Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision Next revisionBoth sides next revision | ||
career:start [2021/09/04 00:43] – seb | career:start [2021/09/04 01:24] – seb | ||
---|---|---|---|
Line 4: | Line 4: | ||
-> [[career/ | -> [[career/ | ||
- | ===== Cybersecurity Roles ===== | + | And while all the various roles will require different skills, |
- | Roles can be categorized by disciplines and can vary in the degree of specialization. Depending on the size of a Cybersecurity Program and the maturity of its operation | + | |
- | ==== Cybersecurity | + | -> [[career/ |
- | === Digital Forensics & Incident Response (DFIR) === | + | Now, let’s talk about how you get your first cybersecurity |
- | This team is also known as **Computer Systems Incident Response Team (CSIRT)**. It's team members strive to fully contain any size of cybersecurity incident and eradicate any threat from your systems and networks. It also provides forensics for any kind of cybersecurity | + | |
- | * Forensics Analyst/ | + | |
- | * Reverse Engineer | + | |
- | * Incident Responder | + | |
- | * Incident Commander/ | + | |
- | === Security Operations Center (SOC) === | + | -> [[career/firstjob|Getting your first Cybersecurity |
- | The SOC is the team that watches alerts, investigates them, and responds to them by either escalating to DFIR/CSIRT or by issuing pre-defined/ | + | |
- | * SOC Analyst (L1/ | + | |
- | * SOC Lead | + | |
- | * SOC Manager/ | + | |
- | * SOAR Engineer/ | + | |
- | * Threat Intelligence Analyst (Threat Intelligence often ends up being its own team) | + | |
- | + | ||
- | === Security Engineering === | + | |
- | The Security Engineering Team is usually closest to the IT Infrastructure team. Often the team members have worked in IT Infrastructure at some point during their career. This team usually maintains the security tool set. This team also performs security architecture reviews (aka Threat Modelling) for other IT teams. This team is often the starting point for a Cybersecurity program. Here are some roles within this team: | + | |
- | * Security Engineer | + | |
- | * Security Architect | + | |
- | * Security Manager | + | |
- | * Security Director | + | |
- | + | ||
- | ==== Governance, Risk, Compliance (GRC) ==== | + | |
- | In this space you find the paper generating strategists of the cybersecurity profession. Here are some roles you typically find in GRC type teams: | + | |
- | * Fraud Analyst | + | |
- | * Auditor | + | |
- | * Audit/ | + | |
- | * (Enterprise) Risk Manager | + | |
- | * (Compliance/ | + | |
- | * Privacy Manager/ | + | |
- | * Chief Privacy Officer (CPO) - This person does not always report to the CISO (It might belong to the Legal team instead.) | + | |
- | + | ||
- | ==== Product Security ==== | + | |
- | In an organization that produces digital services and goods, there is usually a team responsible for the security of its products. Depending on the product you would need some of the roles from this list: | + | |
- | * Software Security Engineer/ | + | |
- | * Hardware Security Engineer/ | + | |
- | * Cryptographer | + | |
- | * Code Auditor | + | |
- | + | ||
- | ==== Penetration Testing / Red Team ==== | + | |
- | This team specializes in testing the security posture of the org with the goal to provide valuable insight into present vulnerabilities and weak configurations. Here are some roles within such a team: | + | |
- | * Penetration Tester | + | |
- | * Penetration Testing Lead | + | |
- | * Exploit Coder (writes exploit code for a given vulnerability) | + | |
- | * Code Tester/ | + | |
- | + | ||
- | ==== Chief Information Security Officer (CISO) ==== | + | |
- | The BOSS of it all. This person gets to translate the complicated matters of cybersecurity to the C-Level and the Board of Directors. This person also acquires and manages budget and headcount. Defines overall Cybersecurity Program and comes up with Vision, Roadmaps and other strategic things. Needs Monk-like ZEN abilities. | + | |
- | + | ||
- | ===== Online Resources ===== | + | |
- | * [[https:// | + | |
- | * [[https:// | + | |
- | * [[https:// | + | |
- | * [[https:// | + | |
- | * [[https:// | + |