Discover millions of ebooks, audiobooks, and so much more with a free trial

Only $11.99/month after trial. Cancel anytime.

Cybersecurity Jobs & Career Paths: Find Cybersecurity Jobs, #2
Cybersecurity Jobs & Career Paths: Find Cybersecurity Jobs, #2
Cybersecurity Jobs & Career Paths: Find Cybersecurity Jobs, #2
Ebook106 pages52 minutes

Cybersecurity Jobs & Career Paths: Find Cybersecurity Jobs, #2

Rating: 0 out of 5 stars

()

Read preview

About this ebook

I am in cybersecurity but I am not a hacker! This field has many branches and not all of them are deeply technical or hands on. Some of these jobs are high-paying with salaries up to 6 figures.

According to the White House, there are 700,000 cybersecurity positions open today. There is a good chance that you fit into some of these roles.
Using the techniques in this series, you can be a part of one of the fastest, highest paid career paths in IT.

In this book we talk about:

A federal cybersecurity workforce framework

Explore the cybersecurity categories

Expand on cybersecurity special areas

Connect work roles to current cybersecurity market

LanguageEnglish
Publisherbruce brown
Release dateJan 15, 2023
ISBN9798215316207
Cybersecurity Jobs & Career Paths: Find Cybersecurity Jobs, #2

Read more from Bruce Brown

Related to Cybersecurity Jobs & Career Paths

Titles in the series (3)

View More

Related ebooks

Security For You

View More

Related articles

Related categories

Reviews for Cybersecurity Jobs & Career Paths

Rating: 0 out of 5 stars
0 ratings

0 ratings0 reviews

What did you think?

Tap to rate

Review must be at least 10 words

    Book preview

    Cybersecurity Jobs & Career Paths - bruce brown

    Cybersecurity Jobs & Career Paths

    Book 2

    Find Cybersecurity Jobs

    By

    Bruce Brown, CISSP, ISC2 CAP

    Copyright © 2022 by Bruce Brown

    All rights reserved. No part of this publication may be reproduced, distributed, or transmitted in any form or by any means, including photocopying, recording, or other electronic or mechanical methods, without the prior written permission of the publisher, except in the case of brief quotations embodied in critical reviews and certain other noncommercial uses permitted by copyright law.

    For permission requests, write to the publisher, addressed Attention: Permissions Coordinator, at the address below.

    contact@convocourses.com

    Download free ATS resume templates at:

    convocourses.com/courses/resume

    Check us out on:

    youtube.com/convocourses

    Contact us:

    contact@convocourses.com

    Table of Contents

    Hacking = Cybersecurity?

    Overview of Cybersecurity Field

    Information Security Color Wheel

    Cybersecurity Workforce Categories

    Cybersecurity Workforce Categories

    The Analyze Category

    All-Source Analysis

    Exploit Analysis

    Language Analyst

    Targets

    Being a Professional in the Analyst Category

    Collect and Operate Cybersecurity Category

    Collection Operations

    Cyber Operational Planning

    Being a Professional in the Collection and Operations Category

    Investigate Cybersecurity Category

    Cyber Investigation

    Digital Forensics

    Being a Professional in the Investigate Category

    Unspeakable Crimes

    Operate and Maintain Cybersecurity Category

    Customer Service and Technical Support

    Being in Customer Service

    Data Administration

    Being a DBA and Data Analyst

    Knowledge Management

    Network Services

    Systems Administrator

    Oversee and Govern Cybersecurity Category

    Communications Security (COMSEC)

    Information System Security Manager (ISSM)

    Being an Information System Security Professional Jobs

    Executive Cyber Leadership

    Chief Information Security Officers

    Legal Advice and Advocacy

    Program/Project Management and Acquisition

    Protect & Detect Cybersecurity Category

    Cyber Defense Analysis

    Being a Cyber Defense Analyst

    Tips on Cyber Defense Analysis Positions

    Securely Provision Cybersecurity Category

    Risk Management

    Software Development

    System Architecture

    System Development

    Technology and Testing

    Cybersecurity Scientists & Mathematicians

    Cybersecurity Scientist

    Cryptographers / Mathematicians

    Many people are familiar with mathematicians in academia, but mathematicians also work in many other fields, including:

    Appendix A: DoD Approved Certifications

    Hacking = Cybersecurity?

    There is a lot of interest in cybersecurity, but people think that it’s all about hacking. In this book I want to show you that there are many categories of this career path that have nothing to do with hacking or coding.

    TV and movies glamorize this one aspect of cybersecurity and it’s so ingrained in people’s minds that they think that hacking is cybersecurity.

    I have been doing cybersecurity and IT since the year 2000 and I want to inform you that there is a lot more to cybersecurity than cracking passwords, infiltrating a school’s system to change the grades or breaking into the databases of banks and police departments.

    Cybersecurity includes creating encryption modules, meeting laws and regulations of countries, and industries. It also involves intelligence and analysis of network traffic, analysis of software code and securing digital evidence for a criminal case. Because computers have to be in an environment that is controlled, cybersecurity also includes some physical and personnel security. You have to control who has physical security to the systems.

    Cybersecurity is important for every aspect of information technology from the initial design of a computer system to a system’s end of life.  Computer hacking is a small percentage of what cybersecurity is. In fact, what is hacking? The Oxford dictionary defines it as the act of gaining unauthorized access to data in a system or computer. This is a very limited definition of the term. What cybersecurity professionals consider hacking is a pretty broad field that includes, penetration testing, red teams, black hats, gray hats, white hats, phreakers, social engineering and others.

    Cybersecurity is a huge field that requires more than just clever hackers who can crack a database. We need skilled communicators, leaders, managers, and analysts from all walks of life. Not all cybersecurity professionals are even technical.

    With this book, my hope is for

    Enjoying the preview?
    Page 1 of 1