Cybersec Base #008:Careers in Cybersecurity| Required skills and Certifications

Jack had grown up watching movies and TV shows that portrayed hackers and cybersecurity professionals as dark, enigmatic people wearing hoods and tapping furiously on computers in darkly lit rooms. These pictures stayed with him throughout the years, and when he first heard of cybersecurity as a career choice, he couldn't help but think of those Hollywood depictions. Jack started to think that maybe he didn't have what it takes to be a cybersecurity professional. He didn't have a hoodie and certainly didn't know millions of commands. He began to doubt himself and his abilities. But one day, he came upon an article on Cyvally about cybersecurity career path. He learned there that cybersecurity is more than just hacking and typing quickly on a computer. It is about understanding how computer systems work, discovering weaknesses and dangers, devising countermeasures and implementing policies, processes and controls. Jack was inspired by their efforts to make the world a safer place for everyone. He recognized that to be a great cybersecurity Professional, he didn't have to wear a hoodie or write millions of commands. He just needed to be passionate, curious, and willing to learn.
Are you a "Jack"?
In this post, I discussed different careers in cybersecurity, required skills and certifications
Sit Back & Enjoy the Ride!!!
Different Team/Aspects in Cybersecurity
Cybersecurity is broken down into 3 teams; namely Offensive, Defensive and GRC Security
Offensive Security: you must have heard of the phrase "To beat a hacker, you need to behave like one". The technique of deliberately attacking and exploiting computer systems and networks in order to test their defenses and identify vulnerabilities is referred to as offensive security. It is also called the Red Team
Defensive security: refers to protecting computer systems and networks against attack by detecting and mitigating vulnerabilities and putting in place controls to prevent or detect unwanted access or activity. It is also called the Blue Team
GRC Security: The use of governance, risk management, and compliance (GRC) concepts to ensure the security of an organization's information and technological assets is referred to as GRC security. It entails putting in place policies, processes, and technology to manage risk, stay in compliance with rules and standards, and ensuring that the organization's security goals are in line with its broader objectives
Red Team
To test an organization's security defenses, a red team is a group of ethical hackers or security specialists that simulates cyberattacks on the organization's systems. The red team's objective is to help the organization strengthen its security posture by identifying vulnerabilities and flaws that may be exploited by an actual attacker.
Required Skills/Expertise
Knowledge of computer systems and networks
Knowledge of hacking tools and techniques
Programming skills
Knowledge of social engineering techniques
Penetration testing skills
Communication and reporting skills
Critical thinking and problem-solving skills
Understanding of industry standards and regulations
Interpersonal skills
Continuous learning
Certifications Required/Needed in Red Teaming
-
Entry/Intermediate Level | Expert Level |
GIAC Exploit Researcher and Advanced Penetration Tester (GXPN) | |
Career Paths in Red Teaming
Penetration Tester/Ethical Hacker - Conducts controlled hacking attempts to detect vulnerabilities in systems and networks and makes security recommendations.
Vulnerability Researcher/Bug Bounty Specialist: detects and exploits vulnerabilities before cyber criminals discover them, preventing widespread exploitation and assisting organizations in enhancing their security. They are compensated and recognized for reporting bugs, hence the word bug bounty..
Malware Analyst - Examines and reverse-engineers malware to determine and comprehend determine its behavior, purpose, and origin, and then develops detection and removal procedures.
Social Engineering Specialist - Tests an organization's sensitivity to phishing, pretexting, and other social engineering methods using social engineering methodologies.
Wireless Security Specialist - Simulates attacks and identifies vulnerabilities to test an organization's wireless network security defenses.
Web Application Security Specialist - Conducts simulated assaults and penetration testing to identify vulnerabilities in web applications.
Physical Security Specialist - Evaluates the physical security defenses of an organization, such as access controls, surveillance systems, and perimeter defenses.
Blue team
Blue Team monitors and respond to security problems in order to thwart cyberattacks. They are in charge of identifying and neutralizing security risks as well as creating and putting into effect security controls to fend against further attacks.
