Page 32 - Cybersecurity Career Guide
P. 32

types of careers
ATE and MAI TAIN Pro ide sup ort, ad nistration, an mai tenance nec ssary to
re eff ctive and eff sec cient IT  ys em per ormance and eff sec rity.
Of ll the pat mos s, th  one has the pat mos  job ope ings.
WH  THE  DO
n lop, su ort, an mai net tain dat bases and mai net orks
n
M n ge int llectual cap tal and con ent
n
I n all, co igure, te , op ate, ma tain, an man ge net ork
ser er con igurations, ac ss, fi walls, an pat hes
JOB TIT E EXA PLES
Cus omer/Technical Sup ort
Spe ialist
Dat  or  base at base Spe ialist
Dat ialist
Inf rmation Sys ems
Sec rity Eng neer
Net ork Spe ialist
Sys em Adm nistrator
DEG EE OR  RA NING
Com uter Sci nce
Inf rmation Tec nology
Net ork/Computer Sys ems
WHO WHO DONE IT?
di s  d e s a o s s     d   n r puter examiner Eric Robi says, “A computer forensic analyst has to
rk  nd  . A an expert’s job is devoted to writing reports and explaining evidence.
In the case of criminal prosecutions, you need be able to explain
-
gr grounds. Can you defend your findings when cross-examined by
e p  c r  le le be crystal clear!
OVERSEE
and GOVERN
Provide leadership, management,
direction, development and
advocacy so that individuals and
organizations may effectively
conduct cybersecurity work.
WHAT THEY DO
n Oversee the cybersecurity
program
n Offer legal or policy advice
and recommendations
n Manage the technical direction
and strategic plan for an
organization n May include e-commerce,
privacy, copyright, and
intellectual property
JOB TITLE EXAMPLES
Chief Information Officer
Cyber Security Trainer
Lawyer or Legal Advisor
Policy Analyst
ADVANCED DEGREE
OR TRAINING
Business
Criminal Justice
Information Technology
Law g
START-ENGI G.COM CYBERSECURI ERD RI FORENSI DE
38 39
SOU CE:  YBERDE R ES.ORG: B COME A S EXPERT SOUR 





































   30   31   32   33   34