<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.itcollege.ee/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Mavald</id>
	<title>ICO wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.itcollege.ee/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Mavald"/>
	<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php/Special:Contributions/Mavald"/>
	<updated>2026-05-05T06:51:39Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.45.1</generator>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142306</id>
		<title>Hiring a Cyber Security Incident Analyst</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142306"/>
		<updated>2022-05-01T16:59:20Z</updated>

		<summary type="html">&lt;p&gt;Mavald: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==A Cyber Security Incident Analyst==&lt;br /&gt;
&lt;br /&gt;
[[File:image1.png|600px|thumb|Job advertisement &amp;lt;ref&amp;gt;&amp;quot;Job Advertisement&amp;quot;. Available at https://www.projectpeople.com/jobs/&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
===Cyber security incident analyst in SOC/CSIRT/CERT===&lt;br /&gt;
This article delves into the job title of Cyber Security Incident&lt;br /&gt;
Analyst and provides an overview of the acronyms SOC/CSIRT/CERT. A brief&lt;br /&gt;
history of the job is discussed here, as well as a possible career path,&lt;br /&gt;
education, experience, and other characteristics required for work in&lt;br /&gt;
computer security-related organizations. The article also provides a&lt;br /&gt;
brief history of SOC/CSIRT/CERT, as well as a comparison of their&lt;br /&gt;
differences and similarities.&lt;br /&gt;
===Cyber Security Incident Analyst Skill Set===&lt;br /&gt;
What skill set is expected from the Cyber Security Incident Analyst? Below written lines are taken from the same job advertisement depicted&lt;br /&gt;
on the left side of this article:&lt;br /&gt;
As a Security Incident Analyst your responsibilities will include:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Continuous monitoring of security tooling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Performing regular and ad-hoc vulnerability assessments&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Carrying out ‘spot checks’&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Reporting vulnerabilities to the PVG via the alerts system&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintaining and documenting logging systems&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Developing centralized logging, reporting and intelligence&lt;br /&gt;
platforms&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;‘Light touch’ penetration testing with open source tooling&lt;br /&gt;
(Metasploit)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Knowledge &amp;amp;amp; Experience required:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;SOC, CSIRT or CERT operational environment experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Windows / Linux experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TCP /IP networking protocol knowledge&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience reviewing and analyzing Security Events from various&lt;br /&gt;
monitoring and logging sources&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience in website and web application security assessment or&lt;br /&gt;
penetration testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience of using Metasploit&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Scripting knowledge using BASH, Python, Perl, Ruby&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Skills in Host and Network Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
As one can see the description of the duties is wide and also the&lt;br /&gt;
knowledge and experience that is required is noteworthy. So, where to&lt;br /&gt;
start to find out the way to get this kind of knowledge and&lt;br /&gt;
expertize.&lt;br /&gt;
===Possible career path===&lt;br /&gt;
Next part of the paper is aiming to depict a possible ways, how to&lt;br /&gt;
develop oneself, and move along the career pathway in cybersecurity&lt;br /&gt;
field. Topics of development, education, experience and certification&lt;br /&gt;
are covered.&lt;br /&gt;
[[File:analystimage2.png|1000px|thumb|Career path &amp;lt;ref&amp;gt;&amp;quot;Possible Career Path&amp;quot;. Available at https://www.cyberseek.org/pathway.html&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
===Junior/Senior===&lt;br /&gt;
Start with an entry-level job in IT. Hands-on experience is often the&lt;br /&gt;
most effective way to prepare for certification exams. Start&lt;br /&gt;
accumulating work experience with an entry-level role as a cybersecurity&lt;br /&gt;
analyst. Many cybersecurity professionals start off in more general IT&lt;br /&gt;
roles. The skills, practices, and technologies you’ll use as a&lt;br /&gt;
cybersecurity professional will continue to evolve along with computer&lt;br /&gt;
and network technology. The desire to learn, ability to problem solve,&lt;br /&gt;
and attention to detail will serve you well in this field. Other, more&lt;br /&gt;
technical skills and technologies to learn include:&amp;lt;ref name=&amp;quot;certification&amp;quot;&amp;gt;Popular Cyber Security Certificates [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications  [Accessed 25 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====SIEM tools (security information and event management)====&lt;br /&gt;
Security Information and Event Management (SIEM) is a set of tools&lt;br /&gt;
and services offering a holistic view of an organization’s information&lt;br /&gt;
security. SIEM works by combining two technologies:&lt;br /&gt;
&amp;lt;li&amp;gt;Security information management (SIM), which collects data from log&lt;br /&gt;
files for analysis and reports on security threats and events, and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;security event management (SEM), which conducts real-time system&lt;br /&gt;
monitoring, notifies network admins about important issues and&lt;br /&gt;
establishes correlations between security events. There are a number of&lt;br /&gt;
security information and event management solutions on the market.&lt;br /&gt;
ArcSight ESM, IBM QRadar and Splunk are among the most popular. &amp;lt;ref name=&amp;quot;SIEM&amp;quot;&amp;gt;Application security, SIEM [Online]. Available: https://www.imperva.com/learn/application-security/siem/. [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Firewalls, Intrusion Detection Systems (IDS), and Intrusion Prevention Systems(IPS)====&lt;br /&gt;
Firewalls can be two types, hardware and software firewalls. Software&lt;br /&gt;
firewall is a firewall that is installed on a computer or server, and&lt;br /&gt;
tasked with network security. It works with a wide variety of other&lt;br /&gt;
technology security solutions to provide more robust and cohesive&lt;br /&gt;
security for enterprises of all sizes. When a software firewall is&lt;br /&gt;
installed on a server, it opens up like an umbrella of protection over&lt;br /&gt;
all other computers connected to the network. It is able to monitor both&lt;br /&gt;
incoming and outgoing traffic for potential risk or suspicious user&lt;br /&gt;
behavior, and also makes setting security policies much easier, faster&lt;br /&gt;
and more flexible. Hardware firewall is positioned between the network&lt;br /&gt;
and devices, allowing traffic to funnel through the firewall for a close&lt;br /&gt;
inspection and analysis. A hardware firewall, a term often&lt;br /&gt;
interchangeable with network or next-generation firewall, protects the&lt;br /&gt;
network gateways for an enterprise. Hardware firewall is physical&lt;br /&gt;
hardware, installed between network elements and connected devices, and&lt;br /&gt;
is tasked with filtering traffic for cyber threat to the network or&lt;br /&gt;
devices. Filtering out unauthorized or suspicious users based on traffic&lt;br /&gt;
analysis is one of the biggest benefits of hardware firewall. &amp;lt;ref name=&amp;quot;sangfor&amp;quot;&amp;gt;Sangfor, &amp;quot;What is Software Firewall? Difference between Hardware Firewall and Software Firewall, [Online]. Available: https://www.sangfor.com/blog/cybersecurity/what-is-software-firewall-difference-between-hardware-firewall-and-software-firewall [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems&lt;br /&gt;
(IPS) are both parts of the network infrastructure. IDS/IPS compare&lt;br /&gt;
network packets to a cyberthreat database containing known signatures of&lt;br /&gt;
cyberattacks — and flag any matching packets. IDS doesn’t alter the&lt;br /&gt;
network packets in any way, whereas IPS prevents the packet from&lt;br /&gt;
delivery based on the contents of the packet, much like how a firewall&lt;br /&gt;
prevents traffic by IP address. &amp;lt;ref name=&amp;quot;Varonis&amp;quot;&amp;gt;Varonis, &amp;quot;What is Software Firewall? IDS vs. IPS: What is the Difference?, [Online]. Available: https://www.varonis.com/blog/ids-vs-ips [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Digital forensics====&lt;br /&gt;
Digital forensics is a branch of forensic science that focuses on&lt;br /&gt;
identifying, acquiring, processing, analyzing, and reporting on data&lt;br /&gt;
stored electronically. Electronic evidence is a component of almost all&lt;br /&gt;
criminal activities and digital forensics support is crucial for law&lt;br /&gt;
enforcement investigations. Electronic evidence can be collected from a&lt;br /&gt;
wide array of sources, such as computers, smartphones, remote storage,&lt;br /&gt;
unmanned aerial systems, shipborne equipment, and more.&amp;lt;ref name=&amp;quot;interpol&amp;quot;&amp;gt;Interpol, &amp;quot;Digital forensics&amp;quot;. Available: https://www.interpol.int/How-we-work/Innovation/Digital-forensics. [Accessed 28 4 2022].&amp;lt;/ref&amp;gt; &lt;br /&gt;
Investigative process of digital forensics can be divided into several stages. There are four major stages: preservation, collection,&lt;br /&gt;
examination, and analysis. All these four stages need a deep understanding of computers, technology across a broad spectrum, and cybersecurity principles and&lt;br /&gt;
practices, a working knowledge of computers, networks, and coding, in-depth investigative abilities, critical-thinking skills and analytical talent the ability to effectively communicate and work with a&lt;br /&gt;
wide range of people. &amp;lt;ref name=&amp;quot;ecpi1&amp;quot;&amp;gt;&amp;quot;Digital forensics&amp;quot;. Available: https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me. [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Mobile device management====&lt;br /&gt;
Mobile device management (MDM) is software that allows IT&lt;br /&gt;
administrators to control, secure and enforce policies on smartphones,&lt;br /&gt;
tablets and other endpoints. Mobile device management software emerged&lt;br /&gt;
in the early 2000s as a way to control and secure the personal digital&lt;br /&gt;
assistants and smartphones that business workers began to use. The&lt;br /&gt;
consumer smartphone boom that started with the launch of the Apple&lt;br /&gt;
iPhone in 2007 led to the bring your own device (BYOD) trend, which&lt;br /&gt;
fueled further interest in MDM.&amp;lt;ref name=&amp;quot;techtarget&amp;quot;&amp;gt;Techtarget, &amp;quot;Mobile Device Management&amp;quot;. Available: https://www.techtarget.com/searchmobilecomputing/definition/mobile-device-management [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Data management====&lt;br /&gt;
Sometimes the data management is neglected, but this part has a&lt;br /&gt;
crucial role when learning for good cyber security practices. Majority&lt;br /&gt;
of cyber security programs include a special courses on data management.&lt;br /&gt;
Data management is a method of organizing and maintaining data processes&lt;br /&gt;
that are required in almost every business operations. The benefits of&lt;br /&gt;
data management can be found accounting, statistics, logistics planning&lt;br /&gt;
and other disciplines including corporate computing.&amp;lt;ref name=&amp;quot;GlobalUni&amp;quot;&amp;gt;Global Universities, &amp;quot;MSc Data Management and Cyber Security&amp;quot;. Available: https://globaluniversities.in/msc-data-management-cyber-security. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Data governance (and management) play a fundamental role in&lt;br /&gt;
protecting an organization’s data. Ensuring that the right people have&lt;br /&gt;
the right access and that appropriate security controls are in place to&lt;br /&gt;
protect each system or service, based on the criticality or sensitivity&lt;br /&gt;
of the data sets these contain. &amp;lt;ref name=&amp;quot;CyberMagazine&amp;quot;&amp;gt;Cyber Security Magazine, &amp;quot;The Role of Data Governance in Cybersecurity&amp;quot;. Available: https://cybersecurity-magazine.com/the-role-of-data-governance-in-cybersecurity/?utm_source=rss&amp;amp;amp;utm_medium=rss&amp;amp;amp;utm_campaign=the-role-of-data-governance-in-cybersecurity. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Application security development====&lt;br /&gt;
Application security describes security measures at the application&lt;br /&gt;
level that aim to prevent data or code within the app from being stolen&lt;br /&gt;
or hijacked. It encompasses the security considerations that happen&lt;br /&gt;
during application development and design, but it also involves systems&lt;br /&gt;
and approaches to protect apps after they get deployed. Application&lt;br /&gt;
security may include hardware, software, and procedures that identify or&lt;br /&gt;
minimize security vulnerabilities.&amp;lt;ref name=&amp;quot;vmware&amp;quot;&amp;gt;VmWare, &amp;quot;What is application security?&amp;quot;. Available: https://www.vmware.com/topics/glossary/content/application-security.html [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Application security development is important to ensure that your&lt;br /&gt;
application is free from coding errors and bugs. And controls the risk&lt;br /&gt;
and helps safeguard against security vulnerabilities. Application&lt;br /&gt;
security development is the process of making applications more secure&lt;br /&gt;
by finding and fixing security vulnerabilities. This is often done by&lt;br /&gt;
enforcing software security best practices and using application&lt;br /&gt;
security testing tools. &lt;br /&gt;
&amp;lt;ref name=&amp;quot;perforce&amp;quot;&amp;gt;Perforce, &amp;quot;Application Security Development Best Practices&amp;quot;. Available: https://www.perforce.com/blog/kw/application-security-development-best-practices. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Audit and compliance knowledge====&lt;br /&gt;
A cyber security audit is designed to be a comprehensive review and&lt;br /&gt;
analysis of your business’s IT infrastructure. It identifies threats and&lt;br /&gt;
vulnerabilities, exposing weaknesses and high-risk practices.&lt;br /&gt;
Regulations such as the EU GDPR (General Data Protection Regulation) can&lt;br /&gt;
impose hefty penalties in the event of a breach that results in&lt;br /&gt;
exploited data. A cyber security audit will help mitigate the&lt;br /&gt;
consequences of a breach and demonstrate that your organization has&lt;br /&gt;
taken the necessary steps to protect client and company data. &amp;lt;ref name=&amp;quot;cyforsecure&amp;quot;&amp;gt;Cyfor Secure, &amp;quot;What is a Cyber Security Audit and how can it help your organisation?&amp;quot;. Available: https://cyforsecure.co.uk/services/cyber-assessment/cyber-security-audit/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cybersecurity compliance is the organizational risk management method&lt;br /&gt;
aligned with pre-defined security measures &amp;amp;amp; controls on how data&lt;br /&gt;
confidentiality is ensured by its administrative procedures.&amp;lt;ref name=&amp;quot;nordlayer&amp;quot;&amp;gt;NordLayer, &amp;quot;Cybersecurity compliance: Everything you need to know&amp;quot;. Available: https://nordlayer.com/blog/cybersecurity-compliance-everything-you-need-to-know/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
All needed skills are developed through courses and certification.&lt;br /&gt;
&lt;br /&gt;
===Entry-Level Incident Response Positions===&lt;br /&gt;
It is not always possible to advance to the position of incident&lt;br /&gt;
responder in a straight line. Many professionals advance from entry- to&lt;br /&gt;
mid-level positions before becoming a real incident responder or a&lt;br /&gt;
member of a computer emergency response team (CERT).&amp;lt;br /&amp;gt;&lt;br /&gt;
These are some examples: &amp;lt;ref name=&amp;quot;Infosec&amp;quot;&amp;gt;Infosec, &amp;quot;Incident Responder Career Roadmap: From Entry Level to Executive&amp;quot;. Available: https://resources.infosecinstitute.com/topic/incident-responder-career-roadmap-entry-level-executive/ [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;network-administrator&amp;quot;&amp;gt;Network administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;This position’s experience will help potential incident responders&lt;br /&gt;
develop networking skills. Attention to detail, as well as the ability&lt;br /&gt;
to sift through system configurations, site layouts, and general network&lt;br /&gt;
and communication setups, are essential in this field.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;system-administrator&amp;quot;&amp;gt;System administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Another crucial beginning point for an incident responder is to learn&lt;br /&gt;
how to manage resources inside your organization as well as user&lt;br /&gt;
behavior. Understanding the potential damage that users, inadequate&lt;br /&gt;
security setups, and ineffective IT policies and procedures can cause on&lt;br /&gt;
your network can provide prospective candidates with insight into the&lt;br /&gt;
human component of an incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;security-administrator&amp;quot;&amp;gt;Security administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In such a position, basic hacking skills, penetration testing, and&lt;br /&gt;
intrusion detection are all learned, which are crucial incident&lt;br /&gt;
responder skills when trying to replicate a breach or attack.&lt;br /&gt;
Understanding the paths a cybercriminal will take when attempting to&lt;br /&gt;
damage or obtain access to a system can greatly simplify the work of&lt;br /&gt;
reverse engineering the incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Mid-Level Incident Response Positions ===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5&lt;br /&gt;
id=&amp;quot;computer-security-incident-response-team-csirt-engineer&amp;quot;&amp;gt;Computer&lt;br /&gt;
security incident response team (CSIRT) engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;cyber-incident-responder&amp;quot;&amp;gt;Cyber incident responder&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-response-engineer&amp;quot;&amp;gt;Incident response&lt;br /&gt;
engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;While each of these positions is different, they generally require&lt;br /&gt;
very similar skills and characteristics in a candidate. At this level,&lt;br /&gt;
personal characteristics such as problem solving, time management, and&lt;br /&gt;
even presentation skills become more crucial as one’s career evolves&lt;br /&gt;
into a management-facing role.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Technical skills include the ability to identify and minimize threats&lt;br /&gt;
while maintaining communication with management and the rest of your&lt;br /&gt;
team. Data analysis and evidence gathering become increasingly crucial,&lt;br /&gt;
and the circumstances in which your services are deployed get more&lt;br /&gt;
serious.&amp;lt;/p&amp;gt;&lt;br /&gt;
Problem-solving skills are crucial at this level of incident&lt;br /&gt;
response, and as the stakes rise, so does the pressure in each&lt;br /&gt;
situation. At this level, programming abilities are essential since&lt;br /&gt;
incident responders may be needed to reverse engineer malicious code or&lt;br /&gt;
even create patches for vulnerable network applications or services. &amp;lt;ref name=&amp;quot;coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated]&amp;quot;. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Senior-Level Incident Response Positions===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;intrusion-detection-specialist&amp;quot;&amp;gt;Intrusion detection&lt;br /&gt;
specialist:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;A CISSP certification might help a potential candidate in preparing&lt;br /&gt;
for the profession. The role of an intrusion detection specialist is to&lt;br /&gt;
find and stop any unwanted communications.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-manager&amp;quot;&amp;gt;Incident manager:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Expected to plan, oversee, manage, and supervise all incident&lt;br /&gt;
response team actions. Is in charge of reporting all current events to&lt;br /&gt;
senior management and stakeholders, as well as acting as the technical&lt;br /&gt;
lead on active incidents for incident responders. Prepares threat and&lt;br /&gt;
impact assessments and reports them known to management.&amp;lt;ref name=&amp;quot;coursera&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Certificates== &lt;br /&gt;
There is a vast number of different certificates and the road map to&lt;br /&gt;
being a certified professional could be very different&amp;lt;ref name=&amp;quot;Coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated],&amp;quot; [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;NICCS&amp;quot;&amp;gt;NICCS, &amp;quot;Cybersecurity Certifications,&amp;quot; [Online]. Available: hhttps://niccs.cisa.gov/about-niccs/cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt; . One possible&lt;br /&gt;
approach is to start with basic certificates from the different branches&lt;br /&gt;
of service and move to more specific and demanding focused&lt;br /&gt;
certification. Also, some jobs require certain clearances, either from&lt;br /&gt;
industry, or from the government. One small selection of different&lt;br /&gt;
possible certificates is brought out in following paragraphs.&lt;br /&gt;
&lt;br /&gt;
Security+ is a CompTIA certification that is considered a basic cert&lt;br /&gt;
among cybersecurity professionals. It covers the topics of risk&lt;br /&gt;
management and threat assessment.&lt;br /&gt;
Network+ is also offered by CompTIA this certification (like the name&lt;br /&gt;
implies) focuses on networking infrastructure and operations. It is&lt;br /&gt;
considered a foundational certification.&lt;br /&gt;
The Certified Information Systems Security Professional (CISSP) is a&lt;br /&gt;
more advanced certification designed for cybersecurity professionals&lt;br /&gt;
with at least five years of work experience. The certification covers&lt;br /&gt;
topics such as architecture, engineering, and management.&amp;lt;/p&amp;gt;&lt;br /&gt;
The Certified Ethical Hacker (CEH) certification is also considered a&lt;br /&gt;
more advanced cert because it generally requires that applicants have&lt;br /&gt;
multiple years of work experience. The goal of an ethical hacker&lt;br /&gt;
certification is to be able to understand how cyber attacks unfold in&lt;br /&gt;
order to improve threat assessment and mitigation skills.&amp;lt;ref name=&amp;quot;cyberguide&amp;quot;&amp;gt;Cybersecurity Guide, &amp;quot;How to become a cybersecurity specialist&amp;quot;, [Online]. Available: https://cybersecurityguide.org/careers/security-specialist/. [Accessed 27 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
This is definitely not all, when one looks for more information, following link could be searched, to get more in depth knowledge about&lt;br /&gt;
different possibilities.&lt;br /&gt;
 &lt;br /&gt;
Hereby, with the help of this matrix a possible taxonomy of different 436 listed certificates in branches are&lt;br /&gt;
presented.&amp;lt;ref name=&amp;quot;Pauljeremy&amp;quot;&amp;gt;&amp;quot;Cybersecurity Roadmap,&amp;quot; [Online]. Available: https://pauljerimy.com/2020/10/12/scr-oct-2020-update/. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:analystimage5.png|1000px|thumb|Certificate matrix &amp;lt;ref&amp;gt;&amp;quot;Certification roadmap&amp;quot;. Available at https://pauljerimy.com/security-certification-roadmap&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
=== Communication and Network Security===&lt;br /&gt;
Communication and network security covers the ability to secure&lt;br /&gt;
communication channels and networks. Topics include secure and converges&lt;br /&gt;
protocols, wireless networks, cellular networks, hardware operations&lt;br /&gt;
(warranty and redundant power), and third-party connectivity. IP&lt;br /&gt;
networking are also included in this domain.&lt;br /&gt;
===Identity and Access Management===&lt;br /&gt;
The identity and access management domain covers the attacks that&lt;br /&gt;
target the human gateway to gain access to data. Other topics include&lt;br /&gt;
ways to identify users with rights to access the information and&lt;br /&gt;
servers. Identity and access management covers the topics of&lt;br /&gt;
applications, Single sign-on authentication, privilege escalation,&lt;br /&gt;
Kerberos, rule-based or risk-based access control, proofing and&lt;br /&gt;
establishment of identity.&lt;br /&gt;
===Security Architecture and Engineering===&lt;br /&gt;
The security architecture and engineering domain covers important&lt;br /&gt;
topics concerning security engineering plans, designs and principles,&lt;br /&gt;
Topics include assessing and mitigating information system&lt;br /&gt;
vulnerabilities, fundamental concepts of security models and security&lt;br /&gt;
architectures in critical areas like access control. Cloud systems,&lt;br /&gt;
cryptography, system infiltrations (ransomware, fault-injection and&lt;br /&gt;
more) and virtualized systems are also covered in this domain.&lt;br /&gt;
===Asset Security===&lt;br /&gt;
The Asset Security domain deals with the issues related to the&lt;br /&gt;
collection, storage, maintenance, retention and destruction of data. It&lt;br /&gt;
also covers knowledge of different roles regarding data handling (owner,&lt;br /&gt;
controller and custodian) as well as data protection methods and data&lt;br /&gt;
states. Other topics include resource provision, asset classification&lt;br /&gt;
and data lifecycle management.&lt;br /&gt;
===Security and Risk Management===&lt;br /&gt;
The security and risk management domain covers general on skills&lt;br /&gt;
related to the implementation of user awareness programs as well as&lt;br /&gt;
security procedures. Emphasis is also placed on risk management&lt;br /&gt;
concerning the acquisition of new services, hardware and software&lt;br /&gt;
(supply chain). Other skills include social engineering defense&lt;br /&gt;
mechanisms.&lt;br /&gt;
===Security Assessment and Testing===&lt;br /&gt;
The security assessment and testing domain deals with all the&lt;br /&gt;
techniques and tools used to find system vulnerabilities, weaknesses and&lt;br /&gt;
potential areas of concern not addressed by security procedures and&lt;br /&gt;
policies. Attack simulations, vulnerability assessment, compliance&lt;br /&gt;
checks, and ethical disclosure also fall under this domain.&lt;br /&gt;
===Software Security===&lt;br /&gt;
The software development security domain deals with implementing&lt;br /&gt;
software-based security protocols within environment for which the IT&lt;br /&gt;
professional is responsible. Risk analysis, vulnerability identification&lt;br /&gt;
and auditing of source codes are all covered in this subset. Additional&lt;br /&gt;
topics include software-designed security, maturity models, development&lt;br /&gt;
methodologies, open-source and third-party development security.&lt;br /&gt;
===Security operations===&lt;br /&gt;
The security operations domain covers topics ranging from&lt;br /&gt;
investigations and digital forensic to detection and intrusion&lt;br /&gt;
prevention tools, sandboxing and firewalls. Topics include user and&lt;br /&gt;
entity behavior analytics, threat intelligence (threat hunting and&lt;br /&gt;
threat feeds) log management, artifacts (mobile, computer and network),&lt;br /&gt;
machine learning and AI-based tools, penetration testing, and&lt;br /&gt;
exploitation development. These for sub-domains are lister here.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Incident Handling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Penetration Testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Exploitation&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Education==&lt;br /&gt;
[[File:Analystimage7.png|400px|thumb|Comparison degree vs Certificate &amp;lt;ref&amp;gt;&amp;quot;Comparison Table&amp;quot;. Available at https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
The entry level monitoring specialist is hired by Estonian&lt;br /&gt;
Information System Authority even if there is no formal IT education,&lt;br /&gt;
but readiness to learn and moderate knowledge of different operation&lt;br /&gt;
systems is enough to start the career. &amp;lt;ref name=&amp;quot;cv&amp;quot;&amp;gt;cv.ee, &amp;quot;SEIRESPETSIALIST - tule Eesti küberruumi valvuriks!&amp;quot;. Available: https://www.cv.ee/en/vacancy/792782/riigi-infosusteemi-amet/seirespetsialist-tule-eesti-kuberruumi-valvuriks [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Nevertheless, like most other high qualification careers jobs falling&lt;br /&gt;
under the cybersecurity specialist category require some form of formal&lt;br /&gt;
education. However, since cybersecurity specialist jobs can fall across&lt;br /&gt;
a wide spectrum of job descriptions and responsibilities, it is possible&lt;br /&gt;
to obtain a specialist job after completing many levels of different&lt;br /&gt;
computer related education.&lt;br /&gt;
&lt;br /&gt;
If one is looking for a cybersecurity related education, for example&lt;br /&gt;
in EU, 137 courses/programs could be found that relate to keyword IT or&lt;br /&gt;
cybersecurity. &amp;lt;ref name=&amp;quot;enisa&amp;quot;&amp;gt;ENISA (European Union Agency for Cybersecurity), &amp;quot;Cybersecurity Education-Cybersecurity Higher Education Database&amp;quot;. Available: https://www.enisa.europa.eu/topics/cybersecurity-education/education-map/education-courses [Accessed 26 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Also, there is a great amount of discussion, if cyber security&lt;br /&gt;
professional should have a degree or would be certification just enough.&lt;br /&gt;
One interesting table is produces by Franklin University that compares&lt;br /&gt;
benefits and/or drawbacks of each type of credential.&amp;lt;ref name=&amp;quot;franklin&amp;quot;&amp;gt;Franklin University, &amp;quot;Is Getting a Master&#039;s Degree in Cyber Security Worth It?&amp;quot;. Available: https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Certifications are generally good for people with little practical&lt;br /&gt;
experience because they are known quantities in the industry and can&lt;br /&gt;
help you get your foot in the door. They set a minimum knowledge bar.&lt;br /&gt;
But some certifications are viewed more favorably than others.&lt;br /&gt;
Certifications with renewal requirements are viewed better by hiring&lt;br /&gt;
managers, but they also more costly in the long run because of the need&lt;br /&gt;
for continuing education. Certifications are also good for showing&lt;br /&gt;
in-depth expertise in a specialization within cybersecurity. Depending&lt;br /&gt;
on your career goals, it may be advantageous to have a master’s&lt;br /&gt;
degree—which shows your breadth of knowledge, critical thinking and&lt;br /&gt;
leadership skills—and a certificate—which shows specific skill&lt;br /&gt;
competency.&amp;lt;ref name=&amp;quot;franklin&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
As IT (Cyber) Security is still a relatively young discipline,&lt;br /&gt;
universities and colleges are still figuring out which is the best&lt;br /&gt;
approach for their degrees. Study programmes and curricula in Cyber&lt;br /&gt;
Security are different. In general, here are the duration of Cyber&lt;br /&gt;
Security degrees:&lt;br /&gt;
&amp;lt;ref name=&amp;quot;studyportal&amp;quot;&amp;gt;Studyportals, &amp;quot;Why You Should Study a Cyber Security Degree in 2022&amp;quot;. Available: https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Bachelor’s degrees in Cyber Security take 3 or 4 years in most&lt;br /&gt;
countries.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Master’s courses in Cyber Security take between 1-2 years to&lt;br /&gt;
complete.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;PhD programmes in Cyber Security last 3-5 years. Some only take 1&lt;br /&gt;
or 2 years, but they are less common.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Generalization could me made that on bachelor level the general&lt;br /&gt;
knowledge about the cyber issues are obtained. On master level the&lt;br /&gt;
specialization courses are taken and the person can choose more specific&lt;br /&gt;
topics to study. It is on master level where strengths of the cyber&lt;br /&gt;
specialist can be developed further and up-do date knowledge obtained in&lt;br /&gt;
specifics. PhD is serious science and involves teaching, lot of&lt;br /&gt;
scientific work and writing for publications.&lt;br /&gt;
&lt;br /&gt;
==Salary==&lt;br /&gt;
&amp;lt;p&amp;gt;Even if the salary can be very different, compared to the skills and&lt;br /&gt;
experience, an generalization can be made. Cyber Security professionals&lt;br /&gt;
in CSIRT, and in other entities earn quite well, from the start. First,&lt;br /&gt;
some comparison from the United States. The average CSIRT analyst salary&lt;br /&gt;
in the USA is $97,500 per year or $50 per hour. Entry level positions&lt;br /&gt;
start at $48,875 per year while most experienced workers make up to&lt;br /&gt;
$135,373 per year.&amp;lt;ref name=&amp;quot;talent&amp;quot;&amp;gt;talent.com, &amp;quot;Csirt Analyst average salary in USA 2022&amp;quot;. Available: https://www.talent.com/salary?job=csirt+analyst [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There are multiple positions you can occupy in this field. They have&lt;br /&gt;
in common great salaries and high demand for technical skills, attention&lt;br /&gt;
to details, problem-solving mentality, and the ability to analyze risks.&lt;br /&gt;
Here are the average annual salaries in the United States, according to&lt;br /&gt;
Payscale: &amp;lt;ref name=&amp;quot;studyportal&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Cryptographer – 100,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Information Security Officer – 91,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Assessor – 90,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Engineer – 88,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Penetration Tester – 81,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Forensics Expert – 71,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Administrator – 65,000 USD&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
When looking into salaries in Estonia, one can find that there is a&lt;br /&gt;
discussion that private sector is taking a toll from the public sector,&lt;br /&gt;
and that the salaries in important agencies, as Information System&lt;br /&gt;
Authority loose their employees to the better paid positions in private&lt;br /&gt;
sector.&amp;lt;ref name=&amp;quot;digigeenius&amp;quot;&amp;gt;DiGi Geenius, &amp;quot;Kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad&amp;quot;. Available: https://digi.geenius.ee/rubriik/uudis/kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad/ [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;tehnika&amp;quot;&amp;gt;Postimees, &amp;quot;Riigi-it-tootajate-palgamaarad-kasvasid&amp;quot;. Available: https://tehnika.postimees.ee/6887428/riigi-it-tootajate-palgamaarad-kasvasid [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
But there is also a different view that average private sector worker&lt;br /&gt;
could be hired as a top specialist in public sector and then the payment&lt;br /&gt;
is higher. Nevertheless, it seems that the average payment in cyber&lt;br /&gt;
security sector is any way higher that in other parts of the&lt;br /&gt;
e-services. &amp;lt;ref name=&amp;quot;digigeenius2&amp;quot;&amp;gt;DiGi Geenius, &amp;quot;5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka&amp;quot;. Available: https://digi.geenius.ee/rubriik/uudis/5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==SOC==&lt;br /&gt;
&amp;lt;p&amp;gt;A SOC is a facility where an organization’s network, applications,&lt;br /&gt;
and endpoints are monitored and defended. The term was adapted from&lt;br /&gt;
network operations centers (NOCs), where large telecommunication or&lt;br /&gt;
corporate networks are monitored. When network security became more of a&lt;br /&gt;
concern, security teams were formed within the NOCs, and eventually spun&lt;br /&gt;
off into larger organizations of their own as the responsibilities of&lt;br /&gt;
security teams grew increasingly complex and specialized. The security&lt;br /&gt;
staff working in a security operations center are often called the SOC&lt;br /&gt;
team.&amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;Exabeam, &amp;quot;CSIRT&amp;quot;. Available: https://www.exabeam.com/incident-response/csirt/ [Accessed 28 APr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;Functions of the SOC team include, but are not limited to:&amp;lt;ref name=&amp;quot;trellix&amp;quot;&amp;gt;Trellix, &amp;quot;What Is a Security Operations Center (SOC)?&amp;quot;. Available: https://www.trellix.com/en-us/security-awareness/operations/what-is-soc.html [Accessed 30 APr 2022].&amp;lt;/ref&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ol type=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Taking inventory of resources, to get a better understanding of the&lt;br /&gt;
structure they are protecting.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintanence of the system, by constantly making updates and adding&lt;br /&gt;
safeguards.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Monitoring the network for abnormalities with special tools.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Threat analysis of new attacks and vulnerabilities.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Responding to attacks, by acting as “first responders”. The SOC team&lt;br /&gt;
will shut down and/or isolate endpoints, deleting files and lowering the&lt;br /&gt;
impact as fast as possible.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Recovery of system stability and lost data. This may be done using&lt;br /&gt;
backups, restarting endpoints or reconfiguring systems.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Logging all actions on the system, to be later used for analysis or&lt;br /&gt;
forensics after an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigating the root cause of an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Auditing their own actions, to be in line with regulations of the&lt;br /&gt;
organization, industry or governing body.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==CSIRT==&lt;br /&gt;
&amp;lt;p&amp;gt;A CSIRT is a group that responds to security incidents when they&lt;br /&gt;
occur. Key responsibilities of a CSIRT include:&lt;br /&gt;
&amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
===Creating and maintaining an incident response plan (IRP)===&lt;br /&gt;
An incident response plan (IRP) is a set of written instructions for&lt;br /&gt;
detecting, responding to and limiting the effects of an information&lt;br /&gt;
security event. Incident response plans provide instructions for&lt;br /&gt;
responding to many potential scenarios, including data breaches, denial&lt;br /&gt;
of service/distributed denial of service attacks, firewall breaches,&lt;br /&gt;
virus or malware outbreaks or insider threats. Without an incident&lt;br /&gt;
response plan in place, organizations may either not detect the attack&lt;br /&gt;
in the first place, or not follow proper protocol to contain the threat&lt;br /&gt;
and recover from it when a breach is detected.&lt;br /&gt;
&amp;lt;ref name=&amp;quot;stratacore&amp;quot;&amp;gt;Stratacore, &amp;quot;Incident Response Plan (IRP)&amp;quot;. https://www.stratacore.com/incidentresponseplan [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Investigating and analyzing incidents===&lt;br /&gt;
CSIRTs are also involved in improvement activities. After major&lt;br /&gt;
computer security incidents occur, or when incidents are not handled in&lt;br /&gt;
a timely or effective manner, a CSIRT will generally perform a&lt;br /&gt;
postmortem of the incident and its response. This postmortem will&lt;br /&gt;
identify the strengths and weakness of the response effort. Such reviews&lt;br /&gt;
can identify weaknesses and holes in systems, infrastructure defenses,&lt;br /&gt;
or policies that allowed the incident to take place. It can also&lt;br /&gt;
identify problems with communication channels, interfaces, and&lt;br /&gt;
procedures that inhibited the efficient resolution of the reported&lt;br /&gt;
problem.&lt;br /&gt;
&amp;lt;ref name=&amp;quot;cisa&amp;quot;&amp;gt;CISA (Cybersecurity &amp;amp; Infrastructure Security Agency, &amp;quot;Defining Computer Security Incident Response Teams&amp;quot;. https://www.cisa.gov/uscert/bsi/articles/best-practices/incident-management/defining-computer-security-incident-response-teams [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Managing internal communications and updates during or immediately after incidents occur===&lt;br /&gt;
===Communicating with employees, shareholders, customers, and the press about incidents as needed===&lt;br /&gt;
There are various services within the CSIRT Services Framework that&lt;br /&gt;
address communications, as they relate to security operations and&lt;br /&gt;
incident response services. Some of these include Information Security&lt;br /&gt;
Incident Coordination, Crisis Management Support, Vulnerability&lt;br /&gt;
Disclosure, Situational Awareness Communication, and Awareness Building,&lt;br /&gt;
to name a few. Sharing information and communicating with the general&lt;br /&gt;
public and/or your constituency is appropriate in many different&lt;br /&gt;
scenarios. These can range from proactive communications to reactive&lt;br /&gt;
communications. Each scenario may be unique, and careful consideration&lt;br /&gt;
should be given to when to release information to the public and what&lt;br /&gt;
information should be released.&lt;br /&gt;
&amp;lt;ref name=&amp;quot;CMUni&amp;quot;&amp;gt;Carniege Mellon University, Brittany Manley, David McIntire &amp;quot;A Guide to Effective Incident Management Communications&amp;quot;. https://resources.sei.cmu.edu/asset_files/Handbook/2021_002_001_651819.pdf [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Remediating incidents===&lt;br /&gt;
Threat remediation is a strong and capable tool for fighting the&lt;br /&gt;
cyber security compromises. As the word ‘remedy’ suggests, remediation&lt;br /&gt;
process involves the treatment of a security breach. With the&lt;br /&gt;
remediation practices, your cyber security team is able to eliminate&lt;br /&gt;
suspicious activities and malicious attacks in the form of malware,&lt;br /&gt;
ransomware, phishing and such. Even if you ‘kill’ the suspicious&lt;br /&gt;
activity, the attackers can remain in your systems. If you want to&lt;br /&gt;
contaminate and end the problem for good, your remediation processes&lt;br /&gt;
must involve the detection of the cause. &amp;lt;ref name=&amp;quot;logsign&amp;quot;&amp;gt;Logsign, &amp;quot;What-is-remediation-in-cyber-security&amp;quot;. Available: https://www.logsign.com/blog/what-is-remediation-in-cyber-security/. [Accessed 28 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Recommending technology, policy, governance, and training changes after security incidents===&lt;br /&gt;
After all these actions, the SCIRT must contribute to the development&lt;br /&gt;
of better policies, practices and has to recommend improvements. They&lt;br /&gt;
are not working in the vacuum and their work has to create new and&lt;br /&gt;
better standards for cyber security. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;Exabeam, &amp;quot;CSIRT&amp;quot;. Available: https://www.exabeam.com/incident-response/csirt/ [Accessed 28 APr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==CERT==&lt;br /&gt;
The term “computer emergency response team” was coined in 1988. In&lt;br /&gt;
response to the Morris worm attack that impacted thousands of servers on&lt;br /&gt;
the Internet, DARPA funded the formation of the Computer Emergency&lt;br /&gt;
Response Team Coordination Center (CERT-CC) at Carnegie Mellon&lt;br /&gt;
University. The goal of CERT-CC was to help protect the internet by&lt;br /&gt;
collecting and disseminating information on critical security&lt;br /&gt;
vulnerabilities. Several other countries formed similar centers using&lt;br /&gt;
the same acronym (despite threats of legal action by Carnegie Mellon for&lt;br /&gt;
trademark infringement). Now the term CERT refers to any emergency&lt;br /&gt;
response team that deals with cyber threats. Many people use CERT-CC&lt;br /&gt;
interchangeably with CSIRT, though the charter of a CERT is information&lt;br /&gt;
sharing in order to help other response teams respond to threats against&lt;br /&gt;
their own infrastructure. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In general, the designation of CERT is helpful in applying real-world&lt;br /&gt;
solutions to various cybersecurity problems. They may be government&lt;br /&gt;
contractors or employees of a major corporation. For example, the U.S.&lt;br /&gt;
Computer Emergency Readiness Team (US-CERT) operates under the U.S.&lt;br /&gt;
Department of Homeland Security.&lt;br /&gt;
&amp;lt;ref name=&amp;quot;techopedia&amp;quot;&amp;gt;Techopedia, &amp;quot;Computer Emergency Response Team (CERT)&amp;quot;. Available: https://www.techopedia.com/definition/31003/computer-emergency-response-team-cert. [Accessed 25 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In Estonia CERT is designated as CERT-EE. It was established in 2006,&lt;br /&gt;
as an organization responsible for the management of security incidents&lt;br /&gt;
in .ee computer networks. It is also a national contact point for&lt;br /&gt;
international co-operation in the field of IT security. &amp;lt;ref name=&amp;quot;ria&amp;quot;&amp;gt;Information System Autority, &amp;quot;CERT-EE&amp;quot;. Available: hhttps://www.ria.ee/en/cyber-security/cert-ee.html [Accessed 25 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Difference between SOC/CSIRT/CERT==&lt;br /&gt;
[[File:analystimage3.png|300px|thumb|SOC/CSIRT/CERT &amp;lt;ref name=&amp;quot;exabeam&amp;gt;&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
How CSIRTs differ from CERTs and SOCs. There are overlapping&lt;br /&gt;
responsibilities between a community emergency response team (CERT),&lt;br /&gt;
computer security incident response team (CSIRT), and security&lt;br /&gt;
operations center (SOC). To add to this confusion, frequently, the terms&lt;br /&gt;
CERT and CSIRT are used interchangeably, despite the important&lt;br /&gt;
differences. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Understand the primary roles and characteristics of a CERT, CSIRT, and SOC.==&lt;br /&gt;
[[File:analystimage4.png|600px|thumb|Primary Roles of CERT, CSIRT, and SOC&amp;lt;ref name=&amp;quot;exabeam&amp;gt;&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&amp;lt;p&amp;gt;So, using strict definitions, a CERT collects and disseminates&lt;br /&gt;
security information, typically for the benefit of a country or an&lt;br /&gt;
industry. A CSIRT is a cross-functional team that responds to incidents&lt;br /&gt;
on behalf of a country or an organization. A SOC is where a country or&lt;br /&gt;
organization monitors and defends its network, servers, applications,&lt;br /&gt;
and endpoints. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Future==&lt;br /&gt;
&amp;lt;p&amp;gt;And the Cyber security problem is only getting bigger. According to a&lt;br /&gt;
report published by Accenture, the number of cyber security breaches&lt;br /&gt;
increased by 11 percent from 2017 to 2018. The cost of such breaches is&lt;br /&gt;
astronomical–about $600 billion worldwide, according to the Economic&lt;br /&gt;
Impact of Cybercrime report.&lt;br /&gt;
&amp;lt;ref name=&amp;quot;ecpi&amp;quot;&amp;gt;ECPI, &amp;quot;What-is-digital-forensics-in-cybersecurity&amp;quot;. Available: https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me [Accessed 27 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Job projections for cybersecurity are staggering. The Bureau of Labor&lt;br /&gt;
Statistics in US predicts that careers in the cybersecurity field will&lt;br /&gt;
grow by 32% by 2028. That makes cybersecurity one of the top 10&lt;br /&gt;
fastest-growing jobs in the country. In the United States alone, jobs&lt;br /&gt;
for Information Security Analysts are expected to grow by 15% by&lt;br /&gt;
2024.&amp;lt;ref name=&amp;quot;franklin&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Most likely this trend is also similar in other countries.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
When checking Estonian job portals, there is a constant need for&lt;br /&gt;
people for cyber security related positions. Also, linkedin search gives&lt;br /&gt;
approximately 30 vacancies immediately. There are banks, logistics&lt;br /&gt;
companies, e-shops, and software producers. &amp;lt;ref name=&amp;quot;linkedin&amp;quot;&amp;gt;LinkedIn, &amp;quot;Cyber Security Jobs&amp;quot;. Available: ttps://ee.linkedin.com/jobs/cyber-security-jobs?countryRedirected=1&amp;amp;amp;position=1&amp;amp;amp;pageNum=0 [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Trends that affect companies create need for constant cyber security&lt;br /&gt;
services. Increasing number of home/remote offices require secure&lt;br /&gt;
corporate networks and security of remote devices. One example is from&lt;br /&gt;
this year, when sloppy remote desktop set-up paralyzed systems of 17&lt;br /&gt;
companies.&lt;br /&gt;
&amp;lt;ref name=&amp;quot;aripaev&amp;quot;&amp;gt;Äripäev, &amp;quot;RIA: lohakas kaugtöölaua seadistus halvas märtsis 17 ettevõtte IT-süsteemid&amp;quot;Available: ttps://www.aripaev.ee/uudised/2022/04/20/ria-lohakas-kaugtoolaua-seadistus-halvas-martsis-vahemalt-17-juhul-ettevotete-it-susteemid [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Also, no service can exists without robust infrastructure - servers,&lt;br /&gt;
databases, applications. As all previously mentioned devices and&lt;br /&gt;
services are at constant scanning and surveillance. So, the breach&lt;br /&gt;
detection and immediate action demands 24/7 services. Even if lot of&lt;br /&gt;
things could be automated, there is a need for human specialists (at&lt;br /&gt;
least, at the moment). Third growing field is also a forensic&lt;br /&gt;
investigation, as every attack must be investigated in order to be ready&lt;br /&gt;
to repel next attacks. So data recovery and evidence collection is&lt;br /&gt;
another important field of work that need skilled and professional&lt;br /&gt;
workers.&lt;br /&gt;
Even, if the specifics of the entity, be it CSIRT, CERT or SOC, are&lt;br /&gt;
different, the fundamentals of the work are the same. Professional&lt;br /&gt;
knowledge of the networks, operational systems, hardware, scripting, and&lt;br /&gt;
several other wider IT related knowledge is needed. As there is no&lt;br /&gt;
single way to reach to it, every single person can find one’s strongest&lt;br /&gt;
sides and develop them with knowledge of weaker side, in order to know,&lt;br /&gt;
when to as for help.&lt;br /&gt;
==Sources==&lt;/div&gt;</summary>
		<author><name>Mavald</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142284</id>
		<title>Hiring a Cyber Security Incident Analyst</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142284"/>
		<updated>2022-05-01T16:21:40Z</updated>

		<summary type="html">&lt;p&gt;Mavald: /* Digital forensics */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==A Cyber Security Incident Analyst==&lt;br /&gt;
&lt;br /&gt;
[[File:image1.png|600px|thumb|Job advertisement &amp;lt;ref&amp;gt;&amp;quot;Job Advertisement&amp;quot;. Available at https://www.projectpeople.com/jobs/&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
===Cyber security incident analyst in SOC/CSIRT/CERT===&lt;br /&gt;
This article delves into the job title of Cyber Security Incident&lt;br /&gt;
Analyst and provides an overview of the acronyms SOC/CSIRT/CERT. A brief&lt;br /&gt;
history of the job is discussed here, as well as a possible career path,&lt;br /&gt;
education, experience, and other characteristics required for work in&lt;br /&gt;
computer security-related organizations. The article also provides a&lt;br /&gt;
brief history of SOC/CSIRT/CERT, as well as a comparison of their&lt;br /&gt;
differences and similarities.&lt;br /&gt;
===Cyber Security Incident Analyst Skill Set===&lt;br /&gt;
What skill set is expected from the Cyber Security Incident Analyst? Below written lines are taken from the same job advertisement depicted&lt;br /&gt;
on the left side of this article:&lt;br /&gt;
As a Security Incident Analyst your responsibilities will include:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Continuous monitoring of security tooling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Performing regular and ad-hoc vulnerability assessments&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Carrying out ‘spot checks’&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Reporting vulnerabilities to the PVG via the alerts system&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintaining and documenting logging systems&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Developing centralized logging, reporting and intelligence&lt;br /&gt;
platforms&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;‘Light touch’ penetration testing with open source tooling&lt;br /&gt;
(Metasploit)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Knowledge &amp;amp;amp; Experience required:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;SOC, CSIRT or CERT operational environment experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Windows / Linux experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TCP /IP networking protocol knowledge&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience reviewing and analyzing Security Events from various&lt;br /&gt;
monitoring and logging sources&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience in website and web application security assessment or&lt;br /&gt;
penetration testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience of using Metasploit&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Scripting knowledge using BASH, Python, Perl, Ruby&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Skills in Host and Network Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
As one can see the description of the duties is wide and also the&lt;br /&gt;
knowledge and experience that is required is noteworthy. So, where to&lt;br /&gt;
start to find out the way to get this kind of knowledge and&lt;br /&gt;
expertize.&lt;br /&gt;
===Possible career path===&lt;br /&gt;
Next part of the paper is aiming to depict a possible ways, how to&lt;br /&gt;
develop oneself, and move along the career pathway in cybersecurity&lt;br /&gt;
field. Topics of development, education, experience and certification&lt;br /&gt;
are covered.&lt;br /&gt;
[[File:analystimage2.png|1000px|thumb|Career path &amp;lt;ref&amp;gt;&amp;quot;Possible Career Path&amp;quot;. Available at https://www.cyberseek.org/pathway.html&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
===Junior/Senior===&lt;br /&gt;
Start with an entry-level job in IT. Hands-on experience is often the&lt;br /&gt;
most effective way to prepare for certification exams. Start&lt;br /&gt;
accumulating work experience with an entry-level role as a cybersecurity&lt;br /&gt;
analyst. Many cybersecurity professionals start off in more general IT&lt;br /&gt;
roles. The skills, practices, and technologies you’ll use as a&lt;br /&gt;
cybersecurity professional will continue to evolve along with computer&lt;br /&gt;
and network technology. The desire to learn, ability to problem solve,&lt;br /&gt;
and attention to detail will serve you well in this field. Other, more&lt;br /&gt;
technical skills and technologies to learn include:&amp;lt;ref name=&amp;quot;certification&amp;quot;&amp;gt;Popular Cyber Security Certificates [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications  [Accessed 25 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====SIEM tools (security information and event management)====&lt;br /&gt;
Security Information and Event Management (SIEM) is a set of tools&lt;br /&gt;
and services offering a holistic view of an organization’s information&lt;br /&gt;
security. SIEM works by combining two technologies:&lt;br /&gt;
&amp;lt;li&amp;gt;Security information management (SIM), which collects data from log&lt;br /&gt;
files for analysis and reports on security threats and events, and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;security event management (SEM), which conducts real-time system&lt;br /&gt;
monitoring, notifies network admins about important issues and&lt;br /&gt;
establishes correlations between security events. There are a number of&lt;br /&gt;
security information and event management solutions on the market.&lt;br /&gt;
ArcSight ESM, IBM QRadar and Splunk are among the most popular. &amp;lt;ref name=&amp;quot;SIEM&amp;quot;&amp;gt;Application security, SIEM [Online]. Available: https://www.imperva.com/learn/application-security/siem/. [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Firewalls, Intrusion Detection Systems (IDS), and Intrusion Prevention Systems(IPS)====&lt;br /&gt;
Firewalls can be two types, hardware and software firewalls. Software&lt;br /&gt;
firewall is a firewall that is installed on a computer or server, and&lt;br /&gt;
tasked with network security. It works with a wide variety of other&lt;br /&gt;
technology security solutions to provide more robust and cohesive&lt;br /&gt;
security for enterprises of all sizes. When a software firewall is&lt;br /&gt;
installed on a server, it opens up like an umbrella of protection over&lt;br /&gt;
all other computers connected to the network. It is able to monitor both&lt;br /&gt;
incoming and outgoing traffic for potential risk or suspicious user&lt;br /&gt;
behavior, and also makes setting security policies much easier, faster&lt;br /&gt;
and more flexible. Hardware firewall is positioned between the network&lt;br /&gt;
and devices, allowing traffic to funnel through the firewall for a close&lt;br /&gt;
inspection and analysis. A hardware firewall, a term often&lt;br /&gt;
interchangeable with network or next-generation firewall, protects the&lt;br /&gt;
network gateways for an enterprise. Hardware firewall is physical&lt;br /&gt;
hardware, installed between network elements and connected devices, and&lt;br /&gt;
is tasked with filtering traffic for cyber threat to the network or&lt;br /&gt;
devices. Filtering out unauthorized or suspicious users based on traffic&lt;br /&gt;
analysis is one of the biggest benefits of hardware firewall. &amp;lt;ref name=&amp;quot;sangfor&amp;quot;&amp;gt;Sangfor, &amp;quot;What is Software Firewall? Difference between Hardware Firewall and Software Firewall, [Online]. Available: https://www.sangfor.com/blog/cybersecurity/what-is-software-firewall-difference-between-hardware-firewall-and-software-firewall [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems&lt;br /&gt;
(IPS) are both parts of the network infrastructure. IDS/IPS compare&lt;br /&gt;
network packets to a cyberthreat database containing known signatures of&lt;br /&gt;
cyberattacks — and flag any matching packets. IDS doesn’t alter the&lt;br /&gt;
network packets in any way, whereas IPS prevents the packet from&lt;br /&gt;
delivery based on the contents of the packet, much like how a firewall&lt;br /&gt;
prevents traffic by IP address. &amp;lt;ref name=&amp;quot;Varonis&amp;quot;&amp;gt;Varonis, &amp;quot;What is Software Firewall? IDS vs. IPS: What is the Difference?, [Online]. Available: https://www.varonis.com/blog/ids-vs-ips [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Digital forensics====&lt;br /&gt;
Digital forensics is a branch of forensic science that focuses on&lt;br /&gt;
identifying, acquiring, processing, analyzing, and reporting on data&lt;br /&gt;
stored electronically. Electronic evidence is a component of almost all&lt;br /&gt;
criminal activities and digital forensics support is crucial for law&lt;br /&gt;
enforcement investigations. Electronic evidence can be collected from a&lt;br /&gt;
wide array of sources, such as computers, smartphones, remote storage,&lt;br /&gt;
unmanned aerial systems, shipborne equipment, and more.&amp;lt;ref name=&amp;quot;interpol&amp;quot;&amp;gt;Interpol, &amp;quot;Digital forensics&amp;quot;. Available: https://www.interpol.int/How-we-work/Innovation/Digital-forensics. [Accessed 28 4 2022].&amp;lt;/ref&amp;gt; &lt;br /&gt;
Investigative process of digital forensics can be divided into several stages. There are four major stages: preservation, collection,&lt;br /&gt;
examination, and analysis. All these four stages need a deep understanding of computers, technology across a broad spectrum, and cybersecurity principles and&lt;br /&gt;
practices, a working knowledge of computers, networks, and coding, in-depth investigative abilities, critical-thinking skills and analytical talent the ability to effectively communicate and work with a&lt;br /&gt;
wide range of people. &amp;lt;ref name=&amp;quot;ecpi1&amp;quot;&amp;gt;&amp;quot;Digital forensics&amp;quot;. Available: https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me. [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Mobile device management====&lt;br /&gt;
Mobile device management (MDM) is software that allows IT&lt;br /&gt;
administrators to control, secure and enforce policies on smartphones,&lt;br /&gt;
tablets and other endpoints. Mobile device management software emerged&lt;br /&gt;
in the early 2000s as a way to control and secure the personal digital&lt;br /&gt;
assistants and smartphones that business workers began to use. The&lt;br /&gt;
consumer smartphone boom that started with the launch of the Apple&lt;br /&gt;
iPhone in 2007 led to the bring your own device (BYOD) trend, which&lt;br /&gt;
fueled further interest in MDM.&amp;lt;ref name=&amp;quot;techtarget&amp;quot;&amp;gt;Techtarget, &amp;quot;Mobile Device Management&amp;quot;. Available: https://www.techtarget.com/searchmobilecomputing/definition/mobile-device-management [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Data management====&lt;br /&gt;
Sometimes the data management is neglected, but this part has a&lt;br /&gt;
crucial role when learning for good cyber security practices. Majority&lt;br /&gt;
of cyber security programs include a special courses on data management.&lt;br /&gt;
Data management is a method of organizing and maintaining data processes&lt;br /&gt;
that are required in almost every business operations. The benefits of&lt;br /&gt;
data management can be found accounting, statistics, logistics planning&lt;br /&gt;
and other disciplines including corporate computing.&amp;lt;ref name=&amp;quot;GlobalUni&amp;quot;&amp;gt;Global Universities, &amp;quot;MSc Data Management and Cyber Security&amp;quot;. Available: https://globaluniversities.in/msc-data-management-cyber-security. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Data governance (and management) play a fundamental role in&lt;br /&gt;
protecting an organization’s data. Ensuring that the right people have&lt;br /&gt;
the right access and that appropriate security controls are in place to&lt;br /&gt;
protect each system or service, based on the criticality or sensitivity&lt;br /&gt;
of the data sets these contain. &amp;lt;ref name=&amp;quot;CyberMagazine&amp;quot;&amp;gt;Cyber Security Magazine, &amp;quot;The Role of Data Governance in Cybersecurity&amp;quot;. Available: https://cybersecurity-magazine.com/the-role-of-data-governance-in-cybersecurity/?utm_source=rss&amp;amp;amp;utm_medium=rss&amp;amp;amp;utm_campaign=the-role-of-data-governance-in-cybersecurity. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Application security development====&lt;br /&gt;
Application security describes security measures at the application&lt;br /&gt;
level that aim to prevent data or code within the app from being stolen&lt;br /&gt;
or hijacked. It encompasses the security considerations that happen&lt;br /&gt;
during application development and design, but it also involves systems&lt;br /&gt;
and approaches to protect apps after they get deployed. Application&lt;br /&gt;
security may include hardware, software, and procedures that identify or&lt;br /&gt;
minimize security vulnerabilities.&amp;lt;ref name=&amp;quot;vmware&amp;quot;&amp;gt;VmWare, &amp;quot;What is application security?&amp;quot;. Available: https://www.vmware.com/topics/glossary/content/application-security.html [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Application security development is important to ensure that your&lt;br /&gt;
application is free from coding errors and bugs. And controls the risk&lt;br /&gt;
and helps safeguard against security vulnerabilities. Application&lt;br /&gt;
security development is the process of making applications more secure&lt;br /&gt;
by finding and fixing security vulnerabilities. This is often done by&lt;br /&gt;
enforcing software security best practices and using application&lt;br /&gt;
security testing tools. &lt;br /&gt;
&amp;lt;ref name=&amp;quot;perforce&amp;quot;&amp;gt;Perforce, &amp;quot;Application Security Development Best Practices&amp;quot;. Available: https://www.perforce.com/blog/kw/application-security-development-best-practices. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Audit and compliance knowledge====&lt;br /&gt;
A cyber security audit is designed to be a comprehensive review and&lt;br /&gt;
analysis of your business’s IT infrastructure. It identifies threats and&lt;br /&gt;
vulnerabilities, exposing weaknesses and high-risk practices.&lt;br /&gt;
Regulations such as the EU GDPR (General Data Protection Regulation) can&lt;br /&gt;
impose hefty penalties in the event of a breach that results in&lt;br /&gt;
exploited data. A cyber security audit will help mitigate the&lt;br /&gt;
consequences of a breach and demonstrate that your organization has&lt;br /&gt;
taken the necessary steps to protect client and company data. &amp;lt;ref name=&amp;quot;cyforsecure&amp;quot;&amp;gt;Cyfor Secure, &amp;quot;What is a Cyber Security Audit and how can it help your organisation?&amp;quot;. Available: https://cyforsecure.co.uk/services/cyber-assessment/cyber-security-audit/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cybersecurity compliance is the organizational risk management method&lt;br /&gt;
aligned with pre-defined security measures &amp;amp;amp; controls on how data&lt;br /&gt;
confidentiality is ensured by its administrative procedures.&amp;lt;ref name=&amp;quot;nordlayer&amp;quot;&amp;gt;NordLayer, &amp;quot;Cybersecurity compliance: Everything you need to know&amp;quot;. Available: https://nordlayer.com/blog/cybersecurity-compliance-everything-you-need-to-know/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
All needed skills are developed through courses and certification.&lt;br /&gt;
&lt;br /&gt;
===Entry-Level Incident Response Positions===&lt;br /&gt;
It is not always possible to advance to the position of incident&lt;br /&gt;
responder in a straight line. Many professionals advance from entry- to&lt;br /&gt;
mid-level positions before becoming a real incident responder or a&lt;br /&gt;
member of a computer emergency response team (CERT).&amp;lt;br /&amp;gt;&lt;br /&gt;
These are some examples: &amp;lt;ref name=&amp;quot;Infosec&amp;quot;&amp;gt;Infosec, &amp;quot;Incident Responder Career Roadmap: From Entry Level to Executive&amp;quot;. Available: https://resources.infosecinstitute.com/topic/incident-responder-career-roadmap-entry-level-executive/ [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;network-administrator&amp;quot;&amp;gt;Network administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;This position’s experience will help potential incident responders&lt;br /&gt;
develop networking skills. Attention to detail, as well as the ability&lt;br /&gt;
to sift through system configurations, site layouts, and general network&lt;br /&gt;
and communication setups, are essential in this field.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;system-administrator&amp;quot;&amp;gt;System administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Another crucial beginning point for an incident responder is to learn&lt;br /&gt;
how to manage resources inside your organization as well as user&lt;br /&gt;
behavior. Understanding the potential damage that users, inadequate&lt;br /&gt;
security setups, and ineffective IT policies and procedures can cause on&lt;br /&gt;
your network can provide prospective candidates with insight into the&lt;br /&gt;
human component of an incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;security-administrator&amp;quot;&amp;gt;Security administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In such a position, basic hacking skills, penetration testing, and&lt;br /&gt;
intrusion detection are all learned, which are crucial incident&lt;br /&gt;
responder skills when trying to replicate a breach or attack.&lt;br /&gt;
Understanding the paths a cybercriminal will take when attempting to&lt;br /&gt;
damage or obtain access to a system can greatly simplify the work of&lt;br /&gt;
reverse engineering the incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Mid-Level Incident Response Positions ===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5&lt;br /&gt;
id=&amp;quot;computer-security-incident-response-team-csirt-engineer&amp;quot;&amp;gt;Computer&lt;br /&gt;
security incident response team (CSIRT) engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;cyber-incident-responder&amp;quot;&amp;gt;Cyber incident responder&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-response-engineer&amp;quot;&amp;gt;Incident response&lt;br /&gt;
engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;While each of these positions is different, they generally require&lt;br /&gt;
very similar skills and characteristics in a candidate. At this level,&lt;br /&gt;
personal characteristics such as problem solving, time management, and&lt;br /&gt;
even presentation skills become more crucial as one’s career evolves&lt;br /&gt;
into a management-facing role.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Technical skills include the ability to identify and minimize threats&lt;br /&gt;
while maintaining communication with management and the rest of your&lt;br /&gt;
team. Data analysis and evidence gathering become increasingly crucial,&lt;br /&gt;
and the circumstances in which your services are deployed get more&lt;br /&gt;
serious.&amp;lt;/p&amp;gt;&lt;br /&gt;
Problem-solving skills are crucial at this level of incident&lt;br /&gt;
response, and as the stakes rise, so does the pressure in each&lt;br /&gt;
situation. At this level, programming abilities are essential since&lt;br /&gt;
incident responders may be needed to reverse engineer malicious code or&lt;br /&gt;
even create patches for vulnerable network applications or services. &amp;lt;ref name=&amp;quot;coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated]&amp;quot;. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Senior-Level Incident Response Positions===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;intrusion-detection-specialist&amp;quot;&amp;gt;Intrusion detection&lt;br /&gt;
specialist:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;A CISSP certification might help a potential candidate in preparing&lt;br /&gt;
for the profession. The role of an intrusion detection specialist is to&lt;br /&gt;
find and stop any unwanted communications.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-manager&amp;quot;&amp;gt;Incident manager:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Expected to plan, oversee, manage, and supervise all incident&lt;br /&gt;
response team actions. Is in charge of reporting all current events to&lt;br /&gt;
senior management and stakeholders, as well as acting as the technical&lt;br /&gt;
lead on active incidents for incident responders. Prepares threat and&lt;br /&gt;
impact assessments and reports them known to management.&amp;lt;ref name=&amp;quot;coursera&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Certificates== &lt;br /&gt;
There is a vast number of different certificates and the road map to&lt;br /&gt;
being a certified professional could be very different&amp;lt;ref name=&amp;quot;Coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated],&amp;quot; [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;NICCS&amp;quot;&amp;gt;NICCS, &amp;quot;Cybersecurity Certifications,&amp;quot; [Online]. Available: hhttps://niccs.cisa.gov/about-niccs/cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt; . One possible&lt;br /&gt;
approach is to start with basic certificates from the different branches&lt;br /&gt;
of service and move to more specific and demanding focused&lt;br /&gt;
certification. Also, some jobs require certain clearances, either from&lt;br /&gt;
industry, or from the government. One small selection of different&lt;br /&gt;
possible certificates is brought out in following paragraphs.&lt;br /&gt;
&lt;br /&gt;
Security+ is a CompTIA certification that is considered a basic cert&lt;br /&gt;
among cybersecurity professionals. It covers the topics of risk&lt;br /&gt;
management and threat assessment.&lt;br /&gt;
Network+ is also offered by CompTIA this certification (like the name&lt;br /&gt;
implies) focuses on networking infrastructure and operations. It is&lt;br /&gt;
considered a foundational certification.&lt;br /&gt;
The Certified Information Systems Security Professional (CISSP) is a&lt;br /&gt;
more advanced certification designed for cybersecurity professionals&lt;br /&gt;
with at least five years of work experience. The certification covers&lt;br /&gt;
topics such as architecture, engineering, and management.&amp;lt;/p&amp;gt;&lt;br /&gt;
The Certified Ethical Hacker (CEH) certification is also considered a&lt;br /&gt;
more advanced cert because it generally requires that applicants have&lt;br /&gt;
multiple years of work experience. The goal of an ethical hacker&lt;br /&gt;
certification is to be able to understand how cyber attacks unfold in&lt;br /&gt;
order to improve threat assessment and mitigation skills.&amp;lt;ref name=&amp;quot;cyberguide&amp;quot;&amp;gt;Cybersecurity Guide, &amp;quot;How to become a cybersecurity specialist&amp;quot;, [Online]. Available: https://cybersecurityguide.org/careers/security-specialist/. [Accessed 27 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
This is definitely not all, when one looks for more information, following link could be searched, to get more in depth knowledge about&lt;br /&gt;
different possibilities.&lt;br /&gt;
 &lt;br /&gt;
Hereby, with the help of this matrix a possible taxonomy of different 436 listed certificates in branches are&lt;br /&gt;
presented.&amp;lt;ref name=&amp;quot;Pauljeremy&amp;quot;&amp;gt;&amp;quot;Cybersecurity Roadmap,&amp;quot; [Online]. Available: https://pauljerimy.com/2020/10/12/scr-oct-2020-update/. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:analystimage5.png|1000px|thumb|Certificate matrix &amp;lt;ref&amp;gt;&amp;quot;Certification roadmap&amp;quot;. Available at https://pauljerimy.com/security-certification-roadmap&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
=== Communication and Network Security===&lt;br /&gt;
Communication and network security covers the ability to secure&lt;br /&gt;
communication channels and networks. Topics include secure and converges&lt;br /&gt;
protocols, wireless networks, cellular networks, hardware operations&lt;br /&gt;
(warranty and redundant power), and third-party connectivity. IP&lt;br /&gt;
networking are also included in this domain.&lt;br /&gt;
===Identity and Access Management===&lt;br /&gt;
The identity and access management domain covers the attacks that&lt;br /&gt;
target the human gateway to gain access to data. Other topics include&lt;br /&gt;
ways to identify users with rights to access the information and&lt;br /&gt;
servers. Identity and access management covers the topics of&lt;br /&gt;
applications, Single sign-on authentication, privilege escalation,&lt;br /&gt;
Kerberos, rule-based or risk-based access control, proofing and&lt;br /&gt;
establishment of identity.&lt;br /&gt;
===Security Architecture and Engineering===&lt;br /&gt;
The security architecture and engineering domain covers important&lt;br /&gt;
topics concerning security engineering plans, designs and principles,&lt;br /&gt;
Topics include assessing and mitigating information system&lt;br /&gt;
vulnerabilities, fundamental concepts of security models and security&lt;br /&gt;
architectures in critical areas like access control. Cloud systems,&lt;br /&gt;
cryptography, system infiltrations (ransomware, fault-injection and&lt;br /&gt;
more) and virtualized systems are also covered in this domain.&lt;br /&gt;
===Asset Security===&lt;br /&gt;
The Asset Security domain deals with the issues related to the&lt;br /&gt;
collection, storage, maintenance, retention and destruction of data. It&lt;br /&gt;
also covers knowledge of different roles regarding data handling (owner,&lt;br /&gt;
controller and custodian) as well as data protection methods and data&lt;br /&gt;
states. Other topics include resource provision, asset classification&lt;br /&gt;
and data lifecycle management.&lt;br /&gt;
===Security and Risk Management===&lt;br /&gt;
The security and risk management domain covers general on skills&lt;br /&gt;
related to the implementation of user awareness programs as well as&lt;br /&gt;
security procedures. Emphasis is also placed on risk management&lt;br /&gt;
concerning the acquisition of new services, hardware and software&lt;br /&gt;
(supply chain). Other skills include social engineering defense&lt;br /&gt;
mechanisms.&lt;br /&gt;
===Security Assessment and Testing===&lt;br /&gt;
The security assessment and testing domain deals with all the&lt;br /&gt;
techniques and tools used to find system vulnerabilities, weaknesses and&lt;br /&gt;
potential areas of concern not addressed by security procedures and&lt;br /&gt;
policies. Attack simulations, vulnerability assessment, compliance&lt;br /&gt;
checks, and ethical disclosure also fall under this domain.&lt;br /&gt;
===Software Security===&lt;br /&gt;
The software development security domain deals with implementing&lt;br /&gt;
software-based security protocols within environment for which the IT&lt;br /&gt;
professional is responsible. Risk analysis, vulnerability identification&lt;br /&gt;
and auditing of source codes are all covered in this subset. Additional&lt;br /&gt;
topics include software-designed security, maturity models, development&lt;br /&gt;
methodologies, open-source and third-party development security.&lt;br /&gt;
===Security operations===&lt;br /&gt;
The security operations domain covers topics ranging from&lt;br /&gt;
investigations and digital forensic to detection and intrusion&lt;br /&gt;
prevention tools, sandboxing and firewalls. Topics include user and&lt;br /&gt;
entity behavior analytics, threat intelligence (threat hunting and&lt;br /&gt;
threat feeds) log management, artifacts (mobile, computer and network),&lt;br /&gt;
machine learning and AI-based tools, penetration testing, and&lt;br /&gt;
exploitation development. These for sub-domains are lister here.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Incident Handling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Penetration Testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Exploitation&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Education==&lt;br /&gt;
[[File:Analystimage7.png|400px|thumb|Comparison degree vs Certificate &amp;lt;ref&amp;gt;&amp;quot;Comparison Table&amp;quot;. Available at https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
The entry level monitoring specialist is hired by Estonian&lt;br /&gt;
Information System Authority even if there is no formal IT education,&lt;br /&gt;
but readiness to learn and moderate knowledge of different operation&lt;br /&gt;
systems is enough to start the career. &amp;lt;ref name=&amp;quot;cv&amp;quot;&amp;gt;cv.ee, &amp;quot;SEIRESPETSIALIST - tule Eesti küberruumi valvuriks!&amp;quot;. Available: https://www.cv.ee/en/vacancy/792782/riigi-infosusteemi-amet/seirespetsialist-tule-eesti-kuberruumi-valvuriks [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Nevertheless, like most other high qualification careers jobs falling&lt;br /&gt;
under the cybersecurity specialist category require some form of formal&lt;br /&gt;
education. However, since cybersecurity specialist jobs can fall across&lt;br /&gt;
a wide spectrum of job descriptions and responsibilities, it is possible&lt;br /&gt;
to obtain a specialist job after completing many levels of different&lt;br /&gt;
computer related education.&lt;br /&gt;
&lt;br /&gt;
If one is looking for a cybersecurity related education, for example&lt;br /&gt;
in EU, 137 courses/programs could be found that relate to keyword IT or&lt;br /&gt;
cybersecurity. &amp;lt;ref name=&amp;quot;enisa&amp;quot;&amp;gt;ENISA (European Union Agency for Cybersecurity), &amp;quot;Cybersecurity Education-Cybersecurity Higher Education Database&amp;quot;. Available: https://www.enisa.europa.eu/topics/cybersecurity-education/education-map/education-courses [Accessed 26 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Also, there is a great amount of discussion, if cyber security&lt;br /&gt;
professional should have a degree or would be certification just enough.&lt;br /&gt;
One interesting table is produces by Franklin University that compares&lt;br /&gt;
benefits and/or drawbacks of each type of credential.&amp;lt;ref name=&amp;quot;franklin&amp;quot;&amp;gt;Franklin University, &amp;quot;Is Getting a Master&#039;s Degree in Cyber Security Worth It?&amp;quot;. Available: https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Certifications are generally good for people with little practical&lt;br /&gt;
experience because they are known quantities in the industry and can&lt;br /&gt;
help you get your foot in the door. They set a minimum knowledge bar.&lt;br /&gt;
But some certifications are viewed more favorably than others.&lt;br /&gt;
Certifications with renewal requirements are viewed better by hiring&lt;br /&gt;
managers, but they also more costly in the long run because of the need&lt;br /&gt;
for continuing education. Certifications are also good for showing&lt;br /&gt;
in-depth expertise in a specialization within cybersecurity. Depending&lt;br /&gt;
on your career goals, it may be advantageous to have a master’s&lt;br /&gt;
degree—which shows your breadth of knowledge, critical thinking and&lt;br /&gt;
leadership skills—and a certificate—which shows specific skill&lt;br /&gt;
competency.&amp;lt;ref name=&amp;quot;franklin&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
As IT (Cyber) Security is still a relatively young discipline,&lt;br /&gt;
universities and colleges are still figuring out which is the best&lt;br /&gt;
approach for their degrees. Study programmes and curricula in Cyber&lt;br /&gt;
Security are different. In general, here are the duration of Cyber&lt;br /&gt;
Security degrees:&lt;br /&gt;
&amp;lt;ref name=&amp;quot;studyportal&amp;quot;&amp;gt;Studyportals, &amp;quot;Why You Should Study a Cyber Security Degree in 2022&amp;quot;. Available: https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Bachelor’s degrees in Cyber Security take 3 or 4 years in most&lt;br /&gt;
countries.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Master’s courses in Cyber Security take between 1-2 years to&lt;br /&gt;
complete.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;PhD programmes in Cyber Security last 3-5 years. Some only take 1&lt;br /&gt;
or 2 years, but they are less common.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Generalization could me made that on bachelor level the general&lt;br /&gt;
knowledge about the cyber issues are obtained. On master level the&lt;br /&gt;
specialization courses are taken and the person can choose more specific&lt;br /&gt;
topics to study. It is on master level where strengths of the cyber&lt;br /&gt;
specialist can be developed further and up-do date knowledge obtained in&lt;br /&gt;
specifics. PhD is serious science and involves teaching, lot of&lt;br /&gt;
scientific work and writing for publications.&lt;br /&gt;
&lt;br /&gt;
==Salary==&lt;br /&gt;
&amp;lt;p&amp;gt;Even if the salary can be very different, compared to the skills and&lt;br /&gt;
experience, an generalization can be made. Cyber Security professionals&lt;br /&gt;
in CSIRT, and in other entities earn quite well, from the start. First,&lt;br /&gt;
some comparison from the United States. The average CSIRT analyst salary&lt;br /&gt;
in the USA is $97,500 per year or $50 per hour. Entry level positions&lt;br /&gt;
start at $48,875 per year while most experienced workers make up to&lt;br /&gt;
$135,373 per year.&amp;lt;ref name=&amp;quot;talent&amp;quot;&amp;gt;talent.com, &amp;quot;Csirt Analyst average salary in USA 2022&amp;quot;. Available: https://www.talent.com/salary?job=csirt+analyst [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There are multiple positions you can occupy in this field. They have&lt;br /&gt;
in common great salaries and high demand for technical skills, attention&lt;br /&gt;
to details, problem-solving mentality, and the ability to analyze risks.&lt;br /&gt;
Here are the average annual salaries in the United States, according to&lt;br /&gt;
Payscale: &amp;lt;ref name=&amp;quot;studyportal&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Cryptographer – 100,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Information Security Officer – 91,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Assessor – 90,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Engineer – 88,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Penetration Tester – 81,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Forensics Expert – 71,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Administrator – 65,000 USD&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
When looking into salaries in Estonia, one can find that there is a&lt;br /&gt;
discussion that private sector is taking a toll from the public sector,&lt;br /&gt;
and that the salaries in important agencies, as Information System&lt;br /&gt;
Authority loose their employees to the better paid positions in private&lt;br /&gt;
sector.&amp;lt;ref name=&amp;quot;digigeenius&amp;quot;&amp;gt;DiGi Geenius, &amp;quot;Kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad&amp;quot;. Available: https://digi.geenius.ee/rubriik/uudis/kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad/ [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;tehnika&amp;quot;&amp;gt;Postimees, &amp;quot;Riigi-it-tootajate-palgamaarad-kasvasid&amp;quot;. Available: https://tehnika.postimees.ee/6887428/riigi-it-tootajate-palgamaarad-kasvasid [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
But there is also a different view that average private sector worker&lt;br /&gt;
could be hired as a top specialist in public sector and then the payment&lt;br /&gt;
is higher. Nevertheless, it seems that the average payment in cyber&lt;br /&gt;
security sector is any way higher that in other parts of the&lt;br /&gt;
e-services. &amp;lt;ref name=&amp;quot;digigeenius2&amp;quot;&amp;gt;DiGi Geenius, &amp;quot;5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka&amp;quot;. Available: https://digi.geenius.ee/rubriik/uudis/5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==SOC==&lt;br /&gt;
&amp;lt;p&amp;gt;A SOC is a facility where an organization’s network, applications,&lt;br /&gt;
and endpoints are monitored and defended. The term was adapted from&lt;br /&gt;
network operations centers (NOCs), where large telecommunication or&lt;br /&gt;
corporate networks are monitored. When network security became more of a&lt;br /&gt;
concern, security teams were formed within the NOCs, and eventually spun&lt;br /&gt;
off into larger organizations of their own as the responsibilities of&lt;br /&gt;
security teams grew increasingly complex and specialized. The security&lt;br /&gt;
staff working in a security operations center are often called the SOC&lt;br /&gt;
team.&amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;Exabeam, &amp;quot;CSIRT&amp;quot;. Available: https://www.exabeam.com/incident-response/csirt/ [Accessed 28 APr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;Functions of the SOC team include, but are not limited to:&amp;lt;ref name=&amp;quot;trellix&amp;quot;&amp;gt;Trellix, &amp;quot;What Is a Security Operations Center (SOC)?&amp;quot;. Available: https://www.trellix.com/en-us/security-awareness/operations/what-is-soc.html [Accessed 30 APr 2022].&amp;lt;/ref&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ol type=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Taking inventory of resources, to get a better understanding of the&lt;br /&gt;
structure they are protecting.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintanence of the system, by constantly making updates and adding&lt;br /&gt;
safeguards.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Monitoring the network for abnormalities with special tools.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Threat analysis of new attacks and vulnerabilities.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Responding to attacks, by acting as “first responders”. The SOC team&lt;br /&gt;
will shut down and/or isolate endpoints, deleting files and lowering the&lt;br /&gt;
impact as fast as possible.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Recovery of system stability and lost data. This may be done using&lt;br /&gt;
backups, restarting endpoints or reconfiguring systems.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Logging all actions on the system, to be later used for analysis or&lt;br /&gt;
forensics after an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigating the root cause of an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Auditing their own actions, to be in line with regulations of the&lt;br /&gt;
organization, industry or governing body.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==CSIRT==&lt;br /&gt;
&amp;lt;p&amp;gt;A CSIRT is a group that responds to security incidents when they&lt;br /&gt;
occur. Key responsibilities of a CSIRT include:&lt;br /&gt;
&amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
===Creating and maintaining an incident response plan (IRP)===&lt;br /&gt;
An incident response plan (IRP) is a set of written instructions for&lt;br /&gt;
detecting, responding to and limiting the effects of an information&lt;br /&gt;
security event. Incident response plans provide instructions for&lt;br /&gt;
responding to many potential scenarios, including data breaches, denial&lt;br /&gt;
of service/distributed denial of service attacks, firewall breaches,&lt;br /&gt;
virus or malware outbreaks or insider threats. Without an incident&lt;br /&gt;
response plan in place, organizations may either not detect the attack&lt;br /&gt;
in the first place, or not follow proper protocol to contain the threat&lt;br /&gt;
and recover from it when a breach is detected.&lt;br /&gt;
&amp;lt;ref name=&amp;quot;stratacore&amp;quot;&amp;gt;Stratacore, &amp;quot;Incident Response Plan (IRP)&amp;quot;. https://www.stratacore.com/incidentresponseplan [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Investigating and analyzing incidents===&lt;br /&gt;
CSIRTs are also involved in improvement activities. After major&lt;br /&gt;
computer security incidents occur, or when incidents are not handled in&lt;br /&gt;
a timely or effective manner, a CSIRT will generally perform a&lt;br /&gt;
postmortem of the incident and its response. This postmortem will&lt;br /&gt;
identify the strengths and weakness of the response effort. Such reviews&lt;br /&gt;
can identify weaknesses and holes in systems, infrastructure defenses,&lt;br /&gt;
or policies that allowed the incident to take place. It can also&lt;br /&gt;
identify problems with communication channels, interfaces, and&lt;br /&gt;
procedures that inhibited the efficient resolution of the reported&lt;br /&gt;
problem.&lt;br /&gt;
&amp;lt;ref name=&amp;quot;cisa&amp;quot;&amp;gt;CISA (Cybersecurity &amp;amp; Infrastructure Security Agency, &amp;quot;Defining Computer Security Incident Response Teams&amp;quot;. https://www.cisa.gov/uscert/bsi/articles/best-practices/incident-management/defining-computer-security-incident-response-teams [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Managing internal communications and updates during or immediately after incidents occur===&lt;br /&gt;
===Communicating with employees, shareholders, customers, and the press about incidents as needed===&lt;br /&gt;
There are various services within the CSIRT Services Framework that&lt;br /&gt;
address communications, as they relate to security operations and&lt;br /&gt;
incident response services. Some of these include Information Security&lt;br /&gt;
Incident Coordination, Crisis Management Support, Vulnerability&lt;br /&gt;
Disclosure, Situational Awareness Communication, and Awareness Building,&lt;br /&gt;
to name a few. Sharing information and communicating with the general&lt;br /&gt;
public and/or your constituency is appropriate in many different&lt;br /&gt;
scenarios. These can range from proactive communications to reactive&lt;br /&gt;
communications. Each scenario may be unique, and careful consideration&lt;br /&gt;
should be given to when to release information to the public and what&lt;br /&gt;
information should be released.&lt;br /&gt;
&amp;lt;ref name=&amp;quot;CMUni&amp;quot;&amp;gt;Carniege Mellon University, Brittany Manley, David McIntire &amp;quot;A Guide to Effective Incident Management Communications&amp;quot;. https://resources.sei.cmu.edu/asset_files/Handbook/2021_002_001_651819.pdf [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Remediating incidents===&lt;br /&gt;
Threat remediation is a strong and capable tool for fighting the&lt;br /&gt;
cyber security compromises. As the word ‘remedy’ suggests, remediation&lt;br /&gt;
process involves the treatment of a security breach. With the&lt;br /&gt;
remediation practices, your cyber security team is able to eliminate&lt;br /&gt;
suspicious activities and malicious attacks in the form of malware,&lt;br /&gt;
ransomware, phishing and such. Even if you ‘kill’ the suspicious&lt;br /&gt;
activity, the attackers can remain in your systems. If you want to&lt;br /&gt;
contaminate and end the problem for good, your remediation processes&lt;br /&gt;
must involve the detection of the cause. &amp;lt;ref name=&amp;quot;logsign&amp;quot;&amp;gt;Logsign, &amp;quot;What-is-remediation-in-cyber-security&amp;quot;. Available: https://www.logsign.com/blog/what-is-remediation-in-cyber-security/. [Accessed 28 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Recommending technology, policy, governance, and training changes after security incidents===&lt;br /&gt;
After all these actions, the SCIRT must contribute to the development&lt;br /&gt;
of better policies, practices and has to recommend improvements. They&lt;br /&gt;
are not working in the vacuum and their work has to create new and&lt;br /&gt;
better standards for cyber security. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;Exabeam, &amp;quot;CSIRT&amp;quot;. Available: https://www.exabeam.com/incident-response/csirt/ [Accessed 28 APr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==CERT==&lt;br /&gt;
The term “computer emergency response team” was coined in 1988. In&lt;br /&gt;
response to the Morris worm attack that impacted thousands of servers on&lt;br /&gt;
the Internet, DARPA funded the formation of the Computer Emergency&lt;br /&gt;
Response Team Coordination Center (CERT-CC) at Carnegie Mellon&lt;br /&gt;
University. The goal of CERT-CC was to help protect the internet by&lt;br /&gt;
collecting and disseminating information on critical security&lt;br /&gt;
vulnerabilities. Several other countries formed similar centers using&lt;br /&gt;
the same acronym (despite threats of legal action by Carnegie Mellon for&lt;br /&gt;
trademark infringement). Now the term CERT refers to any emergency&lt;br /&gt;
response team that deals with cyber threats. Many people use CERT-CC&lt;br /&gt;
interchangeably with CSIRT, though the charter of a CERT is information&lt;br /&gt;
sharing in order to help other response teams respond to threats against&lt;br /&gt;
their own infrastructure. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In general, the designation of CERT is helpful in applying real-world&lt;br /&gt;
solutions to various cybersecurity problems. They may be government&lt;br /&gt;
contractors or employees of a major corporation. For example, the U.S.&lt;br /&gt;
Computer Emergency Readiness Team (US-CERT) operates under the U.S.&lt;br /&gt;
Department of Homeland Security.&lt;br /&gt;
&amp;lt;ref name=&amp;quot;techopedia&amp;quot;&amp;gt;Techopedia, &amp;quot;Computer Emergency Response Team (CERT)&amp;quot;. Available: https://www.techopedia.com/definition/31003/computer-emergency-response-team-cert. [Accessed 25 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In Estonia CERT is designated as CERT-EE. It was established in 2006,&lt;br /&gt;
as an organization responsible for the management of security incidents&lt;br /&gt;
in .ee computer networks. It is also a national contact point for&lt;br /&gt;
international co-operation in the field of IT security. &amp;lt;ref name=&amp;quot;ria&amp;quot;&amp;gt;Information System Autority, &amp;quot;CERT-EE&amp;quot;. Available: hhttps://www.ria.ee/en/cyber-security/cert-ee.html [Accessed 25 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Difference between SOC/CSIRT/CERT==&lt;br /&gt;
[[File:analystimage3.png|300px|thumb|SOC/CSIRT/CERT &amp;lt;ref name=&amp;quot;exabeam&amp;gt;&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
How CSIRTs differ from CERTs and SOCs. There are overlapping&lt;br /&gt;
responsibilities between a community emergency response team (CERT),&lt;br /&gt;
computer security incident response team (CSIRT), and security&lt;br /&gt;
operations center (SOC). To add to this confusion, frequently, the terms&lt;br /&gt;
CERT and CSIRT are used interchangeably, despite the important&lt;br /&gt;
differences. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Understand the primary roles and characteristics of a CERT, CSIRT, and SOC.==&lt;br /&gt;
[[File:analystimage4.png|600px|thumb|Primary Roles of CERT, CSIRT, and SOC&amp;lt;ref name=&amp;quot;exabeam&amp;gt;&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&amp;lt;p&amp;gt;So, using strict definitions, a CERT collects and disseminates&lt;br /&gt;
security information, typically for the benefit of a country or an&lt;br /&gt;
industry. A CSIRT is a cross-functional team that responds to incidents&lt;br /&gt;
on behalf of a country or an organization. A SOC is where a country or&lt;br /&gt;
organization monitors and defends its network, servers, applications,&lt;br /&gt;
and endpoints. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Future==&lt;br /&gt;
&amp;lt;p&amp;gt;And the Cyber security problem is only getting bigger. According to a&lt;br /&gt;
report published by Accenture, the number of cyber security breaches&lt;br /&gt;
increased by 11 percent from 2017 to 2018. The cost of such breaches is&lt;br /&gt;
astronomical–about $600 billion worldwide, according to the Economic&lt;br /&gt;
Impact of Cybercrime report.&lt;br /&gt;
&amp;lt;ref name=&amp;quot;ecpi&amp;quot;&amp;gt;ECPI, &amp;quot;What-is-digital-forensics-in-cybersecurity&amp;quot;. Available: https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me [Accessed 27 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Job projections for cybersecurity are staggering. The Bureau of Labor&lt;br /&gt;
Statistics in US predicts that careers in the cybersecurity field will&lt;br /&gt;
grow by 32% by 2028. That makes cybersecurity one of the top 10&lt;br /&gt;
fastest-growing jobs in the country. In the United States alone, jobs&lt;br /&gt;
for Information Security Analysts are expected to grow by 15% by&lt;br /&gt;
2024.&amp;lt;ref name=&amp;quot;franklin&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Most likely this trend is also similar in other countries.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
When checking Estonian job portals, there is a constant need for&lt;br /&gt;
people for cyber security related positions. Also, linkedin search gives&lt;br /&gt;
approximately 30 vacancies immediately. There are banks, logistics&lt;br /&gt;
companies, e-shops, and software producers. &amp;lt;ref name=&amp;quot;linkedin&amp;quot;&amp;gt;LinkedIn, &amp;quot;Cyber Security Jobs&amp;quot;. Available: ttps://ee.linkedin.com/jobs/cyber-security-jobs?countryRedirected=1&amp;amp;amp;position=1&amp;amp;amp;pageNum=0 [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Trends that affect companies create need for constant cyber security&lt;br /&gt;
services. Increasing number of home/remote offices require secure&lt;br /&gt;
corporate networks and security of remote devices. One example is from&lt;br /&gt;
this year, when sloppy remote desktop set-up paralyzed systems of 17&lt;br /&gt;
companies.&lt;br /&gt;
&amp;lt;ref name=&amp;quot;aripaev&amp;quot;&amp;gt;Äripäev, &amp;quot;RIA: lohakas kaugtöölaua seadistus halvas märtsis 17 ettevõtte IT-süsteemid&amp;quot;Available: ttps://www.aripaev.ee/uudised/2022/04/20/ria-lohakas-kaugtoolaua-seadistus-halvas-martsis-vahemalt-17-juhul-ettevotete-it-susteemid [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Also, no service can exists without robust infrastructure - servers,&lt;br /&gt;
databases, applications. As all previously mentioned devices and&lt;br /&gt;
services are at constant scanning and surveillance. So, the breach&lt;br /&gt;
detection and immediate action demands 24/7 services. Even if lot of&lt;br /&gt;
things could be automated, there is a need for human specialists (at&lt;br /&gt;
least, at the moment). Third growing field is also a forensic&lt;br /&gt;
investigation, as every attack must be investigated in order to be ready&lt;br /&gt;
to repel next attacks. So data recovery and evidence collection is&lt;br /&gt;
another important field of work that need skilled and professional&lt;br /&gt;
workers.&lt;br /&gt;
Even, if the specifics of the entity, be it CSIRT, CERT or SOC, are&lt;br /&gt;
different, the fundamentals of the work are the same. Professional&lt;br /&gt;
knowledge of the networks, operational systems, hardware, scripting, and&lt;br /&gt;
several other wider IT related knowledge is needed. As there is no&lt;br /&gt;
single way to reach to it, every single person can find one’s strongest&lt;br /&gt;
sides and develop them with knowledge of weaker side, in order to know,&lt;br /&gt;
when to as for help.&lt;/div&gt;</summary>
		<author><name>Mavald</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142282</id>
		<title>Hiring a Cyber Security Incident Analyst</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142282"/>
		<updated>2022-05-01T16:21:01Z</updated>