Required Skills/Expertise
Knowledge of technologies and security approach
Incident response skills
Security monitoring skills
Knowledge of security tools and techniques
Analytical and problem-solving skills
Knowledge of threat intelligence
Risk assessment and management
Communication and reporting skills
Compliance and regulatory knowledge
Familiarity with SIEM
Continuous learning
Certifications Required/Needed in Blue Teaming
Entry/Intermediate Level | Expert Level |
Cisco Certified Network Associate Cyber Operations (CCNA Cyber Ops) | |
Career Paths in Blue Teaming
Cybersecurity Analyst - Monitors and analyzes security events and occurrences, and responds to security threats in real time.
Incident Responder: responds to security incidents by determining the source of the attack, containing the issue, and recovering systems and data.
Forensic Analyst - Gathers and analyzes digital evidence connected to cyber incidents to determine the source of the attack, the offender, and the degree of the damage. and delivers results in court.
Security Engineer – Creates and installs security systems and infrastructure to combat cyber threats.
Network Security Specialist - Implements and maintains network security measures such as firewalls, intrusion detection and prevention systems, and VPNs.
Endpoint Security Specialist - Installs and maintains security measures for an organization's endpoints, which include laptops, desktop computers, and mobile devices.
Identity and Access Management (IAM) Specialist - Manages and regulates access to a company's systems and data, as well as ensuring compliance with security rules and regulations. They Create and deploys systems and processes to manage user identities, access privileges, and authentication methods in order to prevent illegal access.
Threat Intelligence Analyst - Monitors and analyzes cyber threats and emerging security trends in order to identify potential threats and vulnerabilities ahead of time.
Vulnerability Assessor- Detects vulnerabilities in computer networks and systems, evaluates their potential impact, and makes remedial recommendations.
Security Architect- they focus on designing and implementing security solutions to protect against cyber threats.
Governance, Risk, and Compliance (GRC).
GRC is a framework for managing and keeping track of a company's cybersecurity procedures and policies to make sure they adhere to legal requirements and business norms. The GRC team is in charge of creating and enforcing security policies and processes, evaluating and managing risks, and making sure that laws and regulations are being followed.
Required Skills/Expertise
Understanding of regulatory compliance
Auditing and assessment
Governance
Risk management
Project management
Communication skills
Analytical skills
Business knowledge
Continuous learning
Certifications Required/Needed in GRC
Entry/Intermediate Level | Expert Level |
Career Paths in GRC
Chief Information Security Officer (CISO) - Creates and executes an organization's entire cybersecurity strategy, as well as manages the security team.
Risk Analyst - Conducts risk assessments to identify and prioritize potential cybersecurity threats, and creates mitigation measures.
Policy and Standards Manager - Creates and oversees an organization's security policies and standards, as well as ensuring compliance with industry best practices and legislation.
Cybersecurity Compliance Auditor - Ensures compliance with cybersecurity rules and industry standards, as well as managing the compliance certification process.
Third-Party Risk Manager - Manages the cybersecurity risks associated with third-party vendors and partners, as well as ensuring they follow security rules and regulations.
Data Protection Officer - Responsible for managing an organization's data protection policy and ensuring compliance with data privacy requirements.
Cyber Security Trainer- Educates and instructs personnel on best practices for cybersecurity to lessen the risk of cyber attacks and data breaches. Creates and oversees cybersecurity awareness and training programs for workers to ensure they understand security rules and best practices.
Cybersecurity Project Manager:Supervises and oversees cybersecurity projects to ensure they are completed on time, within budget, and fulfill the organization's security requirements.
Don't let your learning lead to knowledge. Let your learning lead to action
Jim Rohn
Never become so much of an expert that you stop gaining expertise. View life as a continuous learning experience.
Denis Waitley
Review Question
What inspired you to seek a career in cybersecurity, and what interests you the most about the field?
Which career path of cybersecurity most interests you? And why?
RESEARCH: What trends do you see in the future of cybersecurity, and how do you think they will impact the industry and job opportunities?





