Infosec Career Paths v8 Long

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

Career Paths in Information Security v8.

0
14th September, 2017
Have you ever considered a career in computer security but didn’t know how to get started?
The Information Security industry is an exciting and diverse place to work in the 21st century, but how do you get started, especially if you’ve no
background in security? It seems that most advertised jobs (in newspapers, LinkedIn, Jobserve, etc.) require years of experience, and often ask
for qualifications that are impossible to obtain for people new to the industry (such as the all-pervasive CISSP). What can you do to get your foot
on the first rung of this very tall ladder and eventually land the job of your dreams?

What was once seen as a back-room career for hackers, geeks and mathematicians has completely changed over the last 10 years, evolving into
an industry of many diverse and fascinating disciplines, from architects to business leaders, programmers to crypto engineers, and all the myriad
jobs in between – here are a few of the job titles you might end up with if you obtain the right levels of experience and training:

 Information Security Manager


 Chief Security Officer
 Risk Manager
 Operational Security Manager
 Digital Forensics Analyst
 Security Architect
 Penetration Tester
 Security Requirements Manager
 Security Programmer
 Malware Analyst
 Intrusion Analyst
 Incident Response Manager

www.infosecskills.com © Copyright 2017 InfoSec Skills Limited. All rights reserved.


Or you might decide to become a Subject Matter Expert (SME) in some kind of security technology, such as:

 Firewalls
 Intrusion Prevention Systems
 Access Control Systems
 Smart cards
 Biometrics
 Encryption technology

This is not by any means an exhaustive list, instead it is used simply to illustrate the range of jobs, from technical to business roles, available in
the security industry. Looking at this list it’s easy to see that there is something for most people should they wish to get involved. But how do
you get started?

There are in fact many routes into the information security industry, some of which are easier to take than others. To reach the lofty heights of
managing a professional hacking team (known in the industry as pen testing), for example, you will need many years of experience in working
with customers, scoping penetration tests and ensuring that what you are doing yields the right level of results for your clients without creating
an unrecoverable denial of service against their systems. Nevertheless, you could potentially get hired as a junior pen tester if you demonstrate
the right mindset to your potential employer. Working as a systems administrator, for example, is a great place to start. If you are already in the
IT industry in another area, you will more than likely be aware of what information security is all about. Taking the skills of a system admin
forward into the security marketplace is not that hard. A really good system administrator who understands scripting and operating systems
basics, who demonstrates an aptitude for finding and solving tricky problems, makes the best sort of penetration tester. Starting with a testing
scope, such as to break into a particular application, the system administrator would use all the tools and techniques he’d normally use for
finding why an application was misbehaving to locate weaknesses (known as vulnerabilities). Then, using some additional skills (which can be
trained), the sys admin can then make the application misbehave and potentially give up some secrets. This is how hackers operate and how
ethical hackers (working for good – and usually money) also operate.

www.infosecskills.com © Copyright 2017 InfoSec Skills Limited. All rights reserved.


What if you are a code monkey? There are plenty of programmers in the world who know very little about secure coding, so by learning the
techniques and weaknesses of modern programming languages and system architectures, you can build code that is stronger and more resistant
to hacking, and for this you can command a decent pay rise. Again, these are all skills that can be learned through academic and professional
training.

So, it might seem that if you take a course in security coding, you can become a security professional? Is that true? Unfortunately not! To
become a true security professional, using the most modern of definitions, you need a firm grounding right across many different aspects of
security, not just your chosen specialised subject. This is why the organisation responsible for the baseline security qualification known as CISSP
(Certified Information Systems Security Professional), (ISC)2, has created a curriculum of study that is so wide and diverse. To become a Certified
Information Systems Security Professional you need to pass a six hour exam covering ten separate business domains, as follows:

 Access Control
 Telecommunications and Network Security
 Information Security Governance and Risk Management
 Software Development Security
 Cryptography
 Security Architecture and Design
 Operations Security
 Business Continuity and Disaster Recovery Planning
 Legal, Regulations, Investigations and Compliance
 Physical (Environmental) Security

However, to get certified as a CISSP, you also need to demonstrate that you have 5 years operating at a professional level therefore, this is
unobtainable for newbies just entering the industry. The problem is, no CISSP means no job in many cases, as the CISSP has become the HR gate
you need to get through to even get as far as the interview stage. In an industry that is so unbelievably short of blood, it seems ridiculous that
there is no way to get your foot on the ladder. There must be a better way. Well, there is now…

www.infosecskills.com © Copyright 2017 InfoSec Skills Limited. All rights reserved.