		<summary type="html">&lt;p&gt;Mavald: /* Future */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==A Cyber Security Incident Analyst==&lt;br /&gt;
&lt;br /&gt;
[[File:image1.png|600px|thumb|Job advertisement &amp;lt;ref&amp;gt;&amp;quot;Job Advertisement&amp;quot;. Available at https://www.projectpeople.com/jobs/&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
===Cyber security incident analyst in SOC/CSIRT/CERT===&lt;br /&gt;
This article delves into the job title of Cyber Security Incident&lt;br /&gt;
Analyst and provides an overview of the acronyms SOC/CSIRT/CERT. A brief&lt;br /&gt;
history of the job is discussed here, as well as a possible career path,&lt;br /&gt;
education, experience, and other characteristics required for work in&lt;br /&gt;
computer security-related organizations. The article also provides a&lt;br /&gt;
brief history of SOC/CSIRT/CERT, as well as a comparison of their&lt;br /&gt;
differences and similarities.&lt;br /&gt;
===Cyber Security Incident Analyst Skill Set===&lt;br /&gt;
What skill set is expected from the Cyber Security Incident Analyst? Below written lines are taken from the same job advertisement depicted&lt;br /&gt;
on the left side of this article:&lt;br /&gt;
As a Security Incident Analyst your responsibilities will include:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Continuous monitoring of security tooling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Performing regular and ad-hoc vulnerability assessments&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Carrying out ‘spot checks’&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Reporting vulnerabilities to the PVG via the alerts system&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintaining and documenting logging systems&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Developing centralized logging, reporting and intelligence&lt;br /&gt;
platforms&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;‘Light touch’ penetration testing with open source tooling&lt;br /&gt;
(Metasploit)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Knowledge &amp;amp;amp; Experience required:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;SOC, CSIRT or CERT operational environment experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Windows / Linux experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TCP /IP networking protocol knowledge&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience reviewing and analyzing Security Events from various&lt;br /&gt;
monitoring and logging sources&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience in website and web application security assessment or&lt;br /&gt;
penetration testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience of using Metasploit&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Scripting knowledge using BASH, Python, Perl, Ruby&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Skills in Host and Network Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
As one can see the description of the duties is wide and also the&lt;br /&gt;
knowledge and experience that is required is noteworthy. So, where to&lt;br /&gt;
start to find out the way to get this kind of knowledge and&lt;br /&gt;
expertize.&lt;br /&gt;
===Possible career path===&lt;br /&gt;
Next part of the paper is aiming to depict a possible ways, how to&lt;br /&gt;
develop oneself, and move along the career pathway in cybersecurity&lt;br /&gt;
field. Topics of development, education, experience and certification&lt;br /&gt;
are covered.&lt;br /&gt;
[[File:analystimage2.png|1000px|thumb|Career path &amp;lt;ref&amp;gt;&amp;quot;Possible Career Path&amp;quot;. Available at https://www.cyberseek.org/pathway.html&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
===Junior/Senior===&lt;br /&gt;
Start with an entry-level job in IT. Hands-on experience is often the&lt;br /&gt;
most effective way to prepare for certification exams. Start&lt;br /&gt;
accumulating work experience with an entry-level role as a cybersecurity&lt;br /&gt;
analyst. Many cybersecurity professionals start off in more general IT&lt;br /&gt;
roles. The skills, practices, and technologies you’ll use as a&lt;br /&gt;
cybersecurity professional will continue to evolve along with computer&lt;br /&gt;
and network technology. The desire to learn, ability to problem solve,&lt;br /&gt;
and attention to detail will serve you well in this field. Other, more&lt;br /&gt;
technical skills and technologies to learn include:&amp;lt;ref name=&amp;quot;certification&amp;quot;&amp;gt;Popular Cyber Security Certificates [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications  [Accessed 25 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====SIEM tools (security information and event management)====&lt;br /&gt;
Security Information and Event Management (SIEM) is a set of tools&lt;br /&gt;
and services offering a holistic view of an organization’s information&lt;br /&gt;
security. SIEM works by combining two technologies:&lt;br /&gt;
&amp;lt;li&amp;gt;Security information management (SIM), which collects data from log&lt;br /&gt;
files for analysis and reports on security threats and events, and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;security event management (SEM), which conducts real-time system&lt;br /&gt;
monitoring, notifies network admins about important issues and&lt;br /&gt;
establishes correlations between security events. There are a number of&lt;br /&gt;
security information and event management solutions on the market.&lt;br /&gt;
ArcSight ESM, IBM QRadar and Splunk are among the most popular. &amp;lt;ref name=&amp;quot;SIEM&amp;quot;&amp;gt;Application security, SIEM [Online]. Available: https://www.imperva.com/learn/application-security/siem/. [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Firewalls, Intrusion Detection Systems (IDS), and Intrusion Prevention Systems(IPS)====&lt;br /&gt;
Firewalls can be two types, hardware and software firewalls. Software&lt;br /&gt;
firewall is a firewall that is installed on a computer or server, and&lt;br /&gt;
tasked with network security. It works with a wide variety of other&lt;br /&gt;
technology security solutions to provide more robust and cohesive&lt;br /&gt;
security for enterprises of all sizes. When a software firewall is&lt;br /&gt;
installed on a server, it opens up like an umbrella of protection over&lt;br /&gt;
all other computers connected to the network. It is able to monitor both&lt;br /&gt;
incoming and outgoing traffic for potential risk or suspicious user&lt;br /&gt;
behavior, and also makes setting security policies much easier, faster&lt;br /&gt;
and more flexible. Hardware firewall is positioned between the network&lt;br /&gt;
and devices, allowing traffic to funnel through the firewall for a close&lt;br /&gt;
inspection and analysis. A hardware firewall, a term often&lt;br /&gt;
interchangeable with network or next-generation firewall, protects the&lt;br /&gt;
network gateways for an enterprise. Hardware firewall is physical&lt;br /&gt;
hardware, installed between network elements and connected devices, and&lt;br /&gt;
is tasked with filtering traffic for cyber threat to the network or&lt;br /&gt;
devices. Filtering out unauthorized or suspicious users based on traffic&lt;br /&gt;
analysis is one of the biggest benefits of hardware firewall. &amp;lt;ref name=&amp;quot;sangfor&amp;quot;&amp;gt;Sangfor, &amp;quot;What is Software Firewall? Difference between Hardware Firewall and Software Firewall, [Online]. Available: https://www.sangfor.com/blog/cybersecurity/what-is-software-firewall-difference-between-hardware-firewall-and-software-firewall [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems&lt;br /&gt;
(IPS) are both parts of the network infrastructure. IDS/IPS compare&lt;br /&gt;
network packets to a cyberthreat database containing known signatures of&lt;br /&gt;
cyberattacks — and flag any matching packets. IDS doesn’t alter the&lt;br /&gt;
network packets in any way, whereas IPS prevents the packet from&lt;br /&gt;
delivery based on the contents of the packet, much like how a firewall&lt;br /&gt;
prevents traffic by IP address. &amp;lt;ref name=&amp;quot;Varonis&amp;quot;&amp;gt;Varonis, &amp;quot;What is Software Firewall? IDS vs. IPS: What is the Difference?, [Online]. Available: https://www.varonis.com/blog/ids-vs-ips [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Digital forensics====&lt;br /&gt;
Digital forensics is a branch of forensic science that focuses on&lt;br /&gt;
identifying, acquiring, processing, analyzing, and reporting on data&lt;br /&gt;
stored electronically. Electronic evidence is a component of almost all&lt;br /&gt;
criminal activities and digital forensics support is crucial for law&lt;br /&gt;
enforcement investigations. Electronic evidence can be collected from a&lt;br /&gt;
wide array of sources, such as computers, smartphones, remote storage,&lt;br /&gt;
unmanned aerial systems, shipborne equipment, and more.&amp;lt;ref name=&amp;quot;interpol&amp;quot;&amp;gt;Interpol, &amp;quot;Digital forensics&amp;quot;. Available: https://www.interpol.int/How-we-work/Innovation/Digital-forensics. [Accessed 28 4 2022].&amp;lt;/ref&amp;gt; &lt;br /&gt;
Investigative process of digital forensics can be divided into several stages. There are four major stages: preservation, collection,&lt;br /&gt;
examination, and analysis. All these four stages need a deep understanding of computers, technology across a broad spectrum, and cybersecurity principles and&lt;br /&gt;
practices, a working knowledge of computers, networks, and coding, in-depth investigative abilities, critical-thinking skills and analytical talent the ability to effectively communicate and work with a&lt;br /&gt;
wide range of people. &amp;lt;ref name=&amp;quot;ecpi&amp;quot;&amp;gt;&amp;quot;Digital forensics&amp;quot;. Available: https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me. [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Mobile device management====&lt;br /&gt;
Mobile device management (MDM) is software that allows IT&lt;br /&gt;
administrators to control, secure and enforce policies on smartphones,&lt;br /&gt;
tablets and other endpoints. Mobile device management software emerged&lt;br /&gt;
in the early 2000s as a way to control and secure the personal digital&lt;br /&gt;
assistants and smartphones that business workers began to use. The&lt;br /&gt;
consumer smartphone boom that started with the launch of the Apple&lt;br /&gt;
iPhone in 2007 led to the bring your own device (BYOD) trend, which&lt;br /&gt;
fueled further interest in MDM.&amp;lt;ref name=&amp;quot;techtarget&amp;quot;&amp;gt;Techtarget, &amp;quot;Mobile Device Management&amp;quot;. Available: https://www.techtarget.com/searchmobilecomputing/definition/mobile-device-management [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Data management====&lt;br /&gt;
Sometimes the data management is neglected, but this part has a&lt;br /&gt;
crucial role when learning for good cyber security practices. Majority&lt;br /&gt;
of cyber security programs include a special courses on data management.&lt;br /&gt;
Data management is a method of organizing and maintaining data processes&lt;br /&gt;
that are required in almost every business operations. The benefits of&lt;br /&gt;
data management can be found accounting, statistics, logistics planning&lt;br /&gt;
and other disciplines including corporate computing.&amp;lt;ref name=&amp;quot;GlobalUni&amp;quot;&amp;gt;Global Universities, &amp;quot;MSc Data Management and Cyber Security&amp;quot;. Available: https://globaluniversities.in/msc-data-management-cyber-security. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Data governance (and management) play a fundamental role in&lt;br /&gt;
protecting an organization’s data. Ensuring that the right people have&lt;br /&gt;
the right access and that appropriate security controls are in place to&lt;br /&gt;
protect each system or service, based on the criticality or sensitivity&lt;br /&gt;
of the data sets these contain. &amp;lt;ref name=&amp;quot;CyberMagazine&amp;quot;&amp;gt;Cyber Security Magazine, &amp;quot;The Role of Data Governance in Cybersecurity&amp;quot;. Available: https://cybersecurity-magazine.com/the-role-of-data-governance-in-cybersecurity/?utm_source=rss&amp;amp;amp;utm_medium=rss&amp;amp;amp;utm_campaign=the-role-of-data-governance-in-cybersecurity. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Application security development====&lt;br /&gt;
Application security describes security measures at the application&lt;br /&gt;
level that aim to prevent data or code within the app from being stolen&lt;br /&gt;
or hijacked. It encompasses the security considerations that happen&lt;br /&gt;
during application development and design, but it also involves systems&lt;br /&gt;
and approaches to protect apps after they get deployed. Application&lt;br /&gt;
security may include hardware, software, and procedures that identify or&lt;br /&gt;
minimize security vulnerabilities.&amp;lt;ref name=&amp;quot;vmware&amp;quot;&amp;gt;VmWare, &amp;quot;What is application security?&amp;quot;. Available: https://www.vmware.com/topics/glossary/content/application-security.html [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Application security development is important to ensure that your&lt;br /&gt;
application is free from coding errors and bugs. And controls the risk&lt;br /&gt;
and helps safeguard against security vulnerabilities. Application&lt;br /&gt;
security development is the process of making applications more secure&lt;br /&gt;
by finding and fixing security vulnerabilities. This is often done by&lt;br /&gt;
enforcing software security best practices and using application&lt;br /&gt;
security testing tools. &lt;br /&gt;
&amp;lt;ref name=&amp;quot;perforce&amp;quot;&amp;gt;Perforce, &amp;quot;Application Security Development Best Practices&amp;quot;. Available: https://www.perforce.com/blog/kw/application-security-development-best-practices. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Audit and compliance knowledge====&lt;br /&gt;
A cyber security audit is designed to be a comprehensive review and&lt;br /&gt;
analysis of your business’s IT infrastructure. It identifies threats and&lt;br /&gt;
vulnerabilities, exposing weaknesses and high-risk practices.&lt;br /&gt;
Regulations such as the EU GDPR (General Data Protection Regulation) can&lt;br /&gt;
impose hefty penalties in the event of a breach that results in&lt;br /&gt;
exploited data. A cyber security audit will help mitigate the&lt;br /&gt;
consequences of a breach and demonstrate that your organization has&lt;br /&gt;
taken the necessary steps to protect client and company data. &amp;lt;ref name=&amp;quot;cyforsecure&amp;quot;&amp;gt;Cyfor Secure, &amp;quot;What is a Cyber Security Audit and how can it help your organisation?&amp;quot;. Available: https://cyforsecure.co.uk/services/cyber-assessment/cyber-security-audit/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cybersecurity compliance is the organizational risk management method&lt;br /&gt;
aligned with pre-defined security measures &amp;amp;amp; controls on how data&lt;br /&gt;
confidentiality is ensured by its administrative procedures.&amp;lt;ref name=&amp;quot;nordlayer&amp;quot;&amp;gt;NordLayer, &amp;quot;Cybersecurity compliance: Everything you need to know&amp;quot;. Available: https://nordlayer.com/blog/cybersecurity-compliance-everything-you-need-to-know/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
All needed skills are developed through courses and certification.&lt;br /&gt;
&lt;br /&gt;
===Entry-Level Incident Response Positions===&lt;br /&gt;
It is not always possible to advance to the position of incident&lt;br /&gt;
responder in a straight line. Many professionals advance from entry- to&lt;br /&gt;
mid-level positions before becoming a real incident responder or a&lt;br /&gt;
member of a computer emergency response team (CERT).&amp;lt;br /&amp;gt;&lt;br /&gt;
These are some examples: &amp;lt;ref name=&amp;quot;Infosec&amp;quot;&amp;gt;Infosec, &amp;quot;Incident Responder Career Roadmap: From Entry Level to Executive&amp;quot;. Available: https://resources.infosecinstitute.com/topic/incident-responder-career-roadmap-entry-level-executive/ [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;network-administrator&amp;quot;&amp;gt;Network administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;This position’s experience will help potential incident responders&lt;br /&gt;
develop networking skills. Attention to detail, as well as the ability&lt;br /&gt;
to sift through system configurations, site layouts, and general network&lt;br /&gt;
and communication setups, are essential in this field.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;system-administrator&amp;quot;&amp;gt;System administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Another crucial beginning point for an incident responder is to learn&lt;br /&gt;
how to manage resources inside your organization as well as user&lt;br /&gt;
behavior. Understanding the potential damage that users, inadequate&lt;br /&gt;
security setups, and ineffective IT policies and procedures can cause on&lt;br /&gt;
your network can provide prospective candidates with insight into the&lt;br /&gt;
human component of an incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;security-administrator&amp;quot;&amp;gt;Security administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In such a position, basic hacking skills, penetration testing, and&lt;br /&gt;
intrusion detection are all learned, which are crucial incident&lt;br /&gt;
responder skills when trying to replicate a breach or attack.&lt;br /&gt;
Understanding the paths a cybercriminal will take when attempting to&lt;br /&gt;
damage or obtain access to a system can greatly simplify the work of&lt;br /&gt;
reverse engineering the incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Mid-Level Incident Response Positions ===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5&lt;br /&gt;
id=&amp;quot;computer-security-incident-response-team-csirt-engineer&amp;quot;&amp;gt;Computer&lt;br /&gt;
security incident response team (CSIRT) engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;cyber-incident-responder&amp;quot;&amp;gt;Cyber incident responder&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-response-engineer&amp;quot;&amp;gt;Incident response&lt;br /&gt;
engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;While each of these positions is different, they generally require&lt;br /&gt;
very similar skills and characteristics in a candidate. At this level,&lt;br /&gt;
personal characteristics such as problem solving, time management, and&lt;br /&gt;
even presentation skills become more crucial as one’s career evolves&lt;br /&gt;
into a management-facing role.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Technical skills include the ability to identify and minimize threats&lt;br /&gt;
while maintaining communication with management and the rest of your&lt;br /&gt;
team. Data analysis and evidence gathering become increasingly crucial,&lt;br /&gt;
and the circumstances in which your services are deployed get more&lt;br /&gt;
serious.&amp;lt;/p&amp;gt;&lt;br /&gt;
Problem-solving skills are crucial at this level of incident&lt;br /&gt;
response, and as the stakes rise, so does the pressure in each&lt;br /&gt;
situation. At this level, programming abilities are essential since&lt;br /&gt;
incident responders may be needed to reverse engineer malicious code or&lt;br /&gt;
even create patches for vulnerable network applications or services. &amp;lt;ref name=&amp;quot;coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated]&amp;quot;. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Senior-Level Incident Response Positions===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;intrusion-detection-specialist&amp;quot;&amp;gt;Intrusion detection&lt;br /&gt;
specialist:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;A CISSP certification might help a potential candidate in preparing&lt;br /&gt;
for the profession. The role of an intrusion detection specialist is to&lt;br /&gt;
find and stop any unwanted communications.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-manager&amp;quot;&amp;gt;Incident manager:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Expected to plan, oversee, manage, and supervise all incident&lt;br /&gt;
response team actions. Is in charge of reporting all current events to&lt;br /&gt;
senior management and stakeholders, as well as acting as the technical&lt;br /&gt;
lead on active incidents for incident responders. Prepares threat and&lt;br /&gt;
impact assessments and reports them known to management.&amp;lt;ref name=&amp;quot;coursera&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Certificates== &lt;br /&gt;
There is a vast number of different certificates and the road map to&lt;br /&gt;
being a certified professional could be very different&amp;lt;ref name=&amp;quot;Coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated],&amp;quot; [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;NICCS&amp;quot;&amp;gt;NICCS, &amp;quot;Cybersecurity Certifications,&amp;quot; [Online]. Available: hhttps://niccs.cisa.gov/about-niccs/cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt; . One possible&lt;br /&gt;
approach is to start with basic certificates from the different branches&lt;br /&gt;
of service and move to more specific and demanding focused&lt;br /&gt;
certification. Also, some jobs require certain clearances, either from&lt;br /&gt;
industry, or from the government. One small selection of different&lt;br /&gt;
possible certificates is brought out in following paragraphs.&lt;br /&gt;
&lt;br /&gt;
Security+ is a CompTIA certification that is considered a basic cert&lt;br /&gt;
among cybersecurity professionals. It covers the topics of risk&lt;br /&gt;
management and threat assessment.&lt;br /&gt;
Network+ is also offered by CompTIA this certification (like the name&lt;br /&gt;
implies) focuses on networking infrastructure and operations. It is&lt;br /&gt;
considered a foundational certification.&lt;br /&gt;
The Certified Information Systems Security Professional (CISSP) is a&lt;br /&gt;
more advanced certification designed for cybersecurity professionals&lt;br /&gt;
with at least five years of work experience. The certification covers&lt;br /&gt;
topics such as architecture, engineering, and management.&amp;lt;/p&amp;gt;&lt;br /&gt;
The Certified Ethical Hacker (CEH) certification is also considered a&lt;br /&gt;
more advanced cert because it generally requires that applicants have&lt;br /&gt;
multiple years of work experience. The goal of an ethical hacker&lt;br /&gt;
certification is to be able to understand how cyber attacks unfold in&lt;br /&gt;
order to improve threat assessment and mitigation skills.&amp;lt;ref name=&amp;quot;cyberguide&amp;quot;&amp;gt;Cybersecurity Guide, &amp;quot;How to become a cybersecurity specialist&amp;quot;, [Online]. Available: https://cybersecurityguide.org/careers/security-specialist/. [Accessed 27 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
This is definitely not all, when one looks for more information, following link could be searched, to get more in depth knowledge about&lt;br /&gt;
different possibilities.&lt;br /&gt;
 &lt;br /&gt;
Hereby, with the help of this matrix a possible taxonomy of different 436 listed certificates in branches are&lt;br /&gt;
presented.&amp;lt;ref name=&amp;quot;Pauljeremy&amp;quot;&amp;gt;&amp;quot;Cybersecurity Roadmap,&amp;quot; [Online]. Available: https://pauljerimy.com/2020/10/12/scr-oct-2020-update/. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:analystimage5.png|1000px|thumb|Certificate matrix &amp;lt;ref&amp;gt;&amp;quot;Certification roadmap&amp;quot;. Available at https://pauljerimy.com/security-certification-roadmap&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
=== Communication and Network Security===&lt;br /&gt;
Communication and network security covers the ability to secure&lt;br /&gt;
communication channels and networks. Topics include secure and converges&lt;br /&gt;
protocols, wireless networks, cellular networks, hardware operations&lt;br /&gt;
(warranty and redundant power), and third-party connectivity. IP&lt;br /&gt;
networking are also included in this domain.&lt;br /&gt;
===Identity and Access Management===&lt;br /&gt;
The identity and access management domain covers the attacks that&lt;br /&gt;
target the human gateway to gain access to data. Other topics include&lt;br /&gt;
ways to identify users with rights to access the information and&lt;br /&gt;
servers. Identity and access management covers the topics of&lt;br /&gt;
applications, Single sign-on authentication, privilege escalation,&lt;br /&gt;
Kerberos, rule-based or risk-based access control, proofing and&lt;br /&gt;
establishment of identity.&lt;br /&gt;
===Security Architecture and Engineering===&lt;br /&gt;
The security architecture and engineering domain covers important&lt;br /&gt;
topics concerning security engineering plans, designs and principles,&lt;br /&gt;
Topics include assessing and mitigating information system&lt;br /&gt;
vulnerabilities, fundamental concepts of security models and security&lt;br /&gt;
architectures in critical areas like access control. Cloud systems,&lt;br /&gt;
cryptography, system infiltrations (ransomware, fault-injection and&lt;br /&gt;
more) and virtualized systems are also covered in this domain.&lt;br /&gt;
===Asset Security===&lt;br /&gt;
The Asset Security domain deals with the issues related to the&lt;br /&gt;
collection, storage, maintenance, retention and destruction of data. It&lt;br /&gt;
also covers knowledge of different roles regarding data handling (owner,&lt;br /&gt;
controller and custodian) as well as data protection methods and data&lt;br /&gt;
states. Other topics include resource provision, asset classification&lt;br /&gt;
and data lifecycle management.&lt;br /&gt;
===Security and Risk Management===&lt;br /&gt;
The security and risk management domain covers general on skills&lt;br /&gt;
related to the implementation of user awareness programs as well as&lt;br /&gt;
security procedures. Emphasis is also placed on risk management&lt;br /&gt;
concerning the acquisition of new services, hardware and software&lt;br /&gt;
(supply chain). Other skills include social engineering defense&lt;br /&gt;
mechanisms.&lt;br /&gt;
===Security Assessment and Testing===&lt;br /&gt;
The security assessment and testing domain deals with all the&lt;br /&gt;
techniques and tools used to find system vulnerabilities, weaknesses and&lt;br /&gt;
potential areas of concern not addressed by security procedures and&lt;br /&gt;
policies. Attack simulations, vulnerability assessment, compliance&lt;br /&gt;
checks, and ethical disclosure also fall under this domain.&lt;br /&gt;
===Software Security===&lt;br /&gt;
The software development security domain deals with implementing&lt;br /&gt;
software-based security protocols within environment for which the IT&lt;br /&gt;
professional is responsible. Risk analysis, vulnerability identification&lt;br /&gt;
and auditing of source codes are all covered in this subset. Additional&lt;br /&gt;
topics include software-designed security, maturity models, development&lt;br /&gt;
methodologies, open-source and third-party development security.&lt;br /&gt;
===Security operations===&lt;br /&gt;
The security operations domain covers topics ranging from&lt;br /&gt;
investigations and digital forensic to detection and intrusion&lt;br /&gt;
prevention tools, sandboxing and firewalls. Topics include user and&lt;br /&gt;
entity behavior analytics, threat intelligence (threat hunting and&lt;br /&gt;
threat feeds) log management, artifacts (mobile, computer and network),&lt;br /&gt;
machine learning and AI-based tools, penetration testing, and&lt;br /&gt;
exploitation development. These for sub-domains are lister here.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Incident Handling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Penetration Testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Exploitation&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Education==&lt;br /&gt;
[[File:Analystimage7.png|400px|thumb|Comparison degree vs Certificate &amp;lt;ref&amp;gt;&amp;quot;Comparison Table&amp;quot;. Available at https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
The entry level monitoring specialist is hired by Estonian&lt;br /&gt;
Information System Authority even if there is no formal IT education,&lt;br /&gt;
but readiness to learn and moderate knowledge of different operation&lt;br /&gt;
systems is enough to start the career. &amp;lt;ref name=&amp;quot;cv&amp;quot;&amp;gt;cv.ee, &amp;quot;SEIRESPETSIALIST - tule Eesti küberruumi valvuriks!&amp;quot;. Available: https://www.cv.ee/en/vacancy/792782/riigi-infosusteemi-amet/seirespetsialist-tule-eesti-kuberruumi-valvuriks [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Nevertheless, like most other high qualification careers jobs falling&lt;br /&gt;
under the cybersecurity specialist category require some form of formal&lt;br /&gt;
education. However, since cybersecurity specialist jobs can fall across&lt;br /&gt;
a wide spectrum of job descriptions and responsibilities, it is possible&lt;br /&gt;
to obtain a specialist job after completing many levels of different&lt;br /&gt;
computer related education.&lt;br /&gt;
&lt;br /&gt;
If one is looking for a cybersecurity related education, for example&lt;br /&gt;
in EU, 137 courses/programs could be found that relate to keyword IT or&lt;br /&gt;
cybersecurity. &amp;lt;ref name=&amp;quot;enisa&amp;quot;&amp;gt;ENISA (European Union Agency for Cybersecurity), &amp;quot;Cybersecurity Education-Cybersecurity Higher Education Database&amp;quot;. Available: https://www.enisa.europa.eu/topics/cybersecurity-education/education-map/education-courses [Accessed 26 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Also, there is a great amount of discussion, if cyber security&lt;br /&gt;
professional should have a degree or would be certification just enough.&lt;br /&gt;
One interesting table is produces by Franklin University that compares&lt;br /&gt;
benefits and/or drawbacks of each type of credential.&amp;lt;ref name=&amp;quot;franklin&amp;quot;&amp;gt;Franklin University, &amp;quot;Is Getting a Master&#039;s Degree in Cyber Security Worth It?&amp;quot;. Available: https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Certifications are generally good for people with little practical&lt;br /&gt;
experience because they are known quantities in the industry and can&lt;br /&gt;
help you get your foot in the door. They set a minimum knowledge bar.&lt;br /&gt;
But some certifications are viewed more favorably than others.&lt;br /&gt;
Certifications with renewal requirements are viewed better by hiring&lt;br /&gt;
managers, but they also more costly in the long run because of the need&lt;br /&gt;
for continuing education. Certifications are also good for showing&lt;br /&gt;
in-depth expertise in a specialization within cybersecurity. Depending&lt;br /&gt;
on your career goals, it may be advantageous to have a master’s&lt;br /&gt;
degree—which shows your breadth of knowledge, critical thinking and&lt;br /&gt;
leadership skills—and a certificate—which shows specific skill&lt;br /&gt;
competency.&amp;lt;ref name=&amp;quot;franklin&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
As IT (Cyber) Security is still a relatively young discipline,&lt;br /&gt;
universities and colleges are still figuring out which is the best&lt;br /&gt;
approach for their degrees. Study programmes and curricula in Cyber&lt;br /&gt;
Security are different. In general, here are the duration of Cyber&lt;br /&gt;
Security degrees:&lt;br /&gt;
&amp;lt;ref name=&amp;quot;studyportal&amp;quot;&amp;gt;Studyportals, &amp;quot;Why You Should Study a Cyber Security Degree in 2022&amp;quot;. Available: https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Bachelor’s degrees in Cyber Security take 3 or 4 years in most&lt;br /&gt;
countries.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Master’s courses in Cyber Security take between 1-2 years to&lt;br /&gt;
complete.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;PhD programmes in Cyber Security last 3-5 years. Some only take 1&lt;br /&gt;
or 2 years, but they are less common.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Generalization could me made that on bachelor level the general&lt;br /&gt;
knowledge about the cyber issues are obtained. On master level the&lt;br /&gt;
specialization courses are taken and the person can choose more specific&lt;br /&gt;
topics to study. It is on master level where strengths of the cyber&lt;br /&gt;
specialist can be developed further and up-do date knowledge obtained in&lt;br /&gt;
specifics. PhD is serious science and involves teaching, lot of&lt;br /&gt;
scientific work and writing for publications.&lt;br /&gt;
&lt;br /&gt;
==Salary==&lt;br /&gt;
&amp;lt;p&amp;gt;Even if the salary can be very different, compared to the skills and&lt;br /&gt;
experience, an generalization can be made. Cyber Security professionals&lt;br /&gt;
in CSIRT, and in other entities earn quite well, from the start. First,&lt;br /&gt;
some comparison from the United States. The average CSIRT analyst salary&lt;br /&gt;
in the USA is $97,500 per year or $50 per hour. Entry level positions&lt;br /&gt;
start at $48,875 per year while most experienced workers make up to&lt;br /&gt;
$135,373 per year.&amp;lt;ref name=&amp;quot;talent&amp;quot;&amp;gt;talent.com, &amp;quot;Csirt Analyst average salary in USA 2022&amp;quot;. Available: https://www.talent.com/salary?job=csirt+analyst [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There are multiple positions you can occupy in this field. They have&lt;br /&gt;
in common great salaries and high demand for technical skills, attention&lt;br /&gt;
to details, problem-solving mentality, and the ability to analyze risks.&lt;br /&gt;
Here are the average annual salaries in the United States, according to&lt;br /&gt;
Payscale: &amp;lt;ref name=&amp;quot;studyportal&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Cryptographer – 100,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Information Security Officer – 91,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Assessor – 90,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Engineer – 88,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Penetration Tester – 81,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Forensics Expert – 71,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Administrator – 65,000 USD&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
When looking into salaries in Estonia, one can find that there is a&lt;br /&gt;
discussion that private sector is taking a toll from the public sector,&lt;br /&gt;
and that the salaries in important agencies, as Information System&lt;br /&gt;
Authority loose their employees to the better paid positions in private&lt;br /&gt;
sector.&amp;lt;ref name=&amp;quot;digigeenius&amp;quot;&amp;gt;DiGi Geenius, &amp;quot;Kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad&amp;quot;. Available: https://digi.geenius.ee/rubriik/uudis/kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad/ [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;tehnika&amp;quot;&amp;gt;Postimees, &amp;quot;Riigi-it-tootajate-palgamaarad-kasvasid&amp;quot;. Available: https://tehnika.postimees.ee/6887428/riigi-it-tootajate-palgamaarad-kasvasid [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
But there is also a different view that average private sector worker&lt;br /&gt;
could be hired as a top specialist in public sector and then the payment&lt;br /&gt;
is higher. Nevertheless, it seems that the average payment in cyber&lt;br /&gt;
security sector is any way higher that in other parts of the&lt;br /&gt;
e-services. &amp;lt;ref name=&amp;quot;digigeenius2&amp;quot;&amp;gt;DiGi Geenius, &amp;quot;5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka&amp;quot;. Available: https://digi.geenius.ee/rubriik/uudis/5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==SOC==&lt;br /&gt;
&amp;lt;p&amp;gt;A SOC is a facility where an organization’s network, applications,&lt;br /&gt;
and endpoints are monitored and defended. The term was adapted from&lt;br /&gt;
network operations centers (NOCs), where large telecommunication or&lt;br /&gt;
corporate networks are monitored. When network security became more of a&lt;br /&gt;
concern, security teams were formed within the NOCs, and eventually spun&lt;br /&gt;
off into larger organizations of their own as the responsibilities of&lt;br /&gt;
security teams grew increasingly complex and specialized. The security&lt;br /&gt;
staff working in a security operations center are often called the SOC&lt;br /&gt;
team.&amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;Exabeam, &amp;quot;CSIRT&amp;quot;. Available: https://www.exabeam.com/incident-response/csirt/ [Accessed 28 APr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;Functions of the SOC team include, but are not limited to:&amp;lt;ref name=&amp;quot;trellix&amp;quot;&amp;gt;Trellix, &amp;quot;What Is a Security Operations Center (SOC)?&amp;quot;. Available: https://www.trellix.com/en-us/security-awareness/operations/what-is-soc.html [Accessed 30 APr 2022].&amp;lt;/ref&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ol type=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Taking inventory of resources, to get a better understanding of the&lt;br /&gt;
structure they are protecting.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintanence of the system, by constantly making updates and adding&lt;br /&gt;
safeguards.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Monitoring the network for abnormalities with special tools.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Threat analysis of new attacks and vulnerabilities.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Responding to attacks, by acting as “first responders”. The SOC team&lt;br /&gt;
will shut down and/or isolate endpoints, deleting files and lowering the&lt;br /&gt;
impact as fast as possible.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Recovery of system stability and lost data. This may be done using&lt;br /&gt;
backups, restarting endpoints or reconfiguring systems.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Logging all actions on the system, to be later used for analysis or&lt;br /&gt;
forensics after an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigating the root cause of an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Auditing their own actions, to be in line with regulations of the&lt;br /&gt;
organization, industry or governing body.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==CSIRT==&lt;br /&gt;
&amp;lt;p&amp;gt;A CSIRT is a group that responds to security incidents when they&lt;br /&gt;
occur. Key responsibilities of a CSIRT include:&lt;br /&gt;
&amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
===Creating and maintaining an incident response plan (IRP)===&lt;br /&gt;
An incident response plan (IRP) is a set of written instructions for&lt;br /&gt;
detecting, responding to and limiting the effects of an information&lt;br /&gt;
security event. Incident response plans provide instructions for&lt;br /&gt;
responding to many potential scenarios, including data breaches, denial&lt;br /&gt;
of service/distributed denial of service attacks, firewall breaches,&lt;br /&gt;
virus or malware outbreaks or insider threats. Without an incident&lt;br /&gt;
response plan in place, organizations may either not detect the attack&lt;br /&gt;
in the first place, or not follow proper protocol to contain the threat&lt;br /&gt;
and recover from it when a breach is detected.&lt;br /&gt;
&amp;lt;ref name=&amp;quot;stratacore&amp;quot;&amp;gt;Stratacore, &amp;quot;Incident Response Plan (IRP)&amp;quot;. https://www.stratacore.com/incidentresponseplan [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Investigating and analyzing incidents===&lt;br /&gt;
CSIRTs are also involved in improvement activities. After major&lt;br /&gt;
computer security incidents occur, or when incidents are not handled in&lt;br /&gt;
a timely or effective manner, a CSIRT will generally perform a&lt;br /&gt;
postmortem of the incident and its response. This postmortem will&lt;br /&gt;
identify the strengths and weakness of the response effort. Such reviews&lt;br /&gt;
can identify weaknesses and holes in systems, infrastructure defenses,&lt;br /&gt;
or policies that allowed the incident to take place. It can also&lt;br /&gt;
identify problems with communication channels, interfaces, and&lt;br /&gt;
procedures that inhibited the efficient resolution of the reported&lt;br /&gt;
problem.&lt;br /&gt;
&amp;lt;ref name=&amp;quot;cisa&amp;quot;&amp;gt;CISA (Cybersecurity &amp;amp; Infrastructure Security Agency, &amp;quot;Defining Computer Security Incident Response Teams&amp;quot;. https://www.cisa.gov/uscert/bsi/articles/best-practices/incident-management/defining-computer-security-incident-response-teams [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Managing internal communications and updates during or immediately after incidents occur===&lt;br /&gt;
===Communicating with employees, shareholders, customers, and the press about incidents as needed===&lt;br /&gt;
There are various services within the CSIRT Services Framework that&lt;br /&gt;
address communications, as they relate to security operations and&lt;br /&gt;
incident response services. Some of these include Information Security&lt;br /&gt;
Incident Coordination, Crisis Management Support, Vulnerability&lt;br /&gt;
Disclosure, Situational Awareness Communication, and Awareness Building,&lt;br /&gt;
to name a few. Sharing information and communicating with the general&lt;br /&gt;
public and/or your constituency is appropriate in many different&lt;br /&gt;
scenarios. These can range from proactive communications to reactive&lt;br /&gt;
communications. Each scenario may be unique, and careful consideration&lt;br /&gt;
should be given to when to release information to the public and what&lt;br /&gt;
information should be released.&lt;br /&gt;
&amp;lt;ref name=&amp;quot;CMUni&amp;quot;&amp;gt;Carniege Mellon University, Brittany Manley, David McIntire &amp;quot;A Guide to Effective Incident Management Communications&amp;quot;. https://resources.sei.cmu.edu/asset_files/Handbook/2021_002_001_651819.pdf [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Remediating incidents===&lt;br /&gt;
Threat remediation is a strong and capable tool for fighting the&lt;br /&gt;
cyber security compromises. As the word ‘remedy’ suggests, remediation&lt;br /&gt;
process involves the treatment of a security breach. With the&lt;br /&gt;
remediation practices, your cyber security team is able to eliminate&lt;br /&gt;
suspicious activities and malicious attacks in the form of malware,&lt;br /&gt;
ransomware, phishing and such. Even if you ‘kill’ the suspicious&lt;br /&gt;
activity, the attackers can remain in your systems. If you want to&lt;br /&gt;
contaminate and end the problem for good, your remediation processes&lt;br /&gt;
must involve the detection of the cause. &amp;lt;ref name=&amp;quot;logsign&amp;quot;&amp;gt;Logsign, &amp;quot;What-is-remediation-in-cyber-security&amp;quot;. Available: https://www.logsign.com/blog/what-is-remediation-in-cyber-security/. [Accessed 28 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Recommending technology, policy, governance, and training changes after security incidents===&lt;br /&gt;
After all these actions, the SCIRT must contribute to the development&lt;br /&gt;
of better policies, practices and has to recommend improvements. They&lt;br /&gt;
are not working in the vacuum and their work has to create new and&lt;br /&gt;
better standards for cyber security. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;Exabeam, &amp;quot;CSIRT&amp;quot;. Available: https://www.exabeam.com/incident-response/csirt/ [Accessed 28 APr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==CERT==&lt;br /&gt;
The term “computer emergency response team” was coined in 1988. In&lt;br /&gt;
response to the Morris worm attack that impacted thousands of servers on&lt;br /&gt;
the Internet, DARPA funded the formation of the Computer Emergency&lt;br /&gt;
Response Team Coordination Center (CERT-CC) at Carnegie Mellon&lt;br /&gt;
University. The goal of CERT-CC was to help protect the internet by&lt;br /&gt;
collecting and disseminating information on critical security&lt;br /&gt;
vulnerabilities. Several other countries formed similar centers using&lt;br /&gt;
the same acronym (despite threats of legal action by Carnegie Mellon for&lt;br /&gt;
trademark infringement). Now the term CERT refers to any emergency&lt;br /&gt;
response team that deals with cyber threats. Many people use CERT-CC&lt;br /&gt;
interchangeably with CSIRT, though the charter of a CERT is information&lt;br /&gt;
sharing in order to help other response teams respond to threats against&lt;br /&gt;
their own infrastructure. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In general, the designation of CERT is helpful in applying real-world&lt;br /&gt;
solutions to various cybersecurity problems. They may be government&lt;br /&gt;
contractors or employees of a major corporation. For example, the U.S.&lt;br /&gt;
Computer Emergency Readiness Team (US-CERT) operates under the U.S.&lt;br /&gt;
Department of Homeland Security.&lt;br /&gt;
&amp;lt;ref name=&amp;quot;techopedia&amp;quot;&amp;gt;Techopedia, &amp;quot;Computer Emergency Response Team (CERT)&amp;quot;. Available: https://www.techopedia.com/definition/31003/computer-emergency-response-team-cert. [Accessed 25 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In Estonia CERT is designated as CERT-EE. It was established in 2006,&lt;br /&gt;
as an organization responsible for the management of security incidents&lt;br /&gt;
in .ee computer networks. It is also a national contact point for&lt;br /&gt;
international co-operation in the field of IT security. &amp;lt;ref name=&amp;quot;ria&amp;quot;&amp;gt;Information System Autority, &amp;quot;CERT-EE&amp;quot;. Available: hhttps://www.ria.ee/en/cyber-security/cert-ee.html [Accessed 25 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Difference between SOC/CSIRT/CERT==&lt;br /&gt;
[[File:analystimage3.png|300px|thumb|SOC/CSIRT/CERT &amp;lt;ref name=&amp;quot;exabeam&amp;gt;&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
How CSIRTs differ from CERTs and SOCs. There are overlapping&lt;br /&gt;
responsibilities between a community emergency response team (CERT),&lt;br /&gt;
computer security incident response team (CSIRT), and security&lt;br /&gt;
operations center (SOC). To add to this confusion, frequently, the terms&lt;br /&gt;
CERT and CSIRT are used interchangeably, despite the important&lt;br /&gt;
differences. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Understand the primary roles and characteristics of a CERT, CSIRT, and SOC.==&lt;br /&gt;
[[File:analystimage4.png|600px|thumb|Primary Roles of CERT, CSIRT, and SOC&amp;lt;ref name=&amp;quot;exabeam&amp;gt;&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&amp;lt;p&amp;gt;So, using strict definitions, a CERT collects and disseminates&lt;br /&gt;
security information, typically for the benefit of a country or an&lt;br /&gt;
industry. A CSIRT is a cross-functional team that responds to incidents&lt;br /&gt;
on behalf of a country or an organization. A SOC is where a country or&lt;br /&gt;
organization monitors and defends its network, servers, applications,&lt;br /&gt;
and endpoints. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Future==&lt;br /&gt;
&amp;lt;p&amp;gt;And the Cyber security problem is only getting bigger. According to a&lt;br /&gt;
report published by Accenture, the number of cyber security breaches&lt;br /&gt;
increased by 11 percent from 2017 to 2018. The cost of such breaches is&lt;br /&gt;
astronomical–about $600 billion worldwide, according to the Economic&lt;br /&gt;
Impact of Cybercrime report.&lt;br /&gt;
&amp;lt;ref name=&amp;quot;ecpi&amp;quot;&amp;gt;ECPI, &amp;quot;What-is-digital-forensics-in-cybersecurity&amp;quot;. Available: https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me [Accessed 27 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Job projections for cybersecurity are staggering. The Bureau of Labor&lt;br /&gt;
Statistics in US predicts that careers in the cybersecurity field will&lt;br /&gt;
grow by 32% by 2028. That makes cybersecurity one of the top 10&lt;br /&gt;
fastest-growing jobs in the country. In the United States alone, jobs&lt;br /&gt;
for Information Security Analysts are expected to grow by 15% by&lt;br /&gt;
2024.&amp;lt;ref name=&amp;quot;franklin&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Most likely this trend is also similar in other countries.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
When checking Estonian job portals, there is a constant need for&lt;br /&gt;
people for cyber security related positions. Also, linkedin search gives&lt;br /&gt;
approximately 30 vacancies immediately. There are banks, logistics&lt;br /&gt;
companies, e-shops, and software producers. &amp;lt;ref name=&amp;quot;linkedin&amp;quot;&amp;gt;LinkedIn, &amp;quot;Cyber Security Jobs&amp;quot;. Available: ttps://ee.linkedin.com/jobs/cyber-security-jobs?countryRedirected=1&amp;amp;amp;position=1&amp;amp;amp;pageNum=0 [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Trends that affect companies create need for constant cyber security&lt;br /&gt;
services. Increasing number of home/remote offices require secure&lt;br /&gt;
corporate networks and security of remote devices. One example is from&lt;br /&gt;
this year, when sloppy remote desktop set-up paralyzed systems of 17&lt;br /&gt;
companies.&lt;br /&gt;
&amp;lt;ref name=&amp;quot;aripaev&amp;quot;&amp;gt;Äripäev, &amp;quot;RIA: lohakas kaugtöölaua seadistus halvas märtsis 17 ettevõtte IT-süsteemid&amp;quot;Available: ttps://www.aripaev.ee/uudised/2022/04/20/ria-lohakas-kaugtoolaua-seadistus-halvas-martsis-vahemalt-17-juhul-ettevotete-it-susteemid [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Also, no service can exists without robust infrastructure - servers,&lt;br /&gt;
databases, applications. As all previously mentioned devices and&lt;br /&gt;
services are at constant scanning and surveillance. So, the breach&lt;br /&gt;
detection and immediate action demands 24/7 services. Even if lot of&lt;br /&gt;
things could be automated, there is a need for human specialists (at&lt;br /&gt;
least, at the moment). Third growing field is also a forensic&lt;br /&gt;
investigation, as every attack must be investigated in order to be ready&lt;br /&gt;
to repel next attacks. So data recovery and evidence collection is&lt;br /&gt;
another important field of work that need skilled and professional&lt;br /&gt;
workers.&lt;br /&gt;
Even, if the specifics of the entity, be it CSIRT, CERT or SOC, are&lt;br /&gt;
different, the fundamentals of the work are the same. Professional&lt;br /&gt;
knowledge of the networks, operational systems, hardware, scripting, and&lt;br /&gt;
several other wider IT related knowledge is needed. As there is no&lt;br /&gt;
single way to reach to it, every single person can find one’s strongest&lt;br /&gt;
sides and develop them with knowledge of weaker side, in order to know,&lt;br /&gt;
when to as for help.&lt;/div&gt;</summary>
		<author><name>Mavald</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142279</id>
		<title>Hiring a Cyber Security Incident Analyst</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142279"/>
		<updated>2022-05-01T16:16:10Z</updated>

		<summary type="html">&lt;p&gt;Mavald: /* Future */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==A Cyber Security Incident Analyst==&lt;br /&gt;
&lt;br /&gt;
[[File:image1.png|600px|thumb|Job advertisement &amp;lt;ref&amp;gt;&amp;quot;Job Advertisement&amp;quot;. Available at https://www.projectpeople.com/jobs/&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
===Cyber security incident analyst in SOC/CSIRT/CERT===&lt;br /&gt;
This article delves into the job title of Cyber Security Incident&lt;br /&gt;
Analyst and provides an overview of the acronyms SOC/CSIRT/CERT. A brief&lt;br /&gt;
history of the job is discussed here, as well as a possible career path,&lt;br /&gt;
education, experience, and other characteristics required for work in&lt;br /&gt;
computer security-related organizations. The article also provides a&lt;br /&gt;
brief history of SOC/CSIRT/CERT, as well as a comparison of their&lt;br /&gt;
differences and similarities.&lt;br /&gt;
===Cyber Security Incident Analyst Skill Set===&lt;br /&gt;
What skill set is expected from the Cyber Security Incident Analyst? Below written lines are taken from the same job advertisement depicted&lt;br /&gt;
on the left side of this article:&lt;br /&gt;
As a Security Incident Analyst your responsibilities will include:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Continuous monitoring of security tooling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Performing regular and ad-hoc vulnerability assessments&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Carrying out ‘spot checks’&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Reporting vulnerabilities to the PVG via the alerts system&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintaining and documenting logging systems&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Developing centralized logging, reporting and intelligence&lt;br /&gt;
platforms&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;‘Light touch’ penetration testing with open source tooling&lt;br /&gt;
(Metasploit)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Knowledge &amp;amp;amp; Experience required:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;SOC, CSIRT or CERT operational environment experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Windows / Linux experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TCP /IP networking protocol knowledge&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience reviewing and analyzing Security Events from various&lt;br /&gt;
monitoring and logging sources&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience in website and web application security assessment or&lt;br /&gt;
penetration testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience of using Metasploit&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Scripting knowledge using BASH, Python, Perl, Ruby&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Skills in Host and Network Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
As one can see the description of the duties is wide and also the&lt;br /&gt;
knowledge and experience that is required is noteworthy. So, where to&lt;br /&gt;
start to find out the way to get this kind of knowledge and&lt;br /&gt;
expertize.&lt;br /&gt;
===Possible career path===&lt;br /&gt;
Next part of the paper is aiming to depict a possible ways, how to&lt;br /&gt;
develop oneself, and move along the career pathway in cybersecurity&lt;br /&gt;
field. Topics of development, education, experience and certification&lt;br /&gt;
are covered.&lt;br /&gt;
[[File:analystimage2.png|1000px|thumb|Career path &amp;lt;ref&amp;gt;&amp;quot;Possible Career Path&amp;quot;. Available at https://www.cyberseek.org/pathway.html&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
===Junior/Senior===&lt;br /&gt;
Start with an entry-level job in IT. Hands-on experience is often the&lt;br /&gt;
most effective way to prepare for certification exams. Start&lt;br /&gt;
accumulating work experience with an entry-level role as a cybersecurity&lt;br /&gt;
analyst. Many cybersecurity professionals start off in more general IT&lt;br /&gt;
roles. The skills, practices, and technologies you’ll use as a&lt;br /&gt;
cybersecurity professional will continue to evolve along with computer&lt;br /&gt;
and network technology. The desire to learn, ability to problem solve,&lt;br /&gt;
and attention to detail will serve you well in this field. Other, more&lt;br /&gt;
technical skills and technologies to learn include:&amp;lt;ref name=&amp;quot;certification&amp;quot;&amp;gt;Popular Cyber Security Certificates [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications  [Accessed 25 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====SIEM tools (security information and event management)====&lt;br /&gt;
Security Information and Event Management (SIEM) is a set of tools&lt;br /&gt;
and services offering a holistic view of an organization’s information&lt;br /&gt;
security. SIEM works by combining two technologies:&lt;br /&gt;
&amp;lt;li&amp;gt;Security information management (SIM), which collects data from log&lt;br /&gt;
files for analysis and reports on security threats and events, and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;security event management (SEM), which conducts real-time system&lt;br /&gt;
monitoring, notifies network admins about important issues and&lt;br /&gt;
establishes correlations between security events. There are a number of&lt;br /&gt;
security information and event management solutions on the market.&lt;br /&gt;
ArcSight ESM, IBM QRadar and Splunk are among the most popular. &amp;lt;ref name=&amp;quot;SIEM&amp;quot;&amp;gt;Application security, SIEM [Online]. Available: https://www.imperva.com/learn/application-security/siem/. [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Firewalls, Intrusion Detection Systems (IDS), and Intrusion Prevention Systems(IPS)====&lt;br /&gt;
Firewalls can be two types, hardware and software firewalls. Software&lt;br /&gt;
firewall is a firewall that is installed on a computer or server, and&lt;br /&gt;
tasked with network security. It works with a wide variety of other&lt;br /&gt;
technology security solutions to provide more robust and cohesive&lt;br /&gt;
security for enterprises of all sizes. When a software firewall is&lt;br /&gt;
installed on a server, it opens up like an umbrella of protection over&lt;br /&gt;
all other computers connected to the network. It is able to monitor both&lt;br /&gt;
incoming and outgoing traffic for potential risk or suspicious user&lt;br /&gt;
behavior, and also makes setting security policies much easier, faster&lt;br /&gt;
and more flexible. Hardware firewall is positioned between the network&lt;br /&gt;
and devices, allowing traffic to funnel through the firewall for a close&lt;br /&gt;
inspection and analysis. A hardware firewall, a term often&lt;br /&gt;
interchangeable with network or next-generation firewall, protects the&lt;br /&gt;
network gateways for an enterprise. Hardware firewall is physical&lt;br /&gt;
hardware, installed between network elements and connected devices, and&lt;br /&gt;
is tasked with filtering traffic for cyber threat to the network or&lt;br /&gt;
devices. Filtering out unauthorized or suspicious users based on traffic&lt;br /&gt;
analysis is one of the biggest benefits of hardware firewall. &amp;lt;ref name=&amp;quot;sangfor&amp;quot;&amp;gt;Sangfor, &amp;quot;What is Software Firewall? Difference between Hardware Firewall and Software Firewall, [Online]. Available: https://www.sangfor.com/blog/cybersecurity/what-is-software-firewall-difference-between-hardware-firewall-and-software-firewall [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems&lt;br /&gt;
(IPS) are both parts of the network infrastructure. IDS/IPS compare&lt;br /&gt;
network packets to a cyberthreat database containing known signatures of&lt;br /&gt;
cyberattacks — and flag any matching packets. IDS doesn’t alter the&lt;br /&gt;
network packets in any way, whereas IPS prevents the packet from&lt;br /&gt;
delivery based on the contents of the packet, much like how a firewall&lt;br /&gt;
prevents traffic by IP address. &amp;lt;ref name=&amp;quot;Varonis&amp;quot;&amp;gt;Varonis, &amp;quot;What is Software Firewall? IDS vs. IPS: What is the Difference?, [Online]. Available: https://www.varonis.com/blog/ids-vs-ips [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Digital forensics====&lt;br /&gt;
Digital forensics is a branch of forensic science that focuses on&lt;br /&gt;
identifying, acquiring, processing, analyzing, and reporting on data&lt;br /&gt;
stored electronically. Electronic evidence is a component of almost all&lt;br /&gt;
criminal activities and digital forensics support is crucial for law&lt;br /&gt;
enforcement investigations. Electronic evidence can be collected from a&lt;br /&gt;
wide array of sources, such as computers, smartphones, remote storage,&lt;br /&gt;
unmanned aerial systems, shipborne equipment, and more.&amp;lt;ref name=&amp;quot;interpol&amp;quot;&amp;gt;Interpol, &amp;quot;Digital forensics&amp;quot;. Available: https://www.interpol.int/How-we-work/Innovation/Digital-forensics. [Accessed 28 4 2022].&amp;lt;/ref&amp;gt; &lt;br /&gt;
Investigative process of digital forensics can be divided into several stages. There are four major stages: preservation, collection,&lt;br /&gt;
examination, and analysis. All these four stages need a deep understanding of computers, technology across a broad spectrum, and cybersecurity principles and&lt;br /&gt;
practices, a working knowledge of computers, networks, and coding, in-depth investigative abilities, critical-thinking skills and analytical talent the ability to effectively communicate and work with a&lt;br /&gt;
wide range of people. &amp;lt;ref name=&amp;quot;ecpi&amp;quot;&amp;gt;&amp;quot;Digital forensics&amp;quot;. Available: https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me. [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Mobile device management====&lt;br /&gt;
Mobile device management (MDM) is software that allows IT&lt;br /&gt;
administrators to control, secure and enforce policies on smartphones,&lt;br /&gt;
tablets and other endpoints. Mobile device management software emerged&lt;br /&gt;
in the early 2000s as a way to control and secure the personal digital&lt;br /&gt;
assistants and smartphones that business workers began to use. The&lt;br /&gt;
consumer smartphone boom that started with the launch of the Apple&lt;br /&gt;
iPhone in 2007 led to the bring your own device (BYOD) trend, which&lt;br /&gt;
fueled further interest in MDM.&amp;lt;ref name=&amp;quot;techtarget&amp;quot;&amp;gt;Techtarget, &amp;quot;Mobile Device Management&amp;quot;. Available: https://www.techtarget.com/searchmobilecomputing/definition/mobile-device-management [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Data management====&lt;br /&gt;
Sometimes the data management is neglected, but this part has a&lt;br /&gt;
crucial role when learning for good cyber security practices. Majority&lt;br /&gt;
of cyber security programs include a special courses on data management.&lt;br /&gt;
Data management is a method of organizing and maintaining data processes&lt;br /&gt;
that are required in almost every business operations. The benefits of&lt;br /&gt;
data management can be found accounting, statistics, logistics planning&lt;br /&gt;
and other disciplines including corporate computing.&amp;lt;ref name=&amp;quot;GlobalUni&amp;quot;&amp;gt;Global Universities, &amp;quot;MSc Data Management and Cyber Security&amp;quot;. Available: https://globaluniversities.in/msc-data-management-cyber-security. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Data governance (and management) play a fundamental role in&lt;br /&gt;
protecting an organization’s data. Ensuring that the right people have&lt;br /&gt;
the right access and that appropriate security controls are in place to&lt;br /&gt;
protect each system or service, based on the criticality or sensitivity&lt;br /&gt;
of the data sets these contain. &amp;lt;ref name=&amp;quot;CyberMagazine&amp;quot;&amp;gt;Cyber Security Magazine, &amp;quot;The Role of Data Governance in Cybersecurity&amp;quot;. Available: https://cybersecurity-magazine.com/the-role-of-data-governance-in-cybersecurity/?utm_source=rss&amp;amp;amp;utm_medium=rss&amp;amp;amp;utm_campaign=the-role-of-data-governance-in-cybersecurity. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Application security development====&lt;br /&gt;
Application security describes security measures at the application&lt;br /&gt;
level that aim to prevent data or code within the app from being stolen&lt;br /&gt;
or hijacked. It encompasses the security considerations that happen&lt;br /&gt;
during application development and design, but it also involves systems&lt;br /&gt;
and approaches to protect apps after they get deployed. Application&lt;br /&gt;
security may include hardware, software, and procedures that identify or&lt;br /&gt;
minimize security vulnerabilities.&amp;lt;ref name=&amp;quot;vmware&amp;quot;&amp;gt;VmWare, &amp;quot;What is application security?&amp;quot;. Available: https://www.vmware.com/topics/glossary/content/application-security.html [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Application security development is important to ensure that your&lt;br /&gt;
application is free from coding errors and bugs. And controls the risk&lt;br /&gt;
and helps safeguard against security vulnerabilities. Application&lt;br /&gt;
security development is the process of making applications more secure&lt;br /&gt;
by finding and fixing security vulnerabilities. This is often done by&lt;br /&gt;
enforcing software security best practices and using application&lt;br /&gt;
security testing tools. &lt;br /&gt;
&amp;lt;ref name=&amp;quot;perforce&amp;quot;&amp;gt;Perforce, &amp;quot;Application Security Development Best Practices&amp;quot;. Available: https://www.perforce.com/blog/kw/application-security-development-best-practices. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Audit and compliance knowledge====&lt;br /&gt;
A cyber security audit is designed to be a comprehensive review and&lt;br /&gt;
analysis of your business’s IT infrastructure. It identifies threats and&lt;br /&gt;
vulnerabilities, exposing weaknesses and high-risk practices.&lt;br /&gt;
Regulations such as the EU GDPR (General Data Protection Regulation) can&lt;br /&gt;
impose hefty penalties in the event of a breach that results in&lt;br /&gt;
exploited data. A cyber security audit will help mitigate the&lt;br /&gt;
consequences of a breach and demonstrate that your organization has&lt;br /&gt;
taken the necessary steps to protect client and company data. &amp;lt;ref name=&amp;quot;cyforsecure&amp;quot;&amp;gt;Cyfor Secure, &amp;quot;What is a Cyber Security Audit and how can it help your organisation?&amp;quot;. Available: https://cyforsecure.co.uk/services/cyber-assessment/cyber-security-audit/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cybersecurity compliance is the organizational risk management method&lt;br /&gt;
aligned with pre-defined security measures &amp;amp;amp; controls on how data&lt;br /&gt;
confidentiality is ensured by its administrative procedures.&amp;lt;ref name=&amp;quot;nordlayer&amp;quot;&amp;gt;NordLayer, &amp;quot;Cybersecurity compliance: Everything you need to know&amp;quot;. Available: https://nordlayer.com/blog/cybersecurity-compliance-everything-you-need-to-know/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
All needed skills are developed through courses and certification.&lt;br /&gt;
&lt;br /&gt;
===Entry-Level Incident Response Positions===&lt;br /&gt;
It is not always possible to advance to the position of incident&lt;br /&gt;
responder in a straight line. Many professionals advance from entry- to&lt;br /&gt;
mid-level positions before becoming a real incident responder or a&lt;br /&gt;
member of a computer emergency response team (CERT).&amp;lt;br /&amp;gt;&lt;br /&gt;
These are some examples: &amp;lt;ref name=&amp;quot;Infosec&amp;quot;&amp;gt;Infosec, &amp;quot;Incident Responder Career Roadmap: From Entry Level to Executive&amp;quot;. Available: https://resources.infosecinstitute.com/topic/incident-responder-career-roadmap-entry-level-executive/ [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;network-administrator&amp;quot;&amp;gt;Network administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;This position’s experience will help potential incident responders&lt;br /&gt;
develop networking skills. Attention to detail, as well as the ability&lt;br /&gt;
to sift through system configurations, site layouts, and general network&lt;br /&gt;
and communication setups, are essential in this field.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;system-administrator&amp;quot;&amp;gt;System administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Another crucial beginning point for an incident responder is to learn&lt;br /&gt;
how to manage resources inside your organization as well as user&lt;br /&gt;
behavior. Understanding the potential damage that users, inadequate&lt;br /&gt;
security setups, and ineffective IT policies and procedures can cause on&lt;br /&gt;
your network can provide prospective candidates with insight into the&lt;br /&gt;
human component of an incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;security-administrator&amp;quot;&amp;gt;Security administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In such a position, basic hacking skills, penetration testing, and&lt;br /&gt;
intrusion detection are all learned, which are crucial incident&lt;br /&gt;
responder skills when trying to replicate a breach or attack.&lt;br /&gt;
Understanding the paths a cybercriminal will take when attempting to&lt;br /&gt;
damage or obtain access to a system can greatly simplify the work of&lt;br /&gt;
reverse engineering the incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Mid-Level Incident Response Positions ===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5&lt;br /&gt;
id=&amp;quot;computer-security-incident-response-team-csirt-engineer&amp;quot;&amp;gt;Computer&lt;br /&gt;
security incident response team (CSIRT) engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;cyber-incident-responder&amp;quot;&amp;gt;Cyber incident responder&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-response-engineer&amp;quot;&amp;gt;Incident response&lt;br /&gt;
engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;While each of these positions is different, they generally require&lt;br /&gt;
very similar skills and characteristics in a candidate. At this level,&lt;br /&gt;
personal characteristics such as problem solving, time management, and&lt;br /&gt;
even presentation skills become more crucial as one’s career evolves&lt;br /&gt;
into a management-facing role.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Technical skills include the ability to identify and minimize threats&lt;br /&gt;
while maintaining communication with management and the rest of your&lt;br /&gt;
team. Data analysis and evidence gathering become increasingly crucial,&lt;br /&gt;
and the circumstances in which your services are deployed get more&lt;br /&gt;
serious.&amp;lt;/p&amp;gt;&lt;br /&gt;
Problem-solving skills are crucial at this level of incident&lt;br /&gt;
response, and as the stakes rise, so does the pressure in each&lt;br /&gt;
situation. At this level, programming abilities are essential since&lt;br /&gt;
incident responders may be needed to reverse engineer malicious code or&lt;br /&gt;
even create patches for vulnerable network applications or services. &amp;lt;ref name=&amp;quot;coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated]&amp;quot;. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Senior-Level Incident Response Positions===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;intrusion-detection-specialist&amp;quot;&amp;gt;Intrusion detection&lt;br /&gt;
specialist:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;A CISSP certification might help a potential candidate in preparing&lt;br /&gt;
for the profession. The role of an intrusion detection specialist is to&lt;br /&gt;
find and stop any unwanted communications.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-manager&amp;quot;&amp;gt;Incident manager:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Expected to plan, oversee, manage, and supervise all incident&lt;br /&gt;
response team actions. Is in charge of reporting all current events to&lt;br /&gt;
senior management and stakeholders, as well as acting as the technical&lt;br /&gt;
lead on active incidents for incident responders. Prepares threat and&lt;br /&gt;
impact assessments and reports them known to management.&amp;lt;ref name=&amp;quot;coursera&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Certificates== &lt;br /&gt;
There is a vast number of different certificates and the road map to&lt;br /&gt;
being a certified professional could be very different&amp;lt;ref name=&amp;quot;Coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated],&amp;quot; [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;NICCS&amp;quot;&amp;gt;NICCS, &amp;quot;Cybersecurity Certifications,&amp;quot; [Online]. Available: hhttps://niccs.cisa.gov/about-niccs/cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt; . One possible&lt;br /&gt;
approach is to start with basic certificates from the different branches&lt;br /&gt;
of service and move to more specific and demanding focused&lt;br /&gt;
certification. Also, some jobs require certain clearances, either from&lt;br /&gt;
industry, or from the government. One small selection of different&lt;br /&gt;
possible certificates is brought out in following paragraphs.&lt;br /&gt;
&lt;br /&gt;
Security+ is a CompTIA certification that is considered a basic cert&lt;br /&gt;
among cybersecurity professionals. It covers the topics of risk&lt;br /&gt;
management and threat assessment.&lt;br /&gt;
Network+ is also offered by CompTIA this certification (like the name&lt;br /&gt;
implies) focuses on networking infrastructure and operations. It is&lt;br /&gt;
considered a foundational certification.&lt;br /&gt;
The Certified Information Systems Security Professional (CISSP) is a&lt;br /&gt;
more advanced certification designed for cybersecurity professionals&lt;br /&gt;
with at least five years of work experience. The certification covers&lt;br /&gt;
topics such as architecture, engineering, and management.&amp;lt;/p&amp;gt;&lt;br /&gt;
The Certified Ethical Hacker (CEH) certification is also considered a&lt;br /&gt;
more advanced cert because it generally requires that applicants have&lt;br /&gt;
multiple years of work experience. The goal of an ethical hacker&lt;br /&gt;
certification is to be able to understand how cyber attacks unfold in&lt;br /&gt;
order to improve threat assessment and mitigation skills.&amp;lt;ref name=&amp;quot;cyberguide&amp;quot;&amp;gt;Cybersecurity Guide, &amp;quot;How to become a cybersecurity specialist&amp;quot;, [Online]. Available: https://cybersecurityguide.org/careers/security-specialist/. [Accessed 27 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
This is definitely not all, when one looks for more information, following link could be searched, to get more in depth knowledge about&lt;br /&gt;
different possibilities.&lt;br /&gt;
 &lt;br /&gt;
Hereby, with the help of this matrix a possible taxonomy of different 436 listed certificates in branches are&lt;br /&gt;
presented.&amp;lt;ref name=&amp;quot;Pauljeremy&amp;quot;&amp;gt;&amp;quot;Cybersecurity Roadmap,&amp;quot; [Online]. Available: https://pauljerimy.com/2020/10/12/scr-oct-2020-update/. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:analystimage5.png|1000px|thumb|Certificate matrix &amp;lt;ref&amp;gt;&amp;quot;Certification roadmap&amp;quot;. Available at https://pauljerimy.com/security-certification-roadmap&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
=== Communication and Network Security===&lt;br /&gt;
Communication and network security covers the ability to secure&lt;br /&gt;
communication channels and networks. Topics include secure and converges&lt;br /&gt;
protocols, wireless networks, cellular networks, hardware operations&lt;br /&gt;
(warranty and redundant power), and third-party connectivity. IP&lt;br /&gt;
networking are also included in this domain.&lt;br /&gt;
===Identity and Access Management===&lt;br /&gt;
The identity and access management domain covers the attacks that&lt;br /&gt;
target the human gateway to gain access to data. Other topics include&lt;br /&gt;
ways to identify users with rights to access the information and&lt;br /&gt;
servers. Identity and access management covers the topics of&lt;br /&gt;
applications, Single sign-on authentication, privilege escalation,&lt;br /&gt;
Kerberos, rule-based or risk-based access control, proofing and&lt;br /&gt;
establishment of identity.&lt;br /&gt;
===Security Architecture and Engineering===&lt;br /&gt;
The security architecture and engineering domain covers important&lt;br /&gt;
topics concerning security engineering plans, designs and principles,&lt;br /&gt;
Topics include assessing and mitigating information system&lt;br /&gt;
vulnerabilities, fundamental concepts of security models and security&lt;br /&gt;
architectures in critical areas like access control. Cloud systems,&lt;br /&gt;
cryptography, system infiltrations (ransomware, fault-injection and&lt;br /&gt;
more) and virtualized systems are also covered in this domain.&lt;br /&gt;
===Asset Security===&lt;br /&gt;
The Asset Security domain deals with the issues related to the&lt;br /&gt;
collection, storage, maintenance, retention and destruction of data. It&lt;br /&gt;
also covers knowledge of different roles regarding data handling (owner,&lt;br /&gt;
controller and custodian) as well as data protection methods and data&lt;br /&gt;
states. Other topics include resource provision, asset classification&lt;br /&gt;
and data lifecycle management.&lt;br /&gt;
===Security and Risk Management===&lt;br /&gt;
The security and risk management domain covers general on skills&lt;br /&gt;
related to the implementation of user awareness programs as well as&lt;br /&gt;
security procedures. Emphasis is also placed on risk management&lt;br /&gt;
concerning the acquisition of new services, hardware and software&lt;br /&gt;
(supply chain). Other skills include social engineering defense&lt;br /&gt;
mechanisms.&lt;br /&gt;
===Security Assessment and Testing===&lt;br /&gt;
The security assessment and testing domain deals with all the&lt;br /&gt;
techniques and tools used to find system vulnerabilities, weaknesses and&lt;br /&gt;
potential areas of concern not addressed by security procedures and&lt;br /&gt;
policies. Attack simulations, vulnerability assessment, compliance&lt;br /&gt;
checks, and ethical disclosure also fall under this domain.&lt;br /&gt;
===Software Security===&lt;br /&gt;
The software development security domain deals with implementing&lt;br /&gt;
software-based security protocols within environment for which the IT&lt;br /&gt;
professional is responsible. Risk analysis, vulnerability identification&lt;br /&gt;
and auditing of source codes are all covered in this subset. Additional&lt;br /&gt;
topics include software-designed security, maturity models, development&lt;br /&gt;
methodologies, open-source and third-party development security.&lt;br /&gt;
===Security operations===&lt;br /&gt;
The security operations domain covers topics ranging from&lt;br /&gt;
investigations and digital forensic to detection and intrusion&lt;br /&gt;
prevention tools, sandboxing and firewalls. Topics include user and&lt;br /&gt;
entity behavior analytics, threat intelligence (threat hunting and&lt;br /&gt;
threat feeds) log management, artifacts (mobile, computer and network),&lt;br /&gt;
machine learning and AI-based tools, penetration testing, and&lt;br /&gt;
exploitation development. These for sub-domains are lister here.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Incident Handling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Penetration Testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Exploitation&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Education==&lt;br /&gt;
[[File:Analystimage7.png|400px|thumb|Comparison degree vs Certificate &amp;lt;ref&amp;gt;&amp;quot;Comparison Table&amp;quot;. Available at https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
The entry level monitoring specialist is hired by Estonian&lt;br /&gt;
Information System Authority even if there is no formal IT education,&lt;br /&gt;
but readiness to learn and moderate knowledge of different operation&lt;br /&gt;
systems is enough to start the career. &amp;lt;ref name=&amp;quot;cv&amp;quot;&amp;gt;cv.ee, &amp;quot;SEIRESPETSIALIST - tule Eesti küberruumi valvuriks!&amp;quot;. Available: https://www.cv.ee/en/vacancy/792782/riigi-infosusteemi-amet/seirespetsialist-tule-eesti-kuberruumi-valvuriks [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Nevertheless, like most other high qualification careers jobs falling&lt;br /&gt;
under the cybersecurity specialist category require some form of formal&lt;br /&gt;
education. However, since cybersecurity specialist jobs can fall across&lt;br /&gt;
a wide spectrum of job descriptions and responsibilities, it is possible&lt;br /&gt;
to obtain a specialist job after completing many levels of different&lt;br /&gt;
computer related education.&lt;br /&gt;
&lt;br /&gt;
If one is looking for a cybersecurity related education, for example&lt;br /&gt;
in EU, 137 courses/programs could be found that relate to keyword IT or&lt;br /&gt;
cybersecurity. &amp;lt;ref name=&amp;quot;enisa&amp;quot;&amp;gt;ENISA (European Union Agency for Cybersecurity), &amp;quot;Cybersecurity Education-Cybersecurity Higher Education Database&amp;quot;. Available: https://www.enisa.europa.eu/topics/cybersecurity-education/education-map/education-courses [Accessed 26 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Also, there is a great amount of discussion, if cyber security&lt;br /&gt;
professional should have a degree or would be certification just enough.&lt;br /&gt;
One interesting table is produces by Franklin University that compares&lt;br /&gt;
benefits and/or drawbacks of each type of credential.&amp;lt;ref name=&amp;quot;franklin&amp;quot;&amp;gt;Franklin University, &amp;quot;Is Getting a Master&#039;s Degree in Cyber Security Worth It?&amp;quot;. Available: https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Certifications are generally good for people with little practical&lt;br /&gt;
experience because they are known quantities in the industry and can&lt;br /&gt;
help you get your foot in the door. They set a minimum knowledge bar.&lt;br /&gt;
But some certifications are viewed more favorably than others.&lt;br /&gt;
Certifications with renewal requirements are viewed better by hiring&lt;br /&gt;
managers, but they also more costly in the long run because of the need&lt;br /&gt;
for continuing education. Certifications are also good for showing&lt;br /&gt;
in-depth expertise in a specialization within cybersecurity. Depending&lt;br /&gt;
on your career goals, it may be advantageous to have a master’s&lt;br /&gt;
degree—which shows your breadth of knowledge, critical thinking and&lt;br /&gt;
leadership skills—and a certificate—which shows specific skill&lt;br /&gt;
competency.&amp;lt;ref name=&amp;quot;franklin&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
As IT (Cyber) Security is still a relatively young discipline,&lt;br /&gt;
universities and colleges are still figuring out which is the best&lt;br /&gt;
approach for their degrees. Study programmes and curricula in Cyber&lt;br /&gt;
Security are different. In general, here are the duration of Cyber&lt;br /&gt;
Security degrees:&lt;br /&gt;
&amp;lt;ref name=&amp;quot;studyportal&amp;quot;&amp;gt;Studyportals, &amp;quot;Why You Should Study a Cyber Security Degree in 2022&amp;quot;. Available: https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Bachelor’s degrees in Cyber Security take 3 or 4 years in most&lt;br /&gt;
countries.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Master’s courses in Cyber Security take between 1-2 years to&lt;br /&gt;
complete.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;PhD programmes in Cyber Security last 3-5 years. Some only take 1&lt;br /&gt;
or 2 years, but they are less common.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Generalization could me made that on bachelor level the general&lt;br /&gt;
knowledge about the cyber issues are obtained. On master level the&lt;br /&gt;
specialization courses are taken and the person can choose more specific&lt;br /&gt;
topics to study. It is on master level where strengths of the cyber&lt;br /&gt;
specialist can be developed further and up-do date knowledge obtained in&lt;br /&gt;
specifics. PhD is serious science and involves teaching, lot of&lt;br /&gt;
scientific work and writing for publications.&lt;br /&gt;
&lt;br /&gt;
==Salary==&lt;br /&gt;
&amp;lt;p&amp;gt;Even if the salary can be very different, compared to the skills and&lt;br /&gt;
experience, an generalization can be made. Cyber Security professionals&lt;br /&gt;
in CSIRT, and in other entities earn quite well, from the start. First,&lt;br /&gt;
some comparison from the United States. The average CSIRT analyst salary&lt;br /&gt;
in the USA is $97,500 per year or $50 per hour. Entry level positions&lt;br /&gt;
start at $48,875 per year while most experienced workers make up to&lt;br /&gt;
$135,373 per year.&amp;lt;ref name=&amp;quot;talent&amp;quot;&amp;gt;talent.com, &amp;quot;Csirt Analyst average salary in USA 2022&amp;quot;. Available: https://www.talent.com/salary?job=csirt+analyst [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There are multiple positions you can occupy in this field. They have&lt;br /&gt;
in common great salaries and high demand for technical skills, attention&lt;br /&gt;
to details, problem-solving mentality, and the ability to analyze risks.&lt;br /&gt;
Here are the average annual salaries in the United States, according to&lt;br /&gt;
Payscale: &amp;lt;ref name=&amp;quot;studyportal&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Cryptographer – 100,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Information Security Officer – 91,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Assessor – 90,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Engineer – 88,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Penetration Tester – 81,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Forensics Expert – 71,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Administrator – 65,000 USD&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
When looking into salaries in Estonia, one can find that there is a&lt;br /&gt;
discussion that private sector is taking a toll from the public sector,&lt;br /&gt;
and that the salaries in important agencies, as Information System&lt;br /&gt;
Authority loose their employees to the better paid positions in private&lt;br /&gt;
sector.&amp;lt;ref name=&amp;quot;digigeenius&amp;quot;&amp;gt;DiGi Geenius, &amp;quot;Kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad&amp;quot;. Available: https://digi.geenius.ee/rubriik/uudis/kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad/ [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;tehnika&amp;quot;&amp;gt;Postimees, &amp;quot;Riigi-it-tootajate-palgamaarad-kasvasid&amp;quot;. Available: https://tehnika.postimees.ee/6887428/riigi-it-tootajate-palgamaarad-kasvasid [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
But there is also a different view that average private sector worker&lt;br /&gt;
could be hired as a top specialist in public sector and then the payment&lt;br /&gt;
is higher. Nevertheless, it seems that the average payment in cyber&lt;br /&gt;
security sector is any way higher that in other parts of the&lt;br /&gt;
e-services. &amp;lt;ref name=&amp;quot;digigeenius2&amp;quot;&amp;gt;DiGi Geenius, &amp;quot;5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka&amp;quot;. Available: https://digi.geenius.ee/rubriik/uudis/5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==SOC==&lt;br /&gt;
&amp;lt;p&amp;gt;A SOC is a facility where an organization’s network, applications,&lt;br /&gt;
and endpoints are monitored and defended. The term was adapted from&lt;br /&gt;
network operations centers (NOCs), where large telecommunication or&lt;br /&gt;
corporate networks are monitored. When network security became more of a&lt;br /&gt;
concern, security teams were formed within the NOCs, and eventually spun&lt;br /&gt;
off into larger organizations of their own as the responsibilities of&lt;br /&gt;
security teams grew increasingly complex and specialized. The security&lt;br /&gt;
staff working in a security operations center are often called the SOC&lt;br /&gt;
team.&amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;Exabeam, &amp;quot;CSIRT&amp;quot;. Available: https://www.exabeam.com/incident-response/csirt/ [Accessed 28 APr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;Functions of the SOC team include, but are not limited to:&amp;lt;ref name=&amp;quot;trellix&amp;quot;&amp;gt;Trellix, &amp;quot;What Is a Security Operations Center (SOC)?&amp;quot;. Available: https://www.trellix.com/en-us/security-awareness/operations/what-is-soc.html [Accessed 30 APr 2022].&amp;lt;/ref&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ol type=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Taking inventory of resources, to get a better understanding of the&lt;br /&gt;
structure they are protecting.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintanence of the system, by constantly making updates and adding&lt;br /&gt;
safeguards.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Monitoring the network for abnormalities with special tools.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Threat analysis of new attacks and vulnerabilities.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Responding to attacks, by acting as “first responders”. The SOC team&lt;br /&gt;
will shut down and/or isolate endpoints, deleting files and lowering the&lt;br /&gt;
impact as fast as possible.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Recovery of system stability and lost data. This may be done using&lt;br /&gt;
backups, restarting endpoints or reconfiguring systems.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Logging all actions on the system, to be later used for analysis or&lt;br /&gt;
forensics after an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigating the root cause of an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Auditing their own actions, to be in line with regulations of the&lt;br /&gt;
organization, industry or governing body.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==CSIRT==&lt;br /&gt;
&amp;lt;p&amp;gt;A CSIRT is a group that responds to security incidents when they&lt;br /&gt;
occur. Key responsibilities of a CSIRT include:&lt;br /&gt;
&amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
===Creating and maintaining an incident response plan (IRP)===&lt;br /&gt;
An incident response plan (IRP) is a set of written instructions for&lt;br /&gt;
detecting, responding to and limiting the effects of an information&lt;br /&gt;
security event. Incident response plans provide instructions for&lt;br /&gt;
responding to many potential scenarios, including data breaches, denial&lt;br /&gt;
of service/distributed denial of service attacks, firewall breaches,&lt;br /&gt;
virus or malware outbreaks or insider threats. Without an incident&lt;br /&gt;
response plan in place, organizations may either not detect the attack&lt;br /&gt;
in the first place, or not follow proper protocol to contain the threat&lt;br /&gt;
and recover from it when a breach is detected.&lt;br /&gt;
&amp;lt;ref name=&amp;quot;stratacore&amp;quot;&amp;gt;Stratacore, &amp;quot;Incident Response Plan (IRP)&amp;quot;. https://www.stratacore.com/incidentresponseplan [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Investigating and analyzing incidents===&lt;br /&gt;
CSIRTs are also involved in improvement activities. After major&lt;br /&gt;
computer security incidents occur, or when incidents are not handled in&lt;br /&gt;
a timely or effective manner, a CSIRT will generally perform a&lt;br /&gt;
postmortem of the incident and its response. This postmortem will&lt;br /&gt;
identify the strengths and weakness of the response effort. Such reviews&lt;br /&gt;
can identify weaknesses and holes in systems, infrastructure defenses,&lt;br /&gt;
or policies that allowed the incident to take place. It can also&lt;br /&gt;
identify problems with communication channels, interfaces, and&lt;br /&gt;
procedures that inhibited the efficient resolution of the reported&lt;br /&gt;
problem.&lt;br /&gt;
&amp;lt;ref name=&amp;quot;cisa&amp;quot;&amp;gt;CISA (Cybersecurity &amp;amp; Infrastructure Security Agency, &amp;quot;Defining Computer Security Incident Response Teams&amp;quot;. https://www.cisa.gov/uscert/bsi/articles/best-practices/incident-management/defining-computer-security-incident-response-teams [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Managing internal communications and updates during or immediately after incidents occur===&lt;br /&gt;
===Communicating with employees, shareholders, customers, and the press about incidents as needed===&lt;br /&gt;
There are various services within the CSIRT Services Framework that&lt;br /&gt;
address communications, as they relate to security operations and&lt;br /&gt;
incident response services. Some of these include Information Security&lt;br /&gt;
Incident Coordination, Crisis Management Support, Vulnerability&lt;br /&gt;
Disclosure, Situational Awareness Communication, and Awareness Building,&lt;br /&gt;
to name a few. Sharing information and communicating with the general&lt;br /&gt;
public and/or your constituency is appropriate in many different&lt;br /&gt;
scenarios. These can range from proactive communications to reactive&lt;br /&gt;
communications. Each scenario may be unique, and careful consideration&lt;br /&gt;
should be given to when to release information to the public and what&lt;br /&gt;
information should be released.&lt;br /&gt;
&amp;lt;ref name=&amp;quot;CMUni&amp;quot;&amp;gt;Carniege Mellon University, Brittany Manley, David McIntire &amp;quot;A Guide to Effective Incident Management Communications&amp;quot;. https://resources.sei.cmu.edu/asset_files/Handbook/2021_002_001_651819.pdf [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Remediating incidents===&lt;br /&gt;
Threat remediation is a strong and capable tool for fighting the&lt;br /&gt;
cyber security compromises. As the word ‘remedy’ suggests, remediation&lt;br /&gt;
process involves the treatment of a security breach. With the&lt;br /&gt;
remediation practices, your cyber security team is able to eliminate&lt;br /&gt;
suspicious activities and malicious attacks in the form of malware,&lt;br /&gt;
ransomware, phishing and such. Even if you ‘kill’ the suspicious&lt;br /&gt;
activity, the attackers can remain in your systems. If you want to&lt;br /&gt;
contaminate and end the problem for good, your remediation processes&lt;br /&gt;
must involve the detection of the cause. &amp;lt;ref name=&amp;quot;logsign&amp;quot;&amp;gt;Logsign, &amp;quot;What-is-remediation-in-cyber-security&amp;quot;. Available: https://www.logsign.com/blog/what-is-remediation-in-cyber-security/. [Accessed 28 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Recommending technology, policy, governance, and training changes after security incidents===&lt;br /&gt;
After all these actions, the SCIRT must contribute to the development&lt;br /&gt;
of better policies, practices and has to recommend improvements. They&lt;br /&gt;
are not working in the vacuum and their work has to create new and&lt;br /&gt;
better standards for cyber security. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;Exabeam, &amp;quot;CSIRT&amp;quot;. Available: https://www.exabeam.com/incident-response/csirt/ [Accessed 28 APr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==CERT==&lt;br /&gt;
The term “computer emergency response team” was coined in 1988. In&lt;br /&gt;
response to the Morris worm attack that impacted thousands of servers on&lt;br /&gt;
the Internet, DARPA funded the formation of the Computer Emergency&lt;br /&gt;
Response Team Coordination Center (CERT-CC) at Carnegie Mellon&lt;br /&gt;
University. The goal of CERT-CC was to help protect the internet by&lt;br /&gt;
collecting and disseminating information on critical security&lt;br /&gt;
vulnerabilities. Several other countries formed similar centers using&lt;br /&gt;
the same acronym (despite threats of legal action by Carnegie Mellon for&lt;br /&gt;
trademark infringement). Now the term CERT refers to any emergency&lt;br /&gt;
response team that deals with cyber threats. Many people use CERT-CC&lt;br /&gt;
interchangeably with CSIRT, though the charter of a CERT is information&lt;br /&gt;
sharing in order to help other response teams respond to threats against&lt;br /&gt;
their own infrastructure. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In general, the designation of CERT is helpful in applying real-world&lt;br /&gt;
solutions to various cybersecurity problems. They may be government&lt;br /&gt;
contractors or employees of a major corporation. For example, the U.S.&lt;br /&gt;
Computer Emergency Readiness Team (US-CERT) operates under the U.S.&lt;br /&gt;
Department of Homeland Security.&lt;br /&gt;
&amp;lt;ref name=&amp;quot;techopedia&amp;quot;&amp;gt;Techopedia, &amp;quot;Computer Emergency Response Team (CERT)&amp;quot;. Available: https://www.techopedia.com/definition/31003/computer-emergency-response-team-cert. [Accessed 25 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In Estonia CERT is designated as CERT-EE. It was established in 2006,&lt;br /&gt;
as an organization responsible for the management of security incidents&lt;br /&gt;
in .ee computer networks. It is also a national contact point for&lt;br /&gt;
international co-operation in the field of IT security. &amp;lt;ref name=&amp;quot;ria&amp;quot;&amp;gt;Information System Autority, &amp;quot;CERT-EE&amp;quot;. Available: hhttps://www.ria.ee/en/cyber-security/cert-ee.html [Accessed 25 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Difference between SOC/CSIRT/CERT==&lt;br /&gt;
[[File:analystimage3.png|300px|thumb|SOC/CSIRT/CERT &amp;lt;ref name=&amp;quot;exabeam&amp;gt;&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
How CSIRTs differ from CERTs and SOCs. There are overlapping&lt;br /&gt;
responsibilities between a community emergency response team (CERT),&lt;br /&gt;
computer security incident response team (CSIRT), and security&lt;br /&gt;
operations center (SOC). To add to this confusion, frequently, the terms&lt;br /&gt;
CERT and CSIRT are used interchangeably, despite the important&lt;br /&gt;
differences. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Understand the primary roles and characteristics of a CERT, CSIRT, and SOC.==&lt;br /&gt;
[[File:analystimage4.png|600px|thumb|Primary Roles of CERT, CSIRT, and SOC&amp;lt;ref name=&amp;quot;exabeam&amp;gt;&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&amp;lt;p&amp;gt;So, using strict definitions, a CERT collects and disseminates&lt;br /&gt;
security information, typically for the benefit of a country or an&lt;br /&gt;
industry. A CSIRT is a cross-functional team that responds to incidents&lt;br /&gt;
on behalf of a country or an organization. A SOC is where a country or&lt;br /&gt;
organization monitors and defends its network, servers, applications,&lt;br /&gt;
and endpoints. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Future==&lt;br /&gt;
&amp;lt;p&amp;gt;And the Cyber security problem is only getting bigger. According to a&lt;br /&gt;
report published by Accenture, the number of cyber security breaches&lt;br /&gt;
increased by 11 percent from 2017 to 2018. The cost of such breaches is&lt;br /&gt;
astronomical–about $600 billion worldwide, according to the Economic&lt;br /&gt;
Impact of Cybercrime report.&lt;br /&gt;
&amp;lt;ref name=&amp;quot;ecpi&amp;quot;&amp;gt;ECPI, &amp;quot;What-is-digital-forensics-in-cybersecurity&amp;quot;. Available: https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me [Accessed 27 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Job projections for cybersecurity are staggering. The Bureau of Labor&lt;br /&gt;
Statistics in US predicts that careers in the cybersecurity field will&lt;br /&gt;
grow by 32% by 2028. That makes cybersecurity one of the top 10&lt;br /&gt;
fastest-growing jobs in the country. In the United States alone, jobs&lt;br /&gt;
for Information Security Analysts are expected to grow by 15% by&lt;br /&gt;
2024.&amp;lt;ref name=&amp;quot;franklin&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Most likely this trend is also similar in other countries.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When checking Estonian job portals, there is a constant need for&lt;br /&gt;
people for cyber security related positions. Also, linkedin search gives&lt;br /&gt;
approximately 30 vacancies immediately. There are banks, logistics&lt;br /&gt;
companies, e-shops, and software producers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://ee.linkedin.com/jobs/cyber-security-jobs?countryRedirected=1&amp;amp;amp;position=1&amp;amp;amp;pageNum=0&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Trends that affect companies create need for constant cyber security&lt;br /&gt;
services. Increasing number of home/remote offices require secure&lt;br /&gt;
corporate networks and security of remote devices. One example is from&lt;br /&gt;
this year, when sloppy remote desktop set-up paralyzed systems of 17&lt;br /&gt;
companies.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.aripaev.ee/uudised/2022/04/20/ria-lohakas-kaugtoolaua-seadistus-halvas-martsis-vahemalt-17-juhul-ettevotete-it-susteemid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Also, no service can exists without robust infrastructure - servers,&lt;br /&gt;
databases, applications. As all previously mentioned devices and&lt;br /&gt;
services are at constant scanning and surveillance. So, the breach&lt;br /&gt;
detection and immediate action demands 24/7 services. Even if lot of&lt;br /&gt;
things could be automated, there is a need for human specialists (at&lt;br /&gt;
least, at the moment). Third growing field is also a forensic&lt;br /&gt;
investigation, as every attack must be investigated in order to be ready&lt;br /&gt;
to repel next attacks. So data recovery and evidence collection is&lt;br /&gt;
another important field of work that need skilled and professional&lt;br /&gt;
workers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Even, if the specifics of the entity, be it CSIRT, CERT or SOC, are&lt;br /&gt;
different, the fundamentals of the work are the same. Professional&lt;br /&gt;
knowledge of the networks, operational systems, hardware, scripting, and&lt;br /&gt;
several other wider IT related knowledge is needed. As there is no&lt;br /&gt;
single way to reach to it, every single person can find one’s strongest&lt;br /&gt;
sides and develop them with knowledge of weaker side, in order to know,&lt;br /&gt;
when to as for help.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/body&amp;gt;&lt;br /&gt;
&amp;lt;/html&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mavald</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142277</id>
		<title>Hiring a Cyber Security Incident Analyst</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142277"/>
		<updated>2022-05-01T16:12:37Z</updated>

