Detroit TAC

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Wednesday, May 9, 2012

How to land a cybersecurity job

Posted on 10:20 AM by Unknown

5 tips for getting hired in this fast-growing, high-paying segment of the IT industry

By Carolyn Duffy Marsan,

Cybersecurity jobs are plentiful, from government, financial services and utilities to manufacturing and retail. But what skills do IT professionals need to qualify for these high-paying jobs?

We asked the experts and came up with this list of five tips for landing a top-notch cybersecurity job:

1. Get certified.

Security-related certifications are a prerequisite for most commercial cybersecurity jobs and all defense-related IT security jobs. These credentials range from basic CompTIA Security+ to the gold standard ISC2 Certified Information Systems Security Professional (CISSP).
Other popular security certifications include those from GIAC, ECCouncil and ISACA. Vendor-specific certifications from Cisco, RSA, Symantec and others are also in demand.
"There are a lot of security certifications that are very well accepted and are extremely beneficial to the individual," says Jacob Braun, president and COO of Waka Digital Media, a Boston-based IT security consultancy. "They demonstrate a body of knowledge and experience...Some of those certifications are more than written exams. They have some practical components, which are an additional hurdle to achieve."
"I like to see the CISSP," says Dave Frymier, Unisys CISO. "Somebody who has the CISSP has passed a pretty comprehensive test and is likely to share terminology with you so you can make sure you are both talking about the same things."
Verizon, which compiles an authoritative annual report on security breaches, recommends having IT security staff pass a course such as GIAC Incident Handler so they know how to properly respond to a breach.
"A lot of organizations lack personnel on hand who know what to do in the event of a data breach," says Bryan Sartin, director of Verizon's Research Investigation Solution Knowledge (RISK) team. "They need to know how to freeze the environment, how to move toward incident containment, and how to maintain crime scene integrity."

2. Join the military or the feds.

Most companies prefer to hire cybersecurity experts with experience in the U.S. military or law enforcement agencies.
"It's not a requirement, but it helps," Braun says. "Often times, you'll find an individual who is coming from the military or a federal government agency who has received a variety of cybersecurity training that is not yet attainable in the commercial realm."
"Military experience is good to see," Frymier says. "In fact, the security director that we hired last year is ex-military intelligence. The ability to use these [security information and event management] systems and track down persistent threats are skills more closely aligned with the intelligence community than with the IT community."
Verizon has members of its security breach investigation team with military intelligence and law enforcement experience. "The law enforcement are great at interviews...If it's an inside job, they can usually spot the guilty party," Sartin says. "The military people are more process oriented."

3. Learn SAML.

The issue of information security, identity and access management in the cloud is a major concern for CIOs, who are deploying software-as-a-service applications such as Salesforce and Concur to complement their enterprise applications. They are looking for employees who understand how to extend their directory services to control access to cloud applications.
"We want individuals who understand the technology, who understand the policy and who understand the intelligence side of things," Braun says. "If someone has experience deploying security solutions in a new business model, such as the cloud model, that's very valuable."
One specific skill related to cloud security that's in demand: SAML. The Security Assertion Markup Language is an emerging standard that allows enterprises to extend their directory, authentication and identity management systems into cloud-based applications.
"You can learn SAML very quickly, and it's incredibly applicable because almost all the [Software-as-a-Service] companies support a SAML interface," Frymier says. "We've implemented a SAML product in the last year and half or so. It allows us to create an interface to an LDAP store like Microsoft Active Directory and in a secure manner expose account information from Active Directory to SaaS applications. We can do account management inside our Active Directory and have that immediately reflected in our SaaS applications."

4. Master mobile security.

As more organizations adopt Bring Your Own Device policies, they are facing a host of challenges including how to secure information stored on a range of devices that they don't own.
Mobile device management "is a sweet spot for me," Frymier says. "I'm the executive of interest for our consumerization effort because it has such security aspects to it....We have a Bring Your Own Device program, and now 4,000 employees have their own iOS devices. We have got them set up in a way that's secure using Microsoft ActiveSync."
Unisys also is focusing on security in its mobile application development efforts.
"The people who understand mobility at a very deep level tend to be very young, often right out of college. What we find is that we need to pair them up with more senior people who understand backend systems," Frymier says. "You have all of these sexy streams of data on mobile apps. You need to understand how it gets in and how it gets out and how authentication is done and who has access to it."

