Career in Cyber Security

With an increased level of cyber crime and even internet espionage and terrorism from other countries, the demand for cyber security experts is only going to increase. This high paying field is demanding and requires the security expert to constantly keep up with growing computer threats, attacks and changing technology. The great majority of companies have computer networks and must have cyber security personnel now to protect themselves.
Cybersecurity professionals protect data and systems in networks that are connected to the internet. Cybercriminals or hackers strike in various ways by virus attacks, which may erase your entire system or someone can steal confidential information from your systems or even break into your systems and modify your files without your knowledge.
A computer hacker finds out the loopholes in a system and breaks into it, the information security professional, or an ethical hacker has a similar job. He needs to think like a hacker and find the loopholes in the system before a hacker can get to them.
An Information Security Professional may have to work on one of the following job profiles.
Job Profile
The job of a cybersecurity professional include the following.
  1. Ethical Hacking into a company’s network to find out what security loopholes need to be fixed
  2. Creating security policy for an organisation
  3. 24×7 remote management of security products like firewall
  4. Security auditing, that is, compiling a report on a company’s security system to see if it matches standards
  5. Cyber Forensics, that is, clinical investigation of computer crimes/frauds
  6. Training
Where are the Jobs?
Most of the cybersecurity jobs within government fall in the category of computer specialist, information technology officer, Information technology specialist, assistant chief security officer etc. These jobs are available with various government agencies and departments including Department of Homeland Security, Federal Bureau of Investigation
The common theme of most of these positions is to defend the nation through the development and utilization of cutting-edge systems, procedures, and technologies to prevent future terrorist attacks.

Career Path

  1. Entry Level –  IS Executive Manager (Role: to correlate broad security guidelines of the organisation with security operations.)
  2. Middle Level – IS Manager (Role: Security program management, data security, ploicy creation/maintenance, business continuity/ disaster recovery)
  3. Senior & Top Level – Chief IS Manager (Role: Design and development of information security policy. Regulatory compliance, information security governance)
  4. Senior & Top Level – Security Advisors / Auditors (Role: Advisory services for information security, policy design, risk assessment, compliance to global/industry standards)
  5. Senior & Top Level – Chief Information Officer (Role: Justifying the cost of ongoing and future investments to mitigate information risks, aligning business objectives with a concise security strategy)
Graduate in any discipline, but software engineers would have preference. A good knowledge of networks and understanding of  hackers mind is essential. It is recommended that one does a course in Cyber Security. Such courses would help a erson learn the tricks of the trade, it does not help joining a course for a few days, but it is recommended that one joins reputed certificate programs and long term programs. Certifications like CISA (Certified Information System Auditor), CISM (Certified Information Security Management) and CISSP (Certified Information Systems Security Professionals) would help a person to start a career in Cybersecurity. Other vendor specific certifications like CCSP (Cisco Certified Security Professional) and MCSE (Microsoft Certified Systems Engineer) also help.

Expected Renumeration
A person with an years experience can expect Rs.3 Lakh per annum. Those with 5 years can get upto 8-10 Lakhs. Those with certifications like CISM, CISSP and CISA can expect annual salaries of 100,000 Rs. abroad.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

Lead Auditor & InfoSec Professional

%d bloggers like this: