All Aboute Jobs

Download as txt, pdf, or txt
Download as txt, pdf, or txt
You are on page 1of 2

Experience and expertise in application security, cybersecurity, network security,

information security, and malware analysis.


Excellent communication and presentation skills.
Experience in IT or cybersecurity roles.
Certifications in cybersecurity (e.g., CISSP, CompTIA Security+, CEH) are a plus.
Bachelor's degree in Computer Science, Information Security, or related field.

Network Security
Penetration Testing
Vulnerability Assessment
Computer Engineering
Cybersecurity
Ethical Hacking
Information Assurance
Information Security
Information Technology

Security Analyst - Security analysts are integral to constructing security measures


across organisations to protect the company from attacks. Analysts explore and
evaluate company networks to uncover actionable data and recommendations for
engineers to develop preventative measures. This job role requires working with
various stakeholders to gain an understanding of security requirements and the
security landscape.
Responsibilities-
Working with various stakeholders to analyse the cyber security throughout the
company
Compile ongoing reports about the safety of networks, documenting security issues
and measures taken in response
Develop security plans, incorporating research on new attack tools and trends, and
measures needed across teams to maintain data security.

Application Security
Cataloging
Data Classification
Data Governance
Data Lineage
Data Privacy
Data Security
Endpoint Security
Ethical Hacking
Information Security

Security Engineer - Security engineers develop and implement security solutions


using threats and vulnerability data - often sourced from members of the security
workforce. Security engineers work across circumventing a breadth of attacks,
including web application attacks, network threats, and evolving trends and
tactics. The ultimate goal is to retain and adopt security measures to mitigate the
risk of attack and data loss.
Responsibilities-
Testing and screening security measures across software
Monitor networks and reports to update systems and mitigate vulnerabilities
Identify and implement systems needed for optimal security

Incident Response- Incident responders respond productively and efficiently to


security breaches. Responsibilities include creating plans, policies, and protocols
for organisations to enact during and following incidents. This is often a highly
pressurised position with assessments and responses required in real-time, as
attacks are unfolding. Incident response metrics include MTTD, MTTA, and MTTR - the
meantime to detect, acknowledge, and recover (from attacks.) The aim is to achieve
a swift and effective response, retain financial standing and avoid negative breach
implications. Ultimately, incident responders protect the company's data,
reputation, and financial standing from cyber attacks.

Responsibilities
Developing and adopting a thorough, actionable incident response plan
Maintaining strong security best practices and supporting incident response
measures
Post-incident reporting and preparation for future attacks, considering learnings
and adaptations to take from incidents

Digital Forensic Examiner- If you like to play detective, this might be the perfect
job. If you are working as part of a law-enforcement department, you would be
focused on collecting and analysing evidence to help solve crimes: charging the
guilty and exonerating the innocent. On the other hand, if your work falls under
defending a company's network, you will be using your forensic skills to analyse
incidents, such as policy violations.

Responsibilities
Collect digital evidence while observing legal procedures
Analyse digital evidence to find answers related to the case
Document your findings and report on the case

Malware Analyst- A malware analyst's work involves analysing suspicious programs,


discovering what they do and writing reports about their findings. A malware
analyst is sometimes called a reverse-engineer as their core task revolves around
converting compiled programs from machine language to readable code, usually in a
low-level language. This work requires the malware analyst to have a strong
programming background, especially in low-level languages such as assembly language
and C language. The ultimate goal is to learn about all the activities that a
malicious program carries out, find out how to detect it and report it.

Responsibilities
Carry out static analysis of malicious programs, which entails reverse-engineering
Conduct dynamic analysis of malware samples by observing their activities in a
controlled environment
Document and report all the findings

Penetration Tester-

You might also like