Cyber Security Careers: The Turntotech Handbook To
Cyber Security Careers: The Turntotech Handbook To
Cyber Security
Careers
The TurnToTech Handbook to
Cyber Security
Careers
Overview
A job in Cyber Security means being at the forefront of technology, in-demand, and
well-paid for your skills. This field requires strong instincts, an attention to detail,
and staying informed of news and current events.
The Cost
The U.S. Government estimates that Cyber Attacks cost the global economy
between $57 billion and $600 billion every year. Disruptions in private and public
businesses, government, hospitals, educational and financial institutions cause
heavy amounts of financial strain.
In simple terms, it’s cheaper to prevent a breach than to repair it after the fact.
Up to
$600B every year
|| Malware is software that installs a virus or other harmful tool onto a network.
A Criminal Hacker can cause damage by stealing private information. They will
either sell it to other criminals or use it for their own purposes.
For example, a hacker could access a bank’s computer network, then use the bank’s
customers’ account numbers, pin codes, account histories, or mortgage information
to steal other people’s money and transfer it to their own account.
A hacker could gain entry to a hospital’s records and steal patients’ medical records,
then give or sell the information to a terrorist organization.
To show you how big the problem is, here are some famous cases of security
breaches and hacker attacks:
In September 2017, hackers accessed Equifax’s website code. As one of the 3 largest
US credit reporting agencies, Equifax had personal information about millions of
American citizens. The hackers stole the names, addresses, bank accounts, and
medical records of over 145 million people!
Yahoo’s servers were compromised in August 2013 when hackers breached the
network and stole private information – including passwords and security questions
and answers – of 500 million Yahoo users. The Yahoo security breach is considered
the largest single data breach in history.
The Red Team is the offense. They are Offensive Cyber Security professionals an
organization uses to test the efficiency and resilience of the system. Red Team
members will mimic Criminal Hackers to see if the company’s network holds up,
or if there are any weaknesses and vulnerabilities in the system that the team is
able to get through.
The Blue Team is the defense. They are Defensive Cyber Security professionals
an organization relies on to ensure that no one without authorization can access
the network. It is the Blue Team’s job to make sure all systems remain secure at
all times.
Companies often employ both Red Teams and Blue Teams to run simulation
exercises and learn how to improve their operations from the results of the tests.
Simulations are monitored in real time so Incident Responders can act immediately
and remain in contact with management teams, ensuring all necessary parties
are simultaneously involved.
Team members also study other Cyber Security Attacks. They thoroughly
research the various aspects of each case, devise defense strategies and fixes,
and discuss attack outcomes and consequences.
7 The TurnToTech Handbook to Cyber Security Careers Red and Blue Teams
Job
Descriptions
These are some of the most popular jobs in the Cyber Security industry.
Just like a firefighter is first on the scene, an Incident Responder is the first
person on call when a Cyber Attack occurs. Their first priority is to quickly assess
the damage and fix the weakness that allowed the attack to happen, similar to
an audit or forensic investigation. They use many tools to find the source of the
problem and create procedures to prevent future incidents. This can include
hardware or network upgrades or additional employee training.
An SOC Analyst monitors rising threats in Cyber Security, ensuring that the
organization has the most up-to-date protocols in place to handle them. He/she
handles system upgrades and ongoing testing to protect against any network
intrusions. The analyst coordinates network maintenance, responses to threats,
and relevant communications between multiple teams within – and sometimes
outside of – their organization.
An NOC (Network Operations Center) is only as good as the people in it. NOC
Technicians assist with technical support and routine maintenance. Daily duties
can entail a wide range of responsibilities. Depending on the organization they’re
working for, they can be responsible for monitoring and controlling computer,
telecommunication, or satellite networking environments.
A NOC Tech can handle anything from configuring hardware, firewalls, and
routers, to monitoring networking usage and server temperatures. They are also
responsible for ensuring the stability of an organization's core network, and for
handling network failures, power outages, and DDoS Cyber Attacks.
IT Support Engineer
Systems Security Managers are responsible for overseeing Red Team tasks,
Penetration Tests, and Social Engineering assessments. They coordinate with
other Blue Team members to ensure effective responses to threats, and design,
implement, and test security protocols across an organization's networks.
Penetration Tester
Penetration Testers think like Criminal Hackers by finding weak points and
vulnerabilities in a secure network or website. Pen Testers must seek out and
identify system vulnerabilities by breaking into the systems using the techniques
a black-hat hacker would. In other words, Pen Testers and Ethical Hackers are
tasked with breaking into systems. This allows them to see where the network
or site needs to be secured against potential threats. Knowing how a Criminal
Hacker thinks and what they look for allows a Penetration Tester to protect and
prevent Cyber Attacks by patching system vulnerabilities before a breach occurs.
Successful Pen Testers should have a deep working knowledge and technical
skillset involving the Windows and Linux operating systems, programming
languages including Python and Java, Metasploit frameworks, cryptography, and
computer forensics.
Cyber Security Analysts work hand-in-hand with other Red Team members to
analyze and assess discovered vulnerabilities in the IT infrastructure. This can
include vulnerabilities in the software, hardware, and networks of the system.
Once the vulnerabilities have been thoroughly researched, Cyber Security
Analysts are tasked with reinforcing the systems alongside other team members,
identifying false threats, drafting reports on system health, and maintaining
system integrity to prevent future Cyber Strikes.
Think of this role as a virtual police officer whose goal is to bust Cyber Criminals
via class-A detective work. Cyber Crime Investigators apply investigative skills to
digital environments to understand how Cyber Crimes were perpetrated. They
are responsible for gathering evidence and trails of digital information left on
systems to determine how Cyber Crimes were committed.
Ethical Hacker
Ethical Hackers are tasked with creating scripts for Penetration Testing and Risk
Assessment to identify system vulnerabilities, and design and implement network
security protocol for both hardware and software systems. Responsibilities also
include developing tools to increase the quality of security testing and monitoring,
and developing best practices for Cyber Security personnel across an organization.
In this position, the Engineer monitors potential Cyber Threats against a network
or application. The job is just what it sounds like, and professionals in this position
are tasked with replicating real threats in order to understand how they operate.
Most importantly, it is the Adaptive Threat Replication Engineer’s responsibility
to neutralize threats.
This role requires detailed research, analysis, and ongoing testing to ensure an
organization’s internal systems are up to date. The Adaptive Threat Replication
Engineer must be on constant guard and up to date on the latest emerging
technologies.
Vulnerability Assessment Analysts are responsible for hunting down critical flaws
and vulnerabilities in a network. A large portion of the job involves preparing
reports for management and ranking each vulnerability according to the severity
of the threats posed, in order to prioritize work on patching them.
www.turntotech.io
(212) 924-8324 40 Rector Street, nyc@turntotech.io
10th Floor, New York,
NY 10006