1.1 Introductions & Job Titles

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with

Already have an account? Sign In »

55 minutes
Video Transcription
level up. Cyber career path. Serious webinar watching your sock and a list of your path.
You guys ready? Okay,
let's go.
Today we're gonna talk about
the measures that are here with us. Shade. Barkley at Mark Neighbor. We're gonna talk about the stock. Analysts roll specifics around, building the resume, a CZ, and you may wanna be putting together interviewing et cetera,
and we're gonna talk a little bit about after the interview and a salary of a jet setter. You could, of course, take a look at the agenda that's on screen. I want to mention that we you are able to ask questions in the chat window today.
Throughout the program, we do have team cyber here with us, and then we'll have a Q and A at the end for about 5 to 10 minutes. We'll take a look at some questions that came up throughout the program.
I will discuss them,
So what I'd like to do is introduce our mentors that air with us again. I'm Gina Pala, Dino. I must library career mentor, And we also have, of course, shape Barkley and Mark neighbor. You see that they're summaries on screen please feel free to read that. I would like to ask Shane to say a couple of words and then ask Mark to say a couple of words. So, Shane, welcome.
Thanks to you, I appreciate it. Happy to be here. And, uh, looking forward to everyone getting the most out of this webcast. So a lot of great content, too,
if you today. And please don't hesitate to reach out with any questions to help cater towards what you're looking for. We're here for you guys. Thanks.
Thank you. Say some. Mark.
Did you say a few words?
Yeah. Yeah, this is Mark. We're really excited to have everybody. Looks like a couple. People have unique link. So there's a couple more nights out there. But you Are you excited? Have everybody. As always, Shane and I are slack. If you're not signed up with us yet,
make sure you sign up. You know, we're always available. Really excited at everybody here. You look forward.
Probably in the future.
Yeah. Thank you. Thank you, Bulls. Okay,
let's go ahead to the next slide.
So let's get started. What we thought we would do is just to kind of a quick top five on cyber security job titles. And, as you can see, the number one job title that we have this cyber security analyst, which is a stock analyst. We also have cyber security specialists
and down the list, I won't read all of them. What do we want to do is just
quickly talk about these job titles and then move on to the next information. Next bit of information that we want to share in the presentation. So change. Could you talk to us a little bit about the 1st 3 job titles in your experience with those several?
Sure, No, no problem. And I mean great great statistics to take a look at and to keep in mind. Um, the
1st 3 job titles can
used interchangeably just depends on who's advertising for that specific position. Especially, You know, one and three very similar job roles. Um, number to Kim
cover a wide range of topics, but the Security Security Operations Center analyst Career Path does a good job of covering the content for actually all three of those on, uh,
cybersecurity. Analysts working in a street operation center can
range from a number of different things Street Operations Center can range from.
You want a two man team in a smaller company, Thio
Multi national and Global Companies, where you're working in security Operations Center that
spans monitoring for the globe and works with hundreds of other stock analysts in that security operation center.
Uh, some of the basic job, uh, rules for this position would be your promise. The primary one would be
monitoring computer networks for security issues. So primarily,
uh, the cop of the security Operation Center. If you think about that, you know, handling all alerts, they come in
From an analysis point to an escalation standpoint, you're investigating all cyber security issues documenting all your findings communicating that thio the appropriate individuals as part of the escalation process,
Um, fixing, detecting vulnerabilities,
developing company wide security practices, potentially performing penetration duties, penetration, testing duties,
helping to install security software
uh, researching enhancements and making recommendations for better security practices. Just some of the high level of things you can consider with these positions. But again, it primarily depends on
the company advertising the roll on kind of what they're looking toe get out of it. Depending on their specific environment and their security posture. But resources they have from an employee standpoint.
Wonderful. Thank you. Big shape and mark to chat with us a little bit about the last two job roles.
Sure, Yeah. When you look at the last two leagues cyber security manager or sad mystery engineer, the 1st 1 is gonna be the lead side of security manager. It gets jump on MD dot com, which is a great resource to kind of
see what jobs are out there, see what they're looking for. A lot of what you see is the things that change talks about. You're going to be managing some of those people on my mind. I've always believed that a great manager understands the work. So when you read through there, you know, some of us want to is gonna be just,
you know, understanding service, curious specimens, understanding risk management.
I'm from the government side, You know, you also need to understand
missed need to understand. Put Williams vulnerability Management's. You always have to be
aware of the lost Top 10. You have to be aware of the border. Billy's. They're out there. You should always be tracking
what kind of virus is being the no of the things that are going on.
I understand that the goal of the business because, you know, a cyber security manager, you know, you're moving on to a very important role CD daughters being with the C I ose and tech says, C. I s So what? They understand and you're gonna be monitoring a team that's monitoring security. So you have to be able
to make sure that you can communicate the findings that your team has
to management so that they can understand
what it is that you're seeing. And a lot of other times you're working with you but aren't necessarily technique. That's the one thing you do have to do is make sure that you could take very technical information and use yourself skills. It communicated upwards
for the 2nd 1 for, like, a cypress tree engineer. If you look on indeed type of *** three engine year, one of the ones that that I'm familiar with it. This would be for probably contract. I'm gonna go for May
at a level two level three. What you're gonna be doing is you're gonna be helping build an implement security planes And that's gonna be for all kind of different times where you're at
what I say.
Poem risks waivers. You're gonna be identifying things on the network reading through proposals and things that networking teams want to put together. And you're gonna be assessing,
uh, what's the impact on your door network? What's the impact of this hat on the company?
You know what? Love oversee. Have to associate what we have to do to protect it. And you're gonna have to understand the next 853 yards. Understand? I'd spill. You're gonna have to understand
all facets of hardware, software, networks, applications. You need to understand threats. Vulnerabilities are 10 threat intelligence. Mean as the engineer, you're going to be helping Bill What the company's gonna use. Move forward.
Beautiful. Thank you so much, guys, for that information, I I wantto obviously introduce this information as people move through their careers in cyber security and know what they may be looking towards Next. Uh, so thank you. Thank you for those of you for joining us late, please. Uh,
you sure that you watch this video after the presentation and we will make it available at Cyberia as well. So let's keep moving
Up Next
Launching Your SOC Analyst Career

In this course, you will learn the role of a SOC Analyst and how it has become a mission critical role in today's cyber security workforce. Learn why more and more organizations are scaling their IT infrastructure to meet the expanding threat vectors along with it and how you can take on this role.

Instructed By