Page 33 - Cybersecurity Career Guide
P. 33

ECT cy WHAT THEY DO
n  a or organization and find creative ways to protect it
n nt n Manage and monitor networks to remediate unauthorized activities
n Conduct assessments of threats and vulnerabilities
JOB TITLE EXAMPLES
Ethical Hacker
Incident Responder
Chief Information Security Officer
Penetration Tester
Intelligence Analyst
Security Analyst
DEGREE OR TRAINING
Computer Science
Cybersecurity
Information Assurance
IT and Security
Network Security
CALLING ALL
(ETHICAL) HACKERS
(  an ty web-based applications, networks,
 I g aid s o l that you will design yourself, you
simulate real-life cyberattacks,
 i n  Blue Team exercises that mimic
cyber warfare. Your ultimate aim is
to help an organization improve its
cybersecurity. Most pen testers
  Since ethical hacking is more about
t a yb rs
’s ou have the right experience.
VISION C nceptuali e, design, an build  cur  IT s stems. O
n
C n  for v rus,  pyw re,
o et ction
n
n usions  o computer
systems n test co put r
ap tems
n
A  or software
n nology  esearch
an ent n stems
req s and
develo t
n
Test and n alua e s stems
JO XAM LES
C ogrammer
stems An lyst
So veloper
ineer
I  Assurance  eveloper
urity A alyst
Sy urity A alyst
Sy chitect
 Technology
Director
D RAININ G
C ience
Ne Networking
or Systems tr En ineerin Y C ATION TESTER  E: L U PROGRA ER.N T: 9 SKI LS  S
.
H U B T WILL GET YOU A J NIOR P NET 





































   31   32   33   34   35