Career in Cyber Security

:)

In today's world, Cyber security is one of the most fascinating job fields. Be it fresher or experienced IT professional, it attracts everyone.




When it comes to career, Cyber security has unlimited career options and with unlimited career options, it creates some sort of confusion. It’s not always easy to find the right career path in Cyber Security. Also, a cyber security professional's responsibilities may vary, but the role can be simplified into one function: "Protect a company's data from being compromised by an attack".
 
This post will help all those people who want to make a career in the cyber security field. Here we will discuss all major pathways in Cyber Security. So let’s start –





1) VAPT (Vulnerability Assessment & Penetration Testing) – 

It is an attempt to evaluate the security of an IT infrastructure by checking and exploiting the vulnerability. It helps the organization to protect itself by providing a clear vision of security loopholes and guidance to address them.

 

Phases of VAPT :




 

2) SOC (Security Operation Centre)  - 

          An information security team who is responsible for an organization’s security postures on an ongoing basis is called SOC. The monitor, detects, investigate and respond to cyber-threat.

      Whenever they see any suspicious traffic, they trigger an alarm called an incident. Incident management is a process that defines the life cycle of an event from detection to erasure.

 

         Phases of SOC :




 

3) IAM (Identity and Access Management)

        It is an essential part of overall IT security that manages digital identities and user access to data, system and resources within an organization. It works on the principle of Least Privilege wherein each employee has been granted with least privilege that is required to complete his/her job. 

     To mitigate the risks, improve compliance, and increase efficiencies across the enterprise  IAM  programs are necessary.

      

4) GRC (Governance and Risk Compliance) -  

Governance, risk, and compliance programs enable an organization to identify and mitigate risks with appropriate controls and initiatives while ensuring compliance. It defines how a unique set of risks is handled by an organization.
 
Governance is the effective management of an organization by those at the top who are liable for it. The common field of governance are :  

  • Corporate governance
  • IT governance
  • Business governance
  • Legal governance.

The proper management of risk is also called as Heart of any information security management system. Experienced and professional risk managers know how to continuously monitor risk performance and use feedback to make timely decisions without affecting the business.

 

Phases of GRC :




 
 

5) BCDR (Business Continuity and Disaster Recovery)


          Methods and procedures required to mitigate the impact of a disaster on the information and data required for critical business processes.
 
It implements a well-written and properly tested plan that allows recovery personnel to manage recovery efforts resulting in the timely restoration of services.

 

Phases of BCDR :



To wrap up the post, The options are unlimited. You just need to explore your interest and dive into Cyber Security world.

Thanks for reading.

:)

 
 
 

Comments

  1. You are sharing a particularly decent article here. It is a significant and factual article for us. Thankful to you for sharing an article like this.soc in healthcare USA

    ReplyDelete

Post a Comment

Popular posts from this blog

SQL Injection – “Let’s dump the database”

XML Injection

Formula Injection