the one who will do the hands-on configuration of a sys-
Cybersecurity Specialist / Technician tem and do things under the direction of a cybersecurity
analyst
Cyber Crime Analyst / Investigator the one who works a lot in the digital forensics' realm
the one who focuses on responding to a data breach or
Incident Analyst / Responder other type of cyberattack that happens across your orga-
nization
a large overall encompassing term for a lot of the other ar-
Cybersecurity Analyst
eas, as well as a senior position inside most organizations
somebody who breaks into somebody's systems with their
Penetration Tester
permission to identify their vulnerabilities
the one responsible for observing all of the operations
Cybersecurity Manager / Administrator occurring across the network and managing the infra-
structure that facilitates those operations
is focused on building tools and techniques and design-
Cybersecurity Engineer ing the entire system at a big, large level for the organiza-
tion
a senior-level executive who oversees an organization's
Chief Information Security Oflcer (CISO)
information, cyber, and technology security
A senior position within an organization's security team
with direct responsibility for protecting sensitive informa-
Cybersecurity Analyst
tion and preventing unauthorized access to electronic data
and the systems that protect it
Any device that processes or uses our information is cov-
Cybersecurity Analyst
ered by the role of a
Cybersecurity Analyst
, Functions of a :
ÏImplementing and configuring security controls
ÏWorking in a SOC or CSIRT
ÏAuditing security processes and procedures
ÏConducting risk assessments, vulnerability assessments,
and
penetration tests
ÏMaintaining up-to-date threat intelligence and problem
solving
A location where security professionals monitor and pro-
Security Operations Center (SOC)
tect critical information assets in an organization
Security Operations Center (SOC) This is like a security monitoring center
This is where junior analysts overseen by senior analysts
are trying to find what's known as indicator of compro-
Security Operations Center (SOC) mise. Usually exist for larger corporations, government
agencies, and
health care organizations
ÏHave the authority to operate
ÏHave motivated and skilled professionals
ÏIncorporate processes into a single center
Security Operations Center (SOC) ÏEquipped to perform incident response
ÏProtect itself and the organization at large
ÏCan separate the signal from the noise
ÏCollaborate with other SOCs for data sharing
should be the single point of contact for security, monitor-
Security Operations Center (SOC) ing,
and incident response
mitigates vulnerabilities and risk to ensure the confiden-
Security Control tiality, integrity, availability, nonrepudiation, and authenti-
cation of data