KNOW YOUR ROLE DO YOUR JOB: A mapping of skills and building a - - PowerPoint PPT Presentation

know your role do
SMART_READER_LITE
LIVE PREVIEW

KNOW YOUR ROLE DO YOUR JOB: A mapping of skills and building a - - PowerPoint PPT Presentation

KNOW YOUR ROLE DO YOUR JOB: A mapping of skills and building a Cyber Security Career EILEEN. A. Cyber Defense and Forensics Analyst The Dilemma Caught in a web, ever growing cyber attacks, changes in technology. Strategies seem to last an


slide-1
SLIDE 1

KNOW YOUR ROLE DO YOUR JOB:

A mapping of skills and building a Cyber Security Career

  • EILEEN. A.

Cyber Defense and Forensics Analyst

slide-2
SLIDE 2

The Dilemma

Caught in a web, ever growing cyber attacks, changes in technology. Strategies seem to last an average of 2 years and need to constantly change Increase in cyber incidents require new outlook. Address market demands and enhance recruitment, hiring, development, and retention of cybersecurity talent Get the right team to get the job done

slide-3
SLIDE 3

Options

  • ATTACK
  • DEFEND
  • FACILITATE
slide-4
SLIDE 4

Career path

Credentials, and skillsets associated with each role Key jobs within cybersecurity, common transition opportunities between them, Opportunities for workers to start and advance their careers within cybersecurity.

slide-5
SLIDE 5

Career mapping

Improves communication about how to identify, recruit, develop, and retain cybersecurity talent National resource that categorizes, organizes, and describes cybersecurity work. Standard rdize izes Cy Cyber ersecu security rity roles es fo for :

  • Public and Private Sector

Employers

  • Education Providers
  • Technology Developers
  • Current and Future

Cybersecurity Workers

  • Training and Certification

Providers

  • Policymakers
slide-6
SLIDE 6

NICE FRAMEWORK

  • NIST Special Publication

800-181

National standard for

  • rganizing the way we define

and talk about cybersecurity work, and what is required to do that work.

slide-7
SLIDE 7

NICE FRAMEWORK - NIST

Special Publication 800-181

7 Cy Cybersec ersecurit urity y Workfo kforce rce Ca Categories

  • ries

33 Speci cialty alty Areas – Distinct areas of cybersecurity work 52 W Work k Role les –

  • Detailed groupings of IT, cybersecurity, or

cyber-related work

  • Include specific Knowledge, Skills, and

Abilities (KSA’s) required to perform a set of Tasks.

slide-8
SLIDE 8

The Rise of the SOC

Cyb yber er De Defen ense e oper erati tions ns, , contr trol l and Engi gine neer ering ng Maintain security monitoring tools and investigate suspicious activities.

slide-9
SLIDE 9
slide-10
SLIDE 10

SOC Tasks

Create awareness, maintain focus and augment visibility Understand the business, set initial goals & outline a realistic, high-impact plan Focus on Tactics not Adversary techniques Develop repeatable processes Enrich detective techniques with Threat Hunting Build Investigative techniques Report & celebrate success, identify points of change, increase scope in spiral motion

slide-11
SLIDE 11
slide-12
SLIDE 12
slide-13
SLIDE 13
slide-14
SLIDE 14

SOC Analysis Hierarchy

Tier er 1 Securit urity y Analys lyst t Description: cription: Tr Triage e Specia ciali list st (Separating the wheat from the chaff) Skil ills Sysadmin skills (Linux/Mac/Windows); programming skills (Python, Ruby, PHP, C, C#, Java, Perl, and more); securi urity ty skil ills Incident Handler Vulnerability Tester Forensic Analyst Incident Response Intrusion Analyst Cyber Defense Forensic Examiner Incident Response Tier er 2 Securit urity y Analys lyst- Descrip cription: tion: Incident dent Respo spond nder er first responder Skil ills Penetration tester curiosity to get to the root cause Ability to remain calm under pressure. High ethical standards Tier er 3 Expe pert t Secu curity rity Analys lyst Threa eat t Hunter ter (Hunts vs. defends) Skil ills familiarity with using data visualization tools and penetration testing tools. . Tier er 4 SO SOC C Manager er Opera erati tions ns & M Manageme ement nt (Chief Operating Officer for the SOC) Skil ills strong leadership and communication skills

