineering
|
|
- Conduct dynamic analysis of malware samples by observing their activities in a controlled environment
|
|
- Document and report all the findings
|
|
|
|
|
|
## Penetration Tester
|
|
|
|
Responsible for testing technology products for security loopholes
|
|
|
|
### Responsibilities
|
|
|
|
- Conduct tests on computer systems, networks, and web-based applications
|
|
- Perform security assessments, audits, and analyze policies
|
|
- Evaluate and report on insights, recommending actions for attack prevention
|
|
|
|
|
|
## Red Teamer
|
|
|
|
Plays the role of an adversary, attacking an organization and providing feedback from an enemies perspective
|
|
|
|
### Responsibilities
|
|
|
|
- Emulate the role of threat actor to uncover exploitable vulnerabilities, maintain access and avoid detection
|
|
- Assess organizations' security controls, threat intelligence, and incident response procedures
|
|
- Evaluate and report on insights, with actionable data for companies to avoid real-world instances |