Career Paths In Cybersecurity

Similar documents
ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018

UPDATED: 10/17/16. Senior Level. Senior Specialty Threat, Consultant, Engineer, Manager. Mid Level Analyst

Security. Protect your business from security threats with Pearl Technology. The Connection That Matters Most

Playing Security Poker I match your degree and raise you by a certification or 2 Grumpy Old Security Men What s up Cert?

SECURITY+ COMPETITIVE ANALYSIS 1. GIAC GSEC 2. (ISC)2 SSCP 3. EC-COUNCIL CEH

Cyber Security Advanced Education: Preparing the Emerging Workforce

Building new cybersecurity pipelines. NICE Conference 2017 November 8, Strengthening Cyber Workforce Development sans.

What is the CISSP? Certified Ethical Hacker v8 or higher Certified Forensic Computer Examiner (CFCE) Certified Fraud Examiner (CFE)

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security

Mohammad Shahadat Hossain

CERTIFICATION TRAINING - ISC2

Advanced Knowledge & Learning

Spillemyndigheden s requirements for accredited testing organisations. Version of 1 July 2012

UK Permanent Salary Index November 2013 Based on registered vacancies and actual placements

HITRUST CSF Assurance Program HITRUST, Frisco, TX. All Rights Reserved.

Developing Career-Relevant Academic Programs

BHConsulting. Your trusted cybersecurity partner

Immersion Academy Annual Report 2018

Cyber Risks in the Boardroom Conference

CyberVista Certify cybervista.net

BRING EXPERT TRAINING TO YOUR WORKPLACE.

Keeping Your SOCs Full. May 26, Strengthening Capacity in Cyber Talent sans.org/cybertalent

Cybersecurity Employment SecureNinja

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

Ingram Micro Cyber Security Portfolio

Hidden Figures: Women in Cybersecurity

BHConsulting. Your trusted cybersecurity partner

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

2017 PORT SECURITY SEMINAR & EXPO. ISACA/CISM Information Security Management Training for Security Directors/Managers

itsm003 v.3.0 NISTCSF.COM NICE Training Curriculum & Workforce Planning Program

Unlocking Potential Through Learning

The fast track to top skills and top jobs in cyber. FREE TO TRANSITIONING VETERANS

Governance, Organisation, Law, Regulation and Standards Syllabus QAN 603/0855/2

Apprenticeships CYBER SECURITY HIGHER APPRENTICESHIP FROM IT TECHNICIAN TO SKILLED INFORMATION SECURITY PROFESSIONAL

Application for Certification

Balancing Compliance and Operational Security Demands. Nov 2015 Steve Winterfeld

CYBER APPRENTICESHIP. Dr Leigh Armistead, President

A United States Cyber Academy Program

Strengthening Capacity in Cyber Talent sans.org/cybertalent

Sense of Security. Compliance, Protection and Business Confidence

BUILD YOUR CYBERSECURITY SKILLS WITH TRASYS INTERNATIONAL

POSITION DESCRIPTION

CYBER APPRENTICESHIP. Dr. Leigh Armistead, President

Penetration Testing: How to Test What Matters Most

Sage Data Security Services Directory

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction

Plenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m.

Reasons to Become CISSP Certified. Keith A. Watson, CISSP CERIAS

Cyber Security: It s all about TRUST

DIABLO VALLEY COLLEGE CATALOG

Digital Service Management (DSM)

Indicate whether the statement is true or false.

Federal Virtual Training Environment (FedVTE) Pre-Approved for CompTIA CEUs

Build Your Cybersecurity Team: Create a Strong Cybersecurity Workforce Using Best Practices in Development

itsm003 v.3.0 DxCERTS IT & NIST Cybersecurity Digital Transformation (Dx) Enterprise Training Curriculum

SALARY $ $72.54 Hourly $3, $5, Biweekly $8, $12, Monthly $103, $150, Annually

2018 HIPAA One All Rights Reserved. Beyond HIPAA Compliance to Certification

Request for Proposal (RFP)

National Initiative for Cyber Education (NICE) and the Cybersecurity Workforce Framework: Attract and Retain the Best in InfoSec.

