Careers in Cyber
Introduction
- Cyber security careers are becoming more in demand and offer high salaries.
-
There are many different jobs within the security industry, from offensive pentesting (hacking machines and reporting on vulnerabilities) to defensive security (defending against and investigating cyberattacks).
- Why get a career in cyber:
- High Pay - jobs in security have high starting salaries
- Exciting - work can include legally hacking systems or defending against cyber attacks
- Be in demand - there are over 3.5 million unfilled cyber positions
Security Analyst
- Security analysts are integral to constructing security measures across organisations to protect the company from attacks.
- Analysts explore and evaluate company networks to uncover actionable data and recommendations for engineers to develop preventative measures.
- This job role requires working with various stakeholders to gain an understanding of security requirements and the security landscape.
Responsibilities
- Working with various stakeholders to analyse the cyber security throughout the company
- Compile ongoing reports about the safety of networks, documenting security issues and measures taken in response
- Develop security plans, incorporating research on new attack tools and trends, and measures needed across teams to maintain data security.
Learning Paths
-
TryHackMe’s learning paths will give you both the fundamental technical knowledge and hands-on experience, which is crucial to becoming a successful Security Analyst.
- Pre Security
- Cyber Defense
Security Engineer
- Security engineers develop and implement security solutions using threats and vulnerability data - often sourced from members of the security workforce.
- Security engineers work across circumventing a breadth of attacks, including web application attacks, network threats, and evolving trends and tactics.
- The ultimate goal is to retain and adopt security measures to mitigate the risk of attack and data loss.
Responsibilities
- Testing and screening security measures across software
- Monitor networks and reports to update systems and mitigate vulnerabilities
- Identify and implement systems needed for optimal security
Learning Paths
-
TryHackMe’s learning paths will give you both the fundamental technical knowledge and hands-on experience, which is crucial to becoming a successful Security Engineer.
- Cyber Defense
- JR Penetration Tester
- Offensive Pentesting
Incident Responder
- Incident responders respond productively and efficiently to security breaches.
- Responsibilities include creating plans, policies, and protocols for organisations to enact during and following incidents.
- This is often a highly pressurised position with assessments and responses required in real-time, as attacks are unfolding.
- Incident response metrics include MTTD, MTTA, and MTTR - the meantime to detect, acknowledge, and recover (from attacks.)
- The aim is to achieve a swift and effective response, retain financial standing and avoid negative breach implications.
- Ultimately, incident responders protect the company’s data, reputation, and financial standing from cyber attacks.
Responsibilities
- Developing and adopting a thorough, actionable incident response plan
- Maintaining strong security best practices and supporting incident response measures
- Post-incident reporting and preparation for future attacks, considering learnings and adaptations to take from incidents
Learning Paths
-
TryHackMe’s learning paths will give you both the fundamental technical knowledge and hands-on experience, which is crucial to becoming a successful Incident Responder.
Digital Forensics Examiner
- If you like to play detective, this might be the perfect job.
- If you are working as part of a law-enforcement department, you would be focused on collecting and analysing evidence to help solve crimes: charging the guilty and exonerating the innocent.
- On the other hand, if your work falls under defending a company’s network, you will be using your forensic skills to analyse incidents, such as policy violations.
Responsibilities
- Collect digital evidence while observing legal procedures
- Analyse digital evidence to find answers related to the case
- Document your findings and report on the case
Malware Analyst
- A malware analyst’s work involves analysing suspicious programs, discovering what they do and writing reports about their findings.
- A malware analyst is sometimes called a reverse-engineer as their core task revolves around converting compiled programs from machine language to readable code, usually in a low-level language.
- This work requires the malware analyst to have a strong programming background, especially in low-level languages such as assembly language and C language.
- The ultimate goal is to learn about all the activities that a malicious program carries out, find out how to detect it and report it.
Responsibilities
- Carry out static analysis of malicious programs, which entails reverse-engineering
- Conduct dynamic analysis of malware samples by observing their activities in a controlled environment
- Document and report all the findings
Penetration Tester
- You may see penetration testing referred to as pentesting and ethical hacking.
- A penetration tester’s job role is to test the security of the systems and software within a company - this is achieved through attempts to uncover flaws and vulnerabilities through systemised hacking.
- Penetration testers exploit these vulnerabilities to evaluate the risk in each instance. The company can then take these insights to rectify issues to prevent a real-world cyberattack.
Responsibilities
- Conduct tests on computer systems, networks, and web-based applications
- Perform security assessments, audits, and analyse policies
- Evaluate and report on insights, recommending actions for attack prevention
Learning Paths
-
TryHackMe’s learning paths will give you both the fundamental technical knowledge and hands-on experience, which is crucial to becoming a successful Penetration Tester.
- JR Penetration Tester
- Offensive Pentesting
Red Teamer
- Red teamers share similarities to penetration testers, with a more targeted job role.
- Penetration testers look to uncover many vulnerabilities across systems to keep cyber-defence in good standing, whilst red teamers are enacted to test the company’s detection and response capabilities.
- This job role requires imitating cyber criminals’ actions, emulating malicious attacks, retaining access, and avoiding detection.
- Red team assessments can run for up to a month, typically by a team external to the company.
- They are often best suited to organisations with mature security programs in place.
Responsibilities
- Emulate the role of a threat actor to uncover exploitable vulnerabilities, maintain access and avoid detection
- Assess organisations’ security controls, threat intelligence, and incident response procedures
- Evaluate and report on insights, with actionable data for companies to avoid real-world instances
Learning Paths
-
TryHackMe’s learning paths will give you both the fundamental technical knowledge and hands-on experience, which is crucial to becoming a successful Red Teamer.
- JR Penetration Tester
- Offensive Pentesting
- Red Teamer