Which ones match your abilities and interests?
Analyzes how intruders breach infrastructure in order to identify additional systems networks that have been compromised. Want to see the face of your enemy behind bars? It’s a thrill like no other – being pitted against the mind of the criminal and having to reconstruct his lawless path.
This expert contributes an integral piece to the company’s software development life cycle. Expect to do everything from developing code to reverse engineering binaries to examining network traffic.
Understands business needs as well as technology and environmental conditions and can translate them into a security design that allows the organization to efficiently carry out its activities while minimizing risk. Like the captain of a ship, this is the individual who makes or breaks actual systems, protocols, and applications.
Includes both sworn law enforcement officers and civilian employees. Entrusted with the preservation, acquisition, storage, detailed analysis, and clear reporting of digital evidence from many sources: almost every contemporary crime has a digital footprint.
Government attorney who guides law enforcement investigations into computer crimes and represents the state in lawsuits against defendants accused of technology crime.
Finds security vulnerabilities in target systems, networks, and applications in order to help enterprises improve their security. When things go wrong, this is the person whom we all need to ask for help.
Focuses on collecting and analyzing data from computer systems to track user-based activity that could be used internally or in civil / criminal litigation. This job requires the analyst to “go deep” into a system, find out what went wrong, what’s still wrong, and trace it to the perpetrators and recommend fixes.
Examines malicious software to understand the nature of the threat. This usually involves reverse-engineering the compiled executable to figure out how the program interacts with its environment.
This expert has to be a strong support for the Chief Information Security Officer (CISO) by succeeding at the famous People – Process – Technology triangle. You have the enviable role of technology focus, but never forget people and process.
Designs, implements, and manages a network so that proper security is built into the overall infrastructure. Understanding both network principles and security allows this person to build a robust network that provides proper functionality and the correct level of security. This is a common starting point for people who become “top guns” in cybersecurity.
When the security of a system or a network has been compromised, the incident responder is the first line defense during the breach. You have to be technically astute and able to handle stress under fire.
Connects legal, regulatory, and local organizational requirements with risk taking, financial constraints, and technological adoption. You have the creative direction to influence and directly contribute to the overall security of an organization. You are the senior security player.
Researches and analyzes security threats that may affect a company’s assets, products, or technical specifications. These folks dig into the technical protocols and specifications for a greater understanding of security threats than most of their peers, identifying strategies to defend against attacks through intimate knowledge of the threats.
Entrusted with configuration, customization, and examination of output from security tools and software installed on the network. This cyber-warrior is on the front line and has to have nerves of steel and high intellect.
Makes the absolute declaration that an application or the OS the organization is using or considering using is safe or unsafe. You are providing proactive approaches to security, finding out how much damage and what type has been done in order to keep systems secure and up and running.
This expert is responsible for monitoring traffic, blocking unwanted traffic from and to the internet and dealing with attackers. Firewalls and IPS technology are the starting points for hardening the network against possible intrusion attempts.
Measures and reports on the risk to the organization by measuring compliance with policies, procedures, and standards. You find the holes and recommend patches to get the company safe.
You’re ultimately responsible for ensuring customer software is free from vulnerabilities that can be exploited by an attacker. This person leads all developers.
There's a critical shortage of cybersecurity professionals in the public and private sectors. Recently, the Department of Labor reported zero percent unemployment in information security jobs and a study by Cisco Systems reported those jobs were among the highest paying IT jobs.
If you are a teacher or school administrator, Cyber Aces is also a great way to introduce your students to cybersecurity. The three online course modules teach the fundamentals of cybersecurity in an easy to use, engaging way and help students discover and develop their interest and skills.
The SANS Cyber Aces curriculum was developed by the SANS Institute, the most trusted and the largest source for information security training and security certification in the world. Meet some of the leaders in the cybersecurity field who are behind the design and development of the online tutorials and quizzes.
SANS Cyber Aces Online makes available, free and online, selected courses from the professional development curriculum offered by The SANS Institute, the global leader in cyber security training.