		<summary type="html">&lt;p&gt;Mavald: /* Communicating with employees, shareholders, customers, and the press about incidents as needed */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==A Cyber Security Incident Analyst==&lt;br /&gt;
&lt;br /&gt;
[[File:image1.png|600px|thumb|Job advertisement &amp;lt;ref&amp;gt;&amp;quot;Job Advertisement&amp;quot;. Available at https://www.projectpeople.com/jobs/&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
===Cyber security incident analyst in SOC/CSIRT/CERT===&lt;br /&gt;
This article delves into the job title of Cyber Security Incident&lt;br /&gt;
Analyst and provides an overview of the acronyms SOC/CSIRT/CERT. A brief&lt;br /&gt;
history of the job is discussed here, as well as a possible career path,&lt;br /&gt;
education, experience, and other characteristics required for work in&lt;br /&gt;
computer security-related organizations. The article also provides a&lt;br /&gt;
brief history of SOC/CSIRT/CERT, as well as a comparison of their&lt;br /&gt;
differences and similarities.&lt;br /&gt;
===Cyber Security Incident Analyst Skill Set===&lt;br /&gt;
What skill set is expected from the Cyber Security Incident Analyst? Below written lines are taken from the same job advertisement depicted&lt;br /&gt;
on the left side of this article:&lt;br /&gt;
As a Security Incident Analyst your responsibilities will include:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Continuous monitoring of security tooling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Performing regular and ad-hoc vulnerability assessments&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Carrying out ‘spot checks’&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Reporting vulnerabilities to the PVG via the alerts system&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintaining and documenting logging systems&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Developing centralized logging, reporting and intelligence&lt;br /&gt;
platforms&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;‘Light touch’ penetration testing with open source tooling&lt;br /&gt;
(Metasploit)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Knowledge &amp;amp;amp; Experience required:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;SOC, CSIRT or CERT operational environment experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Windows / Linux experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TCP /IP networking protocol knowledge&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience reviewing and analyzing Security Events from various&lt;br /&gt;
monitoring and logging sources&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience in website and web application security assessment or&lt;br /&gt;
penetration testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience of using Metasploit&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Scripting knowledge using BASH, Python, Perl, Ruby&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Skills in Host and Network Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
As one can see the description of the duties is wide and also the&lt;br /&gt;
knowledge and experience that is required is noteworthy. So, where to&lt;br /&gt;
start to find out the way to get this kind of knowledge and&lt;br /&gt;
expertize.&lt;br /&gt;
===Possible career path===&lt;br /&gt;
Next part of the paper is aiming to depict a possible ways, how to&lt;br /&gt;
develop oneself, and move along the career pathway in cybersecurity&lt;br /&gt;
field. Topics of development, education, experience and certification&lt;br /&gt;
are covered.&lt;br /&gt;
[[File:analystimage2.png|1000px|thumb|Career path &amp;lt;ref&amp;gt;&amp;quot;Possible Career Path&amp;quot;. Available at https://www.cyberseek.org/pathway.html&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
===Junior/Senior===&lt;br /&gt;
Start with an entry-level job in IT. Hands-on experience is often the&lt;br /&gt;
most effective way to prepare for certification exams. Start&lt;br /&gt;
accumulating work experience with an entry-level role as a cybersecurity&lt;br /&gt;
analyst. Many cybersecurity professionals start off in more general IT&lt;br /&gt;
roles. The skills, practices, and technologies you’ll use as a&lt;br /&gt;
cybersecurity professional will continue to evolve along with computer&lt;br /&gt;
and network technology. The desire to learn, ability to problem solve,&lt;br /&gt;
and attention to detail will serve you well in this field. Other, more&lt;br /&gt;
technical skills and technologies to learn include:&amp;lt;ref name=&amp;quot;certification&amp;quot;&amp;gt;Popular Cyber Security Certificates [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications  [Accessed 25 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====SIEM tools (security information and event management)====&lt;br /&gt;
Security Information and Event Management (SIEM) is a set of tools&lt;br /&gt;
and services offering a holistic view of an organization’s information&lt;br /&gt;
security. SIEM works by combining two technologies:&lt;br /&gt;
&amp;lt;li&amp;gt;Security information management (SIM), which collects data from log&lt;br /&gt;
files for analysis and reports on security threats and events, and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;security event management (SEM), which conducts real-time system&lt;br /&gt;
monitoring, notifies network admins about important issues and&lt;br /&gt;
establishes correlations between security events. There are a number of&lt;br /&gt;
security information and event management solutions on the market.&lt;br /&gt;
ArcSight ESM, IBM QRadar and Splunk are among the most popular. &amp;lt;ref name=&amp;quot;SIEM&amp;quot;&amp;gt;Application security, SIEM [Online]. Available: https://www.imperva.com/learn/application-security/siem/. [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Firewalls, Intrusion Detection Systems (IDS), and Intrusion Prevention Systems(IPS)====&lt;br /&gt;
Firewalls can be two types, hardware and software firewalls. Software&lt;br /&gt;
firewall is a firewall that is installed on a computer or server, and&lt;br /&gt;
tasked with network security. It works with a wide variety of other&lt;br /&gt;
technology security solutions to provide more robust and cohesive&lt;br /&gt;
security for enterprises of all sizes. When a software firewall is&lt;br /&gt;
installed on a server, it opens up like an umbrella of protection over&lt;br /&gt;
all other computers connected to the network. It is able to monitor both&lt;br /&gt;
incoming and outgoing traffic for potential risk or suspicious user&lt;br /&gt;
behavior, and also makes setting security policies much easier, faster&lt;br /&gt;
and more flexible. Hardware firewall is positioned between the network&lt;br /&gt;
and devices, allowing traffic to funnel through the firewall for a close&lt;br /&gt;
inspection and analysis. A hardware firewall, a term often&lt;br /&gt;
interchangeable with network or next-generation firewall, protects the&lt;br /&gt;
network gateways for an enterprise. Hardware firewall is physical&lt;br /&gt;
hardware, installed between network elements and connected devices, and&lt;br /&gt;
is tasked with filtering traffic for cyber threat to the network or&lt;br /&gt;
devices. Filtering out unauthorized or suspicious users based on traffic&lt;br /&gt;
analysis is one of the biggest benefits of hardware firewall. &amp;lt;ref name=&amp;quot;sangfor&amp;quot;&amp;gt;Sangfor, &amp;quot;What is Software Firewall? Difference between Hardware Firewall and Software Firewall, [Online]. Available: https://www.sangfor.com/blog/cybersecurity/what-is-software-firewall-difference-between-hardware-firewall-and-software-firewall [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems&lt;br /&gt;
(IPS) are both parts of the network infrastructure. IDS/IPS compare&lt;br /&gt;
network packets to a cyberthreat database containing known signatures of&lt;br /&gt;
cyberattacks — and flag any matching packets. IDS doesn’t alter the&lt;br /&gt;
network packets in any way, whereas IPS prevents the packet from&lt;br /&gt;
delivery based on the contents of the packet, much like how a firewall&lt;br /&gt;
prevents traffic by IP address. &amp;lt;ref name=&amp;quot;Varonis&amp;quot;&amp;gt;Varonis, &amp;quot;What is Software Firewall? IDS vs. IPS: What is the Difference?, [Online]. Available: https://www.varonis.com/blog/ids-vs-ips [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Digital forensics====&lt;br /&gt;
Digital forensics is a branch of forensic science that focuses on&lt;br /&gt;
identifying, acquiring, processing, analyzing, and reporting on data&lt;br /&gt;
stored electronically. Electronic evidence is a component of almost all&lt;br /&gt;
criminal activities and digital forensics support is crucial for law&lt;br /&gt;
enforcement investigations. Electronic evidence can be collected from a&lt;br /&gt;
wide array of sources, such as computers, smartphones, remote storage,&lt;br /&gt;
unmanned aerial systems, shipborne equipment, and more.&amp;lt;ref name=&amp;quot;interpol&amp;quot;&amp;gt;Interpol, &amp;quot;Digital forensics&amp;quot;. Available: https://www.interpol.int/How-we-work/Innovation/Digital-forensics. [Accessed 28 4 2022].&amp;lt;/ref&amp;gt; &lt;br /&gt;
Investigative process of digital forensics can be divided into several stages. There are four major stages: preservation, collection,&lt;br /&gt;
examination, and analysis. All these four stages need a deep understanding of computers, technology across a broad spectrum, and cybersecurity principles and&lt;br /&gt;
practices, a working knowledge of computers, networks, and coding, in-depth investigative abilities, critical-thinking skills and analytical talent the ability to effectively communicate and work with a&lt;br /&gt;
wide range of people. &amp;lt;ref name=&amp;quot;ecpi&amp;quot;&amp;gt;&amp;quot;Digital forensics&amp;quot;. Available: https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me. [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Mobile device management====&lt;br /&gt;
Mobile device management (MDM) is software that allows IT&lt;br /&gt;
administrators to control, secure and enforce policies on smartphones,&lt;br /&gt;
tablets and other endpoints. Mobile device management software emerged&lt;br /&gt;
in the early 2000s as a way to control and secure the personal digital&lt;br /&gt;
assistants and smartphones that business workers began to use. The&lt;br /&gt;
consumer smartphone boom that started with the launch of the Apple&lt;br /&gt;
iPhone in 2007 led to the bring your own device (BYOD) trend, which&lt;br /&gt;
fueled further interest in MDM.&amp;lt;ref name=&amp;quot;techtarget&amp;quot;&amp;gt;Techtarget, &amp;quot;Mobile Device Management&amp;quot;. Available: https://www.techtarget.com/searchmobilecomputing/definition/mobile-device-management [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Data management====&lt;br /&gt;
Sometimes the data management is neglected, but this part has a&lt;br /&gt;
crucial role when learning for good cyber security practices. Majority&lt;br /&gt;
of cyber security programs include a special courses on data management.&lt;br /&gt;
Data management is a method of organizing and maintaining data processes&lt;br /&gt;
that are required in almost every business operations. The benefits of&lt;br /&gt;
data management can be found accounting, statistics, logistics planning&lt;br /&gt;
and other disciplines including corporate computing.&amp;lt;ref name=&amp;quot;GlobalUni&amp;quot;&amp;gt;Global Universities, &amp;quot;MSc Data Management and Cyber Security&amp;quot;. Available: https://globaluniversities.in/msc-data-management-cyber-security. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Data governance (and management) play a fundamental role in&lt;br /&gt;
protecting an organization’s data. Ensuring that the right people have&lt;br /&gt;
the right access and that appropriate security controls are in place to&lt;br /&gt;
protect each system or service, based on the criticality or sensitivity&lt;br /&gt;
of the data sets these contain. &amp;lt;ref name=&amp;quot;CyberMagazine&amp;quot;&amp;gt;Cyber Security Magazine, &amp;quot;The Role of Data Governance in Cybersecurity&amp;quot;. Available: https://cybersecurity-magazine.com/the-role-of-data-governance-in-cybersecurity/?utm_source=rss&amp;amp;amp;utm_medium=rss&amp;amp;amp;utm_campaign=the-role-of-data-governance-in-cybersecurity. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Application security development====&lt;br /&gt;
Application security describes security measures at the application&lt;br /&gt;
level that aim to prevent data or code within the app from being stolen&lt;br /&gt;
or hijacked. It encompasses the security considerations that happen&lt;br /&gt;
during application development and design, but it also involves systems&lt;br /&gt;
and approaches to protect apps after they get deployed. Application&lt;br /&gt;
security may include hardware, software, and procedures that identify or&lt;br /&gt;
minimize security vulnerabilities.&amp;lt;ref name=&amp;quot;vmware&amp;quot;&amp;gt;VmWare, &amp;quot;What is application security?&amp;quot;. Available: https://www.vmware.com/topics/glossary/content/application-security.html [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Application security development is important to ensure that your&lt;br /&gt;
application is free from coding errors and bugs. And controls the risk&lt;br /&gt;
and helps safeguard against security vulnerabilities. Application&lt;br /&gt;
security development is the process of making applications more secure&lt;br /&gt;
by finding and fixing security vulnerabilities. This is often done by&lt;br /&gt;
enforcing software security best practices and using application&lt;br /&gt;
security testing tools. &lt;br /&gt;
&amp;lt;ref name=&amp;quot;perforce&amp;quot;&amp;gt;Perforce, &amp;quot;Application Security Development Best Practices&amp;quot;. Available: https://www.perforce.com/blog/kw/application-security-development-best-practices. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Audit and compliance knowledge====&lt;br /&gt;
A cyber security audit is designed to be a comprehensive review and&lt;br /&gt;
analysis of your business’s IT infrastructure. It identifies threats and&lt;br /&gt;
vulnerabilities, exposing weaknesses and high-risk practices.&lt;br /&gt;
Regulations such as the EU GDPR (General Data Protection Regulation) can&lt;br /&gt;
impose hefty penalties in the event of a breach that results in&lt;br /&gt;
exploited data. A cyber security audit will help mitigate the&lt;br /&gt;
consequences of a breach and demonstrate that your organization has&lt;br /&gt;
taken the necessary steps to protect client and company data. &amp;lt;ref name=&amp;quot;cyforsecure&amp;quot;&amp;gt;Cyfor Secure, &amp;quot;What is a Cyber Security Audit and how can it help your organisation?&amp;quot;. Available: https://cyforsecure.co.uk/services/cyber-assessment/cyber-security-audit/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cybersecurity compliance is the organizational risk management method&lt;br /&gt;
aligned with pre-defined security measures &amp;amp;amp; controls on how data&lt;br /&gt;
confidentiality is ensured by its administrative procedures.&amp;lt;ref name=&amp;quot;nordlayer&amp;quot;&amp;gt;NordLayer, &amp;quot;Cybersecurity compliance: Everything you need to know&amp;quot;. Available: https://nordlayer.com/blog/cybersecurity-compliance-everything-you-need-to-know/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
All needed skills are developed through courses and certification.&lt;br /&gt;
&lt;br /&gt;
===Entry-Level Incident Response Positions===&lt;br /&gt;
It is not always possible to advance to the position of incident&lt;br /&gt;
responder in a straight line. Many professionals advance from entry- to&lt;br /&gt;
mid-level positions before becoming a real incident responder or a&lt;br /&gt;
member of a computer emergency response team (CERT).&amp;lt;br /&amp;gt;&lt;br /&gt;
These are some examples: &amp;lt;ref name=&amp;quot;Infosec&amp;quot;&amp;gt;Infosec, &amp;quot;Incident Responder Career Roadmap: From Entry Level to Executive&amp;quot;. Available: https://resources.infosecinstitute.com/topic/incident-responder-career-roadmap-entry-level-executive/ [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;network-administrator&amp;quot;&amp;gt;Network administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;This position’s experience will help potential incident responders&lt;br /&gt;
develop networking skills. Attention to detail, as well as the ability&lt;br /&gt;
to sift through system configurations, site layouts, and general network&lt;br /&gt;
and communication setups, are essential in this field.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;system-administrator&amp;quot;&amp;gt;System administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Another crucial beginning point for an incident responder is to learn&lt;br /&gt;
how to manage resources inside your organization as well as user&lt;br /&gt;
behavior. Understanding the potential damage that users, inadequate&lt;br /&gt;
security setups, and ineffective IT policies and procedures can cause on&lt;br /&gt;
your network can provide prospective candidates with insight into the&lt;br /&gt;
human component of an incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;security-administrator&amp;quot;&amp;gt;Security administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In such a position, basic hacking skills, penetration testing, and&lt;br /&gt;
intrusion detection are all learned, which are crucial incident&lt;br /&gt;
responder skills when trying to replicate a breach or attack.&lt;br /&gt;
Understanding the paths a cybercriminal will take when attempting to&lt;br /&gt;
damage or obtain access to a system can greatly simplify the work of&lt;br /&gt;
reverse engineering the incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Mid-Level Incident Response Positions ===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5&lt;br /&gt;
id=&amp;quot;computer-security-incident-response-team-csirt-engineer&amp;quot;&amp;gt;Computer&lt;br /&gt;
security incident response team (CSIRT) engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;cyber-incident-responder&amp;quot;&amp;gt;Cyber incident responder&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-response-engineer&amp;quot;&amp;gt;Incident response&lt;br /&gt;
engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;While each of these positions is different, they generally require&lt;br /&gt;
very similar skills and characteristics in a candidate. At this level,&lt;br /&gt;
personal characteristics such as problem solving, time management, and&lt;br /&gt;
even presentation skills become more crucial as one’s career evolves&lt;br /&gt;
into a management-facing role.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Technical skills include the ability to identify and minimize threats&lt;br /&gt;
while maintaining communication with management and the rest of your&lt;br /&gt;
team. Data analysis and evidence gathering become increasingly crucial,&lt;br /&gt;
and the circumstances in which your services are deployed get more&lt;br /&gt;
serious.&amp;lt;/p&amp;gt;&lt;br /&gt;
Problem-solving skills are crucial at this level of incident&lt;br /&gt;
response, and as the stakes rise, so does the pressure in each&lt;br /&gt;
situation. At this level, programming abilities are essential since&lt;br /&gt;
incident responders may be needed to reverse engineer malicious code or&lt;br /&gt;
even create patches for vulnerable network applications or services. &amp;lt;ref name=&amp;quot;coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated]&amp;quot;. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Senior-Level Incident Response Positions===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;intrusion-detection-specialist&amp;quot;&amp;gt;Intrusion detection&lt;br /&gt;
specialist:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;A CISSP certification might help a potential candidate in preparing&lt;br /&gt;
for the profession. The role of an intrusion detection specialist is to&lt;br /&gt;
find and stop any unwanted communications.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-manager&amp;quot;&amp;gt;Incident manager:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Expected to plan, oversee, manage, and supervise all incident&lt;br /&gt;
response team actions. Is in charge of reporting all current events to&lt;br /&gt;
senior management and stakeholders, as well as acting as the technical&lt;br /&gt;
lead on active incidents for incident responders. Prepares threat and&lt;br /&gt;
impact assessments and reports them known to management.&amp;lt;ref name=&amp;quot;coursera&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Certificates== &lt;br /&gt;
There is a vast number of different certificates and the road map to&lt;br /&gt;
being a certified professional could be very different&amp;lt;ref name=&amp;quot;Coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated],&amp;quot; [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;NICCS&amp;quot;&amp;gt;NICCS, &amp;quot;Cybersecurity Certifications,&amp;quot; [Online]. Available: hhttps://niccs.cisa.gov/about-niccs/cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt; . One possible&lt;br /&gt;
approach is to start with basic certificates from the different branches&lt;br /&gt;
of service and move to more specific and demanding focused&lt;br /&gt;
certification. Also, some jobs require certain clearances, either from&lt;br /&gt;
industry, or from the government. One small selection of different&lt;br /&gt;
possible certificates is brought out in following paragraphs.&lt;br /&gt;
&lt;br /&gt;
Security+ is a CompTIA certification that is considered a basic cert&lt;br /&gt;
among cybersecurity professionals. It covers the topics of risk&lt;br /&gt;
management and threat assessment.&lt;br /&gt;
Network+ is also offered by CompTIA this certification (like the name&lt;br /&gt;
implies) focuses on networking infrastructure and operations. It is&lt;br /&gt;
considered a foundational certification.&lt;br /&gt;
The Certified Information Systems Security Professional (CISSP) is a&lt;br /&gt;
more advanced certification designed for cybersecurity professionals&lt;br /&gt;
with at least five years of work experience. The certification covers&lt;br /&gt;
topics such as architecture, engineering, and management.&amp;lt;/p&amp;gt;&lt;br /&gt;
The Certified Ethical Hacker (CEH) certification is also considered a&lt;br /&gt;
more advanced cert because it generally requires that applicants have&lt;br /&gt;
multiple years of work experience. The goal of an ethical hacker&lt;br /&gt;
certification is to be able to understand how cyber attacks unfold in&lt;br /&gt;
order to improve threat assessment and mitigation skills.&amp;lt;ref name=&amp;quot;cyberguide&amp;quot;&amp;gt;Cybersecurity Guide, &amp;quot;How to become a cybersecurity specialist&amp;quot;, [Online]. Available: https://cybersecurityguide.org/careers/security-specialist/. [Accessed 27 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
This is definitely not all, when one looks for more information, following link could be searched, to get more in depth knowledge about&lt;br /&gt;
different possibilities.&lt;br /&gt;
 &lt;br /&gt;
Hereby, with the help of this matrix a possible taxonomy of different 436 listed certificates in branches are&lt;br /&gt;
presented.&amp;lt;ref name=&amp;quot;Pauljeremy&amp;quot;&amp;gt;&amp;quot;Cybersecurity Roadmap,&amp;quot; [Online]. Available: https://pauljerimy.com/2020/10/12/scr-oct-2020-update/. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:analystimage5.png|1000px|thumb|Certificate matrix &amp;lt;ref&amp;gt;&amp;quot;Certification roadmap&amp;quot;. Available at https://pauljerimy.com/security-certification-roadmap&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
=== Communication and Network Security===&lt;br /&gt;
Communication and network security covers the ability to secure&lt;br /&gt;
communication channels and networks. Topics include secure and converges&lt;br /&gt;
protocols, wireless networks, cellular networks, hardware operations&lt;br /&gt;
(warranty and redundant power), and third-party connectivity. IP&lt;br /&gt;
networking are also included in this domain.&lt;br /&gt;
===Identity and Access Management===&lt;br /&gt;
The identity and access management domain covers the attacks that&lt;br /&gt;
target the human gateway to gain access to data. Other topics include&lt;br /&gt;
ways to identify users with rights to access the information and&lt;br /&gt;
servers. Identity and access management covers the topics of&lt;br /&gt;
applications, Single sign-on authentication, privilege escalation,&lt;br /&gt;
Kerberos, rule-based or risk-based access control, proofing and&lt;br /&gt;
establishment of identity.&lt;br /&gt;
===Security Architecture and Engineering===&lt;br /&gt;
The security architecture and engineering domain covers important&lt;br /&gt;
topics concerning security engineering plans, designs and principles,&lt;br /&gt;
Topics include assessing and mitigating information system&lt;br /&gt;
vulnerabilities, fundamental concepts of security models and security&lt;br /&gt;
architectures in critical areas like access control. Cloud systems,&lt;br /&gt;
cryptography, system infiltrations (ransomware, fault-injection and&lt;br /&gt;
more) and virtualized systems are also covered in this domain.&lt;br /&gt;
===Asset Security===&lt;br /&gt;
The Asset Security domain deals with the issues related to the&lt;br /&gt;
collection, storage, maintenance, retention and destruction of data. It&lt;br /&gt;
also covers knowledge of different roles regarding data handling (owner,&lt;br /&gt;
controller and custodian) as well as data protection methods and data&lt;br /&gt;
states. Other topics include resource provision, asset classification&lt;br /&gt;
and data lifecycle management.&lt;br /&gt;
===Security and Risk Management===&lt;br /&gt;
The security and risk management domain covers general on skills&lt;br /&gt;
related to the implementation of user awareness programs as well as&lt;br /&gt;
security procedures. Emphasis is also placed on risk management&lt;br /&gt;
concerning the acquisition of new services, hardware and software&lt;br /&gt;
(supply chain). Other skills include social engineering defense&lt;br /&gt;
mechanisms.&lt;br /&gt;
===Security Assessment and Testing===&lt;br /&gt;
The security assessment and testing domain deals with all the&lt;br /&gt;
techniques and tools used to find system vulnerabilities, weaknesses and&lt;br /&gt;
potential areas of concern not addressed by security procedures and&lt;br /&gt;
policies. Attack simulations, vulnerability assessment, compliance&lt;br /&gt;
checks, and ethical disclosure also fall under this domain.&lt;br /&gt;
===Software Security===&lt;br /&gt;
The software development security domain deals with implementing&lt;br /&gt;
software-based security protocols within environment for which the IT&lt;br /&gt;
professional is responsible. Risk analysis, vulnerability identification&lt;br /&gt;
and auditing of source codes are all covered in this subset. Additional&lt;br /&gt;
topics include software-designed security, maturity models, development&lt;br /&gt;
methodologies, open-source and third-party development security.&lt;br /&gt;
===Security operations===&lt;br /&gt;
The security operations domain covers topics ranging from&lt;br /&gt;
investigations and digital forensic to detection and intrusion&lt;br /&gt;
prevention tools, sandboxing and firewalls. Topics include user and&lt;br /&gt;
entity behavior analytics, threat intelligence (threat hunting and&lt;br /&gt;
threat feeds) log management, artifacts (mobile, computer and network),&lt;br /&gt;
machine learning and AI-based tools, penetration testing, and&lt;br /&gt;
exploitation development. These for sub-domains are lister here.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Incident Handling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Penetration Testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Exploitation&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Education==&lt;br /&gt;
[[File:Analystimage7.png|400px|thumb|Comparison degree vs Certificate &amp;lt;ref&amp;gt;&amp;quot;Comparison Table&amp;quot;. Available at https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
The entry level monitoring specialist is hired by Estonian&lt;br /&gt;
Information System Authority even if there is no formal IT education,&lt;br /&gt;
but readiness to learn and moderate knowledge of different operation&lt;br /&gt;
systems is enough to start the career. &amp;lt;ref name=&amp;quot;cv&amp;quot;&amp;gt;cv.ee, &amp;quot;SEIRESPETSIALIST - tule Eesti küberruumi valvuriks!&amp;quot;. Available: https://www.cv.ee/en/vacancy/792782/riigi-infosusteemi-amet/seirespetsialist-tule-eesti-kuberruumi-valvuriks [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Nevertheless, like most other high qualification careers jobs falling&lt;br /&gt;
under the cybersecurity specialist category require some form of formal&lt;br /&gt;
education. However, since cybersecurity specialist jobs can fall across&lt;br /&gt;
a wide spectrum of job descriptions and responsibilities, it is possible&lt;br /&gt;
to obtain a specialist job after completing many levels of different&lt;br /&gt;
computer related education.&lt;br /&gt;
&lt;br /&gt;
If one is looking for a cybersecurity related education, for example&lt;br /&gt;
in EU, 137 courses/programs could be found that relate to keyword IT or&lt;br /&gt;
cybersecurity. &amp;lt;ref name=&amp;quot;enisa&amp;quot;&amp;gt;ENISA (European Union Agency for Cybersecurity), &amp;quot;Cybersecurity Education-Cybersecurity Higher Education Database&amp;quot;. Available: https://www.enisa.europa.eu/topics/cybersecurity-education/education-map/education-courses [Accessed 26 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Also, there is a great amount of discussion, if cyber security&lt;br /&gt;
professional should have a degree or would be certification just enough.&lt;br /&gt;
One interesting table is produces by Franklin University that compares&lt;br /&gt;
benefits and/or drawbacks of each type of credential.&amp;lt;ref name=&amp;quot;franklin&amp;quot;&amp;gt;Franklin University, &amp;quot;Is Getting a Master&#039;s Degree in Cyber Security Worth It?&amp;quot;. Available: https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Certifications are generally good for people with little practical&lt;br /&gt;
experience because they are known quantities in the industry and can&lt;br /&gt;
help you get your foot in the door. They set a minimum knowledge bar.&lt;br /&gt;
But some certifications are viewed more favorably than others.&lt;br /&gt;
Certifications with renewal requirements are viewed better by hiring&lt;br /&gt;
managers, but they also more costly in the long run because of the need&lt;br /&gt;
for continuing education. Certifications are also good for showing&lt;br /&gt;
in-depth expertise in a specialization within cybersecurity. Depending&lt;br /&gt;
on your career goals, it may be advantageous to have a master’s&lt;br /&gt;
degree—which shows your breadth of knowledge, critical thinking and&lt;br /&gt;
leadership skills—and a certificate—which shows specific skill&lt;br /&gt;
competency.&amp;lt;ref name=&amp;quot;franklin&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
As IT (Cyber) Security is still a relatively young discipline,&lt;br /&gt;
universities and colleges are still figuring out which is the best&lt;br /&gt;
approach for their degrees. Study programmes and curricula in Cyber&lt;br /&gt;
Security are different. In general, here are the duration of Cyber&lt;br /&gt;
Security degrees:&lt;br /&gt;
&amp;lt;ref name=&amp;quot;studyportal&amp;quot;&amp;gt;Studyportals, &amp;quot;Why You Should Study a Cyber Security Degree in 2022&amp;quot;. Available: https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Bachelor’s degrees in Cyber Security take 3 or 4 years in most&lt;br /&gt;
countries.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Master’s courses in Cyber Security take between 1-2 years to&lt;br /&gt;
complete.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;PhD programmes in Cyber Security last 3-5 years. Some only take 1&lt;br /&gt;
or 2 years, but they are less common.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Generalization could me made that on bachelor level the general&lt;br /&gt;
knowledge about the cyber issues are obtained. On master level the&lt;br /&gt;
specialization courses are taken and the person can choose more specific&lt;br /&gt;
topics to study. It is on master level where strengths of the cyber&lt;br /&gt;
specialist can be developed further and up-do date knowledge obtained in&lt;br /&gt;
specifics. PhD is serious science and involves teaching, lot of&lt;br /&gt;
scientific work and writing for publications.&lt;br /&gt;
&lt;br /&gt;
==Salary==&lt;br /&gt;
&amp;lt;p&amp;gt;Even if the salary can be very different, compared to the skills and&lt;br /&gt;
experience, an generalization can be made. Cyber Security professionals&lt;br /&gt;
in CSIRT, and in other entities earn quite well, from the start. First,&lt;br /&gt;
some comparison from the United States. The average CSIRT analyst salary&lt;br /&gt;
in the USA is $97,500 per year or $50 per hour. Entry level positions&lt;br /&gt;
start at $48,875 per year while most experienced workers make up to&lt;br /&gt;
$135,373 per year.&amp;lt;ref name=&amp;quot;talent&amp;quot;&amp;gt;talent.com, &amp;quot;Csirt Analyst average salary in USA 2022&amp;quot;. Available: https://www.talent.com/salary?job=csirt+analyst [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There are multiple positions you can occupy in this field. They have&lt;br /&gt;
in common great salaries and high demand for technical skills, attention&lt;br /&gt;
to details, problem-solving mentality, and the ability to analyze risks.&lt;br /&gt;
Here are the average annual salaries in the United States, according to&lt;br /&gt;
Payscale: &amp;lt;ref name=&amp;quot;studyportal&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Cryptographer – 100,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Information Security Officer – 91,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Assessor – 90,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Engineer – 88,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Penetration Tester – 81,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Forensics Expert – 71,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Administrator – 65,000 USD&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
When looking into salaries in Estonia, one can find that there is a&lt;br /&gt;
discussion that private sector is taking a toll from the public sector,&lt;br /&gt;
and that the salaries in important agencies, as Information System&lt;br /&gt;
Authority loose their employees to the better paid positions in private&lt;br /&gt;
sector.&amp;lt;ref name=&amp;quot;digigeenius&amp;quot;&amp;gt;DiGi Geenius, &amp;quot;Kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad&amp;quot;. Available: https://digi.geenius.ee/rubriik/uudis/kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad/ [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;tehnika&amp;quot;&amp;gt;Postimees, &amp;quot;Riigi-it-tootajate-palgamaarad-kasvasid&amp;quot;. Available: https://tehnika.postimees.ee/6887428/riigi-it-tootajate-palgamaarad-kasvasid [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
But there is also a different view that average private sector worker&lt;br /&gt;
could be hired as a top specialist in public sector and then the payment&lt;br /&gt;
is higher. Nevertheless, it seems that the average payment in cyber&lt;br /&gt;
security sector is any way higher that in other parts of the&lt;br /&gt;
e-services. &amp;lt;ref name=&amp;quot;digigeenius2&amp;quot;&amp;gt;DiGi Geenius, &amp;quot;5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka&amp;quot;. Available: https://digi.geenius.ee/rubriik/uudis/5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==SOC==&lt;br /&gt;
&amp;lt;p&amp;gt;A SOC is a facility where an organization’s network, applications,&lt;br /&gt;
and endpoints are monitored and defended. The term was adapted from&lt;br /&gt;
network operations centers (NOCs), where large telecommunication or&lt;br /&gt;
corporate networks are monitored. When network security became more of a&lt;br /&gt;
concern, security teams were formed within the NOCs, and eventually spun&lt;br /&gt;
off into larger organizations of their own as the responsibilities of&lt;br /&gt;
security teams grew increasingly complex and specialized. The security&lt;br /&gt;
staff working in a security operations center are often called the SOC&lt;br /&gt;
team.&amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;Exabeam, &amp;quot;CSIRT&amp;quot;. Available: https://www.exabeam.com/incident-response/csirt/ [Accessed 28 APr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;Functions of the SOC team include, but are not limited to:&amp;lt;ref name=&amp;quot;trellix&amp;quot;&amp;gt;Trellix, &amp;quot;What Is a Security Operations Center (SOC)?&amp;quot;. Available: https://www.trellix.com/en-us/security-awareness/operations/what-is-soc.html [Accessed 30 APr 2022].&amp;lt;/ref&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ol type=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Taking inventory of resources, to get a better understanding of the&lt;br /&gt;
structure they are protecting.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintanence of the system, by constantly making updates and adding&lt;br /&gt;
safeguards.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Monitoring the network for abnormalities with special tools.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Threat analysis of new attacks and vulnerabilities.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Responding to attacks, by acting as “first responders”. The SOC team&lt;br /&gt;
will shut down and/or isolate endpoints, deleting files and lowering the&lt;br /&gt;
impact as fast as possible.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Recovery of system stability and lost data. This may be done using&lt;br /&gt;
backups, restarting endpoints or reconfiguring systems.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Logging all actions on the system, to be later used for analysis or&lt;br /&gt;
forensics after an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigating the root cause of an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Auditing their own actions, to be in line with regulations of the&lt;br /&gt;
organization, industry or governing body.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==CSIRT==&lt;br /&gt;
&amp;lt;p&amp;gt;A CSIRT is a group that responds to security incidents when they&lt;br /&gt;
occur. Key responsibilities of a CSIRT include:&lt;br /&gt;
&amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
===Creating and maintaining an incident response plan (IRP)===&lt;br /&gt;
An incident response plan (IRP) is a set of written instructions for&lt;br /&gt;
detecting, responding to and limiting the effects of an information&lt;br /&gt;
security event. Incident response plans provide instructions for&lt;br /&gt;
responding to many potential scenarios, including data breaches, denial&lt;br /&gt;
of service/distributed denial of service attacks, firewall breaches,&lt;br /&gt;
virus or malware outbreaks or insider threats. Without an incident&lt;br /&gt;
response plan in place, organizations may either not detect the attack&lt;br /&gt;
in the first place, or not follow proper protocol to contain the threat&lt;br /&gt;
and recover from it when a breach is detected.&lt;br /&gt;
&amp;lt;ref name=&amp;quot;stratacore&amp;quot;&amp;gt;Stratacore, &amp;quot;Incident Response Plan (IRP)&amp;quot;. https://www.stratacore.com/incidentresponseplan [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Investigating and analyzing incidents===&lt;br /&gt;
CSIRTs are also involved in improvement activities. After major&lt;br /&gt;
computer security incidents occur, or when incidents are not handled in&lt;br /&gt;
a timely or effective manner, a CSIRT will generally perform a&lt;br /&gt;
postmortem of the incident and its response. This postmortem will&lt;br /&gt;
identify the strengths and weakness of the response effort. Such reviews&lt;br /&gt;
can identify weaknesses and holes in systems, infrastructure defenses,&lt;br /&gt;
or policies that allowed the incident to take place. It can also&lt;br /&gt;
identify problems with communication channels, interfaces, and&lt;br /&gt;
procedures that inhibited the efficient resolution of the reported&lt;br /&gt;
problem.&lt;br /&gt;
&amp;lt;ref name=&amp;quot;cisa&amp;quot;&amp;gt;CISA (Cybersecurity &amp;amp; Infrastructure Security Agency, &amp;quot;Defining Computer Security Incident Response Teams&amp;quot;. https://www.cisa.gov/uscert/bsi/articles/best-practices/incident-management/defining-computer-security-incident-response-teams [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Managing internal communications and updates during or immediately after incidents occur===&lt;br /&gt;
===Communicating with employees, shareholders, customers, and the press about incidents as needed===&lt;br /&gt;
There are various services within the CSIRT Services Framework that&lt;br /&gt;
address communications, as they relate to security operations and&lt;br /&gt;
incident response services. Some of these include Information Security&lt;br /&gt;
Incident Coordination, Crisis Management Support, Vulnerability&lt;br /&gt;
Disclosure, Situational Awareness Communication, and Awareness Building,&lt;br /&gt;
to name a few. Sharing information and communicating with the general&lt;br /&gt;
public and/or your constituency is appropriate in many different&lt;br /&gt;
scenarios. These can range from proactive communications to reactive&lt;br /&gt;
communications. Each scenario may be unique, and careful consideration&lt;br /&gt;
should be given to when to release information to the public and what&lt;br /&gt;
information should be released.&lt;br /&gt;
&amp;lt;ref name=&amp;quot;CMUni&amp;quot;&amp;gt;Carniege Mellon University, Brittany Manley, David McIntire &amp;quot;A Guide to Effective Incident Management Communications&amp;quot;. https://resources.sei.cmu.edu/asset_files/Handbook/2021_002_001_651819.pdf [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Remediating incidents===&lt;br /&gt;
Threat remediation is a strong and capable tool for fighting the&lt;br /&gt;
cyber security compromises. As the word ‘remedy’ suggests, remediation&lt;br /&gt;
process involves the treatment of a security breach. With the&lt;br /&gt;
remediation practices, your cyber security team is able to eliminate&lt;br /&gt;
suspicious activities and malicious attacks in the form of malware,&lt;br /&gt;
ransomware, phishing and such. Even if you ‘kill’ the suspicious&lt;br /&gt;
activity, the attackers can remain in your systems. If you want to&lt;br /&gt;
contaminate and end the problem for good, your remediation processes&lt;br /&gt;
must involve the detection of the cause. &amp;lt;ref name=&amp;quot;logsign&amp;quot;&amp;gt;Logsign, &amp;quot;What-is-remediation-in-cyber-security&amp;quot;. Available: https://www.logsign.com/blog/what-is-remediation-in-cyber-security/. [Accessed 28 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Recommending technology, policy, governance, and training changes after security incidents===&lt;br /&gt;
After all these actions, the SCIRT must contribute to the development&lt;br /&gt;
of better policies, practices and has to recommend improvements. They&lt;br /&gt;
are not working in the vacuum and their work has to create new and&lt;br /&gt;
better standards for cyber security. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;Exabeam, &amp;quot;CSIRT&amp;quot;. Available: https://www.exabeam.com/incident-response/csirt/ [Accessed 28 APr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==CERT==&lt;br /&gt;
The term “computer emergency response team” was coined in 1988. In&lt;br /&gt;
response to the Morris worm attack that impacted thousands of servers on&lt;br /&gt;
the Internet, DARPA funded the formation of the Computer Emergency&lt;br /&gt;
Response Team Coordination Center (CERT-CC) at Carnegie Mellon&lt;br /&gt;
University. The goal of CERT-CC was to help protect the internet by&lt;br /&gt;
collecting and disseminating information on critical security&lt;br /&gt;
vulnerabilities. Several other countries formed similar centers using&lt;br /&gt;
the same acronym (despite threats of legal action by Carnegie Mellon for&lt;br /&gt;
trademark infringement). Now the term CERT refers to any emergency&lt;br /&gt;
response team that deals with cyber threats. Many people use CERT-CC&lt;br /&gt;
interchangeably with CSIRT, though the charter of a CERT is information&lt;br /&gt;
sharing in order to help other response teams respond to threats against&lt;br /&gt;
their own infrastructure. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In general, the designation of CERT is helpful in applying real-world&lt;br /&gt;
solutions to various cybersecurity problems. They may be government&lt;br /&gt;
contractors or employees of a major corporation. For example, the U.S.&lt;br /&gt;
Computer Emergency Readiness Team (US-CERT) operates under the U.S.&lt;br /&gt;
Department of Homeland Security.&lt;br /&gt;
&amp;lt;ref name=&amp;quot;techopedia&amp;quot;&amp;gt;Techopedia, &amp;quot;Computer Emergency Response Team (CERT)&amp;quot;. Available: https://www.techopedia.com/definition/31003/computer-emergency-response-team-cert. [Accessed 25 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In Estonia CERT is designated as CERT-EE. It was established in 2006,&lt;br /&gt;
as an organization responsible for the management of security incidents&lt;br /&gt;
in .ee computer networks. It is also a national contact point for&lt;br /&gt;
international co-operation in the field of IT security. &amp;lt;ref name=&amp;quot;ria&amp;quot;&amp;gt;Information System Autority, &amp;quot;CERT-EE&amp;quot;. Available: hhttps://www.ria.ee/en/cyber-security/cert-ee.html [Accessed 25 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Difference between SOC/CSIRT/CERT==&lt;br /&gt;
[[File:analystimage3.png|300px|thumb|SOC/CSIRT/CERT &amp;lt;ref name=&amp;quot;exabeam&amp;gt;&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
How CSIRTs differ from CERTs and SOCs. There are overlapping&lt;br /&gt;
responsibilities between a community emergency response team (CERT),&lt;br /&gt;
computer security incident response team (CSIRT), and security&lt;br /&gt;
operations center (SOC). To add to this confusion, frequently, the terms&lt;br /&gt;
CERT and CSIRT are used interchangeably, despite the important&lt;br /&gt;
differences. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Understand the primary roles and characteristics of a CERT, CSIRT, and SOC.==&lt;br /&gt;
[[File:analystimage4.png|600px|thumb|Primary Roles of CERT, CSIRT, and SOC&amp;lt;ref name=&amp;quot;exabeam&amp;gt;&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&amp;lt;p&amp;gt;So, using strict definitions, a CERT collects and disseminates&lt;br /&gt;
security information, typically for the benefit of a country or an&lt;br /&gt;
industry. A CSIRT is a cross-functional team that responds to incidents&lt;br /&gt;
on behalf of a country or an organization. A SOC is where a country or&lt;br /&gt;
organization monitors and defends its network, servers, applications,&lt;br /&gt;
and endpoints. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Future==&lt;br /&gt;
&amp;lt;p&amp;gt;And the Cyber security problem is only getting bigger. According to a&lt;br /&gt;
report published by Accenture, the number of cyber security breaches&lt;br /&gt;
increased by 11 percent from 2017 to 2018. The cost of such breaches is&lt;br /&gt;
astronomical–about $600 billion worldwide, according to the Economic&lt;br /&gt;
Impact of Cybercrime report.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Job projections for cybersecurity are staggering. The Bureau of Labor&lt;br /&gt;
Statistics in US predicts that careers in the cybersecurity field will&lt;br /&gt;
grow by 32% by 2028. That makes cybersecurity one of the top 10&lt;br /&gt;
fastest-growing jobs in the country. In the United States alone, jobs&lt;br /&gt;
for Information Security Analysts are expected to grow by 15% by&lt;br /&gt;
2024.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Most likely this trend is also similar in other countries.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When checking Estonian job portals, there is a constant need for&lt;br /&gt;
people for cyber security related positions. Also, linkedin search gives&lt;br /&gt;
approximately 30 vacancies immediately. There are banks, logistics&lt;br /&gt;
companies, e-shops, and software producers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://ee.linkedin.com/jobs/cyber-security-jobs?countryRedirected=1&amp;amp;amp;position=1&amp;amp;amp;pageNum=0&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Trends that affect companies create need for constant cyber security&lt;br /&gt;
services. Increasing number of home/remote offices require secure&lt;br /&gt;
corporate networks and security of remote devices. One example is from&lt;br /&gt;
this year, when sloppy remote desktop set-up paralyzed systems of 17&lt;br /&gt;
companies.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.aripaev.ee/uudised/2022/04/20/ria-lohakas-kaugtoolaua-seadistus-halvas-martsis-vahemalt-17-juhul-ettevotete-it-susteemid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Also, no service can exists without robust infrastructure - servers,&lt;br /&gt;
databases, applications. As all previously mentioned devices and&lt;br /&gt;
services are at constant scanning and surveillance. So, the breach&lt;br /&gt;
detection and immediate action demands 24/7 services. Even if lot of&lt;br /&gt;
things could be automated, there is a need for human specialists (at&lt;br /&gt;
least, at the moment). Third growing field is also a forensic&lt;br /&gt;
investigation, as every attack must be investigated in order to be ready&lt;br /&gt;
to repel next attacks. So data recovery and evidence collection is&lt;br /&gt;
another important field of work that need skilled and professional&lt;br /&gt;
workers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Even, if the specifics of the entity, be it CSIRT, CERT or SOC, are&lt;br /&gt;
different, the fundamentals of the work are the same. Professional&lt;br /&gt;
knowledge of the networks, operational systems, hardware, scripting, and&lt;br /&gt;
several other wider IT related knowledge is needed. As there is no&lt;br /&gt;
single way to reach to it, every single person can find one’s strongest&lt;br /&gt;
sides and develop them with knowledge of weaker side, in order to know,&lt;br /&gt;
when to as for help.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/body&amp;gt;&lt;br /&gt;
&amp;lt;/html&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mavald</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142276</id>
		<title>Hiring a Cyber Security Incident Analyst</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142276"/>
		<updated>2022-05-01T16:10:41Z</updated>

		<summary type="html">&lt;p&gt;Mavald: /* Investigating and analyzing incidents */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==A Cyber Security Incident Analyst==&lt;br /&gt;
&lt;br /&gt;
[[File:image1.png|600px|thumb|Job advertisement &amp;lt;ref&amp;gt;&amp;quot;Job Advertisement&amp;quot;. Available at https://www.projectpeople.com/jobs/&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
===Cyber security incident analyst in SOC/CSIRT/CERT===&lt;br /&gt;
This article delves into the job title of Cyber Security Incident&lt;br /&gt;
Analyst and provides an overview of the acronyms SOC/CSIRT/CERT. A brief&lt;br /&gt;
history of the job is discussed here, as well as a possible career path,&lt;br /&gt;
education, experience, and other characteristics required for work in&lt;br /&gt;
computer security-related organizations. The article also provides a&lt;br /&gt;
brief history of SOC/CSIRT/CERT, as well as a comparison of their&lt;br /&gt;
differences and similarities.&lt;br /&gt;
===Cyber Security Incident Analyst Skill Set===&lt;br /&gt;
What skill set is expected from the Cyber Security Incident Analyst? Below written lines are taken from the same job advertisement depicted&lt;br /&gt;
on the left side of this article:&lt;br /&gt;
As a Security Incident Analyst your responsibilities will include:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Continuous monitoring of security tooling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Performing regular and ad-hoc vulnerability assessments&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Carrying out ‘spot checks’&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Reporting vulnerabilities to the PVG via the alerts system&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintaining and documenting logging systems&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Developing centralized logging, reporting and intelligence&lt;br /&gt;
platforms&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;‘Light touch’ penetration testing with open source tooling&lt;br /&gt;
(Metasploit)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Knowledge &amp;amp;amp; Experience required:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;SOC, CSIRT or CERT operational environment experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Windows / Linux experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TCP /IP networking protocol knowledge&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience reviewing and analyzing Security Events from various&lt;br /&gt;
monitoring and logging sources&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience in website and web application security assessment or&lt;br /&gt;
penetration testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience of using Metasploit&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Scripting knowledge using BASH, Python, Perl, Ruby&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Skills in Host and Network Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
As one can see the description of the duties is wide and also the&lt;br /&gt;
knowledge and experience that is required is noteworthy. So, where to&lt;br /&gt;
start to find out the way to get this kind of knowledge and&lt;br /&gt;
expertize.&lt;br /&gt;
===Possible career path===&lt;br /&gt;
Next part of the paper is aiming to depict a possible ways, how to&lt;br /&gt;
develop oneself, and move along the career pathway in cybersecurity&lt;br /&gt;
field. Topics of development, education, experience and certification&lt;br /&gt;
are covered.&lt;br /&gt;
[[File:analystimage2.png|1000px|thumb|Career path &amp;lt;ref&amp;gt;&amp;quot;Possible Career Path&amp;quot;. Available at https://www.cyberseek.org/pathway.html&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
===Junior/Senior===&lt;br /&gt;
Start with an entry-level job in IT. Hands-on experience is often the&lt;br /&gt;
most effective way to prepare for certification exams. Start&lt;br /&gt;
accumulating work experience with an entry-level role as a cybersecurity&lt;br /&gt;
analyst. Many cybersecurity professionals start off in more general IT&lt;br /&gt;
roles. The skills, practices, and technologies you’ll use as a&lt;br /&gt;
cybersecurity professional will continue to evolve along with computer&lt;br /&gt;
and network technology. The desire to learn, ability to problem solve,&lt;br /&gt;
and attention to detail will serve you well in this field. Other, more&lt;br /&gt;
technical skills and technologies to learn include:&amp;lt;ref name=&amp;quot;certification&amp;quot;&amp;gt;Popular Cyber Security Certificates [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications  [Accessed 25 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====SIEM tools (security information and event management)====&lt;br /&gt;
Security Information and Event Management (SIEM) is a set of tools&lt;br /&gt;
and services offering a holistic view of an organization’s information&lt;br /&gt;
security. SIEM works by combining two technologies:&lt;br /&gt;
&amp;lt;li&amp;gt;Security information management (SIM), which collects data from log&lt;br /&gt;
files for analysis and reports on security threats and events, and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;security event management (SEM), which conducts real-time system&lt;br /&gt;
monitoring, notifies network admins about important issues and&lt;br /&gt;
establishes correlations between security events. There are a number of&lt;br /&gt;
security information and event management solutions on the market.&lt;br /&gt;
ArcSight ESM, IBM QRadar and Splunk are among the most popular. &amp;lt;ref name=&amp;quot;SIEM&amp;quot;&amp;gt;Application security, SIEM [Online]. Available: https://www.imperva.com/learn/application-security/siem/. [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Firewalls, Intrusion Detection Systems (IDS), and Intrusion Prevention Systems(IPS)====&lt;br /&gt;
Firewalls can be two types, hardware and software firewalls. Software&lt;br /&gt;
firewall is a firewall that is installed on a computer or server, and&lt;br /&gt;
tasked with network security. It works with a wide variety of other&lt;br /&gt;
technology security solutions to provide more robust and cohesive&lt;br /&gt;
security for enterprises of all sizes. When a software firewall is&lt;br /&gt;
installed on a server, it opens up like an umbrella of protection over&lt;br /&gt;
all other computers connected to the network. It is able to monitor both&lt;br /&gt;
incoming and outgoing traffic for potential risk or suspicious user&lt;br /&gt;
behavior, and also makes setting security policies much easier, faster&lt;br /&gt;
and more flexible. Hardware firewall is positioned between the network&lt;br /&gt;
and devices, allowing traffic to funnel through the firewall for a close&lt;br /&gt;
inspection and analysis. A hardware firewall, a term often&lt;br /&gt;
interchangeable with network or next-generation firewall, protects the&lt;br /&gt;
network gateways for an enterprise. Hardware firewall is physical&lt;br /&gt;
hardware, installed between network elements and connected devices, and&lt;br /&gt;
is tasked with filtering traffic for cyber threat to the network or&lt;br /&gt;
devices. Filtering out unauthorized or suspicious users based on traffic&lt;br /&gt;
analysis is one of the biggest benefits of hardware firewall. &amp;lt;ref name=&amp;quot;sangfor&amp;quot;&amp;gt;Sangfor, &amp;quot;What is Software Firewall? Difference between Hardware Firewall and Software Firewall, [Online]. Available: https://www.sangfor.com/blog/cybersecurity/what-is-software-firewall-difference-between-hardware-firewall-and-software-firewall [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems&lt;br /&gt;
(IPS) are both parts of the network infrastructure. IDS/IPS compare&lt;br /&gt;
network packets to a cyberthreat database containing known signatures of&lt;br /&gt;
cyberattacks — and flag any matching packets. IDS doesn’t alter the&lt;br /&gt;
network packets in any way, whereas IPS prevents the packet from&lt;br /&gt;
delivery based on the contents of the packet, much like how a firewall&lt;br /&gt;
prevents traffic by IP address. &amp;lt;ref name=&amp;quot;Varonis&amp;quot;&amp;gt;Varonis, &amp;quot;What is Software Firewall? IDS vs. IPS: What is the Difference?, [Online]. Available: https://www.varonis.com/blog/ids-vs-ips [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Digital forensics====&lt;br /&gt;
Digital forensics is a branch of forensic science that focuses on&lt;br /&gt;
identifying, acquiring, processing, analyzing, and reporting on data&lt;br /&gt;
stored electronically. Electronic evidence is a component of almost all&lt;br /&gt;
criminal activities and digital forensics support is crucial for law&lt;br /&gt;
enforcement investigations. Electronic evidence can be collected from a&lt;br /&gt;
wide array of sources, such as computers, smartphones, remote storage,&lt;br /&gt;
unmanned aerial systems, shipborne equipment, and more.&amp;lt;ref name=&amp;quot;interpol&amp;quot;&amp;gt;Interpol, &amp;quot;Digital forensics&amp;quot;. Available: https://www.interpol.int/How-we-work/Innovation/Digital-forensics. [Accessed 28 4 2022].&amp;lt;/ref&amp;gt; &lt;br /&gt;
Investigative process of digital forensics can be divided into several stages. There are four major stages: preservation, collection,&lt;br /&gt;
examination, and analysis. All these four stages need a deep understanding of computers, technology across a broad spectrum, and cybersecurity principles and&lt;br /&gt;
practices, a working knowledge of computers, networks, and coding, in-depth investigative abilities, critical-thinking skills and analytical talent the ability to effectively communicate and work with a&lt;br /&gt;
wide range of people. &amp;lt;ref name=&amp;quot;ecpi&amp;quot;&amp;gt;&amp;quot;Digital forensics&amp;quot;. Available: https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me. [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Mobile device management====&lt;br /&gt;
Mobile device management (MDM) is software that allows IT&lt;br /&gt;
administrators to control, secure and enforce policies on smartphones,&lt;br /&gt;
tablets and other endpoints. Mobile device management software emerged&lt;br /&gt;
in the early 2000s as a way to control and secure the personal digital&lt;br /&gt;
assistants and smartphones that business workers began to use. The&lt;br /&gt;
consumer smartphone boom that started with the launch of the Apple&lt;br /&gt;
iPhone in 2007 led to the bring your own device (BYOD) trend, which&lt;br /&gt;
fueled further interest in MDM.&amp;lt;ref name=&amp;quot;techtarget&amp;quot;&amp;gt;Techtarget, &amp;quot;Mobile Device Management&amp;quot;. Available: https://www.techtarget.com/searchmobilecomputing/definition/mobile-device-management [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Data management====&lt;br /&gt;
Sometimes the data management is neglected, but this part has a&lt;br /&gt;
crucial role when learning for good cyber security practices. Majority&lt;br /&gt;
of cyber security programs include a special courses on data management.&lt;br /&gt;
Data management is a method of organizing and maintaining data processes&lt;br /&gt;
that are required in almost every business operations. The benefits of&lt;br /&gt;
data management can be found accounting, statistics, logistics planning&lt;br /&gt;
and other disciplines including corporate computing.&amp;lt;ref name=&amp;quot;GlobalUni&amp;quot;&amp;gt;Global Universities, &amp;quot;MSc Data Management and Cyber Security&amp;quot;. Available: https://globaluniversities.in/msc-data-management-cyber-security. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Data governance (and management) play a fundamental role in&lt;br /&gt;
protecting an organization’s data. Ensuring that the right people have&lt;br /&gt;
the right access and that appropriate security controls are in place to&lt;br /&gt;
protect each system or service, based on the criticality or sensitivity&lt;br /&gt;
of the data sets these contain. &amp;lt;ref name=&amp;quot;CyberMagazine&amp;quot;&amp;gt;Cyber Security Magazine, &amp;quot;The Role of Data Governance in Cybersecurity&amp;quot;. Available: https://cybersecurity-magazine.com/the-role-of-data-governance-in-cybersecurity/?utm_source=rss&amp;amp;amp;utm_medium=rss&amp;amp;amp;utm_campaign=the-role-of-data-governance-in-cybersecurity. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Application security development====&lt;br /&gt;
Application security describes security measures at the application&lt;br /&gt;
level that aim to prevent data or code within the app from being stolen&lt;br /&gt;
or hijacked. It encompasses the security considerations that happen&lt;br /&gt;
during application development and design, but it also involves systems&lt;br /&gt;
and approaches to protect apps after they get deployed. Application&lt;br /&gt;
security may include hardware, software, and procedures that identify or&lt;br /&gt;
minimize security vulnerabilities.&amp;lt;ref name=&amp;quot;vmware&amp;quot;&amp;gt;VmWare, &amp;quot;What is application security?&amp;quot;. Available: https://www.vmware.com/topics/glossary/content/application-security.html [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Application security development is important to ensure that your&lt;br /&gt;
application is free from coding errors and bugs. And controls the risk&lt;br /&gt;
and helps safeguard against security vulnerabilities. Application&lt;br /&gt;
security development is the process of making applications more secure&lt;br /&gt;
by finding and fixing security vulnerabilities. This is often done by&lt;br /&gt;
enforcing software security best practices and using application&lt;br /&gt;
security testing tools. &lt;br /&gt;
&amp;lt;ref name=&amp;quot;perforce&amp;quot;&amp;gt;Perforce, &amp;quot;Application Security Development Best Practices&amp;quot;. Available: https://www.perforce.com/blog/kw/application-security-development-best-practices. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Audit and compliance knowledge====&lt;br /&gt;
A cyber security audit is designed to be a comprehensive review and&lt;br /&gt;
analysis of your business’s IT infrastructure. It identifies threats and&lt;br /&gt;
vulnerabilities, exposing weaknesses and high-risk practices.&lt;br /&gt;
Regulations such as the EU GDPR (General Data Protection Regulation) can&lt;br /&gt;
impose hefty penalties in the event of a breach that results in&lt;br /&gt;
exploited data. A cyber security audit will help mitigate the&lt;br /&gt;
consequences of a breach and demonstrate that your organization has&lt;br /&gt;
taken the necessary steps to protect client and company data. &amp;lt;ref name=&amp;quot;cyforsecure&amp;quot;&amp;gt;Cyfor Secure, &amp;quot;What is a Cyber Security Audit and how can it help your organisation?&amp;quot;. Available: https://cyforsecure.co.uk/services/cyber-assessment/cyber-security-audit/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cybersecurity compliance is the organizational risk management method&lt;br /&gt;
aligned with pre-defined security measures &amp;amp;amp; controls on how data&lt;br /&gt;
confidentiality is ensured by its administrative procedures.&amp;lt;ref name=&amp;quot;nordlayer&amp;quot;&amp;gt;NordLayer, &amp;quot;Cybersecurity compliance: Everything you need to know&amp;quot;. Available: https://nordlayer.com/blog/cybersecurity-compliance-everything-you-need-to-know/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
All needed skills are developed through courses and certification.&lt;br /&gt;
&lt;br /&gt;
===Entry-Level Incident Response Positions===&lt;br /&gt;
It is not always possible to advance to the position of incident&lt;br /&gt;
responder in a straight line. Many professionals advance from entry- to&lt;br /&gt;
mid-level positions before becoming a real incident responder or a&lt;br /&gt;
member of a computer emergency response team (CERT).&amp;lt;br /&amp;gt;&lt;br /&gt;
These are some examples: &amp;lt;ref name=&amp;quot;Infosec&amp;quot;&amp;gt;Infosec, &amp;quot;Incident Responder Career Roadmap: From Entry Level to Executive&amp;quot;. Available: https://resources.infosecinstitute.com/topic/incident-responder-career-roadmap-entry-level-executive/ [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;network-administrator&amp;quot;&amp;gt;Network administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;This position’s experience will help potential incident responders&lt;br /&gt;
develop networking skills. Attention to detail, as well as the ability&lt;br /&gt;
to sift through system configurations, site layouts, and general network&lt;br /&gt;
and communication setups, are essential in this field.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;system-administrator&amp;quot;&amp;gt;System administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Another crucial beginning point for an incident responder is to learn&lt;br /&gt;
how to manage resources inside your organization as well as user&lt;br /&gt;
behavior. Understanding the potential damage that users, inadequate&lt;br /&gt;
security setups, and ineffective IT policies and procedures can cause on&lt;br /&gt;
your network can provide prospective candidates with insight into the&lt;br /&gt;
human component of an incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;security-administrator&amp;quot;&amp;gt;Security administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In such a position, basic hacking skills, penetration testing, and&lt;br /&gt;
intrusion detection are all learned, which are crucial incident&lt;br /&gt;
responder skills when trying to replicate a breach or attack.&lt;br /&gt;
Understanding the paths a cybercriminal will take when attempting to&lt;br /&gt;
damage or obtain access to a system can greatly simplify the work of&lt;br /&gt;
reverse engineering the incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Mid-Level Incident Response Positions ===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5&lt;br /&gt;
id=&amp;quot;computer-security-incident-response-team-csirt-engineer&amp;quot;&amp;gt;Computer&lt;br /&gt;
security incident response team (CSIRT) engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;cyber-incident-responder&amp;quot;&amp;gt;Cyber incident responder&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-response-engineer&amp;quot;&amp;gt;Incident response&lt;br /&gt;
engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;While each of these positions is different, they generally require&lt;br /&gt;
very similar skills and characteristics in a candidate. At this level,&lt;br /&gt;
personal characteristics such as problem solving, time management, and&lt;br /&gt;
even presentation skills become more crucial as one’s career evolves&lt;br /&gt;
into a management-facing role.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Technical skills include the ability to identify and minimize threats&lt;br /&gt;
while maintaining communication with management and the rest of your&lt;br /&gt;
team. Data analysis and evidence gathering become increasingly crucial,&lt;br /&gt;
and the circumstances in which your services are deployed get more&lt;br /&gt;
serious.&amp;lt;/p&amp;gt;&lt;br /&gt;
Problem-solving skills are crucial at this level of incident&lt;br /&gt;
response, and as the stakes rise, so does the pressure in each&lt;br /&gt;
situation. At this level, programming abilities are essential since&lt;br /&gt;
incident responders may be needed to reverse engineer malicious code or&lt;br /&gt;
even create patches for vulnerable network applications or services. &amp;lt;ref name=&amp;quot;coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated]&amp;quot;. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Senior-Level Incident Response Positions===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;intrusion-detection-specialist&amp;quot;&amp;gt;Intrusion detection&lt;br /&gt;
specialist:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;A CISSP certification might help a potential candidate in preparing&lt;br /&gt;
for the profession. The role of an intrusion detection specialist is to&lt;br /&gt;
find and stop any unwanted communications.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-manager&amp;quot;&amp;gt;Incident manager:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Expected to plan, oversee, manage, and supervise all incident&lt;br /&gt;
response team actions. Is in charge of reporting all current events to&lt;br /&gt;
senior management and stakeholders, as well as acting as the technical&lt;br /&gt;
lead on active incidents for incident responders. Prepares threat and&lt;br /&gt;
impact assessments and reports them known to management.&amp;lt;ref name=&amp;quot;coursera&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Certificates== &lt;br /&gt;
There is a vast number of different certificates and the road map to&lt;br /&gt;
being a certified professional could be very different&amp;lt;ref name=&amp;quot;Coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated],&amp;quot; [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;NICCS&amp;quot;&amp;gt;NICCS, &amp;quot;Cybersecurity Certifications,&amp;quot; [Online]. Available: hhttps://niccs.cisa.gov/about-niccs/cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt; . One possible&lt;br /&gt;
approach is to start with basic certificates from the different branches&lt;br /&gt;
of service and move to more specific and demanding focused&lt;br /&gt;
certification. Also, some jobs require certain clearances, either from&lt;br /&gt;
industry, or from the government. One small selection of different&lt;br /&gt;
possible certificates is brought out in following paragraphs.&lt;br /&gt;
&lt;br /&gt;
Security+ is a CompTIA certification that is considered a basic cert&lt;br /&gt;
among cybersecurity professionals. It covers the topics of risk&lt;br /&gt;
management and threat assessment.&lt;br /&gt;
Network+ is also offered by CompTIA this certification (like the name&lt;br /&gt;
implies) focuses on networking infrastructure and operations. It is&lt;br /&gt;
considered a foundational certification.&lt;br /&gt;
The Certified Information Systems Security Professional (CISSP) is a&lt;br /&gt;
more advanced certification designed for cybersecurity professionals&lt;br /&gt;
with at least five years of work experience. The certification covers&lt;br /&gt;
topics such as architecture, engineering, and management.&amp;lt;/p&amp;gt;&lt;br /&gt;
The Certified Ethical Hacker (CEH) certification is also considered a&lt;br /&gt;
more advanced cert because it generally requires that applicants have&lt;br /&gt;
multiple years of work experience. The goal of an ethical hacker&lt;br /&gt;
certification is to be able to understand how cyber attacks unfold in&lt;br /&gt;
order to improve threat assessment and mitigation skills.&amp;lt;ref name=&amp;quot;cyberguide&amp;quot;&amp;gt;Cybersecurity Guide, &amp;quot;How to become a cybersecurity specialist&amp;quot;, [Online]. Available: https://cybersecurityguide.org/careers/security-specialist/. [Accessed 27 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
This is definitely not all, when one looks for more information, following link could be searched, to get more in depth knowledge about&lt;br /&gt;
different possibilities.&lt;br /&gt;
 &lt;br /&gt;
Hereby, with the help of this matrix a possible taxonomy of different 436 listed certificates in branches are&lt;br /&gt;
presented.&amp;lt;ref name=&amp;quot;Pauljeremy&amp;quot;&amp;gt;&amp;quot;Cybersecurity Roadmap,&amp;quot; [Online]. Available: https://pauljerimy.com/2020/10/12/scr-oct-2020-update/. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:analystimage5.png|1000px|thumb|Certificate matrix &amp;lt;ref&amp;gt;&amp;quot;Certification roadmap&amp;quot;. Available at https://pauljerimy.com/security-certification-roadmap&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
=== Communication and Network Security===&lt;br /&gt;
Communication and network security covers the ability to secure&lt;br /&gt;
communication channels and networks. Topics include secure and converges&lt;br /&gt;
protocols, wireless networks, cellular networks, hardware operations&lt;br /&gt;
(warranty and redundant power), and third-party connectivity. IP&lt;br /&gt;
networking are also included in this domain.&lt;br /&gt;
===Identity and Access Management===&lt;br /&gt;
The identity and access management domain covers the attacks that&lt;br /&gt;
target the human gateway to gain access to data. Other topics include&lt;br /&gt;
ways to identify users with rights to access the information and&lt;br /&gt;
servers. Identity and access management covers the topics of&lt;br /&gt;
applications, Single sign-on authentication, privilege escalation,&lt;br /&gt;
Kerberos, rule-based or risk-based access control, proofing and&lt;br /&gt;
establishment of identity.&lt;br /&gt;
===Security Architecture and Engineering===&lt;br /&gt;
The security architecture and engineering domain covers important&lt;br /&gt;
topics concerning security engineering plans, designs and principles,&lt;br /&gt;
Topics include assessing and mitigating information system&lt;br /&gt;
vulnerabilities, fundamental concepts of security models and security&lt;br /&gt;
architectures in critical areas like access control. Cloud systems,&lt;br /&gt;
cryptography, system infiltrations (ransomware, fault-injection and&lt;br /&gt;
more) and virtualized systems are also covered in this domain.&lt;br /&gt;
===Asset Security===&lt;br /&gt;
The Asset Security domain deals with the issues related to the&lt;br /&gt;
collection, storage, maintenance, retention and destruction of data. It&lt;br /&gt;
also covers knowledge of different roles regarding data handling (owner,&lt;br /&gt;
controller and custodian) as well as data protection methods and data&lt;br /&gt;
states. Other topics include resource provision, asset classification&lt;br /&gt;
and data lifecycle management.&lt;br /&gt;
===Security and Risk Management===&lt;br /&gt;
The security and risk management domain covers general on skills&lt;br /&gt;
related to the implementation of user awareness programs as well as&lt;br /&gt;
security procedures. Emphasis is also placed on risk management&lt;br /&gt;
concerning the acquisition of new services, hardware and software&lt;br /&gt;
(supply chain). Other skills include social engineering defense&lt;br /&gt;
mechanisms.&lt;br /&gt;
===Security Assessment and Testing===&lt;br /&gt;
The security assessment and testing domain deals with all the&lt;br /&gt;
techniques and tools used to find system vulnerabilities, weaknesses and&lt;br /&gt;
potential areas of concern not addressed by security procedures and&lt;br /&gt;
policies. Attack simulations, vulnerability assessment, compliance&lt;br /&gt;
checks, and ethical disclosure also fall under this domain.&lt;br /&gt;
===Software Security===&lt;br /&gt;
The software development security domain deals with implementing&lt;br /&gt;
software-based security protocols within environment for which the IT&lt;br /&gt;
professional is responsible. Risk analysis, vulnerability identification&lt;br /&gt;
and auditing of source codes are all covered in this subset. Additional&lt;br /&gt;
topics include software-designed security, maturity models, development&lt;br /&gt;
methodologies, open-source and third-party development security.&lt;br /&gt;
===Security operations===&lt;br /&gt;
The security operations domain covers topics ranging from&lt;br /&gt;
investigations and digital forensic to detection and intrusion&lt;br /&gt;
prevention tools, sandboxing and firewalls. Topics include user and&lt;br /&gt;
entity behavior analytics, threat intelligence (threat hunting and&lt;br /&gt;
threat feeds) log management, artifacts (mobile, computer and network),&lt;br /&gt;
machine learning and AI-based tools, penetration testing, and&lt;br /&gt;
exploitation development. These for sub-domains are lister here.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Incident Handling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Penetration Testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Exploitation&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Education==&lt;br /&gt;
[[File:Analystimage7.png|400px|thumb|Comparison degree vs Certificate &amp;lt;ref&amp;gt;&amp;quot;Comparison Table&amp;quot;. Available at https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
The entry level monitoring specialist is hired by Estonian&lt;br /&gt;
Information System Authority even if there is no formal IT education,&lt;br /&gt;
but readiness to learn and moderate knowledge of different operation&lt;br /&gt;
systems is enough to start the career. &amp;lt;ref name=&amp;quot;cv&amp;quot;&amp;gt;cv.ee, &amp;quot;SEIRESPETSIALIST - tule Eesti küberruumi valvuriks!&amp;quot;. Available: https://www.cv.ee/en/vacancy/792782/riigi-infosusteemi-amet/seirespetsialist-tule-eesti-kuberruumi-valvuriks [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Nevertheless, like most other high qualification careers jobs falling&lt;br /&gt;
under the cybersecurity specialist category require some form of formal&lt;br /&gt;
education. However, since cybersecurity specialist jobs can fall across&lt;br /&gt;
a wide spectrum of job descriptions and responsibilities, it is possible&lt;br /&gt;
to obtain a specialist job after completing many levels of different&lt;br /&gt;
computer related education.&lt;br /&gt;
&lt;br /&gt;
If one is looking for a cybersecurity related education, for example&lt;br /&gt;
in EU, 137 courses/programs could be found that relate to keyword IT or&lt;br /&gt;
cybersecurity. &amp;lt;ref name=&amp;quot;enisa&amp;quot;&amp;gt;ENISA (European Union Agency for Cybersecurity), &amp;quot;Cybersecurity Education-Cybersecurity Higher Education Database&amp;quot;. Available: https://www.enisa.europa.eu/topics/cybersecurity-education/education-map/education-courses [Accessed 26 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Also, there is a great amount of discussion, if cyber security&lt;br /&gt;
professional should have a degree or would be certification just enough.&lt;br /&gt;
One interesting table is produces by Franklin University that compares&lt;br /&gt;
benefits and/or drawbacks of each type of credential.&amp;lt;ref name=&amp;quot;franklin&amp;quot;&amp;gt;Franklin University, &amp;quot;Is Getting a Master&#039;s Degree in Cyber Security Worth It?&amp;quot;. Available: https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Certifications are generally good for people with little practical&lt;br /&gt;
experience because they are known quantities in the industry and can&lt;br /&gt;
help you get your foot in the door. They set a minimum knowledge bar.&lt;br /&gt;
But some certifications are viewed more favorably than others.&lt;br /&gt;
Certifications with renewal requirements are viewed better by hiring&lt;br /&gt;
managers, but they also more costly in the long run because of the need&lt;br /&gt;
for continuing education. Certifications are also good for showing&lt;br /&gt;
in-depth expertise in a specialization within cybersecurity. Depending&lt;br /&gt;
on your career goals, it may be advantageous to have a master’s&lt;br /&gt;
degree—which shows your breadth of knowledge, critical thinking and&lt;br /&gt;
leadership skills—and a certificate—which shows specific skill&lt;br /&gt;
competency.&amp;lt;ref name=&amp;quot;franklin&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
As IT (Cyber) Security is still a relatively young discipline,&lt;br /&gt;
universities and colleges are still figuring out which is the best&lt;br /&gt;
approach for their degrees. Study programmes and curricula in Cyber&lt;br /&gt;
Security are different. In general, here are the duration of Cyber&lt;br /&gt;
Security degrees:&lt;br /&gt;
&amp;lt;ref name=&amp;quot;studyportal&amp;quot;&amp;gt;Studyportals, &amp;quot;Why You Should Study a Cyber Security Degree in 2022&amp;quot;. Available: https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Bachelor’s degrees in Cyber Security take 3 or 4 years in most&lt;br /&gt;
countries.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Master’s courses in Cyber Security take between 1-2 years to&lt;br /&gt;
complete.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;PhD programmes in Cyber Security last 3-5 years. Some only take 1&lt;br /&gt;
or 2 years, but they are less common.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Generalization could me made that on bachelor level the general&lt;br /&gt;
knowledge about the cyber issues are obtained. On master level the&lt;br /&gt;
specialization courses are taken and the person can choose more specific&lt;br /&gt;
topics to study. It is on master level where strengths of the cyber&lt;br /&gt;
specialist can be developed further and up-do date knowledge obtained in&lt;br /&gt;
specifics. PhD is serious science and involves teaching, lot of&lt;br /&gt;
scientific work and writing for publications.&lt;br /&gt;
&lt;br /&gt;
==Salary==&lt;br /&gt;
&amp;lt;p&amp;gt;Even if the salary can be very different, compared to the skills and&lt;br /&gt;
experience, an generalization can be made. Cyber Security professionals&lt;br /&gt;
in CSIRT, and in other entities earn quite well, from the start. First,&lt;br /&gt;
some comparison from the United States. The average CSIRT analyst salary&lt;br /&gt;
in the USA is $97,500 per year or $50 per hour. Entry level positions&lt;br /&gt;
start at $48,875 per year while most experienced workers make up to&lt;br /&gt;
$135,373 per year.&amp;lt;ref name=&amp;quot;talent&amp;quot;&amp;gt;talent.com, &amp;quot;Csirt Analyst average salary in USA 2022&amp;quot;. Available: https://www.talent.com/salary?job=csirt+analyst [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There are multiple positions you can occupy in this field. They have&lt;br /&gt;
in common great salaries and high demand for technical skills, attention&lt;br /&gt;
to details, problem-solving mentality, and the ability to analyze risks.&lt;br /&gt;
Here are the average annual salaries in the United States, according to&lt;br /&gt;
Payscale: &amp;lt;ref name=&amp;quot;studyportal&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Cryptographer – 100,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Information Security Officer – 91,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Assessor – 90,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Engineer – 88,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Penetration Tester – 81,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Forensics Expert – 71,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Administrator – 65,000 USD&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
When looking into salaries in Estonia, one can find that there is a&lt;br /&gt;
discussion that private sector is taking a toll from the public sector,&lt;br /&gt;
and that the salaries in important agencies, as Information System&lt;br /&gt;
Authority loose their employees to the better paid positions in private&lt;br /&gt;
sector.&amp;lt;ref name=&amp;quot;digigeenius&amp;quot;&amp;gt;DiGi Geenius, &amp;quot;Kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad&amp;quot;. Available: https://digi.geenius.ee/rubriik/uudis/kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad/ [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;tehnika&amp;quot;&amp;gt;Postimees, &amp;quot;Riigi-it-tootajate-palgamaarad-kasvasid&amp;quot;. Available: https://tehnika.postimees.ee/6887428/riigi-it-tootajate-palgamaarad-kasvasid [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
But there is also a different view that average private sector worker&lt;br /&gt;
could be hired as a top specialist in public sector and then the payment&lt;br /&gt;
is higher. Nevertheless, it seems that the average payment in cyber&lt;br /&gt;
security sector is any way higher that in other parts of the&lt;br /&gt;
e-services. &amp;lt;ref name=&amp;quot;digigeenius2&amp;quot;&amp;gt;DiGi Geenius, &amp;quot;5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka&amp;quot;. Available: https://digi.geenius.ee/rubriik/uudis/5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==SOC==&lt;br /&gt;
&amp;lt;p&amp;gt;A SOC is a facility where an organization’s network, applications,&lt;br /&gt;
and endpoints are monitored and defended. The term was adapted from&lt;br /&gt;
network operations centers (NOCs), where large telecommunication or&lt;br /&gt;
corporate networks are monitored. When network security became more of a&lt;br /&gt;
concern, security teams were formed within the NOCs, and eventually spun&lt;br /&gt;
off into larger organizations of their own as the responsibilities of&lt;br /&gt;
security teams grew increasingly complex and specialized. The security&lt;br /&gt;
staff working in a security operations center are often called the SOC&lt;br /&gt;
team.&amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;Exabeam, &amp;quot;CSIRT&amp;quot;. Available: https://www.exabeam.com/incident-response/csirt/ [Accessed 28 APr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;Functions of the SOC team include, but are not limited to:&amp;lt;ref name=&amp;quot;trellix&amp;quot;&amp;gt;Trellix, &amp;quot;What Is a Security Operations Center (SOC)?&amp;quot;. Available: https://www.trellix.com/en-us/security-awareness/operations/what-is-soc.html [Accessed 30 APr 2022].&amp;lt;/ref&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ol type=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Taking inventory of resources, to get a better understanding of the&lt;br /&gt;
structure they are protecting.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintanence of the system, by constantly making updates and adding&lt;br /&gt;
safeguards.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Monitoring the network for abnormalities with special tools.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Threat analysis of new attacks and vulnerabilities.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Responding to attacks, by acting as “first responders”. The SOC team&lt;br /&gt;
will shut down and/or isolate endpoints, deleting files and lowering the&lt;br /&gt;
impact as fast as possible.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Recovery of system stability and lost data. This may be done using&lt;br /&gt;
backups, restarting endpoints or reconfiguring systems.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Logging all actions on the system, to be later used for analysis or&lt;br /&gt;
forensics after an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigating the root cause of an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Auditing their own actions, to be in line with regulations of the&lt;br /&gt;
organization, industry or governing body.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==CSIRT==&lt;br /&gt;
&amp;lt;p&amp;gt;A CSIRT is a group that responds to security incidents when they&lt;br /&gt;
occur. Key responsibilities of a CSIRT include:&lt;br /&gt;
&amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
===Creating and maintaining an incident response plan (IRP)===&lt;br /&gt;
An incident response plan (IRP) is a set of written instructions for&lt;br /&gt;
detecting, responding to and limiting the effects of an information&lt;br /&gt;
security event. Incident response plans provide instructions for&lt;br /&gt;
responding to many potential scenarios, including data breaches, denial&lt;br /&gt;
of service/distributed denial of service attacks, firewall breaches,&lt;br /&gt;
virus or malware outbreaks or insider threats. Without an incident&lt;br /&gt;
response plan in place, organizations may either not detect the attack&lt;br /&gt;
in the first place, or not follow proper protocol to contain the threat&lt;br /&gt;
and recover from it when a breach is detected.&lt;br /&gt;
&amp;lt;ref name=&amp;quot;stratacore&amp;quot;&amp;gt;Stratacore, &amp;quot;Incident Response Plan (IRP)&amp;quot;. https://www.stratacore.com/incidentresponseplan [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Investigating and analyzing incidents===&lt;br /&gt;
CSIRTs are also involved in improvement activities. After major&lt;br /&gt;
computer security incidents occur, or when incidents are not handled in&lt;br /&gt;
a timely or effective manner, a CSIRT will generally perform a&lt;br /&gt;
postmortem of the incident and its response. This postmortem will&lt;br /&gt;
identify the strengths and weakness of the response effort. Such reviews&lt;br /&gt;
can identify weaknesses and holes in systems, infrastructure defenses,&lt;br /&gt;
or policies that allowed the incident to take place. It can also&lt;br /&gt;
identify problems with communication channels, interfaces, and&lt;br /&gt;
procedures that inhibited the efficient resolution of the reported&lt;br /&gt;
problem.&lt;br /&gt;
&amp;lt;ref name=&amp;quot;cisa&amp;quot;&amp;gt;CISA (Cybersecurity &amp;amp; Infrastructure Security Agency, &amp;quot;Defining Computer Security Incident Response Teams&amp;quot;. https://www.cisa.gov/uscert/bsi/articles/best-practices/incident-management/defining-computer-security-incident-response-teams [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Managing internal communications and updates during or immediately after incidents occur===&lt;br /&gt;
===Communicating with employees, shareholders, customers, and the press about incidents as needed===&lt;br /&gt;
&amp;lt;p&amp;gt;There are various services within the CSIRT Services Framework that&lt;br /&gt;
address communications, as they relate to security operations and&lt;br /&gt;
incident response services. Some of these include Information Security&lt;br /&gt;
Incident Coordination, Crisis Management Support, Vulnerability&lt;br /&gt;
Disclosure, Situational Awareness Communication, and Awareness Building,&lt;br /&gt;
to name a few. Sharing information and communicating with the general&lt;br /&gt;
public and/or your constituency is appropriate in many different&lt;br /&gt;
scenarios. These can range from proactive communications to reactive&lt;br /&gt;
communications. Each scenario may be unique, and careful consideration&lt;br /&gt;
should be given to when to release information to the public and what&lt;br /&gt;
information should be released.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;https://resources.sei.cmu.edu/asset_files/Handbook/2021_002_001_651819.pdf&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Remediating incidents===&lt;br /&gt;
Threat remediation is a strong and capable tool for fighting the&lt;br /&gt;
cyber security compromises. As the word ‘remedy’ suggests, remediation&lt;br /&gt;
process involves the treatment of a security breach. With the&lt;br /&gt;
remediation practices, your cyber security team is able to eliminate&lt;br /&gt;
suspicious activities and malicious attacks in the form of malware,&lt;br /&gt;
ransomware, phishing and such. Even if you ‘kill’ the suspicious&lt;br /&gt;
activity, the attackers can remain in your systems. If you want to&lt;br /&gt;
contaminate and end the problem for good, your remediation processes&lt;br /&gt;
must involve the detection of the cause. &amp;lt;ref name=&amp;quot;logsign&amp;quot;&amp;gt;Logsign, &amp;quot;What-is-remediation-in-cyber-security&amp;quot;. Available: https://www.logsign.com/blog/what-is-remediation-in-cyber-security/. [Accessed 28 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Recommending technology, policy, governance, and training changes after security incidents===&lt;br /&gt;
After all these actions, the SCIRT must contribute to the development&lt;br /&gt;
of better policies, practices and has to recommend improvements. They&lt;br /&gt;
are not working in the vacuum and their work has to create new and&lt;br /&gt;
better standards for cyber security. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;Exabeam, &amp;quot;CSIRT&amp;quot;. Available: https://www.exabeam.com/incident-response/csirt/ [Accessed 28 APr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==CERT==&lt;br /&gt;
The term “computer emergency response team” was coined in 1988. In&lt;br /&gt;
response to the Morris worm attack that impacted thousands of servers on&lt;br /&gt;
the Internet, DARPA funded the formation of the Computer Emergency&lt;br /&gt;
Response Team Coordination Center (CERT-CC) at Carnegie Mellon&lt;br /&gt;
University. The goal of CERT-CC was to help protect the internet by&lt;br /&gt;
collecting and disseminating information on critical security&lt;br /&gt;
vulnerabilities. Several other countries formed similar centers using&lt;br /&gt;
the same acronym (despite threats of legal action by Carnegie Mellon for&lt;br /&gt;
trademark infringement). Now the term CERT refers to any emergency&lt;br /&gt;
response team that deals with cyber threats. Many people use CERT-CC&lt;br /&gt;
interchangeably with CSIRT, though the charter of a CERT is information&lt;br /&gt;
sharing in order to help other response teams respond to threats against&lt;br /&gt;
their own infrastructure. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In general, the designation of CERT is helpful in applying real-world&lt;br /&gt;
solutions to various cybersecurity problems. They may be government&lt;br /&gt;
contractors or employees of a major corporation. For example, the U.S.&lt;br /&gt;
Computer Emergency Readiness Team (US-CERT) operates under the U.S.&lt;br /&gt;
Department of Homeland Security.&lt;br /&gt;
&amp;lt;ref name=&amp;quot;techopedia&amp;quot;&amp;gt;Techopedia, &amp;quot;Computer Emergency Response Team (CERT)&amp;quot;. Available: https://www.techopedia.com/definition/31003/computer-emergency-response-team-cert. [Accessed 25 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In Estonia CERT is designated as CERT-EE. It was established in 2006,&lt;br /&gt;
as an organization responsible for the management of security incidents&lt;br /&gt;
in .ee computer networks. It is also a national contact point for&lt;br /&gt;
international co-operation in the field of IT security. &amp;lt;ref name=&amp;quot;ria&amp;quot;&amp;gt;Information System Autority, &amp;quot;CERT-EE&amp;quot;. Available: hhttps://www.ria.ee/en/cyber-security/cert-ee.html [Accessed 25 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Difference between SOC/CSIRT/CERT==&lt;br /&gt;
[[File:analystimage3.png|300px|thumb|SOC/CSIRT/CERT &amp;lt;ref name=&amp;quot;exabeam&amp;gt;&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
How CSIRTs differ from CERTs and SOCs. There are overlapping&lt;br /&gt;
responsibilities between a community emergency response team (CERT),&lt;br /&gt;
computer security incident response team (CSIRT), and security&lt;br /&gt;
operations center (SOC). To add to this confusion, frequently, the terms&lt;br /&gt;
CERT and CSIRT are used interchangeably, despite the important&lt;br /&gt;
differences. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Understand the primary roles and characteristics of a CERT, CSIRT, and SOC.==&lt;br /&gt;
[[File:analystimage4.png|600px|thumb|Primary Roles of CERT, CSIRT, and SOC&amp;lt;ref name=&amp;quot;exabeam&amp;gt;&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&amp;lt;p&amp;gt;So, using strict definitions, a CERT collects and disseminates&lt;br /&gt;
security information, typically for the benefit of a country or an&lt;br /&gt;
industry. A CSIRT is a cross-functional team that responds to incidents&lt;br /&gt;
on behalf of a country or an organization. A SOC is where a country or&lt;br /&gt;
organization monitors and defends its network, servers, applications,&lt;br /&gt;
and endpoints. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Future==&lt;br /&gt;
&amp;lt;p&amp;gt;And the Cyber security problem is only getting bigger. According to a&lt;br /&gt;
report published by Accenture, the number of cyber security breaches&lt;br /&gt;
increased by 11 percent from 2017 to 2018. The cost of such breaches is&lt;br /&gt;
astronomical–about $600 billion worldwide, according to the Economic&lt;br /&gt;
Impact of Cybercrime report.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Job projections for cybersecurity are staggering. The Bureau of Labor&lt;br /&gt;
Statistics in US predicts that careers in the cybersecurity field will&lt;br /&gt;
grow by 32% by 2028. That makes cybersecurity one of the top 10&lt;br /&gt;
fastest-growing jobs in the country. In the United States alone, jobs&lt;br /&gt;
for Information Security Analysts are expected to grow by 15% by&lt;br /&gt;
2024.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Most likely this trend is also similar in other countries.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When checking Estonian job portals, there is a constant need for&lt;br /&gt;
people for cyber security related positions. Also, linkedin search gives&lt;br /&gt;
approximately 30 vacancies immediately. There are banks, logistics&lt;br /&gt;
companies, e-shops, and software producers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://ee.linkedin.com/jobs/cyber-security-jobs?countryRedirected=1&amp;amp;amp;position=1&amp;amp;amp;pageNum=0&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Trends that affect companies create need for constant cyber security&lt;br /&gt;
services. Increasing number of home/remote offices require secure&lt;br /&gt;
corporate networks and security of remote devices. One example is from&lt;br /&gt;
this year, when sloppy remote desktop set-up paralyzed systems of 17&lt;br /&gt;
companies.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.aripaev.ee/uudised/2022/04/20/ria-lohakas-kaugtoolaua-seadistus-halvas-martsis-vahemalt-17-juhul-ettevotete-it-susteemid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Also, no service can exists without robust infrastructure - servers,&lt;br /&gt;
databases, applications. As all previously mentioned devices and&lt;br /&gt;
services are at constant scanning and surveillance. So, the breach&lt;br /&gt;
detection and immediate action demands 24/7 services. Even if lot of&lt;br /&gt;
things could be automated, there is a need for human specialists (at&lt;br /&gt;
least, at the moment). Third growing field is also a forensic&lt;br /&gt;
investigation, as every attack must be investigated in order to be ready&lt;br /&gt;
to repel next attacks. So data recovery and evidence collection is&lt;br /&gt;
another important field of work that need skilled and professional&lt;br /&gt;
workers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Even, if the specifics of the entity, be it CSIRT, CERT or SOC, are&lt;br /&gt;
different, the fundamentals of the work are the same. Professional&lt;br /&gt;
knowledge of the networks, operational systems, hardware, scripting, and&lt;br /&gt;
several other wider IT related knowledge is needed. As there is no&lt;br /&gt;
single way to reach to it, every single person can find one’s strongest&lt;br /&gt;
sides and develop them with knowledge of weaker side, in order to know,&lt;br /&gt;
when to as for help.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/body&amp;gt;&lt;br /&gt;
&amp;lt;/html&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mavald</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142275</id>
		<title>Hiring a Cyber Security Incident Analyst</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142275"/>
		<updated>2022-05-01T16:09:07Z</updated>

