I am thinking of doing a course on how to make 6 figures in IT Security. What do you think? Is this something you would be interested in? This is something I know a lot about.
I would explain:
The landscape of IT Security
Career paths in IT Security
How to choose the right path
How to prepare for that path
What kinds of IT security jobs make 6 figures
What places and companies pay 6 figures
What certifications, degrees and experience you need to start
How to build a bad ass IT security resume
where to post it
how to respond once offers start coming in
Check out my FREE courses at: https://securitycompliance.thinkific.com
In this video we read some of your questions about getting IT Security Jobs.
“I have a B.A in Telecommunications, would this work for this career field.” see the answer at 00:00:45
“Hey Bruce I got my security + and cap. What do you suggest on how to get into the risk management/ security auditing field when someone doesn’t have any experience? I do have 7 years experience in desktop support and data center monitoring just want to try a different field but not sure how to go about this.”
answer at 00:02:53
“What training is need to get into the security field? I have a BS in information security and working a MS in Cybersecurity and working on getting my CEH cert. What are ways that I can get into the security field as I don’t have any security experience and most jobs postings are wanting at least 4 to 5 years of experience”
answer at 00:06:26
****SHIFT WORK – ONLY THOSE CANDIDATES REPLY WHO ARE INTERESTED IN 12-hour Shift work on the AM shift from 1AM-1PM on a 2-3-2 (Every other weekend off) schedule *****
TAC Information Security Analyst (Must be a US Citizen)
The Tier I Information Security Analyst is responsible for executing day-to-day tasks in the Security Operations Center 24×7. These tasks include: answering the NASS security support hotline, monitoring the NASS security support mailbox, creating tickets for client requests, monitoring and responding to Instant Messaging applications, and executing a variety of scripted actions on timed intervals. This position will also act as Tier I support for several endpoint services.
Eyes on glass monitoring and resolution of security incidents within established customer Service Level Agreements.
Perform daily operational ‘eyes on glass’ real-time monitoring and analysis of security events from multiple sources including but not limited to events from Security Information Monitoring tools, network and host based intrusion detection systems, firewall logs, system logs (Unix & Windows), mainframes, midrange, applications and databases.
Monitors and analyzes attempted efforts to compromise security protocols.
Identifies and investigates activities and conducts and provides analyses regarding results.
Escalates issues to higher level associates.
Reviews computer logs and messages to identify and report possible violations of security.
Coordinates, documents, and reports on internal investigations of security violations.
Interacts with customers to understand their security needs; assists in the development and implementation of procedures to accommodate them.
Writes security status reports to provide system status, report potential and actual security violations and provide procedural recommendations.
Bachelor’s degree or equivalent combination of education and experience in Information Security is required.
Zero or more years of experience in information systems security.
Experience working with operating systems.
Experience working with domain structures and digital signatures.
Experience working with computer desktop packages such as Microsoft Word, Excel, etc.
Communication skills to interact with team members, management, and support personnel.
Analytical and problem solving skills for design, creation and testing of security systems.
Ability to work independently and as part of a team.
Title: Cyber security / Information Assurance Analyst Location: Monterey, CA Duration: Full Time Client: Defense Language Institute
Active Secret security ClearanceDuties may include:• Support an Information Systems Security, Education, Training, and Awareness Program.
• support implementation and enforcement of Information Security Policies and Procedures.
• Review and update all Information Systems Security Plans/SSPs and support certification and accreditation efforts.
• Provide technical support in the areas of vulnerability assessment, risk assessment, and security implementation.
Information Assurance HBSS ACAS STIG Retina, MacAfee
We are working on an app that will allow quick navigation of the National Cybersecurity Workforce Framework version 2. It will be pretty simple for now.
Version 1.x features Will Include:
All Categories mapped to Special Areas
In future versions we will include certifications that apply to each Special Area. I am waiting for DoDD 8140 because I think it will match up with National Cybersecurity Workforce Framework version 2.
Secretary of Defense Ashton B. Carter talked about rebuild the bridge between Washington and Silicon Valley. He spoke at Stanford using keywords like “transparency” to connect with the audience.
Dr. Ashton Carter has a PHD from Oxford in theoretical physics. He is not a dumb guy. It is a smart move to talk directly to the Americas next group of “cyber” pioneers to solicit help. But many of these millennials are concerned with things like Snowden and the Patriot Act. So the Pentagon might what to address those types of things to get more Stanford and MIT student on their side.
The Secretary of Defense mentioned a recent declassified successful attack on the Pentagon by Russian sources. He was putting out a call to action to help. Ashton said, . “Renewing our partnership is the only way we can do this right.”