KNOW YOUR ROLE DO YOUR JOB:
A mapping of skills and building a Cyber Security Career
- EILEEN. A.
KNOW YOUR ROLE DO YOUR JOB: A mapping of skills and building a - - PowerPoint PPT Presentation
KNOW YOUR ROLE DO YOUR JOB: A mapping of skills and building a Cyber Security Career EILEEN. A. Cyber Defense and Forensics Analyst The Dilemma Caught in a web, ever growing cyber attacks, changes in technology. Strategies seem to last an
Caught in a web, ever growing cyber attacks, changes in technology. Strategies seem to last an average of 2 years and need to constantly change Increase in cyber incidents require new outlook. Address market demands and enhance recruitment, hiring, development, and retention of cybersecurity talent Get the right team to get the job done
Credentials, and skillsets associated with each role Key jobs within cybersecurity, common transition opportunities between them, Opportunities for workers to start and advance their careers within cybersecurity.
Improves communication about how to identify, recruit, develop, and retain cybersecurity talent National resource that categorizes, organizes, and describes cybersecurity work. Standard rdize izes Cy Cyber ersecu security rity roles es fo for :
Employers
Cybersecurity Workers
Providers
800-181
National standard for
and talk about cybersecurity work, and what is required to do that work.
Special Publication 800-181
7 Cy Cybersec ersecurit urity y Workfo kforce rce Ca Categories
33 Speci cialty alty Areas – Distinct areas of cybersecurity work 52 W Work k Role les –
cyber-related work
Abilities (KSA’s) required to perform a set of Tasks.
Cyb yber er De Defen ense e oper erati tions ns, , contr trol l and Engi gine neer ering ng Maintain security monitoring tools and investigate suspicious activities.
Create awareness, maintain focus and augment visibility Understand the business, set initial goals & outline a realistic, high-impact plan Focus on Tactics not Adversary techniques Develop repeatable processes Enrich detective techniques with Threat Hunting Build Investigative techniques Report & celebrate success, identify points of change, increase scope in spiral motion
Tier er 1 Securit urity y Analys lyst t Description: cription: Tr Triage e Specia ciali list st (Separating the wheat from the chaff) Skil ills Sysadmin skills (Linux/Mac/Windows); programming skills (Python, Ruby, PHP, C, C#, Java, Perl, and more); securi urity ty skil ills Incident Handler Vulnerability Tester Forensic Analyst Incident Response Intrusion Analyst Cyber Defense Forensic Examiner Incident Response Tier er 2 Securit urity y Analys lyst- Descrip cription: tion: Incident dent Respo spond nder er first responder Skil ills Penetration tester curiosity to get to the root cause Ability to remain calm under pressure. High ethical standards Tier er 3 Expe pert t Secu curity rity Analys lyst Threa eat t Hunter ter (Hunts vs. defends) Skil ills familiarity with using data visualization tools and penetration testing tools. . Tier er 4 SO SOC C Manager er Opera erati tions ns & M Manageme ement nt (Chief Operating Officer for the SOC) Skil ills strong leadership and communication skills
SKILLS Information Systems Security Information Assurance Network Security Security Operations- Incident response Tier 1 support Security Analyst Vulnerability assessment Project Management Linux NIST Cybersecurity Framework NICE CE CYBERSEC BERSECUR URIT ITY Y WORKF KFOR ORCE CE FRAMEWORK EWORK CATEG EGORI ORIES ES Operate and Maintain Customer Service and Technical Support Data Administration Knowledge Management Network Services Systems Administration Systems Analysis Protect and Defend Cyber Defense Analysis Cyber Defense Infrastructure Support Incident Response Vulnerability Assessment and Management COMMO MMON N JOB TITLES Information Security Specialist It Security Specialist It Specialist Information Security Information Technology Security Specialist SOC support Analyst Incident Responder