Cyber Security Occupations. in San Diego County

EU General Data Protection Regulation (GDPR) Achieving compliance

INTELLIGENT INFORMATION SECURITY. Optimizing Your Information Security Investments. We Know Security. We Know Compliance. Let Our Expertise Be Yours.

Strengthening Cybersecurity Workforce Development December 2017

HCISPP HealthCare Information Security and Privacy Practitioner

Why the Security Workforce Needs More Women and Men

Performing a Vendor Security Review TCTC 2017 FALL EVENT PRESENTER: KATIE MCINTOSH

Risk Advisory Academy Training Brochure

Management Update: Information Security Risk Best Practices

Val-EdTM. Valiant Technologies Education & Training Services. Workshop for CISM aspirants. All Trademarks and Copyrights recognized.

The National Initiative for Cybersecurity Education (NICE) The NICE Workforce Framework, NIST SP , Overview October 4, 2017

Wolfpack Cyber Academy Training Catalogue

CYBER SECURITY TRAINING

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions

EC-Council - EC-Council Certified Security Analyst (ECSA) v8

Operationalizing Cybersecurity in Healthcare IT Security & Risk Management Study Quantitative and Qualitative Research Program Results

Operations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ

Position Description IT Auditor

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

Building the Cybersecurity Workforce. November 2017

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY

locuz.com SOC Services

CIT 480: Securing Computer Systems. Putting It All Together

Developing the Next Generation Cyber Army VINCENT NESTLER, PH. D., CALIFORNIA STATE UNIVERSITY, SAN BERNARDINO

Certifications Part Two: Security Certifications By Shawn Conaway

itsm003 v.3.0 DxCERTS IT & NIST Cybersecurity Workforce Development Training Curriculum & Management Program

Cyber, Information Security, and Data Protection

The fast track to top skills and top jobs in cyber. Guaranteed.

Digital Service Management (DSM)

PCI Compliance Simplified A Case of Airport Parking System PCI Readiness

Certified Information Security Manager (CISM) Course Overview

Sirius Security Overview

Hearing Voices: The Cybersecurity Pro s View of the Profession

SRM Service Guide. Smart Security. Smart Compliance. Service Guide

Cyber Security School

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions

CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD

Certified Cyber Security Specialist

itsm003 v.3.0 NISTCSF.COM Role-Based IT & NIST Cybersecurity Curriculum Solutions

A New Cyber Defense Management Regulation. Ophir Zilbiger, CRISC, CISSP SECOZ CEO

Leadership. 25 years leading in cyber. 165,000 trained since ,000+ students annually

Transcription:

Career Paths In Cybersecurity

Introductions Rob Ashcraft Sr. Technical Advisor 26-yrs in Information Technology 14-yrs in Information Security Held positions as Technician, IT Management, IT Sales Double Major: Computer Science / Mathematics

Work Hard, Play Hard!

Why Information Security? 1. According to CIO Magazine, experts in cybersecurity are among the most sought-after professionals in the tech sector, with demand for workers in that field outpacing other IT jobs by a wide margin. 2. Recent report cites The demand for Information Security professionals has grown 350% faster than any other position in IT. 3. There is a war going out there! - The need for strong information security in organizations is paramount 4. Show me da money - U.S. security professionals to be $116,000, or approximately $55 per hour. That's nearly three times the national median income for full-time wage and salary workers, according to the Bureau of Labor Statistics.

Why Information Security? We turn this into this!

