Cybersecurity Careers - page 15

80
internships.
See
networking and internships
Intrusion Detection Systems, 74
Irvine, John
on high turnover rate in digital forensics investigation, 47
on internships and mentors, 45
on job description of digital forensics investigators, 43
on personal skills of digital forensics investigators, 45–46
ISACA, 23–24, 60, 66
ISO/IEC 27001 certification, 59
ISO/IEC 27001 Lead Auditor certification, 61
IT Governance (website), 59
job descriptions
cryptologists, 67–68, 71
cyber incident responders, 33–35,
37,
38–39
data privacy attorneys, 50–51, 54
digital forensics investigators, 42–44,
46,
47
ethical hackers, 17, 25–26, 29
information security analysts, 8–10, 12–13
information security architects, 16–17,
19,
21, 74–75
security auditors, 58–59, 63
job outlook, 7
cryptologists, 67, 72–73
cyber incident responders, 33, 40
data privacy attorneys, 50, 55–56
digital forensics investigators, 42, 48
ethical hackers, 25, 30–31
information security analysts, 8, 14
information security architects, 16, 22–23
security auditors, 58, 64–65
Johnson, Mark, 43
Kimmel, Chris, 42
Lamb, Charles, 74
Lawyer
(website), 54, 55
licensing.
See
certification and licensing
Lifehacker
(blog), 26, 38–39
Magarasevic, Jelena, 18, 20
mentors
for cyber incident responders, 36
for digital forensics investigators, 45
for information security architects, 19, 76
Meyers, John, 35
Miller, Ben, 26, 38–39
minorities, in cybersecurity workforce, 13, 21
MIS Training Institute, 66
Mitchell, Tenisha, 36
National Association for Law Placement, 57
National Cryptologic Museum, 73
networking and internships
cryptologists, 70
cyber incident responders, 36
data privacy attorneys, 53
digital forensics investigators, 45
ethical hackers, 27–28
information security analysts, 11
information security architects, 18–19, 76
security auditors, 61
Norris, Kate, 51
Occupational Outlook Handbook
(Bureau of Labor Statistics),
77
Offensive Security, 32
Offensive Security Certified Professional (OSCP) certification,
27
Ostrowski, Steven, 13
PayScale
about, 21
earnings of
cyber incident responders, 39
data privacy attorneys, 54–55
information security architects, 21
security auditors, 63
penetration testing, 25
personal skills and qualities
cryptologists, 67, 70
cyber incident responders, 33, 36–37
data privacy attorneys, 50, 53
digital forensics investigators, 42, 45–46
ethical hackers, 25, 28
information security analysts, 8, 12
information security architects, 16, 19–20, 75–76
security auditors, 58, 62
picoCTF, 32
PricewaterhouseCoopers, 5
privacy law specialists, 52
Rabinowitz, Peter A., 53
Redlinger, Tony, 62
red team testers, 20, 29
See also
ethical hackers
Rivera, Fatima, 17
r00tz Asylum, 28, 31
Sanchez, Tony, 8, 14
SANS Institute
information about, 15, 24, 41
size of companies with cyber incident responders,
38
Schlemmer, Jason, 12
security auditors
advancement opportunities, 64
basic facts about, 58
certification and licensing, 60–61
earnings, 63
educational requirements, 60
employers, 62–63
information sources, 65–66
job description, 58–59,
61,
63
job outlook, 64–65
personal skills and qualities, 62
volunteering and internships, 61
security operations centers (SOCs), 38
Sherman, Rob, 34, 36, 38
Sokanu (career-matching platform), 60
Solove, Daniel, 53
Steinwandt, Rainer, 72
Taylor, Roger, 74
Times of India
(website), 68
Trigo, Clifford, 30
U.S. News & World Report
(magazine), 14
Vincent, Peter, 22
volunteer work.
See
networking and internships
Watson, Aaron, 47
Westman, Shelley, 22, 55
Wheeler, Tom, 4
white hat hackers.
See
ethical hackers
women, in cybersecurity workforce, 13, 21
Women’s Society of Cyberjutsu, 15
Yahoo!, 4
Yeo, John, 26
Zinghini, Frank, 7
1...,5,6,7,8,9,10,11,12,13,14 16
Powered by FlippingBook