| | CAREER OUTLOOK
directed. Who will develop, control, and protect these sensors and technologies?
Strategic Big Data
Large public, private, and nonprofit organizations will leave behind “a single enterprise data warehouse containing all information needed for decisions,” and consider “multiple systems, including content management, data warehouses, data marts and specialized file systems tied together with data services and metadata, which will become the ‘logical’ enter- prise data warehouse.”
Actionable Analytics
As cost drops and capability rises, organizations will want to analyze all the big data they capture through every computing device. Who will develop the processes to make that so?
What’s Next in Cybersecurity Job Opportunities Cybersecurity professionals don’t use magical powers to prepare for emerging trends in threat assessment and defense. The pros stop, look, listen and analyze. The following sectors are the most promising for students to investigate.
Advanced Threat Manager
RSA Security Solution, an EMC Company, calls Advanced Threats “highly-targeted, amply-funded” cyber-attacks on spe- cific organizations using multiple vectors such as malware and scans for vulnerability plus a “low and slow” technique where an attack is launched from single computers not a bot herd to evade detection.
Cloud Architect
Stanton Gatewood, the chief information security and ePrivacy officer of the University System of Georgia, says this field needs graduates who will deploy ensure end-to-end secure encryp- tion for local and cloud providers, and oversee cloud defense training for users, technologists, and management.
Mobility Management and BYOD Officer
Cyber criminals are rationalists and recent news must thrill them. There are six billion cellphone subscriptions, Microsoft launched its Surface tablet, the iPad Mini is on sale and the updated iPad too. Information technology professionals that devise, execute, and manage effective mobile and BYOD (Bring Your Own Devices) strategies for public, private and non-profit organizations will be in hot demand..
Healthcare Application/Medical Device Security The expansion of Obamacare alone will boost the demand for IT professionals to protect healthcare records, personnel man- agement, and infrastructure. The potential remote hacking of
64 WOMENOFCOLOR | SPRING 2013 Mobility Defense
Government Executive magazine reports that “between 2011 and 2016 data traffic on smart phones will grow by 110 percent compounded annually.” The federal government will need IT specialists to respond to the burgeoning use of the use, misuse, and cybersecurity of the smart devices that public employees possess.
The Federal Data Center Consolidation Initiative This agency needs computer engineers, computer scientists, cybersecurity, construction engineers, and other information technology specialists.
www.womenofcolor.net
Sophos, founded in 1985, is a $400 million IT security and data protection firm with headquarters in Boston, and Eng- land.
Big Data Security Guardian Gartner is hailed as the world’s leading information technol- ogy research and advisory company. In 2013, Gartner projects that big data will comprise $28 billion projected IT spending of $34 billion. According to
Techrepublic.com, “Big data is the massive amount of rapidly moving and freely available data that potentially serves a valuable and unique need in the mar- ketplace, but is extremely expensive and difficult to mine by traditional means.” Crooks and hacktivists want access to Big Data. It’s your job to protect your organizations Big Data using monitoring tools and defensive processes.
Penetration Testers
Like to hack, but want to wear a white hate and avoid fines or imprisonment? The goal is just what it sounds like licensed penetration testers carry out assaults, on the payroll of the targeted organization or a contractor, to find, test, document, and train IT specialists how to overcome digital vulnerabilities. The EC-Council (
http://www.eccouncil.org/) provides training for those who want to lead block cyber crooks.
X-ray machines, pacemakers, insulin pumps and other device demands that healthcare hire more cybersecurity specialists.
Network Security
The Sophos 2012 Network Security Survey (http://www.
sophos.com/en-us/security-news-trends/security-trends/ network-security-survey.aspx)of IT leaders makes a bold open- ing statement. IT departments shouldn’t think that protecting their network perimeter will make their network. Skilled, inno- vative employees are vital as “Cloud services, mobile devices, remote workers and wireless networks are all expanding the network boundary beyond its traditional reach.”
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42 |
Page 43 |
Page 44 |
Page 45 |
Page 46 |
Page 47 |
Page 48 |
Page 49 |
Page 50 |
Page 51 |
Page 52 |
Page 53 |
Page 54 |
Page 55 |
Page 56 |
Page 57 |
Page 58 |
Page 59 |
Page 60 |
Page 61 |
Page 62 |
Page 63 |
Page 64 |
Page 65 |
Page 66 |
Page 67 |
Page 68