my Cybersecurity Analyst Professional Path :
First of all the realm of cybersecurity is bigger than you ever would imagine, and there is no wrong answers on how to start in this field, it's based on your interest your conditions and your willing to give effort for. and am just sharing my experiences and my choices
Cyber Security related job and posts:
Here's a list of cybersecurity-related job roles along with brief descriptions:
Penetration Tester (Ethical Hacker):
- Conducts authorized simulated cyberattacks to identify vulnerabilities in systems, networks, or applications.
- Advises organizations on security weaknesses and provides recommendations for mitigation.
Security Analyst:
- Monitors security alerts and incidents to identify potential threats and vulnerabilities.
- Analyzes security data to generate reports and recommends improvements in security protocols.
Security Operations Center (SOC) Analyst:
- Works in a SOC to monitor and respond to security incidents.
- Analyzes security alerts, investigates incidents, and provides incident response.
Incident Responder:
- Responds to security incidents and conducts forensic analysis to determine the cause and extent of a security breach.
- Develops and implements incident response plans.
Security Consultant:
- Provides expert advice to organizations on improving their overall cybersecurity posture.
- Conducts risk assessments, security audits, and develops security policies.
Security Engineer:
- Designs and implements security systems and measures to protect computer systems, networks, and data.
- Works on the development and integration of security solutions.
Malware Analyst:
- Analyzes malicious software to understand its behavior, origin, and impact.
- Develops strategies for detecting and mitigating malware threats.
Cybersecurity Architect:
- Designs and oversees the implementation of secure information systems architecture.
- Develops and maintains security standards and best practices.
Security Auditor:
- Evaluates the effectiveness of an organization's security controls and policies.
- Conducts audits to ensure compliance with security standards and regulations.
Network Security Engineer:
- Implements and maintains network security measures to protect against unauthorized access and cyber threats.
- Configures firewalls, intrusion detection/prevention systems, and VPNs.
Application Security Analyst:
- Focuses on securing software applications by identifying and addressing vulnerabilities.
- Conducts code reviews, performs security testing, and provides guidance on secure coding practices.
Security Compliance Analyst:
- Ensures that an organization complies with relevant cybersecurity regulations and standards.
- Conducts assessments to verify adherence to security policies and procedures.
Now this is most known job list and for the rest of the article am going to give you The start Path for Security analyst.
SOC Analyst as A start :
Many SOC analysts have a bachelor's degree in a related field such as Computer Science, Information Technology, or Cybersecurity. However, some positions may accept candidates with relevant work experience and certifications.
and most common path is taking a CompTIA Security+: certification than Cisco Certified CyberOps Associate (CCNA CyberOps)
and maybe going on some advanced certification such as Certified Information Systems Security Professional (CISSP)
or GIAC Certified Incident Handler (GCIH)
or EC-Council Certified Incident Handler (ECIH)
and one of the requiremnt most SOC analyst have is the knowleged and expertise with SIEM so a Certified Information Security Manager (CISM) is a good plus.
than gaining Hands-On Experience by either internships or labs or by some online vendors such as HTB, BTLO, LetDefend, or others.
and than start postulating on platform like LINKEDIN OR indeed or any other platform.
My personal Path :
my path was a littel different i got IBM cybersecurity analyst from Coursera
Cybersecurity Analyst Professional
IBM cyber security analyst professional consists of 7 other certification which are :
Introduction to Cybersecurity Tools & Cyber Attacks
Network Security & Database Vulnerabilities
Cybersecurity Roles, Processes & Operating System Security
Cybersecurity Compliance Framework & System Administration
Penetration Testing, Incident Response and Forensics
Cybersecurity Capstone: Breach Response Case Studies
Cyber Threat Intelligence
than my next step is gaining hands on experiences : so i explored the Trainings and Labs And challenges of platforms such as :
https://app.letsdefend.io
https://blueteamlabs.online/login
https://www.malware-traffic-analysis.net/training-exercises.html
https://www.cybrary.it/
where you will gain skills such as (
- Malware file Analysis (static and dynamic)
- Phishing email analysis
- log analysis
- URL analysis
)
Then i tried Splunk Training which they offer on their own site which is free
https://www.splunk.com/
then the best way is to build your own home lab and there is multiple video on youtube that walkyouthrow : one example :
https://www.youtube.com/watch?v=XR3eamn8ydQ
then create your resume and then start postulating for jobs and keep learning on the way. there is a lot more to learn
Comments
Post a Comment