Time
55 minutes
Difficulty
Intermediate
CEU/CPE
1

Video Transcription

00:10
level up. Cyber career path. Serious webinar watching your sock and a list of your path.
00:16
You guys ready? Okay,
00:19
let's go.
00:25
Today we're gonna talk about
00:29
the measures that are here with us. Shade. Barkley at Mark Neighbor. We're gonna talk about the stock. Analysts roll specifics around, building the resume, a CZ, and you may wanna be putting together interviewing et cetera,
00:43
and we're gonna talk a little bit about after the interview and a salary of a jet setter. You could, of course, take a look at the agenda that's on screen. I want to mention that we you are able to ask questions in the chat window today.
00:56
Throughout the program, we do have team cyber here with us, and then we'll have a Q and A at the end for about 5 to 10 minutes. We'll take a look at some questions that came up throughout the program.
01:07
I will discuss them,
01:08
right.
01:11
So what I'd like to do is introduce our mentors that air with us again. I'm Gina Pala, Dino. I must library career mentor, And we also have, of course, shape Barkley and Mark neighbor. You see that they're summaries on screen please feel free to read that. I would like to ask Shane to say a couple of words and then ask Mark to say a couple of words. So, Shane, welcome.
01:33
Thanks to you, I appreciate it. Happy to be here. And, uh, looking forward to everyone getting the most out of this webcast. So a lot of great content, too,
01:42
if you today. And please don't hesitate to reach out with any questions to help cater towards what you're looking for. We're here for you guys. Thanks.
01:51
Thank you. Say some. Mark.
01:53
Did you say a few words?
01:57
Yeah. Yeah, this is Mark. We're really excited to have everybody. Looks like a couple. People have unique link. So there's a couple more nights out there. But you Are you excited? Have everybody. As always, Shane and I are slack. If you're not signed up with us yet,
02:12
make sure you sign up. You know, we're always available. Really excited at everybody here. You look forward.
02:16
Probably in the future.
02:19
Yeah. Thank you. Thank you, Bulls. Okay,
02:24
let's go ahead to the next slide.
02:28
So let's get started. What we thought we would do is just to kind of a quick top five on cyber security job titles. And, as you can see, the number one job title that we have this cyber security analyst, which is a stock analyst. We also have cyber security specialists
02:46
and down the list, I won't read all of them. What do we want to do is just
02:49
quickly talk about these job titles and then move on to the next information. Next bit of information that we want to share in the presentation. So change. Could you talk to us a little bit about the 1st 3 job titles in your experience with those several?
03:05
Sure, No, no problem. And I mean great great statistics to take a look at and to keep in mind. Um, the
03:13
1st 3 job titles can
03:15
used interchangeably just depends on who's advertising for that specific position. Especially, You know, one and three very similar job roles. Um, number to Kim
03:27
cover a wide range of topics, but the Security Security Operations Center analyst Career Path does a good job of covering the content for actually all three of those on, uh,
03:38
cybersecurity. Analysts working in a street operation center can
03:43
range from a number of different things Street Operations Center can range from.
03:47
You want a two man team in a smaller company, Thio
03:51
Multi national and Global Companies, where you're working in security Operations Center that
03:55
spans monitoring for the globe and works with hundreds of other stock analysts in that security operation center.
04:04
Uh, some of the basic job, uh, rules for this position would be your promise. The primary one would be
04:13
monitoring computer networks for security issues. So primarily,
04:18
uh, the cop of the security Operation Center. If you think about that, you know, handling all alerts, they come in
04:27
From an analysis point to an escalation standpoint, you're investigating all cyber security issues documenting all your findings communicating that thio the appropriate individuals as part of the escalation process,
04:41
Um, fixing, detecting vulnerabilities,
04:44
developing company wide security practices, potentially performing penetration duties, penetration, testing duties,
04:53
helping to install security software
04:57
and,
04:59
uh, researching enhancements and making recommendations for better security practices. Just some of the high level of things you can consider with these positions. But again, it primarily depends on
05:09
the company advertising the roll on kind of what they're looking toe get out of it. Depending on their specific environment and their security posture. But resources they have from an employee standpoint.
05:21
Wonderful. Thank you. Big shape and mark to chat with us a little bit about the last two job roles.
05:29
Sure, Yeah. When you look at the last two leagues cyber security manager or sad mystery engineer, the 1st 1 is gonna be the lead side of security manager. It gets jump on MD dot com, which is a great resource to kind of
05:42
see what jobs are out there, see what they're looking for. A lot of what you see is the things that change talks about. You're going to be managing some of those people on my mind. I've always believed that a great manager understands the work. So when you read through there, you know, some of us want to is gonna be just,
06:00
you know, understanding service, curious specimens, understanding risk management.
06:02
I'm from the government side, You know, you also need to understand
06:06
missed need to understand. Put Williams vulnerability Management's. You always have to be
06:12
aware of the lost Top 10. You have to be aware of the border. Billy's. They're out there. You should always be tracking
06:17
what kind of virus is being the no of the things that are going on.
06:23
I understand that the goal of the business because, you know, a cyber security manager, you know, you're moving on to a very important role CD daughters being with the C I ose and tech says, C. I s So what? They understand and you're gonna be monitoring a team that's monitoring security. So you have to be able
06:40
to make sure that you can communicate the findings that your team has
06:44
to management so that they can understand
06:46
what it is that you're seeing. And a lot of other times you're working with you but aren't necessarily technique. That's the one thing you do have to do is make sure that you could take very technical information and use yourself skills. It communicated upwards
07:00
for the 2nd 1 for, like, a cypress tree engineer. If you look on indeed type of *** three engine year, one of the ones that that I'm familiar with it. This would be for probably contract. I'm gonna go for May
07:12
at a level two level three. What you're gonna be doing is you're gonna be helping build an implement security planes And that's gonna be for all kind of different times where you're at
07:23
what I say.
07:25
Poem risks waivers. You're gonna be identifying things on the network reading through proposals and things that networking teams want to put together. And you're gonna be assessing,
07:35
uh, what's the impact on your door network? What's the impact of this hat on the company?
07:41
You know what? Love oversee. Have to associate what we have to do to protect it. And you're gonna have to understand the next 853 yards. Understand? I'd spill. You're gonna have to understand
07:51
all facets of hardware, software, networks, applications. You need to understand threats. Vulnerabilities are 10 threat intelligence. Mean as the engineer, you're going to be helping Bill What the company's gonna use. Move forward.
08:07
Beautiful. Thank you so much, guys, for that information, I I wantto obviously introduce this information as people move through their careers in cyber security and know what they may be looking towards Next. Uh, so thank you. Thank you for those of you for joining us late, please. Uh,
08:22
you sure that you watch this video after the presentation and we will make it available at Cyberia as well. So let's keep moving

Up Next

Launching Your SOC Analyst Career

In this course, you will learn the role of a SOC Analyst and how it has become a mission critical role in today's cyber security workforce. Learn why more and more organizations are scaling their IT infrastructure to meet the expanding threat vectors along with it and how you can take on this role.

Instructed By

Instructor Profile Image
Gina Palladino
Adjunct Instructor at Carroll Community College
Instructor