2.8 KiB
2.8 KiB
Intro
Why get a career in cyber:
- High Pay - jobs in security have high starting salaries
- Exciting - work can include legally hacking systems or defending against cyber attacks
- Be in demand - there are over 3.5 million unfilled cyber positions
Security Analyst
Responsible for maintaining the security of an organization's data
Responsibilities
- Working with various stakeholders to analyze the cyber security throughout the company
- Compile ongoing reports about the safety of networks, documenting security issues and measures taken in response
- Develop security plans, incorporating research on new attack tools and trends, and measures needed across teams to maintain data security
Security Engineer
Design, monitor and maintain security controls, networks, and systems to help prevent cyberattacks
Responsibilities
- Testing and screening security measures across software
- Monitor networks and reports to update systems and mitigate vulnerabilities
- Identify and implement systems needed for optimal security
Incident Responder
Identifies and mitigates attacks whilst an attackers operations are still unfolding
Responsibilities
- Developing and adopting a thorough, actionable incident response plan
- Maintaining strong security best practices and supporting incident response measures
- Post-incident reporting and preparation for future attacks, considering learnings and adaptations to take from incidents
Digital Forensics Examiner
Responsible for using digital forensics to investigate incidents and crimes
Responsibilities
- Collect digital evidence while observing legal procedures
- Analyze digital evidence to find answers related to the case
- Document your findings and report on the case
Malware Analyst
Analyzes all types of malware to learn more about how they work and what they do
Responsibilities
- Carry out static analysis of malicious programs, which entails reverse-engineering
- Conduct dynamic analysis of malware samples by observing their activities in a controlled environment
- Document and report all the findings
Penetration Tester
Responsible for testing technology products for security loopholes
Responsibilities
- Conduct tests on computer systems, networks, and web-based applications
- Perform security assessments, audits, and analyze policies
- Evaluate and report on insights, recommending actions for attack prevention
Red Teamer
Plays the role of an adversary, attacking an organization and providing feedback from an enemies perspective
Responsibilities
- Emulate the role of threat actor to uncover exploitable vulnerabilities, maintain access and avoid detection
- Assess organizations' security controls, threat intelligence, and incident response procedures
- Evaluate and report on insights, with actionable data for companies to avoid real-world instances