		<summary type="html">&lt;p&gt;Mavald: /* Creating and maintaining an incident response plan (IRP) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==A Cyber Security Incident Analyst==&lt;br /&gt;
&lt;br /&gt;
[[File:image1.png|600px|thumb|Job advertisement &amp;lt;ref&amp;gt;&amp;quot;Job Advertisement&amp;quot;. Available at https://www.projectpeople.com/jobs/&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
===Cyber security incident analyst in SOC/CSIRT/CERT===&lt;br /&gt;
This article delves into the job title of Cyber Security Incident&lt;br /&gt;
Analyst and provides an overview of the acronyms SOC/CSIRT/CERT. A brief&lt;br /&gt;
history of the job is discussed here, as well as a possible career path,&lt;br /&gt;
education, experience, and other characteristics required for work in&lt;br /&gt;
computer security-related organizations. The article also provides a&lt;br /&gt;
brief history of SOC/CSIRT/CERT, as well as a comparison of their&lt;br /&gt;
differences and similarities.&lt;br /&gt;
===Cyber Security Incident Analyst Skill Set===&lt;br /&gt;
What skill set is expected from the Cyber Security Incident Analyst? Below written lines are taken from the same job advertisement depicted&lt;br /&gt;
on the left side of this article:&lt;br /&gt;
As a Security Incident Analyst your responsibilities will include:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Continuous monitoring of security tooling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Performing regular and ad-hoc vulnerability assessments&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Carrying out ‘spot checks’&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Reporting vulnerabilities to the PVG via the alerts system&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintaining and documenting logging systems&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Developing centralized logging, reporting and intelligence&lt;br /&gt;
platforms&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;‘Light touch’ penetration testing with open source tooling&lt;br /&gt;
(Metasploit)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Knowledge &amp;amp;amp; Experience required:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;SOC, CSIRT or CERT operational environment experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Windows / Linux experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TCP /IP networking protocol knowledge&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience reviewing and analyzing Security Events from various&lt;br /&gt;
monitoring and logging sources&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience in website and web application security assessment or&lt;br /&gt;
penetration testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience of using Metasploit&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Scripting knowledge using BASH, Python, Perl, Ruby&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Skills in Host and Network Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
As one can see the description of the duties is wide and also the&lt;br /&gt;
knowledge and experience that is required is noteworthy. So, where to&lt;br /&gt;
start to find out the way to get this kind of knowledge and&lt;br /&gt;
expertize.&lt;br /&gt;
===Possible career path===&lt;br /&gt;
Next part of the paper is aiming to depict a possible ways, how to&lt;br /&gt;
develop oneself, and move along the career pathway in cybersecurity&lt;br /&gt;
field. Topics of development, education, experience and certification&lt;br /&gt;
are covered.&lt;br /&gt;
[[File:analystimage2.png|1000px|thumb|Career path &amp;lt;ref&amp;gt;&amp;quot;Possible Career Path&amp;quot;. Available at https://www.cyberseek.org/pathway.html&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
===Junior/Senior===&lt;br /&gt;
Start with an entry-level job in IT. Hands-on experience is often the&lt;br /&gt;
most effective way to prepare for certification exams. Start&lt;br /&gt;
accumulating work experience with an entry-level role as a cybersecurity&lt;br /&gt;
analyst. Many cybersecurity professionals start off in more general IT&lt;br /&gt;
roles. The skills, practices, and technologies you’ll use as a&lt;br /&gt;
cybersecurity professional will continue to evolve along with computer&lt;br /&gt;
and network technology. The desire to learn, ability to problem solve,&lt;br /&gt;
and attention to detail will serve you well in this field. Other, more&lt;br /&gt;
technical skills and technologies to learn include:&amp;lt;ref name=&amp;quot;certification&amp;quot;&amp;gt;Popular Cyber Security Certificates [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications  [Accessed 25 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====SIEM tools (security information and event management)====&lt;br /&gt;
Security Information and Event Management (SIEM) is a set of tools&lt;br /&gt;
and services offering a holistic view of an organization’s information&lt;br /&gt;
security. SIEM works by combining two technologies:&lt;br /&gt;
&amp;lt;li&amp;gt;Security information management (SIM), which collects data from log&lt;br /&gt;
files for analysis and reports on security threats and events, and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;security event management (SEM), which conducts real-time system&lt;br /&gt;
monitoring, notifies network admins about important issues and&lt;br /&gt;
establishes correlations between security events. There are a number of&lt;br /&gt;
security information and event management solutions on the market.&lt;br /&gt;
ArcSight ESM, IBM QRadar and Splunk are among the most popular. &amp;lt;ref name=&amp;quot;SIEM&amp;quot;&amp;gt;Application security, SIEM [Online]. Available: https://www.imperva.com/learn/application-security/siem/. [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Firewalls, Intrusion Detection Systems (IDS), and Intrusion Prevention Systems(IPS)====&lt;br /&gt;
Firewalls can be two types, hardware and software firewalls. Software&lt;br /&gt;
firewall is a firewall that is installed on a computer or server, and&lt;br /&gt;
tasked with network security. It works with a wide variety of other&lt;br /&gt;
technology security solutions to provide more robust and cohesive&lt;br /&gt;
security for enterprises of all sizes. When a software firewall is&lt;br /&gt;
installed on a server, it opens up like an umbrella of protection over&lt;br /&gt;
all other computers connected to the network. It is able to monitor both&lt;br /&gt;
incoming and outgoing traffic for potential risk or suspicious user&lt;br /&gt;
behavior, and also makes setting security policies much easier, faster&lt;br /&gt;
and more flexible. Hardware firewall is positioned between the network&lt;br /&gt;
and devices, allowing traffic to funnel through the firewall for a close&lt;br /&gt;
inspection and analysis. A hardware firewall, a term often&lt;br /&gt;
interchangeable with network or next-generation firewall, protects the&lt;br /&gt;
network gateways for an enterprise. Hardware firewall is physical&lt;br /&gt;
hardware, installed between network elements and connected devices, and&lt;br /&gt;
is tasked with filtering traffic for cyber threat to the network or&lt;br /&gt;
devices. Filtering out unauthorized or suspicious users based on traffic&lt;br /&gt;
analysis is one of the biggest benefits of hardware firewall. &amp;lt;ref name=&amp;quot;sangfor&amp;quot;&amp;gt;Sangfor, &amp;quot;What is Software Firewall? Difference between Hardware Firewall and Software Firewall, [Online]. Available: https://www.sangfor.com/blog/cybersecurity/what-is-software-firewall-difference-between-hardware-firewall-and-software-firewall [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems&lt;br /&gt;
(IPS) are both parts of the network infrastructure. IDS/IPS compare&lt;br /&gt;
network packets to a cyberthreat database containing known signatures of&lt;br /&gt;
cyberattacks — and flag any matching packets. IDS doesn’t alter the&lt;br /&gt;
network packets in any way, whereas IPS prevents the packet from&lt;br /&gt;
delivery based on the contents of the packet, much like how a firewall&lt;br /&gt;
prevents traffic by IP address. &amp;lt;ref name=&amp;quot;Varonis&amp;quot;&amp;gt;Varonis, &amp;quot;What is Software Firewall? IDS vs. IPS: What is the Difference?, [Online]. Available: https://www.varonis.com/blog/ids-vs-ips [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Digital forensics====&lt;br /&gt;
Digital forensics is a branch of forensic science that focuses on&lt;br /&gt;
identifying, acquiring, processing, analyzing, and reporting on data&lt;br /&gt;
stored electronically. Electronic evidence is a component of almost all&lt;br /&gt;
criminal activities and digital forensics support is crucial for law&lt;br /&gt;
enforcement investigations. Electronic evidence can be collected from a&lt;br /&gt;
wide array of sources, such as computers, smartphones, remote storage,&lt;br /&gt;
unmanned aerial systems, shipborne equipment, and more.&amp;lt;ref name=&amp;quot;interpol&amp;quot;&amp;gt;Interpol, &amp;quot;Digital forensics&amp;quot;. Available: https://www.interpol.int/How-we-work/Innovation/Digital-forensics. [Accessed 28 4 2022].&amp;lt;/ref&amp;gt; &lt;br /&gt;
Investigative process of digital forensics can be divided into several stages. There are four major stages: preservation, collection,&lt;br /&gt;
examination, and analysis. All these four stages need a deep understanding of computers, technology across a broad spectrum, and cybersecurity principles and&lt;br /&gt;
practices, a working knowledge of computers, networks, and coding, in-depth investigative abilities, critical-thinking skills and analytical talent the ability to effectively communicate and work with a&lt;br /&gt;
wide range of people. &amp;lt;ref name=&amp;quot;ecpi&amp;quot;&amp;gt;&amp;quot;Digital forensics&amp;quot;. Available: https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me. [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Mobile device management====&lt;br /&gt;
Mobile device management (MDM) is software that allows IT&lt;br /&gt;
administrators to control, secure and enforce policies on smartphones,&lt;br /&gt;
tablets and other endpoints. Mobile device management software emerged&lt;br /&gt;
in the early 2000s as a way to control and secure the personal digital&lt;br /&gt;
assistants and smartphones that business workers began to use. The&lt;br /&gt;
consumer smartphone boom that started with the launch of the Apple&lt;br /&gt;
iPhone in 2007 led to the bring your own device (BYOD) trend, which&lt;br /&gt;
fueled further interest in MDM.&amp;lt;ref name=&amp;quot;techtarget&amp;quot;&amp;gt;Techtarget, &amp;quot;Mobile Device Management&amp;quot;. Available: https://www.techtarget.com/searchmobilecomputing/definition/mobile-device-management [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Data management====&lt;br /&gt;
Sometimes the data management is neglected, but this part has a&lt;br /&gt;
crucial role when learning for good cyber security practices. Majority&lt;br /&gt;
of cyber security programs include a special courses on data management.&lt;br /&gt;
Data management is a method of organizing and maintaining data processes&lt;br /&gt;
that are required in almost every business operations. The benefits of&lt;br /&gt;
data management can be found accounting, statistics, logistics planning&lt;br /&gt;
and other disciplines including corporate computing.&amp;lt;ref name=&amp;quot;GlobalUni&amp;quot;&amp;gt;Global Universities, &amp;quot;MSc Data Management and Cyber Security&amp;quot;. Available: https://globaluniversities.in/msc-data-management-cyber-security. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Data governance (and management) play a fundamental role in&lt;br /&gt;
protecting an organization’s data. Ensuring that the right people have&lt;br /&gt;
the right access and that appropriate security controls are in place to&lt;br /&gt;
protect each system or service, based on the criticality or sensitivity&lt;br /&gt;
of the data sets these contain. &amp;lt;ref name=&amp;quot;CyberMagazine&amp;quot;&amp;gt;Cyber Security Magazine, &amp;quot;The Role of Data Governance in Cybersecurity&amp;quot;. Available: https://cybersecurity-magazine.com/the-role-of-data-governance-in-cybersecurity/?utm_source=rss&amp;amp;amp;utm_medium=rss&amp;amp;amp;utm_campaign=the-role-of-data-governance-in-cybersecurity. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Application security development====&lt;br /&gt;
Application security describes security measures at the application&lt;br /&gt;
level that aim to prevent data or code within the app from being stolen&lt;br /&gt;
or hijacked. It encompasses the security considerations that happen&lt;br /&gt;
during application development and design, but it also involves systems&lt;br /&gt;
and approaches to protect apps after they get deployed. Application&lt;br /&gt;
security may include hardware, software, and procedures that identify or&lt;br /&gt;
minimize security vulnerabilities.&amp;lt;ref name=&amp;quot;vmware&amp;quot;&amp;gt;VmWare, &amp;quot;What is application security?&amp;quot;. Available: https://www.vmware.com/topics/glossary/content/application-security.html [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Application security development is important to ensure that your&lt;br /&gt;
application is free from coding errors and bugs. And controls the risk&lt;br /&gt;
and helps safeguard against security vulnerabilities. Application&lt;br /&gt;
security development is the process of making applications more secure&lt;br /&gt;
by finding and fixing security vulnerabilities. This is often done by&lt;br /&gt;
enforcing software security best practices and using application&lt;br /&gt;
security testing tools. &lt;br /&gt;
&amp;lt;ref name=&amp;quot;perforce&amp;quot;&amp;gt;Perforce, &amp;quot;Application Security Development Best Practices&amp;quot;. Available: https://www.perforce.com/blog/kw/application-security-development-best-practices. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Audit and compliance knowledge====&lt;br /&gt;
A cyber security audit is designed to be a comprehensive review and&lt;br /&gt;
analysis of your business’s IT infrastructure. It identifies threats and&lt;br /&gt;
vulnerabilities, exposing weaknesses and high-risk practices.&lt;br /&gt;
Regulations such as the EU GDPR (General Data Protection Regulation) can&lt;br /&gt;
impose hefty penalties in the event of a breach that results in&lt;br /&gt;
exploited data. A cyber security audit will help mitigate the&lt;br /&gt;
consequences of a breach and demonstrate that your organization has&lt;br /&gt;
taken the necessary steps to protect client and company data. &amp;lt;ref name=&amp;quot;cyforsecure&amp;quot;&amp;gt;Cyfor Secure, &amp;quot;What is a Cyber Security Audit and how can it help your organisation?&amp;quot;. Available: https://cyforsecure.co.uk/services/cyber-assessment/cyber-security-audit/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cybersecurity compliance is the organizational risk management method&lt;br /&gt;
aligned with pre-defined security measures &amp;amp;amp; controls on how data&lt;br /&gt;
confidentiality is ensured by its administrative procedures.&amp;lt;ref name=&amp;quot;nordlayer&amp;quot;&amp;gt;NordLayer, &amp;quot;Cybersecurity compliance: Everything you need to know&amp;quot;. Available: https://nordlayer.com/blog/cybersecurity-compliance-everything-you-need-to-know/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
All needed skills are developed through courses and certification.&lt;br /&gt;
&lt;br /&gt;
===Entry-Level Incident Response Positions===&lt;br /&gt;
It is not always possible to advance to the position of incident&lt;br /&gt;
responder in a straight line. Many professionals advance from entry- to&lt;br /&gt;
mid-level positions before becoming a real incident responder or a&lt;br /&gt;
member of a computer emergency response team (CERT).&amp;lt;br /&amp;gt;&lt;br /&gt;
These are some examples: &amp;lt;ref name=&amp;quot;Infosec&amp;quot;&amp;gt;Infosec, &amp;quot;Incident Responder Career Roadmap: From Entry Level to Executive&amp;quot;. Available: https://resources.infosecinstitute.com/topic/incident-responder-career-roadmap-entry-level-executive/ [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;network-administrator&amp;quot;&amp;gt;Network administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;This position’s experience will help potential incident responders&lt;br /&gt;
develop networking skills. Attention to detail, as well as the ability&lt;br /&gt;
to sift through system configurations, site layouts, and general network&lt;br /&gt;
and communication setups, are essential in this field.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;system-administrator&amp;quot;&amp;gt;System administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Another crucial beginning point for an incident responder is to learn&lt;br /&gt;
how to manage resources inside your organization as well as user&lt;br /&gt;
behavior. Understanding the potential damage that users, inadequate&lt;br /&gt;
security setups, and ineffective IT policies and procedures can cause on&lt;br /&gt;
your network can provide prospective candidates with insight into the&lt;br /&gt;
human component of an incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;security-administrator&amp;quot;&amp;gt;Security administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In such a position, basic hacking skills, penetration testing, and&lt;br /&gt;
intrusion detection are all learned, which are crucial incident&lt;br /&gt;
responder skills when trying to replicate a breach or attack.&lt;br /&gt;
Understanding the paths a cybercriminal will take when attempting to&lt;br /&gt;
damage or obtain access to a system can greatly simplify the work of&lt;br /&gt;
reverse engineering the incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Mid-Level Incident Response Positions ===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5&lt;br /&gt;
id=&amp;quot;computer-security-incident-response-team-csirt-engineer&amp;quot;&amp;gt;Computer&lt;br /&gt;
security incident response team (CSIRT) engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;cyber-incident-responder&amp;quot;&amp;gt;Cyber incident responder&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-response-engineer&amp;quot;&amp;gt;Incident response&lt;br /&gt;
engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;While each of these positions is different, they generally require&lt;br /&gt;
very similar skills and characteristics in a candidate. At this level,&lt;br /&gt;
personal characteristics such as problem solving, time management, and&lt;br /&gt;
even presentation skills become more crucial as one’s career evolves&lt;br /&gt;
into a management-facing role.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Technical skills include the ability to identify and minimize threats&lt;br /&gt;
while maintaining communication with management and the rest of your&lt;br /&gt;
team. Data analysis and evidence gathering become increasingly crucial,&lt;br /&gt;
and the circumstances in which your services are deployed get more&lt;br /&gt;
serious.&amp;lt;/p&amp;gt;&lt;br /&gt;
Problem-solving skills are crucial at this level of incident&lt;br /&gt;
response, and as the stakes rise, so does the pressure in each&lt;br /&gt;
situation. At this level, programming abilities are essential since&lt;br /&gt;
incident responders may be needed to reverse engineer malicious code or&lt;br /&gt;
even create patches for vulnerable network applications or services. &amp;lt;ref name=&amp;quot;coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated]&amp;quot;. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Senior-Level Incident Response Positions===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;intrusion-detection-specialist&amp;quot;&amp;gt;Intrusion detection&lt;br /&gt;
specialist:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;A CISSP certification might help a potential candidate in preparing&lt;br /&gt;
for the profession. The role of an intrusion detection specialist is to&lt;br /&gt;
find and stop any unwanted communications.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-manager&amp;quot;&amp;gt;Incident manager:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Expected to plan, oversee, manage, and supervise all incident&lt;br /&gt;
response team actions. Is in charge of reporting all current events to&lt;br /&gt;
senior management and stakeholders, as well as acting as the technical&lt;br /&gt;
lead on active incidents for incident responders. Prepares threat and&lt;br /&gt;
impact assessments and reports them known to management.&amp;lt;ref name=&amp;quot;coursera&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Certificates== &lt;br /&gt;
There is a vast number of different certificates and the road map to&lt;br /&gt;
being a certified professional could be very different&amp;lt;ref name=&amp;quot;Coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated],&amp;quot; [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;NICCS&amp;quot;&amp;gt;NICCS, &amp;quot;Cybersecurity Certifications,&amp;quot; [Online]. Available: hhttps://niccs.cisa.gov/about-niccs/cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt; . One possible&lt;br /&gt;
approach is to start with basic certificates from the different branches&lt;br /&gt;
of service and move to more specific and demanding focused&lt;br /&gt;
certification. Also, some jobs require certain clearances, either from&lt;br /&gt;
industry, or from the government. One small selection of different&lt;br /&gt;
possible certificates is brought out in following paragraphs.&lt;br /&gt;
&lt;br /&gt;
Security+ is a CompTIA certification that is considered a basic cert&lt;br /&gt;
among cybersecurity professionals. It covers the topics of risk&lt;br /&gt;
management and threat assessment.&lt;br /&gt;
Network+ is also offered by CompTIA this certification (like the name&lt;br /&gt;
implies) focuses on networking infrastructure and operations. It is&lt;br /&gt;
considered a foundational certification.&lt;br /&gt;
The Certified Information Systems Security Professional (CISSP) is a&lt;br /&gt;
more advanced certification designed for cybersecurity professionals&lt;br /&gt;
with at least five years of work experience. The certification covers&lt;br /&gt;
topics such as architecture, engineering, and management.&amp;lt;/p&amp;gt;&lt;br /&gt;
The Certified Ethical Hacker (CEH) certification is also considered a&lt;br /&gt;
more advanced cert because it generally requires that applicants have&lt;br /&gt;
multiple years of work experience. The goal of an ethical hacker&lt;br /&gt;
certification is to be able to understand how cyber attacks unfold in&lt;br /&gt;
order to improve threat assessment and mitigation skills.&amp;lt;ref name=&amp;quot;cyberguide&amp;quot;&amp;gt;Cybersecurity Guide, &amp;quot;How to become a cybersecurity specialist&amp;quot;, [Online]. Available: https://cybersecurityguide.org/careers/security-specialist/. [Accessed 27 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
This is definitely not all, when one looks for more information, following link could be searched, to get more in depth knowledge about&lt;br /&gt;
different possibilities.&lt;br /&gt;
 &lt;br /&gt;
Hereby, with the help of this matrix a possible taxonomy of different 436 listed certificates in branches are&lt;br /&gt;
presented.&amp;lt;ref name=&amp;quot;Pauljeremy&amp;quot;&amp;gt;&amp;quot;Cybersecurity Roadmap,&amp;quot; [Online]. Available: https://pauljerimy.com/2020/10/12/scr-oct-2020-update/. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:analystimage5.png|1000px|thumb|Certificate matrix &amp;lt;ref&amp;gt;&amp;quot;Certification roadmap&amp;quot;. Available at https://pauljerimy.com/security-certification-roadmap&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
=== Communication and Network Security===&lt;br /&gt;
Communication and network security covers the ability to secure&lt;br /&gt;
communication channels and networks. Topics include secure and converges&lt;br /&gt;
protocols, wireless networks, cellular networks, hardware operations&lt;br /&gt;
(warranty and redundant power), and third-party connectivity. IP&lt;br /&gt;
networking are also included in this domain.&lt;br /&gt;
===Identity and Access Management===&lt;br /&gt;
The identity and access management domain covers the attacks that&lt;br /&gt;
target the human gateway to gain access to data. Other topics include&lt;br /&gt;
ways to identify users with rights to access the information and&lt;br /&gt;
servers. Identity and access management covers the topics of&lt;br /&gt;
applications, Single sign-on authentication, privilege escalation,&lt;br /&gt;
Kerberos, rule-based or risk-based access control, proofing and&lt;br /&gt;
establishment of identity.&lt;br /&gt;
===Security Architecture and Engineering===&lt;br /&gt;
The security architecture and engineering domain covers important&lt;br /&gt;
topics concerning security engineering plans, designs and principles,&lt;br /&gt;
Topics include assessing and mitigating information system&lt;br /&gt;
vulnerabilities, fundamental concepts of security models and security&lt;br /&gt;
architectures in critical areas like access control. Cloud systems,&lt;br /&gt;
cryptography, system infiltrations (ransomware, fault-injection and&lt;br /&gt;
more) and virtualized systems are also covered in this domain.&lt;br /&gt;
===Asset Security===&lt;br /&gt;
The Asset Security domain deals with the issues related to the&lt;br /&gt;
collection, storage, maintenance, retention and destruction of data. It&lt;br /&gt;
also covers knowledge of different roles regarding data handling (owner,&lt;br /&gt;
controller and custodian) as well as data protection methods and data&lt;br /&gt;
states. Other topics include resource provision, asset classification&lt;br /&gt;
and data lifecycle management.&lt;br /&gt;
===Security and Risk Management===&lt;br /&gt;
The security and risk management domain covers general on skills&lt;br /&gt;
related to the implementation of user awareness programs as well as&lt;br /&gt;
security procedures. Emphasis is also placed on risk management&lt;br /&gt;
concerning the acquisition of new services, hardware and software&lt;br /&gt;
(supply chain). Other skills include social engineering defense&lt;br /&gt;
mechanisms.&lt;br /&gt;
===Security Assessment and Testing===&lt;br /&gt;
The security assessment and testing domain deals with all the&lt;br /&gt;
techniques and tools used to find system vulnerabilities, weaknesses and&lt;br /&gt;
potential areas of concern not addressed by security procedures and&lt;br /&gt;
policies. Attack simulations, vulnerability assessment, compliance&lt;br /&gt;
checks, and ethical disclosure also fall under this domain.&lt;br /&gt;
===Software Security===&lt;br /&gt;
The software development security domain deals with implementing&lt;br /&gt;
software-based security protocols within environment for which the IT&lt;br /&gt;
professional is responsible. Risk analysis, vulnerability identification&lt;br /&gt;
and auditing of source codes are all covered in this subset. Additional&lt;br /&gt;
topics include software-designed security, maturity models, development&lt;br /&gt;
methodologies, open-source and third-party development security.&lt;br /&gt;
===Security operations===&lt;br /&gt;
The security operations domain covers topics ranging from&lt;br /&gt;
investigations and digital forensic to detection and intrusion&lt;br /&gt;
prevention tools, sandboxing and firewalls. Topics include user and&lt;br /&gt;
entity behavior analytics, threat intelligence (threat hunting and&lt;br /&gt;
threat feeds) log management, artifacts (mobile, computer and network),&lt;br /&gt;
machine learning and AI-based tools, penetration testing, and&lt;br /&gt;
exploitation development. These for sub-domains are lister here.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Incident Handling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Penetration Testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Exploitation&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Education==&lt;br /&gt;
[[File:Analystimage7.png|400px|thumb|Comparison degree vs Certificate &amp;lt;ref&amp;gt;&amp;quot;Comparison Table&amp;quot;. Available at https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
The entry level monitoring specialist is hired by Estonian&lt;br /&gt;
Information System Authority even if there is no formal IT education,&lt;br /&gt;
but readiness to learn and moderate knowledge of different operation&lt;br /&gt;
systems is enough to start the career. &amp;lt;ref name=&amp;quot;cv&amp;quot;&amp;gt;cv.ee, &amp;quot;SEIRESPETSIALIST - tule Eesti küberruumi valvuriks!&amp;quot;. Available: https://www.cv.ee/en/vacancy/792782/riigi-infosusteemi-amet/seirespetsialist-tule-eesti-kuberruumi-valvuriks [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Nevertheless, like most other high qualification careers jobs falling&lt;br /&gt;
under the cybersecurity specialist category require some form of formal&lt;br /&gt;
education. However, since cybersecurity specialist jobs can fall across&lt;br /&gt;
a wide spectrum of job descriptions and responsibilities, it is possible&lt;br /&gt;
to obtain a specialist job after completing many levels of different&lt;br /&gt;
computer related education.&lt;br /&gt;
&lt;br /&gt;
If one is looking for a cybersecurity related education, for example&lt;br /&gt;
in EU, 137 courses/programs could be found that relate to keyword IT or&lt;br /&gt;
cybersecurity. &amp;lt;ref name=&amp;quot;enisa&amp;quot;&amp;gt;ENISA (European Union Agency for Cybersecurity), &amp;quot;Cybersecurity Education-Cybersecurity Higher Education Database&amp;quot;. Available: https://www.enisa.europa.eu/topics/cybersecurity-education/education-map/education-courses [Accessed 26 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Also, there is a great amount of discussion, if cyber security&lt;br /&gt;
professional should have a degree or would be certification just enough.&lt;br /&gt;
One interesting table is produces by Franklin University that compares&lt;br /&gt;
benefits and/or drawbacks of each type of credential.&amp;lt;ref name=&amp;quot;franklin&amp;quot;&amp;gt;Franklin University, &amp;quot;Is Getting a Master&#039;s Degree in Cyber Security Worth It?&amp;quot;. Available: https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Certifications are generally good for people with little practical&lt;br /&gt;
experience because they are known quantities in the industry and can&lt;br /&gt;
help you get your foot in the door. They set a minimum knowledge bar.&lt;br /&gt;
But some certifications are viewed more favorably than others.&lt;br /&gt;
Certifications with renewal requirements are viewed better by hiring&lt;br /&gt;
managers, but they also more costly in the long run because of the need&lt;br /&gt;
for continuing education. Certifications are also good for showing&lt;br /&gt;
in-depth expertise in a specialization within cybersecurity. Depending&lt;br /&gt;
on your career goals, it may be advantageous to have a master’s&lt;br /&gt;
degree—which shows your breadth of knowledge, critical thinking and&lt;br /&gt;
leadership skills—and a certificate—which shows specific skill&lt;br /&gt;
competency.&amp;lt;ref name=&amp;quot;franklin&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
As IT (Cyber) Security is still a relatively young discipline,&lt;br /&gt;
universities and colleges are still figuring out which is the best&lt;br /&gt;
approach for their degrees. Study programmes and curricula in Cyber&lt;br /&gt;
Security are different. In general, here are the duration of Cyber&lt;br /&gt;
Security degrees:&lt;br /&gt;
&amp;lt;ref name=&amp;quot;studyportal&amp;quot;&amp;gt;Studyportals, &amp;quot;Why You Should Study a Cyber Security Degree in 2022&amp;quot;. Available: https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Bachelor’s degrees in Cyber Security take 3 or 4 years in most&lt;br /&gt;
countries.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Master’s courses in Cyber Security take between 1-2 years to&lt;br /&gt;
complete.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;PhD programmes in Cyber Security last 3-5 years. Some only take 1&lt;br /&gt;
or 2 years, but they are less common.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Generalization could me made that on bachelor level the general&lt;br /&gt;
knowledge about the cyber issues are obtained. On master level the&lt;br /&gt;
specialization courses are taken and the person can choose more specific&lt;br /&gt;
topics to study. It is on master level where strengths of the cyber&lt;br /&gt;
specialist can be developed further and up-do date knowledge obtained in&lt;br /&gt;
specifics. PhD is serious science and involves teaching, lot of&lt;br /&gt;
scientific work and writing for publications.&lt;br /&gt;
&lt;br /&gt;
==Salary==&lt;br /&gt;
&amp;lt;p&amp;gt;Even if the salary can be very different, compared to the skills and&lt;br /&gt;
experience, an generalization can be made. Cyber Security professionals&lt;br /&gt;
in CSIRT, and in other entities earn quite well, from the start. First,&lt;br /&gt;
some comparison from the United States. The average CSIRT analyst salary&lt;br /&gt;
in the USA is $97,500 per year or $50 per hour. Entry level positions&lt;br /&gt;
start at $48,875 per year while most experienced workers make up to&lt;br /&gt;
$135,373 per year.&amp;lt;ref name=&amp;quot;talent&amp;quot;&amp;gt;talent.com, &amp;quot;Csirt Analyst average salary in USA 2022&amp;quot;. Available: https://www.talent.com/salary?job=csirt+analyst [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There are multiple positions you can occupy in this field. They have&lt;br /&gt;
in common great salaries and high demand for technical skills, attention&lt;br /&gt;
to details, problem-solving mentality, and the ability to analyze risks.&lt;br /&gt;
Here are the average annual salaries in the United States, according to&lt;br /&gt;
Payscale: &amp;lt;ref name=&amp;quot;studyportal&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Cryptographer – 100,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Information Security Officer – 91,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Assessor – 90,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Engineer – 88,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Penetration Tester – 81,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Forensics Expert – 71,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Administrator – 65,000 USD&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
When looking into salaries in Estonia, one can find that there is a&lt;br /&gt;
discussion that private sector is taking a toll from the public sector,&lt;br /&gt;
and that the salaries in important agencies, as Information System&lt;br /&gt;
Authority loose their employees to the better paid positions in private&lt;br /&gt;
sector.&amp;lt;ref name=&amp;quot;digigeenius&amp;quot;&amp;gt;DiGi Geenius, &amp;quot;Kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad&amp;quot;. Available: https://digi.geenius.ee/rubriik/uudis/kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad/ [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;tehnika&amp;quot;&amp;gt;Postimees, &amp;quot;Riigi-it-tootajate-palgamaarad-kasvasid&amp;quot;. Available: https://tehnika.postimees.ee/6887428/riigi-it-tootajate-palgamaarad-kasvasid [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
But there is also a different view that average private sector worker&lt;br /&gt;
could be hired as a top specialist in public sector and then the payment&lt;br /&gt;
is higher. Nevertheless, it seems that the average payment in cyber&lt;br /&gt;
security sector is any way higher that in other parts of the&lt;br /&gt;
e-services. &amp;lt;ref name=&amp;quot;digigeenius2&amp;quot;&amp;gt;DiGi Geenius, &amp;quot;5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka&amp;quot;. Available: https://digi.geenius.ee/rubriik/uudis/5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==SOC==&lt;br /&gt;
&amp;lt;p&amp;gt;A SOC is a facility where an organization’s network, applications,&lt;br /&gt;
and endpoints are monitored and defended. The term was adapted from&lt;br /&gt;
network operations centers (NOCs), where large telecommunication or&lt;br /&gt;
corporate networks are monitored. When network security became more of a&lt;br /&gt;
concern, security teams were formed within the NOCs, and eventually spun&lt;br /&gt;
off into larger organizations of their own as the responsibilities of&lt;br /&gt;
security teams grew increasingly complex and specialized. The security&lt;br /&gt;
staff working in a security operations center are often called the SOC&lt;br /&gt;
team.&amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;Exabeam, &amp;quot;CSIRT&amp;quot;. Available: https://www.exabeam.com/incident-response/csirt/ [Accessed 28 APr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;Functions of the SOC team include, but are not limited to:&amp;lt;ref name=&amp;quot;trellix&amp;quot;&amp;gt;Trellix, &amp;quot;What Is a Security Operations Center (SOC)?&amp;quot;. Available: https://www.trellix.com/en-us/security-awareness/operations/what-is-soc.html [Accessed 30 APr 2022].&amp;lt;/ref&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ol type=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Taking inventory of resources, to get a better understanding of the&lt;br /&gt;
structure they are protecting.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintanence of the system, by constantly making updates and adding&lt;br /&gt;
safeguards.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Monitoring the network for abnormalities with special tools.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Threat analysis of new attacks and vulnerabilities.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Responding to attacks, by acting as “first responders”. The SOC team&lt;br /&gt;
will shut down and/or isolate endpoints, deleting files and lowering the&lt;br /&gt;
impact as fast as possible.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Recovery of system stability and lost data. This may be done using&lt;br /&gt;
backups, restarting endpoints or reconfiguring systems.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Logging all actions on the system, to be later used for analysis or&lt;br /&gt;
forensics after an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigating the root cause of an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Auditing their own actions, to be in line with regulations of the&lt;br /&gt;
organization, industry or governing body.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==CSIRT==&lt;br /&gt;
&amp;lt;p&amp;gt;A CSIRT is a group that responds to security incidents when they&lt;br /&gt;
occur. Key responsibilities of a CSIRT include:&lt;br /&gt;
&amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
===Creating and maintaining an incident response plan (IRP)===&lt;br /&gt;
An incident response plan (IRP) is a set of written instructions for&lt;br /&gt;
detecting, responding to and limiting the effects of an information&lt;br /&gt;
security event. Incident response plans provide instructions for&lt;br /&gt;
responding to many potential scenarios, including data breaches, denial&lt;br /&gt;
of service/distributed denial of service attacks, firewall breaches,&lt;br /&gt;
virus or malware outbreaks or insider threats. Without an incident&lt;br /&gt;
response plan in place, organizations may either not detect the attack&lt;br /&gt;
in the first place, or not follow proper protocol to contain the threat&lt;br /&gt;
and recover from it when a breach is detected.&lt;br /&gt;
&amp;lt;ref name=&amp;quot;stratacore&amp;quot;&amp;gt;Stratacore, &amp;quot;Incident Response Plan (IRP)&amp;quot;. https://www.stratacore.com/incidentresponseplan [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Investigating and analyzing incidents===&lt;br /&gt;
CSIRTs are also involved in improvement activities. After major&lt;br /&gt;
computer security incidents occur, or when incidents are not handled in&lt;br /&gt;
a timely or effective manner, a CSIRT will generally perform a&lt;br /&gt;
postmortem of the incident and its response. This postmortem will&lt;br /&gt;
identify the strengths and weakness of the response effort. Such reviews&lt;br /&gt;
can identify weaknesses and holes in systems, infrastructure defenses,&lt;br /&gt;
or policies that allowed the incident to take place. It can also&lt;br /&gt;
identify problems with communication channels, interfaces, and&lt;br /&gt;
procedures that inhibited the efficient resolution of the reported&lt;br /&gt;
problem.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.cisa.gov/uscert/bsi/articles/best-practices/incident-management/defining-computer-security-incident-response-teams&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Managing internal communications and updates during or immediately after incidents occur===&lt;br /&gt;
===Communicating with employees, shareholders, customers, and the press about incidents as needed===&lt;br /&gt;
&amp;lt;p&amp;gt;There are various services within the CSIRT Services Framework that&lt;br /&gt;
address communications, as they relate to security operations and&lt;br /&gt;
incident response services. Some of these include Information Security&lt;br /&gt;
Incident Coordination, Crisis Management Support, Vulnerability&lt;br /&gt;
Disclosure, Situational Awareness Communication, and Awareness Building,&lt;br /&gt;
to name a few. Sharing information and communicating with the general&lt;br /&gt;
public and/or your constituency is appropriate in many different&lt;br /&gt;
scenarios. These can range from proactive communications to reactive&lt;br /&gt;
communications. Each scenario may be unique, and careful consideration&lt;br /&gt;
should be given to when to release information to the public and what&lt;br /&gt;
information should be released.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;https://resources.sei.cmu.edu/asset_files/Handbook/2021_002_001_651819.pdf&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Remediating incidents===&lt;br /&gt;
Threat remediation is a strong and capable tool for fighting the&lt;br /&gt;
cyber security compromises. As the word ‘remedy’ suggests, remediation&lt;br /&gt;
process involves the treatment of a security breach. With the&lt;br /&gt;
remediation practices, your cyber security team is able to eliminate&lt;br /&gt;
suspicious activities and malicious attacks in the form of malware,&lt;br /&gt;
ransomware, phishing and such. Even if you ‘kill’ the suspicious&lt;br /&gt;
activity, the attackers can remain in your systems. If you want to&lt;br /&gt;
contaminate and end the problem for good, your remediation processes&lt;br /&gt;
must involve the detection of the cause. &amp;lt;ref name=&amp;quot;logsign&amp;quot;&amp;gt;Logsign, &amp;quot;What-is-remediation-in-cyber-security&amp;quot;. Available: https://www.logsign.com/blog/what-is-remediation-in-cyber-security/. [Accessed 28 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Recommending technology, policy, governance, and training changes after security incidents===&lt;br /&gt;
After all these actions, the SCIRT must contribute to the development&lt;br /&gt;
of better policies, practices and has to recommend improvements. They&lt;br /&gt;
are not working in the vacuum and their work has to create new and&lt;br /&gt;
better standards for cyber security. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;Exabeam, &amp;quot;CSIRT&amp;quot;. Available: https://www.exabeam.com/incident-response/csirt/ [Accessed 28 APr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==CERT==&lt;br /&gt;
The term “computer emergency response team” was coined in 1988. In&lt;br /&gt;
response to the Morris worm attack that impacted thousands of servers on&lt;br /&gt;
the Internet, DARPA funded the formation of the Computer Emergency&lt;br /&gt;
Response Team Coordination Center (CERT-CC) at Carnegie Mellon&lt;br /&gt;
University. The goal of CERT-CC was to help protect the internet by&lt;br /&gt;
collecting and disseminating information on critical security&lt;br /&gt;
vulnerabilities. Several other countries formed similar centers using&lt;br /&gt;
the same acronym (despite threats of legal action by Carnegie Mellon for&lt;br /&gt;
trademark infringement). Now the term CERT refers to any emergency&lt;br /&gt;
response team that deals with cyber threats. Many people use CERT-CC&lt;br /&gt;
interchangeably with CSIRT, though the charter of a CERT is information&lt;br /&gt;
sharing in order to help other response teams respond to threats against&lt;br /&gt;
their own infrastructure. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In general, the designation of CERT is helpful in applying real-world&lt;br /&gt;
solutions to various cybersecurity problems. They may be government&lt;br /&gt;
contractors or employees of a major corporation. For example, the U.S.&lt;br /&gt;
Computer Emergency Readiness Team (US-CERT) operates under the U.S.&lt;br /&gt;
Department of Homeland Security.&lt;br /&gt;
&amp;lt;ref name=&amp;quot;techopedia&amp;quot;&amp;gt;Techopedia, &amp;quot;Computer Emergency Response Team (CERT)&amp;quot;. Available: https://www.techopedia.com/definition/31003/computer-emergency-response-team-cert. [Accessed 25 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In Estonia CERT is designated as CERT-EE. It was established in 2006,&lt;br /&gt;
as an organization responsible for the management of security incidents&lt;br /&gt;
in .ee computer networks. It is also a national contact point for&lt;br /&gt;
international co-operation in the field of IT security. &amp;lt;ref name=&amp;quot;ria&amp;quot;&amp;gt;Information System Autority, &amp;quot;CERT-EE&amp;quot;. Available: hhttps://www.ria.ee/en/cyber-security/cert-ee.html [Accessed 25 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Difference between SOC/CSIRT/CERT==&lt;br /&gt;
[[File:analystimage3.png|300px|thumb|SOC/CSIRT/CERT &amp;lt;ref name=&amp;quot;exabeam&amp;gt;&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
How CSIRTs differ from CERTs and SOCs. There are overlapping&lt;br /&gt;
responsibilities between a community emergency response team (CERT),&lt;br /&gt;
computer security incident response team (CSIRT), and security&lt;br /&gt;
operations center (SOC). To add to this confusion, frequently, the terms&lt;br /&gt;
CERT and CSIRT are used interchangeably, despite the important&lt;br /&gt;
differences. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Understand the primary roles and characteristics of a CERT, CSIRT, and SOC.==&lt;br /&gt;
[[File:analystimage4.png|600px|thumb|Primary Roles of CERT, CSIRT, and SOC&amp;lt;ref name=&amp;quot;exabeam&amp;gt;&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&amp;lt;p&amp;gt;So, using strict definitions, a CERT collects and disseminates&lt;br /&gt;
security information, typically for the benefit of a country or an&lt;br /&gt;
industry. A CSIRT is a cross-functional team that responds to incidents&lt;br /&gt;
on behalf of a country or an organization. A SOC is where a country or&lt;br /&gt;
organization monitors and defends its network, servers, applications,&lt;br /&gt;
and endpoints. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Future==&lt;br /&gt;
&amp;lt;p&amp;gt;And the Cyber security problem is only getting bigger. According to a&lt;br /&gt;
report published by Accenture, the number of cyber security breaches&lt;br /&gt;
increased by 11 percent from 2017 to 2018. The cost of such breaches is&lt;br /&gt;
astronomical–about $600 billion worldwide, according to the Economic&lt;br /&gt;
Impact of Cybercrime report.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Job projections for cybersecurity are staggering. The Bureau of Labor&lt;br /&gt;
Statistics in US predicts that careers in the cybersecurity field will&lt;br /&gt;
grow by 32% by 2028. That makes cybersecurity one of the top 10&lt;br /&gt;
fastest-growing jobs in the country. In the United States alone, jobs&lt;br /&gt;
for Information Security Analysts are expected to grow by 15% by&lt;br /&gt;
2024.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Most likely this trend is also similar in other countries.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When checking Estonian job portals, there is a constant need for&lt;br /&gt;
people for cyber security related positions. Also, linkedin search gives&lt;br /&gt;
approximately 30 vacancies immediately. There are banks, logistics&lt;br /&gt;
companies, e-shops, and software producers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://ee.linkedin.com/jobs/cyber-security-jobs?countryRedirected=1&amp;amp;amp;position=1&amp;amp;amp;pageNum=0&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Trends that affect companies create need for constant cyber security&lt;br /&gt;
services. Increasing number of home/remote offices require secure&lt;br /&gt;
corporate networks and security of remote devices. One example is from&lt;br /&gt;
this year, when sloppy remote desktop set-up paralyzed systems of 17&lt;br /&gt;
companies.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.aripaev.ee/uudised/2022/04/20/ria-lohakas-kaugtoolaua-seadistus-halvas-martsis-vahemalt-17-juhul-ettevotete-it-susteemid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Also, no service can exists without robust infrastructure - servers,&lt;br /&gt;
databases, applications. As all previously mentioned devices and&lt;br /&gt;
services are at constant scanning and surveillance. So, the breach&lt;br /&gt;
detection and immediate action demands 24/7 services. Even if lot of&lt;br /&gt;
things could be automated, there is a need for human specialists (at&lt;br /&gt;
least, at the moment). Third growing field is also a forensic&lt;br /&gt;
investigation, as every attack must be investigated in order to be ready&lt;br /&gt;
to repel next attacks. So data recovery and evidence collection is&lt;br /&gt;
another important field of work that need skilled and professional&lt;br /&gt;
workers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Even, if the specifics of the entity, be it CSIRT, CERT or SOC, are&lt;br /&gt;
different, the fundamentals of the work are the same. Professional&lt;br /&gt;
knowledge of the networks, operational systems, hardware, scripting, and&lt;br /&gt;
several other wider IT related knowledge is needed. As there is no&lt;br /&gt;
single way to reach to it, every single person can find one’s strongest&lt;br /&gt;
sides and develop them with knowledge of weaker side, in order to know,&lt;br /&gt;
when to as for help.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/body&amp;gt;&lt;br /&gt;
&amp;lt;/html&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mavald</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142269</id>
		<title>Hiring a Cyber Security Incident Analyst</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142269"/>
		<updated>2022-05-01T16:05:58Z</updated>

		<summary type="html">&lt;p&gt;Mavald: /* CERT */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==A Cyber Security Incident Analyst==&lt;br /&gt;
&lt;br /&gt;
[[File:image1.png|600px|thumb|Job advertisement &amp;lt;ref&amp;gt;&amp;quot;Job Advertisement&amp;quot;. Available at https://www.projectpeople.com/jobs/&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
===Cyber security incident analyst in SOC/CSIRT/CERT===&lt;br /&gt;
This article delves into the job title of Cyber Security Incident&lt;br /&gt;
Analyst and provides an overview of the acronyms SOC/CSIRT/CERT. A brief&lt;br /&gt;
history of the job is discussed here, as well as a possible career path,&lt;br /&gt;
education, experience, and other characteristics required for work in&lt;br /&gt;
computer security-related organizations. The article also provides a&lt;br /&gt;
brief history of SOC/CSIRT/CERT, as well as a comparison of their&lt;br /&gt;
differences and similarities.&lt;br /&gt;
===Cyber Security Incident Analyst Skill Set===&lt;br /&gt;
What skill set is expected from the Cyber Security Incident Analyst? Below written lines are taken from the same job advertisement depicted&lt;br /&gt;
on the left side of this article:&lt;br /&gt;
As a Security Incident Analyst your responsibilities will include:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Continuous monitoring of security tooling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Performing regular and ad-hoc vulnerability assessments&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Carrying out ‘spot checks’&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Reporting vulnerabilities to the PVG via the alerts system&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintaining and documenting logging systems&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Developing centralized logging, reporting and intelligence&lt;br /&gt;
platforms&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;‘Light touch’ penetration testing with open source tooling&lt;br /&gt;
(Metasploit)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Knowledge &amp;amp;amp; Experience required:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;SOC, CSIRT or CERT operational environment experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Windows / Linux experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TCP /IP networking protocol knowledge&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience reviewing and analyzing Security Events from various&lt;br /&gt;
monitoring and logging sources&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience in website and web application security assessment or&lt;br /&gt;
penetration testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience of using Metasploit&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Scripting knowledge using BASH, Python, Perl, Ruby&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Skills in Host and Network Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
As one can see the description of the duties is wide and also the&lt;br /&gt;
knowledge and experience that is required is noteworthy. So, where to&lt;br /&gt;
start to find out the way to get this kind of knowledge and&lt;br /&gt;
expertize.&lt;br /&gt;
===Possible career path===&lt;br /&gt;
Next part of the paper is aiming to depict a possible ways, how to&lt;br /&gt;
develop oneself, and move along the career pathway in cybersecurity&lt;br /&gt;
field. Topics of development, education, experience and certification&lt;br /&gt;
are covered.&lt;br /&gt;
[[File:analystimage2.png|1000px|thumb|Career path &amp;lt;ref&amp;gt;&amp;quot;Possible Career Path&amp;quot;. Available at https://www.cyberseek.org/pathway.html&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
===Junior/Senior===&lt;br /&gt;
Start with an entry-level job in IT. Hands-on experience is often the&lt;br /&gt;
most effective way to prepare for certification exams. Start&lt;br /&gt;
accumulating work experience with an entry-level role as a cybersecurity&lt;br /&gt;
analyst. Many cybersecurity professionals start off in more general IT&lt;br /&gt;
roles. The skills, practices, and technologies you’ll use as a&lt;br /&gt;
cybersecurity professional will continue to evolve along with computer&lt;br /&gt;
and network technology. The desire to learn, ability to problem solve,&lt;br /&gt;
and attention to detail will serve you well in this field. Other, more&lt;br /&gt;
technical skills and technologies to learn include:&amp;lt;ref name=&amp;quot;certification&amp;quot;&amp;gt;Popular Cyber Security Certificates [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications  [Accessed 25 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====SIEM tools (security information and event management)====&lt;br /&gt;
Security Information and Event Management (SIEM) is a set of tools&lt;br /&gt;
and services offering a holistic view of an organization’s information&lt;br /&gt;
security. SIEM works by combining two technologies:&lt;br /&gt;
&amp;lt;li&amp;gt;Security information management (SIM), which collects data from log&lt;br /&gt;
files for analysis and reports on security threats and events, and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;security event management (SEM), which conducts real-time system&lt;br /&gt;
monitoring, notifies network admins about important issues and&lt;br /&gt;
establishes correlations between security events. There are a number of&lt;br /&gt;
security information and event management solutions on the market.&lt;br /&gt;
ArcSight ESM, IBM QRadar and Splunk are among the most popular. &amp;lt;ref name=&amp;quot;SIEM&amp;quot;&amp;gt;Application security, SIEM [Online]. Available: https://www.imperva.com/learn/application-security/siem/. [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Firewalls, Intrusion Detection Systems (IDS), and Intrusion Prevention Systems(IPS)====&lt;br /&gt;
Firewalls can be two types, hardware and software firewalls. Software&lt;br /&gt;
firewall is a firewall that is installed on a computer or server, and&lt;br /&gt;
tasked with network security. It works with a wide variety of other&lt;br /&gt;
technology security solutions to provide more robust and cohesive&lt;br /&gt;
security for enterprises of all sizes. When a software firewall is&lt;br /&gt;
installed on a server, it opens up like an umbrella of protection over&lt;br /&gt;
all other computers connected to the network. It is able to monitor both&lt;br /&gt;
incoming and outgoing traffic for potential risk or suspicious user&lt;br /&gt;
behavior, and also makes setting security policies much easier, faster&lt;br /&gt;
and more flexible. Hardware firewall is positioned between the network&lt;br /&gt;
and devices, allowing traffic to funnel through the firewall for a close&lt;br /&gt;
inspection and analysis. A hardware firewall, a term often&lt;br /&gt;
interchangeable with network or next-generation firewall, protects the&lt;br /&gt;
network gateways for an enterprise. Hardware firewall is physical&lt;br /&gt;
hardware, installed between network elements and connected devices, and&lt;br /&gt;
is tasked with filtering traffic for cyber threat to the network or&lt;br /&gt;
devices. Filtering out unauthorized or suspicious users based on traffic&lt;br /&gt;
analysis is one of the biggest benefits of hardware firewall. &amp;lt;ref name=&amp;quot;sangfor&amp;quot;&amp;gt;Sangfor, &amp;quot;What is Software Firewall? Difference between Hardware Firewall and Software Firewall, [Online]. Available: https://www.sangfor.com/blog/cybersecurity/what-is-software-firewall-difference-between-hardware-firewall-and-software-firewall [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems&lt;br /&gt;
(IPS) are both parts of the network infrastructure. IDS/IPS compare&lt;br /&gt;
network packets to a cyberthreat database containing known signatures of&lt;br /&gt;
cyberattacks — and flag any matching packets. IDS doesn’t alter the&lt;br /&gt;
network packets in any way, whereas IPS prevents the packet from&lt;br /&gt;
delivery based on the contents of the packet, much like how a firewall&lt;br /&gt;
prevents traffic by IP address. &amp;lt;ref name=&amp;quot;Varonis&amp;quot;&amp;gt;Varonis, &amp;quot;What is Software Firewall? IDS vs. IPS: What is the Difference?, [Online]. Available: https://www.varonis.com/blog/ids-vs-ips [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Digital forensics====&lt;br /&gt;
Digital forensics is a branch of forensic science that focuses on&lt;br /&gt;
identifying, acquiring, processing, analyzing, and reporting on data&lt;br /&gt;
stored electronically. Electronic evidence is a component of almost all&lt;br /&gt;
criminal activities and digital forensics support is crucial for law&lt;br /&gt;
enforcement investigations. Electronic evidence can be collected from a&lt;br /&gt;
wide array of sources, such as computers, smartphones, remote storage,&lt;br /&gt;
unmanned aerial systems, shipborne equipment, and more.&amp;lt;ref name=&amp;quot;interpol&amp;quot;&amp;gt;Interpol, &amp;quot;Digital forensics&amp;quot;. Available: https://www.interpol.int/How-we-work/Innovation/Digital-forensics. [Accessed 28 4 2022].&amp;lt;/ref&amp;gt; &lt;br /&gt;
Investigative process of digital forensics can be divided into several stages. There are four major stages: preservation, collection,&lt;br /&gt;
examination, and analysis. All these four stages need a deep understanding of computers, technology across a broad spectrum, and cybersecurity principles and&lt;br /&gt;
practices, a working knowledge of computers, networks, and coding, in-depth investigative abilities, critical-thinking skills and analytical talent the ability to effectively communicate and work with a&lt;br /&gt;
wide range of people. &amp;lt;ref name=&amp;quot;ecpi&amp;quot;&amp;gt;&amp;quot;Digital forensics&amp;quot;. Available: https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me. [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Mobile device management====&lt;br /&gt;
Mobile device management (MDM) is software that allows IT&lt;br /&gt;
administrators to control, secure and enforce policies on smartphones,&lt;br /&gt;
tablets and other endpoints. Mobile device management software emerged&lt;br /&gt;
in the early 2000s as a way to control and secure the personal digital&lt;br /&gt;
assistants and smartphones that business workers began to use. The&lt;br /&gt;
consumer smartphone boom that started with the launch of the Apple&lt;br /&gt;
iPhone in 2007 led to the bring your own device (BYOD) trend, which&lt;br /&gt;
fueled further interest in MDM.&amp;lt;ref name=&amp;quot;techtarget&amp;quot;&amp;gt;Techtarget, &amp;quot;Mobile Device Management&amp;quot;. Available: https://www.techtarget.com/searchmobilecomputing/definition/mobile-device-management [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Data management====&lt;br /&gt;
Sometimes the data management is neglected, but this part has a&lt;br /&gt;
crucial role when learning for good cyber security practices. Majority&lt;br /&gt;
of cyber security programs include a special courses on data management.&lt;br /&gt;
Data management is a method of organizing and maintaining data processes&lt;br /&gt;
that are required in almost every business operations. The benefits of&lt;br /&gt;
data management can be found accounting, statistics, logistics planning&lt;br /&gt;
and other disciplines including corporate computing.&amp;lt;ref name=&amp;quot;GlobalUni&amp;quot;&amp;gt;Global Universities, &amp;quot;MSc Data Management and Cyber Security&amp;quot;. Available: https://globaluniversities.in/msc-data-management-cyber-security. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Data governance (and management) play a fundamental role in&lt;br /&gt;
protecting an organization’s data. Ensuring that the right people have&lt;br /&gt;
the right access and that appropriate security controls are in place to&lt;br /&gt;
protect each system or service, based on the criticality or sensitivity&lt;br /&gt;
of the data sets these contain. &amp;lt;ref name=&amp;quot;CyberMagazine&amp;quot;&amp;gt;Cyber Security Magazine, &amp;quot;The Role of Data Governance in Cybersecurity&amp;quot;. Available: https://cybersecurity-magazine.com/the-role-of-data-governance-in-cybersecurity/?utm_source=rss&amp;amp;amp;utm_medium=rss&amp;amp;amp;utm_campaign=the-role-of-data-governance-in-cybersecurity. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Application security development====&lt;br /&gt;
Application security describes security measures at the application&lt;br /&gt;
level that aim to prevent data or code within the app from being stolen&lt;br /&gt;
or hijacked. It encompasses the security considerations that happen&lt;br /&gt;
during application development and design, but it also involves systems&lt;br /&gt;
and approaches to protect apps after they get deployed. Application&lt;br /&gt;
security may include hardware, software, and procedures that identify or&lt;br /&gt;
minimize security vulnerabilities.&amp;lt;ref name=&amp;quot;vmware&amp;quot;&amp;gt;VmWare, &amp;quot;What is application security?&amp;quot;. Available: https://www.vmware.com/topics/glossary/content/application-security.html [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Application security development is important to ensure that your&lt;br /&gt;
application is free from coding errors and bugs. And controls the risk&lt;br /&gt;
and helps safeguard against security vulnerabilities. Application&lt;br /&gt;
security development is the process of making applications more secure&lt;br /&gt;
by finding and fixing security vulnerabilities. This is often done by&lt;br /&gt;
enforcing software security best practices and using application&lt;br /&gt;
security testing tools. &lt;br /&gt;
&amp;lt;ref name=&amp;quot;perforce&amp;quot;&amp;gt;Perforce, &amp;quot;Application Security Development Best Practices&amp;quot;. Available: https://www.perforce.com/blog/kw/application-security-development-best-practices. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Audit and compliance knowledge====&lt;br /&gt;
A cyber security audit is designed to be a comprehensive review and&lt;br /&gt;
analysis of your business’s IT infrastructure. It identifies threats and&lt;br /&gt;
vulnerabilities, exposing weaknesses and high-risk practices.&lt;br /&gt;
Regulations such as the EU GDPR (General Data Protection Regulation) can&lt;br /&gt;
impose hefty penalties in the event of a breach that results in&lt;br /&gt;
exploited data. A cyber security audit will help mitigate the&lt;br /&gt;
consequences of a breach and demonstrate that your organization has&lt;br /&gt;
taken the necessary steps to protect client and company data. &amp;lt;ref name=&amp;quot;cyforsecure&amp;quot;&amp;gt;Cyfor Secure, &amp;quot;What is a Cyber Security Audit and how can it help your organisation?&amp;quot;. Available: https://cyforsecure.co.uk/services/cyber-assessment/cyber-security-audit/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cybersecurity compliance is the organizational risk management method&lt;br /&gt;
aligned with pre-defined security measures &amp;amp;amp; controls on how data&lt;br /&gt;
confidentiality is ensured by its administrative procedures.&amp;lt;ref name=&amp;quot;nordlayer&amp;quot;&amp;gt;NordLayer, &amp;quot;Cybersecurity compliance: Everything you need to know&amp;quot;. Available: https://nordlayer.com/blog/cybersecurity-compliance-everything-you-need-to-know/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
All needed skills are developed through courses and certification.&lt;br /&gt;
&lt;br /&gt;
===Entry-Level Incident Response Positions===&lt;br /&gt;
It is not always possible to advance to the position of incident&lt;br /&gt;
responder in a straight line. Many professionals advance from entry- to&lt;br /&gt;
mid-level positions before becoming a real incident responder or a&lt;br /&gt;
member of a computer emergency response team (CERT).&amp;lt;br /&amp;gt;&lt;br /&gt;
These are some examples: &amp;lt;ref name=&amp;quot;Infosec&amp;quot;&amp;gt;Infosec, &amp;quot;Incident Responder Career Roadmap: From Entry Level to Executive&amp;quot;. Available: https://resources.infosecinstitute.com/topic/incident-responder-career-roadmap-entry-level-executive/ [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;network-administrator&amp;quot;&amp;gt;Network administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;This position’s experience will help potential incident responders&lt;br /&gt;
develop networking skills. Attention to detail, as well as the ability&lt;br /&gt;
to sift through system configurations, site layouts, and general network&lt;br /&gt;
and communication setups, are essential in this field.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;system-administrator&amp;quot;&amp;gt;System administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Another crucial beginning point for an incident responder is to learn&lt;br /&gt;
how to manage resources inside your organization as well as user&lt;br /&gt;
behavior. Understanding the potential damage that users, inadequate&lt;br /&gt;
security setups, and ineffective IT policies and procedures can cause on&lt;br /&gt;
your network can provide prospective candidates with insight into the&lt;br /&gt;
human component of an incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;security-administrator&amp;quot;&amp;gt;Security administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In such a position, basic hacking skills, penetration testing, and&lt;br /&gt;
intrusion detection are all learned, which are crucial incident&lt;br /&gt;
responder skills when trying to replicate a breach or attack.&lt;br /&gt;
Understanding the paths a cybercriminal will take when attempting to&lt;br /&gt;
damage or obtain access to a system can greatly simplify the work of&lt;br /&gt;
reverse engineering the incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Mid-Level Incident Response Positions ===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5&lt;br /&gt;
id=&amp;quot;computer-security-incident-response-team-csirt-engineer&amp;quot;&amp;gt;Computer&lt;br /&gt;
security incident response team (CSIRT) engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;cyber-incident-responder&amp;quot;&amp;gt;Cyber incident responder&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-response-engineer&amp;quot;&amp;gt;Incident response&lt;br /&gt;
engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;While each of these positions is different, they generally require&lt;br /&gt;
very similar skills and characteristics in a candidate. At this level,&lt;br /&gt;
personal characteristics such as problem solving, time management, and&lt;br /&gt;
even presentation skills become more crucial as one’s career evolves&lt;br /&gt;
into a management-facing role.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Technical skills include the ability to identify and minimize threats&lt;br /&gt;
while maintaining communication with management and the rest of your&lt;br /&gt;
team. Data analysis and evidence gathering become increasingly crucial,&lt;br /&gt;
and the circumstances in which your services are deployed get more&lt;br /&gt;
serious.&amp;lt;/p&amp;gt;&lt;br /&gt;
Problem-solving skills are crucial at this level of incident&lt;br /&gt;
response, and as the stakes rise, so does the pressure in each&lt;br /&gt;
situation. At this level, programming abilities are essential since&lt;br /&gt;
incident responders may be needed to reverse engineer malicious code or&lt;br /&gt;
even create patches for vulnerable network applications or services. &amp;lt;ref name=&amp;quot;coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated]&amp;quot;. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Senior-Level Incident Response Positions===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;intrusion-detection-specialist&amp;quot;&amp;gt;Intrusion detection&lt;br /&gt;
specialist:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;A CISSP certification might help a potential candidate in preparing&lt;br /&gt;
for the profession. The role of an intrusion detection specialist is to&lt;br /&gt;
find and stop any unwanted communications.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-manager&amp;quot;&amp;gt;Incident manager:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Expected to plan, oversee, manage, and supervise all incident&lt;br /&gt;
response team actions. Is in charge of reporting all current events to&lt;br /&gt;
senior management and stakeholders, as well as acting as the technical&lt;br /&gt;
lead on active incidents for incident responders. Prepares threat and&lt;br /&gt;
impact assessments and reports them known to management.&amp;lt;ref name=&amp;quot;coursera&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Certificates== &lt;br /&gt;
There is a vast number of different certificates and the road map to&lt;br /&gt;
being a certified professional could be very different&amp;lt;ref name=&amp;quot;Coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated],&amp;quot; [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;NICCS&amp;quot;&amp;gt;NICCS, &amp;quot;Cybersecurity Certifications,&amp;quot; [Online]. Available: hhttps://niccs.cisa.gov/about-niccs/cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt; . One possible&lt;br /&gt;
approach is to start with basic certificates from the different branches&lt;br /&gt;
of service and move to more specific and demanding focused&lt;br /&gt;
certification. Also, some jobs require certain clearances, either from&lt;br /&gt;
industry, or from the government. One small selection of different&lt;br /&gt;
possible certificates is brought out in following paragraphs.&lt;br /&gt;
&lt;br /&gt;
Security+ is a CompTIA certification that is considered a basic cert&lt;br /&gt;
among cybersecurity professionals. It covers the topics of risk&lt;br /&gt;
management and threat assessment.&lt;br /&gt;
Network+ is also offered by CompTIA this certification (like the name&lt;br /&gt;
implies) focuses on networking infrastructure and operations. It is&lt;br /&gt;
considered a foundational certification.&lt;br /&gt;
The Certified Information Systems Security Professional (CISSP) is a&lt;br /&gt;
more advanced certification designed for cybersecurity professionals&lt;br /&gt;
with at least five years of work experience. The certification covers&lt;br /&gt;
topics such as architecture, engineering, and management.&amp;lt;/p&amp;gt;&lt;br /&gt;
The Certified Ethical Hacker (CEH) certification is also considered a&lt;br /&gt;
more advanced cert because it generally requires that applicants have&lt;br /&gt;
multiple years of work experience. The goal of an ethical hacker&lt;br /&gt;
certification is to be able to understand how cyber attacks unfold in&lt;br /&gt;
order to improve threat assessment and mitigation skills.&amp;lt;ref name=&amp;quot;cyberguide&amp;quot;&amp;gt;Cybersecurity Guide, &amp;quot;How to become a cybersecurity specialist&amp;quot;, [Online]. Available: https://cybersecurityguide.org/careers/security-specialist/. [Accessed 27 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
This is definitely not all, when one looks for more information, following link could be searched, to get more in depth knowledge about&lt;br /&gt;
different possibilities.&lt;br /&gt;
 &lt;br /&gt;
Hereby, with the help of this matrix a possible taxonomy of different 436 listed certificates in branches are&lt;br /&gt;
presented.&amp;lt;ref name=&amp;quot;Pauljeremy&amp;quot;&amp;gt;&amp;quot;Cybersecurity Roadmap,&amp;quot; [Online]. Available: https://pauljerimy.com/2020/10/12/scr-oct-2020-update/. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:analystimage5.png|1000px|thumb|Certificate matrix &amp;lt;ref&amp;gt;&amp;quot;Certification roadmap&amp;quot;. Available at https://pauljerimy.com/security-certification-roadmap&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
=== Communication and Network Security===&lt;br /&gt;
Communication and network security covers the ability to secure&lt;br /&gt;
communication channels and networks. Topics include secure and converges&lt;br /&gt;
protocols, wireless networks, cellular networks, hardware operations&lt;br /&gt;
(warranty and redundant power), and third-party connectivity. IP&lt;br /&gt;
networking are also included in this domain.&lt;br /&gt;
===Identity and Access Management===&lt;br /&gt;
The identity and access management domain covers the attacks that&lt;br /&gt;
target the human gateway to gain access to data. Other topics include&lt;br /&gt;
ways to identify users with rights to access the information and&lt;br /&gt;
servers. Identity and access management covers the topics of&lt;br /&gt;
applications, Single sign-on authentication, privilege escalation,&lt;br /&gt;
Kerberos, rule-based or risk-based access control, proofing and&lt;br /&gt;
establishment of identity.&lt;br /&gt;
===Security Architecture and Engineering===&lt;br /&gt;
The security architecture and engineering domain covers important&lt;br /&gt;
topics concerning security engineering plans, designs and principles,&lt;br /&gt;
Topics include assessing and mitigating information system&lt;br /&gt;
vulnerabilities, fundamental concepts of security models and security&lt;br /&gt;
architectures in critical areas like access control. Cloud systems,&lt;br /&gt;
cryptography, system infiltrations (ransomware, fault-injection and&lt;br /&gt;
more) and virtualized systems are also covered in this domain.&lt;br /&gt;
===Asset Security===&lt;br /&gt;
The Asset Security domain deals with the issues related to the&lt;br /&gt;
collection, storage, maintenance, retention and destruction of data. It&lt;br /&gt;
also covers knowledge of different roles regarding data handling (owner,&lt;br /&gt;
controller and custodian) as well as data protection methods and data&lt;br /&gt;
states. Other topics include resource provision, asset classification&lt;br /&gt;
and data lifecycle management.&lt;br /&gt;
===Security and Risk Management===&lt;br /&gt;
The security and risk management domain covers general on skills&lt;br /&gt;
related to the implementation of user awareness programs as well as&lt;br /&gt;
security procedures. Emphasis is also placed on risk management&lt;br /&gt;
concerning the acquisition of new services, hardware and software&lt;br /&gt;
(supply chain). Other skills include social engineering defense&lt;br /&gt;
mechanisms.&lt;br /&gt;
===Security Assessment and Testing===&lt;br /&gt;
The security assessment and testing domain deals with all the&lt;br /&gt;
techniques and tools used to find system vulnerabilities, weaknesses and&lt;br /&gt;
potential areas of concern not addressed by security procedures and&lt;br /&gt;
policies. Attack simulations, vulnerability assessment, compliance&lt;br /&gt;
checks, and ethical disclosure also fall under this domain.&lt;br /&gt;
===Software Security===&lt;br /&gt;
The software development security domain deals with implementing&lt;br /&gt;
software-based security protocols within environment for which the IT&lt;br /&gt;
professional is responsible. Risk analysis, vulnerability identification&lt;br /&gt;
and auditing of source codes are all covered in this subset. Additional&lt;br /&gt;
topics include software-designed security, maturity models, development&lt;br /&gt;
methodologies, open-source and third-party development security.&lt;br /&gt;
===Security operations===&lt;br /&gt;
The security operations domain covers topics ranging from&lt;br /&gt;
investigations and digital forensic to detection and intrusion&lt;br /&gt;
prevention tools, sandboxing and firewalls. Topics include user and&lt;br /&gt;
entity behavior analytics, threat intelligence (threat hunting and&lt;br /&gt;
threat feeds) log management, artifacts (mobile, computer and network),&lt;br /&gt;
machine learning and AI-based tools, penetration testing, and&lt;br /&gt;
exploitation development. These for sub-domains are lister here.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Incident Handling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Penetration Testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Exploitation&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Education==&lt;br /&gt;
[[File:Analystimage7.png|400px|thumb|Comparison degree vs Certificate &amp;lt;ref&amp;gt;&amp;quot;Comparison Table&amp;quot;. Available at https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
The entry level monitoring specialist is hired by Estonian&lt;br /&gt;
Information System Authority even if there is no formal IT education,&lt;br /&gt;
but readiness to learn and moderate knowledge of different operation&lt;br /&gt;
systems is enough to start the career. &amp;lt;ref name=&amp;quot;cv&amp;quot;&amp;gt;cv.ee, &amp;quot;SEIRESPETSIALIST - tule Eesti küberruumi valvuriks!&amp;quot;. Available: https://www.cv.ee/en/vacancy/792782/riigi-infosusteemi-amet/seirespetsialist-tule-eesti-kuberruumi-valvuriks [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Nevertheless, like most other high qualification careers jobs falling&lt;br /&gt;
under the cybersecurity specialist category require some form of formal&lt;br /&gt;
education. However, since cybersecurity specialist jobs can fall across&lt;br /&gt;
a wide spectrum of job descriptions and responsibilities, it is possible&lt;br /&gt;
to obtain a specialist job after completing many levels of different&lt;br /&gt;
computer related education.&lt;br /&gt;
&lt;br /&gt;
If one is looking for a cybersecurity related education, for example&lt;br /&gt;
in EU, 137 courses/programs could be found that relate to keyword IT or&lt;br /&gt;
cybersecurity. &amp;lt;ref name=&amp;quot;enisa&amp;quot;&amp;gt;ENISA (European Union Agency for Cybersecurity), &amp;quot;Cybersecurity Education-Cybersecurity Higher Education Database&amp;quot;. Available: https://www.enisa.europa.eu/topics/cybersecurity-education/education-map/education-courses [Accessed 26 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Also, there is a great amount of discussion, if cyber security&lt;br /&gt;
professional should have a degree or would be certification just enough.&lt;br /&gt;
One interesting table is produces by Franklin University that compares&lt;br /&gt;
benefits and/or drawbacks of each type of credential.&amp;lt;ref name=&amp;quot;franklin&amp;quot;&amp;gt;Franklin University, &amp;quot;Is Getting a Master&#039;s Degree in Cyber Security Worth It?&amp;quot;. Available: https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Certifications are generally good for people with little practical&lt;br /&gt;
experience because they are known quantities in the industry and can&lt;br /&gt;
help you get your foot in the door. They set a minimum knowledge bar.&lt;br /&gt;
But some certifications are viewed more favorably than others.&lt;br /&gt;
Certifications with renewal requirements are viewed better by hiring&lt;br /&gt;
managers, but they also more costly in the long run because of the need&lt;br /&gt;
for continuing education. Certifications are also good for showing&lt;br /&gt;
in-depth expertise in a specialization within cybersecurity. Depending&lt;br /&gt;
on your career goals, it may be advantageous to have a master’s&lt;br /&gt;
degree—which shows your breadth of knowledge, critical thinking and&lt;br /&gt;
leadership skills—and a certificate—which shows specific skill&lt;br /&gt;
competency.&amp;lt;ref name=&amp;quot;franklin&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
As IT (Cyber) Security is still a relatively young discipline,&lt;br /&gt;
universities and colleges are still figuring out which is the best&lt;br /&gt;
approach for their degrees. Study programmes and curricula in Cyber&lt;br /&gt;
Security are different. In general, here are the duration of Cyber&lt;br /&gt;
Security degrees:&lt;br /&gt;
&amp;lt;ref name=&amp;quot;studyportal&amp;quot;&amp;gt;Studyportals, &amp;quot;Why You Should Study a Cyber Security Degree in 2022&amp;quot;. Available: https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Bachelor’s degrees in Cyber Security take 3 or 4 years in most&lt;br /&gt;
countries.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Master’s courses in Cyber Security take between 1-2 years to&lt;br /&gt;
complete.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;PhD programmes in Cyber Security last 3-5 years. Some only take 1&lt;br /&gt;
or 2 years, but they are less common.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Generalization could me made that on bachelor level the general&lt;br /&gt;
knowledge about the cyber issues are obtained. On master level the&lt;br /&gt;
specialization courses are taken and the person can choose more specific&lt;br /&gt;
topics to study. It is on master level where strengths of the cyber&lt;br /&gt;
specialist can be developed further and up-do date knowledge obtained in&lt;br /&gt;
specifics. PhD is serious science and involves teaching, lot of&lt;br /&gt;
scientific work and writing for publications.&lt;br /&gt;
&lt;br /&gt;
==Salary==&lt;br /&gt;
&amp;lt;p&amp;gt;Even if the salary can be very different, compared to the skills and&lt;br /&gt;
experience, an generalization can be made. Cyber Security professionals&lt;br /&gt;
in CSIRT, and in other entities earn quite well, from the start. First,&lt;br /&gt;
some comparison from the United States. The average CSIRT analyst salary&lt;br /&gt;
in the USA is $97,500 per year or $50 per hour. Entry level positions&lt;br /&gt;
start at $48,875 per year while most experienced workers make up to&lt;br /&gt;
$135,373 per year.&amp;lt;ref name=&amp;quot;talent&amp;quot;&amp;gt;talent.com, &amp;quot;Csirt Analyst average salary in USA 2022&amp;quot;. Available: https://www.talent.com/salary?job=csirt+analyst [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There are multiple positions you can occupy in this field. They have&lt;br /&gt;
in common great salaries and high demand for technical skills, attention&lt;br /&gt;
to details, problem-solving mentality, and the ability to analyze risks.&lt;br /&gt;
Here are the average annual salaries in the United States, according to&lt;br /&gt;
Payscale: &amp;lt;ref name=&amp;quot;studyportal&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Cryptographer – 100,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Information Security Officer – 91,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Assessor – 90,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Engineer – 88,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Penetration Tester – 81,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Forensics Expert – 71,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Administrator – 65,000 USD&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
When looking into salaries in Estonia, one can find that there is a&lt;br /&gt;
discussion that private sector is taking a toll from the public sector,&lt;br /&gt;
and that the salaries in important agencies, as Information System&lt;br /&gt;
Authority loose their employees to the better paid positions in private&lt;br /&gt;
sector.&amp;lt;ref name=&amp;quot;digigeenius&amp;quot;&amp;gt;DiGi Geenius, &amp;quot;Kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad&amp;quot;. Available: https://digi.geenius.ee/rubriik/uudis/kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad/ [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;tehnika&amp;quot;&amp;gt;Postimees, &amp;quot;Riigi-it-tootajate-palgamaarad-kasvasid&amp;quot;. Available: https://tehnika.postimees.ee/6887428/riigi-it-tootajate-palgamaarad-kasvasid [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
But there is also a different view that average private sector worker&lt;br /&gt;
could be hired as a top specialist in public sector and then the payment&lt;br /&gt;
is higher. Nevertheless, it seems that the average payment in cyber&lt;br /&gt;
security sector is any way higher that in other parts of the&lt;br /&gt;
e-services. &amp;lt;ref name=&amp;quot;digigeenius2&amp;quot;&amp;gt;DiGi Geenius, &amp;quot;5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka&amp;quot;. Available: https://digi.geenius.ee/rubriik/uudis/5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==SOC==&lt;br /&gt;
&amp;lt;p&amp;gt;A SOC is a facility where an organization’s network, applications,&lt;br /&gt;
and endpoints are monitored and defended. The term was adapted from&lt;br /&gt;
network operations centers (NOCs), where large telecommunication or&lt;br /&gt;
corporate networks are monitored. When network security became more of a&lt;br /&gt;
concern, security teams were formed within the NOCs, and eventually spun&lt;br /&gt;
off into larger organizations of their own as the responsibilities of&lt;br /&gt;
security teams grew increasingly complex and specialized. The security&lt;br /&gt;
staff working in a security operations center are often called the SOC&lt;br /&gt;
team.&amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;Exabeam, &amp;quot;CSIRT&amp;quot;. Available: https://www.exabeam.com/incident-response/csirt/ [Accessed 28 APr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;Functions of the SOC team include, but are not limited to:&amp;lt;ref name=&amp;quot;trellix&amp;quot;&amp;gt;Trellix, &amp;quot;What Is a Security Operations Center (SOC)?&amp;quot;. Available: https://www.trellix.com/en-us/security-awareness/operations/what-is-soc.html [Accessed 30 APr 2022].&amp;lt;/ref&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ol type=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Taking inventory of resources, to get a better understanding of the&lt;br /&gt;
structure they are protecting.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintanence of the system, by constantly making updates and adding&lt;br /&gt;
safeguards.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Monitoring the network for abnormalities with special tools.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Threat analysis of new attacks and vulnerabilities.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Responding to attacks, by acting as “first responders”. The SOC team&lt;br /&gt;
will shut down and/or isolate endpoints, deleting files and lowering the&lt;br /&gt;
impact as fast as possible.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Recovery of system stability and lost data. This may be done using&lt;br /&gt;
backups, restarting endpoints or reconfiguring systems.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Logging all actions on the system, to be later used for analysis or&lt;br /&gt;
forensics after an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigating the root cause of an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Auditing their own actions, to be in line with regulations of the&lt;br /&gt;
organization, industry or governing body.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==CSIRT==&lt;br /&gt;
&amp;lt;p&amp;gt;A CSIRT is a group that responds to security incidents when they&lt;br /&gt;
occur. Key responsibilities of a CSIRT include:&lt;br /&gt;
&amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
===Creating and maintaining an incident response plan (IRP)===&lt;br /&gt;
An incident response plan (IRP) is a set of written instructions for&lt;br /&gt;
detecting, responding to and limiting the effects of an information&lt;br /&gt;
security event. Incident response plans provide instructions for&lt;br /&gt;
responding to many potential scenarios, including data breaches, denial&lt;br /&gt;
of service/distributed denial of service attacks, firewall breaches,&lt;br /&gt;
virus or malware outbreaks or insider threats. Without an incident&lt;br /&gt;
response plan in place, organizations may either not detect the attack&lt;br /&gt;
in the first place, or not follow proper protocol to contain the threat&lt;br /&gt;
and recover from it when a breach is detected.&lt;br /&gt;
&lt;br /&gt;
https://www.stratacore.com/incidentresponseplan&lt;br /&gt;
===Investigating and analyzing incidents===&lt;br /&gt;
CSIRTs are also involved in improvement activities. After major&lt;br /&gt;
computer security incidents occur, or when incidents are not handled in&lt;br /&gt;
a timely or effective manner, a CSIRT will generally perform a&lt;br /&gt;
postmortem of the incident and its response. This postmortem will&lt;br /&gt;
identify the strengths and weakness of the response effort. Such reviews&lt;br /&gt;
can identify weaknesses and holes in systems, infrastructure defenses,&lt;br /&gt;
or policies that allowed the incident to take place. It can also&lt;br /&gt;
identify problems with communication channels, interfaces, and&lt;br /&gt;
procedures that inhibited the efficient resolution of the reported&lt;br /&gt;
problem.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.cisa.gov/uscert/bsi/articles/best-practices/incident-management/defining-computer-security-incident-response-teams&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Managing internal communications and updates during or immediately after incidents occur===&lt;br /&gt;
===Communicating with employees, shareholders, customers, and the press about incidents as needed===&lt;br /&gt;
&amp;lt;p&amp;gt;There are various services within the CSIRT Services Framework that&lt;br /&gt;
address communications, as they relate to security operations and&lt;br /&gt;
incident response services. Some of these include Information Security&lt;br /&gt;
Incident Coordination, Crisis Management Support, Vulnerability&lt;br /&gt;
Disclosure, Situational Awareness Communication, and Awareness Building,&lt;br /&gt;
to name a few. Sharing information and communicating with the general&lt;br /&gt;
public and/or your constituency is appropriate in many different&lt;br /&gt;
scenarios. These can range from proactive communications to reactive&lt;br /&gt;
communications. Each scenario may be unique, and careful consideration&lt;br /&gt;
should be given to when to release information to the public and what&lt;br /&gt;
information should be released.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;https://resources.sei.cmu.edu/asset_files/Handbook/2021_002_001_651819.pdf&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Remediating incidents===&lt;br /&gt;
Threat remediation is a strong and capable tool for fighting the&lt;br /&gt;
cyber security compromises. As the word ‘remedy’ suggests, remediation&lt;br /&gt;
process involves the treatment of a security breach. With the&lt;br /&gt;
remediation practices, your cyber security team is able to eliminate&lt;br /&gt;
suspicious activities and malicious attacks in the form of malware,&lt;br /&gt;
ransomware, phishing and such. Even if you ‘kill’ the suspicious&lt;br /&gt;
activity, the attackers can remain in your systems. If you want to&lt;br /&gt;
contaminate and end the problem for good, your remediation processes&lt;br /&gt;
must involve the detection of the cause. &amp;lt;ref name=&amp;quot;logsign&amp;quot;&amp;gt;Logsign, &amp;quot;What-is-remediation-in-cyber-security&amp;quot;. Available: https://www.logsign.com/blog/what-is-remediation-in-cyber-security/. [Accessed 28 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Recommending technology, policy, governance, and training changes after security incidents===&lt;br /&gt;
After all these actions, the SCIRT must contribute to the development&lt;br /&gt;
of better policies, practices and has to recommend improvements. They&lt;br /&gt;
are not working in the vacuum and their work has to create new and&lt;br /&gt;
better standards for cyber security. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;Exabeam, &amp;quot;CSIRT&amp;quot;. Available: https://www.exabeam.com/incident-response/csirt/ [Accessed 28 APr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==CERT==&lt;br /&gt;
The term “computer emergency response team” was coined in 1988. In&lt;br /&gt;
response to the Morris worm attack that impacted thousands of servers on&lt;br /&gt;
the Internet, DARPA funded the formation of the Computer Emergency&lt;br /&gt;
Response Team Coordination Center (CERT-CC) at Carnegie Mellon&lt;br /&gt;
University. The goal of CERT-CC was to help protect the internet by&lt;br /&gt;
collecting and disseminating information on critical security&lt;br /&gt;
vulnerabilities. Several other countries formed similar centers using&lt;br /&gt;
the same acronym (despite threats of legal action by Carnegie Mellon for&lt;br /&gt;
trademark infringement). Now the term CERT refers to any emergency&lt;br /&gt;
response team that deals with cyber threats. Many people use CERT-CC&lt;br /&gt;
interchangeably with CSIRT, though the charter of a CERT is information&lt;br /&gt;
sharing in order to help other response teams respond to threats against&lt;br /&gt;
their own infrastructure. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In general, the designation of CERT is helpful in applying real-world&lt;br /&gt;
solutions to various cybersecurity problems. They may be government&lt;br /&gt;
contractors or employees of a major corporation. For example, the U.S.&lt;br /&gt;
Computer Emergency Readiness Team (US-CERT) operates under the U.S.&lt;br /&gt;
Department of Homeland Security.&lt;br /&gt;
&amp;lt;ref name=&amp;quot;techopedia&amp;quot;&amp;gt;Techopedia, &amp;quot;Computer Emergency Response Team (CERT)&amp;quot;. Available: https://www.techopedia.com/definition/31003/computer-emergency-response-team-cert. [Accessed 25 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In Estonia CERT is designated as CERT-EE. It was established in 2006,&lt;br /&gt;
as an organization responsible for the management of security incidents&lt;br /&gt;
in .ee computer networks. It is also a national contact point for&lt;br /&gt;
international co-operation in the field of IT security. &amp;lt;ref name=&amp;quot;ria&amp;quot;&amp;gt;Information System Autority, &amp;quot;CERT-EE&amp;quot;. Available: hhttps://www.ria.ee/en/cyber-security/cert-ee.html [Accessed 25 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Difference between SOC/CSIRT/CERT==&lt;br /&gt;
[[File:analystimage3.png|300px|thumb|SOC/CSIRT/CERT &amp;lt;ref name=&amp;quot;exabeam&amp;gt;&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
How CSIRTs differ from CERTs and SOCs. There are overlapping&lt;br /&gt;
responsibilities between a community emergency response team (CERT),&lt;br /&gt;
computer security incident response team (CSIRT), and security&lt;br /&gt;
operations center (SOC). To add to this confusion, frequently, the terms&lt;br /&gt;
CERT and CSIRT are used interchangeably, despite the important&lt;br /&gt;
differences. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Understand the primary roles and characteristics of a CERT, CSIRT, and SOC.==&lt;br /&gt;
[[File:analystimage4.png|600px|thumb|Primary Roles of CERT, CSIRT, and SOC&amp;lt;ref name=&amp;quot;exabeam&amp;gt;&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&amp;lt;p&amp;gt;So, using strict definitions, a CERT collects and disseminates&lt;br /&gt;
security information, typically for the benefit of a country or an&lt;br /&gt;
industry. A CSIRT is a cross-functional team that responds to incidents&lt;br /&gt;
on behalf of a country or an organization. A SOC is where a country or&lt;br /&gt;
organization monitors and defends its network, servers, applications,&lt;br /&gt;
and endpoints. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Future==&lt;br /&gt;
&amp;lt;p&amp;gt;And the Cyber security problem is only getting bigger. According to a&lt;br /&gt;
report published by Accenture, the number of cyber security breaches&lt;br /&gt;
increased by 11 percent from 2017 to 2018. The cost of such breaches is&lt;br /&gt;
astronomical–about $600 billion worldwide, according to the Economic&lt;br /&gt;
Impact of Cybercrime report.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Job projections for cybersecurity are staggering. The Bureau of Labor&lt;br /&gt;
Statistics in US predicts that careers in the cybersecurity field will&lt;br /&gt;
grow by 32% by 2028. That makes cybersecurity one of the top 10&lt;br /&gt;
fastest-growing jobs in the country. In the United States alone, jobs&lt;br /&gt;
for Information Security Analysts are expected to grow by 15% by&lt;br /&gt;
2024.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Most likely this trend is also similar in other countries.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When checking Estonian job portals, there is a constant need for&lt;br /&gt;
people for cyber security related positions. Also, linkedin search gives&lt;br /&gt;
approximately 30 vacancies immediately. There are banks, logistics&lt;br /&gt;
companies, e-shops, and software producers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://ee.linkedin.com/jobs/cyber-security-jobs?countryRedirected=1&amp;amp;amp;position=1&amp;amp;amp;pageNum=0&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Trends that affect companies create need for constant cyber security&lt;br /&gt;
services. Increasing number of home/remote offices require secure&lt;br /&gt;
corporate networks and security of remote devices. One example is from&lt;br /&gt;
this year, when sloppy remote desktop set-up paralyzed systems of 17&lt;br /&gt;
companies.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.aripaev.ee/uudised/2022/04/20/ria-lohakas-kaugtoolaua-seadistus-halvas-martsis-vahemalt-17-juhul-ettevotete-it-susteemid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Also, no service can exists without robust infrastructure - servers,&lt;br /&gt;
databases, applications. As all previously mentioned devices and&lt;br /&gt;
services are at constant scanning and surveillance. So, the breach&lt;br /&gt;
detection and immediate action demands 24/7 services. Even if lot of&lt;br /&gt;
things could be automated, there is a need for human specialists (at&lt;br /&gt;
least, at the moment). Third growing field is also a forensic&lt;br /&gt;
investigation, as every attack must be investigated in order to be ready&lt;br /&gt;
to repel next attacks. So data recovery and evidence collection is&lt;br /&gt;
another important field of work that need skilled and professional&lt;br /&gt;
workers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Even, if the specifics of the entity, be it CSIRT, CERT or SOC, are&lt;br /&gt;
different, the fundamentals of the work are the same. Professional&lt;br /&gt;
knowledge of the networks, operational systems, hardware, scripting, and&lt;br /&gt;
several other wider IT related knowledge is needed. As there is no&lt;br /&gt;
single way to reach to it, every single person can find one’s strongest&lt;br /&gt;
sides and develop them with knowledge of weaker side, in order to know,&lt;br /&gt;
when to as for help.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/body&amp;gt;&lt;br /&gt;
&amp;lt;/html&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mavald</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142256</id>
		<title>Hiring a Cyber Security Incident Analyst</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142256"/>
		<updated>2022-05-01T16:01:07Z</updated>