It was estimated earlier in 2014 that there are 2.2 million people employed in the global information security sector. By 2015, (ISC)2 predicts this
number will have risen to 4.25 million security professionals. Yet, this is predicated on there being enough new blood coming into the industry to
meet that growth target. The issue the industry faces is: how do we attract this new talent, especially into the niches within the niche, such as
getting people into digital forensics, reverse engineering malware and penetration testing. One way to address this is, over the past few years,
the UK and American governments have been running annual cyber security competitions to attract new talent into the industry. This
competition in the UK is known as the “Cyber Security Challenge” and offers a series of information security-related competitions that anyone
can have a go at. The trials get harder and harder until the final showdown between the last contestants eventually leads to a Cyber Security
champion being crowned. Along with many of the other finalists, this Cyber Security champion receives all sorts of specialist training, job offers
and academic scholarships.

Australia has followed suit with its own cyber security competition, which began in April 2012, and was hailed a great success by the media.
These competitions serve an important purpose in identifying people with aptitude, raising awareness about the industry to the general public,
and in most cases they generate many hours of media coverage (even inspiring full-length documentaries on information security). All this
publicity helps expose the information security sector to those who might be interested but have not considered it as a viable option. Some
statistics from Microsoft UK suggest the IT industry will generate 78,000 new jobs over the next four years, yet e-Skills UK has reported that its
own research confirms a 50% decline in young UK residents entering the IT industry over the past five years. As only a small proportion of these
new IT entrants make it into security, then there is an imminent crisis looming.

This is why the British Computer Society (BCS) has now developed its new professional Certificate in Information Security Management
Principles. This course, unlike the CISSP, is an entry-level course and is open to anyone who is interested in getting into security. You can take a
CISMP 5-day training course and at the end of it you are ready to take the exam, which is run by BCS. This exam covers all the same subject
matter as the CISSP exam, but it doesn’t quite go as deep into the ten domains. Nevertheless, passing the CISMP is seen by the UK government
as a good enough foundation to apply to become a CESG Listed Advisors Scheme consultant, which is the minimum requirement for government
security professionals, therefore it’s rapidly becoming the must-have qualification to gain in Information Security.

InfoSec Skills provides an online version of the 5-day training course, therefore making it uniquely accessible for those people wanting to study
to become security professionals, while still working in their day job.

www.infosecskills.com © Copyright 2017 InfoSec Skills Limited. All rights reserved.


The Certificate in Information Security Management Principles (CISMP) course is designed to provide the foundation of knowledge necessary for
individuals who have information security responsibilities as part of their day-to-day role, or who are thinking of moving into an information
security function.

The CISMP course and associated qualification provides the opportunity for those already serving as information security professionals to
enhance or refresh their knowledge and, in the process, gain a recognised industry qualification, regulated by the British Computer Society (BCS).
This is useful to both the individual and employer in terms of attesting to the level of professional ability an individual has attained.

CISMP covers the following areas:

 Information Security Management Principles


 Information Risk
 Information Security Framework
 Procedural/People Security Controls
 Technical Security Controls
 Software Development and Lifecycle
 Physical and Environmental Control
 Disaster Recovery and Business Continuity Management
 Other technical aspects
 Preparation for the CISMP Examination and Mock Exam

So, getting your foot in the door, with a professional qualification is the best start to a new career path. Whatever your current job, be it project
manager, risk manager, programmer, systems administrator, or even if you are in an unrelated job, such as a property manager or a retail
worker, there is a place for you in the security industry if you are interested in learning about it. Taking the CISMP is the best way to get started
and it’s something that InfoSec Skills can help you with.

www.infosecskills.com © Copyright 2017 InfoSec Skills Limited. All rights reserved.


What's more, to really kick start your new career in Information Security and help you get recognised as a professional, when you pass the CISMP
exam after training with InfoSec Skills, you are entitled to a free one year membership as an Associate Member of the British Computer Society
(AMBCS), which gives you all the benefits of professional registration as well as a cool post-nominal to put after your name. Read on for more
information...

Associate Membership for successful BCS Professional Certification candidates The benefits of Associate (AMBCS)
membership
We are providing successful BCS Professional Certification candidates with a year’s Associate
(AMBCS) membership. Associate membership delivers a range of
services designed around the professional
Access to membership for a year offers successful candidates a taste of what it’s like to belong needs of today’s competent IT practitioners.
to the leading industry body for IT and the kind of support they could receive to help them
reach their career potential.  Professional recognition
Tools to gain recognition within the industry include post
nominal letters AMBCS, and a defined path to Chartered
Why become a member? status via Professional membership.

 Career development
‘I think that if you want to be considered a professional, it’s important to join To plan and track progression, members use our CPD
your professional body. The Institute helps me keep abreast with current portal and full access to Browse SFIAplus, the online tool
that allows them to explore the industry framework for IT
developments in the field and has added interest and satisfaction not only skills, training and development.
professionally but socially as well.’
Dr C James Bacon, MBCS  Networking
Top people, great ideas and the latest thinking locally,
nationally and online - our global networking
How do Professional Certification candidates receive their membership? opportunities are unrivalled and include branches,
specialist groups and the Member Network.
Following the successful completion of a BCS Professional Certificate and the notification of  Knowledge and best practice
result, candidates will receive an activation email / letter with details of a dedicated web From the latest industry news to our massive online
library, the Institute’s information services keep members
portal where they can complete their details and confirm their agreement to the BCS Code of up to date with best practice, and at the cutting edge of
Conduct. IT.

 Exclusive discounts and offers


This will activate their membership and they will then be able to start enjoying the full Adding even more value to membership, our discounts
Associate (AMBCS) membership benefits package. and free services enable members to enjoy savings both
at work and at home.

www.infosecskills.com © Copyright 2017 InfoSec Skills Limited. All rights reserved.


UK - Informa�on Security Career Paths
This career path diagram illustrates the poten�al career progression you can make in informa�on security. It recognises the importance of awarding body professional cer�ficates and your experience over �me,
CYBER CAREER ACADEMY and provides a high level alignment with BCS membership grades, the SFIA framework, the IISP framework and the CESG framework. As you can see the various frameworks overlap each other, mainly because
these frameworks have either 3, 6 or 7 levels. This view allows you to map cer�ficates to job roles and see what development needs should be followed to advance in seniority and even transi�on to a new career.
Above all, we want to point you in the right direc�on and provide you with the links for further research so you can make an informed decision regarding your future.

Framework Typical Job Roles Sample Professional Cer�ficates Personal Development


Level Experience
Public Sector Private Sector
Set strategy / inspire

7 15+ years

CREST:
Fellow

Level 6 (Ini�ate, Enable, Ensure)

CREST Cer�fied Web Applica�on Tester (CCWAT) Business management experience


CREST Cer�fied Infrastructure Tester (CCIT) Strategic planning
CREST Cer�fied Simulated A�ack Manager (CCSAM)
Lead Prac��oner
Ini�ate / Influence

CREST Cer�fied Simulated A�ack Specialist (CCSAS)


CREST Cer�fied Threat Intelligence Manager (CCTIM)
6 10+ years Lead Accreditor
Lead IA Auditor
Chief Informa�on Security Officer
Managing Consultant/Director/Partner CREST Cer�fied Wireless Specialist (CCWS)
CREST Cer�fied Network Intrusion Analyst (CCNIA)
Chief Security Architect
Lead SIRA Head of Specialism IISP/BCS/APMG: CREST Cer�fied Host Intrusion Analyst (CCHIA)
Lead IA Architect Lead Risk Management Prac��oner NCSC Cer�fied Professional Scheme (Lead) CREST Cer�fied Malware Reverse Engineer (CCMRE) BCS: Fellow (FBCS) membership
Lead ComSO) Lead Informa�on Security Officer CREST Cer�fied Incident Manager (CCIM)
Lead IT Security Officer (ITSO) Prepara�on for significant informa�on security
Lead Penetra�on Tester management role
Lead Penetra�on Tester Lead Security Architect
Chartered Professional

Principal Consultant/Senior Manager CREST Registered Threat Intelligence Analyst (CRTIA)


CREST Prac��oner Threat Intelligence Analyst (CPTIA)
Level 5 (Advise)
Ensure / Advise

Senior Consultant/Manager CREST Registered Technical Security Architect (CRTSA)

5 6-10 years Senior Accreditor


Senior Security Architect
Informa�on Security Officer
Informa�on Risk Manager IISP/BCS/APMG:
CREST Prac��onerTechnical Security Architect (CPTSA)
CREST Registered Intrusion Analyst (CRIA) BCS: Chartered (CITP) IT Professional
Senior IA Auditor CREST Prac�oner Intrusion Analyst (CPIA)
Senior SIRA Business Con�nuity Manager NCSC Cer�fied Professional Scheme (Senior) Further prac�oner courses and industry cer�fica�ons
Senior Penetra�on Tester CREST Registered Penetra�on Tester (CRT)
Senior IA Architect Incident Manager
Senior ComSO CREST Prac��oner Security Analyst (CPSA)
Senior Intrusion Analyst Seek higher level security roles and prepare to:
Senior IT Security Officer (ITSO) Service Delivery Manager . take full organisa�onal responsibility
Senior Penetra�on Tester Senior Secure So�ware Programmer PECB: . operate with higher level stakeholders
(ISC)2 :

