Skip to main content

Command Palette

Search for a command to run...

Cybersec Base #008:Careers in Cybersecurity| Required skills and Certifications

Updated
9 min read
Cybersec Base #008:Careers in Cybersecurity| Required skills and Certifications

Jack had grown up watching movies and TV shows that portrayed hackers and cybersecurity professionals as dark, enigmatic people wearing hoods and tapping furiously on computers in darkly lit rooms. These pictures stayed with him throughout the years, and when he first heard of cybersecurity as a career choice, he couldn't help but think of those Hollywood depictions. Jack started to think that maybe he didn't have what it takes to be a cybersecurity professional. He didn't have a hoodie and certainly didn't know millions of commands. He began to doubt himself and his abilities. But one day, he came upon an article on Cyvally about cybersecurity career path. He learned there that cybersecurity is more than just hacking and typing quickly on a computer. It is about understanding how computer systems work, discovering weaknesses and dangers, devising countermeasures and implementing policies, processes and controls. Jack was inspired by their efforts to make the world a safer place for everyone. He recognized that to be a great cybersecurity Professional, he didn't have to wear a hoodie or write millions of commands. He just needed to be passionate, curious, and willing to learn.

Are you a "Jack"?

In this post, I discussed different careers in cybersecurity, required skills and certifications

Sit Back & Enjoy the Ride!!!

Different Team/Aspects in Cybersecurity

Cybersecurity is broken down into 3 teams; namely Offensive, Defensive and GRC Security

  • Offensive Security: you must have heard of the phrase "To beat a hacker, you need to behave like one". The technique of deliberately attacking and exploiting computer systems and networks in order to test their defenses and identify vulnerabilities is referred to as offensive security. It is also called the Red Team

  • Defensive security: refers to protecting computer systems and networks against attack by detecting and mitigating vulnerabilities and putting in place controls to prevent or detect unwanted access or activity. It is also called the Blue Team

  • GRC Security: The use of governance, risk management, and compliance (GRC) concepts to ensure the security of an organization's information and technological assets is referred to as GRC security. It entails putting in place policies, processes, and technology to manage risk, stay in compliance with rules and standards, and ensuring that the organization's security goals are in line with its broader objectives

Red Team

To test an organization's security defenses, a red team is a group of ethical hackers or security specialists that simulates cyberattacks on the organization's systems. The red team's objective is to help the organization strengthen its security posture by identifying vulnerabilities and flaws that may be exploited by an actual attacker.

Required Skills/Expertise

  • Knowledge of computer systems and networks

  • Knowledge of hacking tools and techniques

  • Programming skills

  • Knowledge of social engineering techniques

  • Penetration testing skills

  • Communication and reporting skills

  • Critical thinking and problem-solving skills

  • Understanding of industry standards and regulations

  • Interpersonal skills

  • Continuous learning

Certifications Required/Needed in Red Teaming

-

Entry/Intermediate Level

Expert Level

CompTIA Network+

Offensive Security Certified Professional (OSCP)

CompTIA Security+

Offensive Security Exploitation Expert (OSEE)

CompTIA Linux+

Offensive Security Certified Expert (OSCE)

CompTIA PenTest+

Certified Red Team Operations Professional (CRTOP)

eLearnSecurity Junior Penetration Tester (eJPT)

GIAC Web Application Penetration Tester (GWAPT)

Certified Ethical Hacker (CEH)

GIAC Exploit Researcher and Advanced Penetration Tester (GXPN)

Certified Red Team Professional (CRTP)

Certified Information Systems Security Professional (CISSP)

Practical Network Penetration Tester (PNPT)

GIAC Penetration Tester (GPEN)

EC-Council Certified Ethical Hacker Master (C|EH Master)

Career Paths in Red Teaming

Penetration Tester/Ethical Hacker - Conducts controlled hacking attempts to detect vulnerabilities in systems and networks and makes security recommendations.

Vulnerability Researcher/Bug Bounty Specialist: detects and exploits vulnerabilities before cyber criminals discover them, preventing widespread exploitation and assisting organizations in enhancing their security. They are compensated and recognized for reporting bugs, hence the word bug bounty..

Malware Analyst - Examines and reverse-engineers malware to determine and comprehend determine its behavior, purpose, and origin, and then develops detection and removal procedures.

Social Engineering Specialist - Tests an organization's sensitivity to phishing, pretexting, and other social engineering methods using social engineering methodologies.

Wireless Security Specialist - Simulates attacks and identifies vulnerabilities to test an organization's wireless network security defenses.

Web Application Security Specialist - Conducts simulated assaults and penetration testing to identify vulnerabilities in web applications.

Physical Security Specialist - Evaluates the physical security defenses of an organization, such as access controls, surveillance systems, and perimeter defenses.

Blue team

Blue Team monitors and respond to security problems in order to thwart cyberattacks. They are in charge of identifying and neutralizing security risks as well as creating and putting into effect security controls to fend against further attacks.

Required Skills/Expertise

  • Knowledge of technologies and security approach

  • Incident response skills

  • Security monitoring skills

  • Knowledge of security tools and techniques

  • Analytical and problem-solving skills

  • Knowledge of threat intelligence

  • Risk assessment and management

  • Communication and reporting skills

  • Compliance and regulatory knowledge

  • Familiarity with SIEM

  • Continuous learning

Certifications Required/Needed in Blue Teaming

Entry/Intermediate Level

Expert Level

(ISC)²  Certified in Cybersecurity(CC)

Security Blue Team Level 2

CompTIA Network+

GIAC Certified Forensic Analyst (GCFA)

CompTIA Security+

EC-Council Certified Incident Handler (ECIH)

CompTIA Cybersecurity Analyst (CySA+)

CREST Certified Threat Intelligence Manager.

