Cybersecurity Careers.

SAI CHARAN
3 min readJul 14, 2021

Exploring the career options you can take in Cybersecurity.

Photo by Austin Chan on Unsplash

Obtaining a position in cybersecurity is not easy. While some people enter the security field right out of college, the majority begin their careers in other areas of IT before getting into Cybersecurity.

As Cybersecurity jobs often require expert knowledge and industry experience no company wants to risk their security by keeping it in the hands of a fresher, many people begin their careers in other IT roles and subsequently move on to security roles.(Not in all cases)

The Security Jobs

  • Ethical Hacker: Ethical hackers or white hat hackers do not intend to harm the system or organization, but they do it officially, to penetrate and locate the vulnerabilities, then they will submit a report on their findings to the organizations, which will help the organization to fix vulnerabilities before they get exploited.
  • Blue Team: A blue team consists of security professionals who have an insider’s perspective on the organization. Their job is to protect the organization’s critical assets from any threat. They are well-versed with the organization’s security strategy. As a result, their mission is to secure firewalls so that no intruder can breach the defenses.
  • Red Team: Exactly opposite to blue team, they play the role of intruders, their role is to break the defenses, firewall and enter into the organization, As a result of these simulated attacks, red teams make recommendations and plans on how to improve the organization’s security.
  • Security architect: Security architects ensure the security of system designs and configurations. They examine network, application, and architecture designs and make recommendations to improve system security. This position requires more experience.
  • Incident responder/ Forensic Analyst: Incident responder, they all work with an organization after a security breach, they focus on monitoring and detecting threats and ensure recovery after an incident had occurred.
  • Bug Bounty Hunters: They need not work for an organization, they can work individually, bug bounty is a deal offered by many websites, organizations, and software developers by which individuals can receive recognition and compensation for reporting bugs, especially those pertaining to security exploits and vulnerabilities.
  • Malware analyst: A malware analyst’s primary responsibility is to identify, investigate various types of malware and their delivery methods. Adware, bots, bugs, rootkits, spyware, ransomware, Trojan horses, viruses, and worms are all examples of malicious software. After the organization’s incident response team has identified an attack, the malware analyst does reverse engineering to see from where the malware has entered and secures the organization.

LAST BUT NOT THE LEAST-THE BOSS

  • Chief Information Security Officer(CISO): This is every security person’s dream position, and mine too. They are the bosses in charge of the organization’s security and the top of the security professional hierarchy. They are in charge of the company’s security strategies as well as the security person’s in the organization. Not only that, but they manage things from a high level and required to make impactful decisions, so CISO’s require both security knowledge and good management skills.

Thanks for reading! Did I miss any another position, feel free to reach out and let me know at chittuluri19@gmail.com.

DISCLAIMER

--

--