COMMON MMON JOB TITLES TLES
SKILLS LLS
NICE CE CYBER BERSEC ECURIT ITY WORKFORC KFORCE FRAMEWO EWORK K CATE TEGO GORIE IES
Cyber Investigation Digital Forensics
COMMON MMON JOB TITLES TLES
NICE CE CYBER BERSEC ECURIT ITY WORKFORC KFORCE FRAMEWO EWORK K CATE TEGO GORIE IES
Cyber Defense Analysis Cyber Defense Infrastructure Support Incident Response Vulnerability Assessment and Management SKILLS LLS
COMMON MMON JOB TITLES TLES
NICE CE CYBER BERSEC ECURITY TY WORKFORC KFORCE FRAMEWO EWORK K CATE TEGO GORIE IES Overse see e and Gover ern
Management
Securely curely Provision vision
SKILLS LLS
JOB TITLES TLES Information Security Analyst IT Security Analyst Cyber Security Analyst Senior Security Analyst Intrusion Analyst Security Operations Manager NICE CE CYBER BERSEC ECURIT ITY WORKFORC KFORCE FRAMEWO EWORK K CATE TEGO GORIE IES Analyze Collect and Operate Securely Provision Operate and Maintain Protect and Defend Investigate SKILLS LLS Information Systems Security Linux Network Security Threat Analysis Security Operations Vulnerability assessment Project Management Intrusion detection and analysis
JOB TITLES LES
NICE CE CYBER BERSEC ECURIT ITY WORKFORC KFORCE FRAMEWO EWORK K CATE TEGO GORIE IES
SKILLS LLS
JOB TITLE TLES Penetration Tester Senior Penetration Tester Network Relations Consultant Application Security Analyst SKILLS LLS Information Security Penetration Testing Linux Python Java Vulnerability Assessment Information Systems Software Development Project Management NICE CE CYBER BERSEC ECURIT ITY WORKFORC KFORCE FRAMEWO EWORK K CATE TEGO GORIE IES Analyze Threat Analysis Exploitation Analysis All-Source Analysis Targets Language Analysis Protect and Defend
JOB TITLES LES Information Security Manager Information Systems Security Officer Security Administrator Information Security Officer Incident Response manager SOC Manager NICE CE CYBER BERSEC ECURIT ITY WORKFORC KFORCE FRAMEWO EWORK K CATE TEGO GORIE IES Oversee and Govern Collect and Operate Analyze Securely Provision Operate and Maintain Protect and Defend TOP P SKILL LLS REQUEST ESTED Information Security Information Systems Project Management Information Assurance Linux Network Security NIST Cybersecurity Framework Risk Management Framework
JOB TITLES LES Security Engineer Network Security Engineer Information Security Engineer Cyber Security Engineer NIC ICE E CYBERS BERSEC ECURIT RITY WOR ORKFORC FORCE FRAMEWO EWORK K CATE TEGO GORIE IES Securely Provision Operate and Maintain Protect and Defend SKI KILLS LLS Information Security Network Security Linux Information Systems Python Cryptography Project Management Cisco Authentication
JOB TITLES LES Security Architect It Security Architect Senior Security Architect Cyber Security Architect NICE CE CYBER BERSEC ECURIT ITY WORKFORC KFORCE FRA RAMEWO MEWORK RK CATE ATEGO GORIES RIES Securely Provision Risk Management Software Development Systems Architecture Systems Development Systems Requirements Planning Technology R&D Test and Evaluation SKILLS LLS Information Security Network Security Cryptography Information Systems Authentication Linux Software Development Cisco NIST Cybersecurity Framework
nge programs. Higher level passes information to lower level (Knowledge transfer) Inter Role training
ernal nal Training ning Initia tiati tives ves
Certifica tificati tions ns and Exter ernal nal traini ning ng SANS- EC-Council elearnSecurity
es of f Growth
Learn through experience promotions
effective defense front
compromise
required
Lets get the skills right. Lets get the roles right. Lets do the job right.