Skills You Need to Succeed in Cyber security

  1. Right Attitude
  • Ability to work methodically and is very detail oriented
  • Eagerness to dig into technical questions and examine them from all sides
  • Enthusiastic and highly adaptable
  • Strong analytical and diagnostic skills
  • Demonstrated skills in innovation and collaboration
  • Keep a current understanding of vulnerabilities from the Internet
  • Maintaining awareness and knowledge of contemporary standards, practices, procedures and methods

2. General Awareness

  • Understand architecture, administration, and management of operating systems, networking, and virtualization software
  • General programming/software development concepts and software analytical skills
  • Proficiency in programming in Java, C/C++, disassemblers, and assembly language and  programming knowledge of two or more scripting languages (PHP, Python, Perl, or shell)
  • Understanding of how the different type of firewalls and network load balancers work
  • Deep understanding of how network routers and switches work
  • Evaluate and design systems and network architectures

  3. Knowledge base

  • Open Source Applications
  • Linux Operating Systems
  • Microsoft Technologies
  • Wireless Technologies
  • Database Modeling
  • Web Application Technologies
  • Compiled and Interpreted Development Languages
  • Network Implementation (Operational and Security)
  • Telephony Technologies (Analog and IP)
  • Social Engineering
  • Physical Security

4. Polishing skills

  • Examine security from a holistic view, including threat modeling, specifications, implementation, testing, and vulnerability assessment
  • Understand security issues associated with operating systems, networking, and virtualization software
  • Understand Web application security concepts and practices
  • Understand the architecture of systems and network including identifying the security controls in place and how they are used
  • Understand database weaknesses and security best practices
  • Advanced understanding of general information security concepts and principles, system architectures and development
  • Expert knowledge of software development security principles, concepts, and best practices
  • Ability to write tools to automate certain security tasks
  • Ability to do Systems and Network hardening
  • Organize and coordinate technical Vulnerability Assessments including systems and network vulnerability assessments, penetration testing, web application assessments, social engineering assessments, physical security assessments, wireless security assessments and implementing secure infrastructure solutions
  • Recommend and set the technical direction for managing security incidents
  • Maintain the integrity of process and approach, as well as controls, for the whole incident management process including the ability to coordinate and manage major/highly sensitive investigations with potential for business wide impact/reputational damage
  • Be able to understand and forensically show how attacks from the Internet are done
  • Understand architecture, administration, and management of operating systems, networking, and virtualization software
  • General programming/software development concepts and software analytical skills
  • Proficiency in programming in Java, C/C++, disassemblers, and assembly language and  programming knowledge of two or more scripting languages (PHP, Python, Perl, or shell)
  • Understanding of how the different type of firewalls and network load balancers work
  • Deep understanding of how network routers and switches work
  • Evaluate and design systems and network architectures
Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

Lead Auditor & InfoSec Professional

%d bloggers like this: