The Most In-Demand Security Jobs and How to Get Them

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
Next The Most In-Demand Security Jobs and How to Get Them-8 Next

Intelligence

“Intelligence is a bit of a different animal in the information security career field. It still requires many of the same base skills as an incident response analyst, albeit maybe not to the same level of depth, but has the added requirement of understanding intelligence: the intelligence lifecycle, collections, developing various types of intelligence analysis, and ultimately creating timely and relevant intelligence products,” said Travis Farral, director of Security Strategy at Anomali.

Farral explained that there are two primary tracks into information security intelligence. One is through traditional intelligence training (either through a university or through military training). The other common path to a career in intelligence is learning skills in the intelligence field as an information security professional, but this path requires a lot of legwork for interested candidates to expand out of traditional security into the nuanced intelligence knowledge.

Anywhere high-tech is used creates a demand for security technology professionals. “We need to make sure every door has a lock, so to speak,” said PK Agarwal, regional dean and CEO of Northeastern University-Silicon Valley and former CTO for California under Governor Schwarzenegger.

Security professionals are in demand right now. Entry-level security jobs, according to Corey Wilburn, security practice manager at DataEndure, fall into either an engineer or analyst role.

“An engineer role would be primarily accountable for the deployment, integration and maintenance of technology-based security controls,” Wilburn explained. “An analyst, on an incident response or security operations team, would handle the review of data feeds generated by technology-based security controls to track down potential malicious activity within an organization.”

Every career path needs a starting point, but these security jobs could take you down the road to a C-level position someday.

 
 
More Slideshows

Remote wipe 10 Steps Your Organization Should Take to Keep Mobile Device Data Secure

In the wake of new reports of serious breaches of mobile devices and data, security professionals share their tips for securing mobile devices and their favorite security solutions. ...  More >>

Privacy rollback Security Pros Give Their Opinions on ISP Data Privacy Rollback

IT staff, organization leaders, and the average citizen have all expressed levels of concern over the FCC about-face in regard to ISP privacy. Here’s what the security experts say. ...  More >>

IBM Watson How and Why Companies Are Incorporating the Power of IBM Watson

Watson continuously learns from previous interactions, gaining in value and knowledge over time. Learn how companies are harnessing that AI power to create and improve products and services. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.