Your Career Progression


Senior Digital Forensic Analyst ISO/IEC 27035 Lead Incident Manager
Senior Prac��oner

CISSP - ISSAP
ISO/IEC 27001 Lead Auditor
Level 4 (Enable)

CISSP - ISSEP
ISO/IEC 27001 Lead Implementer CISSP - ISSMP Further prac�oner courses and industry cer�fica�ons
Consultant
4 Accreditor
Enable

4-7 years IA Auditor Governance Manager CISSP - Cer�fied Info. Sys. Sec. Professional to gain breadth and depth
IISP/BCS/APMG:
Security & Informa�on Risk Advisor (SIRA) Security Architect NCSC Cer�fied Professional Scheme (Prac��oner) CSSLP - Cer�fied Secure So�ware Lifecycle Prof.
IA Architect Risk Management Prac��oner SSCP - Systems Security Cer�fied Prac��oner Seek higher level security roles and prepare to:
Communca�ons Security Officer (ComSO) Intrusion Analyst HCISPP - HealthCare Informa�on Security and . widen remit
IT Security Officer (ITSO) Penetra�on Tester ISACA: Privacy Prac��oner . increase authority
Service Delivery Prac��oner CGEIT - Cer�fied in the Governance of Enterprise IT CCSP - Cer�fied Cloud Security Professional . manage teams
Penetra�on Tester . specialise further
Business Con�nuity Architect CRISC - Cer�fied in Risk & Informa�on Systems Control
Professional

CAP - Cer�fied Authoriza�on Professional


Digital Forensic Analyst CISA - Cer�fied Informa�on Security Auditor IISP: Full (M.Inst.ISP) membership
Secure So�ware Programmer CISM - Cer�fied Informa�on Security Manager
ISO - 27001 Lead Auditor Cer�ficate (ISC) 2 Full membership
Level 3 (Apply)

Prac��oner
Apply

3 3-4 years
Consul�ng Analyst/Associate
Governance Analyst
Risk Management Analyst
BCS:
PCiIAA - Informa�on Assurance Architecture
GIAC:
GPEN - PenTester
BCS: Full (MBCS) membership
Prac�oner courses and industry cer�fica�ons
PCiIRM - Informa�on Risk Management GWAPT - Web App Pen Tester to gain breadth and depth
Solu�on Architect GCFA - Cer�fied Forensic Analyst
Service Delivery Analyst PCiDP - Data Protec�on
PCiBCM - Business Con�nuity Management GCFE - Cer�fied Forensic Examiner Seek higher level security roles for:
Digital Forensic Examiner . other security areas
Intrusion Analyst CISMP - Informa�on Security Management Principles GSEC - Security Essen�als
. increased responsibility and authority
Network Security Engineer
Security Sysems Analyst GCI: IISP: Associate (A.Inst.ISP) membership
Security Administrator SASP - Solu�on Architecture Security Prac��oner CompTIA: BCS: Associate (AMBCS) membership
Level 2 (Assist)

Trainee Service Delivery Analyst FCIS - Founda�on Cer�ficate in Informa�on Security CompTIA - Security+ (ISC) 2 Associate membership
InfoSec Career
2 star�ng point
Assist

Network Administrator CompTIA - Network+


CompTIA - Linux+ IISP: Affiliate membership
System Administrator IISP: Student membership
Network Engineer CompTIA - A+
1-2 years BCS membership provides services and
Web Administrator
Associate

IT Technician benefits to support your career development


IT Technical Support Review your current skills and skill levels by crea�ng
Level 1 (Follow)

IT Customer Service Level 4 - Higher Appren�ceship in Informa�on Security a Skills Profile and iden�fy any skill gaps ahead of
taking specific cer�fica�ons

1
Follow

Level 3 - Advanced Appren�ceship in Informa�on Security


InfoSec Skills Profile + Goals + Ac�vi�es =
Personal Development Plan
CESG:
SFIA:

SFIA:
BCS:

IISP:

Produced and maintained by: InfoSec Skills Limited, Atlan�c House, Imperial Way, Reading RG2 0TD Telephone: +44 (0)20 8144 2303 Email: info@infosecskills.com Web: www.infosecskills.com © 2017 InfoSec Skills Ltd. All rights reserved.
www.infosecskills.com © Copyright 2017 InfoSec Skills Limited. All rights reserved.

You might also like