top of page
  • Linkedin
  • bluesky
  • Instagram

Notes: Careers in Cyber | Try Hack Me

  • solbergtonje
  • 10 dec. 2024
  • 2 min läsning

Uppdaterat: 11 dec. 2024


Security Analyst

- maintain security of organisation's data

- construct security - protect company

- explore and evaluate company networks for engineers to develop preventative measures

- analyse cyber security throughout company

- compile reports, documenting issues and measures taken

- develop security plans


Security Engineer

- design, monitor, maintain security controls, network, and systems to prevent cyber attacks

- develop and implement security solutions

- retain and adopt security measures to mitigate the risk of attack and data loss

- testing and screening security measures

- monitor network and reports to update systems and mitigate vulnerabilities

- identify and implement systems needed for optimal security


Incident Responder

- identifies and mitigates attacks during attack

- respond to security breaches

- creating plans, policies and protocols for organisations during and following incidents

- assessments and responses required in real-time

- incident response metrics include: MTTD, MTTA, MTTR

- aim to achieve effective response, retain financial standing and avoid negative breach implications

- protect company's data, reputation and financial standing from cyber attacks

- develop and adopt incident response plan

- maintain security best practice and supporting incident response measures

- post-incident reporting and preparation for future attacks


Digital Forensics Examiner

- digital forensics to investigate incidents and crimes

- collecting and analysing evidence

- analyse incidents like policy violations

- collect digital evidence, observing legal procedures

- analyse digital evidence

- document findings and report on the case


Malware Analyst

- analyse all types of malware to learn

- analysing suspicious programs, reports on findings

- a reverse-engineer

- converting compiled programs from machine language to readable code, usually low-level language (assembly language, C)

- needs a strong programming background

- static analysis of malicious programs

- dynamic analysis of malware samples, observing activities in controlled environment

- document and report findings


Penetration Tester

- testing technology products for security loopholes

- pentesting / ethical hacking

- test security of the systems and software

- attempts to uncover flaws and vulnerabilities

- exploit vulnerabilities to evaluate the risk in each instance

- for companies to prevent real-worl-cyberattack

- conduct tests on computer systems, networks and web-based applications

- perform security assessments, audits and analyse policies

- evaluate and report on insights, recommending actions for attack prevention


Red Teamer

- plays the role of an adversary attacking an organisation and providing feedback from an enimies perspective

- test a company's detection and response

- imitating cyber criminals actions, emulating malicious attacks, retaining access and avoiding detection

- assess organisation's security controls, threat intelligence, and incident response

- evaluate and report on insights with actionable data for companies to avoid real-world instances

Contact / Kontaktformulär

© 2024-2025 Tonje Solberg

bottom of page