Files
notes/areas/CyberSec/tryhackme-careers-in-cyber.md
2025-02-08 21:56:24 +01:00

2.8 KiB

Intro

Why get a career in cyber:

  • High Pay - jobs in security have high starting salaries
  • Exciting - work can include legally hacking systems or defending against cyber attacks
  • Be in demand - there are over 3.5 million unfilled cyber positions

Security Analyst

Responsible for maintaining the security of an organization's data

Responsibilities

  • Working with various stakeholders to analyze the cyber security throughout the company
  • Compile ongoing reports about the safety of networks, documenting security issues and measures taken in response
  • Develop security plans, incorporating research on new attack tools and trends, and measures needed across teams to maintain data security

Security Engineer

Design, monitor and maintain security controls, networks, and systems to help prevent cyberattacks

Responsibilities

  • Testing and screening security measures across software
  • Monitor networks and reports to update systems and mitigate vulnerabilities
  • Identify and implement systems needed for optimal security

Incident Responder

Identifies and mitigates attacks whilst an attackers operations are still unfolding

Responsibilities

  • Developing and adopting a thorough, actionable incident response plan
  • Maintaining strong security best practices and supporting incident response measures
  • Post-incident reporting and preparation for future attacks, considering learnings and adaptations to take from incidents

Digital Forensics Examiner

Responsible for using digital forensics to investigate incidents and crimes

Responsibilities

  • Collect digital evidence while observing legal procedures
  • Analyze digital evidence to find answers related to the case
  • Document your findings and report on the case

Malware Analyst

Analyzes all types of malware to learn more about how they work and what they do

Responsibilities

  • Carry out static analysis of malicious programs, which entails reverse-engineering
  • Conduct dynamic analysis of malware samples by observing their activities in a controlled environment
  • Document and report all the findings

Penetration Tester

Responsible for testing technology products for security loopholes

Responsibilities

  • Conduct tests on computer systems, networks, and web-based applications
  • Perform security assessments, audits, and analyze policies
  • Evaluate and report on insights, recommending actions for attack prevention

Red Teamer

Plays the role of an adversary, attacking an organization and providing feedback from an enemies perspective

Responsibilities

  • Emulate the role of threat actor to uncover exploitable vulnerabilities, maintain access and avoid detection
  • Assess organizations' security controls, threat intelligence, and incident response procedures
  • Evaluate and report on insights, with actionable data for companies to avoid real-world instances