		<summary type="html">&lt;p&gt;Mavald: /* Understand the primary roles and characteristics of a CERT, CSIRT, and SOC. */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==A Cyber Security Incident Analyst==&lt;br /&gt;
&lt;br /&gt;
[[File:image1.png|600px|thumb|Job advertisement &amp;lt;ref&amp;gt;&amp;quot;Job Advertisement&amp;quot;. Available at https://www.projectpeople.com/jobs/&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
===Cyber security incident analyst in SOC/CSIRT/CERT===&lt;br /&gt;
This article delves into the job title of Cyber Security Incident&lt;br /&gt;
Analyst and provides an overview of the acronyms SOC/CSIRT/CERT. A brief&lt;br /&gt;
history of the job is discussed here, as well as a possible career path,&lt;br /&gt;
education, experience, and other characteristics required for work in&lt;br /&gt;
computer security-related organizations. The article also provides a&lt;br /&gt;
brief history of SOC/CSIRT/CERT, as well as a comparison of their&lt;br /&gt;
differences and similarities.&lt;br /&gt;
===Cyber Security Incident Analyst Skill Set===&lt;br /&gt;
What skill set is expected from the Cyber Security Incident Analyst? Below written lines are taken from the same job advertisement depicted&lt;br /&gt;
on the left side of this article:&lt;br /&gt;
As a Security Incident Analyst your responsibilities will include:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Continuous monitoring of security tooling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Performing regular and ad-hoc vulnerability assessments&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Carrying out ‘spot checks’&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Reporting vulnerabilities to the PVG via the alerts system&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintaining and documenting logging systems&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Developing centralized logging, reporting and intelligence&lt;br /&gt;
platforms&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;‘Light touch’ penetration testing with open source tooling&lt;br /&gt;
(Metasploit)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Knowledge &amp;amp;amp; Experience required:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;SOC, CSIRT or CERT operational environment experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Windows / Linux experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TCP /IP networking protocol knowledge&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience reviewing and analyzing Security Events from various&lt;br /&gt;
monitoring and logging sources&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience in website and web application security assessment or&lt;br /&gt;
penetration testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience of using Metasploit&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Scripting knowledge using BASH, Python, Perl, Ruby&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Skills in Host and Network Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
As one can see the description of the duties is wide and also the&lt;br /&gt;
knowledge and experience that is required is noteworthy. So, where to&lt;br /&gt;
start to find out the way to get this kind of knowledge and&lt;br /&gt;
expertize.&lt;br /&gt;
===Possible career path===&lt;br /&gt;
Next part of the paper is aiming to depict a possible ways, how to&lt;br /&gt;
develop oneself, and move along the career pathway in cybersecurity&lt;br /&gt;
field. Topics of development, education, experience and certification&lt;br /&gt;
are covered.&lt;br /&gt;
[[File:analystimage2.png|1000px|thumb|Career path &amp;lt;ref&amp;gt;&amp;quot;Possible Career Path&amp;quot;. Available at https://www.cyberseek.org/pathway.html&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
===Junior/Senior===&lt;br /&gt;
Start with an entry-level job in IT. Hands-on experience is often the&lt;br /&gt;
most effective way to prepare for certification exams. Start&lt;br /&gt;
accumulating work experience with an entry-level role as a cybersecurity&lt;br /&gt;
analyst. Many cybersecurity professionals start off in more general IT&lt;br /&gt;
roles. The skills, practices, and technologies you’ll use as a&lt;br /&gt;
cybersecurity professional will continue to evolve along with computer&lt;br /&gt;
and network technology. The desire to learn, ability to problem solve,&lt;br /&gt;
and attention to detail will serve you well in this field. Other, more&lt;br /&gt;
technical skills and technologies to learn include:&amp;lt;ref name=&amp;quot;certification&amp;quot;&amp;gt;Popular Cyber Security Certificates [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications  [Accessed 25 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====SIEM tools (security information and event management)====&lt;br /&gt;
Security Information and Event Management (SIEM) is a set of tools&lt;br /&gt;
and services offering a holistic view of an organization’s information&lt;br /&gt;
security. SIEM works by combining two technologies:&lt;br /&gt;
&amp;lt;li&amp;gt;Security information management (SIM), which collects data from log&lt;br /&gt;
files for analysis and reports on security threats and events, and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;security event management (SEM), which conducts real-time system&lt;br /&gt;
monitoring, notifies network admins about important issues and&lt;br /&gt;
establishes correlations between security events. There are a number of&lt;br /&gt;
security information and event management solutions on the market.&lt;br /&gt;
ArcSight ESM, IBM QRadar and Splunk are among the most popular. &amp;lt;ref name=&amp;quot;SIEM&amp;quot;&amp;gt;Application security, SIEM [Online]. Available: https://www.imperva.com/learn/application-security/siem/. [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Firewalls, Intrusion Detection Systems (IDS), and Intrusion Prevention Systems(IPS)====&lt;br /&gt;
Firewalls can be two types, hardware and software firewalls. Software&lt;br /&gt;
firewall is a firewall that is installed on a computer or server, and&lt;br /&gt;
tasked with network security. It works with a wide variety of other&lt;br /&gt;
technology security solutions to provide more robust and cohesive&lt;br /&gt;
security for enterprises of all sizes. When a software firewall is&lt;br /&gt;
installed on a server, it opens up like an umbrella of protection over&lt;br /&gt;
all other computers connected to the network. It is able to monitor both&lt;br /&gt;
incoming and outgoing traffic for potential risk or suspicious user&lt;br /&gt;
behavior, and also makes setting security policies much easier, faster&lt;br /&gt;
and more flexible. Hardware firewall is positioned between the network&lt;br /&gt;
and devices, allowing traffic to funnel through the firewall for a close&lt;br /&gt;
inspection and analysis. A hardware firewall, a term often&lt;br /&gt;
interchangeable with network or next-generation firewall, protects the&lt;br /&gt;
network gateways for an enterprise. Hardware firewall is physical&lt;br /&gt;
hardware, installed between network elements and connected devices, and&lt;br /&gt;
is tasked with filtering traffic for cyber threat to the network or&lt;br /&gt;
devices. Filtering out unauthorized or suspicious users based on traffic&lt;br /&gt;
analysis is one of the biggest benefits of hardware firewall. &amp;lt;ref name=&amp;quot;sangfor&amp;quot;&amp;gt;Sangfor, &amp;quot;What is Software Firewall? Difference between Hardware Firewall and Software Firewall, [Online]. Available: https://www.sangfor.com/blog/cybersecurity/what-is-software-firewall-difference-between-hardware-firewall-and-software-firewall [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems&lt;br /&gt;
(IPS) are both parts of the network infrastructure. IDS/IPS compare&lt;br /&gt;
network packets to a cyberthreat database containing known signatures of&lt;br /&gt;
cyberattacks — and flag any matching packets. IDS doesn’t alter the&lt;br /&gt;
network packets in any way, whereas IPS prevents the packet from&lt;br /&gt;
delivery based on the contents of the packet, much like how a firewall&lt;br /&gt;
prevents traffic by IP address. &amp;lt;ref name=&amp;quot;Varonis&amp;quot;&amp;gt;Varonis, &amp;quot;What is Software Firewall? IDS vs. IPS: What is the Difference?, [Online]. Available: https://www.varonis.com/blog/ids-vs-ips [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Digital forensics====&lt;br /&gt;
Digital forensics is a branch of forensic science that focuses on&lt;br /&gt;
identifying, acquiring, processing, analyzing, and reporting on data&lt;br /&gt;
stored electronically. Electronic evidence is a component of almost all&lt;br /&gt;
criminal activities and digital forensics support is crucial for law&lt;br /&gt;
enforcement investigations. Electronic evidence can be collected from a&lt;br /&gt;
wide array of sources, such as computers, smartphones, remote storage,&lt;br /&gt;
unmanned aerial systems, shipborne equipment, and more.&amp;lt;ref name=&amp;quot;interpol&amp;quot;&amp;gt;Interpol, &amp;quot;Digital forensics&amp;quot;. Available: https://www.interpol.int/How-we-work/Innovation/Digital-forensics. [Accessed 28 4 2022].&amp;lt;/ref&amp;gt; &lt;br /&gt;
Investigative process of digital forensics can be divided into several stages. There are four major stages: preservation, collection,&lt;br /&gt;
examination, and analysis. All these four stages need a deep understanding of computers, technology across a broad spectrum, and cybersecurity principles and&lt;br /&gt;
practices, a working knowledge of computers, networks, and coding, in-depth investigative abilities, critical-thinking skills and analytical talent the ability to effectively communicate and work with a&lt;br /&gt;
wide range of people. &amp;lt;ref name=&amp;quot;ecpi&amp;quot;&amp;gt;&amp;quot;Digital forensics&amp;quot;. Available: https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me. [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Mobile device management====&lt;br /&gt;
Mobile device management (MDM) is software that allows IT&lt;br /&gt;
administrators to control, secure and enforce policies on smartphones,&lt;br /&gt;
tablets and other endpoints. Mobile device management software emerged&lt;br /&gt;
in the early 2000s as a way to control and secure the personal digital&lt;br /&gt;
assistants and smartphones that business workers began to use. The&lt;br /&gt;
consumer smartphone boom that started with the launch of the Apple&lt;br /&gt;
iPhone in 2007 led to the bring your own device (BYOD) trend, which&lt;br /&gt;
fueled further interest in MDM.&amp;lt;ref name=&amp;quot;techtarget&amp;quot;&amp;gt;Techtarget, &amp;quot;Mobile Device Management&amp;quot;. Available: https://www.techtarget.com/searchmobilecomputing/definition/mobile-device-management [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Data management====&lt;br /&gt;
Sometimes the data management is neglected, but this part has a&lt;br /&gt;
crucial role when learning for good cyber security practices. Majority&lt;br /&gt;
of cyber security programs include a special courses on data management.&lt;br /&gt;
Data management is a method of organizing and maintaining data processes&lt;br /&gt;
that are required in almost every business operations. The benefits of&lt;br /&gt;
data management can be found accounting, statistics, logistics planning&lt;br /&gt;
and other disciplines including corporate computing.&amp;lt;ref name=&amp;quot;GlobalUni&amp;quot;&amp;gt;Global Universities, &amp;quot;MSc Data Management and Cyber Security&amp;quot;. Available: https://globaluniversities.in/msc-data-management-cyber-security. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Data governance (and management) play a fundamental role in&lt;br /&gt;
protecting an organization’s data. Ensuring that the right people have&lt;br /&gt;
the right access and that appropriate security controls are in place to&lt;br /&gt;
protect each system or service, based on the criticality or sensitivity&lt;br /&gt;
of the data sets these contain. &amp;lt;ref name=&amp;quot;CyberMagazine&amp;quot;&amp;gt;Cyber Security Magazine, &amp;quot;The Role of Data Governance in Cybersecurity&amp;quot;. Available: https://cybersecurity-magazine.com/the-role-of-data-governance-in-cybersecurity/?utm_source=rss&amp;amp;amp;utm_medium=rss&amp;amp;amp;utm_campaign=the-role-of-data-governance-in-cybersecurity. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Application security development====&lt;br /&gt;
Application security describes security measures at the application&lt;br /&gt;
level that aim to prevent data or code within the app from being stolen&lt;br /&gt;
or hijacked. It encompasses the security considerations that happen&lt;br /&gt;
during application development and design, but it also involves systems&lt;br /&gt;
and approaches to protect apps after they get deployed. Application&lt;br /&gt;
security may include hardware, software, and procedures that identify or&lt;br /&gt;
minimize security vulnerabilities.&amp;lt;ref name=&amp;quot;vmware&amp;quot;&amp;gt;VmWare, &amp;quot;What is application security?&amp;quot;. Available: https://www.vmware.com/topics/glossary/content/application-security.html [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Application security development is important to ensure that your&lt;br /&gt;
application is free from coding errors and bugs. And controls the risk&lt;br /&gt;
and helps safeguard against security vulnerabilities. Application&lt;br /&gt;
security development is the process of making applications more secure&lt;br /&gt;
by finding and fixing security vulnerabilities. This is often done by&lt;br /&gt;
enforcing software security best practices and using application&lt;br /&gt;
security testing tools. &lt;br /&gt;
&amp;lt;ref name=&amp;quot;perforce&amp;quot;&amp;gt;Perforce, &amp;quot;Application Security Development Best Practices&amp;quot;. Available: https://www.perforce.com/blog/kw/application-security-development-best-practices. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Audit and compliance knowledge====&lt;br /&gt;
A cyber security audit is designed to be a comprehensive review and&lt;br /&gt;
analysis of your business’s IT infrastructure. It identifies threats and&lt;br /&gt;
vulnerabilities, exposing weaknesses and high-risk practices.&lt;br /&gt;
Regulations such as the EU GDPR (General Data Protection Regulation) can&lt;br /&gt;
impose hefty penalties in the event of a breach that results in&lt;br /&gt;
exploited data. A cyber security audit will help mitigate the&lt;br /&gt;
consequences of a breach and demonstrate that your organization has&lt;br /&gt;
taken the necessary steps to protect client and company data. &amp;lt;ref name=&amp;quot;cyforsecure&amp;quot;&amp;gt;Cyfor Secure, &amp;quot;What is a Cyber Security Audit and how can it help your organisation?&amp;quot;. Available: https://cyforsecure.co.uk/services/cyber-assessment/cyber-security-audit/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cybersecurity compliance is the organizational risk management method&lt;br /&gt;
aligned with pre-defined security measures &amp;amp;amp; controls on how data&lt;br /&gt;
confidentiality is ensured by its administrative procedures.&amp;lt;ref name=&amp;quot;nordlayer&amp;quot;&amp;gt;NordLayer, &amp;quot;Cybersecurity compliance: Everything you need to know&amp;quot;. Available: https://nordlayer.com/blog/cybersecurity-compliance-everything-you-need-to-know/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
All needed skills are developed through courses and certification.&lt;br /&gt;
&lt;br /&gt;
===Entry-Level Incident Response Positions===&lt;br /&gt;
It is not always possible to advance to the position of incident&lt;br /&gt;
responder in a straight line. Many professionals advance from entry- to&lt;br /&gt;
mid-level positions before becoming a real incident responder or a&lt;br /&gt;
member of a computer emergency response team (CERT).&amp;lt;br /&amp;gt;&lt;br /&gt;
These are some examples: &amp;lt;ref name=&amp;quot;Infosec&amp;quot;&amp;gt;Infosec, &amp;quot;Incident Responder Career Roadmap: From Entry Level to Executive&amp;quot;. Available: https://resources.infosecinstitute.com/topic/incident-responder-career-roadmap-entry-level-executive/ [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;network-administrator&amp;quot;&amp;gt;Network administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;This position’s experience will help potential incident responders&lt;br /&gt;
develop networking skills. Attention to detail, as well as the ability&lt;br /&gt;
to sift through system configurations, site layouts, and general network&lt;br /&gt;
and communication setups, are essential in this field.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;system-administrator&amp;quot;&amp;gt;System administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Another crucial beginning point for an incident responder is to learn&lt;br /&gt;
how to manage resources inside your organization as well as user&lt;br /&gt;
behavior. Understanding the potential damage that users, inadequate&lt;br /&gt;
security setups, and ineffective IT policies and procedures can cause on&lt;br /&gt;
your network can provide prospective candidates with insight into the&lt;br /&gt;
human component of an incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;security-administrator&amp;quot;&amp;gt;Security administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In such a position, basic hacking skills, penetration testing, and&lt;br /&gt;
intrusion detection are all learned, which are crucial incident&lt;br /&gt;
responder skills when trying to replicate a breach or attack.&lt;br /&gt;
Understanding the paths a cybercriminal will take when attempting to&lt;br /&gt;
damage or obtain access to a system can greatly simplify the work of&lt;br /&gt;
reverse engineering the incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Mid-Level Incident Response Positions ===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5&lt;br /&gt;
id=&amp;quot;computer-security-incident-response-team-csirt-engineer&amp;quot;&amp;gt;Computer&lt;br /&gt;
security incident response team (CSIRT) engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;cyber-incident-responder&amp;quot;&amp;gt;Cyber incident responder&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-response-engineer&amp;quot;&amp;gt;Incident response&lt;br /&gt;
engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;While each of these positions is different, they generally require&lt;br /&gt;
very similar skills and characteristics in a candidate. At this level,&lt;br /&gt;
personal characteristics such as problem solving, time management, and&lt;br /&gt;
even presentation skills become more crucial as one’s career evolves&lt;br /&gt;
into a management-facing role.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Technical skills include the ability to identify and minimize threats&lt;br /&gt;
while maintaining communication with management and the rest of your&lt;br /&gt;
team. Data analysis and evidence gathering become increasingly crucial,&lt;br /&gt;
and the circumstances in which your services are deployed get more&lt;br /&gt;
serious.&amp;lt;/p&amp;gt;&lt;br /&gt;
Problem-solving skills are crucial at this level of incident&lt;br /&gt;
response, and as the stakes rise, so does the pressure in each&lt;br /&gt;
situation. At this level, programming abilities are essential since&lt;br /&gt;
incident responders may be needed to reverse engineer malicious code or&lt;br /&gt;
even create patches for vulnerable network applications or services. &amp;lt;ref name=&amp;quot;coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated]&amp;quot;. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Senior-Level Incident Response Positions===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;intrusion-detection-specialist&amp;quot;&amp;gt;Intrusion detection&lt;br /&gt;
specialist:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;A CISSP certification might help a potential candidate in preparing&lt;br /&gt;
for the profession. The role of an intrusion detection specialist is to&lt;br /&gt;
find and stop any unwanted communications.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-manager&amp;quot;&amp;gt;Incident manager:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Expected to plan, oversee, manage, and supervise all incident&lt;br /&gt;
response team actions. Is in charge of reporting all current events to&lt;br /&gt;
senior management and stakeholders, as well as acting as the technical&lt;br /&gt;
lead on active incidents for incident responders. Prepares threat and&lt;br /&gt;
impact assessments and reports them known to management.&amp;lt;ref name=&amp;quot;coursera&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Certificates== &lt;br /&gt;
There is a vast number of different certificates and the road map to&lt;br /&gt;
being a certified professional could be very different&amp;lt;ref name=&amp;quot;Coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated],&amp;quot; [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;NICCS&amp;quot;&amp;gt;NICCS, &amp;quot;Cybersecurity Certifications,&amp;quot; [Online]. Available: hhttps://niccs.cisa.gov/about-niccs/cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt; . One possible&lt;br /&gt;
approach is to start with basic certificates from the different branches&lt;br /&gt;
of service and move to more specific and demanding focused&lt;br /&gt;
certification. Also, some jobs require certain clearances, either from&lt;br /&gt;
industry, or from the government. One small selection of different&lt;br /&gt;
possible certificates is brought out in following paragraphs.&lt;br /&gt;
&lt;br /&gt;
Security+ is a CompTIA certification that is considered a basic cert&lt;br /&gt;
among cybersecurity professionals. It covers the topics of risk&lt;br /&gt;
management and threat assessment.&lt;br /&gt;
Network+ is also offered by CompTIA this certification (like the name&lt;br /&gt;
implies) focuses on networking infrastructure and operations. It is&lt;br /&gt;
considered a foundational certification.&lt;br /&gt;
The Certified Information Systems Security Professional (CISSP) is a&lt;br /&gt;
more advanced certification designed for cybersecurity professionals&lt;br /&gt;
with at least five years of work experience. The certification covers&lt;br /&gt;
topics such as architecture, engineering, and management.&amp;lt;/p&amp;gt;&lt;br /&gt;
The Certified Ethical Hacker (CEH) certification is also considered a&lt;br /&gt;
more advanced cert because it generally requires that applicants have&lt;br /&gt;
multiple years of work experience. The goal of an ethical hacker&lt;br /&gt;
certification is to be able to understand how cyber attacks unfold in&lt;br /&gt;
order to improve threat assessment and mitigation skills.&amp;lt;ref name=&amp;quot;cyberguide&amp;quot;&amp;gt;Cybersecurity Guide, &amp;quot;How to become a cybersecurity specialist&amp;quot;, [Online]. Available: https://cybersecurityguide.org/careers/security-specialist/. [Accessed 27 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
This is definitely not all, when one looks for more information, following link could be searched, to get more in depth knowledge about&lt;br /&gt;
different possibilities.&lt;br /&gt;
 &lt;br /&gt;
Hereby, with the help of this matrix a possible taxonomy of different 436 listed certificates in branches are&lt;br /&gt;
presented.&amp;lt;ref name=&amp;quot;Pauljeremy&amp;quot;&amp;gt;&amp;quot;Cybersecurity Roadmap,&amp;quot; [Online]. Available: https://pauljerimy.com/2020/10/12/scr-oct-2020-update/. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:analystimage5.png|1000px|thumb|Certificate matrix &amp;lt;ref&amp;gt;&amp;quot;Certification roadmap&amp;quot;. Available at https://pauljerimy.com/security-certification-roadmap&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
=== Communication and Network Security===&lt;br /&gt;
Communication and network security covers the ability to secure&lt;br /&gt;
communication channels and networks. Topics include secure and converges&lt;br /&gt;
protocols, wireless networks, cellular networks, hardware operations&lt;br /&gt;
(warranty and redundant power), and third-party connectivity. IP&lt;br /&gt;
networking are also included in this domain.&lt;br /&gt;
===Identity and Access Management===&lt;br /&gt;
The identity and access management domain covers the attacks that&lt;br /&gt;
target the human gateway to gain access to data. Other topics include&lt;br /&gt;
ways to identify users with rights to access the information and&lt;br /&gt;
servers. Identity and access management covers the topics of&lt;br /&gt;
applications, Single sign-on authentication, privilege escalation,&lt;br /&gt;
Kerberos, rule-based or risk-based access control, proofing and&lt;br /&gt;
establishment of identity.&lt;br /&gt;
===Security Architecture and Engineering===&lt;br /&gt;
The security architecture and engineering domain covers important&lt;br /&gt;
topics concerning security engineering plans, designs and principles,&lt;br /&gt;
Topics include assessing and mitigating information system&lt;br /&gt;
vulnerabilities, fundamental concepts of security models and security&lt;br /&gt;
architectures in critical areas like access control. Cloud systems,&lt;br /&gt;
cryptography, system infiltrations (ransomware, fault-injection and&lt;br /&gt;
more) and virtualized systems are also covered in this domain.&lt;br /&gt;
===Asset Security===&lt;br /&gt;
The Asset Security domain deals with the issues related to the&lt;br /&gt;
collection, storage, maintenance, retention and destruction of data. It&lt;br /&gt;
also covers knowledge of different roles regarding data handling (owner,&lt;br /&gt;
controller and custodian) as well as data protection methods and data&lt;br /&gt;
states. Other topics include resource provision, asset classification&lt;br /&gt;
and data lifecycle management.&lt;br /&gt;
===Security and Risk Management===&lt;br /&gt;
The security and risk management domain covers general on skills&lt;br /&gt;
related to the implementation of user awareness programs as well as&lt;br /&gt;
security procedures. Emphasis is also placed on risk management&lt;br /&gt;
concerning the acquisition of new services, hardware and software&lt;br /&gt;
(supply chain). Other skills include social engineering defense&lt;br /&gt;
mechanisms.&lt;br /&gt;
===Security Assessment and Testing===&lt;br /&gt;
The security assessment and testing domain deals with all the&lt;br /&gt;
techniques and tools used to find system vulnerabilities, weaknesses and&lt;br /&gt;
potential areas of concern not addressed by security procedures and&lt;br /&gt;
policies. Attack simulations, vulnerability assessment, compliance&lt;br /&gt;
checks, and ethical disclosure also fall under this domain.&lt;br /&gt;
===Software Security===&lt;br /&gt;
The software development security domain deals with implementing&lt;br /&gt;
software-based security protocols within environment for which the IT&lt;br /&gt;
professional is responsible. Risk analysis, vulnerability identification&lt;br /&gt;
and auditing of source codes are all covered in this subset. Additional&lt;br /&gt;
topics include software-designed security, maturity models, development&lt;br /&gt;
methodologies, open-source and third-party development security.&lt;br /&gt;
===Security operations===&lt;br /&gt;
The security operations domain covers topics ranging from&lt;br /&gt;
investigations and digital forensic to detection and intrusion&lt;br /&gt;
prevention tools, sandboxing and firewalls. Topics include user and&lt;br /&gt;
entity behavior analytics, threat intelligence (threat hunting and&lt;br /&gt;
threat feeds) log management, artifacts (mobile, computer and network),&lt;br /&gt;
machine learning and AI-based tools, penetration testing, and&lt;br /&gt;
exploitation development. These for sub-domains are lister here.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Incident Handling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Penetration Testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Exploitation&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Education==&lt;br /&gt;
[[File:Analystimage7.png|400px|thumb|Comparison degree vs Certificate &amp;lt;ref&amp;gt;&amp;quot;Comparison Table&amp;quot;. Available at https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
The entry level monitoring specialist is hired by Estonian&lt;br /&gt;
Information System Authority even if there is no formal IT education,&lt;br /&gt;
but readiness to learn and moderate knowledge of different operation&lt;br /&gt;
systems is enough to start the career. &amp;lt;ref name=&amp;quot;cv&amp;quot;&amp;gt;cv.ee, &amp;quot;SEIRESPETSIALIST - tule Eesti küberruumi valvuriks!&amp;quot;. Available: https://www.cv.ee/en/vacancy/792782/riigi-infosusteemi-amet/seirespetsialist-tule-eesti-kuberruumi-valvuriks [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Nevertheless, like most other high qualification careers jobs falling&lt;br /&gt;
under the cybersecurity specialist category require some form of formal&lt;br /&gt;
education. However, since cybersecurity specialist jobs can fall across&lt;br /&gt;
a wide spectrum of job descriptions and responsibilities, it is possible&lt;br /&gt;
to obtain a specialist job after completing many levels of different&lt;br /&gt;
computer related education.&lt;br /&gt;
&lt;br /&gt;
If one is looking for a cybersecurity related education, for example&lt;br /&gt;
in EU, 137 courses/programs could be found that relate to keyword IT or&lt;br /&gt;
cybersecurity. &amp;lt;ref name=&amp;quot;enisa&amp;quot;&amp;gt;ENISA (European Union Agency for Cybersecurity), &amp;quot;Cybersecurity Education-Cybersecurity Higher Education Database&amp;quot;. Available: https://www.enisa.europa.eu/topics/cybersecurity-education/education-map/education-courses [Accessed 26 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Also, there is a great amount of discussion, if cyber security&lt;br /&gt;
professional should have a degree or would be certification just enough.&lt;br /&gt;
One interesting table is produces by Franklin University that compares&lt;br /&gt;
benefits and/or drawbacks of each type of credential.&amp;lt;ref name=&amp;quot;franklin&amp;quot;&amp;gt;Franklin University, &amp;quot;Is Getting a Master&#039;s Degree in Cyber Security Worth It?&amp;quot;. Available: https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Certifications are generally good for people with little practical&lt;br /&gt;
experience because they are known quantities in the industry and can&lt;br /&gt;
help you get your foot in the door. They set a minimum knowledge bar.&lt;br /&gt;
But some certifications are viewed more favorably than others.&lt;br /&gt;
Certifications with renewal requirements are viewed better by hiring&lt;br /&gt;
managers, but they also more costly in the long run because of the need&lt;br /&gt;
for continuing education. Certifications are also good for showing&lt;br /&gt;
in-depth expertise in a specialization within cybersecurity. Depending&lt;br /&gt;
on your career goals, it may be advantageous to have a master’s&lt;br /&gt;
degree—which shows your breadth of knowledge, critical thinking and&lt;br /&gt;
leadership skills—and a certificate—which shows specific skill&lt;br /&gt;
competency.&amp;lt;ref name=&amp;quot;franklin&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
As IT (Cyber) Security is still a relatively young discipline,&lt;br /&gt;
universities and colleges are still figuring out which is the best&lt;br /&gt;
approach for their degrees. Study programmes and curricula in Cyber&lt;br /&gt;
Security are different. In general, here are the duration of Cyber&lt;br /&gt;
Security degrees:&lt;br /&gt;
&amp;lt;ref name=&amp;quot;studyportal&amp;quot;&amp;gt;Studyportals, &amp;quot;Why You Should Study a Cyber Security Degree in 2022&amp;quot;. Available: https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Bachelor’s degrees in Cyber Security take 3 or 4 years in most&lt;br /&gt;
countries.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Master’s courses in Cyber Security take between 1-2 years to&lt;br /&gt;
complete.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;PhD programmes in Cyber Security last 3-5 years. Some only take 1&lt;br /&gt;
or 2 years, but they are less common.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Generalization could me made that on bachelor level the general&lt;br /&gt;
knowledge about the cyber issues are obtained. On master level the&lt;br /&gt;
specialization courses are taken and the person can choose more specific&lt;br /&gt;
topics to study. It is on master level where strengths of the cyber&lt;br /&gt;
specialist can be developed further and up-do date knowledge obtained in&lt;br /&gt;
specifics. PhD is serious science and involves teaching, lot of&lt;br /&gt;
scientific work and writing for publications.&lt;br /&gt;
&lt;br /&gt;
==Salary==&lt;br /&gt;
&amp;lt;p&amp;gt;Even if the salary can be very different, compared to the skills and&lt;br /&gt;
experience, an generalization can be made. Cyber Security professionals&lt;br /&gt;
in CSIRT, and in other entities earn quite well, from the start. First,&lt;br /&gt;
some comparison from the United States. The average CSIRT analyst salary&lt;br /&gt;
in the USA is $97,500 per year or $50 per hour. Entry level positions&lt;br /&gt;
start at $48,875 per year while most experienced workers make up to&lt;br /&gt;
$135,373 per year.&amp;lt;ref name=&amp;quot;talent&amp;quot;&amp;gt;talent.com, &amp;quot;Csirt Analyst average salary in USA 2022&amp;quot;. Available: https://www.talent.com/salary?job=csirt+analyst [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There are multiple positions you can occupy in this field. They have&lt;br /&gt;
in common great salaries and high demand for technical skills, attention&lt;br /&gt;
to details, problem-solving mentality, and the ability to analyze risks.&lt;br /&gt;
Here are the average annual salaries in the United States, according to&lt;br /&gt;
Payscale: &amp;lt;ref name=&amp;quot;studyportal&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Cryptographer – 100,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Information Security Officer – 91,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Assessor – 90,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Engineer – 88,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Penetration Tester – 81,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Forensics Expert – 71,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Administrator – 65,000 USD&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
When looking into salaries in Estonia, one can find that there is a&lt;br /&gt;
discussion that private sector is taking a toll from the public sector,&lt;br /&gt;
and that the salaries in important agencies, as Information System&lt;br /&gt;
Authority loose their employees to the better paid positions in private&lt;br /&gt;
sector.&amp;lt;ref name=&amp;quot;digigeenius&amp;quot;&amp;gt;DiGi Geenius, &amp;quot;Kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad&amp;quot;. Available: https://digi.geenius.ee/rubriik/uudis/kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad/ [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;tehnika&amp;quot;&amp;gt;Postimees, &amp;quot;Riigi-it-tootajate-palgamaarad-kasvasid&amp;quot;. Available: https://tehnika.postimees.ee/6887428/riigi-it-tootajate-palgamaarad-kasvasid [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
But there is also a different view that average private sector worker&lt;br /&gt;
could be hired as a top specialist in public sector and then the payment&lt;br /&gt;
is higher. Nevertheless, it seems that the average payment in cyber&lt;br /&gt;
security sector is any way higher that in other parts of the&lt;br /&gt;
e-services. &amp;lt;ref name=&amp;quot;digigeenius2&amp;quot;&amp;gt;DiGi Geenius, &amp;quot;5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka&amp;quot;. Available: https://digi.geenius.ee/rubriik/uudis/5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==SOC==&lt;br /&gt;
&amp;lt;p&amp;gt;A SOC is a facility where an organization’s network, applications,&lt;br /&gt;
and endpoints are monitored and defended. The term was adapted from&lt;br /&gt;
network operations centers (NOCs), where large telecommunication or&lt;br /&gt;
corporate networks are monitored. When network security became more of a&lt;br /&gt;
concern, security teams were formed within the NOCs, and eventually spun&lt;br /&gt;
off into larger organizations of their own as the responsibilities of&lt;br /&gt;
security teams grew increasingly complex and specialized. The security&lt;br /&gt;
staff working in a security operations center are often called the SOC&lt;br /&gt;
team.&amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;Exabeam, &amp;quot;CSIRT&amp;quot;. Available: https://www.exabeam.com/incident-response/csirt/ [Accessed 28 APr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;Functions of the SOC team include, but are not limited to:&amp;lt;ref name=&amp;quot;trellix&amp;quot;&amp;gt;Trellix, &amp;quot;What Is a Security Operations Center (SOC)?&amp;quot;. Available: https://www.trellix.com/en-us/security-awareness/operations/what-is-soc.html [Accessed 30 APr 2022].&amp;lt;/ref&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ol type=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Taking inventory of resources, to get a better understanding of the&lt;br /&gt;
structure they are protecting.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintanence of the system, by constantly making updates and adding&lt;br /&gt;
safeguards.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Monitoring the network for abnormalities with special tools.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Threat analysis of new attacks and vulnerabilities.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Responding to attacks, by acting as “first responders”. The SOC team&lt;br /&gt;
will shut down and/or isolate endpoints, deleting files and lowering the&lt;br /&gt;
impact as fast as possible.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Recovery of system stability and lost data. This may be done using&lt;br /&gt;
backups, restarting endpoints or reconfiguring systems.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Logging all actions on the system, to be later used for analysis or&lt;br /&gt;
forensics after an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigating the root cause of an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Auditing their own actions, to be in line with regulations of the&lt;br /&gt;
organization, industry or governing body.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==CSIRT==&lt;br /&gt;
&amp;lt;p&amp;gt;A CSIRT is a group that responds to security incidents when they&lt;br /&gt;
occur. Key responsibilities of a CSIRT include:&lt;br /&gt;
&amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
===Creating and maintaining an incident response plan (IRP)===&lt;br /&gt;
An incident response plan (IRP) is a set of written instructions for&lt;br /&gt;
detecting, responding to and limiting the effects of an information&lt;br /&gt;
security event. Incident response plans provide instructions for&lt;br /&gt;
responding to many potential scenarios, including data breaches, denial&lt;br /&gt;
of service/distributed denial of service attacks, firewall breaches,&lt;br /&gt;
virus or malware outbreaks or insider threats. Without an incident&lt;br /&gt;
response plan in place, organizations may either not detect the attack&lt;br /&gt;
in the first place, or not follow proper protocol to contain the threat&lt;br /&gt;
and recover from it when a breach is detected.&lt;br /&gt;
&lt;br /&gt;
https://www.stratacore.com/incidentresponseplan&lt;br /&gt;
===Investigating and analyzing incidents===&lt;br /&gt;
CSIRTs are also involved in improvement activities. After major&lt;br /&gt;
computer security incidents occur, or when incidents are not handled in&lt;br /&gt;
a timely or effective manner, a CSIRT will generally perform a&lt;br /&gt;
postmortem of the incident and its response. This postmortem will&lt;br /&gt;
identify the strengths and weakness of the response effort. Such reviews&lt;br /&gt;
can identify weaknesses and holes in systems, infrastructure defenses,&lt;br /&gt;
or policies that allowed the incident to take place. It can also&lt;br /&gt;
identify problems with communication channels, interfaces, and&lt;br /&gt;
procedures that inhibited the efficient resolution of the reported&lt;br /&gt;
problem.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.cisa.gov/uscert/bsi/articles/best-practices/incident-management/defining-computer-security-incident-response-teams&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Managing internal communications and updates during or immediately after incidents occur===&lt;br /&gt;
===Communicating with employees, shareholders, customers, and the press about incidents as needed===&lt;br /&gt;
&amp;lt;p&amp;gt;There are various services within the CSIRT Services Framework that&lt;br /&gt;
address communications, as they relate to security operations and&lt;br /&gt;
incident response services. Some of these include Information Security&lt;br /&gt;
Incident Coordination, Crisis Management Support, Vulnerability&lt;br /&gt;
Disclosure, Situational Awareness Communication, and Awareness Building,&lt;br /&gt;
to name a few. Sharing information and communicating with the general&lt;br /&gt;
public and/or your constituency is appropriate in many different&lt;br /&gt;
scenarios. These can range from proactive communications to reactive&lt;br /&gt;
communications. Each scenario may be unique, and careful consideration&lt;br /&gt;
should be given to when to release information to the public and what&lt;br /&gt;
information should be released.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;https://resources.sei.cmu.edu/asset_files/Handbook/2021_002_001_651819.pdf&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Remediating incidents===&lt;br /&gt;
Threat remediation is a strong and capable tool for fighting the&lt;br /&gt;
cyber security compromises. As the word ‘remedy’ suggests, remediation&lt;br /&gt;
process involves the treatment of a security breach. With the&lt;br /&gt;
remediation practices, your cyber security team is able to eliminate&lt;br /&gt;
suspicious activities and malicious attacks in the form of malware,&lt;br /&gt;
ransomware, phishing and such. Even if you ‘kill’ the suspicious&lt;br /&gt;
activity, the attackers can remain in your systems. If you want to&lt;br /&gt;
contaminate and end the problem for good, your remediation processes&lt;br /&gt;
must involve the detection of the cause. &amp;lt;ref name=&amp;quot;logsign&amp;quot;&amp;gt;Logsign, &amp;quot;What-is-remediation-in-cyber-security&amp;quot;. Available: https://www.logsign.com/blog/what-is-remediation-in-cyber-security/. [Accessed 28 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Recommending technology, policy, governance, and training changes after security incidents===&lt;br /&gt;
After all these actions, the SCIRT must contribute to the development&lt;br /&gt;
of better policies, practices and has to recommend improvements. They&lt;br /&gt;
are not working in the vacuum and their work has to create new and&lt;br /&gt;
better standards for cyber security. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;Exabeam, &amp;quot;CSIRT&amp;quot;. Available: https://www.exabeam.com/incident-response/csirt/ [Accessed 28 APr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==CERT==&lt;br /&gt;
&amp;lt;p&amp;gt;The term “computer emergency response team” was coined in 1988. In&lt;br /&gt;
response to the Morris worm attack that impacted thousands of servers on&lt;br /&gt;
the Internet, DARPA funded the formation of the Computer Emergency&lt;br /&gt;
Response Team Coordination Center (CERT-CC) at Carnegie Mellon&lt;br /&gt;
University. The goal of CERT-CC was to help protect the internet by&lt;br /&gt;
collecting and disseminating information on critical security&lt;br /&gt;
vulnerabilities. Several other countries formed similar centers using&lt;br /&gt;
the same acronym (despite threats of legal action by Carnegie Mellon for&lt;br /&gt;
trademark infringement). Now the term CERT refers to any emergency&lt;br /&gt;
response team that deals with cyber threats. Many people use CERT-CC&lt;br /&gt;
interchangeably with CSIRT, though the charter of a CERT is information&lt;br /&gt;
sharing in order to help other response teams respond to threats against&lt;br /&gt;
their own infrastructure.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In general, the designation of CERT is helpful in applying real-world&lt;br /&gt;
solutions to various cybersecurity problems. They may be government&lt;br /&gt;
contractors or employees of a major corporation. For example, the U.S.&lt;br /&gt;
Computer Emergency Readiness Team (US-CERT) operates under the U.S.&lt;br /&gt;
Department of Homeland Security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.techopedia.com/definition/31003/computer-emergency-response-team-cert&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In Estonia CERT is designated as CERT-EE. It was established in 2006,&lt;br /&gt;
as an organization responsible for the management of security incidents&lt;br /&gt;
in .ee computer networks. It is also a national contact point for&lt;br /&gt;
international co-operation in the field of IT security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ria.ee/en/cyber-security/cert-ee.html&amp;lt;/p&amp;gt;&lt;br /&gt;
==Difference between SOC/CSIRT/CERT==&lt;br /&gt;
[[File:analystimage3.png|300px|thumb|SOC/CSIRT/CERT &amp;lt;ref name=&amp;quot;exabeam&amp;gt;&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
How CSIRTs differ from CERTs and SOCs. There are overlapping&lt;br /&gt;
responsibilities between a community emergency response team (CERT),&lt;br /&gt;
computer security incident response team (CSIRT), and security&lt;br /&gt;
operations center (SOC). To add to this confusion, frequently, the terms&lt;br /&gt;
CERT and CSIRT are used interchangeably, despite the important&lt;br /&gt;
differences. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Understand the primary roles and characteristics of a CERT, CSIRT, and SOC.==&lt;br /&gt;
[[File:analystimage4.png|600px|thumb|Primary Roles of CERT, CSIRT, and SOC&amp;lt;ref name=&amp;quot;exabeam&amp;gt;&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&amp;lt;p&amp;gt;So, using strict definitions, a CERT collects and disseminates&lt;br /&gt;
security information, typically for the benefit of a country or an&lt;br /&gt;
industry. A CSIRT is a cross-functional team that responds to incidents&lt;br /&gt;
on behalf of a country or an organization. A SOC is where a country or&lt;br /&gt;
organization monitors and defends its network, servers, applications,&lt;br /&gt;
and endpoints. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Future==&lt;br /&gt;
&amp;lt;p&amp;gt;And the Cyber security problem is only getting bigger. According to a&lt;br /&gt;
report published by Accenture, the number of cyber security breaches&lt;br /&gt;
increased by 11 percent from 2017 to 2018. The cost of such breaches is&lt;br /&gt;
astronomical–about $600 billion worldwide, according to the Economic&lt;br /&gt;
Impact of Cybercrime report.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Job projections for cybersecurity are staggering. The Bureau of Labor&lt;br /&gt;
Statistics in US predicts that careers in the cybersecurity field will&lt;br /&gt;
grow by 32% by 2028. That makes cybersecurity one of the top 10&lt;br /&gt;
fastest-growing jobs in the country. In the United States alone, jobs&lt;br /&gt;
for Information Security Analysts are expected to grow by 15% by&lt;br /&gt;
2024.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Most likely this trend is also similar in other countries.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When checking Estonian job portals, there is a constant need for&lt;br /&gt;
people for cyber security related positions. Also, linkedin search gives&lt;br /&gt;
approximately 30 vacancies immediately. There are banks, logistics&lt;br /&gt;
companies, e-shops, and software producers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://ee.linkedin.com/jobs/cyber-security-jobs?countryRedirected=1&amp;amp;amp;position=1&amp;amp;amp;pageNum=0&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Trends that affect companies create need for constant cyber security&lt;br /&gt;
services. Increasing number of home/remote offices require secure&lt;br /&gt;
corporate networks and security of remote devices. One example is from&lt;br /&gt;
this year, when sloppy remote desktop set-up paralyzed systems of 17&lt;br /&gt;
companies.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.aripaev.ee/uudised/2022/04/20/ria-lohakas-kaugtoolaua-seadistus-halvas-martsis-vahemalt-17-juhul-ettevotete-it-susteemid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Also, no service can exists without robust infrastructure - servers,&lt;br /&gt;
databases, applications. As all previously mentioned devices and&lt;br /&gt;
services are at constant scanning and surveillance. So, the breach&lt;br /&gt;
detection and immediate action demands 24/7 services. Even if lot of&lt;br /&gt;
things could be automated, there is a need for human specialists (at&lt;br /&gt;
least, at the moment). Third growing field is also a forensic&lt;br /&gt;
investigation, as every attack must be investigated in order to be ready&lt;br /&gt;
to repel next attacks. So data recovery and evidence collection is&lt;br /&gt;
another important field of work that need skilled and professional&lt;br /&gt;
workers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Even, if the specifics of the entity, be it CSIRT, CERT or SOC, are&lt;br /&gt;
different, the fundamentals of the work are the same. Professional&lt;br /&gt;
knowledge of the networks, operational systems, hardware, scripting, and&lt;br /&gt;
several other wider IT related knowledge is needed. As there is no&lt;br /&gt;
single way to reach to it, every single person can find one’s strongest&lt;br /&gt;
sides and develop them with knowledge of weaker side, in order to know,&lt;br /&gt;
when to as for help.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/body&amp;gt;&lt;br /&gt;
&amp;lt;/html&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mavald</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142254</id>
		<title>Hiring a Cyber Security Incident Analyst</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142254"/>
		<updated>2022-05-01T16:00:57Z</updated>

		<summary type="html">&lt;p&gt;Mavald: /* Difference between SOC/CSIRT/CERT */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==A Cyber Security Incident Analyst==&lt;br /&gt;
&lt;br /&gt;
[[File:image1.png|600px|thumb|Job advertisement &amp;lt;ref&amp;gt;&amp;quot;Job Advertisement&amp;quot;. Available at https://www.projectpeople.com/jobs/&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
===Cyber security incident analyst in SOC/CSIRT/CERT===&lt;br /&gt;
This article delves into the job title of Cyber Security Incident&lt;br /&gt;
Analyst and provides an overview of the acronyms SOC/CSIRT/CERT. A brief&lt;br /&gt;
history of the job is discussed here, as well as a possible career path,&lt;br /&gt;
education, experience, and other characteristics required for work in&lt;br /&gt;
computer security-related organizations. The article also provides a&lt;br /&gt;
brief history of SOC/CSIRT/CERT, as well as a comparison of their&lt;br /&gt;
differences and similarities.&lt;br /&gt;
===Cyber Security Incident Analyst Skill Set===&lt;br /&gt;
What skill set is expected from the Cyber Security Incident Analyst? Below written lines are taken from the same job advertisement depicted&lt;br /&gt;
on the left side of this article:&lt;br /&gt;
As a Security Incident Analyst your responsibilities will include:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Continuous monitoring of security tooling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Performing regular and ad-hoc vulnerability assessments&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Carrying out ‘spot checks’&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Reporting vulnerabilities to the PVG via the alerts system&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintaining and documenting logging systems&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Developing centralized logging, reporting and intelligence&lt;br /&gt;
platforms&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;‘Light touch’ penetration testing with open source tooling&lt;br /&gt;
(Metasploit)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Knowledge &amp;amp;amp; Experience required:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;SOC, CSIRT or CERT operational environment experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Windows / Linux experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TCP /IP networking protocol knowledge&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience reviewing and analyzing Security Events from various&lt;br /&gt;
monitoring and logging sources&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience in website and web application security assessment or&lt;br /&gt;
penetration testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience of using Metasploit&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Scripting knowledge using BASH, Python, Perl, Ruby&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Skills in Host and Network Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
As one can see the description of the duties is wide and also the&lt;br /&gt;
knowledge and experience that is required is noteworthy. So, where to&lt;br /&gt;
start to find out the way to get this kind of knowledge and&lt;br /&gt;
expertize.&lt;br /&gt;
===Possible career path===&lt;br /&gt;
Next part of the paper is aiming to depict a possible ways, how to&lt;br /&gt;
develop oneself, and move along the career pathway in cybersecurity&lt;br /&gt;
field. Topics of development, education, experience and certification&lt;br /&gt;
are covered.&lt;br /&gt;
[[File:analystimage2.png|1000px|thumb|Career path &amp;lt;ref&amp;gt;&amp;quot;Possible Career Path&amp;quot;. Available at https://www.cyberseek.org/pathway.html&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
===Junior/Senior===&lt;br /&gt;
Start with an entry-level job in IT. Hands-on experience is often the&lt;br /&gt;
most effective way to prepare for certification exams. Start&lt;br /&gt;
accumulating work experience with an entry-level role as a cybersecurity&lt;br /&gt;
analyst. Many cybersecurity professionals start off in more general IT&lt;br /&gt;
roles. The skills, practices, and technologies you’ll use as a&lt;br /&gt;
cybersecurity professional will continue to evolve along with computer&lt;br /&gt;
and network technology. The desire to learn, ability to problem solve,&lt;br /&gt;
and attention to detail will serve you well in this field. Other, more&lt;br /&gt;
technical skills and technologies to learn include:&amp;lt;ref name=&amp;quot;certification&amp;quot;&amp;gt;Popular Cyber Security Certificates [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications  [Accessed 25 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====SIEM tools (security information and event management)====&lt;br /&gt;
Security Information and Event Management (SIEM) is a set of tools&lt;br /&gt;
and services offering a holistic view of an organization’s information&lt;br /&gt;
security. SIEM works by combining two technologies:&lt;br /&gt;
&amp;lt;li&amp;gt;Security information management (SIM), which collects data from log&lt;br /&gt;
files for analysis and reports on security threats and events, and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;security event management (SEM), which conducts real-time system&lt;br /&gt;
monitoring, notifies network admins about important issues and&lt;br /&gt;
establishes correlations between security events. There are a number of&lt;br /&gt;
security information and event management solutions on the market.&lt;br /&gt;
ArcSight ESM, IBM QRadar and Splunk are among the most popular. &amp;lt;ref name=&amp;quot;SIEM&amp;quot;&amp;gt;Application security, SIEM [Online]. Available: https://www.imperva.com/learn/application-security/siem/. [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Firewalls, Intrusion Detection Systems (IDS), and Intrusion Prevention Systems(IPS)====&lt;br /&gt;
Firewalls can be two types, hardware and software firewalls. Software&lt;br /&gt;
firewall is a firewall that is installed on a computer or server, and&lt;br /&gt;
tasked with network security. It works with a wide variety of other&lt;br /&gt;
technology security solutions to provide more robust and cohesive&lt;br /&gt;
security for enterprises of all sizes. When a software firewall is&lt;br /&gt;
installed on a server, it opens up like an umbrella of protection over&lt;br /&gt;
all other computers connected to the network. It is able to monitor both&lt;br /&gt;
incoming and outgoing traffic for potential risk or suspicious user&lt;br /&gt;
behavior, and also makes setting security policies much easier, faster&lt;br /&gt;
and more flexible. Hardware firewall is positioned between the network&lt;br /&gt;
and devices, allowing traffic to funnel through the firewall for a close&lt;br /&gt;
inspection and analysis. A hardware firewall, a term often&lt;br /&gt;
interchangeable with network or next-generation firewall, protects the&lt;br /&gt;
network gateways for an enterprise. Hardware firewall is physical&lt;br /&gt;
hardware, installed between network elements and connected devices, and&lt;br /&gt;
is tasked with filtering traffic for cyber threat to the network or&lt;br /&gt;
devices. Filtering out unauthorized or suspicious users based on traffic&lt;br /&gt;
analysis is one of the biggest benefits of hardware firewall. &amp;lt;ref name=&amp;quot;sangfor&amp;quot;&amp;gt;Sangfor, &amp;quot;What is Software Firewall? Difference between Hardware Firewall and Software Firewall, [Online]. Available: https://www.sangfor.com/blog/cybersecurity/what-is-software-firewall-difference-between-hardware-firewall-and-software-firewall [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems&lt;br /&gt;
(IPS) are both parts of the network infrastructure. IDS/IPS compare&lt;br /&gt;
network packets to a cyberthreat database containing known signatures of&lt;br /&gt;
cyberattacks — and flag any matching packets. IDS doesn’t alter the&lt;br /&gt;
network packets in any way, whereas IPS prevents the packet from&lt;br /&gt;
delivery based on the contents of the packet, much like how a firewall&lt;br /&gt;
prevents traffic by IP address. &amp;lt;ref name=&amp;quot;Varonis&amp;quot;&amp;gt;Varonis, &amp;quot;What is Software Firewall? IDS vs. IPS: What is the Difference?, [Online]. Available: https://www.varonis.com/blog/ids-vs-ips [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Digital forensics====&lt;br /&gt;
Digital forensics is a branch of forensic science that focuses on&lt;br /&gt;
identifying, acquiring, processing, analyzing, and reporting on data&lt;br /&gt;
stored electronically. Electronic evidence is a component of almost all&lt;br /&gt;
criminal activities and digital forensics support is crucial for law&lt;br /&gt;
enforcement investigations. Electronic evidence can be collected from a&lt;br /&gt;
wide array of sources, such as computers, smartphones, remote storage,&lt;br /&gt;
unmanned aerial systems, shipborne equipment, and more.&amp;lt;ref name=&amp;quot;interpol&amp;quot;&amp;gt;Interpol, &amp;quot;Digital forensics&amp;quot;. Available: https://www.interpol.int/How-we-work/Innovation/Digital-forensics. [Accessed 28 4 2022].&amp;lt;/ref&amp;gt; &lt;br /&gt;
Investigative process of digital forensics can be divided into several stages. There are four major stages: preservation, collection,&lt;br /&gt;
examination, and analysis. All these four stages need a deep understanding of computers, technology across a broad spectrum, and cybersecurity principles and&lt;br /&gt;
practices, a working knowledge of computers, networks, and coding, in-depth investigative abilities, critical-thinking skills and analytical talent the ability to effectively communicate and work with a&lt;br /&gt;
wide range of people. &amp;lt;ref name=&amp;quot;ecpi&amp;quot;&amp;gt;&amp;quot;Digital forensics&amp;quot;. Available: https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me. [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Mobile device management====&lt;br /&gt;
Mobile device management (MDM) is software that allows IT&lt;br /&gt;
administrators to control, secure and enforce policies on smartphones,&lt;br /&gt;
tablets and other endpoints. Mobile device management software emerged&lt;br /&gt;
in the early 2000s as a way to control and secure the personal digital&lt;br /&gt;
assistants and smartphones that business workers began to use. The&lt;br /&gt;
consumer smartphone boom that started with the launch of the Apple&lt;br /&gt;
iPhone in 2007 led to the bring your own device (BYOD) trend, which&lt;br /&gt;
fueled further interest in MDM.&amp;lt;ref name=&amp;quot;techtarget&amp;quot;&amp;gt;Techtarget, &amp;quot;Mobile Device Management&amp;quot;. Available: https://www.techtarget.com/searchmobilecomputing/definition/mobile-device-management [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Data management====&lt;br /&gt;
Sometimes the data management is neglected, but this part has a&lt;br /&gt;
crucial role when learning for good cyber security practices. Majority&lt;br /&gt;
of cyber security programs include a special courses on data management.&lt;br /&gt;
Data management is a method of organizing and maintaining data processes&lt;br /&gt;
that are required in almost every business operations. The benefits of&lt;br /&gt;
data management can be found accounting, statistics, logistics planning&lt;br /&gt;
and other disciplines including corporate computing.&amp;lt;ref name=&amp;quot;GlobalUni&amp;quot;&amp;gt;Global Universities, &amp;quot;MSc Data Management and Cyber Security&amp;quot;. Available: https://globaluniversities.in/msc-data-management-cyber-security. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Data governance (and management) play a fundamental role in&lt;br /&gt;
protecting an organization’s data. Ensuring that the right people have&lt;br /&gt;
the right access and that appropriate security controls are in place to&lt;br /&gt;
protect each system or service, based on the criticality or sensitivity&lt;br /&gt;
of the data sets these contain. &amp;lt;ref name=&amp;quot;CyberMagazine&amp;quot;&amp;gt;Cyber Security Magazine, &amp;quot;The Role of Data Governance in Cybersecurity&amp;quot;. Available: https://cybersecurity-magazine.com/the-role-of-data-governance-in-cybersecurity/?utm_source=rss&amp;amp;amp;utm_medium=rss&amp;amp;amp;utm_campaign=the-role-of-data-governance-in-cybersecurity. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Application security development====&lt;br /&gt;
Application security describes security measures at the application&lt;br /&gt;
level that aim to prevent data or code within the app from being stolen&lt;br /&gt;
or hijacked. It encompasses the security considerations that happen&lt;br /&gt;
during application development and design, but it also involves systems&lt;br /&gt;
and approaches to protect apps after they get deployed. Application&lt;br /&gt;
security may include hardware, software, and procedures that identify or&lt;br /&gt;
minimize security vulnerabilities.&amp;lt;ref name=&amp;quot;vmware&amp;quot;&amp;gt;VmWare, &amp;quot;What is application security?&amp;quot;. Available: https://www.vmware.com/topics/glossary/content/application-security.html [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Application security development is important to ensure that your&lt;br /&gt;
application is free from coding errors and bugs. And controls the risk&lt;br /&gt;
and helps safeguard against security vulnerabilities. Application&lt;br /&gt;
security development is the process of making applications more secure&lt;br /&gt;
by finding and fixing security vulnerabilities. This is often done by&lt;br /&gt;
enforcing software security best practices and using application&lt;br /&gt;
security testing tools. &lt;br /&gt;
&amp;lt;ref name=&amp;quot;perforce&amp;quot;&amp;gt;Perforce, &amp;quot;Application Security Development Best Practices&amp;quot;. Available: https://www.perforce.com/blog/kw/application-security-development-best-practices. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Audit and compliance knowledge====&lt;br /&gt;
A cyber security audit is designed to be a comprehensive review and&lt;br /&gt;
analysis of your business’s IT infrastructure. It identifies threats and&lt;br /&gt;
vulnerabilities, exposing weaknesses and high-risk practices.&lt;br /&gt;
Regulations such as the EU GDPR (General Data Protection Regulation) can&lt;br /&gt;
impose hefty penalties in the event of a breach that results in&lt;br /&gt;
exploited data. A cyber security audit will help mitigate the&lt;br /&gt;
consequences of a breach and demonstrate that your organization has&lt;br /&gt;
taken the necessary steps to protect client and company data. &amp;lt;ref name=&amp;quot;cyforsecure&amp;quot;&amp;gt;Cyfor Secure, &amp;quot;What is a Cyber Security Audit and how can it help your organisation?&amp;quot;. Available: https://cyforsecure.co.uk/services/cyber-assessment/cyber-security-audit/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cybersecurity compliance is the organizational risk management method&lt;br /&gt;
aligned with pre-defined security measures &amp;amp;amp; controls on how data&lt;br /&gt;
confidentiality is ensured by its administrative procedures.&amp;lt;ref name=&amp;quot;nordlayer&amp;quot;&amp;gt;NordLayer, &amp;quot;Cybersecurity compliance: Everything you need to know&amp;quot;. Available: https://nordlayer.com/blog/cybersecurity-compliance-everything-you-need-to-know/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
All needed skills are developed through courses and certification.&lt;br /&gt;
&lt;br /&gt;
===Entry-Level Incident Response Positions===&lt;br /&gt;
It is not always possible to advance to the position of incident&lt;br /&gt;
responder in a straight line. Many professionals advance from entry- to&lt;br /&gt;
mid-level positions before becoming a real incident responder or a&lt;br /&gt;
member of a computer emergency response team (CERT).&amp;lt;br /&amp;gt;&lt;br /&gt;
These are some examples: &amp;lt;ref name=&amp;quot;Infosec&amp;quot;&amp;gt;Infosec, &amp;quot;Incident Responder Career Roadmap: From Entry Level to Executive&amp;quot;. Available: https://resources.infosecinstitute.com/topic/incident-responder-career-roadmap-entry-level-executive/ [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;network-administrator&amp;quot;&amp;gt;Network administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;This position’s experience will help potential incident responders&lt;br /&gt;
develop networking skills. Attention to detail, as well as the ability&lt;br /&gt;
to sift through system configurations, site layouts, and general network&lt;br /&gt;
and communication setups, are essential in this field.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;system-administrator&amp;quot;&amp;gt;System administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Another crucial beginning point for an incident responder is to learn&lt;br /&gt;
how to manage resources inside your organization as well as user&lt;br /&gt;
behavior. Understanding the potential damage that users, inadequate&lt;br /&gt;
security setups, and ineffective IT policies and procedures can cause on&lt;br /&gt;
your network can provide prospective candidates with insight into the&lt;br /&gt;
human component of an incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;security-administrator&amp;quot;&amp;gt;Security administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In such a position, basic hacking skills, penetration testing, and&lt;br /&gt;
intrusion detection are all learned, which are crucial incident&lt;br /&gt;
responder skills when trying to replicate a breach or attack.&lt;br /&gt;
Understanding the paths a cybercriminal will take when attempting to&lt;br /&gt;
damage or obtain access to a system can greatly simplify the work of&lt;br /&gt;
reverse engineering the incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Mid-Level Incident Response Positions ===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5&lt;br /&gt;
id=&amp;quot;computer-security-incident-response-team-csirt-engineer&amp;quot;&amp;gt;Computer&lt;br /&gt;
security incident response team (CSIRT) engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;cyber-incident-responder&amp;quot;&amp;gt;Cyber incident responder&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-response-engineer&amp;quot;&amp;gt;Incident response&lt;br /&gt;
engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;While each of these positions is different, they generally require&lt;br /&gt;
very similar skills and characteristics in a candidate. At this level,&lt;br /&gt;
personal characteristics such as problem solving, time management, and&lt;br /&gt;
even presentation skills become more crucial as one’s career evolves&lt;br /&gt;
into a management-facing role.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Technical skills include the ability to identify and minimize threats&lt;br /&gt;
while maintaining communication with management and the rest of your&lt;br /&gt;
team. Data analysis and evidence gathering become increasingly crucial,&lt;br /&gt;
and the circumstances in which your services are deployed get more&lt;br /&gt;
serious.&amp;lt;/p&amp;gt;&lt;br /&gt;
Problem-solving skills are crucial at this level of incident&lt;br /&gt;
response, and as the stakes rise, so does the pressure in each&lt;br /&gt;
situation. At this level, programming abilities are essential since&lt;br /&gt;
incident responders may be needed to reverse engineer malicious code or&lt;br /&gt;
even create patches for vulnerable network applications or services. &amp;lt;ref name=&amp;quot;coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated]&amp;quot;. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Senior-Level Incident Response Positions===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;intrusion-detection-specialist&amp;quot;&amp;gt;Intrusion detection&lt;br /&gt;
specialist:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;A CISSP certification might help a potential candidate in preparing&lt;br /&gt;
for the profession. The role of an intrusion detection specialist is to&lt;br /&gt;
find and stop any unwanted communications.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-manager&amp;quot;&amp;gt;Incident manager:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Expected to plan, oversee, manage, and supervise all incident&lt;br /&gt;
response team actions. Is in charge of reporting all current events to&lt;br /&gt;
senior management and stakeholders, as well as acting as the technical&lt;br /&gt;
lead on active incidents for incident responders. Prepares threat and&lt;br /&gt;
impact assessments and reports them known to management.&amp;lt;ref name=&amp;quot;coursera&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Certificates== &lt;br /&gt;
There is a vast number of different certificates and the road map to&lt;br /&gt;
being a certified professional could be very different&amp;lt;ref name=&amp;quot;Coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated],&amp;quot; [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;NICCS&amp;quot;&amp;gt;NICCS, &amp;quot;Cybersecurity Certifications,&amp;quot; [Online]. Available: hhttps://niccs.cisa.gov/about-niccs/cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt; . One possible&lt;br /&gt;
approach is to start with basic certificates from the different branches&lt;br /&gt;
of service and move to more specific and demanding focused&lt;br /&gt;
certification. Also, some jobs require certain clearances, either from&lt;br /&gt;
industry, or from the government. One small selection of different&lt;br /&gt;
possible certificates is brought out in following paragraphs.&lt;br /&gt;
&lt;br /&gt;
Security+ is a CompTIA certification that is considered a basic cert&lt;br /&gt;
among cybersecurity professionals. It covers the topics of risk&lt;br /&gt;
management and threat assessment.&lt;br /&gt;
Network+ is also offered by CompTIA this certification (like the name&lt;br /&gt;
implies) focuses on networking infrastructure and operations. It is&lt;br /&gt;
considered a foundational certification.&lt;br /&gt;
The Certified Information Systems Security Professional (CISSP) is a&lt;br /&gt;
more advanced certification designed for cybersecurity professionals&lt;br /&gt;
with at least five years of work experience. The certification covers&lt;br /&gt;
topics such as architecture, engineering, and management.&amp;lt;/p&amp;gt;&lt;br /&gt;
The Certified Ethical Hacker (CEH) certification is also considered a&lt;br /&gt;
more advanced cert because it generally requires that applicants have&lt;br /&gt;
multiple years of work experience. The goal of an ethical hacker&lt;br /&gt;
certification is to be able to understand how cyber attacks unfold in&lt;br /&gt;
order to improve threat assessment and mitigation skills.&amp;lt;ref name=&amp;quot;cyberguide&amp;quot;&amp;gt;Cybersecurity Guide, &amp;quot;How to become a cybersecurity specialist&amp;quot;, [Online]. Available: https://cybersecurityguide.org/careers/security-specialist/. [Accessed 27 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
This is definitely not all, when one looks for more information, following link could be searched, to get more in depth knowledge about&lt;br /&gt;
different possibilities.&lt;br /&gt;
 &lt;br /&gt;
Hereby, with the help of this matrix a possible taxonomy of different 436 listed certificates in branches are&lt;br /&gt;
presented.&amp;lt;ref name=&amp;quot;Pauljeremy&amp;quot;&amp;gt;&amp;quot;Cybersecurity Roadmap,&amp;quot; [Online]. Available: https://pauljerimy.com/2020/10/12/scr-oct-2020-update/. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:analystimage5.png|1000px|thumb|Certificate matrix &amp;lt;ref&amp;gt;&amp;quot;Certification roadmap&amp;quot;. Available at https://pauljerimy.com/security-certification-roadmap&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
=== Communication and Network Security===&lt;br /&gt;
Communication and network security covers the ability to secure&lt;br /&gt;
communication channels and networks. Topics include secure and converges&lt;br /&gt;
protocols, wireless networks, cellular networks, hardware operations&lt;br /&gt;
(warranty and redundant power), and third-party connectivity. IP&lt;br /&gt;
networking are also included in this domain.&lt;br /&gt;
===Identity and Access Management===&lt;br /&gt;
The identity and access management domain covers the attacks that&lt;br /&gt;
target the human gateway to gain access to data. Other topics include&lt;br /&gt;
ways to identify users with rights to access the information and&lt;br /&gt;
servers. Identity and access management covers the topics of&lt;br /&gt;
applications, Single sign-on authentication, privilege escalation,&lt;br /&gt;
Kerberos, rule-based or risk-based access control, proofing and&lt;br /&gt;
establishment of identity.&lt;br /&gt;
===Security Architecture and Engineering===&lt;br /&gt;
The security architecture and engineering domain covers important&lt;br /&gt;
topics concerning security engineering plans, designs and principles,&lt;br /&gt;
Topics include assessing and mitigating information system&lt;br /&gt;
vulnerabilities, fundamental concepts of security models and security&lt;br /&gt;
architectures in critical areas like access control. Cloud systems,&lt;br /&gt;
cryptography, system infiltrations (ransomware, fault-injection and&lt;br /&gt;
more) and virtualized systems are also covered in this domain.&lt;br /&gt;
===Asset Security===&lt;br /&gt;
The Asset Security domain deals with the issues related to the&lt;br /&gt;
collection, storage, maintenance, retention and destruction of data. It&lt;br /&gt;
also covers knowledge of different roles regarding data handling (owner,&lt;br /&gt;
controller and custodian) as well as data protection methods and data&lt;br /&gt;
states. Other topics include resource provision, asset classification&lt;br /&gt;
and data lifecycle management.&lt;br /&gt;
===Security and Risk Management===&lt;br /&gt;
The security and risk management domain covers general on skills&lt;br /&gt;
related to the implementation of user awareness programs as well as&lt;br /&gt;
security procedures. Emphasis is also placed on risk management&lt;br /&gt;
concerning the acquisition of new services, hardware and software&lt;br /&gt;
(supply chain). Other skills include social engineering defense&lt;br /&gt;
mechanisms.&lt;br /&gt;
===Security Assessment and Testing===&lt;br /&gt;
The security assessment and testing domain deals with all the&lt;br /&gt;
techniques and tools used to find system vulnerabilities, weaknesses and&lt;br /&gt;
potential areas of concern not addressed by security procedures and&lt;br /&gt;
policies. Attack simulations, vulnerability assessment, compliance&lt;br /&gt;
checks, and ethical disclosure also fall under this domain.&lt;br /&gt;
===Software Security===&lt;br /&gt;
The software development security domain deals with implementing&lt;br /&gt;
software-based security protocols within environment for which the IT&lt;br /&gt;
professional is responsible. Risk analysis, vulnerability identification&lt;br /&gt;
and auditing of source codes are all covered in this subset. Additional&lt;br /&gt;
topics include software-designed security, maturity models, development&lt;br /&gt;
methodologies, open-source and third-party development security.&lt;br /&gt;
===Security operations===&lt;br /&gt;
The security operations domain covers topics ranging from&lt;br /&gt;
investigations and digital forensic to detection and intrusion&lt;br /&gt;
prevention tools, sandboxing and firewalls. Topics include user and&lt;br /&gt;
entity behavior analytics, threat intelligence (threat hunting and&lt;br /&gt;
threat feeds) log management, artifacts (mobile, computer and network),&lt;br /&gt;
machine learning and AI-based tools, penetration testing, and&lt;br /&gt;
exploitation development. These for sub-domains are lister here.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Incident Handling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Penetration Testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Exploitation&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Education==&lt;br /&gt;
[[File:Analystimage7.png|400px|thumb|Comparison degree vs Certificate &amp;lt;ref&amp;gt;&amp;quot;Comparison Table&amp;quot;. Available at https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
The entry level monitoring specialist is hired by Estonian&lt;br /&gt;
Information System Authority even if there is no formal IT education,&lt;br /&gt;
but readiness to learn and moderate knowledge of different operation&lt;br /&gt;
systems is enough to start the career. &amp;lt;ref name=&amp;quot;cv&amp;quot;&amp;gt;cv.ee, &amp;quot;SEIRESPETSIALIST - tule Eesti küberruumi valvuriks!&amp;quot;. Available: https://www.cv.ee/en/vacancy/792782/riigi-infosusteemi-amet/seirespetsialist-tule-eesti-kuberruumi-valvuriks [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Nevertheless, like most other high qualification careers jobs falling&lt;br /&gt;
under the cybersecurity specialist category require some form of formal&lt;br /&gt;
education. However, since cybersecurity specialist jobs can fall across&lt;br /&gt;
a wide spectrum of job descriptions and responsibilities, it is possible&lt;br /&gt;
to obtain a specialist job after completing many levels of different&lt;br /&gt;
computer related education.&lt;br /&gt;
&lt;br /&gt;
If one is looking for a cybersecurity related education, for example&lt;br /&gt;
in EU, 137 courses/programs could be found that relate to keyword IT or&lt;br /&gt;
cybersecurity. &amp;lt;ref name=&amp;quot;enisa&amp;quot;&amp;gt;ENISA (European Union Agency for Cybersecurity), &amp;quot;Cybersecurity Education-Cybersecurity Higher Education Database&amp;quot;. Available: https://www.enisa.europa.eu/topics/cybersecurity-education/education-map/education-courses [Accessed 26 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Also, there is a great amount of discussion, if cyber security&lt;br /&gt;
professional should have a degree or would be certification just enough.&lt;br /&gt;
One interesting table is produces by Franklin University that compares&lt;br /&gt;
benefits and/or drawbacks of each type of credential.&amp;lt;ref name=&amp;quot;franklin&amp;quot;&amp;gt;Franklin University, &amp;quot;Is Getting a Master&#039;s Degree in Cyber Security Worth It?&amp;quot;. Available: https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Certifications are generally good for people with little practical&lt;br /&gt;
experience because they are known quantities in the industry and can&lt;br /&gt;
help you get your foot in the door. They set a minimum knowledge bar.&lt;br /&gt;
But some certifications are viewed more favorably than others.&lt;br /&gt;
Certifications with renewal requirements are viewed better by hiring&lt;br /&gt;
managers, but they also more costly in the long run because of the need&lt;br /&gt;
for continuing education. Certifications are also good for showing&lt;br /&gt;
in-depth expertise in a specialization within cybersecurity. Depending&lt;br /&gt;
on your career goals, it may be advantageous to have a master’s&lt;br /&gt;
degree—which shows your breadth of knowledge, critical thinking and&lt;br /&gt;
leadership skills—and a certificate—which shows specific skill&lt;br /&gt;
competency.&amp;lt;ref name=&amp;quot;franklin&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
As IT (Cyber) Security is still a relatively young discipline,&lt;br /&gt;
universities and colleges are still figuring out which is the best&lt;br /&gt;
approach for their degrees. Study programmes and curricula in Cyber&lt;br /&gt;
Security are different. In general, here are the duration of Cyber&lt;br /&gt;
Security degrees:&lt;br /&gt;
&amp;lt;ref name=&amp;quot;studyportal&amp;quot;&amp;gt;Studyportals, &amp;quot;Why You Should Study a Cyber Security Degree in 2022&amp;quot;. Available: https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Bachelor’s degrees in Cyber Security take 3 or 4 years in most&lt;br /&gt;
countries.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Master’s courses in Cyber Security take between 1-2 years to&lt;br /&gt;
complete.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;PhD programmes in Cyber Security last 3-5 years. Some only take 1&lt;br /&gt;
or 2 years, but they are less common.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Generalization could me made that on bachelor level the general&lt;br /&gt;
knowledge about the cyber issues are obtained. On master level the&lt;br /&gt;
specialization courses are taken and the person can choose more specific&lt;br /&gt;
topics to study. It is on master level where strengths of the cyber&lt;br /&gt;
specialist can be developed further and up-do date knowledge obtained in&lt;br /&gt;
specifics. PhD is serious science and involves teaching, lot of&lt;br /&gt;
scientific work and writing for publications.&lt;br /&gt;
&lt;br /&gt;
==Salary==&lt;br /&gt;
&amp;lt;p&amp;gt;Even if the salary can be very different, compared to the skills and&lt;br /&gt;
experience, an generalization can be made. Cyber Security professionals&lt;br /&gt;
in CSIRT, and in other entities earn quite well, from the start. First,&lt;br /&gt;
some comparison from the United States. The average CSIRT analyst salary&lt;br /&gt;
in the USA is $97,500 per year or $50 per hour. Entry level positions&lt;br /&gt;
start at $48,875 per year while most experienced workers make up to&lt;br /&gt;
$135,373 per year.&amp;lt;ref name=&amp;quot;talent&amp;quot;&amp;gt;talent.com, &amp;quot;Csirt Analyst average salary in USA 2022&amp;quot;. Available: https://www.talent.com/salary?job=csirt+analyst [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There are multiple positions you can occupy in this field. They have&lt;br /&gt;
in common great salaries and high demand for technical skills, attention&lt;br /&gt;
to details, problem-solving mentality, and the ability to analyze risks.&lt;br /&gt;
Here are the average annual salaries in the United States, according to&lt;br /&gt;
Payscale: &amp;lt;ref name=&amp;quot;studyportal&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Cryptographer – 100,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Information Security Officer – 91,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Assessor – 90,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Engineer – 88,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Penetration Tester – 81,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Forensics Expert – 71,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Administrator – 65,000 USD&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
When looking into salaries in Estonia, one can find that there is a&lt;br /&gt;
discussion that private sector is taking a toll from the public sector,&lt;br /&gt;
and that the salaries in important agencies, as Information System&lt;br /&gt;
Authority loose their employees to the better paid positions in private&lt;br /&gt;
sector.&amp;lt;ref name=&amp;quot;digigeenius&amp;quot;&amp;gt;DiGi Geenius, &amp;quot;Kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad&amp;quot;. Available: https://digi.geenius.ee/rubriik/uudis/kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad/ [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;tehnika&amp;quot;&amp;gt;Postimees, &amp;quot;Riigi-it-tootajate-palgamaarad-kasvasid&amp;quot;. Available: https://tehnika.postimees.ee/6887428/riigi-it-tootajate-palgamaarad-kasvasid [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
But there is also a different view that average private sector worker&lt;br /&gt;
could be hired as a top specialist in public sector and then the payment&lt;br /&gt;
is higher. Nevertheless, it seems that the average payment in cyber&lt;br /&gt;
security sector is any way higher that in other parts of the&lt;br /&gt;
e-services. &amp;lt;ref name=&amp;quot;digigeenius2&amp;quot;&amp;gt;DiGi Geenius, &amp;quot;5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka&amp;quot;. Available: https://digi.geenius.ee/rubriik/uudis/5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==SOC==&lt;br /&gt;
&amp;lt;p&amp;gt;A SOC is a facility where an organization’s network, applications,&lt;br /&gt;
and endpoints are monitored and defended. The term was adapted from&lt;br /&gt;
network operations centers (NOCs), where large telecommunication or&lt;br /&gt;
corporate networks are monitored. When network security became more of a&lt;br /&gt;
concern, security teams were formed within the NOCs, and eventually spun&lt;br /&gt;
off into larger organizations of their own as the responsibilities of&lt;br /&gt;
security teams grew increasingly complex and specialized. The security&lt;br /&gt;
staff working in a security operations center are often called the SOC&lt;br /&gt;
team.&amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;Exabeam, &amp;quot;CSIRT&amp;quot;. Available: https://www.exabeam.com/incident-response/csirt/ [Accessed 28 APr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;Functions of the SOC team include, but are not limited to:&amp;lt;ref name=&amp;quot;trellix&amp;quot;&amp;gt;Trellix, &amp;quot;What Is a Security Operations Center (SOC)?&amp;quot;. Available: https://www.trellix.com/en-us/security-awareness/operations/what-is-soc.html [Accessed 30 APr 2022].&amp;lt;/ref&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ol type=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Taking inventory of resources, to get a better understanding of the&lt;br /&gt;
structure they are protecting.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintanence of the system, by constantly making updates and adding&lt;br /&gt;
safeguards.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Monitoring the network for abnormalities with special tools.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Threat analysis of new attacks and vulnerabilities.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Responding to attacks, by acting as “first responders”. The SOC team&lt;br /&gt;
will shut down and/or isolate endpoints, deleting files and lowering the&lt;br /&gt;
impact as fast as possible.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Recovery of system stability and lost data. This may be done using&lt;br /&gt;
backups, restarting endpoints or reconfiguring systems.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Logging all actions on the system, to be later used for analysis or&lt;br /&gt;
forensics after an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigating the root cause of an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Auditing their own actions, to be in line with regulations of the&lt;br /&gt;
organization, industry or governing body.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==CSIRT==&lt;br /&gt;
&amp;lt;p&amp;gt;A CSIRT is a group that responds to security incidents when they&lt;br /&gt;
occur. Key responsibilities of a CSIRT include:&lt;br /&gt;
&amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
===Creating and maintaining an incident response plan (IRP)===&lt;br /&gt;
An incident response plan (IRP) is a set of written instructions for&lt;br /&gt;
detecting, responding to and limiting the effects of an information&lt;br /&gt;
security event. Incident response plans provide instructions for&lt;br /&gt;
responding to many potential scenarios, including data breaches, denial&lt;br /&gt;
of service/distributed denial of service attacks, firewall breaches,&lt;br /&gt;
virus or malware outbreaks or insider threats. Without an incident&lt;br /&gt;
response plan in place, organizations may either not detect the attack&lt;br /&gt;
in the first place, or not follow proper protocol to contain the threat&lt;br /&gt;
and recover from it when a breach is detected.&lt;br /&gt;
&lt;br /&gt;
https://www.stratacore.com/incidentresponseplan&lt;br /&gt;
===Investigating and analyzing incidents===&lt;br /&gt;
CSIRTs are also involved in improvement activities. After major&lt;br /&gt;
computer security incidents occur, or when incidents are not handled in&lt;br /&gt;
a timely or effective manner, a CSIRT will generally perform a&lt;br /&gt;
postmortem of the incident and its response. This postmortem will&lt;br /&gt;
identify the strengths and weakness of the response effort. Such reviews&lt;br /&gt;
can identify weaknesses and holes in systems, infrastructure defenses,&lt;br /&gt;
or policies that allowed the incident to take place. It can also&lt;br /&gt;
identify problems with communication channels, interfaces, and&lt;br /&gt;
procedures that inhibited the efficient resolution of the reported&lt;br /&gt;
problem.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.cisa.gov/uscert/bsi/articles/best-practices/incident-management/defining-computer-security-incident-response-teams&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Managing internal communications and updates during or immediately after incidents occur===&lt;br /&gt;
===Communicating with employees, shareholders, customers, and the press about incidents as needed===&lt;br /&gt;
&amp;lt;p&amp;gt;There are various services within the CSIRT Services Framework that&lt;br /&gt;
address communications, as they relate to security operations and&lt;br /&gt;
incident response services. Some of these include Information Security&lt;br /&gt;
Incident Coordination, Crisis Management Support, Vulnerability&lt;br /&gt;
Disclosure, Situational Awareness Communication, and Awareness Building,&lt;br /&gt;
to name a few. Sharing information and communicating with the general&lt;br /&gt;
public and/or your constituency is appropriate in many different&lt;br /&gt;
scenarios. These can range from proactive communications to reactive&lt;br /&gt;
communications. Each scenario may be unique, and careful consideration&lt;br /&gt;
should be given to when to release information to the public and what&lt;br /&gt;
information should be released.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;https://resources.sei.cmu.edu/asset_files/Handbook/2021_002_001_651819.pdf&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Remediating incidents===&lt;br /&gt;
Threat remediation is a strong and capable tool for fighting the&lt;br /&gt;
cyber security compromises. As the word ‘remedy’ suggests, remediation&lt;br /&gt;
process involves the treatment of a security breach. With the&lt;br /&gt;
remediation practices, your cyber security team is able to eliminate&lt;br /&gt;
suspicious activities and malicious attacks in the form of malware,&lt;br /&gt;
ransomware, phishing and such. Even if you ‘kill’ the suspicious&lt;br /&gt;
activity, the attackers can remain in your systems. If you want to&lt;br /&gt;
contaminate and end the problem for good, your remediation processes&lt;br /&gt;
must involve the detection of the cause. &amp;lt;ref name=&amp;quot;logsign&amp;quot;&amp;gt;Logsign, &amp;quot;What-is-remediation-in-cyber-security&amp;quot;. Available: https://www.logsign.com/blog/what-is-remediation-in-cyber-security/. [Accessed 28 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Recommending technology, policy, governance, and training changes after security incidents===&lt;br /&gt;
After all these actions, the SCIRT must contribute to the development&lt;br /&gt;
of better policies, practices and has to recommend improvements. They&lt;br /&gt;
are not working in the vacuum and their work has to create new and&lt;br /&gt;
better standards for cyber security. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;Exabeam, &amp;quot;CSIRT&amp;quot;. Available: https://www.exabeam.com/incident-response/csirt/ [Accessed 28 APr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==CERT==&lt;br /&gt;
&amp;lt;p&amp;gt;The term “computer emergency response team” was coined in 1988. In&lt;br /&gt;
response to the Morris worm attack that impacted thousands of servers on&lt;br /&gt;
the Internet, DARPA funded the formation of the Computer Emergency&lt;br /&gt;
Response Team Coordination Center (CERT-CC) at Carnegie Mellon&lt;br /&gt;
University. The goal of CERT-CC was to help protect the internet by&lt;br /&gt;
collecting and disseminating information on critical security&lt;br /&gt;
vulnerabilities. Several other countries formed similar centers using&lt;br /&gt;
the same acronym (despite threats of legal action by Carnegie Mellon for&lt;br /&gt;
trademark infringement). Now the term CERT refers to any emergency&lt;br /&gt;
response team that deals with cyber threats. Many people use CERT-CC&lt;br /&gt;
interchangeably with CSIRT, though the charter of a CERT is information&lt;br /&gt;
sharing in order to help other response teams respond to threats against&lt;br /&gt;
their own infrastructure.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In general, the designation of CERT is helpful in applying real-world&lt;br /&gt;
solutions to various cybersecurity problems. They may be government&lt;br /&gt;
contractors or employees of a major corporation. For example, the U.S.&lt;br /&gt;
Computer Emergency Readiness Team (US-CERT) operates under the U.S.&lt;br /&gt;
Department of Homeland Security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.techopedia.com/definition/31003/computer-emergency-response-team-cert&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In Estonia CERT is designated as CERT-EE. It was established in 2006,&lt;br /&gt;
as an organization responsible for the management of security incidents&lt;br /&gt;
in .ee computer networks. It is also a national contact point for&lt;br /&gt;
international co-operation in the field of IT security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ria.ee/en/cyber-security/cert-ee.html&amp;lt;/p&amp;gt;&lt;br /&gt;
==Difference between SOC/CSIRT/CERT==&lt;br /&gt;
[[File:analystimage3.png|300px|thumb|SOC/CSIRT/CERT &amp;lt;ref name=&amp;quot;exabeam&amp;gt;&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
How CSIRTs differ from CERTs and SOCs. There are overlapping&lt;br /&gt;
responsibilities between a community emergency response team (CERT),&lt;br /&gt;
computer security incident response team (CSIRT), and security&lt;br /&gt;
operations center (SOC). To add to this confusion, frequently, the terms&lt;br /&gt;
CERT and CSIRT are used interchangeably, despite the important&lt;br /&gt;
differences. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Understand the primary roles and characteristics of a CERT, CSIRT, and SOC.==&lt;br /&gt;
[[File:analystimage4.png|600px|thumb|Primary Roles of CERT, CSIRT, and SOC&amp;lt;ref name=&amp;quot;exabeam&amp;gt;&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&amp;lt;p&amp;gt;So, using strict definitions, a CERT collects and disseminates&lt;br /&gt;
security information, typically for the benefit of a country or an&lt;br /&gt;
industry. A CSIRT is a cross-functional team that responds to incidents&lt;br /&gt;
on behalf of a country or an organization. A SOC is where a country or&lt;br /&gt;
organization monitors and defends its network, servers, applications,&lt;br /&gt;
and endpoints.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Future==&lt;br /&gt;
&amp;lt;p&amp;gt;And the Cyber security problem is only getting bigger. According to a&lt;br /&gt;
report published by Accenture, the number of cyber security breaches&lt;br /&gt;
increased by 11 percent from 2017 to 2018. The cost of such breaches is&lt;br /&gt;
astronomical–about $600 billion worldwide, according to the Economic&lt;br /&gt;
Impact of Cybercrime report.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Job projections for cybersecurity are staggering. The Bureau of Labor&lt;br /&gt;
Statistics in US predicts that careers in the cybersecurity field will&lt;br /&gt;
grow by 32% by 2028. That makes cybersecurity one of the top 10&lt;br /&gt;
fastest-growing jobs in the country. In the United States alone, jobs&lt;br /&gt;
for Information Security Analysts are expected to grow by 15% by&lt;br /&gt;
2024.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Most likely this trend is also similar in other countries.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When checking Estonian job portals, there is a constant need for&lt;br /&gt;
people for cyber security related positions. Also, linkedin search gives&lt;br /&gt;
approximately 30 vacancies immediately. There are banks, logistics&lt;br /&gt;
companies, e-shops, and software producers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://ee.linkedin.com/jobs/cyber-security-jobs?countryRedirected=1&amp;amp;amp;position=1&amp;amp;amp;pageNum=0&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Trends that affect companies create need for constant cyber security&lt;br /&gt;
services. Increasing number of home/remote offices require secure&lt;br /&gt;
corporate networks and security of remote devices. One example is from&lt;br /&gt;
this year, when sloppy remote desktop set-up paralyzed systems of 17&lt;br /&gt;
companies.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.aripaev.ee/uudised/2022/04/20/ria-lohakas-kaugtoolaua-seadistus-halvas-martsis-vahemalt-17-juhul-ettevotete-it-susteemid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Also, no service can exists without robust infrastructure - servers,&lt;br /&gt;
databases, applications. As all previously mentioned devices and&lt;br /&gt;
services are at constant scanning and surveillance. So, the breach&lt;br /&gt;
detection and immediate action demands 24/7 services. Even if lot of&lt;br /&gt;
things could be automated, there is a need for human specialists (at&lt;br /&gt;
least, at the moment). Third growing field is also a forensic&lt;br /&gt;
investigation, as every attack must be investigated in order to be ready&lt;br /&gt;
to repel next attacks. So data recovery and evidence collection is&lt;br /&gt;
another important field of work that need skilled and professional&lt;br /&gt;
workers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Even, if the specifics of the entity, be it CSIRT, CERT or SOC, are&lt;br /&gt;
different, the fundamentals of the work are the same. Professional&lt;br /&gt;
knowledge of the networks, operational systems, hardware, scripting, and&lt;br /&gt;
several other wider IT related knowledge is needed. As there is no&lt;br /&gt;
single way to reach to it, every single person can find one’s strongest&lt;br /&gt;
sides and develop them with knowledge of weaker side, in order to know,&lt;br /&gt;
when to as for help.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/body&amp;gt;&lt;br /&gt;
&amp;lt;/html&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mavald</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142252</id>
		<title>Hiring a Cyber Security Incident Analyst</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142252"/>
		<updated>2022-05-01T16:00:06Z</updated>