Career Paths Within Information Security 1. Administration / Engineering 2. Audit / Risk Management 3. Forensics / Ethical Hacking 4. Management 5. Pre-Sales Engineering & Account Management

Security Administration & Engineering Plans, coordinates, and monitors systems for the physical and electronic protection of data; Identifies and resolves security threats. Knowing how computers operate on the network Understanding the communication side of a network Computer Science & Security education / experience Network Admin / Engineering experience Positions Security Specialist Information Security Analyst Data Security Analyst Cloud Engineers & Architects

Audit / Risk Management Conducts methodical examinations of an organization s systems, platforms, and operating procedures to determine the security of its technical, physical, and administrative controls for best practices and compliance These are MANDATORY assessments Have gained specialized training HIPAA, PCI, GLBA, FERPA, NERC-SIP, Understanding of frameworks, COBIT, NIST, ISO 27001, HI-Trust How does an audit list contrast to controls and policies in place Data Governance - Policy Dev and Enforcement Positions IT Auditor / Internal Audit Privacy Officer Compliance Officer PCI Assessor (QSA)

Forensics & Ethical Hacking Proactively finding vulnerabilities to strengthen security posture and/or extracts computer information for prosecuting cyber crime and improving data security of an organization. Good understanding how data transmit over network How data is stored How data is processed Coding vulnerabilities Assessing damage from breach Positions Security Analysts / Consultant Forensics Analysts / Consultant Penetration Tester / Ethical Hacker Incident Responder Expert Witness

Security Management Management Oversees the development and supervision of controls required to ensure an organization is effectively managing digital risks Team Leads Multiple Projects and Multiple People at a time Understanding the needs of client and appropriating the proper resources Positions Team Lead / Supervisor Project Lead Project Manager Security Officer / ISO Director of Security CISO

Pre-Sales Engineering & Account Management A lucrative and challenging career in working with organizations to understand their needs for information security and compliance and ability to map your services and products to their needs Technical background Good people skills Good organizational skills Success driven Positions Pre-Sales Engineer Account Manager Account Executive Sales Management

What Are Hiring Managers Looking For? Education / Certifications Technical Experience Real Knowledge / Aptitude Outside resources and personal initiatives to learn Communication Skills Written Skills Perceived Work Ethic Perceived Professionalism Perceived Dependability Passion

First-Rate Resume(s) Online Job Boards Networking Research & Cold Call Follow-up Be Creative & Stand Out Practice Your Interview Getting The Gig

Never Stop Learning! GIAC Penetration Tester (GPEN) GIAC Assessing and Auditing Wireless Networks (GAWN) GIAC Web Application Penetration Tester (GWAPT) GIAC Certified Forensic Analyst (GCFA) Offensive Security Certified Professional (OSCP) GIAC Penetration Tester (GPEN) GIAC Web Application Penetration Tester (GWAPT) CREST Registered Penetration Tester (CRT Pen) GIAC Certified Incident Handler (GCIH) GIAC Certified Forensic Analyst (GCFA) GIAC Penetration Tester (GPEN) ISFCE Certified Computer Examiner (CCE) GIAC Web Application Penetration Tester (GWAPT) Comptia Security + Comptia Network + Certified Virtualization Expert 4.1 (CVE 4.1) Payment Card Industry (PCI) Qulified Security Assessor (QSA) GIAC Security Essentials (GSEC) GIAC Certified Incident Handler (GCIH) Project Management Professional (PMP) (ISC)2 Certified Information Systems Security Professional (CISSP) (ISC)2 Health Care Information Security & Privacy Practioner (HCISSP) Payment Care Industry Qualified Security Assessor (QSA) ISACA Certified Information Systems Manager (CISM) (ISC)2 Systems Security Certified Practitioner (SSCP) CWSP Certified Wireless Security Professional EC-Council Certified Ethical Hacker EC-Council Certified Security Analyst

Golden Rules 1. Work harder than everyone! 2. Show up early, stay late when needed 3. Enjoy a challenge & be flexible 4. Look for ways to improve (learn from failure) 5. Be teachable 6. Have a spirit of excellence 7. Have a optimistic & positive attitude 8. Align yourself with the Alphas (find good mentors) 9. Be grateful, not a complainer 10. Be a good negotiator 11. Continue Your Education (NEVER STOP LEARNING!)

Thank you for your time!