Page 15 -
P. 15
internships. See networking and internships about, 21
Intrusion Detection Systems, 74 earnings of
Irvine, John cyber incident responders, 39
on high turnover rate in digital forensics investigation, 47 data privacy attorneys, 54–55
on internships and mentors, 45 information security architects, 21
on job description of digital forensics investigators, 43 security auditors, 63
on personal skills of digital forensics investigators, 45–46 penetration testing, 25
ISACA, 23–24, 60, 66 personal skills and qualities
ISO/IEC 27001 certification, 59 cryptologists, 67, 70
ISO/IEC 27001 Lead Auditor certification, 61 cyber incident responders, 33, 36–37
IT Governance (website), 59 data privacy attorneys, 50, 53
digital forensics investigators, 42, 45–46
job descriptions ethical hackers, 25, 28
cryptologists, 67–68, 71 information security analysts, 8, 12
cyber incident responders, 33–35, 37, 38–39 information security architects, 16, 19–20, 75–76
data privacy attorneys, 50–51, 54 security auditors, 58, 62
digital forensics investigators, 42–44, 46, 47 picoCTF, 32
ethical hackers, 17, 25–26, 29 PricewaterhouseCoopers, 5
information security analysts, 8–10, 12–13 privacy law specialists, 52
information security architects, 16–17, 19, 21, 74–75
security auditors, 58–59, 63 Rabinowitz, Peter A., 53
job outlook, 7 Redlinger, Tony, 62
cryptologists, 67, 72–73 red team testers, 20, 29
cyber incident responders, 33, 40 See also ethical hackers
data privacy attorneys, 50, 55–56 Rivera, Fatima, 17
digital forensics investigators, 42, 48 r00tz Asylum, 28, 31
ethical hackers, 25, 30–31
information security analysts, 8, 14 Sanchez, Tony, 8, 14
information security architects, 16, 22–23 SANS Institute
security auditors, 58, 64–65 information about, 15, 24, 41
Johnson, Mark, 43 size of companies with cyber incident responders,
38
Kimmel, Chris, 42 Schlemmer, Jason, 12
security auditors
Lamb, Charles, 74 advancement opportunities, 64
Lawyer (website), 54, 55 basic facts about, 58
licensing. See certification and licensing certification and licensing, 60–61
Lifehacker (blog), 26, 38–39 earnings, 63
educational requirements, 60
Magarasevic, Jelena, 18, 20 employers, 62–63
mentors information sources, 65–66
for cyber incident responders, 36 job description, 58–59, 61, 63
for digital forensics investigators, 45 job outlook, 64–65
for information security architects, 19, 76 personal skills and qualities, 62
Meyers, John, 35 volunteering and internships, 61
Miller, Ben, 26, 38–39 security operations centers (SOCs), 38
minorities, in cybersecurity workforce, 13, 21 Sherman, Rob, 34, 36, 38
MIS Training Institute, 66 Sokanu (career-matching platform), 60
Mitchell, Tenisha, 36 Solove, Daniel, 53
Steinwandt, Rainer, 72
National Association for Law Placement, 57
National Cryptologic Museum, 73 Taylor, Roger, 74
networking and internships Times of India (website), 68
cryptologists, 70 Trigo, Clifford, 30
cyber incident responders, 36
data privacy attorneys, 53 U.S. News & World Report (magazine), 14
digital forensics investigators, 45
ethical hackers, 27–28 Vincent, Peter, 22
information security analysts, 11 volunteer work. See networking and internships
information security architects, 18–19, 76
security auditors, 61 Watson, Aaron, 47
Norris, Kate, 51 Westman, Shelley, 22, 55
Wheeler, Tom, 4
Occupational Outlook Handbook (Bureau of Labor Statistics), white hat hackers. See ethical hackers
77 women, in cybersecurity workforce, 13, 21
Offensive Security, 32 Women’s Society of Cyberjutsu, 15
Offensive Security Certified Professional (OSCP) certification,
27 Yahoo!, 4
Ostrowski, Steven, 13 Yeo, John, 26
PayScale Zinghini, Frank, 7
80