Notes: Careers in Cyber | Try Hack Me
- solbergtonje
- 10 dec. 2024
- 2 min läsning
Uppdaterat: 11 dec. 2024
Security Analyst
- maintain security of organisation's data
- construct security - protect company
- explore and evaluate company networks for engineers to develop preventative measures
- analyse cyber security throughout company
- compile reports, documenting issues and measures taken
- develop security plans
Security Engineer
- design, monitor, maintain security controls, network, and systems to prevent cyber attacks
- develop and implement security solutions
- retain and adopt security measures to mitigate the risk of attack and data loss
- testing and screening security measures
- monitor network and reports to update systems and mitigate vulnerabilities
- identify and implement systems needed for optimal security
Incident Responder
- identifies and mitigates attacks during attack
- respond to security breaches
- creating plans, policies and protocols for organisations during and following incidents
- assessments and responses required in real-time
- incident response metrics include: MTTD, MTTA, MTTR
- aim to achieve effective response, retain financial standing and avoid negative breach implications
- protect company's data, reputation and financial standing from cyber attacks
- develop and adopt incident response plan
- maintain security best practice and supporting incident response measures
- post-incident reporting and preparation for future attacks
Digital Forensics Examiner
- digital forensics to investigate incidents and crimes
- collecting and analysing evidence
- analyse incidents like policy violations
- collect digital evidence, observing legal procedures
- analyse digital evidence
- document findings and report on the case
Malware Analyst
- analyse all types of malware to learn
- analysing suspicious programs, reports on findings
- a reverse-engineer
- converting compiled programs from machine language to readable code, usually low-level language (assembly language, C)
- needs a strong programming background
- static analysis of malicious programs
- dynamic analysis of malware samples, observing activities in controlled environment
- document and report findings
Penetration Tester
- testing technology products for security loopholes
- pentesting / ethical hacking
- test security of the systems and software
- attempts to uncover flaws and vulnerabilities
- exploit vulnerabilities to evaluate the risk in each instance
- for companies to prevent real-worl-cyberattack
- conduct tests on computer systems, networks and web-based applications
- perform security assessments, audits and analyse policies
- evaluate and report on insights, recommending actions for attack prevention
Red Teamer
- plays the role of an adversary attacking an organisation and providing feedback from an enimies perspective
- test a company's detection and response
- imitating cyber criminals actions, emulating malicious attacks, retaining access and avoiding detection
- assess organisation's security controls, threat intelligence, and incident response
- evaluate and report on insights with actionable data for companies to avoid real-world instances