		<summary type="html">&lt;p&gt;Mavald: /* Understand the primary roles and characteristics of a CERT, CSIRT, and SOC. */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==A Cyber Security Incident Analyst==&lt;br /&gt;
&lt;br /&gt;
[[File:image1.png|600px|thumb|Job advertisement &amp;lt;ref&amp;gt;&amp;quot;Job Advertisement&amp;quot;. Available at https://www.projectpeople.com/jobs/&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
===Cyber security incident analyst in SOC/CSIRT/CERT===&lt;br /&gt;
This article delves into the job title of Cyber Security Incident&lt;br /&gt;
Analyst and provides an overview of the acronyms SOC/CSIRT/CERT. A brief&lt;br /&gt;
history of the job is discussed here, as well as a possible career path,&lt;br /&gt;
education, experience, and other characteristics required for work in&lt;br /&gt;
computer security-related organizations. The article also provides a&lt;br /&gt;
brief history of SOC/CSIRT/CERT, as well as a comparison of their&lt;br /&gt;
differences and similarities.&lt;br /&gt;
===Cyber Security Incident Analyst Skill Set===&lt;br /&gt;
What skill set is expected from the Cyber Security Incident Analyst? Below written lines are taken from the same job advertisement depicted&lt;br /&gt;
on the left side of this article:&lt;br /&gt;
As a Security Incident Analyst your responsibilities will include:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Continuous monitoring of security tooling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Performing regular and ad-hoc vulnerability assessments&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Carrying out ‘spot checks’&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Reporting vulnerabilities to the PVG via the alerts system&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintaining and documenting logging systems&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Developing centralized logging, reporting and intelligence&lt;br /&gt;
platforms&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;‘Light touch’ penetration testing with open source tooling&lt;br /&gt;
(Metasploit)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Knowledge &amp;amp;amp; Experience required:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;SOC, CSIRT or CERT operational environment experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Windows / Linux experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TCP /IP networking protocol knowledge&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience reviewing and analyzing Security Events from various&lt;br /&gt;
monitoring and logging sources&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience in website and web application security assessment or&lt;br /&gt;
penetration testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience of using Metasploit&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Scripting knowledge using BASH, Python, Perl, Ruby&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Skills in Host and Network Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
As one can see the description of the duties is wide and also the&lt;br /&gt;
knowledge and experience that is required is noteworthy. So, where to&lt;br /&gt;
start to find out the way to get this kind of knowledge and&lt;br /&gt;
expertize.&lt;br /&gt;
===Possible career path===&lt;br /&gt;
Next part of the paper is aiming to depict a possible ways, how to&lt;br /&gt;
develop oneself, and move along the career pathway in cybersecurity&lt;br /&gt;
field. Topics of development, education, experience and certification&lt;br /&gt;
are covered.&lt;br /&gt;
[[File:analystimage2.png|1000px|thumb|Career path &amp;lt;ref&amp;gt;&amp;quot;Possible Career Path&amp;quot;. Available at https://www.cyberseek.org/pathway.html&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
===Junior/Senior===&lt;br /&gt;
Start with an entry-level job in IT. Hands-on experience is often the&lt;br /&gt;
most effective way to prepare for certification exams. Start&lt;br /&gt;
accumulating work experience with an entry-level role as a cybersecurity&lt;br /&gt;
analyst. Many cybersecurity professionals start off in more general IT&lt;br /&gt;
roles. The skills, practices, and technologies you’ll use as a&lt;br /&gt;
cybersecurity professional will continue to evolve along with computer&lt;br /&gt;
and network technology. The desire to learn, ability to problem solve,&lt;br /&gt;
and attention to detail will serve you well in this field. Other, more&lt;br /&gt;
technical skills and technologies to learn include:&amp;lt;ref name=&amp;quot;certification&amp;quot;&amp;gt;Popular Cyber Security Certificates [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications  [Accessed 25 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====SIEM tools (security information and event management)====&lt;br /&gt;
Security Information and Event Management (SIEM) is a set of tools&lt;br /&gt;
and services offering a holistic view of an organization’s information&lt;br /&gt;
security. SIEM works by combining two technologies:&lt;br /&gt;
&amp;lt;li&amp;gt;Security information management (SIM), which collects data from log&lt;br /&gt;
files for analysis and reports on security threats and events, and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;security event management (SEM), which conducts real-time system&lt;br /&gt;
monitoring, notifies network admins about important issues and&lt;br /&gt;
establishes correlations between security events. There are a number of&lt;br /&gt;
security information and event management solutions on the market.&lt;br /&gt;
ArcSight ESM, IBM QRadar and Splunk are among the most popular. &amp;lt;ref name=&amp;quot;SIEM&amp;quot;&amp;gt;Application security, SIEM [Online]. Available: https://www.imperva.com/learn/application-security/siem/. [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Firewalls, Intrusion Detection Systems (IDS), and Intrusion Prevention Systems(IPS)====&lt;br /&gt;
Firewalls can be two types, hardware and software firewalls. Software&lt;br /&gt;
firewall is a firewall that is installed on a computer or server, and&lt;br /&gt;
tasked with network security. It works with a wide variety of other&lt;br /&gt;
technology security solutions to provide more robust and cohesive&lt;br /&gt;
security for enterprises of all sizes. When a software firewall is&lt;br /&gt;
installed on a server, it opens up like an umbrella of protection over&lt;br /&gt;
all other computers connected to the network. It is able to monitor both&lt;br /&gt;
incoming and outgoing traffic for potential risk or suspicious user&lt;br /&gt;
behavior, and also makes setting security policies much easier, faster&lt;br /&gt;
and more flexible. Hardware firewall is positioned between the network&lt;br /&gt;
and devices, allowing traffic to funnel through the firewall for a close&lt;br /&gt;
inspection and analysis. A hardware firewall, a term often&lt;br /&gt;
interchangeable with network or next-generation firewall, protects the&lt;br /&gt;
network gateways for an enterprise. Hardware firewall is physical&lt;br /&gt;
hardware, installed between network elements and connected devices, and&lt;br /&gt;
is tasked with filtering traffic for cyber threat to the network or&lt;br /&gt;
devices. Filtering out unauthorized or suspicious users based on traffic&lt;br /&gt;
analysis is one of the biggest benefits of hardware firewall. &amp;lt;ref name=&amp;quot;sangfor&amp;quot;&amp;gt;Sangfor, &amp;quot;What is Software Firewall? Difference between Hardware Firewall and Software Firewall, [Online]. Available: https://www.sangfor.com/blog/cybersecurity/what-is-software-firewall-difference-between-hardware-firewall-and-software-firewall [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems&lt;br /&gt;
(IPS) are both parts of the network infrastructure. IDS/IPS compare&lt;br /&gt;
network packets to a cyberthreat database containing known signatures of&lt;br /&gt;
cyberattacks — and flag any matching packets. IDS doesn’t alter the&lt;br /&gt;
network packets in any way, whereas IPS prevents the packet from&lt;br /&gt;
delivery based on the contents of the packet, much like how a firewall&lt;br /&gt;
prevents traffic by IP address. &amp;lt;ref name=&amp;quot;Varonis&amp;quot;&amp;gt;Varonis, &amp;quot;What is Software Firewall? IDS vs. IPS: What is the Difference?, [Online]. Available: https://www.varonis.com/blog/ids-vs-ips [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Digital forensics====&lt;br /&gt;
Digital forensics is a branch of forensic science that focuses on&lt;br /&gt;
identifying, acquiring, processing, analyzing, and reporting on data&lt;br /&gt;
stored electronically. Electronic evidence is a component of almost all&lt;br /&gt;
criminal activities and digital forensics support is crucial for law&lt;br /&gt;
enforcement investigations. Electronic evidence can be collected from a&lt;br /&gt;
wide array of sources, such as computers, smartphones, remote storage,&lt;br /&gt;
unmanned aerial systems, shipborne equipment, and more.&amp;lt;ref name=&amp;quot;interpol&amp;quot;&amp;gt;Interpol, &amp;quot;Digital forensics&amp;quot;. Available: https://www.interpol.int/How-we-work/Innovation/Digital-forensics. [Accessed 28 4 2022].&amp;lt;/ref&amp;gt; &lt;br /&gt;
Investigative process of digital forensics can be divided into several stages. There are four major stages: preservation, collection,&lt;br /&gt;
examination, and analysis. All these four stages need a deep understanding of computers, technology across a broad spectrum, and cybersecurity principles and&lt;br /&gt;
practices, a working knowledge of computers, networks, and coding, in-depth investigative abilities, critical-thinking skills and analytical talent the ability to effectively communicate and work with a&lt;br /&gt;
wide range of people. &amp;lt;ref name=&amp;quot;ecpi&amp;quot;&amp;gt;&amp;quot;Digital forensics&amp;quot;. Available: https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me. [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Mobile device management====&lt;br /&gt;
Mobile device management (MDM) is software that allows IT&lt;br /&gt;
administrators to control, secure and enforce policies on smartphones,&lt;br /&gt;
tablets and other endpoints. Mobile device management software emerged&lt;br /&gt;
in the early 2000s as a way to control and secure the personal digital&lt;br /&gt;
assistants and smartphones that business workers began to use. The&lt;br /&gt;
consumer smartphone boom that started with the launch of the Apple&lt;br /&gt;
iPhone in 2007 led to the bring your own device (BYOD) trend, which&lt;br /&gt;
fueled further interest in MDM.&amp;lt;ref name=&amp;quot;techtarget&amp;quot;&amp;gt;Techtarget, &amp;quot;Mobile Device Management&amp;quot;. Available: https://www.techtarget.com/searchmobilecomputing/definition/mobile-device-management [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Data management====&lt;br /&gt;
Sometimes the data management is neglected, but this part has a&lt;br /&gt;
crucial role when learning for good cyber security practices. Majority&lt;br /&gt;
of cyber security programs include a special courses on data management.&lt;br /&gt;
Data management is a method of organizing and maintaining data processes&lt;br /&gt;
that are required in almost every business operations. The benefits of&lt;br /&gt;
data management can be found accounting, statistics, logistics planning&lt;br /&gt;
and other disciplines including corporate computing.&amp;lt;ref name=&amp;quot;GlobalUni&amp;quot;&amp;gt;Global Universities, &amp;quot;MSc Data Management and Cyber Security&amp;quot;. Available: https://globaluniversities.in/msc-data-management-cyber-security. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Data governance (and management) play a fundamental role in&lt;br /&gt;
protecting an organization’s data. Ensuring that the right people have&lt;br /&gt;
the right access and that appropriate security controls are in place to&lt;br /&gt;
protect each system or service, based on the criticality or sensitivity&lt;br /&gt;
of the data sets these contain. &amp;lt;ref name=&amp;quot;CyberMagazine&amp;quot;&amp;gt;Cyber Security Magazine, &amp;quot;The Role of Data Governance in Cybersecurity&amp;quot;. Available: https://cybersecurity-magazine.com/the-role-of-data-governance-in-cybersecurity/?utm_source=rss&amp;amp;amp;utm_medium=rss&amp;amp;amp;utm_campaign=the-role-of-data-governance-in-cybersecurity. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Application security development====&lt;br /&gt;
Application security describes security measures at the application&lt;br /&gt;
level that aim to prevent data or code within the app from being stolen&lt;br /&gt;
or hijacked. It encompasses the security considerations that happen&lt;br /&gt;
during application development and design, but it also involves systems&lt;br /&gt;
and approaches to protect apps after they get deployed. Application&lt;br /&gt;
security may include hardware, software, and procedures that identify or&lt;br /&gt;
minimize security vulnerabilities.&amp;lt;ref name=&amp;quot;vmware&amp;quot;&amp;gt;VmWare, &amp;quot;What is application security?&amp;quot;. Available: https://www.vmware.com/topics/glossary/content/application-security.html [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Application security development is important to ensure that your&lt;br /&gt;
application is free from coding errors and bugs. And controls the risk&lt;br /&gt;
and helps safeguard against security vulnerabilities. Application&lt;br /&gt;
security development is the process of making applications more secure&lt;br /&gt;
by finding and fixing security vulnerabilities. This is often done by&lt;br /&gt;
enforcing software security best practices and using application&lt;br /&gt;
security testing tools. &lt;br /&gt;
&amp;lt;ref name=&amp;quot;perforce&amp;quot;&amp;gt;Perforce, &amp;quot;Application Security Development Best Practices&amp;quot;. Available: https://www.perforce.com/blog/kw/application-security-development-best-practices. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Audit and compliance knowledge====&lt;br /&gt;
A cyber security audit is designed to be a comprehensive review and&lt;br /&gt;
analysis of your business’s IT infrastructure. It identifies threats and&lt;br /&gt;
vulnerabilities, exposing weaknesses and high-risk practices.&lt;br /&gt;
Regulations such as the EU GDPR (General Data Protection Regulation) can&lt;br /&gt;
impose hefty penalties in the event of a breach that results in&lt;br /&gt;
exploited data. A cyber security audit will help mitigate the&lt;br /&gt;
consequences of a breach and demonstrate that your organization has&lt;br /&gt;
taken the necessary steps to protect client and company data. &amp;lt;ref name=&amp;quot;cyforsecure&amp;quot;&amp;gt;Cyfor Secure, &amp;quot;What is a Cyber Security Audit and how can it help your organisation?&amp;quot;. Available: https://cyforsecure.co.uk/services/cyber-assessment/cyber-security-audit/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cybersecurity compliance is the organizational risk management method&lt;br /&gt;
aligned with pre-defined security measures &amp;amp;amp; controls on how data&lt;br /&gt;
confidentiality is ensured by its administrative procedures.&amp;lt;ref name=&amp;quot;nordlayer&amp;quot;&amp;gt;NordLayer, &amp;quot;Cybersecurity compliance: Everything you need to know&amp;quot;. Available: https://nordlayer.com/blog/cybersecurity-compliance-everything-you-need-to-know/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
All needed skills are developed through courses and certification.&lt;br /&gt;
&lt;br /&gt;
===Entry-Level Incident Response Positions===&lt;br /&gt;
It is not always possible to advance to the position of incident&lt;br /&gt;
responder in a straight line. Many professionals advance from entry- to&lt;br /&gt;
mid-level positions before becoming a real incident responder or a&lt;br /&gt;
member of a computer emergency response team (CERT).&amp;lt;br /&amp;gt;&lt;br /&gt;
These are some examples: &amp;lt;ref name=&amp;quot;Infosec&amp;quot;&amp;gt;Infosec, &amp;quot;Incident Responder Career Roadmap: From Entry Level to Executive&amp;quot;. Available: https://resources.infosecinstitute.com/topic/incident-responder-career-roadmap-entry-level-executive/ [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;network-administrator&amp;quot;&amp;gt;Network administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;This position’s experience will help potential incident responders&lt;br /&gt;
develop networking skills. Attention to detail, as well as the ability&lt;br /&gt;
to sift through system configurations, site layouts, and general network&lt;br /&gt;
and communication setups, are essential in this field.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;system-administrator&amp;quot;&amp;gt;System administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Another crucial beginning point for an incident responder is to learn&lt;br /&gt;
how to manage resources inside your organization as well as user&lt;br /&gt;
behavior. Understanding the potential damage that users, inadequate&lt;br /&gt;
security setups, and ineffective IT policies and procedures can cause on&lt;br /&gt;
your network can provide prospective candidates with insight into the&lt;br /&gt;
human component of an incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;security-administrator&amp;quot;&amp;gt;Security administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In such a position, basic hacking skills, penetration testing, and&lt;br /&gt;
intrusion detection are all learned, which are crucial incident&lt;br /&gt;
responder skills when trying to replicate a breach or attack.&lt;br /&gt;
Understanding the paths a cybercriminal will take when attempting to&lt;br /&gt;
damage or obtain access to a system can greatly simplify the work of&lt;br /&gt;
reverse engineering the incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Mid-Level Incident Response Positions ===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5&lt;br /&gt;
id=&amp;quot;computer-security-incident-response-team-csirt-engineer&amp;quot;&amp;gt;Computer&lt;br /&gt;
security incident response team (CSIRT) engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;cyber-incident-responder&amp;quot;&amp;gt;Cyber incident responder&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-response-engineer&amp;quot;&amp;gt;Incident response&lt;br /&gt;
engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;While each of these positions is different, they generally require&lt;br /&gt;
very similar skills and characteristics in a candidate. At this level,&lt;br /&gt;
personal characteristics such as problem solving, time management, and&lt;br /&gt;
even presentation skills become more crucial as one’s career evolves&lt;br /&gt;
into a management-facing role.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Technical skills include the ability to identify and minimize threats&lt;br /&gt;
while maintaining communication with management and the rest of your&lt;br /&gt;
team. Data analysis and evidence gathering become increasingly crucial,&lt;br /&gt;
and the circumstances in which your services are deployed get more&lt;br /&gt;
serious.&amp;lt;/p&amp;gt;&lt;br /&gt;
Problem-solving skills are crucial at this level of incident&lt;br /&gt;
response, and as the stakes rise, so does the pressure in each&lt;br /&gt;
situation. At this level, programming abilities are essential since&lt;br /&gt;
incident responders may be needed to reverse engineer malicious code or&lt;br /&gt;
even create patches for vulnerable network applications or services. &amp;lt;ref name=&amp;quot;coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated]&amp;quot;. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Senior-Level Incident Response Positions===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;intrusion-detection-specialist&amp;quot;&amp;gt;Intrusion detection&lt;br /&gt;
specialist:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;A CISSP certification might help a potential candidate in preparing&lt;br /&gt;
for the profession. The role of an intrusion detection specialist is to&lt;br /&gt;
find and stop any unwanted communications.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-manager&amp;quot;&amp;gt;Incident manager:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Expected to plan, oversee, manage, and supervise all incident&lt;br /&gt;
response team actions. Is in charge of reporting all current events to&lt;br /&gt;
senior management and stakeholders, as well as acting as the technical&lt;br /&gt;
lead on active incidents for incident responders. Prepares threat and&lt;br /&gt;
impact assessments and reports them known to management.&amp;lt;ref name=&amp;quot;coursera&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Certificates== &lt;br /&gt;
There is a vast number of different certificates and the road map to&lt;br /&gt;
being a certified professional could be very different&amp;lt;ref name=&amp;quot;Coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated],&amp;quot; [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;NICCS&amp;quot;&amp;gt;NICCS, &amp;quot;Cybersecurity Certifications,&amp;quot; [Online]. Available: hhttps://niccs.cisa.gov/about-niccs/cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt; . One possible&lt;br /&gt;
approach is to start with basic certificates from the different branches&lt;br /&gt;
of service and move to more specific and demanding focused&lt;br /&gt;
certification. Also, some jobs require certain clearances, either from&lt;br /&gt;
industry, or from the government. One small selection of different&lt;br /&gt;
possible certificates is brought out in following paragraphs.&lt;br /&gt;
&lt;br /&gt;
Security+ is a CompTIA certification that is considered a basic cert&lt;br /&gt;
among cybersecurity professionals. It covers the topics of risk&lt;br /&gt;
management and threat assessment.&lt;br /&gt;
Network+ is also offered by CompTIA this certification (like the name&lt;br /&gt;
implies) focuses on networking infrastructure and operations. It is&lt;br /&gt;
considered a foundational certification.&lt;br /&gt;
The Certified Information Systems Security Professional (CISSP) is a&lt;br /&gt;
more advanced certification designed for cybersecurity professionals&lt;br /&gt;
with at least five years of work experience. The certification covers&lt;br /&gt;
topics such as architecture, engineering, and management.&amp;lt;/p&amp;gt;&lt;br /&gt;
The Certified Ethical Hacker (CEH) certification is also considered a&lt;br /&gt;
more advanced cert because it generally requires that applicants have&lt;br /&gt;
multiple years of work experience. The goal of an ethical hacker&lt;br /&gt;
certification is to be able to understand how cyber attacks unfold in&lt;br /&gt;
order to improve threat assessment and mitigation skills.&amp;lt;ref name=&amp;quot;cyberguide&amp;quot;&amp;gt;Cybersecurity Guide, &amp;quot;How to become a cybersecurity specialist&amp;quot;, [Online]. Available: https://cybersecurityguide.org/careers/security-specialist/. [Accessed 27 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
This is definitely not all, when one looks for more information, following link could be searched, to get more in depth knowledge about&lt;br /&gt;
different possibilities.&lt;br /&gt;
 &lt;br /&gt;
Hereby, with the help of this matrix a possible taxonomy of different 436 listed certificates in branches are&lt;br /&gt;
presented.&amp;lt;ref name=&amp;quot;Pauljeremy&amp;quot;&amp;gt;&amp;quot;Cybersecurity Roadmap,&amp;quot; [Online]. Available: https://pauljerimy.com/2020/10/12/scr-oct-2020-update/. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:analystimage5.png|1000px|thumb|Certificate matrix &amp;lt;ref&amp;gt;&amp;quot;Certification roadmap&amp;quot;. Available at https://pauljerimy.com/security-certification-roadmap&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
=== Communication and Network Security===&lt;br /&gt;
Communication and network security covers the ability to secure&lt;br /&gt;
communication channels and networks. Topics include secure and converges&lt;br /&gt;
protocols, wireless networks, cellular networks, hardware operations&lt;br /&gt;
(warranty and redundant power), and third-party connectivity. IP&lt;br /&gt;
networking are also included in this domain.&lt;br /&gt;
===Identity and Access Management===&lt;br /&gt;
The identity and access management domain covers the attacks that&lt;br /&gt;
target the human gateway to gain access to data. Other topics include&lt;br /&gt;
ways to identify users with rights to access the information and&lt;br /&gt;
servers. Identity and access management covers the topics of&lt;br /&gt;
applications, Single sign-on authentication, privilege escalation,&lt;br /&gt;
Kerberos, rule-based or risk-based access control, proofing and&lt;br /&gt;
establishment of identity.&lt;br /&gt;
===Security Architecture and Engineering===&lt;br /&gt;
The security architecture and engineering domain covers important&lt;br /&gt;
topics concerning security engineering plans, designs and principles,&lt;br /&gt;
Topics include assessing and mitigating information system&lt;br /&gt;
vulnerabilities, fundamental concepts of security models and security&lt;br /&gt;
architectures in critical areas like access control. Cloud systems,&lt;br /&gt;
cryptography, system infiltrations (ransomware, fault-injection and&lt;br /&gt;
more) and virtualized systems are also covered in this domain.&lt;br /&gt;
===Asset Security===&lt;br /&gt;
The Asset Security domain deals with the issues related to the&lt;br /&gt;
collection, storage, maintenance, retention and destruction of data. It&lt;br /&gt;
also covers knowledge of different roles regarding data handling (owner,&lt;br /&gt;
controller and custodian) as well as data protection methods and data&lt;br /&gt;
states. Other topics include resource provision, asset classification&lt;br /&gt;
and data lifecycle management.&lt;br /&gt;
===Security and Risk Management===&lt;br /&gt;
The security and risk management domain covers general on skills&lt;br /&gt;
related to the implementation of user awareness programs as well as&lt;br /&gt;
security procedures. Emphasis is also placed on risk management&lt;br /&gt;
concerning the acquisition of new services, hardware and software&lt;br /&gt;
(supply chain). Other skills include social engineering defense&lt;br /&gt;
mechanisms.&lt;br /&gt;
===Security Assessment and Testing===&lt;br /&gt;
The security assessment and testing domain deals with all the&lt;br /&gt;
techniques and tools used to find system vulnerabilities, weaknesses and&lt;br /&gt;
potential areas of concern not addressed by security procedures and&lt;br /&gt;
policies. Attack simulations, vulnerability assessment, compliance&lt;br /&gt;
checks, and ethical disclosure also fall under this domain.&lt;br /&gt;
===Software Security===&lt;br /&gt;
The software development security domain deals with implementing&lt;br /&gt;
software-based security protocols within environment for which the IT&lt;br /&gt;
professional is responsible. Risk analysis, vulnerability identification&lt;br /&gt;
and auditing of source codes are all covered in this subset. Additional&lt;br /&gt;
topics include software-designed security, maturity models, development&lt;br /&gt;
methodologies, open-source and third-party development security.&lt;br /&gt;
===Security operations===&lt;br /&gt;
The security operations domain covers topics ranging from&lt;br /&gt;
investigations and digital forensic to detection and intrusion&lt;br /&gt;
prevention tools, sandboxing and firewalls. Topics include user and&lt;br /&gt;
entity behavior analytics, threat intelligence (threat hunting and&lt;br /&gt;
threat feeds) log management, artifacts (mobile, computer and network),&lt;br /&gt;
machine learning and AI-based tools, penetration testing, and&lt;br /&gt;
exploitation development. These for sub-domains are lister here.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Incident Handling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Penetration Testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Exploitation&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Education==&lt;br /&gt;
[[File:Analystimage7.png|400px|thumb|Comparison degree vs Certificate &amp;lt;ref&amp;gt;&amp;quot;Comparison Table&amp;quot;. Available at https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
The entry level monitoring specialist is hired by Estonian&lt;br /&gt;
Information System Authority even if there is no formal IT education,&lt;br /&gt;
but readiness to learn and moderate knowledge of different operation&lt;br /&gt;
systems is enough to start the career. &amp;lt;ref name=&amp;quot;cv&amp;quot;&amp;gt;cv.ee, &amp;quot;SEIRESPETSIALIST - tule Eesti küberruumi valvuriks!&amp;quot;. Available: https://www.cv.ee/en/vacancy/792782/riigi-infosusteemi-amet/seirespetsialist-tule-eesti-kuberruumi-valvuriks [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Nevertheless, like most other high qualification careers jobs falling&lt;br /&gt;
under the cybersecurity specialist category require some form of formal&lt;br /&gt;
education. However, since cybersecurity specialist jobs can fall across&lt;br /&gt;
a wide spectrum of job descriptions and responsibilities, it is possible&lt;br /&gt;
to obtain a specialist job after completing many levels of different&lt;br /&gt;
computer related education.&lt;br /&gt;
&lt;br /&gt;
If one is looking for a cybersecurity related education, for example&lt;br /&gt;
in EU, 137 courses/programs could be found that relate to keyword IT or&lt;br /&gt;
cybersecurity. &amp;lt;ref name=&amp;quot;enisa&amp;quot;&amp;gt;ENISA (European Union Agency for Cybersecurity), &amp;quot;Cybersecurity Education-Cybersecurity Higher Education Database&amp;quot;. Available: https://www.enisa.europa.eu/topics/cybersecurity-education/education-map/education-courses [Accessed 26 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Also, there is a great amount of discussion, if cyber security&lt;br /&gt;
professional should have a degree or would be certification just enough.&lt;br /&gt;
One interesting table is produces by Franklin University that compares&lt;br /&gt;
benefits and/or drawbacks of each type of credential.&amp;lt;ref name=&amp;quot;franklin&amp;quot;&amp;gt;Franklin University, &amp;quot;Is Getting a Master&#039;s Degree in Cyber Security Worth It?&amp;quot;. Available: https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Certifications are generally good for people with little practical&lt;br /&gt;
experience because they are known quantities in the industry and can&lt;br /&gt;
help you get your foot in the door. They set a minimum knowledge bar.&lt;br /&gt;
But some certifications are viewed more favorably than others.&lt;br /&gt;
Certifications with renewal requirements are viewed better by hiring&lt;br /&gt;
managers, but they also more costly in the long run because of the need&lt;br /&gt;
for continuing education. Certifications are also good for showing&lt;br /&gt;
in-depth expertise in a specialization within cybersecurity. Depending&lt;br /&gt;
on your career goals, it may be advantageous to have a master’s&lt;br /&gt;
degree—which shows your breadth of knowledge, critical thinking and&lt;br /&gt;
leadership skills—and a certificate—which shows specific skill&lt;br /&gt;
competency.&amp;lt;ref name=&amp;quot;franklin&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
As IT (Cyber) Security is still a relatively young discipline,&lt;br /&gt;
universities and colleges are still figuring out which is the best&lt;br /&gt;
approach for their degrees. Study programmes and curricula in Cyber&lt;br /&gt;
Security are different. In general, here are the duration of Cyber&lt;br /&gt;
Security degrees:&lt;br /&gt;
&amp;lt;ref name=&amp;quot;studyportal&amp;quot;&amp;gt;Studyportals, &amp;quot;Why You Should Study a Cyber Security Degree in 2022&amp;quot;. Available: https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Bachelor’s degrees in Cyber Security take 3 or 4 years in most&lt;br /&gt;
countries.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Master’s courses in Cyber Security take between 1-2 years to&lt;br /&gt;
complete.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;PhD programmes in Cyber Security last 3-5 years. Some only take 1&lt;br /&gt;
or 2 years, but they are less common.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Generalization could me made that on bachelor level the general&lt;br /&gt;
knowledge about the cyber issues are obtained. On master level the&lt;br /&gt;
specialization courses are taken and the person can choose more specific&lt;br /&gt;
topics to study. It is on master level where strengths of the cyber&lt;br /&gt;
specialist can be developed further and up-do date knowledge obtained in&lt;br /&gt;
specifics. PhD is serious science and involves teaching, lot of&lt;br /&gt;
scientific work and writing for publications.&lt;br /&gt;
&lt;br /&gt;
==Salary==&lt;br /&gt;
&amp;lt;p&amp;gt;Even if the salary can be very different, compared to the skills and&lt;br /&gt;
experience, an generalization can be made. Cyber Security professionals&lt;br /&gt;
in CSIRT, and in other entities earn quite well, from the start. First,&lt;br /&gt;
some comparison from the United States. The average CSIRT analyst salary&lt;br /&gt;
in the USA is $97,500 per year or $50 per hour. Entry level positions&lt;br /&gt;
start at $48,875 per year while most experienced workers make up to&lt;br /&gt;
$135,373 per year.&amp;lt;ref name=&amp;quot;talent&amp;quot;&amp;gt;talent.com, &amp;quot;Csirt Analyst average salary in USA 2022&amp;quot;. Available: https://www.talent.com/salary?job=csirt+analyst [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There are multiple positions you can occupy in this field. They have&lt;br /&gt;
in common great salaries and high demand for technical skills, attention&lt;br /&gt;
to details, problem-solving mentality, and the ability to analyze risks.&lt;br /&gt;
Here are the average annual salaries in the United States, according to&lt;br /&gt;
Payscale: &amp;lt;ref name=&amp;quot;studyportal&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Cryptographer – 100,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Information Security Officer – 91,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Assessor – 90,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Engineer – 88,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Penetration Tester – 81,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Forensics Expert – 71,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Administrator – 65,000 USD&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
When looking into salaries in Estonia, one can find that there is a&lt;br /&gt;
discussion that private sector is taking a toll from the public sector,&lt;br /&gt;
and that the salaries in important agencies, as Information System&lt;br /&gt;
Authority loose their employees to the better paid positions in private&lt;br /&gt;
sector.&amp;lt;ref name=&amp;quot;digigeenius&amp;quot;&amp;gt;DiGi Geenius, &amp;quot;Kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad&amp;quot;. Available: https://digi.geenius.ee/rubriik/uudis/kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad/ [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;tehnika&amp;quot;&amp;gt;Postimees, &amp;quot;Riigi-it-tootajate-palgamaarad-kasvasid&amp;quot;. Available: https://tehnika.postimees.ee/6887428/riigi-it-tootajate-palgamaarad-kasvasid [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
But there is also a different view that average private sector worker&lt;br /&gt;
could be hired as a top specialist in public sector and then the payment&lt;br /&gt;
is higher. Nevertheless, it seems that the average payment in cyber&lt;br /&gt;
security sector is any way higher that in other parts of the&lt;br /&gt;
e-services. &amp;lt;ref name=&amp;quot;digigeenius2&amp;quot;&amp;gt;DiGi Geenius, &amp;quot;5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka&amp;quot;. Available: https://digi.geenius.ee/rubriik/uudis/5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==SOC==&lt;br /&gt;
&amp;lt;p&amp;gt;A SOC is a facility where an organization’s network, applications,&lt;br /&gt;
and endpoints are monitored and defended. The term was adapted from&lt;br /&gt;
network operations centers (NOCs), where large telecommunication or&lt;br /&gt;
corporate networks are monitored. When network security became more of a&lt;br /&gt;
concern, security teams were formed within the NOCs, and eventually spun&lt;br /&gt;
off into larger organizations of their own as the responsibilities of&lt;br /&gt;
security teams grew increasingly complex and specialized. The security&lt;br /&gt;
staff working in a security operations center are often called the SOC&lt;br /&gt;
team.&amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;Exabeam, &amp;quot;CSIRT&amp;quot;. Available: https://www.exabeam.com/incident-response/csirt/ [Accessed 28 APr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;Functions of the SOC team include, but are not limited to:&amp;lt;ref name=&amp;quot;trellix&amp;quot;&amp;gt;Trellix, &amp;quot;What Is a Security Operations Center (SOC)?&amp;quot;. Available: https://www.trellix.com/en-us/security-awareness/operations/what-is-soc.html [Accessed 30 APr 2022].&amp;lt;/ref&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ol type=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Taking inventory of resources, to get a better understanding of the&lt;br /&gt;
structure they are protecting.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintanence of the system, by constantly making updates and adding&lt;br /&gt;
safeguards.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Monitoring the network for abnormalities with special tools.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Threat analysis of new attacks and vulnerabilities.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Responding to attacks, by acting as “first responders”. The SOC team&lt;br /&gt;
will shut down and/or isolate endpoints, deleting files and lowering the&lt;br /&gt;
impact as fast as possible.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Recovery of system stability and lost data. This may be done using&lt;br /&gt;
backups, restarting endpoints or reconfiguring systems.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Logging all actions on the system, to be later used for analysis or&lt;br /&gt;
forensics after an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigating the root cause of an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Auditing their own actions, to be in line with regulations of the&lt;br /&gt;
organization, industry or governing body.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==CSIRT==&lt;br /&gt;
&amp;lt;p&amp;gt;A CSIRT is a group that responds to security incidents when they&lt;br /&gt;
occur. Key responsibilities of a CSIRT include:&lt;br /&gt;
&amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
===Creating and maintaining an incident response plan (IRP)===&lt;br /&gt;
An incident response plan (IRP) is a set of written instructions for&lt;br /&gt;
detecting, responding to and limiting the effects of an information&lt;br /&gt;
security event. Incident response plans provide instructions for&lt;br /&gt;
responding to many potential scenarios, including data breaches, denial&lt;br /&gt;
of service/distributed denial of service attacks, firewall breaches,&lt;br /&gt;
virus or malware outbreaks or insider threats. Without an incident&lt;br /&gt;
response plan in place, organizations may either not detect the attack&lt;br /&gt;
in the first place, or not follow proper protocol to contain the threat&lt;br /&gt;
and recover from it when a breach is detected.&lt;br /&gt;
&lt;br /&gt;
https://www.stratacore.com/incidentresponseplan&lt;br /&gt;
===Investigating and analyzing incidents===&lt;br /&gt;
CSIRTs are also involved in improvement activities. After major&lt;br /&gt;
computer security incidents occur, or when incidents are not handled in&lt;br /&gt;
a timely or effective manner, a CSIRT will generally perform a&lt;br /&gt;
postmortem of the incident and its response. This postmortem will&lt;br /&gt;
identify the strengths and weakness of the response effort. Such reviews&lt;br /&gt;
can identify weaknesses and holes in systems, infrastructure defenses,&lt;br /&gt;
or policies that allowed the incident to take place. It can also&lt;br /&gt;
identify problems with communication channels, interfaces, and&lt;br /&gt;
procedures that inhibited the efficient resolution of the reported&lt;br /&gt;
problem.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.cisa.gov/uscert/bsi/articles/best-practices/incident-management/defining-computer-security-incident-response-teams&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Managing internal communications and updates during or immediately after incidents occur===&lt;br /&gt;
===Communicating with employees, shareholders, customers, and the press about incidents as needed===&lt;br /&gt;
&amp;lt;p&amp;gt;There are various services within the CSIRT Services Framework that&lt;br /&gt;
address communications, as they relate to security operations and&lt;br /&gt;
incident response services. Some of these include Information Security&lt;br /&gt;
Incident Coordination, Crisis Management Support, Vulnerability&lt;br /&gt;
Disclosure, Situational Awareness Communication, and Awareness Building,&lt;br /&gt;
to name a few. Sharing information and communicating with the general&lt;br /&gt;
public and/or your constituency is appropriate in many different&lt;br /&gt;
scenarios. These can range from proactive communications to reactive&lt;br /&gt;
communications. Each scenario may be unique, and careful consideration&lt;br /&gt;
should be given to when to release information to the public and what&lt;br /&gt;
information should be released.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;https://resources.sei.cmu.edu/asset_files/Handbook/2021_002_001_651819.pdf&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Remediating incidents===&lt;br /&gt;
Threat remediation is a strong and capable tool for fighting the&lt;br /&gt;
cyber security compromises. As the word ‘remedy’ suggests, remediation&lt;br /&gt;
process involves the treatment of a security breach. With the&lt;br /&gt;
remediation practices, your cyber security team is able to eliminate&lt;br /&gt;
suspicious activities and malicious attacks in the form of malware,&lt;br /&gt;
ransomware, phishing and such. Even if you ‘kill’ the suspicious&lt;br /&gt;
activity, the attackers can remain in your systems. If you want to&lt;br /&gt;
contaminate and end the problem for good, your remediation processes&lt;br /&gt;
must involve the detection of the cause. &amp;lt;ref name=&amp;quot;logsign&amp;quot;&amp;gt;Logsign, &amp;quot;What-is-remediation-in-cyber-security&amp;quot;. Available: https://www.logsign.com/blog/what-is-remediation-in-cyber-security/. [Accessed 28 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Recommending technology, policy, governance, and training changes after security incidents===&lt;br /&gt;
After all these actions, the SCIRT must contribute to the development&lt;br /&gt;
of better policies, practices and has to recommend improvements. They&lt;br /&gt;
are not working in the vacuum and their work has to create new and&lt;br /&gt;
better standards for cyber security. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;Exabeam, &amp;quot;CSIRT&amp;quot;. Available: https://www.exabeam.com/incident-response/csirt/ [Accessed 28 APr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==CERT==&lt;br /&gt;
&amp;lt;p&amp;gt;The term “computer emergency response team” was coined in 1988. In&lt;br /&gt;
response to the Morris worm attack that impacted thousands of servers on&lt;br /&gt;
the Internet, DARPA funded the formation of the Computer Emergency&lt;br /&gt;
Response Team Coordination Center (CERT-CC) at Carnegie Mellon&lt;br /&gt;
University. The goal of CERT-CC was to help protect the internet by&lt;br /&gt;
collecting and disseminating information on critical security&lt;br /&gt;
vulnerabilities. Several other countries formed similar centers using&lt;br /&gt;
the same acronym (despite threats of legal action by Carnegie Mellon for&lt;br /&gt;
trademark infringement). Now the term CERT refers to any emergency&lt;br /&gt;
response team that deals with cyber threats. Many people use CERT-CC&lt;br /&gt;
interchangeably with CSIRT, though the charter of a CERT is information&lt;br /&gt;
sharing in order to help other response teams respond to threats against&lt;br /&gt;
their own infrastructure.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In general, the designation of CERT is helpful in applying real-world&lt;br /&gt;
solutions to various cybersecurity problems. They may be government&lt;br /&gt;
contractors or employees of a major corporation. For example, the U.S.&lt;br /&gt;
Computer Emergency Readiness Team (US-CERT) operates under the U.S.&lt;br /&gt;
Department of Homeland Security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.techopedia.com/definition/31003/computer-emergency-response-team-cert&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In Estonia CERT is designated as CERT-EE. It was established in 2006,&lt;br /&gt;
as an organization responsible for the management of security incidents&lt;br /&gt;
in .ee computer networks. It is also a national contact point for&lt;br /&gt;
international co-operation in the field of IT security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ria.ee/en/cyber-security/cert-ee.html&amp;lt;/p&amp;gt;&lt;br /&gt;
==Difference between SOC/CSIRT/CERT==&lt;br /&gt;
[[File:analystimage3.png|300px|thumb|SOC/CSIRT/CERT &amp;lt;ref name=&amp;quot;exabeam&amp;gt;&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
How CSIRTs differ from CERTs and SOCs. There are overlapping&lt;br /&gt;
responsibilities between a community emergency response team (CERT),&lt;br /&gt;
computer security incident response team (CSIRT), and security&lt;br /&gt;
operations center (SOC). To add to this confusion, frequently, the terms&lt;br /&gt;
CERT and CSIRT are used interchangeably, despite the important&lt;br /&gt;
differences.&lt;br /&gt;
&lt;br /&gt;
==Understand the primary roles and characteristics of a CERT, CSIRT, and SOC.==&lt;br /&gt;
[[File:analystimage4.png|600px|thumb|Primary Roles of CERT, CSIRT, and SOC&amp;lt;ref name=&amp;quot;exabeam&amp;gt;&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&amp;lt;p&amp;gt;So, using strict definitions, a CERT collects and disseminates&lt;br /&gt;
security information, typically for the benefit of a country or an&lt;br /&gt;
industry. A CSIRT is a cross-functional team that responds to incidents&lt;br /&gt;
on behalf of a country or an organization. A SOC is where a country or&lt;br /&gt;
organization monitors and defends its network, servers, applications,&lt;br /&gt;
and endpoints.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Future==&lt;br /&gt;
&amp;lt;p&amp;gt;And the Cyber security problem is only getting bigger. According to a&lt;br /&gt;
report published by Accenture, the number of cyber security breaches&lt;br /&gt;
increased by 11 percent from 2017 to 2018. The cost of such breaches is&lt;br /&gt;
astronomical–about $600 billion worldwide, according to the Economic&lt;br /&gt;
Impact of Cybercrime report.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Job projections for cybersecurity are staggering. The Bureau of Labor&lt;br /&gt;
Statistics in US predicts that careers in the cybersecurity field will&lt;br /&gt;
grow by 32% by 2028. That makes cybersecurity one of the top 10&lt;br /&gt;
fastest-growing jobs in the country. In the United States alone, jobs&lt;br /&gt;
for Information Security Analysts are expected to grow by 15% by&lt;br /&gt;
2024.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Most likely this trend is also similar in other countries.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When checking Estonian job portals, there is a constant need for&lt;br /&gt;
people for cyber security related positions. Also, linkedin search gives&lt;br /&gt;
approximately 30 vacancies immediately. There are banks, logistics&lt;br /&gt;
companies, e-shops, and software producers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://ee.linkedin.com/jobs/cyber-security-jobs?countryRedirected=1&amp;amp;amp;position=1&amp;amp;amp;pageNum=0&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Trends that affect companies create need for constant cyber security&lt;br /&gt;
services. Increasing number of home/remote offices require secure&lt;br /&gt;
corporate networks and security of remote devices. One example is from&lt;br /&gt;
this year, when sloppy remote desktop set-up paralyzed systems of 17&lt;br /&gt;
companies.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.aripaev.ee/uudised/2022/04/20/ria-lohakas-kaugtoolaua-seadistus-halvas-martsis-vahemalt-17-juhul-ettevotete-it-susteemid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Also, no service can exists without robust infrastructure - servers,&lt;br /&gt;
databases, applications. As all previously mentioned devices and&lt;br /&gt;
services are at constant scanning and surveillance. So, the breach&lt;br /&gt;
detection and immediate action demands 24/7 services. Even if lot of&lt;br /&gt;
things could be automated, there is a need for human specialists (at&lt;br /&gt;
least, at the moment). Third growing field is also a forensic&lt;br /&gt;
investigation, as every attack must be investigated in order to be ready&lt;br /&gt;
to repel next attacks. So data recovery and evidence collection is&lt;br /&gt;
another important field of work that need skilled and professional&lt;br /&gt;
workers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Even, if the specifics of the entity, be it CSIRT, CERT or SOC, are&lt;br /&gt;
different, the fundamentals of the work are the same. Professional&lt;br /&gt;
knowledge of the networks, operational systems, hardware, scripting, and&lt;br /&gt;
several other wider IT related knowledge is needed. As there is no&lt;br /&gt;
single way to reach to it, every single person can find one’s strongest&lt;br /&gt;
sides and develop them with knowledge of weaker side, in order to know,&lt;br /&gt;
when to as for help.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/body&amp;gt;&lt;br /&gt;
&amp;lt;/html&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mavald</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142250</id>
		<title>Hiring a Cyber Security Incident Analyst</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142250"/>
		<updated>2022-05-01T15:59:54Z</updated>

		<summary type="html">&lt;p&gt;Mavald: /* Understand the primary roles and characteristics of a CERT, CSIRT, and SOC. */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==A Cyber Security Incident Analyst==&lt;br /&gt;
&lt;br /&gt;
[[File:image1.png|600px|thumb|Job advertisement &amp;lt;ref&amp;gt;&amp;quot;Job Advertisement&amp;quot;. Available at https://www.projectpeople.com/jobs/&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
===Cyber security incident analyst in SOC/CSIRT/CERT===&lt;br /&gt;
This article delves into the job title of Cyber Security Incident&lt;br /&gt;
Analyst and provides an overview of the acronyms SOC/CSIRT/CERT. A brief&lt;br /&gt;
history of the job is discussed here, as well as a possible career path,&lt;br /&gt;
education, experience, and other characteristics required for work in&lt;br /&gt;
computer security-related organizations. The article also provides a&lt;br /&gt;
brief history of SOC/CSIRT/CERT, as well as a comparison of their&lt;br /&gt;
differences and similarities.&lt;br /&gt;
===Cyber Security Incident Analyst Skill Set===&lt;br /&gt;
What skill set is expected from the Cyber Security Incident Analyst? Below written lines are taken from the same job advertisement depicted&lt;br /&gt;
on the left side of this article:&lt;br /&gt;
As a Security Incident Analyst your responsibilities will include:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Continuous monitoring of security tooling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Performing regular and ad-hoc vulnerability assessments&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Carrying out ‘spot checks’&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Reporting vulnerabilities to the PVG via the alerts system&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintaining and documenting logging systems&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Developing centralized logging, reporting and intelligence&lt;br /&gt;
platforms&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;‘Light touch’ penetration testing with open source tooling&lt;br /&gt;
(Metasploit)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Knowledge &amp;amp;amp; Experience required:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;SOC, CSIRT or CERT operational environment experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Windows / Linux experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TCP /IP networking protocol knowledge&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience reviewing and analyzing Security Events from various&lt;br /&gt;
monitoring and logging sources&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience in website and web application security assessment or&lt;br /&gt;
penetration testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience of using Metasploit&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Scripting knowledge using BASH, Python, Perl, Ruby&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Skills in Host and Network Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
As one can see the description of the duties is wide and also the&lt;br /&gt;
knowledge and experience that is required is noteworthy. So, where to&lt;br /&gt;
start to find out the way to get this kind of knowledge and&lt;br /&gt;
expertize.&lt;br /&gt;
===Possible career path===&lt;br /&gt;
Next part of the paper is aiming to depict a possible ways, how to&lt;br /&gt;
develop oneself, and move along the career pathway in cybersecurity&lt;br /&gt;
field. Topics of development, education, experience and certification&lt;br /&gt;
are covered.&lt;br /&gt;
[[File:analystimage2.png|1000px|thumb|Career path &amp;lt;ref&amp;gt;&amp;quot;Possible Career Path&amp;quot;. Available at https://www.cyberseek.org/pathway.html&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
===Junior/Senior===&lt;br /&gt;
Start with an entry-level job in IT. Hands-on experience is often the&lt;br /&gt;
most effective way to prepare for certification exams. Start&lt;br /&gt;
accumulating work experience with an entry-level role as a cybersecurity&lt;br /&gt;
analyst. Many cybersecurity professionals start off in more general IT&lt;br /&gt;
roles. The skills, practices, and technologies you’ll use as a&lt;br /&gt;
cybersecurity professional will continue to evolve along with computer&lt;br /&gt;
and network technology. The desire to learn, ability to problem solve,&lt;br /&gt;
and attention to detail will serve you well in this field. Other, more&lt;br /&gt;
technical skills and technologies to learn include:&amp;lt;ref name=&amp;quot;certification&amp;quot;&amp;gt;Popular Cyber Security Certificates [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications  [Accessed 25 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====SIEM tools (security information and event management)====&lt;br /&gt;
Security Information and Event Management (SIEM) is a set of tools&lt;br /&gt;
and services offering a holistic view of an organization’s information&lt;br /&gt;
security. SIEM works by combining two technologies:&lt;br /&gt;
&amp;lt;li&amp;gt;Security information management (SIM), which collects data from log&lt;br /&gt;
files for analysis and reports on security threats and events, and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;security event management (SEM), which conducts real-time system&lt;br /&gt;
monitoring, notifies network admins about important issues and&lt;br /&gt;
establishes correlations between security events. There are a number of&lt;br /&gt;
security information and event management solutions on the market.&lt;br /&gt;
ArcSight ESM, IBM QRadar and Splunk are among the most popular. &amp;lt;ref name=&amp;quot;SIEM&amp;quot;&amp;gt;Application security, SIEM [Online]. Available: https://www.imperva.com/learn/application-security/siem/. [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Firewalls, Intrusion Detection Systems (IDS), and Intrusion Prevention Systems(IPS)====&lt;br /&gt;
Firewalls can be two types, hardware and software firewalls. Software&lt;br /&gt;
firewall is a firewall that is installed on a computer or server, and&lt;br /&gt;
tasked with network security. It works with a wide variety of other&lt;br /&gt;
technology security solutions to provide more robust and cohesive&lt;br /&gt;
security for enterprises of all sizes. When a software firewall is&lt;br /&gt;
installed on a server, it opens up like an umbrella of protection over&lt;br /&gt;
all other computers connected to the network. It is able to monitor both&lt;br /&gt;
incoming and outgoing traffic for potential risk or suspicious user&lt;br /&gt;
behavior, and also makes setting security policies much easier, faster&lt;br /&gt;
and more flexible. Hardware firewall is positioned between the network&lt;br /&gt;
and devices, allowing traffic to funnel through the firewall for a close&lt;br /&gt;
inspection and analysis. A hardware firewall, a term often&lt;br /&gt;
interchangeable with network or next-generation firewall, protects the&lt;br /&gt;
network gateways for an enterprise. Hardware firewall is physical&lt;br /&gt;
hardware, installed between network elements and connected devices, and&lt;br /&gt;
is tasked with filtering traffic for cyber threat to the network or&lt;br /&gt;
devices. Filtering out unauthorized or suspicious users based on traffic&lt;br /&gt;
analysis is one of the biggest benefits of hardware firewall. &amp;lt;ref name=&amp;quot;sangfor&amp;quot;&amp;gt;Sangfor, &amp;quot;What is Software Firewall? Difference between Hardware Firewall and Software Firewall, [Online]. Available: https://www.sangfor.com/blog/cybersecurity/what-is-software-firewall-difference-between-hardware-firewall-and-software-firewall [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems&lt;br /&gt;
(IPS) are both parts of the network infrastructure. IDS/IPS compare&lt;br /&gt;
network packets to a cyberthreat database containing known signatures of&lt;br /&gt;
cyberattacks — and flag any matching packets. IDS doesn’t alter the&lt;br /&gt;
network packets in any way, whereas IPS prevents the packet from&lt;br /&gt;
delivery based on the contents of the packet, much like how a firewall&lt;br /&gt;
prevents traffic by IP address. &amp;lt;ref name=&amp;quot;Varonis&amp;quot;&amp;gt;Varonis, &amp;quot;What is Software Firewall? IDS vs. IPS: What is the Difference?, [Online]. Available: https://www.varonis.com/blog/ids-vs-ips [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Digital forensics====&lt;br /&gt;
Digital forensics is a branch of forensic science that focuses on&lt;br /&gt;
identifying, acquiring, processing, analyzing, and reporting on data&lt;br /&gt;
stored electronically. Electronic evidence is a component of almost all&lt;br /&gt;
criminal activities and digital forensics support is crucial for law&lt;br /&gt;
enforcement investigations. Electronic evidence can be collected from a&lt;br /&gt;
wide array of sources, such as computers, smartphones, remote storage,&lt;br /&gt;
unmanned aerial systems, shipborne equipment, and more.&amp;lt;ref name=&amp;quot;interpol&amp;quot;&amp;gt;Interpol, &amp;quot;Digital forensics&amp;quot;. Available: https://www.interpol.int/How-we-work/Innovation/Digital-forensics. [Accessed 28 4 2022].&amp;lt;/ref&amp;gt; &lt;br /&gt;
Investigative process of digital forensics can be divided into several stages. There are four major stages: preservation, collection,&lt;br /&gt;
examination, and analysis. All these four stages need a deep understanding of computers, technology across a broad spectrum, and cybersecurity principles and&lt;br /&gt;
practices, a working knowledge of computers, networks, and coding, in-depth investigative abilities, critical-thinking skills and analytical talent the ability to effectively communicate and work with a&lt;br /&gt;
wide range of people. &amp;lt;ref name=&amp;quot;ecpi&amp;quot;&amp;gt;&amp;quot;Digital forensics&amp;quot;. Available: https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me. [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Mobile device management====&lt;br /&gt;
Mobile device management (MDM) is software that allows IT&lt;br /&gt;
administrators to control, secure and enforce policies on smartphones,&lt;br /&gt;
tablets and other endpoints. Mobile device management software emerged&lt;br /&gt;
in the early 2000s as a way to control and secure the personal digital&lt;br /&gt;
assistants and smartphones that business workers began to use. The&lt;br /&gt;
consumer smartphone boom that started with the launch of the Apple&lt;br /&gt;
iPhone in 2007 led to the bring your own device (BYOD) trend, which&lt;br /&gt;
fueled further interest in MDM.&amp;lt;ref name=&amp;quot;techtarget&amp;quot;&amp;gt;Techtarget, &amp;quot;Mobile Device Management&amp;quot;. Available: https://www.techtarget.com/searchmobilecomputing/definition/mobile-device-management [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Data management====&lt;br /&gt;
Sometimes the data management is neglected, but this part has a&lt;br /&gt;
crucial role when learning for good cyber security practices. Majority&lt;br /&gt;
of cyber security programs include a special courses on data management.&lt;br /&gt;
Data management is a method of organizing and maintaining data processes&lt;br /&gt;
that are required in almost every business operations. The benefits of&lt;br /&gt;
data management can be found accounting, statistics, logistics planning&lt;br /&gt;
and other disciplines including corporate computing.&amp;lt;ref name=&amp;quot;GlobalUni&amp;quot;&amp;gt;Global Universities, &amp;quot;MSc Data Management and Cyber Security&amp;quot;. Available: https://globaluniversities.in/msc-data-management-cyber-security. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Data governance (and management) play a fundamental role in&lt;br /&gt;
protecting an organization’s data. Ensuring that the right people have&lt;br /&gt;
the right access and that appropriate security controls are in place to&lt;br /&gt;
protect each system or service, based on the criticality or sensitivity&lt;br /&gt;
of the data sets these contain. &amp;lt;ref name=&amp;quot;CyberMagazine&amp;quot;&amp;gt;Cyber Security Magazine, &amp;quot;The Role of Data Governance in Cybersecurity&amp;quot;. Available: https://cybersecurity-magazine.com/the-role-of-data-governance-in-cybersecurity/?utm_source=rss&amp;amp;amp;utm_medium=rss&amp;amp;amp;utm_campaign=the-role-of-data-governance-in-cybersecurity. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Application security development====&lt;br /&gt;
Application security describes security measures at the application&lt;br /&gt;
level that aim to prevent data or code within the app from being stolen&lt;br /&gt;
or hijacked. It encompasses the security considerations that happen&lt;br /&gt;
during application development and design, but it also involves systems&lt;br /&gt;
and approaches to protect apps after they get deployed. Application&lt;br /&gt;
security may include hardware, software, and procedures that identify or&lt;br /&gt;
minimize security vulnerabilities.&amp;lt;ref name=&amp;quot;vmware&amp;quot;&amp;gt;VmWare, &amp;quot;What is application security?&amp;quot;. Available: https://www.vmware.com/topics/glossary/content/application-security.html [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Application security development is important to ensure that your&lt;br /&gt;
application is free from coding errors and bugs. And controls the risk&lt;br /&gt;
and helps safeguard against security vulnerabilities. Application&lt;br /&gt;
security development is the process of making applications more secure&lt;br /&gt;
by finding and fixing security vulnerabilities. This is often done by&lt;br /&gt;
enforcing software security best practices and using application&lt;br /&gt;
security testing tools. &lt;br /&gt;
&amp;lt;ref name=&amp;quot;perforce&amp;quot;&amp;gt;Perforce, &amp;quot;Application Security Development Best Practices&amp;quot;. Available: https://www.perforce.com/blog/kw/application-security-development-best-practices. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Audit and compliance knowledge====&lt;br /&gt;
A cyber security audit is designed to be a comprehensive review and&lt;br /&gt;
analysis of your business’s IT infrastructure. It identifies threats and&lt;br /&gt;
vulnerabilities, exposing weaknesses and high-risk practices.&lt;br /&gt;
Regulations such as the EU GDPR (General Data Protection Regulation) can&lt;br /&gt;
impose hefty penalties in the event of a breach that results in&lt;br /&gt;
exploited data. A cyber security audit will help mitigate the&lt;br /&gt;
consequences of a breach and demonstrate that your organization has&lt;br /&gt;
taken the necessary steps to protect client and company data. &amp;lt;ref name=&amp;quot;cyforsecure&amp;quot;&amp;gt;Cyfor Secure, &amp;quot;What is a Cyber Security Audit and how can it help your organisation?&amp;quot;. Available: https://cyforsecure.co.uk/services/cyber-assessment/cyber-security-audit/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cybersecurity compliance is the organizational risk management method&lt;br /&gt;
aligned with pre-defined security measures &amp;amp;amp; controls on how data&lt;br /&gt;
confidentiality is ensured by its administrative procedures.&amp;lt;ref name=&amp;quot;nordlayer&amp;quot;&amp;gt;NordLayer, &amp;quot;Cybersecurity compliance: Everything you need to know&amp;quot;. Available: https://nordlayer.com/blog/cybersecurity-compliance-everything-you-need-to-know/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
All needed skills are developed through courses and certification.&lt;br /&gt;
&lt;br /&gt;
===Entry-Level Incident Response Positions===&lt;br /&gt;
It is not always possible to advance to the position of incident&lt;br /&gt;
responder in a straight line. Many professionals advance from entry- to&lt;br /&gt;
mid-level positions before becoming a real incident responder or a&lt;br /&gt;
member of a computer emergency response team (CERT).&amp;lt;br /&amp;gt;&lt;br /&gt;
These are some examples: &amp;lt;ref name=&amp;quot;Infosec&amp;quot;&amp;gt;Infosec, &amp;quot;Incident Responder Career Roadmap: From Entry Level to Executive&amp;quot;. Available: https://resources.infosecinstitute.com/topic/incident-responder-career-roadmap-entry-level-executive/ [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;network-administrator&amp;quot;&amp;gt;Network administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;This position’s experience will help potential incident responders&lt;br /&gt;
develop networking skills. Attention to detail, as well as the ability&lt;br /&gt;
to sift through system configurations, site layouts, and general network&lt;br /&gt;
and communication setups, are essential in this field.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;system-administrator&amp;quot;&amp;gt;System administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Another crucial beginning point for an incident responder is to learn&lt;br /&gt;
how to manage resources inside your organization as well as user&lt;br /&gt;
behavior. Understanding the potential damage that users, inadequate&lt;br /&gt;
security setups, and ineffective IT policies and procedures can cause on&lt;br /&gt;
your network can provide prospective candidates with insight into the&lt;br /&gt;
human component of an incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;security-administrator&amp;quot;&amp;gt;Security administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In such a position, basic hacking skills, penetration testing, and&lt;br /&gt;
intrusion detection are all learned, which are crucial incident&lt;br /&gt;
responder skills when trying to replicate a breach or attack.&lt;br /&gt;
Understanding the paths a cybercriminal will take when attempting to&lt;br /&gt;
damage or obtain access to a system can greatly simplify the work of&lt;br /&gt;
reverse engineering the incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Mid-Level Incident Response Positions ===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5&lt;br /&gt;
id=&amp;quot;computer-security-incident-response-team-csirt-engineer&amp;quot;&amp;gt;Computer&lt;br /&gt;
security incident response team (CSIRT) engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;cyber-incident-responder&amp;quot;&amp;gt;Cyber incident responder&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-response-engineer&amp;quot;&amp;gt;Incident response&lt;br /&gt;
engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;While each of these positions is different, they generally require&lt;br /&gt;
very similar skills and characteristics in a candidate. At this level,&lt;br /&gt;
personal characteristics such as problem solving, time management, and&lt;br /&gt;
even presentation skills become more crucial as one’s career evolves&lt;br /&gt;
into a management-facing role.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Technical skills include the ability to identify and minimize threats&lt;br /&gt;
while maintaining communication with management and the rest of your&lt;br /&gt;
team. Data analysis and evidence gathering become increasingly crucial,&lt;br /&gt;
and the circumstances in which your services are deployed get more&lt;br /&gt;
serious.&amp;lt;/p&amp;gt;&lt;br /&gt;
Problem-solving skills are crucial at this level of incident&lt;br /&gt;
response, and as the stakes rise, so does the pressure in each&lt;br /&gt;
situation. At this level, programming abilities are essential since&lt;br /&gt;
incident responders may be needed to reverse engineer malicious code or&lt;br /&gt;
even create patches for vulnerable network applications or services. &amp;lt;ref name=&amp;quot;coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated]&amp;quot;. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Senior-Level Incident Response Positions===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;intrusion-detection-specialist&amp;quot;&amp;gt;Intrusion detection&lt;br /&gt;
specialist:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;A CISSP certification might help a potential candidate in preparing&lt;br /&gt;
for the profession. The role of an intrusion detection specialist is to&lt;br /&gt;
find and stop any unwanted communications.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-manager&amp;quot;&amp;gt;Incident manager:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Expected to plan, oversee, manage, and supervise all incident&lt;br /&gt;
response team actions. Is in charge of reporting all current events to&lt;br /&gt;
senior management and stakeholders, as well as acting as the technical&lt;br /&gt;
lead on active incidents for incident responders. Prepares threat and&lt;br /&gt;
impact assessments and reports them known to management.&amp;lt;ref name=&amp;quot;coursera&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Certificates== &lt;br /&gt;
There is a vast number of different certificates and the road map to&lt;br /&gt;
being a certified professional could be very different&amp;lt;ref name=&amp;quot;Coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated],&amp;quot; [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;NICCS&amp;quot;&amp;gt;NICCS, &amp;quot;Cybersecurity Certifications,&amp;quot; [Online]. Available: hhttps://niccs.cisa.gov/about-niccs/cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt; . One possible&lt;br /&gt;
approach is to start with basic certificates from the different branches&lt;br /&gt;
of service and move to more specific and demanding focused&lt;br /&gt;
certification. Also, some jobs require certain clearances, either from&lt;br /&gt;
industry, or from the government. One small selection of different&lt;br /&gt;
possible certificates is brought out in following paragraphs.&lt;br /&gt;
&lt;br /&gt;
Security+ is a CompTIA certification that is considered a basic cert&lt;br /&gt;
among cybersecurity professionals. It covers the topics of risk&lt;br /&gt;
management and threat assessment.&lt;br /&gt;
Network+ is also offered by CompTIA this certification (like the name&lt;br /&gt;
implies) focuses on networking infrastructure and operations. It is&lt;br /&gt;
considered a foundational certification.&lt;br /&gt;
The Certified Information Systems Security Professional (CISSP) is a&lt;br /&gt;
more advanced certification designed for cybersecurity professionals&lt;br /&gt;
with at least five years of work experience. The certification covers&lt;br /&gt;
topics such as architecture, engineering, and management.&amp;lt;/p&amp;gt;&lt;br /&gt;
The Certified Ethical Hacker (CEH) certification is also considered a&lt;br /&gt;
more advanced cert because it generally requires that applicants have&lt;br /&gt;
multiple years of work experience. The goal of an ethical hacker&lt;br /&gt;
certification is to be able to understand how cyber attacks unfold in&lt;br /&gt;
order to improve threat assessment and mitigation skills.&amp;lt;ref name=&amp;quot;cyberguide&amp;quot;&amp;gt;Cybersecurity Guide, &amp;quot;How to become a cybersecurity specialist&amp;quot;, [Online]. Available: https://cybersecurityguide.org/careers/security-specialist/. [Accessed 27 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
This is definitely not all, when one looks for more information, following link could be searched, to get more in depth knowledge about&lt;br /&gt;
different possibilities.&lt;br /&gt;
 &lt;br /&gt;
Hereby, with the help of this matrix a possible taxonomy of different 436 listed certificates in branches are&lt;br /&gt;
presented.&amp;lt;ref name=&amp;quot;Pauljeremy&amp;quot;&amp;gt;&amp;quot;Cybersecurity Roadmap,&amp;quot; [Online]. Available: https://pauljerimy.com/2020/10/12/scr-oct-2020-update/. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:analystimage5.png|1000px|thumb|Certificate matrix &amp;lt;ref&amp;gt;&amp;quot;Certification roadmap&amp;quot;. Available at https://pauljerimy.com/security-certification-roadmap&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
=== Communication and Network Security===&lt;br /&gt;
Communication and network security covers the ability to secure&lt;br /&gt;
communication channels and networks. Topics include secure and converges&lt;br /&gt;
protocols, wireless networks, cellular networks, hardware operations&lt;br /&gt;
(warranty and redundant power), and third-party connectivity. IP&lt;br /&gt;
networking are also included in this domain.&lt;br /&gt;
===Identity and Access Management===&lt;br /&gt;
The identity and access management domain covers the attacks that&lt;br /&gt;
target the human gateway to gain access to data. Other topics include&lt;br /&gt;
ways to identify users with rights to access the information and&lt;br /&gt;
servers. Identity and access management covers the topics of&lt;br /&gt;
applications, Single sign-on authentication, privilege escalation,&lt;br /&gt;
Kerberos, rule-based or risk-based access control, proofing and&lt;br /&gt;
establishment of identity.&lt;br /&gt;
===Security Architecture and Engineering===&lt;br /&gt;
The security architecture and engineering domain covers important&lt;br /&gt;
topics concerning security engineering plans, designs and principles,&lt;br /&gt;
Topics include assessing and mitigating information system&lt;br /&gt;
vulnerabilities, fundamental concepts of security models and security&lt;br /&gt;
architectures in critical areas like access control. Cloud systems,&lt;br /&gt;
cryptography, system infiltrations (ransomware, fault-injection and&lt;br /&gt;
more) and virtualized systems are also covered in this domain.&lt;br /&gt;
===Asset Security===&lt;br /&gt;
The Asset Security domain deals with the issues related to the&lt;br /&gt;
collection, storage, maintenance, retention and destruction of data. It&lt;br /&gt;
also covers knowledge of different roles regarding data handling (owner,&lt;br /&gt;
controller and custodian) as well as data protection methods and data&lt;br /&gt;
states. Other topics include resource provision, asset classification&lt;br /&gt;
and data lifecycle management.&lt;br /&gt;
===Security and Risk Management===&lt;br /&gt;
The security and risk management domain covers general on skills&lt;br /&gt;
related to the implementation of user awareness programs as well as&lt;br /&gt;
security procedures. Emphasis is also placed on risk management&lt;br /&gt;
concerning the acquisition of new services, hardware and software&lt;br /&gt;
(supply chain). Other skills include social engineering defense&lt;br /&gt;
mechanisms.&lt;br /&gt;
===Security Assessment and Testing===&lt;br /&gt;
The security assessment and testing domain deals with all the&lt;br /&gt;
techniques and tools used to find system vulnerabilities, weaknesses and&lt;br /&gt;
potential areas of concern not addressed by security procedures and&lt;br /&gt;
policies. Attack simulations, vulnerability assessment, compliance&lt;br /&gt;
checks, and ethical disclosure also fall under this domain.&lt;br /&gt;
===Software Security===&lt;br /&gt;
The software development security domain deals with implementing&lt;br /&gt;
software-based security protocols within environment for which the IT&lt;br /&gt;
professional is responsible. Risk analysis, vulnerability identification&lt;br /&gt;
and auditing of source codes are all covered in this subset. Additional&lt;br /&gt;
topics include software-designed security, maturity models, development&lt;br /&gt;
methodologies, open-source and third-party development security.&lt;br /&gt;
===Security operations===&lt;br /&gt;
The security operations domain covers topics ranging from&lt;br /&gt;
investigations and digital forensic to detection and intrusion&lt;br /&gt;
prevention tools, sandboxing and firewalls. Topics include user and&lt;br /&gt;
entity behavior analytics, threat intelligence (threat hunting and&lt;br /&gt;
threat feeds) log management, artifacts (mobile, computer and network),&lt;br /&gt;
machine learning and AI-based tools, penetration testing, and&lt;br /&gt;
exploitation development. These for sub-domains are lister here.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Incident Handling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Penetration Testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Exploitation&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Education==&lt;br /&gt;
[[File:Analystimage7.png|400px|thumb|Comparison degree vs Certificate &amp;lt;ref&amp;gt;&amp;quot;Comparison Table&amp;quot;. Available at https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
The entry level monitoring specialist is hired by Estonian&lt;br /&gt;
Information System Authority even if there is no formal IT education,&lt;br /&gt;
but readiness to learn and moderate knowledge of different operation&lt;br /&gt;
systems is enough to start the career. &amp;lt;ref name=&amp;quot;cv&amp;quot;&amp;gt;cv.ee, &amp;quot;SEIRESPETSIALIST - tule Eesti küberruumi valvuriks!&amp;quot;. Available: https://www.cv.ee/en/vacancy/792782/riigi-infosusteemi-amet/seirespetsialist-tule-eesti-kuberruumi-valvuriks [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Nevertheless, like most other high qualification careers jobs falling&lt;br /&gt;
under the cybersecurity specialist category require some form of formal&lt;br /&gt;
education. However, since cybersecurity specialist jobs can fall across&lt;br /&gt;
a wide spectrum of job descriptions and responsibilities, it is possible&lt;br /&gt;
to obtain a specialist job after completing many levels of different&lt;br /&gt;
computer related education.&lt;br /&gt;
&lt;br /&gt;
If one is looking for a cybersecurity related education, for example&lt;br /&gt;
in EU, 137 courses/programs could be found that relate to keyword IT or&lt;br /&gt;
cybersecurity. &amp;lt;ref name=&amp;quot;enisa&amp;quot;&amp;gt;ENISA (European Union Agency for Cybersecurity), &amp;quot;Cybersecurity Education-Cybersecurity Higher Education Database&amp;quot;. Available: https://www.enisa.europa.eu/topics/cybersecurity-education/education-map/education-courses [Accessed 26 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Also, there is a great amount of discussion, if cyber security&lt;br /&gt;
professional should have a degree or would be certification just enough.&lt;br /&gt;
One interesting table is produces by Franklin University that compares&lt;br /&gt;
benefits and/or drawbacks of each type of credential.&amp;lt;ref name=&amp;quot;franklin&amp;quot;&amp;gt;Franklin University, &amp;quot;Is Getting a Master&#039;s Degree in Cyber Security Worth It?&amp;quot;. Available: https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Certifications are generally good for people with little practical&lt;br /&gt;
experience because they are known quantities in the industry and can&lt;br /&gt;
help you get your foot in the door. They set a minimum knowledge bar.&lt;br /&gt;
But some certifications are viewed more favorably than others.&lt;br /&gt;
Certifications with renewal requirements are viewed better by hiring&lt;br /&gt;
managers, but they also more costly in the long run because of the need&lt;br /&gt;
for continuing education. Certifications are also good for showing&lt;br /&gt;
in-depth expertise in a specialization within cybersecurity. Depending&lt;br /&gt;
on your career goals, it may be advantageous to have a master’s&lt;br /&gt;
degree—which shows your breadth of knowledge, critical thinking and&lt;br /&gt;
leadership skills—and a certificate—which shows specific skill&lt;br /&gt;
competency.&amp;lt;ref name=&amp;quot;franklin&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
As IT (Cyber) Security is still a relatively young discipline,&lt;br /&gt;
universities and colleges are still figuring out which is the best&lt;br /&gt;
approach for their degrees. Study programmes and curricula in Cyber&lt;br /&gt;
Security are different. In general, here are the duration of Cyber&lt;br /&gt;
Security degrees:&lt;br /&gt;
&amp;lt;ref name=&amp;quot;studyportal&amp;quot;&amp;gt;Studyportals, &amp;quot;Why You Should Study a Cyber Security Degree in 2022&amp;quot;. Available: https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Bachelor’s degrees in Cyber Security take 3 or 4 years in most&lt;br /&gt;
countries.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Master’s courses in Cyber Security take between 1-2 years to&lt;br /&gt;
complete.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;PhD programmes in Cyber Security last 3-5 years. Some only take 1&lt;br /&gt;
or 2 years, but they are less common.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Generalization could me made that on bachelor level the general&lt;br /&gt;
knowledge about the cyber issues are obtained. On master level the&lt;br /&gt;
specialization courses are taken and the person can choose more specific&lt;br /&gt;
topics to study. It is on master level where strengths of the cyber&lt;br /&gt;
specialist can be developed further and up-do date knowledge obtained in&lt;br /&gt;
specifics. PhD is serious science and involves teaching, lot of&lt;br /&gt;
scientific work and writing for publications.&lt;br /&gt;
&lt;br /&gt;
==Salary==&lt;br /&gt;
&amp;lt;p&amp;gt;Even if the salary can be very different, compared to the skills and&lt;br /&gt;
experience, an generalization can be made. Cyber Security professionals&lt;br /&gt;
in CSIRT, and in other entities earn quite well, from the start. First,&lt;br /&gt;
some comparison from the United States. The average CSIRT analyst salary&lt;br /&gt;
in the USA is $97,500 per year or $50 per hour. Entry level positions&lt;br /&gt;
start at $48,875 per year while most experienced workers make up to&lt;br /&gt;
$135,373 per year.&amp;lt;ref name=&amp;quot;talent&amp;quot;&amp;gt;talent.com, &amp;quot;Csirt Analyst average salary in USA 2022&amp;quot;. Available: https://www.talent.com/salary?job=csirt+analyst [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There are multiple positions you can occupy in this field. They have&lt;br /&gt;
in common great salaries and high demand for technical skills, attention&lt;br /&gt;
to details, problem-solving mentality, and the ability to analyze risks.&lt;br /&gt;
Here are the average annual salaries in the United States, according to&lt;br /&gt;
Payscale: &amp;lt;ref name=&amp;quot;studyportal&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Cryptographer – 100,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Information Security Officer – 91,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Assessor – 90,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Engineer – 88,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Penetration Tester – 81,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Forensics Expert – 71,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Administrator – 65,000 USD&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
When looking into salaries in Estonia, one can find that there is a&lt;br /&gt;
discussion that private sector is taking a toll from the public sector,&lt;br /&gt;
and that the salaries in important agencies, as Information System&lt;br /&gt;
Authority loose their employees to the better paid positions in private&lt;br /&gt;
sector.&amp;lt;ref name=&amp;quot;digigeenius&amp;quot;&amp;gt;DiGi Geenius, &amp;quot;Kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad&amp;quot;. Available: https://digi.geenius.ee/rubriik/uudis/kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad/ [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;tehnika&amp;quot;&amp;gt;Postimees, &amp;quot;Riigi-it-tootajate-palgamaarad-kasvasid&amp;quot;. Available: https://tehnika.postimees.ee/6887428/riigi-it-tootajate-palgamaarad-kasvasid [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
But there is also a different view that average private sector worker&lt;br /&gt;
could be hired as a top specialist in public sector and then the payment&lt;br /&gt;
is higher. Nevertheless, it seems that the average payment in cyber&lt;br /&gt;
security sector is any way higher that in other parts of the&lt;br /&gt;
e-services. &amp;lt;ref name=&amp;quot;digigeenius2&amp;quot;&amp;gt;DiGi Geenius, &amp;quot;5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka&amp;quot;. Available: https://digi.geenius.ee/rubriik/uudis/5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==SOC==&lt;br /&gt;
&amp;lt;p&amp;gt;A SOC is a facility where an organization’s network, applications,&lt;br /&gt;
and endpoints are monitored and defended. The term was adapted from&lt;br /&gt;
network operations centers (NOCs), where large telecommunication or&lt;br /&gt;
corporate networks are monitored. When network security became more of a&lt;br /&gt;
concern, security teams were formed within the NOCs, and eventually spun&lt;br /&gt;
off into larger organizations of their own as the responsibilities of&lt;br /&gt;
security teams grew increasingly complex and specialized. The security&lt;br /&gt;
staff working in a security operations center are often called the SOC&lt;br /&gt;
team.&amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;Exabeam, &amp;quot;CSIRT&amp;quot;. Available: https://www.exabeam.com/incident-response/csirt/ [Accessed 28 APr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;Functions of the SOC team include, but are not limited to:&amp;lt;ref name=&amp;quot;trellix&amp;quot;&amp;gt;Trellix, &amp;quot;What Is a Security Operations Center (SOC)?&amp;quot;. Available: https://www.trellix.com/en-us/security-awareness/operations/what-is-soc.html [Accessed 30 APr 2022].&amp;lt;/ref&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ol type=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Taking inventory of resources, to get a better understanding of the&lt;br /&gt;
structure they are protecting.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintanence of the system, by constantly making updates and adding&lt;br /&gt;
safeguards.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Monitoring the network for abnormalities with special tools.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Threat analysis of new attacks and vulnerabilities.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Responding to attacks, by acting as “first responders”. The SOC team&lt;br /&gt;
will shut down and/or isolate endpoints, deleting files and lowering the&lt;br /&gt;
impact as fast as possible.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Recovery of system stability and lost data. This may be done using&lt;br /&gt;
backups, restarting endpoints or reconfiguring systems.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Logging all actions on the system, to be later used for analysis or&lt;br /&gt;
forensics after an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigating the root cause of an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Auditing their own actions, to be in line with regulations of the&lt;br /&gt;
organization, industry or governing body.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==CSIRT==&lt;br /&gt;
&amp;lt;p&amp;gt;A CSIRT is a group that responds to security incidents when they&lt;br /&gt;
occur. Key responsibilities of a CSIRT include:&lt;br /&gt;
&amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
===Creating and maintaining an incident response plan (IRP)===&lt;br /&gt;
An incident response plan (IRP) is a set of written instructions for&lt;br /&gt;
detecting, responding to and limiting the effects of an information&lt;br /&gt;
security event. Incident response plans provide instructions for&lt;br /&gt;
responding to many potential scenarios, including data breaches, denial&lt;br /&gt;
of service/distributed denial of service attacks, firewall breaches,&lt;br /&gt;
virus or malware outbreaks or insider threats. Without an incident&lt;br /&gt;
response plan in place, organizations may either not detect the attack&lt;br /&gt;
in the first place, or not follow proper protocol to contain the threat&lt;br /&gt;
and recover from it when a breach is detected.&lt;br /&gt;
&lt;br /&gt;
https://www.stratacore.com/incidentresponseplan&lt;br /&gt;
===Investigating and analyzing incidents===&lt;br /&gt;
CSIRTs are also involved in improvement activities. After major&lt;br /&gt;
computer security incidents occur, or when incidents are not handled in&lt;br /&gt;
a timely or effective manner, a CSIRT will generally perform a&lt;br /&gt;
postmortem of the incident and its response. This postmortem will&lt;br /&gt;
identify the strengths and weakness of the response effort. Such reviews&lt;br /&gt;
can identify weaknesses and holes in systems, infrastructure defenses,&lt;br /&gt;
or policies that allowed the incident to take place. It can also&lt;br /&gt;
identify problems with communication channels, interfaces, and&lt;br /&gt;
procedures that inhibited the efficient resolution of the reported&lt;br /&gt;
problem.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.cisa.gov/uscert/bsi/articles/best-practices/incident-management/defining-computer-security-incident-response-teams&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Managing internal communications and updates during or immediately after incidents occur===&lt;br /&gt;
===Communicating with employees, shareholders, customers, and the press about incidents as needed===&lt;br /&gt;
&amp;lt;p&amp;gt;There are various services within the CSIRT Services Framework that&lt;br /&gt;
address communications, as they relate to security operations and&lt;br /&gt;
incident response services. Some of these include Information Security&lt;br /&gt;
Incident Coordination, Crisis Management Support, Vulnerability&lt;br /&gt;
Disclosure, Situational Awareness Communication, and Awareness Building,&lt;br /&gt;
to name a few. Sharing information and communicating with the general&lt;br /&gt;
public and/or your constituency is appropriate in many different&lt;br /&gt;
scenarios. These can range from proactive communications to reactive&lt;br /&gt;
communications. Each scenario may be unique, and careful consideration&lt;br /&gt;
should be given to when to release information to the public and what&lt;br /&gt;
information should be released.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;https://resources.sei.cmu.edu/asset_files/Handbook/2021_002_001_651819.pdf&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Remediating incidents===&lt;br /&gt;
Threat remediation is a strong and capable tool for fighting the&lt;br /&gt;
cyber security compromises. As the word ‘remedy’ suggests, remediation&lt;br /&gt;
process involves the treatment of a security breach. With the&lt;br /&gt;
remediation practices, your cyber security team is able to eliminate&lt;br /&gt;
suspicious activities and malicious attacks in the form of malware,&lt;br /&gt;
ransomware, phishing and such. Even if you ‘kill’ the suspicious&lt;br /&gt;
activity, the attackers can remain in your systems. If you want to&lt;br /&gt;
contaminate and end the problem for good, your remediation processes&lt;br /&gt;
must involve the detection of the cause. &amp;lt;ref name=&amp;quot;logsign&amp;quot;&amp;gt;Logsign, &amp;quot;What-is-remediation-in-cyber-security&amp;quot;. Available: https://www.logsign.com/blog/what-is-remediation-in-cyber-security/. [Accessed 28 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Recommending technology, policy, governance, and training changes after security incidents===&lt;br /&gt;
After all these actions, the SCIRT must contribute to the development&lt;br /&gt;
of better policies, practices and has to recommend improvements. They&lt;br /&gt;
are not working in the vacuum and their work has to create new and&lt;br /&gt;
better standards for cyber security. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;Exabeam, &amp;quot;CSIRT&amp;quot;. Available: https://www.exabeam.com/incident-response/csirt/ [Accessed 28 APr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==CERT==&lt;br /&gt;
&amp;lt;p&amp;gt;The term “computer emergency response team” was coined in 1988. In&lt;br /&gt;
response to the Morris worm attack that impacted thousands of servers on&lt;br /&gt;
the Internet, DARPA funded the formation of the Computer Emergency&lt;br /&gt;
Response Team Coordination Center (CERT-CC) at Carnegie Mellon&lt;br /&gt;
University. The goal of CERT-CC was to help protect the internet by&lt;br /&gt;
collecting and disseminating information on critical security&lt;br /&gt;
vulnerabilities. Several other countries formed similar centers using&lt;br /&gt;
the same acronym (despite threats of legal action by Carnegie Mellon for&lt;br /&gt;
trademark infringement). Now the term CERT refers to any emergency&lt;br /&gt;
response team that deals with cyber threats. Many people use CERT-CC&lt;br /&gt;
interchangeably with CSIRT, though the charter of a CERT is information&lt;br /&gt;
sharing in order to help other response teams respond to threats against&lt;br /&gt;
their own infrastructure.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In general, the designation of CERT is helpful in applying real-world&lt;br /&gt;
solutions to various cybersecurity problems. They may be government&lt;br /&gt;
contractors or employees of a major corporation. For example, the U.S.&lt;br /&gt;
Computer Emergency Readiness Team (US-CERT) operates under the U.S.&lt;br /&gt;
Department of Homeland Security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.techopedia.com/definition/31003/computer-emergency-response-team-cert&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In Estonia CERT is designated as CERT-EE. It was established in 2006,&lt;br /&gt;
as an organization responsible for the management of security incidents&lt;br /&gt;
in .ee computer networks. It is also a national contact point for&lt;br /&gt;
international co-operation in the field of IT security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ria.ee/en/cyber-security/cert-ee.html&amp;lt;/p&amp;gt;&lt;br /&gt;
==Difference between SOC/CSIRT/CERT==&lt;br /&gt;
[[File:analystimage3.png|300px|thumb|SOC/CSIRT/CERT &amp;lt;ref name=&amp;quot;exabeam&amp;gt;&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
How CSIRTs differ from CERTs and SOCs. There are overlapping&lt;br /&gt;
responsibilities between a community emergency response team (CERT),&lt;br /&gt;
computer security incident response team (CSIRT), and security&lt;br /&gt;
operations center (SOC). To add to this confusion, frequently, the terms&lt;br /&gt;
CERT and CSIRT are used interchangeably, despite the important&lt;br /&gt;
differences.&lt;br /&gt;
&lt;br /&gt;
==Understand the primary roles and characteristics of a CERT, CSIRT, and SOC.==&lt;br /&gt;
[[File:analystimage4.png|300px|thumb|Primary Roles of CERT, CSIRT, and SOC&amp;lt;ref name=&amp;quot;exabeam&amp;gt;&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&amp;lt;p&amp;gt;So, using strict definitions, a CERT collects and disseminates&lt;br /&gt;
security information, typically for the benefit of a country or an&lt;br /&gt;
industry. A CSIRT is a cross-functional team that responds to incidents&lt;br /&gt;
on behalf of a country or an organization. A SOC is where a country or&lt;br /&gt;
organization monitors and defends its network, servers, applications,&lt;br /&gt;
and endpoints.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Future==&lt;br /&gt;
&amp;lt;p&amp;gt;And the Cyber security problem is only getting bigger. According to a&lt;br /&gt;
report published by Accenture, the number of cyber security breaches&lt;br /&gt;
increased by 11 percent from 2017 to 2018. The cost of such breaches is&lt;br /&gt;
astronomical–about $600 billion worldwide, according to the Economic&lt;br /&gt;
Impact of Cybercrime report.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Job projections for cybersecurity are staggering. The Bureau of Labor&lt;br /&gt;
Statistics in US predicts that careers in the cybersecurity field will&lt;br /&gt;
grow by 32% by 2028. That makes cybersecurity one of the top 10&lt;br /&gt;
fastest-growing jobs in the country. In the United States alone, jobs&lt;br /&gt;
for Information Security Analysts are expected to grow by 15% by&lt;br /&gt;
2024.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Most likely this trend is also similar in other countries.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When checking Estonian job portals, there is a constant need for&lt;br /&gt;
people for cyber security related positions. Also, linkedin search gives&lt;br /&gt;
approximately 30 vacancies immediately. There are banks, logistics&lt;br /&gt;
companies, e-shops, and software producers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://ee.linkedin.com/jobs/cyber-security-jobs?countryRedirected=1&amp;amp;amp;position=1&amp;amp;amp;pageNum=0&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Trends that affect companies create need for constant cyber security&lt;br /&gt;
services. Increasing number of home/remote offices require secure&lt;br /&gt;
corporate networks and security of remote devices. One example is from&lt;br /&gt;
this year, when sloppy remote desktop set-up paralyzed systems of 17&lt;br /&gt;
companies.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.aripaev.ee/uudised/2022/04/20/ria-lohakas-kaugtoolaua-seadistus-halvas-martsis-vahemalt-17-juhul-ettevotete-it-susteemid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Also, no service can exists without robust infrastructure - servers,&lt;br /&gt;
databases, applications. As all previously mentioned devices and&lt;br /&gt;
services are at constant scanning and surveillance. So, the breach&lt;br /&gt;
detection and immediate action demands 24/7 services. Even if lot of&lt;br /&gt;
things could be automated, there is a need for human specialists (at&lt;br /&gt;
least, at the moment). Third growing field is also a forensic&lt;br /&gt;
investigation, as every attack must be investigated in order to be ready&lt;br /&gt;
to repel next attacks. So data recovery and evidence collection is&lt;br /&gt;
another important field of work that need skilled and professional&lt;br /&gt;
workers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Even, if the specifics of the entity, be it CSIRT, CERT or SOC, are&lt;br /&gt;
different, the fundamentals of the work are the same. Professional&lt;br /&gt;
knowledge of the networks, operational systems, hardware, scripting, and&lt;br /&gt;
several other wider IT related knowledge is needed. As there is no&lt;br /&gt;
single way to reach to it, every single person can find one’s strongest&lt;br /&gt;
sides and develop them with knowledge of weaker side, in order to know,&lt;br /&gt;
when to as for help.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/body&amp;gt;&lt;br /&gt;
&amp;lt;/html&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mavald</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142248</id>
		<title>Hiring a Cyber Security Incident Analyst</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142248"/>
		<updated>2022-05-01T15:58:47Z</updated>

		<summary type="html">&lt;p&gt;Mavald: /* Difference between SOC/CSIRT/CERT */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==A Cyber Security Incident Analyst==&lt;br /&gt;
&lt;br /&gt;
[[File:image1.png|600px|thumb|Job advertisement &amp;lt;ref&amp;gt;&amp;quot;Job Advertisement&amp;quot;. Available at https://www.projectpeople.com/jobs/&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
===Cyber security incident analyst in SOC/CSIRT/CERT===&lt;br /&gt;
This article delves into the job title of Cyber Security Incident&lt;br /&gt;
Analyst and provides an overview of the acronyms SOC/CSIRT/CERT. A brief&lt;br /&gt;
history of the job is discussed here, as well as a possible career path,&lt;br /&gt;
education, experience, and other characteristics required for work in&lt;br /&gt;
computer security-related organizations. The article also provides a&lt;br /&gt;
brief history of SOC/CSIRT/CERT, as well as a comparison of their&lt;br /&gt;
differences and similarities.&lt;br /&gt;
===Cyber Security Incident Analyst Skill Set===&lt;br /&gt;
What skill set is expected from the Cyber Security Incident Analyst? Below written lines are taken from the same job advertisement depicted&lt;br /&gt;
on the left side of this article:&lt;br /&gt;
As a Security Incident Analyst your responsibilities will include:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Continuous monitoring of security tooling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Performing regular and ad-hoc vulnerability assessments&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Carrying out ‘spot checks’&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Reporting vulnerabilities to the PVG via the alerts system&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintaining and documenting logging systems&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Developing centralized logging, reporting and intelligence&lt;br /&gt;
platforms&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;‘Light touch’ penetration testing with open source tooling&lt;br /&gt;
(Metasploit)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Knowledge &amp;amp;amp; Experience required:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;SOC, CSIRT or CERT operational environment experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Windows / Linux experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TCP /IP networking protocol knowledge&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience reviewing and analyzing Security Events from various&lt;br /&gt;
monitoring and logging sources&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience in website and web application security assessment or&lt;br /&gt;
penetration testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience of using Metasploit&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Scripting knowledge using BASH, Python, Perl, Ruby&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Skills in Host and Network Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
As one can see the description of the duties is wide and also the&lt;br /&gt;
knowledge and experience that is required is noteworthy. So, where to&lt;br /&gt;
start to find out the way to get this kind of knowledge and&lt;br /&gt;
expertize.&lt;br /&gt;
===Possible career path===&lt;br /&gt;
Next part of the paper is aiming to depict a possible ways, how to&lt;br /&gt;
develop oneself, and move along the career pathway in cybersecurity&lt;br /&gt;
field. Topics of development, education, experience and certification&lt;br /&gt;
are covered.&lt;br /&gt;
[[File:analystimage2.png|1000px|thumb|Career path &amp;lt;ref&amp;gt;&amp;quot;Possible Career Path&amp;quot;. Available at https://www.cyberseek.org/pathway.html&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
===Junior/Senior===&lt;br /&gt;
Start with an entry-level job in IT. Hands-on experience is often the&lt;br /&gt;
most effective way to prepare for certification exams. Start&lt;br /&gt;
accumulating work experience with an entry-level role as a cybersecurity&lt;br /&gt;
analyst. Many cybersecurity professionals start off in more general IT&lt;br /&gt;
roles. The skills, practices, and technologies you’ll use as a&lt;br /&gt;
cybersecurity professional will continue to evolve along with computer&lt;br /&gt;
and network technology. The desire to learn, ability to problem solve,&lt;br /&gt;
and attention to detail will serve you well in this field. Other, more&lt;br /&gt;
technical skills and technologies to learn include:&amp;lt;ref name=&amp;quot;certification&amp;quot;&amp;gt;Popular Cyber Security Certificates [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications  [Accessed 25 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====SIEM tools (security information and event management)====&lt;br /&gt;
Security Information and Event Management (SIEM) is a set of tools&lt;br /&gt;
and services offering a holistic view of an organization’s information&lt;br /&gt;
security. SIEM works by combining two technologies:&lt;br /&gt;
&amp;lt;li&amp;gt;Security information management (SIM), which collects data from log&lt;br /&gt;
files for analysis and reports on security threats and events, and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;security event management (SEM), which conducts real-time system&lt;br /&gt;
monitoring, notifies network admins about important issues and&lt;br /&gt;
establishes correlations between security events. There are a number of&lt;br /&gt;
security information and event management solutions on the market.&lt;br /&gt;
ArcSight ESM, IBM QRadar and Splunk are among the most popular. &amp;lt;ref name=&amp;quot;SIEM&amp;quot;&amp;gt;Application security, SIEM [Online]. Available: https://www.imperva.com/learn/application-security/siem/. [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Firewalls, Intrusion Detection Systems (IDS), and Intrusion Prevention Systems(IPS)====&lt;br /&gt;
Firewalls can be two types, hardware and software firewalls. Software&lt;br /&gt;
firewall is a firewall that is installed on a computer or server, and&lt;br /&gt;
tasked with network security. It works with a wide variety of other&lt;br /&gt;
technology security solutions to provide more robust and cohesive&lt;br /&gt;
security for enterprises of all sizes. When a software firewall is&lt;br /&gt;
installed on a server, it opens up like an umbrella of protection over&lt;br /&gt;
all other computers connected to the network. It is able to monitor both&lt;br /&gt;
incoming and outgoing traffic for potential risk or suspicious user&lt;br /&gt;
behavior, and also makes setting security policies much easier, faster&lt;br /&gt;
and more flexible. Hardware firewall is positioned between the network&lt;br /&gt;
and devices, allowing traffic to funnel through the firewall for a close&lt;br /&gt;
inspection and analysis. A hardware firewall, a term often&lt;br /&gt;
interchangeable with network or next-generation firewall, protects the&lt;br /&gt;
network gateways for an enterprise. Hardware firewall is physical&lt;br /&gt;
hardware, installed between network elements and connected devices, and&lt;br /&gt;
is tasked with filtering traffic for cyber threat to the network or&lt;br /&gt;
devices. Filtering out unauthorized or suspicious users based on traffic&lt;br /&gt;
analysis is one of the biggest benefits of hardware firewall. &amp;lt;ref name=&amp;quot;sangfor&amp;quot;&amp;gt;Sangfor, &amp;quot;What is Software Firewall? Difference between Hardware Firewall and Software Firewall, [Online]. Available: https://www.sangfor.com/blog/cybersecurity/what-is-software-firewall-difference-between-hardware-firewall-and-software-firewall [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems&lt;br /&gt;
(IPS) are both parts of the network infrastructure. IDS/IPS compare&lt;br /&gt;
network packets to a cyberthreat database containing known signatures of&lt;br /&gt;
cyberattacks — and flag any matching packets. IDS doesn’t alter the&lt;br /&gt;
network packets in any way, whereas IPS prevents the packet from&lt;br /&gt;
delivery based on the contents of the packet, much like how a firewall&lt;br /&gt;
prevents traffic by IP address. &amp;lt;ref name=&amp;quot;Varonis&amp;quot;&amp;gt;Varonis, &amp;quot;What is Software Firewall? IDS vs. IPS: What is the Difference?, [Online]. Available: https://www.varonis.com/blog/ids-vs-ips [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Digital forensics====&lt;br /&gt;
Digital forensics is a branch of forensic science that focuses on&lt;br /&gt;
identifying, acquiring, processing, analyzing, and reporting on data&lt;br /&gt;
stored electronically. Electronic evidence is a component of almost all&lt;br /&gt;
criminal activities and digital forensics support is crucial for law&lt;br /&gt;
enforcement investigations. Electronic evidence can be collected from a&lt;br /&gt;
wide array of sources, such as computers, smartphones, remote storage,&lt;br /&gt;
unmanned aerial systems, shipborne equipment, and more.&amp;lt;ref name=&amp;quot;interpol&amp;quot;&amp;gt;Interpol, &amp;quot;Digital forensics&amp;quot;. Available: https://www.interpol.int/How-we-work/Innovation/Digital-forensics. [Accessed 28 4 2022].&amp;lt;/ref&amp;gt; &lt;br /&gt;
Investigative process of digital forensics can be divided into several stages. There are four major stages: preservation, collection,&lt;br /&gt;
examination, and analysis. All these four stages need a deep understanding of computers, technology across a broad spectrum, and cybersecurity principles and&lt;br /&gt;
practices, a working knowledge of computers, networks, and coding, in-depth investigative abilities, critical-thinking skills and analytical talent the ability to effectively communicate and work with a&lt;br /&gt;
wide range of people. &amp;lt;ref name=&amp;quot;ecpi&amp;quot;&amp;gt;&amp;quot;Digital forensics&amp;quot;. Available: https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me. [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Mobile device management====&lt;br /&gt;
Mobile device management (MDM) is software that allows IT&lt;br /&gt;
administrators to control, secure and enforce policies on smartphones,&lt;br /&gt;
tablets and other endpoints. Mobile device management software emerged&lt;br /&gt;
in the early 2000s as a way to control and secure the personal digital&lt;br /&gt;
assistants and smartphones that business workers began to use. The&lt;br /&gt;
consumer smartphone boom that started with the launch of the Apple&lt;br /&gt;
iPhone in 2007 led to the bring your own device (BYOD) trend, which&lt;br /&gt;
fueled further interest in MDM.&amp;lt;ref name=&amp;quot;techtarget&amp;quot;&amp;gt;Techtarget, &amp;quot;Mobile Device Management&amp;quot;. Available: https://www.techtarget.com/searchmobilecomputing/definition/mobile-device-management [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Data management====&lt;br /&gt;
Sometimes the data management is neglected, but this part has a&lt;br /&gt;
crucial role when learning for good cyber security practices. Majority&lt;br /&gt;
of cyber security programs include a special courses on data management.&lt;br /&gt;
Data management is a method of organizing and maintaining data processes&lt;br /&gt;
that are required in almost every business operations. The benefits of&lt;br /&gt;
data management can be found accounting, statistics, logistics planning&lt;br /&gt;
and other disciplines including corporate computing.&amp;lt;ref name=&amp;quot;GlobalUni&amp;quot;&amp;gt;Global Universities, &amp;quot;MSc Data Management and Cyber Security&amp;quot;. Available: https://globaluniversities.in/msc-data-management-cyber-security. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Data governance (and management) play a fundamental role in&lt;br /&gt;
protecting an organization’s data. Ensuring that the right people have&lt;br /&gt;
the right access and that appropriate security controls are in place to&lt;br /&gt;
protect each system or service, based on the criticality or sensitivity&lt;br /&gt;
of the data sets these contain. &amp;lt;ref name=&amp;quot;CyberMagazine&amp;quot;&amp;gt;Cyber Security Magazine, &amp;quot;The Role of Data Governance in Cybersecurity&amp;quot;. Available: https://cybersecurity-magazine.com/the-role-of-data-governance-in-cybersecurity/?utm_source=rss&amp;amp;amp;utm_medium=rss&amp;amp;amp;utm_campaign=the-role-of-data-governance-in-cybersecurity. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Application security development====&lt;br /&gt;
Application security describes security measures at the application&lt;br /&gt;
level that aim to prevent data or code within the app from being stolen&lt;br /&gt;
or hijacked. It encompasses the security considerations that happen&lt;br /&gt;
during application development and design, but it also involves systems&lt;br /&gt;
and approaches to protect apps after they get deployed. Application&lt;br /&gt;
security may include hardware, software, and procedures that identify or&lt;br /&gt;
minimize security vulnerabilities.&amp;lt;ref name=&amp;quot;vmware&amp;quot;&amp;gt;VmWare, &amp;quot;What is application security?&amp;quot;. Available: https://www.vmware.com/topics/glossary/content/application-security.html [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Application security development is important to ensure that your&lt;br /&gt;
application is free from coding errors and bugs. And controls the risk&lt;br /&gt;
and helps safeguard against security vulnerabilities. Application&lt;br /&gt;
security development is the process of making applications more secure&lt;br /&gt;
by finding and fixing security vulnerabilities. This is often done by&lt;br /&gt;
enforcing software security best practices and using application&lt;br /&gt;
security testing tools. &lt;br /&gt;
&amp;lt;ref name=&amp;quot;perforce&amp;quot;&amp;gt;Perforce, &amp;quot;Application Security Development Best Practices&amp;quot;. Available: https://www.perforce.com/blog/kw/application-security-development-best-practices. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Audit and compliance knowledge====&lt;br /&gt;
A cyber security audit is designed to be a comprehensive review and&lt;br /&gt;
analysis of your business’s IT infrastructure. It identifies threats and&lt;br /&gt;
vulnerabilities, exposing weaknesses and high-risk practices.&lt;br /&gt;
Regulations such as the EU GDPR (General Data Protection Regulation) can&lt;br /&gt;
impose hefty penalties in the event of a breach that results in&lt;br /&gt;
exploited data. A cyber security audit will help mitigate the&lt;br /&gt;
consequences of a breach and demonstrate that your organization has&lt;br /&gt;
taken the necessary steps to protect client and company data. &amp;lt;ref name=&amp;quot;cyforsecure&amp;quot;&amp;gt;Cyfor Secure, &amp;quot;What is a Cyber Security Audit and how can it help your organisation?&amp;quot;. Available: https://cyforsecure.co.uk/services/cyber-assessment/cyber-security-audit/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cybersecurity compliance is the organizational risk management method&lt;br /&gt;
aligned with pre-defined security measures &amp;amp;amp; controls on how data&lt;br /&gt;
confidentiality is ensured by its administrative procedures.&amp;lt;ref name=&amp;quot;nordlayer&amp;quot;&amp;gt;NordLayer, &amp;quot;Cybersecurity compliance: Everything you need to know&amp;quot;. Available: https://nordlayer.com/blog/cybersecurity-compliance-everything-you-need-to-know/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
All needed skills are developed through courses and certification.&lt;br /&gt;
&lt;br /&gt;
===Entry-Level Incident Response Positions===&lt;br /&gt;
It is not always possible to advance to the position of incident&lt;br /&gt;
responder in a straight line. Many professionals advance from entry- to&lt;br /&gt;
mid-level positions before becoming a real incident responder or a&lt;br /&gt;
member of a computer emergency response team (CERT).&amp;lt;br /&amp;gt;&lt;br /&gt;
These are some examples: &amp;lt;ref name=&amp;quot;Infosec&amp;quot;&amp;gt;Infosec, &amp;quot;Incident Responder Career Roadmap: From Entry Level to Executive&amp;quot;. Available: https://resources.infosecinstitute.com/topic/incident-responder-career-roadmap-entry-level-executive/ [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;network-administrator&amp;quot;&amp;gt;Network administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;This position’s experience will help potential incident responders&lt;br /&gt;
develop networking skills. Attention to detail, as well as the ability&lt;br /&gt;
to sift through system configurations, site layouts, and general network&lt;br /&gt;
and communication setups, are essential in this field.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;system-administrator&amp;quot;&amp;gt;System administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Another crucial beginning point for an incident responder is to learn&lt;br /&gt;
how to manage resources inside your organization as well as user&lt;br /&gt;
behavior. Understanding the potential damage that users, inadequate&lt;br /&gt;
security setups, and ineffective IT policies and procedures can cause on&lt;br /&gt;
your network can provide prospective candidates with insight into the&lt;br /&gt;
human component of an incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;security-administrator&amp;quot;&amp;gt;Security administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In such a position, basic hacking skills, penetration testing, and&lt;br /&gt;
intrusion detection are all learned, which are crucial incident&lt;br /&gt;
responder skills when trying to replicate a breach or attack.&lt;br /&gt;
Understanding the paths a cybercriminal will take when attempting to&lt;br /&gt;
damage or obtain access to a system can greatly simplify the work of&lt;br /&gt;
reverse engineering the incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Mid-Level Incident Response Positions ===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5&lt;br /&gt;
id=&amp;quot;computer-security-incident-response-team-csirt-engineer&amp;quot;&amp;gt;Computer&lt;br /&gt;
security incident response team (CSIRT) engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;cyber-incident-responder&amp;quot;&amp;gt;Cyber incident responder&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-response-engineer&amp;quot;&amp;gt;Incident response&lt;br /&gt;
engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;While each of these positions is different, they generally require&lt;br /&gt;
very similar skills and characteristics in a candidate. At this level,&lt;br /&gt;
personal characteristics such as problem solving, time management, and&lt;br /&gt;
even presentation skills become more crucial as one’s career evolves&lt;br /&gt;
into a management-facing role.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Technical skills include the ability to identify and minimize threats&lt;br /&gt;
while maintaining communication with management and the rest of your&lt;br /&gt;
team. Data analysis and evidence gathering become increasingly crucial,&lt;br /&gt;
and the circumstances in which your services are deployed get more&lt;br /&gt;
serious.&amp;lt;/p&amp;gt;&lt;br /&gt;
Problem-solving skills are crucial at this level of incident&lt;br /&gt;
response, and as the stakes rise, so does the pressure in each&lt;br /&gt;
situation. At this level, programming abilities are essential since&lt;br /&gt;
incident responders may be needed to reverse engineer malicious code or&lt;br /&gt;
even create patches for vulnerable network applications or services. &amp;lt;ref name=&amp;quot;coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated]&amp;quot;. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Senior-Level Incident Response Positions===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;intrusion-detection-specialist&amp;quot;&amp;gt;Intrusion detection&lt;br /&gt;
specialist:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;A CISSP certification might help a potential candidate in preparing&lt;br /&gt;
for the profession. The role of an intrusion detection specialist is to&lt;br /&gt;
find and stop any unwanted communications.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-manager&amp;quot;&amp;gt;Incident manager:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Expected to plan, oversee, manage, and supervise all incident&lt;br /&gt;
response team actions. Is in charge of reporting all current events to&lt;br /&gt;
senior management and stakeholders, as well as acting as the technical&lt;br /&gt;
lead on active incidents for incident responders. Prepares threat and&lt;br /&gt;
impact assessments and reports them known to management.&amp;lt;ref name=&amp;quot;coursera&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Certificates== &lt;br /&gt;
There is a vast number of different certificates and the road map to&lt;br /&gt;
being a certified professional could be very different&amp;lt;ref name=&amp;quot;Coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated],&amp;quot; [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;NICCS&amp;quot;&amp;gt;NICCS, &amp;quot;Cybersecurity Certifications,&amp;quot; [Online]. Available: hhttps://niccs.cisa.gov/about-niccs/cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt; . One possible&lt;br /&gt;
approach is to start with basic certificates from the different branches&lt;br /&gt;
of service and move to more specific and demanding focused&lt;br /&gt;
certification. Also, some jobs require certain clearances, either from&lt;br /&gt;
industry, or from the government. One small selection of different&lt;br /&gt;
possible certificates is brought out in following paragraphs.&lt;br /&gt;
&lt;br /&gt;
Security+ is a CompTIA certification that is considered a basic cert&lt;br /&gt;
among cybersecurity professionals. It covers the topics of risk&lt;br /&gt;
management and threat assessment.&lt;br /&gt;
Network+ is also offered by CompTIA this certification (like the name&lt;br /&gt;
implies) focuses on networking infrastructure and operations. It is&lt;br /&gt;
considered a foundational certification.&lt;br /&gt;
The Certified Information Systems Security Professional (CISSP) is a&lt;br /&gt;
more advanced certification designed for cybersecurity professionals&lt;br /&gt;
with at least five years of work experience. The certification covers&lt;br /&gt;
topics such as architecture, engineering, and management.&amp;lt;/p&amp;gt;&lt;br /&gt;
The Certified Ethical Hacker (CEH) certification is also considered a&lt;br /&gt;
more advanced cert because it generally requires that applicants have&lt;br /&gt;
multiple years of work experience. The goal of an ethical hacker&lt;br /&gt;
certification is to be able to understand how cyber attacks unfold in&lt;br /&gt;
order to improve threat assessment and mitigation skills.&amp;lt;ref name=&amp;quot;cyberguide&amp;quot;&amp;gt;Cybersecurity Guide, &amp;quot;How to become a cybersecurity specialist&amp;quot;, [Online]. Available: https://cybersecurityguide.org/careers/security-specialist/. [Accessed 27 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
This is definitely not all, when one looks for more information, following link could be searched, to get more in depth knowledge about&lt;br /&gt;
different possibilities.&lt;br /&gt;
 &lt;br /&gt;
Hereby, with the help of this matrix a possible taxonomy of different 436 listed certificates in branches are&lt;br /&gt;
presented.&amp;lt;ref name=&amp;quot;Pauljeremy&amp;quot;&amp;gt;&amp;quot;Cybersecurity Roadmap,&amp;quot; [Online]. Available: https://pauljerimy.com/2020/10/12/scr-oct-2020-update/. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:analystimage5.png|1000px|thumb|Certificate matrix &amp;lt;ref&amp;gt;&amp;quot;Certification roadmap&amp;quot;. Available at https://pauljerimy.com/security-certification-roadmap&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
=== Communication and Network Security===&lt;br /&gt;
Communication and network security covers the ability to secure&lt;br /&gt;
communication channels and networks. Topics include secure and converges&lt;br /&gt;
protocols, wireless networks, cellular networks, hardware operations&lt;br /&gt;
(warranty and redundant power), and third-party connectivity. IP&lt;br /&gt;
networking are also included in this domain.&lt;br /&gt;
===Identity and Access Management===&lt;br /&gt;
The identity and access management domain covers the attacks that&lt;br /&gt;
target the human gateway to gain access to data. Other topics include&lt;br /&gt;
ways to identify users with rights to access the information and&lt;br /&gt;
servers. Identity and access management covers the topics of&lt;br /&gt;
applications, Single sign-on authentication, privilege escalation,&lt;br /&gt;
Kerberos, rule-based or risk-based access control, proofing and&lt;br /&gt;
establishment of identity.&lt;br /&gt;
===Security Architecture and Engineering===&lt;br /&gt;
The security architecture and engineering domain covers important&lt;br /&gt;
topics concerning security engineering plans, designs and principles,&lt;br /&gt;
Topics include assessing and mitigating information system&lt;br /&gt;
vulnerabilities, fundamental concepts of security models and security&lt;br /&gt;
architectures in critical areas like access control. Cloud systems,&lt;br /&gt;
cryptography, system infiltrations (ransomware, fault-injection and&lt;br /&gt;
more) and virtualized systems are also covered in this domain.&lt;br /&gt;
===Asset Security===&lt;br /&gt;
The Asset Security domain deals with the issues related to the&lt;br /&gt;
collection, storage, maintenance, retention and destruction of data. It&lt;br /&gt;
also covers knowledge of different roles regarding data handling (owner,&lt;br /&gt;
controller and custodian) as well as data protection methods and data&lt;br /&gt;
states. Other topics include resource provision, asset classification&lt;br /&gt;
and data lifecycle management.&lt;br /&gt;
===Security and Risk Management===&lt;br /&gt;
The security and risk management domain covers general on skills&lt;br /&gt;
related to the implementation of user awareness programs as well as&lt;br /&gt;
security procedures. Emphasis is also placed on risk management&lt;br /&gt;
concerning the acquisition of new services, hardware and software&lt;br /&gt;
(supply chain). Other skills include social engineering defense&lt;br /&gt;
mechanisms.&lt;br /&gt;
===Security Assessment and Testing===&lt;br /&gt;
The security assessment and testing domain deals with all the&lt;br /&gt;
techniques and tools used to find system vulnerabilities, weaknesses and&lt;br /&gt;
potential areas of concern not addressed by security procedures and&lt;br /&gt;
policies. Attack simulations, vulnerability assessment, compliance&lt;br /&gt;
checks, and ethical disclosure also fall under this domain.&lt;br /&gt;
===Software Security===&lt;br /&gt;
The software development security domain deals with implementing&lt;br /&gt;
software-based security protocols within environment for which the IT&lt;br /&gt;
professional is responsible. Risk analysis, vulnerability identification&lt;br /&gt;
and auditing of source codes are all covered in this subset. Additional&lt;br /&gt;
topics include software-designed security, maturity models, development&lt;br /&gt;
methodologies, open-source and third-party development security.&lt;br /&gt;
===Security operations===&lt;br /&gt;
The security operations domain covers topics ranging from&lt;br /&gt;
investigations and digital forensic to detection and intrusion&lt;br /&gt;
prevention tools, sandboxing and firewalls. Topics include user and&lt;br /&gt;
entity behavior analytics, threat intelligence (threat hunting and&lt;br /&gt;
threat feeds) log management, artifacts (mobile, computer and network),&lt;br /&gt;
machine learning and AI-based tools, penetration testing, and&lt;br /&gt;
exploitation development. These for sub-domains are lister here.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Incident Handling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Penetration Testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Exploitation&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Education==&lt;br /&gt;
[[File:Analystimage7.png|400px|thumb|Comparison degree vs Certificate &amp;lt;ref&amp;gt;&amp;quot;Comparison Table&amp;quot;. Available at https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
The entry level monitoring specialist is hired by Estonian&lt;br /&gt;
Information System Authority even if there is no formal IT education,&lt;br /&gt;
but readiness to learn and moderate knowledge of different operation&lt;br /&gt;
systems is enough to start the career. &amp;lt;ref name=&amp;quot;cv&amp;quot;&amp;gt;cv.ee, &amp;quot;SEIRESPETSIALIST - tule Eesti küberruumi valvuriks!&amp;quot;. Available: https://www.cv.ee/en/vacancy/792782/riigi-infosusteemi-amet/seirespetsialist-tule-eesti-kuberruumi-valvuriks [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Nevertheless, like most other high qualification careers jobs falling&lt;br /&gt;
under the cybersecurity specialist category require some form of formal&lt;br /&gt;
education. However, since cybersecurity specialist jobs can fall across&lt;br /&gt;
a wide spectrum of job descriptions and responsibilities, it is possible&lt;br /&gt;
to obtain a specialist job after completing many levels of different&lt;br /&gt;
computer related education.&lt;br /&gt;
&lt;br /&gt;
If one is looking for a cybersecurity related education, for example&lt;br /&gt;
in EU, 137 courses/programs could be found that relate to keyword IT or&lt;br /&gt;
cybersecurity. &amp;lt;ref name=&amp;quot;enisa&amp;quot;&amp;gt;ENISA (European Union Agency for Cybersecurity), &amp;quot;Cybersecurity Education-Cybersecurity Higher Education Database&amp;quot;. Available: https://www.enisa.europa.eu/topics/cybersecurity-education/education-map/education-courses [Accessed 26 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Also, there is a great amount of discussion, if cyber security&lt;br /&gt;
professional should have a degree or would be certification just enough.&lt;br /&gt;
One interesting table is produces by Franklin University that compares&lt;br /&gt;
benefits and/or drawbacks of each type of credential.&amp;lt;ref name=&amp;quot;franklin&amp;quot;&amp;gt;Franklin University, &amp;quot;Is Getting a Master&#039;s Degree in Cyber Security Worth It?&amp;quot;. Available: https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Certifications are generally good for people with little practical&lt;br /&gt;
experience because they are known quantities in the industry and can&lt;br /&gt;
help you get your foot in the door. They set a minimum knowledge bar.&lt;br /&gt;
But some certifications are viewed more favorably than others.&lt;br /&gt;
Certifications with renewal requirements are viewed better by hiring&lt;br /&gt;
managers, but they also more costly in the long run because of the need&lt;br /&gt;
for continuing education. Certifications are also good for showing&lt;br /&gt;
in-depth expertise in a specialization within cybersecurity. Depending&lt;br /&gt;
on your career goals, it may be advantageous to have a master’s&lt;br /&gt;
degree—which shows your breadth of knowledge, critical thinking and&lt;br /&gt;
leadership skills—and a certificate—which shows specific skill&lt;br /&gt;
competency.&amp;lt;ref name=&amp;quot;franklin&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
As IT (Cyber) Security is still a relatively young discipline,&lt;br /&gt;
universities and colleges are still figuring out which is the best&lt;br /&gt;
approach for their degrees. Study programmes and curricula in Cyber&lt;br /&gt;
Security are different. In general, here are the duration of Cyber&lt;br /&gt;
Security degrees:&lt;br /&gt;
&amp;lt;ref name=&amp;quot;studyportal&amp;quot;&amp;gt;Studyportals, &amp;quot;Why You Should Study a Cyber Security Degree in 2022&amp;quot;. Available: https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Bachelor’s degrees in Cyber Security take 3 or 4 years in most&lt;br /&gt;
countries.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Master’s courses in Cyber Security take between 1-2 years to&lt;br /&gt;
complete.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;PhD programmes in Cyber Security last 3-5 years. Some only take 1&lt;br /&gt;
or 2 years, but they are less common.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Generalization could me made that on bachelor level the general&lt;br /&gt;
knowledge about the cyber issues are obtained. On master level the&lt;br /&gt;
specialization courses are taken and the person can choose more specific&lt;br /&gt;
topics to study. It is on master level where strengths of the cyber&lt;br /&gt;
specialist can be developed further and up-do date knowledge obtained in&lt;br /&gt;
specifics. PhD is serious science and involves teaching, lot of&lt;br /&gt;
scientific work and writing for publications.&lt;br /&gt;
&lt;br /&gt;
==Salary==&lt;br /&gt;
&amp;lt;p&amp;gt;Even if the salary can be very different, compared to the skills and&lt;br /&gt;
experience, an generalization can be made. Cyber Security professionals&lt;br /&gt;
in CSIRT, and in other entities earn quite well, from the start. First,&lt;br /&gt;
some comparison from the United States. The average CSIRT analyst salary&lt;br /&gt;
in the USA is $97,500 per year or $50 per hour. Entry level positions&lt;br /&gt;
start at $48,875 per year while most experienced workers make up to&lt;br /&gt;
$135,373 per year.&amp;lt;ref name=&amp;quot;talent&amp;quot;&amp;gt;talent.com, &amp;quot;Csirt Analyst average salary in USA 2022&amp;quot;. Available: https://www.talent.com/salary?job=csirt+analyst [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There are multiple positions you can occupy in this field. They have&lt;br /&gt;
in common great salaries and high demand for technical skills, attention&lt;br /&gt;
to details, problem-solving mentality, and the ability to analyze risks.&lt;br /&gt;
Here are the average annual salaries in the United States, according to&lt;br /&gt;
Payscale: &amp;lt;ref name=&amp;quot;studyportal&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Cryptographer – 100,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Information Security Officer – 91,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Assessor – 90,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Engineer – 88,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Penetration Tester – 81,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Forensics Expert – 71,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Administrator – 65,000 USD&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
When looking into salaries in Estonia, one can find that there is a&lt;br /&gt;
discussion that private sector is taking a toll from the public sector,&lt;br /&gt;
and that the salaries in important agencies, as Information System&lt;br /&gt;
Authority loose their employees to the better paid positions in private&lt;br /&gt;
sector.&amp;lt;ref name=&amp;quot;digigeenius&amp;quot;&amp;gt;DiGi Geenius, &amp;quot;Kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad&amp;quot;. Available: https://digi.geenius.ee/rubriik/uudis/kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad/ [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;tehnika&amp;quot;&amp;gt;Postimees, &amp;quot;Riigi-it-tootajate-palgamaarad-kasvasid&amp;quot;. Available: https://tehnika.postimees.ee/6887428/riigi-it-tootajate-palgamaarad-kasvasid [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
But there is also a different view that average private sector worker&lt;br /&gt;
could be hired as a top specialist in public sector and then the payment&lt;br /&gt;
is higher. Nevertheless, it seems that the average payment in cyber&lt;br /&gt;
security sector is any way higher that in other parts of the&lt;br /&gt;
e-services. &amp;lt;ref name=&amp;quot;digigeenius2&amp;quot;&amp;gt;DiGi Geenius, &amp;quot;5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka&amp;quot;. Available: https://digi.geenius.ee/rubriik/uudis/5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==SOC==&lt;br /&gt;
&amp;lt;p&amp;gt;A SOC is a facility where an organization’s network, applications,&lt;br /&gt;
and endpoints are monitored and defended. The term was adapted from&lt;br /&gt;
network operations centers (NOCs), where large telecommunication or&lt;br /&gt;
corporate networks are monitored. When network security became more of a&lt;br /&gt;
concern, security teams were formed within the NOCs, and eventually spun&lt;br /&gt;
off into larger organizations of their own as the responsibilities of&lt;br /&gt;
security teams grew increasingly complex and specialized. The security&lt;br /&gt;
staff working in a security operations center are often called the SOC&lt;br /&gt;
team.&amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;Exabeam, &amp;quot;CSIRT&amp;quot;. Available: https://www.exabeam.com/incident-response/csirt/ [Accessed 28 APr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;Functions of the SOC team include, but are not limited to:&amp;lt;ref name=&amp;quot;trellix&amp;quot;&amp;gt;Trellix, &amp;quot;What Is a Security Operations Center (SOC)?&amp;quot;. Available: https://www.trellix.com/en-us/security-awareness/operations/what-is-soc.html [Accessed 30 APr 2022].&amp;lt;/ref&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ol type=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Taking inventory of resources, to get a better understanding of the&lt;br /&gt;
structure they are protecting.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintanence of the system, by constantly making updates and adding&lt;br /&gt;
safeguards.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Monitoring the network for abnormalities with special tools.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Threat analysis of new attacks and vulnerabilities.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Responding to attacks, by acting as “first responders”. The SOC team&lt;br /&gt;
will shut down and/or isolate endpoints, deleting files and lowering the&lt;br /&gt;
impact as fast as possible.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Recovery of system stability and lost data. This may be done using&lt;br /&gt;
backups, restarting endpoints or reconfiguring systems.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Logging all actions on the system, to be later used for analysis or&lt;br /&gt;
forensics after an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigating the root cause of an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Auditing their own actions, to be in line with regulations of the&lt;br /&gt;
organization, industry or governing body.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==CSIRT==&lt;br /&gt;
&amp;lt;p&amp;gt;A CSIRT is a group that responds to security incidents when they&lt;br /&gt;
occur. Key responsibilities of a CSIRT include:&lt;br /&gt;
&amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
===Creating and maintaining an incident response plan (IRP)===&lt;br /&gt;
An incident response plan (IRP) is a set of written instructions for&lt;br /&gt;
detecting, responding to and limiting the effects of an information&lt;br /&gt;
security event. Incident response plans provide instructions for&lt;br /&gt;
responding to many potential scenarios, including data breaches, denial&lt;br /&gt;
of service/distributed denial of service attacks, firewall breaches,&lt;br /&gt;
virus or malware outbreaks or insider threats. Without an incident&lt;br /&gt;
response plan in place, organizations may either not detect the attack&lt;br /&gt;
in the first place, or not follow proper protocol to contain the threat&lt;br /&gt;
and recover from it when a breach is detected.&lt;br /&gt;
&lt;br /&gt;
https://www.stratacore.com/incidentresponseplan&lt;br /&gt;
===Investigating and analyzing incidents===&lt;br /&gt;
CSIRTs are also involved in improvement activities. After major&lt;br /&gt;
computer security incidents occur, or when incidents are not handled in&lt;br /&gt;
a timely or effective manner, a CSIRT will generally perform a&lt;br /&gt;
postmortem of the incident and its response. This postmortem will&lt;br /&gt;
identify the strengths and weakness of the response effort. Such reviews&lt;br /&gt;
can identify weaknesses and holes in systems, infrastructure defenses,&lt;br /&gt;
or policies that allowed the incident to take place. It can also&lt;br /&gt;
identify problems with communication channels, interfaces, and&lt;br /&gt;
procedures that inhibited the efficient resolution of the reported&lt;br /&gt;
problem.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.cisa.gov/uscert/bsi/articles/best-practices/incident-management/defining-computer-security-incident-response-teams&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Managing internal communications and updates during or immediately after incidents occur===&lt;br /&gt;
===Communicating with employees, shareholders, customers, and the press about incidents as needed===&lt;br /&gt;
&amp;lt;p&amp;gt;There are various services within the CSIRT Services Framework that&lt;br /&gt;
address communications, as they relate to security operations and&lt;br /&gt;
incident response services. Some of these include Information Security&lt;br /&gt;
Incident Coordination, Crisis Management Support, Vulnerability&lt;br /&gt;
Disclosure, Situational Awareness Communication, and Awareness Building,&lt;br /&gt;
to name a few. Sharing information and communicating with the general&lt;br /&gt;
public and/or your constituency is appropriate in many different&lt;br /&gt;
scenarios. These can range from proactive communications to reactive&lt;br /&gt;
communications. Each scenario may be unique, and careful consideration&lt;br /&gt;
should be given to when to release information to the public and what&lt;br /&gt;
information should be released.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;https://resources.sei.cmu.edu/asset_files/Handbook/2021_002_001_651819.pdf&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Remediating incidents===&lt;br /&gt;
Threat remediation is a strong and capable tool for fighting the&lt;br /&gt;
cyber security compromises. As the word ‘remedy’ suggests, remediation&lt;br /&gt;
process involves the treatment of a security breach. With the&lt;br /&gt;
remediation practices, your cyber security team is able to eliminate&lt;br /&gt;
suspicious activities and malicious attacks in the form of malware,&lt;br /&gt;
ransomware, phishing and such. Even if you ‘kill’ the suspicious&lt;br /&gt;
activity, the attackers can remain in your systems. If you want to&lt;br /&gt;
contaminate and end the problem for good, your remediation processes&lt;br /&gt;
must involve the detection of the cause. &amp;lt;ref name=&amp;quot;logsign&amp;quot;&amp;gt;Logsign, &amp;quot;What-is-remediation-in-cyber-security&amp;quot;. Available: https://www.logsign.com/blog/what-is-remediation-in-cyber-security/. [Accessed 28 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Recommending technology, policy, governance, and training changes after security incidents===&lt;br /&gt;
After all these actions, the SCIRT must contribute to the development&lt;br /&gt;
of better policies, practices and has to recommend improvements. They&lt;br /&gt;
are not working in the vacuum and their work has to create new and&lt;br /&gt;
better standards for cyber security. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;Exabeam, &amp;quot;CSIRT&amp;quot;. Available: https://www.exabeam.com/incident-response/csirt/ [Accessed 28 APr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==CERT==&lt;br /&gt;
&amp;lt;p&amp;gt;The term “computer emergency response team” was coined in 1988. In&lt;br /&gt;
response to the Morris worm attack that impacted thousands of servers on&lt;br /&gt;
the Internet, DARPA funded the formation of the Computer Emergency&lt;br /&gt;
Response Team Coordination Center (CERT-CC) at Carnegie Mellon&lt;br /&gt;
University. The goal of CERT-CC was to help protect the internet by&lt;br /&gt;
collecting and disseminating information on critical security&lt;br /&gt;
vulnerabilities. Several other countries formed similar centers using&lt;br /&gt;
the same acronym (despite threats of legal action by Carnegie Mellon for&lt;br /&gt;
trademark infringement). Now the term CERT refers to any emergency&lt;br /&gt;
response team that deals with cyber threats. Many people use CERT-CC&lt;br /&gt;
interchangeably with CSIRT, though the charter of a CERT is information&lt;br /&gt;
sharing in order to help other response teams respond to threats against&lt;br /&gt;
their own infrastructure.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In general, the designation of CERT is helpful in applying real-world&lt;br /&gt;
solutions to various cybersecurity problems. They may be government&lt;br /&gt;
contractors or employees of a major corporation. For example, the U.S.&lt;br /&gt;
Computer Emergency Readiness Team (US-CERT) operates under the U.S.&lt;br /&gt;
Department of Homeland Security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.techopedia.com/definition/31003/computer-emergency-response-team-cert&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In Estonia CERT is designated as CERT-EE. It was established in 2006,&lt;br /&gt;
as an organization responsible for the management of security incidents&lt;br /&gt;
in .ee computer networks. It is also a national contact point for&lt;br /&gt;
international co-operation in the field of IT security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ria.ee/en/cyber-security/cert-ee.html&amp;lt;/p&amp;gt;&lt;br /&gt;
==Difference between SOC/CSIRT/CERT==&lt;br /&gt;
[[File:analystimage3.png|300px|thumb|SOC/CSIRT/CERT &amp;lt;ref name=&amp;quot;exabeam&amp;gt;&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
How CSIRTs differ from CERTs and SOCs. There are overlapping&lt;br /&gt;
responsibilities between a community emergency response team (CERT),&lt;br /&gt;
computer security incident response team (CSIRT), and security&lt;br /&gt;
operations center (SOC). To add to this confusion, frequently, the terms&lt;br /&gt;
CERT and CSIRT are used interchangeably, despite the important&lt;br /&gt;
differences.&lt;br /&gt;
&lt;br /&gt;
==Understand the primary roles and characteristics of a CERT, CSIRT, and SOC.==&lt;br /&gt;
&amp;lt;p&amp;gt;So, using strict definitions, a CERT collects and disseminates&lt;br /&gt;
security information, typically for the benefit of a country or an&lt;br /&gt;
industry. A CSIRT is a cross-functional team that responds to incidents&lt;br /&gt;
on behalf of a country or an organization. A SOC is where a country or&lt;br /&gt;
organization monitors and defends its network, servers, applications,&lt;br /&gt;
and endpoints.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image4.png&amp;quot; alt=&amp;quot;table of explanation images/image4&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;table of explanation&lt;br /&gt;
images/image4&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
==Future==&lt;br /&gt;
&amp;lt;p&amp;gt;And the Cyber security problem is only getting bigger. According to a&lt;br /&gt;
report published by Accenture, the number of cyber security breaches&lt;br /&gt;
increased by 11 percent from 2017 to 2018. The cost of such breaches is&lt;br /&gt;
astronomical–about $600 billion worldwide, according to the Economic&lt;br /&gt;
Impact of Cybercrime report.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Job projections for cybersecurity are staggering. The Bureau of Labor&lt;br /&gt;
Statistics in US predicts that careers in the cybersecurity field will&lt;br /&gt;
grow by 32% by 2028. That makes cybersecurity one of the top 10&lt;br /&gt;
fastest-growing jobs in the country. In the United States alone, jobs&lt;br /&gt;
for Information Security Analysts are expected to grow by 15% by&lt;br /&gt;
2024.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Most likely this trend is also similar in other countries.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When checking Estonian job portals, there is a constant need for&lt;br /&gt;
people for cyber security related positions. Also, linkedin search gives&lt;br /&gt;
approximately 30 vacancies immediately. There are banks, logistics&lt;br /&gt;
companies, e-shops, and software producers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://ee.linkedin.com/jobs/cyber-security-jobs?countryRedirected=1&amp;amp;amp;position=1&amp;amp;amp;pageNum=0&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Trends that affect companies create need for constant cyber security&lt;br /&gt;
services. Increasing number of home/remote offices require secure&lt;br /&gt;
corporate networks and security of remote devices. One example is from&lt;br /&gt;
this year, when sloppy remote desktop set-up paralyzed systems of 17&lt;br /&gt;
companies.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.aripaev.ee/uudised/2022/04/20/ria-lohakas-kaugtoolaua-seadistus-halvas-martsis-vahemalt-17-juhul-ettevotete-it-susteemid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Also, no service can exists without robust infrastructure - servers,&lt;br /&gt;
databases, applications. As all previously mentioned devices and&lt;br /&gt;
services are at constant scanning and surveillance. So, the breach&lt;br /&gt;
detection and immediate action demands 24/7 services. Even if lot of&lt;br /&gt;
things could be automated, there is a need for human specialists (at&lt;br /&gt;
least, at the moment). Third growing field is also a forensic&lt;br /&gt;
investigation, as every attack must be investigated in order to be ready&lt;br /&gt;
to repel next attacks. So data recovery and evidence collection is&lt;br /&gt;
another important field of work that need skilled and professional&lt;br /&gt;
workers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Even, if the specifics of the entity, be it CSIRT, CERT or SOC, are&lt;br /&gt;
different, the fundamentals of the work are the same. Professional&lt;br /&gt;
knowledge of the networks, operational systems, hardware, scripting, and&lt;br /&gt;
several other wider IT related knowledge is needed. As there is no&lt;br /&gt;
single way to reach to it, every single person can find one’s strongest&lt;br /&gt;
sides and develop them with knowledge of weaker side, in order to know,&lt;br /&gt;
when to as for help.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/body&amp;gt;&lt;br /&gt;
&amp;lt;/html&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mavald</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142243</id>
		<title>Hiring a Cyber Security Incident Analyst</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142243"/>
		<updated>2022-05-01T15:57:58Z</updated>

