Cybersecurity - Chapter 1

Security Software Developer

software is often not built with security in mind. The Security Software Developer designs and integrates security into every aspect of the software development lifecycle

Security Architect Career Path

Create and build secure networks and computers for complex security frameworks. This is an ideal career path for the problem solver who enjoys solving puzzles

Security Consultant

Experts that evaluate cybersecurity threats, risks and problems to guide organizations in providing protection solutions. This is a very tech-savvy position

Information Security Analyst

Professionals that stand at the front line of defense for networks. They create and maintain firewalls and monitor network activities

Ethical Hacker

Are licensed professionals that try to hack a network with permission to find vulnerabilities. The try to find what is vulnerable and could be exploited by a malicious hacker

Computer Forensics Analyst

Professionals that focus on cyber crimes and partake in data recovery, intercepting data linked to crimes, and a detailed look into data trails

Chief Information Security Officer

Mid Executive position that oversees an organization's IT department. They are responsible for planning, managing, and directing all computer, network and data security needs

Penetration Tester

Highly skilled professionals that are typically ethical hackers and try to infiltrate a corporation's security measures (physical and electronic) with permission from the corporation. A penetration tester will use social engineering tactics to test the security of a company's employee practices

IT Security Consultant

Are typically outsourced contractors that advise organizations on cybersecurity objectives. They typically service smaller businesses on tighter budgets

Security Systems Administrator

The person in charge of daily operations for security controls ( installing, administering, maintaining, and troubleshooting) to include backing up data, network monitoring, user account management, and general security needs