slide-15
SLIDE 15
slide-16
SLIDE 16

SKILLS Information Systems Security Information Assurance Network Security Security Operations- Incident response Tier 1 support Security Analyst Vulnerability assessment Project Management Linux NIST Cybersecurity Framework NICE CE CYBERSEC BERSECUR URIT ITY Y WORKF KFOR ORCE CE FRAMEWORK EWORK CATEG EGORI ORIES ES Operate and Maintain Customer Service and Technical Support Data Administration Knowledge Management Network Services Systems Administration Systems Analysis Protect and Defend Cyber Defense Analysis Cyber Defense Infrastructure Support Incident Response Vulnerability Assessment and Management COMMO MMON N JOB TITLES Information Security Specialist It Security Specialist It Specialist Information Security Information Technology Security Specialist SOC support Analyst Incident Responder

slide-17
SLIDE 17

COMMON MMON JOB TITLES TLES

  • Digital Forensics Analyst
  • Cyber Forensic Specialist
  • Cyber Security Forensic Analyst
  • Computer Forensics Analyst
  • Cyber defense and forensics analyst
  • SOC Security analyst

SKILLS LLS

  • Information Systems
  • Computer Forensics
  • Linux
  • Information Security
  • Threat investigation
  • Threat detection and analysis
  • Threat Hunting and CTI
  • Forensic Toolkit
  • Malware Engineering

NICE CE CYBER BERSEC ECURIT ITY WORKFORC KFORCE FRAMEWO EWORK K CATE TEGO GORIE IES

  • Investigate

Cyber Investigation Digital Forensics

slide-18
SLIDE 18

COMMON MMON JOB TITLES TLES

  • Senior Analyst, Information Security
  • Disaster Recovery Specialist
  • Network Technical Specialist
  • Audit Project Manager - Information Security
  • SOC Tier 2 Security Support Analyst

NICE CE CYBER BERSEC ECURIT ITY WORKFORC KFORCE FRAMEWO EWORK K CATE TEGO GORIE IES

  • Protect and Defend

Cyber Defense Analysis Cyber Defense Infrastructure Support Incident Response Vulnerability Assessment and Management SKILLS LLS

  • Information Systems and Network Security
  • Project Management and Planning
  • Linux
  • Technical Support
  • Intrusion detection
  • Security Operations
  • Incident Response
slide-19
SLIDE 19

COMMON MMON JOB TITLES TLES

  • Senior It Auditor
  • It Audit Consultant
  • It Audit Manager
  • It Internal Auditor

NICE CE CYBER BERSEC ECURITY TY WORKFORC KFORCE FRAMEWO EWORK K CATE TEGO GORIE IES Overse see e and Gover ern

  • Executive Cyber Leadership
  • Acquisition and Program/Project

Management

  • Cybersecurity Management
  • Legal Advice and Advocacy
  • Strategic Planning and Policy
  • Training, Education, and Awareness

Securely curely Provision vision

  • Risk Management
  • Software Development
  • Systems Architecture
  • Systems Development
  • Systems Requirements Planning
  • Technology R&D
  • Test and Evaluation

SKILLS LLS

  • Internal Auditing
  • Audit Planning
slide-20
SLIDE 20

JOB TITLES TLES Information Security Analyst IT Security Analyst Cyber Security Analyst Senior Security Analyst Intrusion Analyst Security Operations Manager NICE CE CYBER BERSEC ECURIT ITY WORKFORC KFORCE FRAMEWO EWORK K CATE TEGO GORIE IES Analyze Collect and Operate Securely Provision Operate and Maintain Protect and Defend Investigate SKILLS LLS Information Systems Security Linux Network Security Threat Analysis Security Operations Vulnerability assessment Project Management Intrusion detection and analysis

slide-21
SLIDE 21

JOB TITLES LES

  • Security Specialist
  • Security Consultant
  • Physical Security Specialist
  • Personnel Security Specialist

NICE CE CYBER BERSEC ECURIT ITY WORKFORC KFORCE FRAMEWO EWORK K CATE TEGO GORIE IES

  • Analyze
  • Collect and Operate
  • Oversee and Govern
  • Securely Provision
  • Operate and Maintain
  • Protect and Defend
  • Investigate

SKILLS LLS

  • Information Security
  • Surveillance
  • Information Systems
  • Oracle
  • Project Management
  • Asset Protection
  • Python
  • Prevention of Criminal Activity
  • Security Operations
slide-22
SLIDE 22

JOB TITLE TLES Penetration Tester Senior Penetration Tester Network Relations Consultant Application Security Analyst SKILLS LLS Information Security Penetration Testing Linux Python Java Vulnerability Assessment Information Systems Software Development Project Management NICE CE CYBER BERSEC ECURIT ITY WORKFORC KFORCE FRAMEWO EWORK K CATE TEGO GORIE IES Analyze Threat Analysis Exploitation Analysis All-Source Analysis Targets Language Analysis Protect and Defend

slide-23
SLIDE 23

JOB TITLES LES Information Security Manager Information Systems Security Officer Security Administrator Information Security Officer Incident Response manager SOC Manager NICE CE CYBER BERSEC ECURIT ITY WORKFORC KFORCE FRAMEWO EWORK K CATE TEGO GORIE IES Oversee and Govern Collect and Operate Analyze Securely Provision Operate and Maintain Protect and Defend TOP P SKILL LLS REQUEST ESTED Information Security Information Systems Project Management Information Assurance Linux Network Security NIST Cybersecurity Framework Risk Management Framework

slide-24
SLIDE 24

JOB TITLES LES Security Engineer Network Security Engineer Information Security Engineer Cyber Security Engineer NIC ICE E CYBERS BERSEC ECURIT RITY WOR ORKFORC FORCE FRAMEWO EWORK K CATE TEGO GORIE IES Securely Provision Operate and Maintain Protect and Defend SKI KILLS LLS Information Security Network Security Linux Information Systems Python Cryptography Project Management Cisco Authentication

slide-25
SLIDE 25

JOB TITLES LES Security Architect It Security Architect Senior Security Architect Cyber Security Architect NICE CE CYBER BERSEC ECURIT ITY WORKFORC KFORCE FRA RAMEWO MEWORK RK CATE ATEGO GORIES RIES Securely Provision Risk Management Software Development Systems Architecture Systems Development Systems Requirements Planning Technology R&D Test and Evaluation SKILLS LLS Information Security Network Security Cryptography Information Systems Authentication Linux Software Development Cisco NIST Cybersecurity Framework

slide-26
SLIDE 26

Transitioning

  • Exchange

nge programs. Higher level passes information to lower level (Knowledge transfer) Inter Role training

  • Inter

ernal nal Training ning Initia tiati tives ves

  • Ce

Certifica tificati tions ns and Exter ernal nal traini ning ng SANS- EC-Council elearnSecurity

  • Stages

es of f Growth

Learn through experience promotions

slide-27
SLIDE 27

Conclusion

  • Security must adjust to the trends, it is ever dynamic
  • Roles must work together at one point to create and

effective defense front

  • A disconnect creates an inevitable loophole for

compromise

  • All roles must be proactive in their approaches
  • Uptake of skillset must be strategic to the specific roles

required

slide-28
SLIDE 28

Parting Shot

Lets get the skills right. Lets get the roles right. Lets do the job right.