search.noResults

search.searching

note.createNoteMessage

search.noResults

search.searching

orderForm.title

orderForm.productCode
orderForm.description
orderForm.quantity
orderForm.itemPrice
orderForm.price
orderForm.totalPrice
orderForm.deliveryDetails.billingAddress
orderForm.deliveryDetails.deliveryAddress
orderForm.noItems
CAREERS


Advice


appeal to those who have a natural talent for investigating and seeing what others might have missed.


fingertips C


At your


Take a look at the top jobs in cybersecurity, an exciting industry often overlooked by graduates, writes Cyber Security Challenge UK’s Jason Stanton


ybersecurity is one of the fastest-developing industries in the world. The number of cyber-attacks rises year on year


and cybercriminals are not only becoming more audacious with their attacks but are becoming more organised as well. Their main target is the business sector, creating a huge demand from companies for individuals who can defend their networks and critical data from the onslaught of cyber-attacks. As a result, both the number and the type of roles available in cybersecurity have grown extensively. They are some of the most varied and rewarding jobs in the world that will offer a career like no other. However, the digital skills gap has meant that the cybersecurity industry is struggling to recruit the number of professionals it needs, meaning that graduates often overlook the roles available. Listed below are some of the roles that might capture the imagination.


Penetration tester


One of the most glamorised roles in the cybersecurity industry, a penetration tester legitimately tries to hack into networks and


14 WhatLive.co.uk Spring 2018


operating systems to identify vulnerabilities and report them back to the client. Often referred to as an ‘ethical hacker’, they are hired by companies that want areas of their IT infrastructure tested in a controlled environment. Penetration testers will have an extensive knowledge of the ever-evolving cybersecurity threat landscape and will keep up to date on the latest tools used by cybercriminals. This is an exciting role requiring creativity to try and beat the system’s defences.


Information security crime investigator/ forensics expert


As with a physical crime, a cybercrime will leave behind clues that the information security crime investigator will have to identify and build a report from to explain exactly where and how the crime took place. The role combines the analytical skills and attention to detail of a forensics expert with the technical acumen of a cybersecurity professional. The information security crime


investigator will be knowledgeable in the latest methodologies employed to exploit systems. This is a job like no other and will


Security architect A security architect is the individual who is responsible for maintaining the security of a company’s computer system. They will need to think like a hacker, anticipating the tactics that a hacker would employ and build the necessary defences to negate them. They are responsible for analysing security threats and recommending solutions to protect information and data. The security architect will be responsible for identifying which software is needed and for implementing it across an organisation.


Malware analyst The majority of cybercriminals will use the tools developed by others to carry out their crimes. Only a select group of cybercriminals have the skills to actually design and develop the digital weaponry known as malware. These developers are constantly updating and creating new forms of this malicious software to infect and disrupt systems. On the defending side are the malware analysts. They take the malware captured from cybercriminals, analyse it and reverse engineer it to understand exactly how it works, the damage it can do to computer networks and how to defend against it. The malware analyst will also attempt to adapt the software so it can be used to build programmes designed specifically to defend against similar types of malware.


Chief information security officer A chief information security officer (CISO) is a senior-level role that requires a unique blend of cybersecurity technical skills and business acumen. CISOs will balance legal, regulatory, technical and internal business requirements on a daily basis, while also considering financial constraints, risks and technological adoption. The CISO is ultimately responsible for


reducing an organisation’s operational risks by implementing the necessary security processes. Their duties range from creating security policies to conducting digital forensic investigations. Despite being a high-pressure position, it is also one of the most exciting jobs in cybersecurity. They will make decisions on implementing the organisation’s cybersecurity and will work with both the IT department and external law enforcement agencies.l


cybersecuritychallenge.org.uk


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52  |  Page 53  |  Page 54  |  Page 55  |  Page 56  |  Page 57  |  Page 58  |  Page 59  |  Page 60  |  Page 61  |  Page 62  |  Page 63  |  Page 64  |  Page 65  |  Page 66  |  Page 67  |  Page 68