Security Blue Team Level 1

CompTIA Advanced Security Practitioner (CASP+)

Splunk Core Certified User

Certified Information Systems Security Professional (CISSP)

EC-Council Computer Hacking Forensics Investigator (CHFI)

GIAC Certified Incident Handler (GCIH)

Cisco Certified Network Associate Cyber Operations (CCNA Cyber Ops)

CREST Registered Threat Intelligence Analyst

Career Paths in Blue Teaming

Cybersecurity Analyst - Monitors and analyzes security events and occurrences, and responds to security threats in real time.

Incident Responder: responds to security incidents by determining the source of the attack, containing the issue, and recovering systems and data.

Forensic Analyst - Gathers and analyzes digital evidence connected to cyber incidents to determine the source of the attack, the offender, and the degree of the damage. and delivers results in court.

Security Engineer – Creates and installs security systems and infrastructure to combat cyber threats.

Network Security Specialist - Implements and maintains network security measures such as firewalls, intrusion detection and prevention systems, and VPNs.

Endpoint Security Specialist - Installs and maintains security measures for an organization's endpoints, which include laptops, desktop computers, and mobile devices.

Identity and Access Management (IAM) Specialist - Manages and regulates access to a company's systems and data, as well as ensuring compliance with security rules and regulations. They Create and deploys systems and processes to manage user identities, access privileges, and authentication methods in order to prevent illegal access.

Threat Intelligence Analyst - Monitors and analyzes cyber threats and emerging security trends in order to identify potential threats and vulnerabilities ahead of time.

Vulnerability Assessor- Detects vulnerabilities in computer networks and systems, evaluates their potential impact, and makes remedial recommendations.

Security Architect- they focus on designing and implementing security solutions to protect against cyber threats.

Governance, Risk, and Compliance (GRC).

GRC is a framework for managing and keeping track of a company's cybersecurity procedures and policies to make sure they adhere to legal requirements and business norms. The GRC team is in charge of creating and enforcing security policies and processes, evaluating and managing risks, and making sure that laws and regulations are being followed.

Required Skills/Expertise

  • Understanding of regulatory compliance

  • Auditing and assessment

  • Governance

  • Risk management

  • Project management

  • Communication skills

  • Analytical skills

  • Business knowledge

  • Continuous learning

Certifications Required/Needed in GRC

Entry/Intermediate Level

Expert Level

(ISC)²  Certified in Cybersecurity(CC)

Certified in the Governance of Enterprise IT (CGEIT)

CompTIA Security+

Certified Compliance and Ethics Professional (CCEP)

ISO 27001 Lead Auditor

Certified Information Security Manager (CISM)

Certified Information Systems Auditor (CISA)

Certified in Risk Management Assurance (CRMA)

Certified Internal Auditor (CIA)

Certified Third Party Risk Professional (CTPRP)

Certified in Risk and Information Systems Control (CRISC)

Certified Information Systems Security Professional (CISSP)

Career Paths in GRC

Chief Information Security Officer (CISO) - Creates and executes an organization's entire cybersecurity strategy, as well as manages the security team.

Risk Analyst - Conducts risk assessments to identify and prioritize potential cybersecurity threats, and creates mitigation measures.

Policy and Standards Manager - Creates and oversees an organization's security policies and standards, as well as ensuring compliance with industry best practices and legislation.

Cybersecurity Compliance Auditor - Ensures compliance with cybersecurity rules and industry standards, as well as managing the compliance certification process.

Third-Party Risk Manager - Manages the cybersecurity risks associated with third-party vendors and partners, as well as ensuring they follow security rules and regulations.

Data Protection Officer - Responsible for managing an organization's data protection policy and ensuring compliance with data privacy requirements.

Cyber Security Trainer- Educates and instructs personnel on best practices for cybersecurity to lessen the risk of cyber attacks and data breaches. Creates and oversees cybersecurity awareness and training programs for workers to ensure they understand security rules and best practices.

Cybersecurity Project Manager:Supervises and oversees cybersecurity projects to ensure they are completed on time, within budget, and fulfill the organization's security requirements.

Don't let your learning lead to knowledge. Let your learning lead to action

Jim Rohn

Never become so much of an expert that you stop gaining expertise. View life as a continuous learning experience.

Denis Waitley

Review Question

  1. What inspired you to seek a career in cybersecurity, and what interests you the most about the field?

  2. Which career path of cybersecurity most interests you? And why?

  3. RESEARCH: What trends do you see in the future of cybersecurity, and how do you think they will impact the industry and job opportunities?

Cybersec Shell

Part 13 of 20

Welcome to Cyber Shell! Explore cybersecurity resources, including courses and certifications, tailored to all experience levels. Stay updated with the latest trends, and explore opportunities to advance your skills and career. Thanks for visiting!

Up next

Cybersec base #007: Cyber Safety Tips

Ken got an email from a company pretending to be his bank, requesting that he update his account information. Ken clicked on the link in the email without verifying the sender or the website URL and inputted his account information. He later discover...

More from this blog

C

Cyvally

26 posts

Cyvally is a blog offering interesting content on everything cybersecurity, with practical tutorials, best practices, and career guidance for beginners and professionals.