5. Learn to analyze data.

Cybersecurity pros are masters at finding needles in haystacks. They need to deal with huge volumes of data gathered by security devices and find anomalies that indicate security breaches are occurring.
"One area where we see a skill gap is in general log monitoring," Sartin says. "Everyone seems to have someone who is responsible for monitoring logs, but these people don't have enough experience. They look at endless amounts of data, and they don't find the evidence of the SQL injection," which is the most common type of security breach.
IT professionals need to brush up on their ability to analyze log monitoring data and find important trends.
"Cybersecurity experts need to understand and analyze the trends in the log data to find anomalies and other signs of security breaches," Braun says. "They need to understand how data comes in and leaves an organization and how it should be handled. They need to understand how partner organizations work and competitive organizations work, so they're in the best position to identify when something is malicious or a threat."
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Career Networking, Tech News Security | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • When touring the Large Hadron Collider, stay with your group
  • Hooray, the supercommittee failed! Commentary: Failure no help, but greater harm averted
    By Darrell Delamaide  — The supercommittee to cut the deficit was a bad idea, and its failure is a good thing for America. Pundits are...
  • Quantum Computing Almost Here
    R. Colin Johnson   IBM recently demonstrated the components necessary to build a quantum computer, including superconducting microchips th...
  • Wet Electronics Open Door to New Possibilities
    R. Colin Johnson Gadgets, gizmos and wireless wonders must be fastidiously protected from moisture today, but researchers using circuitry w...
  • 2012 Salary and Skills report
    http://www.techrepublic.com/blog/career/infographic-2012-salary-and-skills-report/4545?tag=nl.e101
  • Medical Privacy Secured on Smartphones
    R. Colin Johnson | Anti-cloning encryption technology is being used to secure validated medical data, which can only be accessed by an att...
  • Entry-level IT jobs will be plentiful in 2012, experts predict
    Help desk, app development, analytics among the hottest prospects for college grads By Carolyn Duffy Marsan Here is good news for coll...
  • Rise of the 'maker movement'
    Rise of the 'maker movement' What does 'do-it-yourself' culture mean for the future of development?  ...
  • (no title)
    Toy Dept.: Parrot AR.Drone 2.0 Visits WWJ Reporting Matt Roush SOUTHFIELD — It’s hard to believe that a four-bladed toy helicopter with onb...
  • Melissa Harris-Perry: World wide web access to local communities
    Melissa Harris-Perry: World wide web access to local communities : 'via Blog this' Visit NBCNews.com for breaking news , world news ...

Categories

  • Android (1)
  • BDPA (3)
  • BDPA Local Chapter (3)
  • Career Networking (20)
  • Cool Stuff (14)
  • Education Tech (8)
  • Election (1)
  • FoodforThought (32)
  • FreeStuff (2)
  • Funny (2)
  • Green Power (7)
  • Hackerspace (6)
  • Local Tech Events (2)
  • Med Tech News (9)
  • Money (1)
  • MovieTech (1)
  • New Technology (5)
  • Open Source Tech News (7)
  • Personal Achievement (1)
  • personal rant (1)
  • Presidental (2)
  • SocialNetworkTech (1)
  • Space Tech (10)
  • Tech News (35)
  • Tech News Security (12)
  • Tech Tip (5)
  • Tech Tips (1)
  • Tech Toys (2)

Blog Archive

  • ►  2013 (202)
    • ►  September (6)
    • ►  August (21)
    • ►  July (17)
    • ►  June (17)
    • ►  May (26)
    • ►  April (23)
    • ►  March (32)
    • ►  February (28)
    • ►  January (32)
  • ▼  2012 (200)
    • ►  December (27)
    • ►  November (31)
    • ►  October (33)
    • ►  September (12)
    • ►  August (14)
    • ►  July (5)
    • ►  June (9)
    • ▼  May (13)
      • Linux Mint 13 rallies behind Gnome
      • Raspberry Pi: are you one of the lucky 57?
      • TEDx 2011Cleveland talk
      • May 14, 2012 7:03 PM Print Text How spac...
      • The real RC car Transformer!!
      • “The Elements”?
      • How to land a cybersecurity job
      • Focus on Innovation: Putting Breakthrough Thinking...
      • Structural Racism: The Role of Race in Public Policy
      • Maker’s Paradise TechShop Opens In Allen Park — Wi...
      • Pay it Forward, My 1000th posting..
      • Ubuntu Linux 12.04 'Precise Pangolin' Is Here at Last
      • Watch out, Raspberry Pi: Intel unveils ultra-small...
    • ►  April (9)
    • ►  March (24)
    • ►  February (10)
    • ►  January (13)
  • ►  2011 (95)
    • ►  December (10)
    • ►  November (27)
    • ►  October (18)
    • ►  September (11)
    • ►  August (24)
    • ►  July (5)
Powered by Blogger.

About Me

Unknown
View my complete profile