When cybersecurity first became a field of study 25 years ago, the majority of practitioners were coming from operational IT positions. Businesses created specialized security positions as the Internet grew and firewalls were installed, making security duties more demanding.
People who worked in these early cybersecurity positions eventually learned a little bit about everything and developed into generalists. Since then, most of these generalists have either specialized or transitioned into management due to the abundance of new technological opportunities.
New recruits lack the time to learn the generalists' historical expertise. Instead, they will select a security specialization that best suits their skills and interests from a wide range of options.
Engineering defenses, testing security, and responding to intrusions are the three main responsibilities of a cybersecurity professional. Smaller organizations might assign all these jobs to a single individual or add them on top of non-security work.
For each of these professions, foundational cybersecurity skills are required, including:
On top of this foundation, cybersecurity engineers, testers, and responders construct specialized capabilities, many of which can be learned in cybersecurity boot camps and industry training classes.
Traditionally held IT positions like network engineers or system administrators are where many cybersecurity engineers have their roots. They are heavily involved in designing administrative controls and make use of a variety of instruments, most of which are technical.
The most typical positions in cybersecurity are those of cybersecurity engineers. The majority work for an IT organization, therefore they report to the head of technology via the IT chain of command. However, being integrated into IT can make their security functions less effective. The fundamental issue is the conflicting objectives: although IT focuses on installation and maintenance, security needs occasionally demand implementations to be delayed in order to reduce risk. The fact that the head of IT is in charge and can veto decisions regarding security presents another potential issue.
A cybersecurity engineer must be familiar with the organization's technology and technical infrastructure due to the complexity of some intrusions.
They also need a solid understanding of how the particular technical controls in their field operate. For instance, networking engineers should be familiar with firewall capabilities and restrictions as well as the specifics of the implemented solution within their company.
Additionally, even simple controls should be implemented and maintained with an understanding of the economic and the cultural aspects.
One of the most glamorous positions in cybersecurity is that of a tester because they are the ones that break into systems, discover errors, and seek for gaps before an attacker does.
Outsourced cybersecurity testers are frequently used because of their independence. Please be careful, if the tester is external, the healthy rivalry between engineers and testers may worsen and develop into a hostile relationship.
Cybersecurity testers can be integrated into IT-like cybersecurity engineers when they work full-time for an organization. Nevertheless, they might occasionally work in a different division, like legal or compliance. Application security testers occasionally work with quality assurance divisions in a company's development division.
A cybersecurity tester's job is to challenge everything, even assumptions. Acquiring knowledge about threat-modeling strategies like STRIDE is one method to assist with this.
Testers should also have some programming skills (if hacking) or statistical understanding (if auditing) because they frequently need specialized tools and procedures that are occasionally self-developed.
Additionally, they must convey their results, define risks in terms of business concerns, and record the testing they perform with thorough citations of supporting documentation including screenshots, source code, and compliance guidelines.
Responders to cybersecurity incidents prepare for and reduce security incidents. Attacks may occasionally be detected and stopped, and on occasion, assist in tidying up the messes and bringing systems back online. Many of them look into who the attackers were, what they did, and how to track them down. Some even try to recover digital evidence from acts that weren't cybercrimes.
In smaller businesses, responding personnel are frequently contracted out. When they are internal, they can be found in legal or IT, depending on whether they are focused on forensics or recovery and repair. They can occasionally be found under operational risk in the general business continuity organization.
Responders are often under acute stress, whether dealing with ransomware that’s shut down the entire organization, gathering evidence that can affect someone’s future, or performing post-incident forensics in potentially litigious situation.
Responders need to wrangle resources for cyber incidents, such as appropriate cyber insurance, intrusion detection tools, and forensic and malware analysis tools. They should also develop government, legal and law enforcement contract resources to assist with incidents.
In a variety of settings such as boardrooms, conferences, and courtroom depositions, they might be required to report on happenings. Writing and presenting skills are therefore useful.
Some people may find the overlap between the categories to be too great, and many different cybersecurity standards and practices can conflict with one another.
In our introduction, we advised cybersecurity career aspirants to specialize. However, if they become very specialized, it could be more difficult for them to interact with others outside of their niche, because the actual world doesn't always follow neatly defined categories, actual professional pathways don't either.