		<summary type="html">&lt;p&gt;Mavald: /* Difference between SOC/CSIRT/CERT */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==A Cyber Security Incident Analyst==&lt;br /&gt;
&lt;br /&gt;
[[File:image1.png|600px|thumb|Job advertisement &amp;lt;ref&amp;gt;&amp;quot;Job Advertisement&amp;quot;. Available at https://www.projectpeople.com/jobs/&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
===Cyber security incident analyst in SOC/CSIRT/CERT===&lt;br /&gt;
This article delves into the job title of Cyber Security Incident&lt;br /&gt;
Analyst and provides an overview of the acronyms SOC/CSIRT/CERT. A brief&lt;br /&gt;
history of the job is discussed here, as well as a possible career path,&lt;br /&gt;
education, experience, and other characteristics required for work in&lt;br /&gt;
computer security-related organizations. The article also provides a&lt;br /&gt;
brief history of SOC/CSIRT/CERT, as well as a comparison of their&lt;br /&gt;
differences and similarities.&lt;br /&gt;
===Cyber Security Incident Analyst Skill Set===&lt;br /&gt;
What skill set is expected from the Cyber Security Incident Analyst? Below written lines are taken from the same job advertisement depicted&lt;br /&gt;
on the left side of this article:&lt;br /&gt;
As a Security Incident Analyst your responsibilities will include:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Continuous monitoring of security tooling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Performing regular and ad-hoc vulnerability assessments&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Carrying out ‘spot checks’&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Reporting vulnerabilities to the PVG via the alerts system&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintaining and documenting logging systems&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Developing centralized logging, reporting and intelligence&lt;br /&gt;
platforms&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;‘Light touch’ penetration testing with open source tooling&lt;br /&gt;
(Metasploit)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Knowledge &amp;amp;amp; Experience required:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;SOC, CSIRT or CERT operational environment experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Windows / Linux experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TCP /IP networking protocol knowledge&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience reviewing and analyzing Security Events from various&lt;br /&gt;
monitoring and logging sources&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience in website and web application security assessment or&lt;br /&gt;
penetration testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience of using Metasploit&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Scripting knowledge using BASH, Python, Perl, Ruby&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Skills in Host and Network Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
As one can see the description of the duties is wide and also the&lt;br /&gt;
knowledge and experience that is required is noteworthy. So, where to&lt;br /&gt;
start to find out the way to get this kind of knowledge and&lt;br /&gt;
expertize.&lt;br /&gt;
===Possible career path===&lt;br /&gt;
Next part of the paper is aiming to depict a possible ways, how to&lt;br /&gt;
develop oneself, and move along the career pathway in cybersecurity&lt;br /&gt;
field. Topics of development, education, experience and certification&lt;br /&gt;
are covered.&lt;br /&gt;
[[File:analystimage2.png|1000px|thumb|Career path &amp;lt;ref&amp;gt;&amp;quot;Possible Career Path&amp;quot;. Available at https://www.cyberseek.org/pathway.html&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
===Junior/Senior===&lt;br /&gt;
Start with an entry-level job in IT. Hands-on experience is often the&lt;br /&gt;
most effective way to prepare for certification exams. Start&lt;br /&gt;
accumulating work experience with an entry-level role as a cybersecurity&lt;br /&gt;
analyst. Many cybersecurity professionals start off in more general IT&lt;br /&gt;
roles. The skills, practices, and technologies you’ll use as a&lt;br /&gt;
cybersecurity professional will continue to evolve along with computer&lt;br /&gt;
and network technology. The desire to learn, ability to problem solve,&lt;br /&gt;
and attention to detail will serve you well in this field. Other, more&lt;br /&gt;
technical skills and technologies to learn include:&amp;lt;ref name=&amp;quot;certification&amp;quot;&amp;gt;Popular Cyber Security Certificates [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications  [Accessed 25 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====SIEM tools (security information and event management)====&lt;br /&gt;
Security Information and Event Management (SIEM) is a set of tools&lt;br /&gt;
and services offering a holistic view of an organization’s information&lt;br /&gt;
security. SIEM works by combining two technologies:&lt;br /&gt;
&amp;lt;li&amp;gt;Security information management (SIM), which collects data from log&lt;br /&gt;
files for analysis and reports on security threats and events, and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;security event management (SEM), which conducts real-time system&lt;br /&gt;
monitoring, notifies network admins about important issues and&lt;br /&gt;
establishes correlations between security events. There are a number of&lt;br /&gt;
security information and event management solutions on the market.&lt;br /&gt;
ArcSight ESM, IBM QRadar and Splunk are among the most popular. &amp;lt;ref name=&amp;quot;SIEM&amp;quot;&amp;gt;Application security, SIEM [Online]. Available: https://www.imperva.com/learn/application-security/siem/. [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Firewalls, Intrusion Detection Systems (IDS), and Intrusion Prevention Systems(IPS)====&lt;br /&gt;
Firewalls can be two types, hardware and software firewalls. Software&lt;br /&gt;
firewall is a firewall that is installed on a computer or server, and&lt;br /&gt;
tasked with network security. It works with a wide variety of other&lt;br /&gt;
technology security solutions to provide more robust and cohesive&lt;br /&gt;
security for enterprises of all sizes. When a software firewall is&lt;br /&gt;
installed on a server, it opens up like an umbrella of protection over&lt;br /&gt;
all other computers connected to the network. It is able to monitor both&lt;br /&gt;
incoming and outgoing traffic for potential risk or suspicious user&lt;br /&gt;
behavior, and also makes setting security policies much easier, faster&lt;br /&gt;
and more flexible. Hardware firewall is positioned between the network&lt;br /&gt;
and devices, allowing traffic to funnel through the firewall for a close&lt;br /&gt;
inspection and analysis. A hardware firewall, a term often&lt;br /&gt;
interchangeable with network or next-generation firewall, protects the&lt;br /&gt;
network gateways for an enterprise. Hardware firewall is physical&lt;br /&gt;
hardware, installed between network elements and connected devices, and&lt;br /&gt;
is tasked with filtering traffic for cyber threat to the network or&lt;br /&gt;
devices. Filtering out unauthorized or suspicious users based on traffic&lt;br /&gt;
analysis is one of the biggest benefits of hardware firewall. &amp;lt;ref name=&amp;quot;sangfor&amp;quot;&amp;gt;Sangfor, &amp;quot;What is Software Firewall? Difference between Hardware Firewall and Software Firewall, [Online]. Available: https://www.sangfor.com/blog/cybersecurity/what-is-software-firewall-difference-between-hardware-firewall-and-software-firewall [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems&lt;br /&gt;
(IPS) are both parts of the network infrastructure. IDS/IPS compare&lt;br /&gt;
network packets to a cyberthreat database containing known signatures of&lt;br /&gt;
cyberattacks — and flag any matching packets. IDS doesn’t alter the&lt;br /&gt;
network packets in any way, whereas IPS prevents the packet from&lt;br /&gt;
delivery based on the contents of the packet, much like how a firewall&lt;br /&gt;
prevents traffic by IP address. &amp;lt;ref name=&amp;quot;Varonis&amp;quot;&amp;gt;Varonis, &amp;quot;What is Software Firewall? IDS vs. IPS: What is the Difference?, [Online]. Available: https://www.varonis.com/blog/ids-vs-ips [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Digital forensics====&lt;br /&gt;
Digital forensics is a branch of forensic science that focuses on&lt;br /&gt;
identifying, acquiring, processing, analyzing, and reporting on data&lt;br /&gt;
stored electronically. Electronic evidence is a component of almost all&lt;br /&gt;
criminal activities and digital forensics support is crucial for law&lt;br /&gt;
enforcement investigations. Electronic evidence can be collected from a&lt;br /&gt;
wide array of sources, such as computers, smartphones, remote storage,&lt;br /&gt;
unmanned aerial systems, shipborne equipment, and more.&amp;lt;ref name=&amp;quot;interpol&amp;quot;&amp;gt;Interpol, &amp;quot;Digital forensics&amp;quot;. Available: https://www.interpol.int/How-we-work/Innovation/Digital-forensics. [Accessed 28 4 2022].&amp;lt;/ref&amp;gt; &lt;br /&gt;
Investigative process of digital forensics can be divided into several stages. There are four major stages: preservation, collection,&lt;br /&gt;
examination, and analysis. All these four stages need a deep understanding of computers, technology across a broad spectrum, and cybersecurity principles and&lt;br /&gt;
practices, a working knowledge of computers, networks, and coding, in-depth investigative abilities, critical-thinking skills and analytical talent the ability to effectively communicate and work with a&lt;br /&gt;
wide range of people. &amp;lt;ref name=&amp;quot;ecpi&amp;quot;&amp;gt;&amp;quot;Digital forensics&amp;quot;. Available: https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me. [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Mobile device management====&lt;br /&gt;
Mobile device management (MDM) is software that allows IT&lt;br /&gt;
administrators to control, secure and enforce policies on smartphones,&lt;br /&gt;
tablets and other endpoints. Mobile device management software emerged&lt;br /&gt;
in the early 2000s as a way to control and secure the personal digital&lt;br /&gt;
assistants and smartphones that business workers began to use. The&lt;br /&gt;
consumer smartphone boom that started with the launch of the Apple&lt;br /&gt;
iPhone in 2007 led to the bring your own device (BYOD) trend, which&lt;br /&gt;
fueled further interest in MDM.&amp;lt;ref name=&amp;quot;techtarget&amp;quot;&amp;gt;Techtarget, &amp;quot;Mobile Device Management&amp;quot;. Available: https://www.techtarget.com/searchmobilecomputing/definition/mobile-device-management [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Data management====&lt;br /&gt;
Sometimes the data management is neglected, but this part has a&lt;br /&gt;
crucial role when learning for good cyber security practices. Majority&lt;br /&gt;
of cyber security programs include a special courses on data management.&lt;br /&gt;
Data management is a method of organizing and maintaining data processes&lt;br /&gt;
that are required in almost every business operations. The benefits of&lt;br /&gt;
data management can be found accounting, statistics, logistics planning&lt;br /&gt;
and other disciplines including corporate computing.&amp;lt;ref name=&amp;quot;GlobalUni&amp;quot;&amp;gt;Global Universities, &amp;quot;MSc Data Management and Cyber Security&amp;quot;. Available: https://globaluniversities.in/msc-data-management-cyber-security. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Data governance (and management) play a fundamental role in&lt;br /&gt;
protecting an organization’s data. Ensuring that the right people have&lt;br /&gt;
the right access and that appropriate security controls are in place to&lt;br /&gt;
protect each system or service, based on the criticality or sensitivity&lt;br /&gt;
of the data sets these contain. &amp;lt;ref name=&amp;quot;CyberMagazine&amp;quot;&amp;gt;Cyber Security Magazine, &amp;quot;The Role of Data Governance in Cybersecurity&amp;quot;. Available: https://cybersecurity-magazine.com/the-role-of-data-governance-in-cybersecurity/?utm_source=rss&amp;amp;amp;utm_medium=rss&amp;amp;amp;utm_campaign=the-role-of-data-governance-in-cybersecurity. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Application security development====&lt;br /&gt;
Application security describes security measures at the application&lt;br /&gt;
level that aim to prevent data or code within the app from being stolen&lt;br /&gt;
or hijacked. It encompasses the security considerations that happen&lt;br /&gt;
during application development and design, but it also involves systems&lt;br /&gt;
and approaches to protect apps after they get deployed. Application&lt;br /&gt;
security may include hardware, software, and procedures that identify or&lt;br /&gt;
minimize security vulnerabilities.&amp;lt;ref name=&amp;quot;vmware&amp;quot;&amp;gt;VmWare, &amp;quot;What is application security?&amp;quot;. Available: https://www.vmware.com/topics/glossary/content/application-security.html [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Application security development is important to ensure that your&lt;br /&gt;
application is free from coding errors and bugs. And controls the risk&lt;br /&gt;
and helps safeguard against security vulnerabilities. Application&lt;br /&gt;
security development is the process of making applications more secure&lt;br /&gt;
by finding and fixing security vulnerabilities. This is often done by&lt;br /&gt;
enforcing software security best practices and using application&lt;br /&gt;
security testing tools. &lt;br /&gt;
&amp;lt;ref name=&amp;quot;perforce&amp;quot;&amp;gt;Perforce, &amp;quot;Application Security Development Best Practices&amp;quot;. Available: https://www.perforce.com/blog/kw/application-security-development-best-practices. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Audit and compliance knowledge====&lt;br /&gt;
A cyber security audit is designed to be a comprehensive review and&lt;br /&gt;
analysis of your business’s IT infrastructure. It identifies threats and&lt;br /&gt;
vulnerabilities, exposing weaknesses and high-risk practices.&lt;br /&gt;
Regulations such as the EU GDPR (General Data Protection Regulation) can&lt;br /&gt;
impose hefty penalties in the event of a breach that results in&lt;br /&gt;
exploited data. A cyber security audit will help mitigate the&lt;br /&gt;
consequences of a breach and demonstrate that your organization has&lt;br /&gt;
taken the necessary steps to protect client and company data. &amp;lt;ref name=&amp;quot;cyforsecure&amp;quot;&amp;gt;Cyfor Secure, &amp;quot;What is a Cyber Security Audit and how can it help your organisation?&amp;quot;. Available: https://cyforsecure.co.uk/services/cyber-assessment/cyber-security-audit/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cybersecurity compliance is the organizational risk management method&lt;br /&gt;
aligned with pre-defined security measures &amp;amp;amp; controls on how data&lt;br /&gt;
confidentiality is ensured by its administrative procedures.&amp;lt;ref name=&amp;quot;nordlayer&amp;quot;&amp;gt;NordLayer, &amp;quot;Cybersecurity compliance: Everything you need to know&amp;quot;. Available: https://nordlayer.com/blog/cybersecurity-compliance-everything-you-need-to-know/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
All needed skills are developed through courses and certification.&lt;br /&gt;
&lt;br /&gt;
===Entry-Level Incident Response Positions===&lt;br /&gt;
It is not always possible to advance to the position of incident&lt;br /&gt;
responder in a straight line. Many professionals advance from entry- to&lt;br /&gt;
mid-level positions before becoming a real incident responder or a&lt;br /&gt;
member of a computer emergency response team (CERT).&amp;lt;br /&amp;gt;&lt;br /&gt;
These are some examples: &amp;lt;ref name=&amp;quot;Infosec&amp;quot;&amp;gt;Infosec, &amp;quot;Incident Responder Career Roadmap: From Entry Level to Executive&amp;quot;. Available: https://resources.infosecinstitute.com/topic/incident-responder-career-roadmap-entry-level-executive/ [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;network-administrator&amp;quot;&amp;gt;Network administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;This position’s experience will help potential incident responders&lt;br /&gt;
develop networking skills. Attention to detail, as well as the ability&lt;br /&gt;
to sift through system configurations, site layouts, and general network&lt;br /&gt;
and communication setups, are essential in this field.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;system-administrator&amp;quot;&amp;gt;System administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Another crucial beginning point for an incident responder is to learn&lt;br /&gt;
how to manage resources inside your organization as well as user&lt;br /&gt;
behavior. Understanding the potential damage that users, inadequate&lt;br /&gt;
security setups, and ineffective IT policies and procedures can cause on&lt;br /&gt;
your network can provide prospective candidates with insight into the&lt;br /&gt;
human component of an incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;security-administrator&amp;quot;&amp;gt;Security administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In such a position, basic hacking skills, penetration testing, and&lt;br /&gt;
intrusion detection are all learned, which are crucial incident&lt;br /&gt;
responder skills when trying to replicate a breach or attack.&lt;br /&gt;
Understanding the paths a cybercriminal will take when attempting to&lt;br /&gt;
damage or obtain access to a system can greatly simplify the work of&lt;br /&gt;
reverse engineering the incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Mid-Level Incident Response Positions ===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5&lt;br /&gt;
id=&amp;quot;computer-security-incident-response-team-csirt-engineer&amp;quot;&amp;gt;Computer&lt;br /&gt;
security incident response team (CSIRT) engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;cyber-incident-responder&amp;quot;&amp;gt;Cyber incident responder&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-response-engineer&amp;quot;&amp;gt;Incident response&lt;br /&gt;
engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;While each of these positions is different, they generally require&lt;br /&gt;
very similar skills and characteristics in a candidate. At this level,&lt;br /&gt;
personal characteristics such as problem solving, time management, and&lt;br /&gt;
even presentation skills become more crucial as one’s career evolves&lt;br /&gt;
into a management-facing role.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Technical skills include the ability to identify and minimize threats&lt;br /&gt;
while maintaining communication with management and the rest of your&lt;br /&gt;
team. Data analysis and evidence gathering become increasingly crucial,&lt;br /&gt;
and the circumstances in which your services are deployed get more&lt;br /&gt;
serious.&amp;lt;/p&amp;gt;&lt;br /&gt;
Problem-solving skills are crucial at this level of incident&lt;br /&gt;
response, and as the stakes rise, so does the pressure in each&lt;br /&gt;
situation. At this level, programming abilities are essential since&lt;br /&gt;
incident responders may be needed to reverse engineer malicious code or&lt;br /&gt;
even create patches for vulnerable network applications or services. &amp;lt;ref name=&amp;quot;coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated]&amp;quot;. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Senior-Level Incident Response Positions===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;intrusion-detection-specialist&amp;quot;&amp;gt;Intrusion detection&lt;br /&gt;
specialist:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;A CISSP certification might help a potential candidate in preparing&lt;br /&gt;
for the profession. The role of an intrusion detection specialist is to&lt;br /&gt;
find and stop any unwanted communications.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-manager&amp;quot;&amp;gt;Incident manager:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Expected to plan, oversee, manage, and supervise all incident&lt;br /&gt;
response team actions. Is in charge of reporting all current events to&lt;br /&gt;
senior management and stakeholders, as well as acting as the technical&lt;br /&gt;
lead on active incidents for incident responders. Prepares threat and&lt;br /&gt;
impact assessments and reports them known to management.&amp;lt;ref name=&amp;quot;coursera&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Certificates== &lt;br /&gt;
There is a vast number of different certificates and the road map to&lt;br /&gt;
being a certified professional could be very different&amp;lt;ref name=&amp;quot;Coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated],&amp;quot; [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;NICCS&amp;quot;&amp;gt;NICCS, &amp;quot;Cybersecurity Certifications,&amp;quot; [Online]. Available: hhttps://niccs.cisa.gov/about-niccs/cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt; . One possible&lt;br /&gt;
approach is to start with basic certificates from the different branches&lt;br /&gt;
of service and move to more specific and demanding focused&lt;br /&gt;
certification. Also, some jobs require certain clearances, either from&lt;br /&gt;
industry, or from the government. One small selection of different&lt;br /&gt;
possible certificates is brought out in following paragraphs.&lt;br /&gt;
&lt;br /&gt;
Security+ is a CompTIA certification that is considered a basic cert&lt;br /&gt;
among cybersecurity professionals. It covers the topics of risk&lt;br /&gt;
management and threat assessment.&lt;br /&gt;
Network+ is also offered by CompTIA this certification (like the name&lt;br /&gt;
implies) focuses on networking infrastructure and operations. It is&lt;br /&gt;
considered a foundational certification.&lt;br /&gt;
The Certified Information Systems Security Professional (CISSP) is a&lt;br /&gt;
more advanced certification designed for cybersecurity professionals&lt;br /&gt;
with at least five years of work experience. The certification covers&lt;br /&gt;
topics such as architecture, engineering, and management.&amp;lt;/p&amp;gt;&lt;br /&gt;
The Certified Ethical Hacker (CEH) certification is also considered a&lt;br /&gt;
more advanced cert because it generally requires that applicants have&lt;br /&gt;
multiple years of work experience. The goal of an ethical hacker&lt;br /&gt;
certification is to be able to understand how cyber attacks unfold in&lt;br /&gt;
order to improve threat assessment and mitigation skills.&amp;lt;ref name=&amp;quot;cyberguide&amp;quot;&amp;gt;Cybersecurity Guide, &amp;quot;How to become a cybersecurity specialist&amp;quot;, [Online]. Available: https://cybersecurityguide.org/careers/security-specialist/. [Accessed 27 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
This is definitely not all, when one looks for more information, following link could be searched, to get more in depth knowledge about&lt;br /&gt;
different possibilities.&lt;br /&gt;
 &lt;br /&gt;
Hereby, with the help of this matrix a possible taxonomy of different 436 listed certificates in branches are&lt;br /&gt;
presented.&amp;lt;ref name=&amp;quot;Pauljeremy&amp;quot;&amp;gt;&amp;quot;Cybersecurity Roadmap,&amp;quot; [Online]. Available: https://pauljerimy.com/2020/10/12/scr-oct-2020-update/. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:analystimage5.png|1000px|thumb|Certificate matrix &amp;lt;ref&amp;gt;&amp;quot;Certification roadmap&amp;quot;. Available at https://pauljerimy.com/security-certification-roadmap&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
=== Communication and Network Security===&lt;br /&gt;
Communication and network security covers the ability to secure&lt;br /&gt;
communication channels and networks. Topics include secure and converges&lt;br /&gt;
protocols, wireless networks, cellular networks, hardware operations&lt;br /&gt;
(warranty and redundant power), and third-party connectivity. IP&lt;br /&gt;
networking are also included in this domain.&lt;br /&gt;
===Identity and Access Management===&lt;br /&gt;
The identity and access management domain covers the attacks that&lt;br /&gt;
target the human gateway to gain access to data. Other topics include&lt;br /&gt;
ways to identify users with rights to access the information and&lt;br /&gt;
servers. Identity and access management covers the topics of&lt;br /&gt;
applications, Single sign-on authentication, privilege escalation,&lt;br /&gt;
Kerberos, rule-based or risk-based access control, proofing and&lt;br /&gt;
establishment of identity.&lt;br /&gt;
===Security Architecture and Engineering===&lt;br /&gt;
The security architecture and engineering domain covers important&lt;br /&gt;
topics concerning security engineering plans, designs and principles,&lt;br /&gt;
Topics include assessing and mitigating information system&lt;br /&gt;
vulnerabilities, fundamental concepts of security models and security&lt;br /&gt;
architectures in critical areas like access control. Cloud systems,&lt;br /&gt;
cryptography, system infiltrations (ransomware, fault-injection and&lt;br /&gt;
more) and virtualized systems are also covered in this domain.&lt;br /&gt;
===Asset Security===&lt;br /&gt;
The Asset Security domain deals with the issues related to the&lt;br /&gt;
collection, storage, maintenance, retention and destruction of data. It&lt;br /&gt;
also covers knowledge of different roles regarding data handling (owner,&lt;br /&gt;
controller and custodian) as well as data protection methods and data&lt;br /&gt;
states. Other topics include resource provision, asset classification&lt;br /&gt;
and data lifecycle management.&lt;br /&gt;
===Security and Risk Management===&lt;br /&gt;
The security and risk management domain covers general on skills&lt;br /&gt;
related to the implementation of user awareness programs as well as&lt;br /&gt;
security procedures. Emphasis is also placed on risk management&lt;br /&gt;
concerning the acquisition of new services, hardware and software&lt;br /&gt;
(supply chain). Other skills include social engineering defense&lt;br /&gt;
mechanisms.&lt;br /&gt;
===Security Assessment and Testing===&lt;br /&gt;
The security assessment and testing domain deals with all the&lt;br /&gt;
techniques and tools used to find system vulnerabilities, weaknesses and&lt;br /&gt;
potential areas of concern not addressed by security procedures and&lt;br /&gt;
policies. Attack simulations, vulnerability assessment, compliance&lt;br /&gt;
checks, and ethical disclosure also fall under this domain.&lt;br /&gt;
===Software Security===&lt;br /&gt;
The software development security domain deals with implementing&lt;br /&gt;
software-based security protocols within environment for which the IT&lt;br /&gt;
professional is responsible. Risk analysis, vulnerability identification&lt;br /&gt;
and auditing of source codes are all covered in this subset. Additional&lt;br /&gt;
topics include software-designed security, maturity models, development&lt;br /&gt;
methodologies, open-source and third-party development security.&lt;br /&gt;
===Security operations===&lt;br /&gt;
The security operations domain covers topics ranging from&lt;br /&gt;
investigations and digital forensic to detection and intrusion&lt;br /&gt;
prevention tools, sandboxing and firewalls. Topics include user and&lt;br /&gt;
entity behavior analytics, threat intelligence (threat hunting and&lt;br /&gt;
threat feeds) log management, artifacts (mobile, computer and network),&lt;br /&gt;
machine learning and AI-based tools, penetration testing, and&lt;br /&gt;
exploitation development. These for sub-domains are lister here.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Incident Handling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Penetration Testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Exploitation&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Education==&lt;br /&gt;
[[File:Analystimage7.png|400px|thumb|Comparison degree vs Certificate &amp;lt;ref&amp;gt;&amp;quot;Comparison Table&amp;quot;. Available at https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
The entry level monitoring specialist is hired by Estonian&lt;br /&gt;
Information System Authority even if there is no formal IT education,&lt;br /&gt;
but readiness to learn and moderate knowledge of different operation&lt;br /&gt;
systems is enough to start the career. &amp;lt;ref name=&amp;quot;cv&amp;quot;&amp;gt;cv.ee, &amp;quot;SEIRESPETSIALIST - tule Eesti küberruumi valvuriks!&amp;quot;. Available: https://www.cv.ee/en/vacancy/792782/riigi-infosusteemi-amet/seirespetsialist-tule-eesti-kuberruumi-valvuriks [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Nevertheless, like most other high qualification careers jobs falling&lt;br /&gt;
under the cybersecurity specialist category require some form of formal&lt;br /&gt;
education. However, since cybersecurity specialist jobs can fall across&lt;br /&gt;
a wide spectrum of job descriptions and responsibilities, it is possible&lt;br /&gt;
to obtain a specialist job after completing many levels of different&lt;br /&gt;
computer related education.&lt;br /&gt;
&lt;br /&gt;
If one is looking for a cybersecurity related education, for example&lt;br /&gt;
in EU, 137 courses/programs could be found that relate to keyword IT or&lt;br /&gt;
cybersecurity. &amp;lt;ref name=&amp;quot;enisa&amp;quot;&amp;gt;ENISA (European Union Agency for Cybersecurity), &amp;quot;Cybersecurity Education-Cybersecurity Higher Education Database&amp;quot;. Available: https://www.enisa.europa.eu/topics/cybersecurity-education/education-map/education-courses [Accessed 26 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Also, there is a great amount of discussion, if cyber security&lt;br /&gt;
professional should have a degree or would be certification just enough.&lt;br /&gt;
One interesting table is produces by Franklin University that compares&lt;br /&gt;
benefits and/or drawbacks of each type of credential.&amp;lt;ref name=&amp;quot;franklin&amp;quot;&amp;gt;Franklin University, &amp;quot;Is Getting a Master&#039;s Degree in Cyber Security Worth It?&amp;quot;. Available: https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Certifications are generally good for people with little practical&lt;br /&gt;
experience because they are known quantities in the industry and can&lt;br /&gt;
help you get your foot in the door. They set a minimum knowledge bar.&lt;br /&gt;
But some certifications are viewed more favorably than others.&lt;br /&gt;
Certifications with renewal requirements are viewed better by hiring&lt;br /&gt;
managers, but they also more costly in the long run because of the need&lt;br /&gt;
for continuing education. Certifications are also good for showing&lt;br /&gt;
in-depth expertise in a specialization within cybersecurity. Depending&lt;br /&gt;
on your career goals, it may be advantageous to have a master’s&lt;br /&gt;
degree—which shows your breadth of knowledge, critical thinking and&lt;br /&gt;
leadership skills—and a certificate—which shows specific skill&lt;br /&gt;
competency.&amp;lt;ref name=&amp;quot;franklin&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
As IT (Cyber) Security is still a relatively young discipline,&lt;br /&gt;
universities and colleges are still figuring out which is the best&lt;br /&gt;
approach for their degrees. Study programmes and curricula in Cyber&lt;br /&gt;
Security are different. In general, here are the duration of Cyber&lt;br /&gt;
Security degrees:&lt;br /&gt;
&amp;lt;ref name=&amp;quot;studyportal&amp;quot;&amp;gt;Studyportals, &amp;quot;Why You Should Study a Cyber Security Degree in 2022&amp;quot;. Available: https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Bachelor’s degrees in Cyber Security take 3 or 4 years in most&lt;br /&gt;
countries.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Master’s courses in Cyber Security take between 1-2 years to&lt;br /&gt;
complete.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;PhD programmes in Cyber Security last 3-5 years. Some only take 1&lt;br /&gt;
or 2 years, but they are less common.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Generalization could me made that on bachelor level the general&lt;br /&gt;
knowledge about the cyber issues are obtained. On master level the&lt;br /&gt;
specialization courses are taken and the person can choose more specific&lt;br /&gt;
topics to study. It is on master level where strengths of the cyber&lt;br /&gt;
specialist can be developed further and up-do date knowledge obtained in&lt;br /&gt;
specifics. PhD is serious science and involves teaching, lot of&lt;br /&gt;
scientific work and writing for publications.&lt;br /&gt;
&lt;br /&gt;
==Salary==&lt;br /&gt;
&amp;lt;p&amp;gt;Even if the salary can be very different, compared to the skills and&lt;br /&gt;
experience, an generalization can be made. Cyber Security professionals&lt;br /&gt;
in CSIRT, and in other entities earn quite well, from the start. First,&lt;br /&gt;
some comparison from the United States. The average CSIRT analyst salary&lt;br /&gt;
in the USA is $97,500 per year or $50 per hour. Entry level positions&lt;br /&gt;
start at $48,875 per year while most experienced workers make up to&lt;br /&gt;
$135,373 per year.&amp;lt;ref name=&amp;quot;talent&amp;quot;&amp;gt;talent.com, &amp;quot;Csirt Analyst average salary in USA 2022&amp;quot;. Available: https://www.talent.com/salary?job=csirt+analyst [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There are multiple positions you can occupy in this field. They have&lt;br /&gt;
in common great salaries and high demand for technical skills, attention&lt;br /&gt;
to details, problem-solving mentality, and the ability to analyze risks.&lt;br /&gt;
Here are the average annual salaries in the United States, according to&lt;br /&gt;
Payscale: &amp;lt;ref name=&amp;quot;studyportal&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Cryptographer – 100,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Information Security Officer – 91,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Assessor – 90,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Engineer – 88,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Penetration Tester – 81,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Forensics Expert – 71,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Administrator – 65,000 USD&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
When looking into salaries in Estonia, one can find that there is a&lt;br /&gt;
discussion that private sector is taking a toll from the public sector,&lt;br /&gt;
and that the salaries in important agencies, as Information System&lt;br /&gt;
Authority loose their employees to the better paid positions in private&lt;br /&gt;
sector.&amp;lt;ref name=&amp;quot;digigeenius&amp;quot;&amp;gt;DiGi Geenius, &amp;quot;Kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad&amp;quot;. Available: https://digi.geenius.ee/rubriik/uudis/kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad/ [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;tehnika&amp;quot;&amp;gt;Postimees, &amp;quot;Riigi-it-tootajate-palgamaarad-kasvasid&amp;quot;. Available: https://tehnika.postimees.ee/6887428/riigi-it-tootajate-palgamaarad-kasvasid [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
But there is also a different view that average private sector worker&lt;br /&gt;
could be hired as a top specialist in public sector and then the payment&lt;br /&gt;
is higher. Nevertheless, it seems that the average payment in cyber&lt;br /&gt;
security sector is any way higher that in other parts of the&lt;br /&gt;
e-services. &amp;lt;ref name=&amp;quot;digigeenius2&amp;quot;&amp;gt;DiGi Geenius, &amp;quot;5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka&amp;quot;. Available: https://digi.geenius.ee/rubriik/uudis/5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==SOC==&lt;br /&gt;
&amp;lt;p&amp;gt;A SOC is a facility where an organization’s network, applications,&lt;br /&gt;
and endpoints are monitored and defended. The term was adapted from&lt;br /&gt;
network operations centers (NOCs), where large telecommunication or&lt;br /&gt;
corporate networks are monitored. When network security became more of a&lt;br /&gt;
concern, security teams were formed within the NOCs, and eventually spun&lt;br /&gt;
off into larger organizations of their own as the responsibilities of&lt;br /&gt;
security teams grew increasingly complex and specialized. The security&lt;br /&gt;
staff working in a security operations center are often called the SOC&lt;br /&gt;
team.&amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;Exabeam, &amp;quot;CSIRT&amp;quot;. Available: https://www.exabeam.com/incident-response/csirt/ [Accessed 28 APr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;Functions of the SOC team include, but are not limited to:&amp;lt;ref name=&amp;quot;trellix&amp;quot;&amp;gt;Trellix, &amp;quot;What Is a Security Operations Center (SOC)?&amp;quot;. Available: https://www.trellix.com/en-us/security-awareness/operations/what-is-soc.html [Accessed 30 APr 2022].&amp;lt;/ref&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ol type=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Taking inventory of resources, to get a better understanding of the&lt;br /&gt;
structure they are protecting.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintanence of the system, by constantly making updates and adding&lt;br /&gt;
safeguards.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Monitoring the network for abnormalities with special tools.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Threat analysis of new attacks and vulnerabilities.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Responding to attacks, by acting as “first responders”. The SOC team&lt;br /&gt;
will shut down and/or isolate endpoints, deleting files and lowering the&lt;br /&gt;
impact as fast as possible.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Recovery of system stability and lost data. This may be done using&lt;br /&gt;
backups, restarting endpoints or reconfiguring systems.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Logging all actions on the system, to be later used for analysis or&lt;br /&gt;
forensics after an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigating the root cause of an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Auditing their own actions, to be in line with regulations of the&lt;br /&gt;
organization, industry or governing body.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==CSIRT==&lt;br /&gt;
&amp;lt;p&amp;gt;A CSIRT is a group that responds to security incidents when they&lt;br /&gt;
occur. Key responsibilities of a CSIRT include:&lt;br /&gt;
&amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
===Creating and maintaining an incident response plan (IRP)===&lt;br /&gt;
An incident response plan (IRP) is a set of written instructions for&lt;br /&gt;
detecting, responding to and limiting the effects of an information&lt;br /&gt;
security event. Incident response plans provide instructions for&lt;br /&gt;
responding to many potential scenarios, including data breaches, denial&lt;br /&gt;
of service/distributed denial of service attacks, firewall breaches,&lt;br /&gt;
virus or malware outbreaks or insider threats. Without an incident&lt;br /&gt;
response plan in place, organizations may either not detect the attack&lt;br /&gt;
in the first place, or not follow proper protocol to contain the threat&lt;br /&gt;
and recover from it when a breach is detected.&lt;br /&gt;
&lt;br /&gt;
https://www.stratacore.com/incidentresponseplan&lt;br /&gt;
===Investigating and analyzing incidents===&lt;br /&gt;
CSIRTs are also involved in improvement activities. After major&lt;br /&gt;
computer security incidents occur, or when incidents are not handled in&lt;br /&gt;
a timely or effective manner, a CSIRT will generally perform a&lt;br /&gt;
postmortem of the incident and its response. This postmortem will&lt;br /&gt;
identify the strengths and weakness of the response effort. Such reviews&lt;br /&gt;
can identify weaknesses and holes in systems, infrastructure defenses,&lt;br /&gt;
or policies that allowed the incident to take place. It can also&lt;br /&gt;
identify problems with communication channels, interfaces, and&lt;br /&gt;
procedures that inhibited the efficient resolution of the reported&lt;br /&gt;
problem.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.cisa.gov/uscert/bsi/articles/best-practices/incident-management/defining-computer-security-incident-response-teams&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Managing internal communications and updates during or immediately after incidents occur===&lt;br /&gt;
===Communicating with employees, shareholders, customers, and the press about incidents as needed===&lt;br /&gt;
&amp;lt;p&amp;gt;There are various services within the CSIRT Services Framework that&lt;br /&gt;
address communications, as they relate to security operations and&lt;br /&gt;
incident response services. Some of these include Information Security&lt;br /&gt;
Incident Coordination, Crisis Management Support, Vulnerability&lt;br /&gt;
Disclosure, Situational Awareness Communication, and Awareness Building,&lt;br /&gt;
to name a few. Sharing information and communicating with the general&lt;br /&gt;
public and/or your constituency is appropriate in many different&lt;br /&gt;
scenarios. These can range from proactive communications to reactive&lt;br /&gt;
communications. Each scenario may be unique, and careful consideration&lt;br /&gt;
should be given to when to release information to the public and what&lt;br /&gt;
information should be released.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;https://resources.sei.cmu.edu/asset_files/Handbook/2021_002_001_651819.pdf&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Remediating incidents===&lt;br /&gt;
Threat remediation is a strong and capable tool for fighting the&lt;br /&gt;
cyber security compromises. As the word ‘remedy’ suggests, remediation&lt;br /&gt;
process involves the treatment of a security breach. With the&lt;br /&gt;
remediation practices, your cyber security team is able to eliminate&lt;br /&gt;
suspicious activities and malicious attacks in the form of malware,&lt;br /&gt;
ransomware, phishing and such. Even if you ‘kill’ the suspicious&lt;br /&gt;
activity, the attackers can remain in your systems. If you want to&lt;br /&gt;
contaminate and end the problem for good, your remediation processes&lt;br /&gt;
must involve the detection of the cause. &amp;lt;ref name=&amp;quot;logsign&amp;quot;&amp;gt;Logsign, &amp;quot;What-is-remediation-in-cyber-security&amp;quot;. Available: https://www.logsign.com/blog/what-is-remediation-in-cyber-security/. [Accessed 28 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Recommending technology, policy, governance, and training changes after security incidents===&lt;br /&gt;
After all these actions, the SCIRT must contribute to the development&lt;br /&gt;
of better policies, practices and has to recommend improvements. They&lt;br /&gt;
are not working in the vacuum and their work has to create new and&lt;br /&gt;
better standards for cyber security. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;Exabeam, &amp;quot;CSIRT&amp;quot;. Available: https://www.exabeam.com/incident-response/csirt/ [Accessed 28 APr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==CERT==&lt;br /&gt;
&amp;lt;p&amp;gt;The term “computer emergency response team” was coined in 1988. In&lt;br /&gt;
response to the Morris worm attack that impacted thousands of servers on&lt;br /&gt;
the Internet, DARPA funded the formation of the Computer Emergency&lt;br /&gt;
Response Team Coordination Center (CERT-CC) at Carnegie Mellon&lt;br /&gt;
University. The goal of CERT-CC was to help protect the internet by&lt;br /&gt;
collecting and disseminating information on critical security&lt;br /&gt;
vulnerabilities. Several other countries formed similar centers using&lt;br /&gt;
the same acronym (despite threats of legal action by Carnegie Mellon for&lt;br /&gt;
trademark infringement). Now the term CERT refers to any emergency&lt;br /&gt;
response team that deals with cyber threats. Many people use CERT-CC&lt;br /&gt;
interchangeably with CSIRT, though the charter of a CERT is information&lt;br /&gt;
sharing in order to help other response teams respond to threats against&lt;br /&gt;
their own infrastructure.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In general, the designation of CERT is helpful in applying real-world&lt;br /&gt;
solutions to various cybersecurity problems. They may be government&lt;br /&gt;
contractors or employees of a major corporation. For example, the U.S.&lt;br /&gt;
Computer Emergency Readiness Team (US-CERT) operates under the U.S.&lt;br /&gt;
Department of Homeland Security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.techopedia.com/definition/31003/computer-emergency-response-team-cert&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In Estonia CERT is designated as CERT-EE. It was established in 2006,&lt;br /&gt;
as an organization responsible for the management of security incidents&lt;br /&gt;
in .ee computer networks. It is also a national contact point for&lt;br /&gt;
international co-operation in the field of IT security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ria.ee/en/cyber-security/cert-ee.html&amp;lt;/p&amp;gt;&lt;br /&gt;
==Difference between SOC/CSIRT/CERT==&lt;br /&gt;
How CSIRTs differ from CERTs and SOCs. There are overlapping&lt;br /&gt;
responsibilities between a community emergency response team (CERT),&lt;br /&gt;
computer security incident response team (CSIRT), and security&lt;br /&gt;
operations center (SOC). To add to this confusion, frequently, the terms&lt;br /&gt;
CERT and CSIRT are used interchangeably, despite the important&lt;br /&gt;
differences.&lt;br /&gt;
[[File:analystimage3.png|1000px|thumb|SOC/CSIRT/CERT &amp;lt;ref name=&amp;quot;exabeam&amp;gt;&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image3.png&amp;quot; alt=&amp;quot;Overlapping in images/image3.png&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;Overlapping in&lt;br /&gt;
images/image3.png&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Understand the primary roles and characteristics of a CERT, CSIRT, and SOC.==&lt;br /&gt;
&amp;lt;p&amp;gt;So, using strict definitions, a CERT collects and disseminates&lt;br /&gt;
security information, typically for the benefit of a country or an&lt;br /&gt;
industry. A CSIRT is a cross-functional team that responds to incidents&lt;br /&gt;
on behalf of a country or an organization. A SOC is where a country or&lt;br /&gt;
organization monitors and defends its network, servers, applications,&lt;br /&gt;
and endpoints.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image4.png&amp;quot; alt=&amp;quot;table of explanation images/image4&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;table of explanation&lt;br /&gt;
images/image4&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
==Future==&lt;br /&gt;
&amp;lt;p&amp;gt;And the Cyber security problem is only getting bigger. According to a&lt;br /&gt;
report published by Accenture, the number of cyber security breaches&lt;br /&gt;
increased by 11 percent from 2017 to 2018. The cost of such breaches is&lt;br /&gt;
astronomical–about $600 billion worldwide, according to the Economic&lt;br /&gt;
Impact of Cybercrime report.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Job projections for cybersecurity are staggering. The Bureau of Labor&lt;br /&gt;
Statistics in US predicts that careers in the cybersecurity field will&lt;br /&gt;
grow by 32% by 2028. That makes cybersecurity one of the top 10&lt;br /&gt;
fastest-growing jobs in the country. In the United States alone, jobs&lt;br /&gt;
for Information Security Analysts are expected to grow by 15% by&lt;br /&gt;
2024.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Most likely this trend is also similar in other countries.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When checking Estonian job portals, there is a constant need for&lt;br /&gt;
people for cyber security related positions. Also, linkedin search gives&lt;br /&gt;
approximately 30 vacancies immediately. There are banks, logistics&lt;br /&gt;
companies, e-shops, and software producers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://ee.linkedin.com/jobs/cyber-security-jobs?countryRedirected=1&amp;amp;amp;position=1&amp;amp;amp;pageNum=0&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Trends that affect companies create need for constant cyber security&lt;br /&gt;
services. Increasing number of home/remote offices require secure&lt;br /&gt;
corporate networks and security of remote devices. One example is from&lt;br /&gt;
this year, when sloppy remote desktop set-up paralyzed systems of 17&lt;br /&gt;
companies.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.aripaev.ee/uudised/2022/04/20/ria-lohakas-kaugtoolaua-seadistus-halvas-martsis-vahemalt-17-juhul-ettevotete-it-susteemid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Also, no service can exists without robust infrastructure - servers,&lt;br /&gt;
databases, applications. As all previously mentioned devices and&lt;br /&gt;
services are at constant scanning and surveillance. So, the breach&lt;br /&gt;
detection and immediate action demands 24/7 services. Even if lot of&lt;br /&gt;
things could be automated, there is a need for human specialists (at&lt;br /&gt;
least, at the moment). Third growing field is also a forensic&lt;br /&gt;
investigation, as every attack must be investigated in order to be ready&lt;br /&gt;
to repel next attacks. So data recovery and evidence collection is&lt;br /&gt;
another important field of work that need skilled and professional&lt;br /&gt;
workers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Even, if the specifics of the entity, be it CSIRT, CERT or SOC, are&lt;br /&gt;
different, the fundamentals of the work are the same. Professional&lt;br /&gt;
knowledge of the networks, operational systems, hardware, scripting, and&lt;br /&gt;
several other wider IT related knowledge is needed. As there is no&lt;br /&gt;
single way to reach to it, every single person can find one’s strongest&lt;br /&gt;
sides and develop them with knowledge of weaker side, in order to know,&lt;br /&gt;
when to as for help.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/body&amp;gt;&lt;br /&gt;
&amp;lt;/html&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mavald</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142241</id>
		<title>Hiring a Cyber Security Incident Analyst</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142241"/>
		<updated>2022-05-01T15:53:00Z</updated>

		<summary type="html">&lt;p&gt;Mavald: /* Certificates */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==A Cyber Security Incident Analyst==&lt;br /&gt;
&lt;br /&gt;
[[File:image1.png|600px|thumb|Job advertisement &amp;lt;ref&amp;gt;&amp;quot;Job Advertisement&amp;quot;. Available at https://www.projectpeople.com/jobs/&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
===Cyber security incident analyst in SOC/CSIRT/CERT===&lt;br /&gt;
This article delves into the job title of Cyber Security Incident&lt;br /&gt;
Analyst and provides an overview of the acronyms SOC/CSIRT/CERT. A brief&lt;br /&gt;
history of the job is discussed here, as well as a possible career path,&lt;br /&gt;
education, experience, and other characteristics required for work in&lt;br /&gt;
computer security-related organizations. The article also provides a&lt;br /&gt;
brief history of SOC/CSIRT/CERT, as well as a comparison of their&lt;br /&gt;
differences and similarities.&lt;br /&gt;
===Cyber Security Incident Analyst Skill Set===&lt;br /&gt;
What skill set is expected from the Cyber Security Incident Analyst? Below written lines are taken from the same job advertisement depicted&lt;br /&gt;
on the left side of this article:&lt;br /&gt;
As a Security Incident Analyst your responsibilities will include:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Continuous monitoring of security tooling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Performing regular and ad-hoc vulnerability assessments&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Carrying out ‘spot checks’&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Reporting vulnerabilities to the PVG via the alerts system&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintaining and documenting logging systems&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Developing centralized logging, reporting and intelligence&lt;br /&gt;
platforms&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;‘Light touch’ penetration testing with open source tooling&lt;br /&gt;
(Metasploit)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Knowledge &amp;amp;amp; Experience required:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;SOC, CSIRT or CERT operational environment experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Windows / Linux experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TCP /IP networking protocol knowledge&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience reviewing and analyzing Security Events from various&lt;br /&gt;
monitoring and logging sources&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience in website and web application security assessment or&lt;br /&gt;
penetration testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience of using Metasploit&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Scripting knowledge using BASH, Python, Perl, Ruby&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Skills in Host and Network Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
As one can see the description of the duties is wide and also the&lt;br /&gt;
knowledge and experience that is required is noteworthy. So, where to&lt;br /&gt;
start to find out the way to get this kind of knowledge and&lt;br /&gt;
expertize.&lt;br /&gt;
===Possible career path===&lt;br /&gt;
Next part of the paper is aiming to depict a possible ways, how to&lt;br /&gt;
develop oneself, and move along the career pathway in cybersecurity&lt;br /&gt;
field. Topics of development, education, experience and certification&lt;br /&gt;
are covered.&lt;br /&gt;
[[File:analystimage2.png|1000px|thumb|Career path &amp;lt;ref&amp;gt;&amp;quot;Possible Career Path&amp;quot;. Available at https://www.cyberseek.org/pathway.html&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
===Junior/Senior===&lt;br /&gt;
Start with an entry-level job in IT. Hands-on experience is often the&lt;br /&gt;
most effective way to prepare for certification exams. Start&lt;br /&gt;
accumulating work experience with an entry-level role as a cybersecurity&lt;br /&gt;
analyst. Many cybersecurity professionals start off in more general IT&lt;br /&gt;
roles. The skills, practices, and technologies you’ll use as a&lt;br /&gt;
cybersecurity professional will continue to evolve along with computer&lt;br /&gt;
and network technology. The desire to learn, ability to problem solve,&lt;br /&gt;
and attention to detail will serve you well in this field. Other, more&lt;br /&gt;
technical skills and technologies to learn include:&amp;lt;ref name=&amp;quot;certification&amp;quot;&amp;gt;Popular Cyber Security Certificates [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications  [Accessed 25 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====SIEM tools (security information and event management)====&lt;br /&gt;
Security Information and Event Management (SIEM) is a set of tools&lt;br /&gt;
and services offering a holistic view of an organization’s information&lt;br /&gt;
security. SIEM works by combining two technologies:&lt;br /&gt;
&amp;lt;li&amp;gt;Security information management (SIM), which collects data from log&lt;br /&gt;
files for analysis and reports on security threats and events, and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;security event management (SEM), which conducts real-time system&lt;br /&gt;
monitoring, notifies network admins about important issues and&lt;br /&gt;
establishes correlations between security events. There are a number of&lt;br /&gt;
security information and event management solutions on the market.&lt;br /&gt;
ArcSight ESM, IBM QRadar and Splunk are among the most popular. &amp;lt;ref name=&amp;quot;SIEM&amp;quot;&amp;gt;Application security, SIEM [Online]. Available: https://www.imperva.com/learn/application-security/siem/. [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Firewalls, Intrusion Detection Systems (IDS), and Intrusion Prevention Systems(IPS)====&lt;br /&gt;
Firewalls can be two types, hardware and software firewalls. Software&lt;br /&gt;
firewall is a firewall that is installed on a computer or server, and&lt;br /&gt;
tasked with network security. It works with a wide variety of other&lt;br /&gt;
technology security solutions to provide more robust and cohesive&lt;br /&gt;
security for enterprises of all sizes. When a software firewall is&lt;br /&gt;
installed on a server, it opens up like an umbrella of protection over&lt;br /&gt;
all other computers connected to the network. It is able to monitor both&lt;br /&gt;
incoming and outgoing traffic for potential risk or suspicious user&lt;br /&gt;
behavior, and also makes setting security policies much easier, faster&lt;br /&gt;
and more flexible. Hardware firewall is positioned between the network&lt;br /&gt;
and devices, allowing traffic to funnel through the firewall for a close&lt;br /&gt;
inspection and analysis. A hardware firewall, a term often&lt;br /&gt;
interchangeable with network or next-generation firewall, protects the&lt;br /&gt;
network gateways for an enterprise. Hardware firewall is physical&lt;br /&gt;
hardware, installed between network elements and connected devices, and&lt;br /&gt;
is tasked with filtering traffic for cyber threat to the network or&lt;br /&gt;
devices. Filtering out unauthorized or suspicious users based on traffic&lt;br /&gt;
analysis is one of the biggest benefits of hardware firewall. &amp;lt;ref name=&amp;quot;sangfor&amp;quot;&amp;gt;Sangfor, &amp;quot;What is Software Firewall? Difference between Hardware Firewall and Software Firewall, [Online]. Available: https://www.sangfor.com/blog/cybersecurity/what-is-software-firewall-difference-between-hardware-firewall-and-software-firewall [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems&lt;br /&gt;
(IPS) are both parts of the network infrastructure. IDS/IPS compare&lt;br /&gt;
network packets to a cyberthreat database containing known signatures of&lt;br /&gt;
cyberattacks — and flag any matching packets. IDS doesn’t alter the&lt;br /&gt;
network packets in any way, whereas IPS prevents the packet from&lt;br /&gt;
delivery based on the contents of the packet, much like how a firewall&lt;br /&gt;
prevents traffic by IP address. &amp;lt;ref name=&amp;quot;Varonis&amp;quot;&amp;gt;Varonis, &amp;quot;What is Software Firewall? IDS vs. IPS: What is the Difference?, [Online]. Available: https://www.varonis.com/blog/ids-vs-ips [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Digital forensics====&lt;br /&gt;
Digital forensics is a branch of forensic science that focuses on&lt;br /&gt;
identifying, acquiring, processing, analyzing, and reporting on data&lt;br /&gt;
stored electronically. Electronic evidence is a component of almost all&lt;br /&gt;
criminal activities and digital forensics support is crucial for law&lt;br /&gt;
enforcement investigations. Electronic evidence can be collected from a&lt;br /&gt;
wide array of sources, such as computers, smartphones, remote storage,&lt;br /&gt;
unmanned aerial systems, shipborne equipment, and more.&amp;lt;ref name=&amp;quot;interpol&amp;quot;&amp;gt;Interpol, &amp;quot;Digital forensics&amp;quot;. Available: https://www.interpol.int/How-we-work/Innovation/Digital-forensics. [Accessed 28 4 2022].&amp;lt;/ref&amp;gt; &lt;br /&gt;
Investigative process of digital forensics can be divided into several stages. There are four major stages: preservation, collection,&lt;br /&gt;
examination, and analysis. All these four stages need a deep understanding of computers, technology across a broad spectrum, and cybersecurity principles and&lt;br /&gt;
practices, a working knowledge of computers, networks, and coding, in-depth investigative abilities, critical-thinking skills and analytical talent the ability to effectively communicate and work with a&lt;br /&gt;
wide range of people. &amp;lt;ref name=&amp;quot;ecpi&amp;quot;&amp;gt;&amp;quot;Digital forensics&amp;quot;. Available: https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me. [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Mobile device management====&lt;br /&gt;
Mobile device management (MDM) is software that allows IT&lt;br /&gt;
administrators to control, secure and enforce policies on smartphones,&lt;br /&gt;
tablets and other endpoints. Mobile device management software emerged&lt;br /&gt;
in the early 2000s as a way to control and secure the personal digital&lt;br /&gt;
assistants and smartphones that business workers began to use. The&lt;br /&gt;
consumer smartphone boom that started with the launch of the Apple&lt;br /&gt;
iPhone in 2007 led to the bring your own device (BYOD) trend, which&lt;br /&gt;
fueled further interest in MDM.&amp;lt;ref name=&amp;quot;techtarget&amp;quot;&amp;gt;Techtarget, &amp;quot;Mobile Device Management&amp;quot;. Available: https://www.techtarget.com/searchmobilecomputing/definition/mobile-device-management [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Data management====&lt;br /&gt;
Sometimes the data management is neglected, but this part has a&lt;br /&gt;
crucial role when learning for good cyber security practices. Majority&lt;br /&gt;
of cyber security programs include a special courses on data management.&lt;br /&gt;
Data management is a method of organizing and maintaining data processes&lt;br /&gt;
that are required in almost every business operations. The benefits of&lt;br /&gt;
data management can be found accounting, statistics, logistics planning&lt;br /&gt;
and other disciplines including corporate computing.&amp;lt;ref name=&amp;quot;GlobalUni&amp;quot;&amp;gt;Global Universities, &amp;quot;MSc Data Management and Cyber Security&amp;quot;. Available: https://globaluniversities.in/msc-data-management-cyber-security. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Data governance (and management) play a fundamental role in&lt;br /&gt;
protecting an organization’s data. Ensuring that the right people have&lt;br /&gt;
the right access and that appropriate security controls are in place to&lt;br /&gt;
protect each system or service, based on the criticality or sensitivity&lt;br /&gt;
of the data sets these contain. &amp;lt;ref name=&amp;quot;CyberMagazine&amp;quot;&amp;gt;Cyber Security Magazine, &amp;quot;The Role of Data Governance in Cybersecurity&amp;quot;. Available: https://cybersecurity-magazine.com/the-role-of-data-governance-in-cybersecurity/?utm_source=rss&amp;amp;amp;utm_medium=rss&amp;amp;amp;utm_campaign=the-role-of-data-governance-in-cybersecurity. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Application security development====&lt;br /&gt;
Application security describes security measures at the application&lt;br /&gt;
level that aim to prevent data or code within the app from being stolen&lt;br /&gt;
or hijacked. It encompasses the security considerations that happen&lt;br /&gt;
during application development and design, but it also involves systems&lt;br /&gt;
and approaches to protect apps after they get deployed. Application&lt;br /&gt;
security may include hardware, software, and procedures that identify or&lt;br /&gt;
minimize security vulnerabilities.&amp;lt;ref name=&amp;quot;vmware&amp;quot;&amp;gt;VmWare, &amp;quot;What is application security?&amp;quot;. Available: https://www.vmware.com/topics/glossary/content/application-security.html [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Application security development is important to ensure that your&lt;br /&gt;
application is free from coding errors and bugs. And controls the risk&lt;br /&gt;
and helps safeguard against security vulnerabilities. Application&lt;br /&gt;
security development is the process of making applications more secure&lt;br /&gt;
by finding and fixing security vulnerabilities. This is often done by&lt;br /&gt;
enforcing software security best practices and using application&lt;br /&gt;
security testing tools. &lt;br /&gt;
&amp;lt;ref name=&amp;quot;perforce&amp;quot;&amp;gt;Perforce, &amp;quot;Application Security Development Best Practices&amp;quot;. Available: https://www.perforce.com/blog/kw/application-security-development-best-practices. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Audit and compliance knowledge====&lt;br /&gt;
A cyber security audit is designed to be a comprehensive review and&lt;br /&gt;
analysis of your business’s IT infrastructure. It identifies threats and&lt;br /&gt;
vulnerabilities, exposing weaknesses and high-risk practices.&lt;br /&gt;
Regulations such as the EU GDPR (General Data Protection Regulation) can&lt;br /&gt;
impose hefty penalties in the event of a breach that results in&lt;br /&gt;
exploited data. A cyber security audit will help mitigate the&lt;br /&gt;
consequences of a breach and demonstrate that your organization has&lt;br /&gt;
taken the necessary steps to protect client and company data. &amp;lt;ref name=&amp;quot;cyforsecure&amp;quot;&amp;gt;Cyfor Secure, &amp;quot;What is a Cyber Security Audit and how can it help your organisation?&amp;quot;. Available: https://cyforsecure.co.uk/services/cyber-assessment/cyber-security-audit/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cybersecurity compliance is the organizational risk management method&lt;br /&gt;
aligned with pre-defined security measures &amp;amp;amp; controls on how data&lt;br /&gt;
confidentiality is ensured by its administrative procedures.&amp;lt;ref name=&amp;quot;nordlayer&amp;quot;&amp;gt;NordLayer, &amp;quot;Cybersecurity compliance: Everything you need to know&amp;quot;. Available: https://nordlayer.com/blog/cybersecurity-compliance-everything-you-need-to-know/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
All needed skills are developed through courses and certification.&lt;br /&gt;
&lt;br /&gt;
===Entry-Level Incident Response Positions===&lt;br /&gt;
It is not always possible to advance to the position of incident&lt;br /&gt;
responder in a straight line. Many professionals advance from entry- to&lt;br /&gt;
mid-level positions before becoming a real incident responder or a&lt;br /&gt;
member of a computer emergency response team (CERT).&amp;lt;br /&amp;gt;&lt;br /&gt;
These are some examples: &amp;lt;ref name=&amp;quot;Infosec&amp;quot;&amp;gt;Infosec, &amp;quot;Incident Responder Career Roadmap: From Entry Level to Executive&amp;quot;. Available: https://resources.infosecinstitute.com/topic/incident-responder-career-roadmap-entry-level-executive/ [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;network-administrator&amp;quot;&amp;gt;Network administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;This position’s experience will help potential incident responders&lt;br /&gt;
develop networking skills. Attention to detail, as well as the ability&lt;br /&gt;
to sift through system configurations, site layouts, and general network&lt;br /&gt;
and communication setups, are essential in this field.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;system-administrator&amp;quot;&amp;gt;System administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Another crucial beginning point for an incident responder is to learn&lt;br /&gt;
how to manage resources inside your organization as well as user&lt;br /&gt;
behavior. Understanding the potential damage that users, inadequate&lt;br /&gt;
security setups, and ineffective IT policies and procedures can cause on&lt;br /&gt;
your network can provide prospective candidates with insight into the&lt;br /&gt;
human component of an incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;security-administrator&amp;quot;&amp;gt;Security administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In such a position, basic hacking skills, penetration testing, and&lt;br /&gt;
intrusion detection are all learned, which are crucial incident&lt;br /&gt;
responder skills when trying to replicate a breach or attack.&lt;br /&gt;
Understanding the paths a cybercriminal will take when attempting to&lt;br /&gt;
damage or obtain access to a system can greatly simplify the work of&lt;br /&gt;
reverse engineering the incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Mid-Level Incident Response Positions ===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5&lt;br /&gt;
id=&amp;quot;computer-security-incident-response-team-csirt-engineer&amp;quot;&amp;gt;Computer&lt;br /&gt;
security incident response team (CSIRT) engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;cyber-incident-responder&amp;quot;&amp;gt;Cyber incident responder&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-response-engineer&amp;quot;&amp;gt;Incident response&lt;br /&gt;
engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;While each of these positions is different, they generally require&lt;br /&gt;
very similar skills and characteristics in a candidate. At this level,&lt;br /&gt;
personal characteristics such as problem solving, time management, and&lt;br /&gt;
even presentation skills become more crucial as one’s career evolves&lt;br /&gt;
into a management-facing role.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Technical skills include the ability to identify and minimize threats&lt;br /&gt;
while maintaining communication with management and the rest of your&lt;br /&gt;
team. Data analysis and evidence gathering become increasingly crucial,&lt;br /&gt;
and the circumstances in which your services are deployed get more&lt;br /&gt;
serious.&amp;lt;/p&amp;gt;&lt;br /&gt;
Problem-solving skills are crucial at this level of incident&lt;br /&gt;
response, and as the stakes rise, so does the pressure in each&lt;br /&gt;
situation. At this level, programming abilities are essential since&lt;br /&gt;
incident responders may be needed to reverse engineer malicious code or&lt;br /&gt;
even create patches for vulnerable network applications or services. &amp;lt;ref name=&amp;quot;coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated]&amp;quot;. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Senior-Level Incident Response Positions===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;intrusion-detection-specialist&amp;quot;&amp;gt;Intrusion detection&lt;br /&gt;
specialist:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;A CISSP certification might help a potential candidate in preparing&lt;br /&gt;
for the profession. The role of an intrusion detection specialist is to&lt;br /&gt;
find and stop any unwanted communications.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-manager&amp;quot;&amp;gt;Incident manager:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Expected to plan, oversee, manage, and supervise all incident&lt;br /&gt;
response team actions. Is in charge of reporting all current events to&lt;br /&gt;
senior management and stakeholders, as well as acting as the technical&lt;br /&gt;
lead on active incidents for incident responders. Prepares threat and&lt;br /&gt;
impact assessments and reports them known to management.&amp;lt;ref name=&amp;quot;coursera&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Certificates== &lt;br /&gt;
There is a vast number of different certificates and the road map to&lt;br /&gt;
being a certified professional could be very different&amp;lt;ref name=&amp;quot;Coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated],&amp;quot; [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;NICCS&amp;quot;&amp;gt;NICCS, &amp;quot;Cybersecurity Certifications,&amp;quot; [Online]. Available: hhttps://niccs.cisa.gov/about-niccs/cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt; . One possible&lt;br /&gt;
approach is to start with basic certificates from the different branches&lt;br /&gt;
of service and move to more specific and demanding focused&lt;br /&gt;
certification. Also, some jobs require certain clearances, either from&lt;br /&gt;
industry, or from the government. One small selection of different&lt;br /&gt;
possible certificates is brought out in following paragraphs.&lt;br /&gt;
&lt;br /&gt;
Security+ is a CompTIA certification that is considered a basic cert&lt;br /&gt;
among cybersecurity professionals. It covers the topics of risk&lt;br /&gt;
management and threat assessment.&lt;br /&gt;
Network+ is also offered by CompTIA this certification (like the name&lt;br /&gt;
implies) focuses on networking infrastructure and operations. It is&lt;br /&gt;
considered a foundational certification.&lt;br /&gt;
The Certified Information Systems Security Professional (CISSP) is a&lt;br /&gt;
more advanced certification designed for cybersecurity professionals&lt;br /&gt;
with at least five years of work experience. The certification covers&lt;br /&gt;
topics such as architecture, engineering, and management.&amp;lt;/p&amp;gt;&lt;br /&gt;
The Certified Ethical Hacker (CEH) certification is also considered a&lt;br /&gt;
more advanced cert because it generally requires that applicants have&lt;br /&gt;
multiple years of work experience. The goal of an ethical hacker&lt;br /&gt;
certification is to be able to understand how cyber attacks unfold in&lt;br /&gt;
order to improve threat assessment and mitigation skills.&amp;lt;ref name=&amp;quot;cyberguide&amp;quot;&amp;gt;Cybersecurity Guide, &amp;quot;How to become a cybersecurity specialist&amp;quot;, [Online]. Available: https://cybersecurityguide.org/careers/security-specialist/. [Accessed 27 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
This is definitely not all, when one looks for more information, following link could be searched, to get more in depth knowledge about&lt;br /&gt;
different possibilities.&lt;br /&gt;
 &lt;br /&gt;
Hereby, with the help of this matrix a possible taxonomy of different 436 listed certificates in branches are&lt;br /&gt;
presented.&amp;lt;ref name=&amp;quot;Pauljeremy&amp;quot;&amp;gt;&amp;quot;Cybersecurity Roadmap,&amp;quot; [Online]. Available: https://pauljerimy.com/2020/10/12/scr-oct-2020-update/. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:analystimage5.png|1000px|thumb|Certificate matrix &amp;lt;ref&amp;gt;&amp;quot;Certification roadmap&amp;quot;. Available at https://pauljerimy.com/security-certification-roadmap&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
=== Communication and Network Security===&lt;br /&gt;
Communication and network security covers the ability to secure&lt;br /&gt;
communication channels and networks. Topics include secure and converges&lt;br /&gt;
protocols, wireless networks, cellular networks, hardware operations&lt;br /&gt;
(warranty and redundant power), and third-party connectivity. IP&lt;br /&gt;
networking are also included in this domain.&lt;br /&gt;
===Identity and Access Management===&lt;br /&gt;
The identity and access management domain covers the attacks that&lt;br /&gt;
target the human gateway to gain access to data. Other topics include&lt;br /&gt;
ways to identify users with rights to access the information and&lt;br /&gt;
servers. Identity and access management covers the topics of&lt;br /&gt;
applications, Single sign-on authentication, privilege escalation,&lt;br /&gt;
Kerberos, rule-based or risk-based access control, proofing and&lt;br /&gt;
establishment of identity.&lt;br /&gt;
===Security Architecture and Engineering===&lt;br /&gt;
The security architecture and engineering domain covers important&lt;br /&gt;
topics concerning security engineering plans, designs and principles,&lt;br /&gt;
Topics include assessing and mitigating information system&lt;br /&gt;
vulnerabilities, fundamental concepts of security models and security&lt;br /&gt;
architectures in critical areas like access control. Cloud systems,&lt;br /&gt;
cryptography, system infiltrations (ransomware, fault-injection and&lt;br /&gt;
more) and virtualized systems are also covered in this domain.&lt;br /&gt;
===Asset Security===&lt;br /&gt;
The Asset Security domain deals with the issues related to the&lt;br /&gt;
collection, storage, maintenance, retention and destruction of data. It&lt;br /&gt;
also covers knowledge of different roles regarding data handling (owner,&lt;br /&gt;
controller and custodian) as well as data protection methods and data&lt;br /&gt;
states. Other topics include resource provision, asset classification&lt;br /&gt;
and data lifecycle management.&lt;br /&gt;
===Security and Risk Management===&lt;br /&gt;
The security and risk management domain covers general on skills&lt;br /&gt;
related to the implementation of user awareness programs as well as&lt;br /&gt;
security procedures. Emphasis is also placed on risk management&lt;br /&gt;
concerning the acquisition of new services, hardware and software&lt;br /&gt;
(supply chain). Other skills include social engineering defense&lt;br /&gt;
mechanisms.&lt;br /&gt;
===Security Assessment and Testing===&lt;br /&gt;
The security assessment and testing domain deals with all the&lt;br /&gt;
techniques and tools used to find system vulnerabilities, weaknesses and&lt;br /&gt;
potential areas of concern not addressed by security procedures and&lt;br /&gt;
policies. Attack simulations, vulnerability assessment, compliance&lt;br /&gt;
checks, and ethical disclosure also fall under this domain.&lt;br /&gt;
===Software Security===&lt;br /&gt;
The software development security domain deals with implementing&lt;br /&gt;
software-based security protocols within environment for which the IT&lt;br /&gt;
professional is responsible. Risk analysis, vulnerability identification&lt;br /&gt;
and auditing of source codes are all covered in this subset. Additional&lt;br /&gt;
topics include software-designed security, maturity models, development&lt;br /&gt;
methodologies, open-source and third-party development security.&lt;br /&gt;
===Security operations===&lt;br /&gt;
The security operations domain covers topics ranging from&lt;br /&gt;
investigations and digital forensic to detection and intrusion&lt;br /&gt;
prevention tools, sandboxing and firewalls. Topics include user and&lt;br /&gt;
entity behavior analytics, threat intelligence (threat hunting and&lt;br /&gt;
threat feeds) log management, artifacts (mobile, computer and network),&lt;br /&gt;
machine learning and AI-based tools, penetration testing, and&lt;br /&gt;
exploitation development. These for sub-domains are lister here.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Incident Handling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Penetration Testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Exploitation&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Education==&lt;br /&gt;
[[File:Analystimage7.png|400px|thumb|Comparison degree vs Certificate &amp;lt;ref&amp;gt;&amp;quot;Comparison Table&amp;quot;. Available at https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
The entry level monitoring specialist is hired by Estonian&lt;br /&gt;
Information System Authority even if there is no formal IT education,&lt;br /&gt;
but readiness to learn and moderate knowledge of different operation&lt;br /&gt;
systems is enough to start the career. &amp;lt;ref name=&amp;quot;cv&amp;quot;&amp;gt;cv.ee, &amp;quot;SEIRESPETSIALIST - tule Eesti küberruumi valvuriks!&amp;quot;. Available: https://www.cv.ee/en/vacancy/792782/riigi-infosusteemi-amet/seirespetsialist-tule-eesti-kuberruumi-valvuriks [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Nevertheless, like most other high qualification careers jobs falling&lt;br /&gt;
under the cybersecurity specialist category require some form of formal&lt;br /&gt;
education. However, since cybersecurity specialist jobs can fall across&lt;br /&gt;
a wide spectrum of job descriptions and responsibilities, it is possible&lt;br /&gt;
to obtain a specialist job after completing many levels of different&lt;br /&gt;
computer related education.&lt;br /&gt;
&lt;br /&gt;
If one is looking for a cybersecurity related education, for example&lt;br /&gt;
in EU, 137 courses/programs could be found that relate to keyword IT or&lt;br /&gt;
cybersecurity. &amp;lt;ref name=&amp;quot;enisa&amp;quot;&amp;gt;ENISA (European Union Agency for Cybersecurity), &amp;quot;Cybersecurity Education-Cybersecurity Higher Education Database&amp;quot;. Available: https://www.enisa.europa.eu/topics/cybersecurity-education/education-map/education-courses [Accessed 26 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Also, there is a great amount of discussion, if cyber security&lt;br /&gt;
professional should have a degree or would be certification just enough.&lt;br /&gt;
One interesting table is produces by Franklin University that compares&lt;br /&gt;
benefits and/or drawbacks of each type of credential.&amp;lt;ref name=&amp;quot;franklin&amp;quot;&amp;gt;Franklin University, &amp;quot;Is Getting a Master&#039;s Degree in Cyber Security Worth It?&amp;quot;. Available: https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Certifications are generally good for people with little practical&lt;br /&gt;
experience because they are known quantities in the industry and can&lt;br /&gt;
help you get your foot in the door. They set a minimum knowledge bar.&lt;br /&gt;
But some certifications are viewed more favorably than others.&lt;br /&gt;
Certifications with renewal requirements are viewed better by hiring&lt;br /&gt;
managers, but they also more costly in the long run because of the need&lt;br /&gt;
for continuing education. Certifications are also good for showing&lt;br /&gt;
in-depth expertise in a specialization within cybersecurity. Depending&lt;br /&gt;
on your career goals, it may be advantageous to have a master’s&lt;br /&gt;
degree—which shows your breadth of knowledge, critical thinking and&lt;br /&gt;
leadership skills—and a certificate—which shows specific skill&lt;br /&gt;
competency.&amp;lt;ref name=&amp;quot;franklin&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
As IT (Cyber) Security is still a relatively young discipline,&lt;br /&gt;
universities and colleges are still figuring out which is the best&lt;br /&gt;
approach for their degrees. Study programmes and curricula in Cyber&lt;br /&gt;
Security are different. In general, here are the duration of Cyber&lt;br /&gt;
Security degrees:&lt;br /&gt;
&amp;lt;ref name=&amp;quot;studyportal&amp;quot;&amp;gt;Studyportals, &amp;quot;Why You Should Study a Cyber Security Degree in 2022&amp;quot;. Available: https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Bachelor’s degrees in Cyber Security take 3 or 4 years in most&lt;br /&gt;
countries.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Master’s courses in Cyber Security take between 1-2 years to&lt;br /&gt;
complete.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;PhD programmes in Cyber Security last 3-5 years. Some only take 1&lt;br /&gt;
or 2 years, but they are less common.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Generalization could me made that on bachelor level the general&lt;br /&gt;
knowledge about the cyber issues are obtained. On master level the&lt;br /&gt;
specialization courses are taken and the person can choose more specific&lt;br /&gt;
topics to study. It is on master level where strengths of the cyber&lt;br /&gt;
specialist can be developed further and up-do date knowledge obtained in&lt;br /&gt;
specifics. PhD is serious science and involves teaching, lot of&lt;br /&gt;
scientific work and writing for publications.&lt;br /&gt;
&lt;br /&gt;
==Salary==&lt;br /&gt;
&amp;lt;p&amp;gt;Even if the salary can be very different, compared to the skills and&lt;br /&gt;
experience, an generalization can be made. Cyber Security professionals&lt;br /&gt;
in CSIRT, and in other entities earn quite well, from the start. First,&lt;br /&gt;
some comparison from the United States. The average CSIRT analyst salary&lt;br /&gt;
in the USA is $97,500 per year or $50 per hour. Entry level positions&lt;br /&gt;
start at $48,875 per year while most experienced workers make up to&lt;br /&gt;
$135,373 per year.&amp;lt;ref name=&amp;quot;talent&amp;quot;&amp;gt;talent.com, &amp;quot;Csirt Analyst average salary in USA 2022&amp;quot;. Available: https://www.talent.com/salary?job=csirt+analyst [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There are multiple positions you can occupy in this field. They have&lt;br /&gt;
in common great salaries and high demand for technical skills, attention&lt;br /&gt;
to details, problem-solving mentality, and the ability to analyze risks.&lt;br /&gt;
Here are the average annual salaries in the United States, according to&lt;br /&gt;
Payscale: &amp;lt;ref name=&amp;quot;studyportal&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Cryptographer – 100,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Information Security Officer – 91,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Assessor – 90,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Engineer – 88,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Penetration Tester – 81,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Forensics Expert – 71,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Administrator – 65,000 USD&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
When looking into salaries in Estonia, one can find that there is a&lt;br /&gt;
discussion that private sector is taking a toll from the public sector,&lt;br /&gt;
and that the salaries in important agencies, as Information System&lt;br /&gt;
Authority loose their employees to the better paid positions in private&lt;br /&gt;
sector.&amp;lt;ref name=&amp;quot;digigeenius&amp;quot;&amp;gt;DiGi Geenius, &amp;quot;Kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad&amp;quot;. Available: https://digi.geenius.ee/rubriik/uudis/kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad/ [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;tehnika&amp;quot;&amp;gt;Postimees, &amp;quot;Riigi-it-tootajate-palgamaarad-kasvasid&amp;quot;. Available: https://tehnika.postimees.ee/6887428/riigi-it-tootajate-palgamaarad-kasvasid [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
But there is also a different view that average private sector worker&lt;br /&gt;
could be hired as a top specialist in public sector and then the payment&lt;br /&gt;
is higher. Nevertheless, it seems that the average payment in cyber&lt;br /&gt;
security sector is any way higher that in other parts of the&lt;br /&gt;
e-services. &amp;lt;ref name=&amp;quot;digigeenius2&amp;quot;&amp;gt;DiGi Geenius, &amp;quot;5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka&amp;quot;. Available: https://digi.geenius.ee/rubriik/uudis/5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==SOC==&lt;br /&gt;
&amp;lt;p&amp;gt;A SOC is a facility where an organization’s network, applications,&lt;br /&gt;
and endpoints are monitored and defended. The term was adapted from&lt;br /&gt;
network operations centers (NOCs), where large telecommunication or&lt;br /&gt;
corporate networks are monitored. When network security became more of a&lt;br /&gt;
concern, security teams were formed within the NOCs, and eventually spun&lt;br /&gt;
off into larger organizations of their own as the responsibilities of&lt;br /&gt;
security teams grew increasingly complex and specialized. The security&lt;br /&gt;
staff working in a security operations center are often called the SOC&lt;br /&gt;
team.&amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;Exabeam, &amp;quot;CSIRT&amp;quot;. Available: https://www.exabeam.com/incident-response/csirt/ [Accessed 28 APr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;Functions of the SOC team include, but are not limited to:&amp;lt;ref name=&amp;quot;trellix&amp;quot;&amp;gt;Trellix, &amp;quot;What Is a Security Operations Center (SOC)?&amp;quot;. Available: https://www.trellix.com/en-us/security-awareness/operations/what-is-soc.html [Accessed 30 APr 2022].&amp;lt;/ref&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ol type=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Taking inventory of resources, to get a better understanding of the&lt;br /&gt;
structure they are protecting.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintanence of the system, by constantly making updates and adding&lt;br /&gt;
safeguards.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Monitoring the network for abnormalities with special tools.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Threat analysis of new attacks and vulnerabilities.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Responding to attacks, by acting as “first responders”. The SOC team&lt;br /&gt;
will shut down and/or isolate endpoints, deleting files and lowering the&lt;br /&gt;
impact as fast as possible.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Recovery of system stability and lost data. This may be done using&lt;br /&gt;
backups, restarting endpoints or reconfiguring systems.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Logging all actions on the system, to be later used for analysis or&lt;br /&gt;
forensics after an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigating the root cause of an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Auditing their own actions, to be in line with regulations of the&lt;br /&gt;
organization, industry or governing body.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==CSIRT==&lt;br /&gt;
&amp;lt;p&amp;gt;A CSIRT is a group that responds to security incidents when they&lt;br /&gt;
occur. Key responsibilities of a CSIRT include:&lt;br /&gt;
&amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
===Creating and maintaining an incident response plan (IRP)===&lt;br /&gt;
An incident response plan (IRP) is a set of written instructions for&lt;br /&gt;
detecting, responding to and limiting the effects of an information&lt;br /&gt;
security event. Incident response plans provide instructions for&lt;br /&gt;
responding to many potential scenarios, including data breaches, denial&lt;br /&gt;
of service/distributed denial of service attacks, firewall breaches,&lt;br /&gt;
virus or malware outbreaks or insider threats. Without an incident&lt;br /&gt;
response plan in place, organizations may either not detect the attack&lt;br /&gt;
in the first place, or not follow proper protocol to contain the threat&lt;br /&gt;
and recover from it when a breach is detected.&lt;br /&gt;
&lt;br /&gt;
https://www.stratacore.com/incidentresponseplan&lt;br /&gt;
===Investigating and analyzing incidents===&lt;br /&gt;
CSIRTs are also involved in improvement activities. After major&lt;br /&gt;
computer security incidents occur, or when incidents are not handled in&lt;br /&gt;
a timely or effective manner, a CSIRT will generally perform a&lt;br /&gt;
postmortem of the incident and its response. This postmortem will&lt;br /&gt;
identify the strengths and weakness of the response effort. Such reviews&lt;br /&gt;
can identify weaknesses and holes in systems, infrastructure defenses,&lt;br /&gt;
or policies that allowed the incident to take place. It can also&lt;br /&gt;
identify problems with communication channels, interfaces, and&lt;br /&gt;
procedures that inhibited the efficient resolution of the reported&lt;br /&gt;
problem.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.cisa.gov/uscert/bsi/articles/best-practices/incident-management/defining-computer-security-incident-response-teams&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Managing internal communications and updates during or immediately after incidents occur===&lt;br /&gt;
===Communicating with employees, shareholders, customers, and the press about incidents as needed===&lt;br /&gt;
&amp;lt;p&amp;gt;There are various services within the CSIRT Services Framework that&lt;br /&gt;
address communications, as they relate to security operations and&lt;br /&gt;
incident response services. Some of these include Information Security&lt;br /&gt;
Incident Coordination, Crisis Management Support, Vulnerability&lt;br /&gt;
Disclosure, Situational Awareness Communication, and Awareness Building,&lt;br /&gt;
to name a few. Sharing information and communicating with the general&lt;br /&gt;
public and/or your constituency is appropriate in many different&lt;br /&gt;
scenarios. These can range from proactive communications to reactive&lt;br /&gt;
communications. Each scenario may be unique, and careful consideration&lt;br /&gt;
should be given to when to release information to the public and what&lt;br /&gt;
information should be released.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;https://resources.sei.cmu.edu/asset_files/Handbook/2021_002_001_651819.pdf&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Remediating incidents===&lt;br /&gt;
Threat remediation is a strong and capable tool for fighting the&lt;br /&gt;
cyber security compromises. As the word ‘remedy’ suggests, remediation&lt;br /&gt;
process involves the treatment of a security breach. With the&lt;br /&gt;
remediation practices, your cyber security team is able to eliminate&lt;br /&gt;
suspicious activities and malicious attacks in the form of malware,&lt;br /&gt;
ransomware, phishing and such. Even if you ‘kill’ the suspicious&lt;br /&gt;
activity, the attackers can remain in your systems. If you want to&lt;br /&gt;
contaminate and end the problem for good, your remediation processes&lt;br /&gt;
must involve the detection of the cause. &amp;lt;ref name=&amp;quot;logsign&amp;quot;&amp;gt;Logsign, &amp;quot;What-is-remediation-in-cyber-security&amp;quot;. Available: https://www.logsign.com/blog/what-is-remediation-in-cyber-security/. [Accessed 28 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Recommending technology, policy, governance, and training changes after security incidents===&lt;br /&gt;
After all these actions, the SCIRT must contribute to the development&lt;br /&gt;
of better policies, practices and has to recommend improvements. They&lt;br /&gt;
are not working in the vacuum and their work has to create new and&lt;br /&gt;
better standards for cyber security. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;Exabeam, &amp;quot;CSIRT&amp;quot;. Available: https://www.exabeam.com/incident-response/csirt/ [Accessed 28 APr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==CERT==&lt;br /&gt;
&amp;lt;p&amp;gt;The term “computer emergency response team” was coined in 1988. In&lt;br /&gt;
response to the Morris worm attack that impacted thousands of servers on&lt;br /&gt;
the Internet, DARPA funded the formation of the Computer Emergency&lt;br /&gt;
Response Team Coordination Center (CERT-CC) at Carnegie Mellon&lt;br /&gt;
University. The goal of CERT-CC was to help protect the internet by&lt;br /&gt;
collecting and disseminating information on critical security&lt;br /&gt;
vulnerabilities. Several other countries formed similar centers using&lt;br /&gt;
the same acronym (despite threats of legal action by Carnegie Mellon for&lt;br /&gt;
trademark infringement). Now the term CERT refers to any emergency&lt;br /&gt;
response team that deals with cyber threats. Many people use CERT-CC&lt;br /&gt;
interchangeably with CSIRT, though the charter of a CERT is information&lt;br /&gt;
sharing in order to help other response teams respond to threats against&lt;br /&gt;
their own infrastructure.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In general, the designation of CERT is helpful in applying real-world&lt;br /&gt;
solutions to various cybersecurity problems. They may be government&lt;br /&gt;
contractors or employees of a major corporation. For example, the U.S.&lt;br /&gt;
Computer Emergency Readiness Team (US-CERT) operates under the U.S.&lt;br /&gt;
Department of Homeland Security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.techopedia.com/definition/31003/computer-emergency-response-team-cert&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In Estonia CERT is designated as CERT-EE. It was established in 2006,&lt;br /&gt;
as an organization responsible for the management of security incidents&lt;br /&gt;
in .ee computer networks. It is also a national contact point for&lt;br /&gt;
international co-operation in the field of IT security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ria.ee/en/cyber-security/cert-ee.html&amp;lt;/p&amp;gt;&lt;br /&gt;
===Difference between SOC/CSIRT/CERT===&lt;br /&gt;
&amp;lt;p&amp;gt;How CSIRTs differ from CERTs and SOCs There are overlapping&lt;br /&gt;
responsibilities between a community emergency response team (CERT),&lt;br /&gt;
computer security incident response team (CSIRT), and security&lt;br /&gt;
operations center (SOC). To add to this confusion, frequently, the terms&lt;br /&gt;
CERT and CSIRT are used interchangeably, despite the important&lt;br /&gt;
differences.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image3.png&amp;quot; alt=&amp;quot;Overlapping in images/image3.png&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;Overlapping in&lt;br /&gt;
images/image3.png&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
==Understand the primary roles and characteristics of a CERT, CSIRT, and SOC.==&lt;br /&gt;
&amp;lt;p&amp;gt;So, using strict definitions, a CERT collects and disseminates&lt;br /&gt;
security information, typically for the benefit of a country or an&lt;br /&gt;
industry. A CSIRT is a cross-functional team that responds to incidents&lt;br /&gt;
on behalf of a country or an organization. A SOC is where a country or&lt;br /&gt;
organization monitors and defends its network, servers, applications,&lt;br /&gt;
and endpoints.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image4.png&amp;quot; alt=&amp;quot;table of explanation images/image4&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;table of explanation&lt;br /&gt;
images/image4&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
==Future==&lt;br /&gt;
&amp;lt;p&amp;gt;And the Cyber security problem is only getting bigger. According to a&lt;br /&gt;
report published by Accenture, the number of cyber security breaches&lt;br /&gt;
increased by 11 percent from 2017 to 2018. The cost of such breaches is&lt;br /&gt;
astronomical–about $600 billion worldwide, according to the Economic&lt;br /&gt;
Impact of Cybercrime report.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Job projections for cybersecurity are staggering. The Bureau of Labor&lt;br /&gt;
Statistics in US predicts that careers in the cybersecurity field will&lt;br /&gt;
grow by 32% by 2028. That makes cybersecurity one of the top 10&lt;br /&gt;
fastest-growing jobs in the country. In the United States alone, jobs&lt;br /&gt;
for Information Security Analysts are expected to grow by 15% by&lt;br /&gt;
2024.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Most likely this trend is also similar in other countries.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When checking Estonian job portals, there is a constant need for&lt;br /&gt;
people for cyber security related positions. Also, linkedin search gives&lt;br /&gt;
approximately 30 vacancies immediately. There are banks, logistics&lt;br /&gt;
companies, e-shops, and software producers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://ee.linkedin.com/jobs/cyber-security-jobs?countryRedirected=1&amp;amp;amp;position=1&amp;amp;amp;pageNum=0&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Trends that affect companies create need for constant cyber security&lt;br /&gt;
services. Increasing number of home/remote offices require secure&lt;br /&gt;
corporate networks and security of remote devices. One example is from&lt;br /&gt;
this year, when sloppy remote desktop set-up paralyzed systems of 17&lt;br /&gt;
companies.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.aripaev.ee/uudised/2022/04/20/ria-lohakas-kaugtoolaua-seadistus-halvas-martsis-vahemalt-17-juhul-ettevotete-it-susteemid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Also, no service can exists without robust infrastructure - servers,&lt;br /&gt;
databases, applications. As all previously mentioned devices and&lt;br /&gt;
services are at constant scanning and surveillance. So, the breach&lt;br /&gt;
detection and immediate action demands 24/7 services. Even if lot of&lt;br /&gt;
things could be automated, there is a need for human specialists (at&lt;br /&gt;
least, at the moment). Third growing field is also a forensic&lt;br /&gt;
investigation, as every attack must be investigated in order to be ready&lt;br /&gt;
to repel next attacks. So data recovery and evidence collection is&lt;br /&gt;
another important field of work that need skilled and professional&lt;br /&gt;
workers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Even, if the specifics of the entity, be it CSIRT, CERT or SOC, are&lt;br /&gt;
different, the fundamentals of the work are the same. Professional&lt;br /&gt;
knowledge of the networks, operational systems, hardware, scripting, and&lt;br /&gt;
several other wider IT related knowledge is needed. As there is no&lt;br /&gt;
single way to reach to it, every single person can find one’s strongest&lt;br /&gt;
sides and develop them with knowledge of weaker side, in order to know,&lt;br /&gt;
when to as for help.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/body&amp;gt;&lt;br /&gt;
&amp;lt;/html&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mavald</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142240</id>
		<title>Hiring a Cyber Security Incident Analyst</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142240"/>
		<updated>2022-05-01T15:52:43Z</updated>

