Files
notes/areas/CyberSec/tryhackme-careers-in-cyber.md
2025-02-08 21:56:24 +01:00

78 lines
2.8 KiB
Markdown

## Intro
Why get a career in cyber:
- High Pay - jobs in security have high starting salaries
- Exciting - work can include legally hacking systems or defending against cyber attacks
- Be in demand - there are over 3.5 million unfilled cyber positions
## Security Analyst
Responsible for maintaining the security of an organization's data
### Responsibilities
- Working with various stakeholders to analyze the cyber security throughout the company
- Compile ongoing reports about the safety of networks, documenting security issues and measures taken in response
- Develop security plans, incorporating research on new attack tools and trends, and measures needed across teams to maintain data security
## Security Engineer
Design, monitor and maintain security controls, networks, and systems to help prevent cyberattacks
### Responsibilities
- Testing and screening security measures across software
- Monitor networks and reports to update systems and mitigate vulnerabilities
- Identify and implement systems needed for optimal security
## Incident Responder
Identifies and mitigates attacks whilst an attackers operations are still unfolding
### Responsibilities
- Developing and adopting a thorough, actionable incident response plan
- Maintaining strong security best practices and supporting incident response measures
- Post-incident reporting and preparation for future attacks, considering learnings and adaptations to take from incidents
## Digital Forensics Examiner
Responsible for using digital forensics to investigate incidents and crimes
### Responsibilities
- Collect digital evidence while observing legal procedures
- Analyze digital evidence to find answers related to the case
- Document your findings and report on the case
## Malware Analyst
Analyzes all types of malware to learn more about how they work and what they do
### Responsibilities
- Carry out static analysis of malicious programs, which entails reverse-engineering
- Conduct dynamic analysis of malware samples by observing their activities in a controlled environment
- Document and report all the findings
## Penetration Tester
Responsible for testing technology products for security loopholes
### Responsibilities
- Conduct tests on computer systems, networks, and web-based applications
- Perform security assessments, audits, and analyze policies
- Evaluate and report on insights, recommending actions for attack prevention
## Red Teamer
Plays the role of an adversary, attacking an organization and providing feedback from an enemies perspective
### Responsibilities
- Emulate the role of threat actor to uncover exploitable vulnerabilities, maintain access and avoid detection
- Assess organizations' security controls, threat intelligence, and incident response procedures
- Evaluate and report on insights, with actionable data for companies to avoid real-world instances