Joining the Cybersecurity Revolution: What it means, where the jobs

advertisement
Joining the Cybersecurity
Revolution: What it means,
where the jobs are, how
you can join
Agenda
What is Cybersecurity?
Sources of threats and attacks
What are the impacts?
Where do you come in?
Types of jobs
How do you get in?
Prerequisites
Challenges
What is Cybersecurity?
•
•
•
aka Information security, IT security,
information assurance
encompasses computer security, network
security, internet security, application
security, disaster recovery, business
continuity
BOTTOM LINE: Its the protection of data
and systems from cyber threats and attacks.
Sources of threats and attacks?
•
Hackers (script kiddies, professionals)
•
Hacktivists
•
Insiders
•
Criminals
•
Foreign countries (cyber terrorism, cyber
espionage, cyber warfare)
What are the Impacts?
•
•
•
•
•
•
•
•
Financial loss
Intellectual property theft
Brand/reputation compromise
Fraud
Legal exposure/lawsuit
Loss of shareholder value
Extortion
Loss of control to critical infrastructure systems
that operate chemical, electricity, and water
plants. (derail trains, shut down power grids)
Where do you come in?
There is high demand for Cybersecurity pros
"The need for cyber professionals across all industries is likely to continue to
surge in the near future, hiring professionals say..." -Washington Post
"They need cybersecurity expertise on the architectural level and the
programming level. They're going to certainly encounter new threats as they
open up their network to a whole new function." -Networkworld
"The federal government says a potential cyberattack is the most serious
economic and national security threat the United States faces, but it faces a
shortage of skilled experts who could head off that threat, Homeland
Security Secretary Janet Napolitano warns.“ -CNN
"We don't have enough security professionals and that's a big issue." –Reuters
"The scarcity is reflected throughout the education system, from primary
schools to universities. There are fewer graduates in STEM areas, and
women are particularly underrepresented – a big problem for a field that
already lacks diversity." –FCW
Types of Jobs
Government/Gov't Contractor/Private
Application security tester
Vulnerability researcher
Security analyst
Mobile code tester
Penetration tester
Program manager
Information assurance engineer
Legal
Information assurance analyst
Developer
Reverse engineer
Policy & procedure writer
Malware analyst
Security architect
Forensics
Code reviewer
Incident response
Network security engineer
Vulnerability analyst
Technical writer
How to get in?
•
•
•
•
•
•
•
•
•
•
•
Current job - cross train
Intern
Cyber competitions
College w/ job placement
Law enforcement
Job fairs
Company websites
Join security groups
Find a mentor
Network
Immerse yourself
Prerequisites
•
•
•
IT background
Work your way up (helpdesk, sys admin,
network admin, developer)
Education
o
•
•
•
Degree in Computer Science, Cybersecurity,
Forensics, IT
Training - Hands-on, not just theory. Linux
Certs - A+, Security+, Microsoft, Cisco, CEH...
Patience, persistence, self-motivation
Challenges
•
•
•
•
•
•
•
Security has many areas
Lack of experience
Getting a job - catch 22 - no experience
Male-dominated field - bias, attitudes
Discriminatory practices with salaries and promotion
Security clearance process long & complex
There isn't a pipeline in place
Resources
Get Training/Experience
o Self-study (books, blogs/sites, videos/webcasts)
o Build a lab - live distros, virtual machines
o Intern
Security groups
o ISSA
o Meetup.com
o Linkedin
o InfraGard
Internships
o
o
o
o
http://www.todaysengineer.org/2011/Aug/career-focus.asp
http://www.nsa.gov/careers/opportunities_4_u/students/index.shtml
https://www.fbijobs.gov/23.asp
http://www.dhs.gov/cybersecurity-recruitment-and-development-programs
Resources cont'd
Company websites
o Google top 100 govt contractors, Fortune 500 co's
o Those that must comply with regulations (financial,
o
utilities, retail, healthcare,
USAJOBS.gov, dice.com, indeed.com, careerbuilder, monster
Cyber competitions
o
U.S. Cyber Challenge (USCC)
Colleges w/ job placement
o NSA-COE
 Scholarship for Service Program
o Rochester Institute of Technology
Vocational Schools
Resources cont'd
Mentorship
o
Current company, Women's Society of Cyberjutsu
Conferences
o
Defcon, Blackhat, Sharkfest, many more
Free online courses
o
o
Coursehero
INE -CCNA Associate Video Course
Videos
o
Securitytube.net, youtube, webcasts
More info on getting into Cybersecurity:
http://krebsonsecurity.com/2012/06/how-to-break-into-security-ptacek-edition/
http://pentest.cryptocity.net/careers
Thank you
Women's Society of Cyberjutsu
www.womenscyberjutsu.com
info@womenscyberjutsu.com
703-828-4507
Download