Skip to main content

Jumping the Pond: Making the sideways move into CyberSec


So far, a large portion of this blog has been dedicated to helping people begin their careers within the Cyber Security sector from the beginning, i.e. straight from college or university. This week, I’d like to explore the options for those looking to make the move from other career paths, specifically with an eye to those looking at managerial positions. If you are already coming from an IT background, this post might have one or two things you might find useful, but you’ll probably have access to other resources that might be better suited to your needs.

I want to note here that while this will guide you through some of the options and a few certifications that will help move into CyberSec, some technical competency is a must. A good level of understanding of the technologies and principles underlying those technologies is unavoidable in this field, as you’ll see below. My suggestion would be to look at my earlier blogs and some looking around, as I won’t go into depth about technical knowledge here, as the same technical certifications and knowledge from those blogs apply.

N.B., You will notice that I use the terms ‘Cyber Security’ and ‘Information Security’ interchangeably. While these two terms have different definitions, in this context both do apply. See here for a good definition of both terms, and their differences.

This week, I’d like to give you a general overview of what is expected of a manager in the CyberSec, on top of leading a team to its fullest potential. This is to give you an idea of what to expect, to give you a better idea of what is involved and if it is for you. Next week, I’ll go through a few of the certifications that will boost your CV and your chances of moving into the field.

Roles and Responsibilities


As a Cyber Security manager, your title will cover various, diverse duties, all of which are crucial to aiding the company avoid risk and exposure. This position isn’t just about managing staff, evaluating their performance and justifying your department’s budget and existence: it requires full engagement with the organisation on different levels. The following are amongst the most important responsibilities that come with the role:

Monitor all operations and infrastructure – This will be the bulk of your team’s daily duties, and it is important you understand the role of your analysts and operations staff. Going through the security and event logs can be a tedious task, but it’s also the point at which breaches, risks and vulnerabilities are likely to be found.

Maintain security tools and technology – Almost certainly a joint effort with your organisation’s security office, it is important to keep these up-to-date and in compliance with your policies.

Monitor internal and external policy compliance – Writing and enforcing security policy, as well as auditing and renewing it periodically, is an important aspect of the role – making sure that both your company and its external vendors are complying to your security policies.

Monitor regulation compliance – This might be an aspect of your role you may want to delegate, particularly if you handle lots of personal identifiable data, particularly considering GDPR. With the large fines involved in failing to comply with legislation and regulation, this is one area that requires extra care.

Work to reduce risk – Designing training and writing reminder memos and emails are just some of the measures you can take to help bring everyone in your organisation up to speed with security practices.

Implement new technology – Investigation new technologies and evaluating their risk factors and the mitigation techniques you need to take to roll that technology out.

Ensure cybersecurity stays on the organisational radar – This one speaks for itself. You will be required to ensure that everyone knows that security is everyone’s responsibility, and it needs to be pro-actively kept on top of.

Detail a security incident response program - Every organization should have a well-defined, well-documented response plan to be executed if a security incident does occur. The plan should detail each team member’s roles and responsibilities in such an event, as well as the guide to how to proceed in the aftermath of an incident, i.e. gathering evidence, reporting to the correct authorities, what the priorities are in terms of business continuity. It would also be advisable to have those involved run through some simulated incidents, so the plan is smoothly executed if needed.

Comments

Popular posts from this blog

This is not a New Year’s Resolution

I'm not a one for resolutions or anything, I prefer to at least try to be a bit more practical than that. Instead, now that I've had time to consider what I want to do this year, here my list of upcoming projects. Let me know what yours are: 1) Re-evaluate the website and blog, and actually keep to a posting schedule. Might help if I started using artwork/photos. 2) Social Media application for my desktop: I'm getting a bit sick of having and average of 20 browser tabs open at a time, so lets see if I can't design an app, even if it's just a fixed browser thing, I can use to track my SM activity in one place so it's not clogging up my precious browser memory. 3) Stop wasting time with my writing projects: My biggest issue here is that while I can write some flowery prose or engage in worldbuilding like I'm Slartibartfast, I don't actually have a tale to tell. I need to adjust my focus here, and maybe I'll get something out of it. 4) Top Secre...

The Cultural Value of Algorithms

I am aware that there are misgivings amongst the musical community about Spotify's business model, and from the bits I know, these are perfectly reasonable. Unfortunately, it is useful and productive consumer model, and it's this I want to briefly write at you about. Spotify's catalogue is huge, an ever-expanding horizon that seems to want to engulf the soundscape in totality. It's easy to use, and you can usually find the album or artist you want to listen to. But it's true genius is in its algorithms, specifically the ones it uses to create the playlist it constantly nudges you to listen to. Now, because of how pushy it seemed, I avoided my Discover Weekly and Release Radar playlist like the plague for ages. This was a mistake. Or maybe, because I hadn't listened and followed enough, they just weren't right for me yet. Now, however, I spend a good two days paying attention to them, and then expanding my aural sphere to at least 3 of the recommend...

You and who’s party?

“I don’t care to belong to any club that will have me as a member” Groucho Marx Much of the past 17 years has been dedicated to fighting fundamentalist extremism, largely of the religious persuasion. This is understandable, as the religious mindset, certainly in those areas of the globe where faith is a majority holding, affects and informs the cultural values of society, and certainly in the West we have found ourselves at odds with extremist Islamic groups. Fundies of the Muslim persuasion have been at the forefront f these combative efforts, although we have also seen the dangers of the looming Christian theocratic state. It is fair to say while this will be an ongoing struggle, it is one we are coming to understand very well and are able to combat. But what of other types of fundamentalist creeds? What of political fundamentalism? This is, I fear, something we are neglecting to talk about, instead preferring to remain steadfastly tribalised to the point where discuss...