		<summary type="html">&lt;p&gt;Mavald: /* Certificates */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==A Cyber Security Incident Analyst==&lt;br /&gt;
&lt;br /&gt;
[[File:image1.png|600px|thumb|Job advertisement &amp;lt;ref&amp;gt;&amp;quot;Job Advertisement&amp;quot;. Available at https://www.projectpeople.com/jobs/&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
===Cyber security incident analyst in SOC/CSIRT/CERT===&lt;br /&gt;
This article delves into the job title of Cyber Security Incident&lt;br /&gt;
Analyst and provides an overview of the acronyms SOC/CSIRT/CERT. A brief&lt;br /&gt;
history of the job is discussed here, as well as a possible career path,&lt;br /&gt;
education, experience, and other characteristics required for work in&lt;br /&gt;
computer security-related organizations. The article also provides a&lt;br /&gt;
brief history of SOC/CSIRT/CERT, as well as a comparison of their&lt;br /&gt;
differences and similarities.&lt;br /&gt;
===Cyber Security Incident Analyst Skill Set===&lt;br /&gt;
What skill set is expected from the Cyber Security Incident Analyst? Below written lines are taken from the same job advertisement depicted&lt;br /&gt;
on the left side of this article:&lt;br /&gt;
As a Security Incident Analyst your responsibilities will include:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Continuous monitoring of security tooling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Performing regular and ad-hoc vulnerability assessments&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Carrying out ‘spot checks’&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Reporting vulnerabilities to the PVG via the alerts system&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintaining and documenting logging systems&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Developing centralized logging, reporting and intelligence&lt;br /&gt;
platforms&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;‘Light touch’ penetration testing with open source tooling&lt;br /&gt;
(Metasploit)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Knowledge &amp;amp;amp; Experience required:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;SOC, CSIRT or CERT operational environment experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Windows / Linux experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TCP /IP networking protocol knowledge&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience reviewing and analyzing Security Events from various&lt;br /&gt;
monitoring and logging sources&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience in website and web application security assessment or&lt;br /&gt;
penetration testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience of using Metasploit&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Scripting knowledge using BASH, Python, Perl, Ruby&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Skills in Host and Network Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
As one can see the description of the duties is wide and also the&lt;br /&gt;
knowledge and experience that is required is noteworthy. So, where to&lt;br /&gt;
start to find out the way to get this kind of knowledge and&lt;br /&gt;
expertize.&lt;br /&gt;
===Possible career path===&lt;br /&gt;
Next part of the paper is aiming to depict a possible ways, how to&lt;br /&gt;
develop oneself, and move along the career pathway in cybersecurity&lt;br /&gt;
field. Topics of development, education, experience and certification&lt;br /&gt;
are covered.&lt;br /&gt;
[[File:analystimage2.png|1000px|thumb|Career path &amp;lt;ref&amp;gt;&amp;quot;Possible Career Path&amp;quot;. Available at https://www.cyberseek.org/pathway.html&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
===Junior/Senior===&lt;br /&gt;
Start with an entry-level job in IT. Hands-on experience is often the&lt;br /&gt;
most effective way to prepare for certification exams. Start&lt;br /&gt;
accumulating work experience with an entry-level role as a cybersecurity&lt;br /&gt;
analyst. Many cybersecurity professionals start off in more general IT&lt;br /&gt;
roles. The skills, practices, and technologies you’ll use as a&lt;br /&gt;
cybersecurity professional will continue to evolve along with computer&lt;br /&gt;
and network technology. The desire to learn, ability to problem solve,&lt;br /&gt;
and attention to detail will serve you well in this field. Other, more&lt;br /&gt;
technical skills and technologies to learn include:&amp;lt;ref name=&amp;quot;certification&amp;quot;&amp;gt;Popular Cyber Security Certificates [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications  [Accessed 25 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====SIEM tools (security information and event management)====&lt;br /&gt;
Security Information and Event Management (SIEM) is a set of tools&lt;br /&gt;
and services offering a holistic view of an organization’s information&lt;br /&gt;
security. SIEM works by combining two technologies:&lt;br /&gt;
&amp;lt;li&amp;gt;Security information management (SIM), which collects data from log&lt;br /&gt;
files for analysis and reports on security threats and events, and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;security event management (SEM), which conducts real-time system&lt;br /&gt;
monitoring, notifies network admins about important issues and&lt;br /&gt;
establishes correlations between security events. There are a number of&lt;br /&gt;
security information and event management solutions on the market.&lt;br /&gt;
ArcSight ESM, IBM QRadar and Splunk are among the most popular. &amp;lt;ref name=&amp;quot;SIEM&amp;quot;&amp;gt;Application security, SIEM [Online]. Available: https://www.imperva.com/learn/application-security/siem/. [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Firewalls, Intrusion Detection Systems (IDS), and Intrusion Prevention Systems(IPS)====&lt;br /&gt;
Firewalls can be two types, hardware and software firewalls. Software&lt;br /&gt;
firewall is a firewall that is installed on a computer or server, and&lt;br /&gt;
tasked with network security. It works with a wide variety of other&lt;br /&gt;
technology security solutions to provide more robust and cohesive&lt;br /&gt;
security for enterprises of all sizes. When a software firewall is&lt;br /&gt;
installed on a server, it opens up like an umbrella of protection over&lt;br /&gt;
all other computers connected to the network. It is able to monitor both&lt;br /&gt;
incoming and outgoing traffic for potential risk or suspicious user&lt;br /&gt;
behavior, and also makes setting security policies much easier, faster&lt;br /&gt;
and more flexible. Hardware firewall is positioned between the network&lt;br /&gt;
and devices, allowing traffic to funnel through the firewall for a close&lt;br /&gt;
inspection and analysis. A hardware firewall, a term often&lt;br /&gt;
interchangeable with network or next-generation firewall, protects the&lt;br /&gt;
network gateways for an enterprise. Hardware firewall is physical&lt;br /&gt;
hardware, installed between network elements and connected devices, and&lt;br /&gt;
is tasked with filtering traffic for cyber threat to the network or&lt;br /&gt;
devices. Filtering out unauthorized or suspicious users based on traffic&lt;br /&gt;
analysis is one of the biggest benefits of hardware firewall. &amp;lt;ref name=&amp;quot;sangfor&amp;quot;&amp;gt;Sangfor, &amp;quot;What is Software Firewall? Difference between Hardware Firewall and Software Firewall, [Online]. Available: https://www.sangfor.com/blog/cybersecurity/what-is-software-firewall-difference-between-hardware-firewall-and-software-firewall [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems&lt;br /&gt;
(IPS) are both parts of the network infrastructure. IDS/IPS compare&lt;br /&gt;
network packets to a cyberthreat database containing known signatures of&lt;br /&gt;
cyberattacks — and flag any matching packets. IDS doesn’t alter the&lt;br /&gt;
network packets in any way, whereas IPS prevents the packet from&lt;br /&gt;
delivery based on the contents of the packet, much like how a firewall&lt;br /&gt;
prevents traffic by IP address. &amp;lt;ref name=&amp;quot;Varonis&amp;quot;&amp;gt;Varonis, &amp;quot;What is Software Firewall? IDS vs. IPS: What is the Difference?, [Online]. Available: https://www.varonis.com/blog/ids-vs-ips [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Digital forensics====&lt;br /&gt;
Digital forensics is a branch of forensic science that focuses on&lt;br /&gt;
identifying, acquiring, processing, analyzing, and reporting on data&lt;br /&gt;
stored electronically. Electronic evidence is a component of almost all&lt;br /&gt;
criminal activities and digital forensics support is crucial for law&lt;br /&gt;
enforcement investigations. Electronic evidence can be collected from a&lt;br /&gt;
wide array of sources, such as computers, smartphones, remote storage,&lt;br /&gt;
unmanned aerial systems, shipborne equipment, and more.&amp;lt;ref name=&amp;quot;interpol&amp;quot;&amp;gt;Interpol, &amp;quot;Digital forensics&amp;quot;. Available: https://www.interpol.int/How-we-work/Innovation/Digital-forensics. [Accessed 28 4 2022].&amp;lt;/ref&amp;gt; &lt;br /&gt;
Investigative process of digital forensics can be divided into several stages. There are four major stages: preservation, collection,&lt;br /&gt;
examination, and analysis. All these four stages need a deep understanding of computers, technology across a broad spectrum, and cybersecurity principles and&lt;br /&gt;
practices, a working knowledge of computers, networks, and coding, in-depth investigative abilities, critical-thinking skills and analytical talent the ability to effectively communicate and work with a&lt;br /&gt;
wide range of people. &amp;lt;ref name=&amp;quot;ecpi&amp;quot;&amp;gt;&amp;quot;Digital forensics&amp;quot;. Available: https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me. [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Mobile device management====&lt;br /&gt;
Mobile device management (MDM) is software that allows IT&lt;br /&gt;
administrators to control, secure and enforce policies on smartphones,&lt;br /&gt;
tablets and other endpoints. Mobile device management software emerged&lt;br /&gt;
in the early 2000s as a way to control and secure the personal digital&lt;br /&gt;
assistants and smartphones that business workers began to use. The&lt;br /&gt;
consumer smartphone boom that started with the launch of the Apple&lt;br /&gt;
iPhone in 2007 led to the bring your own device (BYOD) trend, which&lt;br /&gt;
fueled further interest in MDM.&amp;lt;ref name=&amp;quot;techtarget&amp;quot;&amp;gt;Techtarget, &amp;quot;Mobile Device Management&amp;quot;. Available: https://www.techtarget.com/searchmobilecomputing/definition/mobile-device-management [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Data management====&lt;br /&gt;
Sometimes the data management is neglected, but this part has a&lt;br /&gt;
crucial role when learning for good cyber security practices. Majority&lt;br /&gt;
of cyber security programs include a special courses on data management.&lt;br /&gt;
Data management is a method of organizing and maintaining data processes&lt;br /&gt;
that are required in almost every business operations. The benefits of&lt;br /&gt;
data management can be found accounting, statistics, logistics planning&lt;br /&gt;
and other disciplines including corporate computing.&amp;lt;ref name=&amp;quot;GlobalUni&amp;quot;&amp;gt;Global Universities, &amp;quot;MSc Data Management and Cyber Security&amp;quot;. Available: https://globaluniversities.in/msc-data-management-cyber-security. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Data governance (and management) play a fundamental role in&lt;br /&gt;
protecting an organization’s data. Ensuring that the right people have&lt;br /&gt;
the right access and that appropriate security controls are in place to&lt;br /&gt;
protect each system or service, based on the criticality or sensitivity&lt;br /&gt;
of the data sets these contain. &amp;lt;ref name=&amp;quot;CyberMagazine&amp;quot;&amp;gt;Cyber Security Magazine, &amp;quot;The Role of Data Governance in Cybersecurity&amp;quot;. Available: https://cybersecurity-magazine.com/the-role-of-data-governance-in-cybersecurity/?utm_source=rss&amp;amp;amp;utm_medium=rss&amp;amp;amp;utm_campaign=the-role-of-data-governance-in-cybersecurity. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Application security development====&lt;br /&gt;
Application security describes security measures at the application&lt;br /&gt;
level that aim to prevent data or code within the app from being stolen&lt;br /&gt;
or hijacked. It encompasses the security considerations that happen&lt;br /&gt;
during application development and design, but it also involves systems&lt;br /&gt;
and approaches to protect apps after they get deployed. Application&lt;br /&gt;
security may include hardware, software, and procedures that identify or&lt;br /&gt;
minimize security vulnerabilities.&amp;lt;ref name=&amp;quot;vmware&amp;quot;&amp;gt;VmWare, &amp;quot;What is application security?&amp;quot;. Available: https://www.vmware.com/topics/glossary/content/application-security.html [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Application security development is important to ensure that your&lt;br /&gt;
application is free from coding errors and bugs. And controls the risk&lt;br /&gt;
and helps safeguard against security vulnerabilities. Application&lt;br /&gt;
security development is the process of making applications more secure&lt;br /&gt;
by finding and fixing security vulnerabilities. This is often done by&lt;br /&gt;
enforcing software security best practices and using application&lt;br /&gt;
security testing tools. &lt;br /&gt;
&amp;lt;ref name=&amp;quot;perforce&amp;quot;&amp;gt;Perforce, &amp;quot;Application Security Development Best Practices&amp;quot;. Available: https://www.perforce.com/blog/kw/application-security-development-best-practices. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Audit and compliance knowledge====&lt;br /&gt;
A cyber security audit is designed to be a comprehensive review and&lt;br /&gt;
analysis of your business’s IT infrastructure. It identifies threats and&lt;br /&gt;
vulnerabilities, exposing weaknesses and high-risk practices.&lt;br /&gt;
Regulations such as the EU GDPR (General Data Protection Regulation) can&lt;br /&gt;
impose hefty penalties in the event of a breach that results in&lt;br /&gt;
exploited data. A cyber security audit will help mitigate the&lt;br /&gt;
consequences of a breach and demonstrate that your organization has&lt;br /&gt;
taken the necessary steps to protect client and company data. &amp;lt;ref name=&amp;quot;cyforsecure&amp;quot;&amp;gt;Cyfor Secure, &amp;quot;What is a Cyber Security Audit and how can it help your organisation?&amp;quot;. Available: https://cyforsecure.co.uk/services/cyber-assessment/cyber-security-audit/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cybersecurity compliance is the organizational risk management method&lt;br /&gt;
aligned with pre-defined security measures &amp;amp;amp; controls on how data&lt;br /&gt;
confidentiality is ensured by its administrative procedures.&amp;lt;ref name=&amp;quot;nordlayer&amp;quot;&amp;gt;NordLayer, &amp;quot;Cybersecurity compliance: Everything you need to know&amp;quot;. Available: https://nordlayer.com/blog/cybersecurity-compliance-everything-you-need-to-know/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
All needed skills are developed through courses and certification.&lt;br /&gt;
&lt;br /&gt;
===Entry-Level Incident Response Positions===&lt;br /&gt;
It is not always possible to advance to the position of incident&lt;br /&gt;
responder in a straight line. Many professionals advance from entry- to&lt;br /&gt;
mid-level positions before becoming a real incident responder or a&lt;br /&gt;
member of a computer emergency response team (CERT).&amp;lt;br /&amp;gt;&lt;br /&gt;
These are some examples: &amp;lt;ref name=&amp;quot;Infosec&amp;quot;&amp;gt;Infosec, &amp;quot;Incident Responder Career Roadmap: From Entry Level to Executive&amp;quot;. Available: https://resources.infosecinstitute.com/topic/incident-responder-career-roadmap-entry-level-executive/ [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;network-administrator&amp;quot;&amp;gt;Network administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;This position’s experience will help potential incident responders&lt;br /&gt;
develop networking skills. Attention to detail, as well as the ability&lt;br /&gt;
to sift through system configurations, site layouts, and general network&lt;br /&gt;
and communication setups, are essential in this field.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;system-administrator&amp;quot;&amp;gt;System administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Another crucial beginning point for an incident responder is to learn&lt;br /&gt;
how to manage resources inside your organization as well as user&lt;br /&gt;
behavior. Understanding the potential damage that users, inadequate&lt;br /&gt;
security setups, and ineffective IT policies and procedures can cause on&lt;br /&gt;
your network can provide prospective candidates with insight into the&lt;br /&gt;
human component of an incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;security-administrator&amp;quot;&amp;gt;Security administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In such a position, basic hacking skills, penetration testing, and&lt;br /&gt;
intrusion detection are all learned, which are crucial incident&lt;br /&gt;
responder skills when trying to replicate a breach or attack.&lt;br /&gt;
Understanding the paths a cybercriminal will take when attempting to&lt;br /&gt;
damage or obtain access to a system can greatly simplify the work of&lt;br /&gt;
reverse engineering the incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Mid-Level Incident Response Positions ===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5&lt;br /&gt;
id=&amp;quot;computer-security-incident-response-team-csirt-engineer&amp;quot;&amp;gt;Computer&lt;br /&gt;
security incident response team (CSIRT) engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;cyber-incident-responder&amp;quot;&amp;gt;Cyber incident responder&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-response-engineer&amp;quot;&amp;gt;Incident response&lt;br /&gt;
engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;While each of these positions is different, they generally require&lt;br /&gt;
very similar skills and characteristics in a candidate. At this level,&lt;br /&gt;
personal characteristics such as problem solving, time management, and&lt;br /&gt;
even presentation skills become more crucial as one’s career evolves&lt;br /&gt;
into a management-facing role.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Technical skills include the ability to identify and minimize threats&lt;br /&gt;
while maintaining communication with management and the rest of your&lt;br /&gt;
team. Data analysis and evidence gathering become increasingly crucial,&lt;br /&gt;
and the circumstances in which your services are deployed get more&lt;br /&gt;
serious.&amp;lt;/p&amp;gt;&lt;br /&gt;
Problem-solving skills are crucial at this level of incident&lt;br /&gt;
response, and as the stakes rise, so does the pressure in each&lt;br /&gt;
situation. At this level, programming abilities are essential since&lt;br /&gt;
incident responders may be needed to reverse engineer malicious code or&lt;br /&gt;
even create patches for vulnerable network applications or services. &amp;lt;ref name=&amp;quot;coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated]&amp;quot;. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Senior-Level Incident Response Positions===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;intrusion-detection-specialist&amp;quot;&amp;gt;Intrusion detection&lt;br /&gt;
specialist:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;A CISSP certification might help a potential candidate in preparing&lt;br /&gt;
for the profession. The role of an intrusion detection specialist is to&lt;br /&gt;
find and stop any unwanted communications.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-manager&amp;quot;&amp;gt;Incident manager:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Expected to plan, oversee, manage, and supervise all incident&lt;br /&gt;
response team actions. Is in charge of reporting all current events to&lt;br /&gt;
senior management and stakeholders, as well as acting as the technical&lt;br /&gt;
lead on active incidents for incident responders. Prepares threat and&lt;br /&gt;
impact assessments and reports them known to management.&amp;lt;ref name=&amp;quot;coursera&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Certificates== &lt;br /&gt;
There is a vast number of different certificates and the road map to&lt;br /&gt;
being a certified professional could be very different&amp;lt;ref name=&amp;quot;Coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated],&amp;quot; [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;NICCS&amp;quot;&amp;gt;NICCS, &amp;quot;Cybersecurity Certifications,&amp;quot; [Online]. Available: hhttps://niccs.cisa.gov/about-niccs/cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt; . One possible&lt;br /&gt;
approach is to start with basic certificates from the different branches&lt;br /&gt;
of service and move to more specific and demanding focused&lt;br /&gt;
certification. Also, some jobs require certain clearances, either from&lt;br /&gt;
industry, or from the government. One small selection of different&lt;br /&gt;
possible certificates is brought out in following paragraphs.&lt;br /&gt;
&lt;br /&gt;
Security+ is a CompTIA certification that is considered a basic cert&lt;br /&gt;
among cybersecurity professionals. It covers the topics of risk&lt;br /&gt;
management and threat assessment.&lt;br /&gt;
Network+ is also offered by CompTIA this certification (like the name&lt;br /&gt;
implies) focuses on networking infrastructure and operations. It is&lt;br /&gt;
considered a foundational certification.&lt;br /&gt;
The Certified Information Systems Security Professional (CISSP) is a&lt;br /&gt;
more advanced certification designed for cybersecurity professionals&lt;br /&gt;
with at least five years of work experience. The certification covers&lt;br /&gt;
topics such as architecture, engineering, and management.&amp;lt;/p&amp;gt;&lt;br /&gt;
The Certified Ethical Hacker (CEH) certification is also considered a&lt;br /&gt;
more advanced cert because it generally requires that applicants have&lt;br /&gt;
multiple years of work experience. The goal of an ethical hacker&lt;br /&gt;
certification is to be able to understand how cyber attacks unfold in&lt;br /&gt;
order to improve threat assessment and mitigation skills.&amp;lt;ref name=&amp;quot;cyberguide&amp;quot;&amp;gt;Cybersecurity Guide, &amp;quot;How to become a cybersecurity specialist&amp;quot;, [Online]. Available: https://cybersecurityguide.org/careers/security-specialist/. [Accessed 27 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
This is definitely not all, when one looks for more information, following link could be searched, to get more in depth knowledge about&lt;br /&gt;
different possibilities. &lt;br /&gt;
Hereby, with the help of this matrix a possible taxonomy of different 436 listed certificates in branches are&lt;br /&gt;
presented.&amp;lt;ref name=&amp;quot;Pauljeremy&amp;quot;&amp;gt;&amp;quot;Cybersecurity Roadmap,&amp;quot; [Online]. Available: https://pauljerimy.com/2020/10/12/scr-oct-2020-update/. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:analystimage5.png|1000px|thumb|Certificate matrix &amp;lt;ref&amp;gt;&amp;quot;Certification roadmap&amp;quot;. Available at https://pauljerimy.com/security-certification-roadmap&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
=== Communication and Network Security===&lt;br /&gt;
Communication and network security covers the ability to secure&lt;br /&gt;
communication channels and networks. Topics include secure and converges&lt;br /&gt;
protocols, wireless networks, cellular networks, hardware operations&lt;br /&gt;
(warranty and redundant power), and third-party connectivity. IP&lt;br /&gt;
networking are also included in this domain.&lt;br /&gt;
===Identity and Access Management===&lt;br /&gt;
The identity and access management domain covers the attacks that&lt;br /&gt;
target the human gateway to gain access to data. Other topics include&lt;br /&gt;
ways to identify users with rights to access the information and&lt;br /&gt;
servers. Identity and access management covers the topics of&lt;br /&gt;
applications, Single sign-on authentication, privilege escalation,&lt;br /&gt;
Kerberos, rule-based or risk-based access control, proofing and&lt;br /&gt;
establishment of identity.&lt;br /&gt;
===Security Architecture and Engineering===&lt;br /&gt;
The security architecture and engineering domain covers important&lt;br /&gt;
topics concerning security engineering plans, designs and principles,&lt;br /&gt;
Topics include assessing and mitigating information system&lt;br /&gt;
vulnerabilities, fundamental concepts of security models and security&lt;br /&gt;
architectures in critical areas like access control. Cloud systems,&lt;br /&gt;
cryptography, system infiltrations (ransomware, fault-injection and&lt;br /&gt;
more) and virtualized systems are also covered in this domain.&lt;br /&gt;
===Asset Security===&lt;br /&gt;
The Asset Security domain deals with the issues related to the&lt;br /&gt;
collection, storage, maintenance, retention and destruction of data. It&lt;br /&gt;
also covers knowledge of different roles regarding data handling (owner,&lt;br /&gt;
controller and custodian) as well as data protection methods and data&lt;br /&gt;
states. Other topics include resource provision, asset classification&lt;br /&gt;
and data lifecycle management.&lt;br /&gt;
===Security and Risk Management===&lt;br /&gt;
The security and risk management domain covers general on skills&lt;br /&gt;
related to the implementation of user awareness programs as well as&lt;br /&gt;
security procedures. Emphasis is also placed on risk management&lt;br /&gt;
concerning the acquisition of new services, hardware and software&lt;br /&gt;
(supply chain). Other skills include social engineering defense&lt;br /&gt;
mechanisms.&lt;br /&gt;
===Security Assessment and Testing===&lt;br /&gt;
The security assessment and testing domain deals with all the&lt;br /&gt;
techniques and tools used to find system vulnerabilities, weaknesses and&lt;br /&gt;
potential areas of concern not addressed by security procedures and&lt;br /&gt;
policies. Attack simulations, vulnerability assessment, compliance&lt;br /&gt;
checks, and ethical disclosure also fall under this domain.&lt;br /&gt;
===Software Security===&lt;br /&gt;
The software development security domain deals with implementing&lt;br /&gt;
software-based security protocols within environment for which the IT&lt;br /&gt;
professional is responsible. Risk analysis, vulnerability identification&lt;br /&gt;
and auditing of source codes are all covered in this subset. Additional&lt;br /&gt;
topics include software-designed security, maturity models, development&lt;br /&gt;
methodologies, open-source and third-party development security.&lt;br /&gt;
===Security operations===&lt;br /&gt;
The security operations domain covers topics ranging from&lt;br /&gt;
investigations and digital forensic to detection and intrusion&lt;br /&gt;
prevention tools, sandboxing and firewalls. Topics include user and&lt;br /&gt;
entity behavior analytics, threat intelligence (threat hunting and&lt;br /&gt;
threat feeds) log management, artifacts (mobile, computer and network),&lt;br /&gt;
machine learning and AI-based tools, penetration testing, and&lt;br /&gt;
exploitation development. These for sub-domains are lister here.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Incident Handling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Penetration Testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Exploitation&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Education==&lt;br /&gt;
[[File:Analystimage7.png|400px|thumb|Comparison degree vs Certificate &amp;lt;ref&amp;gt;&amp;quot;Comparison Table&amp;quot;. Available at https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
The entry level monitoring specialist is hired by Estonian&lt;br /&gt;
Information System Authority even if there is no formal IT education,&lt;br /&gt;
but readiness to learn and moderate knowledge of different operation&lt;br /&gt;
systems is enough to start the career. &amp;lt;ref name=&amp;quot;cv&amp;quot;&amp;gt;cv.ee, &amp;quot;SEIRESPETSIALIST - tule Eesti küberruumi valvuriks!&amp;quot;. Available: https://www.cv.ee/en/vacancy/792782/riigi-infosusteemi-amet/seirespetsialist-tule-eesti-kuberruumi-valvuriks [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Nevertheless, like most other high qualification careers jobs falling&lt;br /&gt;
under the cybersecurity specialist category require some form of formal&lt;br /&gt;
education. However, since cybersecurity specialist jobs can fall across&lt;br /&gt;
a wide spectrum of job descriptions and responsibilities, it is possible&lt;br /&gt;
to obtain a specialist job after completing many levels of different&lt;br /&gt;
computer related education.&lt;br /&gt;
&lt;br /&gt;
If one is looking for a cybersecurity related education, for example&lt;br /&gt;
in EU, 137 courses/programs could be found that relate to keyword IT or&lt;br /&gt;
cybersecurity. &amp;lt;ref name=&amp;quot;enisa&amp;quot;&amp;gt;ENISA (European Union Agency for Cybersecurity), &amp;quot;Cybersecurity Education-Cybersecurity Higher Education Database&amp;quot;. Available: https://www.enisa.europa.eu/topics/cybersecurity-education/education-map/education-courses [Accessed 26 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Also, there is a great amount of discussion, if cyber security&lt;br /&gt;
professional should have a degree or would be certification just enough.&lt;br /&gt;
One interesting table is produces by Franklin University that compares&lt;br /&gt;
benefits and/or drawbacks of each type of credential.&amp;lt;ref name=&amp;quot;franklin&amp;quot;&amp;gt;Franklin University, &amp;quot;Is Getting a Master&#039;s Degree in Cyber Security Worth It?&amp;quot;. Available: https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Certifications are generally good for people with little practical&lt;br /&gt;
experience because they are known quantities in the industry and can&lt;br /&gt;
help you get your foot in the door. They set a minimum knowledge bar.&lt;br /&gt;
But some certifications are viewed more favorably than others.&lt;br /&gt;
Certifications with renewal requirements are viewed better by hiring&lt;br /&gt;
managers, but they also more costly in the long run because of the need&lt;br /&gt;
for continuing education. Certifications are also good for showing&lt;br /&gt;
in-depth expertise in a specialization within cybersecurity. Depending&lt;br /&gt;
on your career goals, it may be advantageous to have a master’s&lt;br /&gt;
degree—which shows your breadth of knowledge, critical thinking and&lt;br /&gt;
leadership skills—and a certificate—which shows specific skill&lt;br /&gt;
competency.&amp;lt;ref name=&amp;quot;franklin&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
As IT (Cyber) Security is still a relatively young discipline,&lt;br /&gt;
universities and colleges are still figuring out which is the best&lt;br /&gt;
approach for their degrees. Study programmes and curricula in Cyber&lt;br /&gt;
Security are different. In general, here are the duration of Cyber&lt;br /&gt;
Security degrees:&lt;br /&gt;
&amp;lt;ref name=&amp;quot;studyportal&amp;quot;&amp;gt;Studyportals, &amp;quot;Why You Should Study a Cyber Security Degree in 2022&amp;quot;. Available: https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Bachelor’s degrees in Cyber Security take 3 or 4 years in most&lt;br /&gt;
countries.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Master’s courses in Cyber Security take between 1-2 years to&lt;br /&gt;
complete.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;PhD programmes in Cyber Security last 3-5 years. Some only take 1&lt;br /&gt;
or 2 years, but they are less common.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Generalization could me made that on bachelor level the general&lt;br /&gt;
knowledge about the cyber issues are obtained. On master level the&lt;br /&gt;
specialization courses are taken and the person can choose more specific&lt;br /&gt;
topics to study. It is on master level where strengths of the cyber&lt;br /&gt;
specialist can be developed further and up-do date knowledge obtained in&lt;br /&gt;
specifics. PhD is serious science and involves teaching, lot of&lt;br /&gt;
scientific work and writing for publications.&lt;br /&gt;
&lt;br /&gt;
==Salary==&lt;br /&gt;
&amp;lt;p&amp;gt;Even if the salary can be very different, compared to the skills and&lt;br /&gt;
experience, an generalization can be made. Cyber Security professionals&lt;br /&gt;
in CSIRT, and in other entities earn quite well, from the start. First,&lt;br /&gt;
some comparison from the United States. The average CSIRT analyst salary&lt;br /&gt;
in the USA is $97,500 per year or $50 per hour. Entry level positions&lt;br /&gt;
start at $48,875 per year while most experienced workers make up to&lt;br /&gt;
$135,373 per year.&amp;lt;ref name=&amp;quot;talent&amp;quot;&amp;gt;talent.com, &amp;quot;Csirt Analyst average salary in USA 2022&amp;quot;. Available: https://www.talent.com/salary?job=csirt+analyst [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There are multiple positions you can occupy in this field. They have&lt;br /&gt;
in common great salaries and high demand for technical skills, attention&lt;br /&gt;
to details, problem-solving mentality, and the ability to analyze risks.&lt;br /&gt;
Here are the average annual salaries in the United States, according to&lt;br /&gt;
Payscale: &amp;lt;ref name=&amp;quot;studyportal&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Cryptographer – 100,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Information Security Officer – 91,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Assessor – 90,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Engineer – 88,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Penetration Tester – 81,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Forensics Expert – 71,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Administrator – 65,000 USD&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
When looking into salaries in Estonia, one can find that there is a&lt;br /&gt;
discussion that private sector is taking a toll from the public sector,&lt;br /&gt;
and that the salaries in important agencies, as Information System&lt;br /&gt;
Authority loose their employees to the better paid positions in private&lt;br /&gt;
sector.&amp;lt;ref name=&amp;quot;digigeenius&amp;quot;&amp;gt;DiGi Geenius, &amp;quot;Kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad&amp;quot;. Available: https://digi.geenius.ee/rubriik/uudis/kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad/ [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;tehnika&amp;quot;&amp;gt;Postimees, &amp;quot;Riigi-it-tootajate-palgamaarad-kasvasid&amp;quot;. Available: https://tehnika.postimees.ee/6887428/riigi-it-tootajate-palgamaarad-kasvasid [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
But there is also a different view that average private sector worker&lt;br /&gt;
could be hired as a top specialist in public sector and then the payment&lt;br /&gt;
is higher. Nevertheless, it seems that the average payment in cyber&lt;br /&gt;
security sector is any way higher that in other parts of the&lt;br /&gt;
e-services. &amp;lt;ref name=&amp;quot;digigeenius2&amp;quot;&amp;gt;DiGi Geenius, &amp;quot;5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka&amp;quot;. Available: https://digi.geenius.ee/rubriik/uudis/5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==SOC==&lt;br /&gt;
&amp;lt;p&amp;gt;A SOC is a facility where an organization’s network, applications,&lt;br /&gt;
and endpoints are monitored and defended. The term was adapted from&lt;br /&gt;
network operations centers (NOCs), where large telecommunication or&lt;br /&gt;
corporate networks are monitored. When network security became more of a&lt;br /&gt;
concern, security teams were formed within the NOCs, and eventually spun&lt;br /&gt;
off into larger organizations of their own as the responsibilities of&lt;br /&gt;
security teams grew increasingly complex and specialized. The security&lt;br /&gt;
staff working in a security operations center are often called the SOC&lt;br /&gt;
team.&amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;Exabeam, &amp;quot;CSIRT&amp;quot;. Available: https://www.exabeam.com/incident-response/csirt/ [Accessed 28 APr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;Functions of the SOC team include, but are not limited to:&amp;lt;ref name=&amp;quot;trellix&amp;quot;&amp;gt;Trellix, &amp;quot;What Is a Security Operations Center (SOC)?&amp;quot;. Available: https://www.trellix.com/en-us/security-awareness/operations/what-is-soc.html [Accessed 30 APr 2022].&amp;lt;/ref&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ol type=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Taking inventory of resources, to get a better understanding of the&lt;br /&gt;
structure they are protecting.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintanence of the system, by constantly making updates and adding&lt;br /&gt;
safeguards.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Monitoring the network for abnormalities with special tools.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Threat analysis of new attacks and vulnerabilities.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Responding to attacks, by acting as “first responders”. The SOC team&lt;br /&gt;
will shut down and/or isolate endpoints, deleting files and lowering the&lt;br /&gt;
impact as fast as possible.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Recovery of system stability and lost data. This may be done using&lt;br /&gt;
backups, restarting endpoints or reconfiguring systems.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Logging all actions on the system, to be later used for analysis or&lt;br /&gt;
forensics after an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigating the root cause of an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Auditing their own actions, to be in line with regulations of the&lt;br /&gt;
organization, industry or governing body.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==CSIRT==&lt;br /&gt;
&amp;lt;p&amp;gt;A CSIRT is a group that responds to security incidents when they&lt;br /&gt;
occur. Key responsibilities of a CSIRT include:&lt;br /&gt;
&amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
===Creating and maintaining an incident response plan (IRP)===&lt;br /&gt;
An incident response plan (IRP) is a set of written instructions for&lt;br /&gt;
detecting, responding to and limiting the effects of an information&lt;br /&gt;
security event. Incident response plans provide instructions for&lt;br /&gt;
responding to many potential scenarios, including data breaches, denial&lt;br /&gt;
of service/distributed denial of service attacks, firewall breaches,&lt;br /&gt;
virus or malware outbreaks or insider threats. Without an incident&lt;br /&gt;
response plan in place, organizations may either not detect the attack&lt;br /&gt;
in the first place, or not follow proper protocol to contain the threat&lt;br /&gt;
and recover from it when a breach is detected.&lt;br /&gt;
&lt;br /&gt;
https://www.stratacore.com/incidentresponseplan&lt;br /&gt;
===Investigating and analyzing incidents===&lt;br /&gt;
CSIRTs are also involved in improvement activities. After major&lt;br /&gt;
computer security incidents occur, or when incidents are not handled in&lt;br /&gt;
a timely or effective manner, a CSIRT will generally perform a&lt;br /&gt;
postmortem of the incident and its response. This postmortem will&lt;br /&gt;
identify the strengths and weakness of the response effort. Such reviews&lt;br /&gt;
can identify weaknesses and holes in systems, infrastructure defenses,&lt;br /&gt;
or policies that allowed the incident to take place. It can also&lt;br /&gt;
identify problems with communication channels, interfaces, and&lt;br /&gt;
procedures that inhibited the efficient resolution of the reported&lt;br /&gt;
problem.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.cisa.gov/uscert/bsi/articles/best-practices/incident-management/defining-computer-security-incident-response-teams&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Managing internal communications and updates during or immediately after incidents occur===&lt;br /&gt;
===Communicating with employees, shareholders, customers, and the press about incidents as needed===&lt;br /&gt;
&amp;lt;p&amp;gt;There are various services within the CSIRT Services Framework that&lt;br /&gt;
address communications, as they relate to security operations and&lt;br /&gt;
incident response services. Some of these include Information Security&lt;br /&gt;
Incident Coordination, Crisis Management Support, Vulnerability&lt;br /&gt;
Disclosure, Situational Awareness Communication, and Awareness Building,&lt;br /&gt;
to name a few. Sharing information and communicating with the general&lt;br /&gt;
public and/or your constituency is appropriate in many different&lt;br /&gt;
scenarios. These can range from proactive communications to reactive&lt;br /&gt;
communications. Each scenario may be unique, and careful consideration&lt;br /&gt;
should be given to when to release information to the public and what&lt;br /&gt;
information should be released.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;https://resources.sei.cmu.edu/asset_files/Handbook/2021_002_001_651819.pdf&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Remediating incidents===&lt;br /&gt;
Threat remediation is a strong and capable tool for fighting the&lt;br /&gt;
cyber security compromises. As the word ‘remedy’ suggests, remediation&lt;br /&gt;
process involves the treatment of a security breach. With the&lt;br /&gt;
remediation practices, your cyber security team is able to eliminate&lt;br /&gt;
suspicious activities and malicious attacks in the form of malware,&lt;br /&gt;
ransomware, phishing and such. Even if you ‘kill’ the suspicious&lt;br /&gt;
activity, the attackers can remain in your systems. If you want to&lt;br /&gt;
contaminate and end the problem for good, your remediation processes&lt;br /&gt;
must involve the detection of the cause. &amp;lt;ref name=&amp;quot;logsign&amp;quot;&amp;gt;Logsign, &amp;quot;What-is-remediation-in-cyber-security&amp;quot;. Available: https://www.logsign.com/blog/what-is-remediation-in-cyber-security/. [Accessed 28 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Recommending technology, policy, governance, and training changes after security incidents===&lt;br /&gt;
After all these actions, the SCIRT must contribute to the development&lt;br /&gt;
of better policies, practices and has to recommend improvements. They&lt;br /&gt;
are not working in the vacuum and their work has to create new and&lt;br /&gt;
better standards for cyber security. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;Exabeam, &amp;quot;CSIRT&amp;quot;. Available: https://www.exabeam.com/incident-response/csirt/ [Accessed 28 APr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==CERT==&lt;br /&gt;
&amp;lt;p&amp;gt;The term “computer emergency response team” was coined in 1988. In&lt;br /&gt;
response to the Morris worm attack that impacted thousands of servers on&lt;br /&gt;
the Internet, DARPA funded the formation of the Computer Emergency&lt;br /&gt;
Response Team Coordination Center (CERT-CC) at Carnegie Mellon&lt;br /&gt;
University. The goal of CERT-CC was to help protect the internet by&lt;br /&gt;
collecting and disseminating information on critical security&lt;br /&gt;
vulnerabilities. Several other countries formed similar centers using&lt;br /&gt;
the same acronym (despite threats of legal action by Carnegie Mellon for&lt;br /&gt;
trademark infringement). Now the term CERT refers to any emergency&lt;br /&gt;
response team that deals with cyber threats. Many people use CERT-CC&lt;br /&gt;
interchangeably with CSIRT, though the charter of a CERT is information&lt;br /&gt;
sharing in order to help other response teams respond to threats against&lt;br /&gt;
their own infrastructure.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In general, the designation of CERT is helpful in applying real-world&lt;br /&gt;
solutions to various cybersecurity problems. They may be government&lt;br /&gt;
contractors or employees of a major corporation. For example, the U.S.&lt;br /&gt;
Computer Emergency Readiness Team (US-CERT) operates under the U.S.&lt;br /&gt;
Department of Homeland Security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.techopedia.com/definition/31003/computer-emergency-response-team-cert&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In Estonia CERT is designated as CERT-EE. It was established in 2006,&lt;br /&gt;
as an organization responsible for the management of security incidents&lt;br /&gt;
in .ee computer networks. It is also a national contact point for&lt;br /&gt;
international co-operation in the field of IT security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ria.ee/en/cyber-security/cert-ee.html&amp;lt;/p&amp;gt;&lt;br /&gt;
===Difference between SOC/CSIRT/CERT===&lt;br /&gt;
&amp;lt;p&amp;gt;How CSIRTs differ from CERTs and SOCs There are overlapping&lt;br /&gt;
responsibilities between a community emergency response team (CERT),&lt;br /&gt;
computer security incident response team (CSIRT), and security&lt;br /&gt;
operations center (SOC). To add to this confusion, frequently, the terms&lt;br /&gt;
CERT and CSIRT are used interchangeably, despite the important&lt;br /&gt;
differences.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image3.png&amp;quot; alt=&amp;quot;Overlapping in images/image3.png&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;Overlapping in&lt;br /&gt;
images/image3.png&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
==Understand the primary roles and characteristics of a CERT, CSIRT, and SOC.==&lt;br /&gt;
&amp;lt;p&amp;gt;So, using strict definitions, a CERT collects and disseminates&lt;br /&gt;
security information, typically for the benefit of a country or an&lt;br /&gt;
industry. A CSIRT is a cross-functional team that responds to incidents&lt;br /&gt;
on behalf of a country or an organization. A SOC is where a country or&lt;br /&gt;
organization monitors and defends its network, servers, applications,&lt;br /&gt;
and endpoints.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image4.png&amp;quot; alt=&amp;quot;table of explanation images/image4&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;table of explanation&lt;br /&gt;
images/image4&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
==Future==&lt;br /&gt;
&amp;lt;p&amp;gt;And the Cyber security problem is only getting bigger. According to a&lt;br /&gt;
report published by Accenture, the number of cyber security breaches&lt;br /&gt;
increased by 11 percent from 2017 to 2018. The cost of such breaches is&lt;br /&gt;
astronomical–about $600 billion worldwide, according to the Economic&lt;br /&gt;
Impact of Cybercrime report.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Job projections for cybersecurity are staggering. The Bureau of Labor&lt;br /&gt;
Statistics in US predicts that careers in the cybersecurity field will&lt;br /&gt;
grow by 32% by 2028. That makes cybersecurity one of the top 10&lt;br /&gt;
fastest-growing jobs in the country. In the United States alone, jobs&lt;br /&gt;
for Information Security Analysts are expected to grow by 15% by&lt;br /&gt;
2024.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Most likely this trend is also similar in other countries.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When checking Estonian job portals, there is a constant need for&lt;br /&gt;
people for cyber security related positions. Also, linkedin search gives&lt;br /&gt;
approximately 30 vacancies immediately. There are banks, logistics&lt;br /&gt;
companies, e-shops, and software producers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://ee.linkedin.com/jobs/cyber-security-jobs?countryRedirected=1&amp;amp;amp;position=1&amp;amp;amp;pageNum=0&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Trends that affect companies create need for constant cyber security&lt;br /&gt;
services. Increasing number of home/remote offices require secure&lt;br /&gt;
corporate networks and security of remote devices. One example is from&lt;br /&gt;
this year, when sloppy remote desktop set-up paralyzed systems of 17&lt;br /&gt;
companies.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.aripaev.ee/uudised/2022/04/20/ria-lohakas-kaugtoolaua-seadistus-halvas-martsis-vahemalt-17-juhul-ettevotete-it-susteemid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Also, no service can exists without robust infrastructure - servers,&lt;br /&gt;
databases, applications. As all previously mentioned devices and&lt;br /&gt;
services are at constant scanning and surveillance. So, the breach&lt;br /&gt;
detection and immediate action demands 24/7 services. Even if lot of&lt;br /&gt;
things could be automated, there is a need for human specialists (at&lt;br /&gt;
least, at the moment). Third growing field is also a forensic&lt;br /&gt;
investigation, as every attack must be investigated in order to be ready&lt;br /&gt;
to repel next attacks. So data recovery and evidence collection is&lt;br /&gt;
another important field of work that need skilled and professional&lt;br /&gt;
workers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Even, if the specifics of the entity, be it CSIRT, CERT or SOC, are&lt;br /&gt;
different, the fundamentals of the work are the same. Professional&lt;br /&gt;
knowledge of the networks, operational systems, hardware, scripting, and&lt;br /&gt;
several other wider IT related knowledge is needed. As there is no&lt;br /&gt;
single way to reach to it, every single person can find one’s strongest&lt;br /&gt;
sides and develop them with knowledge of weaker side, in order to know,&lt;br /&gt;
when to as for help.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/body&amp;gt;&lt;br /&gt;
&amp;lt;/html&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mavald</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142234</id>
		<title>Hiring a Cyber Security Incident Analyst</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142234"/>
		<updated>2022-05-01T15:49:56Z</updated>

		<summary type="html">&lt;p&gt;Mavald: /* CSIRT */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==A Cyber Security Incident Analyst==&lt;br /&gt;
&lt;br /&gt;
[[File:image1.png|600px|thumb|Job advertisement &amp;lt;ref&amp;gt;&amp;quot;Job Advertisement&amp;quot;. Available at https://www.projectpeople.com/jobs/&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
===Cyber security incident analyst in SOC/CSIRT/CERT===&lt;br /&gt;
This article delves into the job title of Cyber Security Incident&lt;br /&gt;
Analyst and provides an overview of the acronyms SOC/CSIRT/CERT. A brief&lt;br /&gt;
history of the job is discussed here, as well as a possible career path,&lt;br /&gt;
education, experience, and other characteristics required for work in&lt;br /&gt;
computer security-related organizations. The article also provides a&lt;br /&gt;
brief history of SOC/CSIRT/CERT, as well as a comparison of their&lt;br /&gt;
differences and similarities.&lt;br /&gt;
===Cyber Security Incident Analyst Skill Set===&lt;br /&gt;
What skill set is expected from the Cyber Security Incident Analyst? Below written lines are taken from the same job advertisement depicted&lt;br /&gt;
on the left side of this article:&lt;br /&gt;
As a Security Incident Analyst your responsibilities will include:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Continuous monitoring of security tooling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Performing regular and ad-hoc vulnerability assessments&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Carrying out ‘spot checks’&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Reporting vulnerabilities to the PVG via the alerts system&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintaining and documenting logging systems&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Developing centralized logging, reporting and intelligence&lt;br /&gt;
platforms&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;‘Light touch’ penetration testing with open source tooling&lt;br /&gt;
(Metasploit)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Knowledge &amp;amp;amp; Experience required:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;SOC, CSIRT or CERT operational environment experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Windows / Linux experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TCP /IP networking protocol knowledge&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience reviewing and analyzing Security Events from various&lt;br /&gt;
monitoring and logging sources&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience in website and web application security assessment or&lt;br /&gt;
penetration testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience of using Metasploit&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Scripting knowledge using BASH, Python, Perl, Ruby&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Skills in Host and Network Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
As one can see the description of the duties is wide and also the&lt;br /&gt;
knowledge and experience that is required is noteworthy. So, where to&lt;br /&gt;
start to find out the way to get this kind of knowledge and&lt;br /&gt;
expertize.&lt;br /&gt;
===Possible career path===&lt;br /&gt;
Next part of the paper is aiming to depict a possible ways, how to&lt;br /&gt;
develop oneself, and move along the career pathway in cybersecurity&lt;br /&gt;
field. Topics of development, education, experience and certification&lt;br /&gt;
are covered.&lt;br /&gt;
[[File:analystimage2.png|1000px|thumb|Career path &amp;lt;ref&amp;gt;&amp;quot;Possible Career Path&amp;quot;. Available at https://www.cyberseek.org/pathway.html&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
===Junior/Senior===&lt;br /&gt;
Start with an entry-level job in IT. Hands-on experience is often the&lt;br /&gt;
most effective way to prepare for certification exams. Start&lt;br /&gt;
accumulating work experience with an entry-level role as a cybersecurity&lt;br /&gt;
analyst. Many cybersecurity professionals start off in more general IT&lt;br /&gt;
roles. The skills, practices, and technologies you’ll use as a&lt;br /&gt;
cybersecurity professional will continue to evolve along with computer&lt;br /&gt;
and network technology. The desire to learn, ability to problem solve,&lt;br /&gt;
and attention to detail will serve you well in this field. Other, more&lt;br /&gt;
technical skills and technologies to learn include:&amp;lt;ref name=&amp;quot;certification&amp;quot;&amp;gt;Popular Cyber Security Certificates [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications  [Accessed 25 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====SIEM tools (security information and event management)====&lt;br /&gt;
Security Information and Event Management (SIEM) is a set of tools&lt;br /&gt;
and services offering a holistic view of an organization’s information&lt;br /&gt;
security. SIEM works by combining two technologies:&lt;br /&gt;
&amp;lt;li&amp;gt;Security information management (SIM), which collects data from log&lt;br /&gt;
files for analysis and reports on security threats and events, and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;security event management (SEM), which conducts real-time system&lt;br /&gt;
monitoring, notifies network admins about important issues and&lt;br /&gt;
establishes correlations between security events. There are a number of&lt;br /&gt;
security information and event management solutions on the market.&lt;br /&gt;
ArcSight ESM, IBM QRadar and Splunk are among the most popular. &amp;lt;ref name=&amp;quot;SIEM&amp;quot;&amp;gt;Application security, SIEM [Online]. Available: https://www.imperva.com/learn/application-security/siem/. [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Firewalls, Intrusion Detection Systems (IDS), and Intrusion Prevention Systems(IPS)====&lt;br /&gt;
Firewalls can be two types, hardware and software firewalls. Software&lt;br /&gt;
firewall is a firewall that is installed on a computer or server, and&lt;br /&gt;
tasked with network security. It works with a wide variety of other&lt;br /&gt;
technology security solutions to provide more robust and cohesive&lt;br /&gt;
security for enterprises of all sizes. When a software firewall is&lt;br /&gt;
installed on a server, it opens up like an umbrella of protection over&lt;br /&gt;
all other computers connected to the network. It is able to monitor both&lt;br /&gt;
incoming and outgoing traffic for potential risk or suspicious user&lt;br /&gt;
behavior, and also makes setting security policies much easier, faster&lt;br /&gt;
and more flexible. Hardware firewall is positioned between the network&lt;br /&gt;
and devices, allowing traffic to funnel through the firewall for a close&lt;br /&gt;
inspection and analysis. A hardware firewall, a term often&lt;br /&gt;
interchangeable with network or next-generation firewall, protects the&lt;br /&gt;
network gateways for an enterprise. Hardware firewall is physical&lt;br /&gt;
hardware, installed between network elements and connected devices, and&lt;br /&gt;
is tasked with filtering traffic for cyber threat to the network or&lt;br /&gt;
devices. Filtering out unauthorized or suspicious users based on traffic&lt;br /&gt;
analysis is one of the biggest benefits of hardware firewall. &amp;lt;ref name=&amp;quot;sangfor&amp;quot;&amp;gt;Sangfor, &amp;quot;What is Software Firewall? Difference between Hardware Firewall and Software Firewall, [Online]. Available: https://www.sangfor.com/blog/cybersecurity/what-is-software-firewall-difference-between-hardware-firewall-and-software-firewall [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems&lt;br /&gt;
(IPS) are both parts of the network infrastructure. IDS/IPS compare&lt;br /&gt;
network packets to a cyberthreat database containing known signatures of&lt;br /&gt;
cyberattacks — and flag any matching packets. IDS doesn’t alter the&lt;br /&gt;
network packets in any way, whereas IPS prevents the packet from&lt;br /&gt;
delivery based on the contents of the packet, much like how a firewall&lt;br /&gt;
prevents traffic by IP address. &amp;lt;ref name=&amp;quot;Varonis&amp;quot;&amp;gt;Varonis, &amp;quot;What is Software Firewall? IDS vs. IPS: What is the Difference?, [Online]. Available: https://www.varonis.com/blog/ids-vs-ips [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Digital forensics====&lt;br /&gt;
Digital forensics is a branch of forensic science that focuses on&lt;br /&gt;
identifying, acquiring, processing, analyzing, and reporting on data&lt;br /&gt;
stored electronically. Electronic evidence is a component of almost all&lt;br /&gt;
criminal activities and digital forensics support is crucial for law&lt;br /&gt;
enforcement investigations. Electronic evidence can be collected from a&lt;br /&gt;
wide array of sources, such as computers, smartphones, remote storage,&lt;br /&gt;
unmanned aerial systems, shipborne equipment, and more.&amp;lt;ref name=&amp;quot;interpol&amp;quot;&amp;gt;Interpol, &amp;quot;Digital forensics&amp;quot;. Available: https://www.interpol.int/How-we-work/Innovation/Digital-forensics. [Accessed 28 4 2022].&amp;lt;/ref&amp;gt; &lt;br /&gt;
Investigative process of digital forensics can be divided into several stages. There are four major stages: preservation, collection,&lt;br /&gt;
examination, and analysis. All these four stages need a deep understanding of computers, technology across a broad spectrum, and cybersecurity principles and&lt;br /&gt;
practices, a working knowledge of computers, networks, and coding, in-depth investigative abilities, critical-thinking skills and analytical talent the ability to effectively communicate and work with a&lt;br /&gt;
wide range of people. &amp;lt;ref name=&amp;quot;ecpi&amp;quot;&amp;gt;&amp;quot;Digital forensics&amp;quot;. Available: https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me. [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Mobile device management====&lt;br /&gt;
Mobile device management (MDM) is software that allows IT&lt;br /&gt;
administrators to control, secure and enforce policies on smartphones,&lt;br /&gt;
tablets and other endpoints. Mobile device management software emerged&lt;br /&gt;
in the early 2000s as a way to control and secure the personal digital&lt;br /&gt;
assistants and smartphones that business workers began to use. The&lt;br /&gt;
consumer smartphone boom that started with the launch of the Apple&lt;br /&gt;
iPhone in 2007 led to the bring your own device (BYOD) trend, which&lt;br /&gt;
fueled further interest in MDM.&amp;lt;ref name=&amp;quot;techtarget&amp;quot;&amp;gt;Techtarget, &amp;quot;Mobile Device Management&amp;quot;. Available: https://www.techtarget.com/searchmobilecomputing/definition/mobile-device-management [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Data management====&lt;br /&gt;
Sometimes the data management is neglected, but this part has a&lt;br /&gt;
crucial role when learning for good cyber security practices. Majority&lt;br /&gt;
of cyber security programs include a special courses on data management.&lt;br /&gt;
Data management is a method of organizing and maintaining data processes&lt;br /&gt;
that are required in almost every business operations. The benefits of&lt;br /&gt;
data management can be found accounting, statistics, logistics planning&lt;br /&gt;
and other disciplines including corporate computing.&amp;lt;ref name=&amp;quot;GlobalUni&amp;quot;&amp;gt;Global Universities, &amp;quot;MSc Data Management and Cyber Security&amp;quot;. Available: https://globaluniversities.in/msc-data-management-cyber-security. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Data governance (and management) play a fundamental role in&lt;br /&gt;
protecting an organization’s data. Ensuring that the right people have&lt;br /&gt;
the right access and that appropriate security controls are in place to&lt;br /&gt;
protect each system or service, based on the criticality or sensitivity&lt;br /&gt;
of the data sets these contain. &amp;lt;ref name=&amp;quot;CyberMagazine&amp;quot;&amp;gt;Cyber Security Magazine, &amp;quot;The Role of Data Governance in Cybersecurity&amp;quot;. Available: https://cybersecurity-magazine.com/the-role-of-data-governance-in-cybersecurity/?utm_source=rss&amp;amp;amp;utm_medium=rss&amp;amp;amp;utm_campaign=the-role-of-data-governance-in-cybersecurity. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Application security development====&lt;br /&gt;
Application security describes security measures at the application&lt;br /&gt;
level that aim to prevent data or code within the app from being stolen&lt;br /&gt;
or hijacked. It encompasses the security considerations that happen&lt;br /&gt;
during application development and design, but it also involves systems&lt;br /&gt;
and approaches to protect apps after they get deployed. Application&lt;br /&gt;
security may include hardware, software, and procedures that identify or&lt;br /&gt;
minimize security vulnerabilities.&amp;lt;ref name=&amp;quot;vmware&amp;quot;&amp;gt;VmWare, &amp;quot;What is application security?&amp;quot;. Available: https://www.vmware.com/topics/glossary/content/application-security.html [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Application security development is important to ensure that your&lt;br /&gt;
application is free from coding errors and bugs. And controls the risk&lt;br /&gt;
and helps safeguard against security vulnerabilities. Application&lt;br /&gt;
security development is the process of making applications more secure&lt;br /&gt;
by finding and fixing security vulnerabilities. This is often done by&lt;br /&gt;
enforcing software security best practices and using application&lt;br /&gt;
security testing tools. &lt;br /&gt;
&amp;lt;ref name=&amp;quot;perforce&amp;quot;&amp;gt;Perforce, &amp;quot;Application Security Development Best Practices&amp;quot;. Available: https://www.perforce.com/blog/kw/application-security-development-best-practices. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Audit and compliance knowledge====&lt;br /&gt;
A cyber security audit is designed to be a comprehensive review and&lt;br /&gt;
analysis of your business’s IT infrastructure. It identifies threats and&lt;br /&gt;
vulnerabilities, exposing weaknesses and high-risk practices.&lt;br /&gt;
Regulations such as the EU GDPR (General Data Protection Regulation) can&lt;br /&gt;
impose hefty penalties in the event of a breach that results in&lt;br /&gt;
exploited data. A cyber security audit will help mitigate the&lt;br /&gt;
consequences of a breach and demonstrate that your organization has&lt;br /&gt;
taken the necessary steps to protect client and company data. &amp;lt;ref name=&amp;quot;cyforsecure&amp;quot;&amp;gt;Cyfor Secure, &amp;quot;What is a Cyber Security Audit and how can it help your organisation?&amp;quot;. Available: https://cyforsecure.co.uk/services/cyber-assessment/cyber-security-audit/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cybersecurity compliance is the organizational risk management method&lt;br /&gt;
aligned with pre-defined security measures &amp;amp;amp; controls on how data&lt;br /&gt;
confidentiality is ensured by its administrative procedures.&amp;lt;ref name=&amp;quot;nordlayer&amp;quot;&amp;gt;NordLayer, &amp;quot;Cybersecurity compliance: Everything you need to know&amp;quot;. Available: https://nordlayer.com/blog/cybersecurity-compliance-everything-you-need-to-know/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
All needed skills are developed through courses and certification.&lt;br /&gt;
&lt;br /&gt;
===Entry-Level Incident Response Positions===&lt;br /&gt;
It is not always possible to advance to the position of incident&lt;br /&gt;
responder in a straight line. Many professionals advance from entry- to&lt;br /&gt;
mid-level positions before becoming a real incident responder or a&lt;br /&gt;
member of a computer emergency response team (CERT).&amp;lt;br /&amp;gt;&lt;br /&gt;
These are some examples: &amp;lt;ref name=&amp;quot;Infosec&amp;quot;&amp;gt;Infosec, &amp;quot;Incident Responder Career Roadmap: From Entry Level to Executive&amp;quot;. Available: https://resources.infosecinstitute.com/topic/incident-responder-career-roadmap-entry-level-executive/ [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;network-administrator&amp;quot;&amp;gt;Network administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;This position’s experience will help potential incident responders&lt;br /&gt;
develop networking skills. Attention to detail, as well as the ability&lt;br /&gt;
to sift through system configurations, site layouts, and general network&lt;br /&gt;
and communication setups, are essential in this field.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;system-administrator&amp;quot;&amp;gt;System administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Another crucial beginning point for an incident responder is to learn&lt;br /&gt;
how to manage resources inside your organization as well as user&lt;br /&gt;
behavior. Understanding the potential damage that users, inadequate&lt;br /&gt;
security setups, and ineffective IT policies and procedures can cause on&lt;br /&gt;
your network can provide prospective candidates with insight into the&lt;br /&gt;
human component of an incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;security-administrator&amp;quot;&amp;gt;Security administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In such a position, basic hacking skills, penetration testing, and&lt;br /&gt;
intrusion detection are all learned, which are crucial incident&lt;br /&gt;
responder skills when trying to replicate a breach or attack.&lt;br /&gt;
Understanding the paths a cybercriminal will take when attempting to&lt;br /&gt;
damage or obtain access to a system can greatly simplify the work of&lt;br /&gt;
reverse engineering the incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Mid-Level Incident Response Positions ===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5&lt;br /&gt;
id=&amp;quot;computer-security-incident-response-team-csirt-engineer&amp;quot;&amp;gt;Computer&lt;br /&gt;
security incident response team (CSIRT) engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;cyber-incident-responder&amp;quot;&amp;gt;Cyber incident responder&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-response-engineer&amp;quot;&amp;gt;Incident response&lt;br /&gt;
engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;While each of these positions is different, they generally require&lt;br /&gt;
very similar skills and characteristics in a candidate. At this level,&lt;br /&gt;
personal characteristics such as problem solving, time management, and&lt;br /&gt;
even presentation skills become more crucial as one’s career evolves&lt;br /&gt;
into a management-facing role.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Technical skills include the ability to identify and minimize threats&lt;br /&gt;
while maintaining communication with management and the rest of your&lt;br /&gt;
team. Data analysis and evidence gathering become increasingly crucial,&lt;br /&gt;
and the circumstances in which your services are deployed get more&lt;br /&gt;
serious.&amp;lt;/p&amp;gt;&lt;br /&gt;
Problem-solving skills are crucial at this level of incident&lt;br /&gt;
response, and as the stakes rise, so does the pressure in each&lt;br /&gt;
situation. At this level, programming abilities are essential since&lt;br /&gt;
incident responders may be needed to reverse engineer malicious code or&lt;br /&gt;
even create patches for vulnerable network applications or services. &amp;lt;ref name=&amp;quot;coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated]&amp;quot;. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Senior-Level Incident Response Positions===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;intrusion-detection-specialist&amp;quot;&amp;gt;Intrusion detection&lt;br /&gt;
specialist:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;A CISSP certification might help a potential candidate in preparing&lt;br /&gt;
for the profession. The role of an intrusion detection specialist is to&lt;br /&gt;
find and stop any unwanted communications.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-manager&amp;quot;&amp;gt;Incident manager:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Expected to plan, oversee, manage, and supervise all incident&lt;br /&gt;
response team actions. Is in charge of reporting all current events to&lt;br /&gt;
senior management and stakeholders, as well as acting as the technical&lt;br /&gt;
lead on active incidents for incident responders. Prepares threat and&lt;br /&gt;
impact assessments and reports them known to management.&amp;lt;ref name=&amp;quot;coursera&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Certificates== &lt;br /&gt;
There is a vast number of different certificates and the road map to&lt;br /&gt;
being a certified professional could be very different&amp;lt;ref name=&amp;quot;Coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated],&amp;quot; [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;NICCS&amp;quot;&amp;gt;NICCS, &amp;quot;Cybersecurity Certifications,&amp;quot; [Online]. Available: hhttps://niccs.cisa.gov/about-niccs/cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt; . One possible&lt;br /&gt;
approach is to start with basic certificates from the different branches&lt;br /&gt;
of service and move to more specific and demanding focused&lt;br /&gt;
certification. Also, some jobs require certain clearances, either from&lt;br /&gt;
industry, or from the government. One small selection of different&lt;br /&gt;
possible certificates is brought out in following paragraphs.&lt;br /&gt;
&lt;br /&gt;
Security+ is a CompTIA certification that is considered a basic cert&lt;br /&gt;
among cybersecurity professionals. It covers the topics of risk&lt;br /&gt;
management and threat assessment.&lt;br /&gt;
Network+ is also offered by CompTIA this certification (like the name&lt;br /&gt;
implies) focuses on networking infrastructure and operations. It is&lt;br /&gt;
considered a foundational certification.&lt;br /&gt;
The Certified Information Systems Security Professional (CISSP) is a&lt;br /&gt;
more advanced certification designed for cybersecurity professionals&lt;br /&gt;
with at least five years of work experience. The certification covers&lt;br /&gt;
topics such as architecture, engineering, and management.&amp;lt;/p&amp;gt;&lt;br /&gt;
The Certified Ethical Hacker (CEH) certification is also considered a&lt;br /&gt;
more advanced cert because it generally requires that applicants have&lt;br /&gt;
multiple years of work experience. The goal of an ethical hacker&lt;br /&gt;
certification is to be able to understand how cyber attacks unfold in&lt;br /&gt;
order to improve threat assessment and mitigation skills.&amp;lt;ref name=&amp;quot;cyberguide&amp;quot;&amp;gt;Cybersecurity Guide, &amp;quot;How to become a cybersecurity specialist&amp;quot;, [Online]. Available: https://cybersecurityguide.org/careers/security-specialist/. [Accessed 27 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
This is definitely not all, when one looks for more information, following link could be searched, to get more in depth knowledge about&lt;br /&gt;
different possibilities. Hereby, with the help of this matrix a possible taxonomy of different 436 listed certificates in branches are&lt;br /&gt;
presented.&amp;lt;ref name=&amp;quot;Pauljeremy&amp;quot;&amp;gt;&amp;quot;Cybersecurity Roadmap,&amp;quot; [Online]. Available: https://pauljerimy.com/2020/10/12/scr-oct-2020-update/. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:analystimage5.png|1000px|thumb|Certificate matrix &amp;lt;ref&amp;gt;&amp;quot;Certification roadmap&amp;quot;. Available at https://pauljerimy.com/security-certification-roadmap&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
=== Communication and Network Security===&lt;br /&gt;
Communication and network security covers the ability to secure&lt;br /&gt;
communication channels and networks. Topics include secure and converges&lt;br /&gt;
protocols, wireless networks, cellular networks, hardware operations&lt;br /&gt;
(warranty and redundant power), and third-party connectivity. IP&lt;br /&gt;
networking are also included in this domain.&lt;br /&gt;
===Identity and Access Management===&lt;br /&gt;
The identity and access management domain covers the attacks that&lt;br /&gt;
target the human gateway to gain access to data. Other topics include&lt;br /&gt;
ways to identify users with rights to access the information and&lt;br /&gt;
servers. Identity and access management covers the topics of&lt;br /&gt;
applications, Single sign-on authentication, privilege escalation,&lt;br /&gt;
Kerberos, rule-based or risk-based access control, proofing and&lt;br /&gt;
establishment of identity.&lt;br /&gt;
===Security Architecture and Engineering===&lt;br /&gt;
The security architecture and engineering domain covers important&lt;br /&gt;
topics concerning security engineering plans, designs and principles,&lt;br /&gt;
Topics include assessing and mitigating information system&lt;br /&gt;
vulnerabilities, fundamental concepts of security models and security&lt;br /&gt;
architectures in critical areas like access control. Cloud systems,&lt;br /&gt;
cryptography, system infiltrations (ransomware, fault-injection and&lt;br /&gt;
more) and virtualized systems are also covered in this domain.&lt;br /&gt;
===Asset Security===&lt;br /&gt;
The Asset Security domain deals with the issues related to the&lt;br /&gt;
collection, storage, maintenance, retention and destruction of data. It&lt;br /&gt;
also covers knowledge of different roles regarding data handling (owner,&lt;br /&gt;
controller and custodian) as well as data protection methods and data&lt;br /&gt;
states. Other topics include resource provision, asset classification&lt;br /&gt;
and data lifecycle management.&lt;br /&gt;
===Security and Risk Management===&lt;br /&gt;
The security and risk management domain covers general on skills&lt;br /&gt;
related to the implementation of user awareness programs as well as&lt;br /&gt;
security procedures. Emphasis is also placed on risk management&lt;br /&gt;
concerning the acquisition of new services, hardware and software&lt;br /&gt;
(supply chain). Other skills include social engineering defense&lt;br /&gt;
mechanisms.&lt;br /&gt;
===Security Assessment and Testing===&lt;br /&gt;
The security assessment and testing domain deals with all the&lt;br /&gt;
techniques and tools used to find system vulnerabilities, weaknesses and&lt;br /&gt;
potential areas of concern not addressed by security procedures and&lt;br /&gt;
policies. Attack simulations, vulnerability assessment, compliance&lt;br /&gt;
checks, and ethical disclosure also fall under this domain.&lt;br /&gt;
===Software Security===&lt;br /&gt;
The software development security domain deals with implementing&lt;br /&gt;
software-based security protocols within environment for which the IT&lt;br /&gt;
professional is responsible. Risk analysis, vulnerability identification&lt;br /&gt;
and auditing of source codes are all covered in this subset. Additional&lt;br /&gt;
topics include software-designed security, maturity models, development&lt;br /&gt;
methodologies, open-source and third-party development security.&lt;br /&gt;
===Security operations===&lt;br /&gt;
The security operations domain covers topics ranging from&lt;br /&gt;
investigations and digital forensic to detection and intrusion&lt;br /&gt;
prevention tools, sandboxing and firewalls. Topics include user and&lt;br /&gt;
entity behavior analytics, threat intelligence (threat hunting and&lt;br /&gt;
threat feeds) log management, artifacts (mobile, computer and network),&lt;br /&gt;
machine learning and AI-based tools, penetration testing, and&lt;br /&gt;
exploitation development. These for sub-domains are lister here.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Incident Handling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Penetration Testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Exploitation&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Education==&lt;br /&gt;
[[File:Analystimage7.png|400px|thumb|Comparison degree vs Certificate &amp;lt;ref&amp;gt;&amp;quot;Comparison Table&amp;quot;. Available at https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
The entry level monitoring specialist is hired by Estonian&lt;br /&gt;
Information System Authority even if there is no formal IT education,&lt;br /&gt;
but readiness to learn and moderate knowledge of different operation&lt;br /&gt;
systems is enough to start the career. &amp;lt;ref name=&amp;quot;cv&amp;quot;&amp;gt;cv.ee, &amp;quot;SEIRESPETSIALIST - tule Eesti küberruumi valvuriks!&amp;quot;. Available: https://www.cv.ee/en/vacancy/792782/riigi-infosusteemi-amet/seirespetsialist-tule-eesti-kuberruumi-valvuriks [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Nevertheless, like most other high qualification careers jobs falling&lt;br /&gt;
under the cybersecurity specialist category require some form of formal&lt;br /&gt;
education. However, since cybersecurity specialist jobs can fall across&lt;br /&gt;
a wide spectrum of job descriptions and responsibilities, it is possible&lt;br /&gt;
to obtain a specialist job after completing many levels of different&lt;br /&gt;
computer related education.&lt;br /&gt;
&lt;br /&gt;
If one is looking for a cybersecurity related education, for example&lt;br /&gt;
in EU, 137 courses/programs could be found that relate to keyword IT or&lt;br /&gt;
cybersecurity. &amp;lt;ref name=&amp;quot;enisa&amp;quot;&amp;gt;ENISA (European Union Agency for Cybersecurity), &amp;quot;Cybersecurity Education-Cybersecurity Higher Education Database&amp;quot;. Available: https://www.enisa.europa.eu/topics/cybersecurity-education/education-map/education-courses [Accessed 26 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Also, there is a great amount of discussion, if cyber security&lt;br /&gt;
professional should have a degree or would be certification just enough.&lt;br /&gt;
One interesting table is produces by Franklin University that compares&lt;br /&gt;
benefits and/or drawbacks of each type of credential.&amp;lt;ref name=&amp;quot;franklin&amp;quot;&amp;gt;Franklin University, &amp;quot;Is Getting a Master&#039;s Degree in Cyber Security Worth It?&amp;quot;. Available: https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Certifications are generally good for people with little practical&lt;br /&gt;
experience because they are known quantities in the industry and can&lt;br /&gt;
help you get your foot in the door. They set a minimum knowledge bar.&lt;br /&gt;
But some certifications are viewed more favorably than others.&lt;br /&gt;
Certifications with renewal requirements are viewed better by hiring&lt;br /&gt;
managers, but they also more costly in the long run because of the need&lt;br /&gt;
for continuing education. Certifications are also good for showing&lt;br /&gt;
in-depth expertise in a specialization within cybersecurity. Depending&lt;br /&gt;
on your career goals, it may be advantageous to have a master’s&lt;br /&gt;
degree—which shows your breadth of knowledge, critical thinking and&lt;br /&gt;
leadership skills—and a certificate—which shows specific skill&lt;br /&gt;
competency.&amp;lt;ref name=&amp;quot;franklin&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
As IT (Cyber) Security is still a relatively young discipline,&lt;br /&gt;
universities and colleges are still figuring out which is the best&lt;br /&gt;
approach for their degrees. Study programmes and curricula in Cyber&lt;br /&gt;
Security are different. In general, here are the duration of Cyber&lt;br /&gt;
Security degrees:&lt;br /&gt;
&amp;lt;ref name=&amp;quot;studyportal&amp;quot;&amp;gt;Studyportals, &amp;quot;Why You Should Study a Cyber Security Degree in 2022&amp;quot;. Available: https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Bachelor’s degrees in Cyber Security take 3 or 4 years in most&lt;br /&gt;
countries.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Master’s courses in Cyber Security take between 1-2 years to&lt;br /&gt;
complete.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;PhD programmes in Cyber Security last 3-5 years. Some only take 1&lt;br /&gt;
or 2 years, but they are less common.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Generalization could me made that on bachelor level the general&lt;br /&gt;
knowledge about the cyber issues are obtained. On master level the&lt;br /&gt;
specialization courses are taken and the person can choose more specific&lt;br /&gt;
topics to study. It is on master level where strengths of the cyber&lt;br /&gt;
specialist can be developed further and up-do date knowledge obtained in&lt;br /&gt;
specifics. PhD is serious science and involves teaching, lot of&lt;br /&gt;
scientific work and writing for publications.&lt;br /&gt;
&lt;br /&gt;
==Salary==&lt;br /&gt;
&amp;lt;p&amp;gt;Even if the salary can be very different, compared to the skills and&lt;br /&gt;
experience, an generalization can be made. Cyber Security professionals&lt;br /&gt;
in CSIRT, and in other entities earn quite well, from the start. First,&lt;br /&gt;
some comparison from the United States. The average CSIRT analyst salary&lt;br /&gt;
in the USA is $97,500 per year or $50 per hour. Entry level positions&lt;br /&gt;
start at $48,875 per year while most experienced workers make up to&lt;br /&gt;
$135,373 per year.&amp;lt;ref name=&amp;quot;talent&amp;quot;&amp;gt;talent.com, &amp;quot;Csirt Analyst average salary in USA 2022&amp;quot;. Available: https://www.talent.com/salary?job=csirt+analyst [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There are multiple positions you can occupy in this field. They have&lt;br /&gt;
in common great salaries and high demand for technical skills, attention&lt;br /&gt;
to details, problem-solving mentality, and the ability to analyze risks.&lt;br /&gt;
Here are the average annual salaries in the United States, according to&lt;br /&gt;
Payscale: &amp;lt;ref name=&amp;quot;studyportal&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Cryptographer – 100,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Information Security Officer – 91,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Assessor – 90,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Engineer – 88,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Penetration Tester – 81,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Forensics Expert – 71,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Administrator – 65,000 USD&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
When looking into salaries in Estonia, one can find that there is a&lt;br /&gt;
discussion that private sector is taking a toll from the public sector,&lt;br /&gt;
and that the salaries in important agencies, as Information System&lt;br /&gt;
Authority loose their employees to the better paid positions in private&lt;br /&gt;
sector.&amp;lt;ref name=&amp;quot;digigeenius&amp;quot;&amp;gt;DiGi Geenius, &amp;quot;Kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad&amp;quot;. Available: https://digi.geenius.ee/rubriik/uudis/kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad/ [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;tehnika&amp;quot;&amp;gt;Postimees, &amp;quot;Riigi-it-tootajate-palgamaarad-kasvasid&amp;quot;. Available: https://tehnika.postimees.ee/6887428/riigi-it-tootajate-palgamaarad-kasvasid [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
But there is also a different view that average private sector worker&lt;br /&gt;
could be hired as a top specialist in public sector and then the payment&lt;br /&gt;
is higher. Nevertheless, it seems that the average payment in cyber&lt;br /&gt;
security sector is any way higher that in other parts of the&lt;br /&gt;
e-services. &amp;lt;ref name=&amp;quot;digigeenius2&amp;quot;&amp;gt;DiGi Geenius, &amp;quot;5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka&amp;quot;. Available: https://digi.geenius.ee/rubriik/uudis/5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==SOC==&lt;br /&gt;
&amp;lt;p&amp;gt;A SOC is a facility where an organization’s network, applications,&lt;br /&gt;
and endpoints are monitored and defended. The term was adapted from&lt;br /&gt;
network operations centers (NOCs), where large telecommunication or&lt;br /&gt;
corporate networks are monitored. When network security became more of a&lt;br /&gt;
concern, security teams were formed within the NOCs, and eventually spun&lt;br /&gt;
off into larger organizations of their own as the responsibilities of&lt;br /&gt;
security teams grew increasingly complex and specialized. The security&lt;br /&gt;
staff working in a security operations center are often called the SOC&lt;br /&gt;
team.&amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;Exabeam, &amp;quot;CSIRT&amp;quot;. Available: https://www.exabeam.com/incident-response/csirt/ [Accessed 28 APr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;Functions of the SOC team include, but are not limited to:&amp;lt;ref name=&amp;quot;trellix&amp;quot;&amp;gt;Trellix, &amp;quot;What Is a Security Operations Center (SOC)?&amp;quot;. Available: https://www.trellix.com/en-us/security-awareness/operations/what-is-soc.html [Accessed 30 APr 2022].&amp;lt;/ref&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ol type=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Taking inventory of resources, to get a better understanding of the&lt;br /&gt;
structure they are protecting.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintanence of the system, by constantly making updates and adding&lt;br /&gt;
safeguards.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Monitoring the network for abnormalities with special tools.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Threat analysis of new attacks and vulnerabilities.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Responding to attacks, by acting as “first responders”. The SOC team&lt;br /&gt;
will shut down and/or isolate endpoints, deleting files and lowering the&lt;br /&gt;
impact as fast as possible.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Recovery of system stability and lost data. This may be done using&lt;br /&gt;
backups, restarting endpoints or reconfiguring systems.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Logging all actions on the system, to be later used for analysis or&lt;br /&gt;
forensics after an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigating the root cause of an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Auditing their own actions, to be in line with regulations of the&lt;br /&gt;
organization, industry or governing body.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==CSIRT==&lt;br /&gt;
&amp;lt;p&amp;gt;A CSIRT is a group that responds to security incidents when they&lt;br /&gt;
occur. Key responsibilities of a CSIRT include:&lt;br /&gt;
&amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
===Creating and maintaining an incident response plan (IRP)===&lt;br /&gt;
An incident response plan (IRP) is a set of written instructions for&lt;br /&gt;
detecting, responding to and limiting the effects of an information&lt;br /&gt;
security event. Incident response plans provide instructions for&lt;br /&gt;
responding to many potential scenarios, including data breaches, denial&lt;br /&gt;
of service/distributed denial of service attacks, firewall breaches,&lt;br /&gt;
virus or malware outbreaks or insider threats. Without an incident&lt;br /&gt;
response plan in place, organizations may either not detect the attack&lt;br /&gt;
in the first place, or not follow proper protocol to contain the threat&lt;br /&gt;
and recover from it when a breach is detected.&lt;br /&gt;
&lt;br /&gt;
https://www.stratacore.com/incidentresponseplan&lt;br /&gt;
===Investigating and analyzing incidents===&lt;br /&gt;
CSIRTs are also involved in improvement activities. After major&lt;br /&gt;
computer security incidents occur, or when incidents are not handled in&lt;br /&gt;
a timely or effective manner, a CSIRT will generally perform a&lt;br /&gt;
postmortem of the incident and its response. This postmortem will&lt;br /&gt;
identify the strengths and weakness of the response effort. Such reviews&lt;br /&gt;
can identify weaknesses and holes in systems, infrastructure defenses,&lt;br /&gt;
or policies that allowed the incident to take place. It can also&lt;br /&gt;
identify problems with communication channels, interfaces, and&lt;br /&gt;
procedures that inhibited the efficient resolution of the reported&lt;br /&gt;
problem.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.cisa.gov/uscert/bsi/articles/best-practices/incident-management/defining-computer-security-incident-response-teams&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Managing internal communications and updates during or immediately after incidents occur===&lt;br /&gt;
===Communicating with employees, shareholders, customers, and the press about incidents as needed===&lt;br /&gt;
&amp;lt;p&amp;gt;There are various services within the CSIRT Services Framework that&lt;br /&gt;
address communications, as they relate to security operations and&lt;br /&gt;
incident response services. Some of these include Information Security&lt;br /&gt;
Incident Coordination, Crisis Management Support, Vulnerability&lt;br /&gt;
Disclosure, Situational Awareness Communication, and Awareness Building,&lt;br /&gt;
to name a few. Sharing information and communicating with the general&lt;br /&gt;
public and/or your constituency is appropriate in many different&lt;br /&gt;
scenarios. These can range from proactive communications to reactive&lt;br /&gt;
communications. Each scenario may be unique, and careful consideration&lt;br /&gt;
should be given to when to release information to the public and what&lt;br /&gt;
information should be released.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;https://resources.sei.cmu.edu/asset_files/Handbook/2021_002_001_651819.pdf&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Remediating incidents===&lt;br /&gt;
Threat remediation is a strong and capable tool for fighting the&lt;br /&gt;
cyber security compromises. As the word ‘remedy’ suggests, remediation&lt;br /&gt;
process involves the treatment of a security breach. With the&lt;br /&gt;
remediation practices, your cyber security team is able to eliminate&lt;br /&gt;
suspicious activities and malicious attacks in the form of malware,&lt;br /&gt;
ransomware, phishing and such. Even if you ‘kill’ the suspicious&lt;br /&gt;
activity, the attackers can remain in your systems. If you want to&lt;br /&gt;
contaminate and end the problem for good, your remediation processes&lt;br /&gt;
must involve the detection of the cause. &amp;lt;ref name=&amp;quot;logsign&amp;quot;&amp;gt;Logsign, &amp;quot;What-is-remediation-in-cyber-security&amp;quot;. Available: https://www.logsign.com/blog/what-is-remediation-in-cyber-security/. [Accessed 28 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Recommending technology, policy, governance, and training changes after security incidents===&lt;br /&gt;
After all these actions, the SCIRT must contribute to the development&lt;br /&gt;
of better policies, practices and has to recommend improvements. They&lt;br /&gt;
are not working in the vacuum and their work has to create new and&lt;br /&gt;
better standards for cyber security. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;Exabeam, &amp;quot;CSIRT&amp;quot;. Available: https://www.exabeam.com/incident-response/csirt/ [Accessed 28 APr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==CERT==&lt;br /&gt;
&amp;lt;p&amp;gt;The term “computer emergency response team” was coined in 1988. In&lt;br /&gt;
response to the Morris worm attack that impacted thousands of servers on&lt;br /&gt;
the Internet, DARPA funded the formation of the Computer Emergency&lt;br /&gt;
Response Team Coordination Center (CERT-CC) at Carnegie Mellon&lt;br /&gt;
University. The goal of CERT-CC was to help protect the internet by&lt;br /&gt;
collecting and disseminating information on critical security&lt;br /&gt;
vulnerabilities. Several other countries formed similar centers using&lt;br /&gt;
the same acronym (despite threats of legal action by Carnegie Mellon for&lt;br /&gt;
trademark infringement). Now the term CERT refers to any emergency&lt;br /&gt;
response team that deals with cyber threats. Many people use CERT-CC&lt;br /&gt;
interchangeably with CSIRT, though the charter of a CERT is information&lt;br /&gt;
sharing in order to help other response teams respond to threats against&lt;br /&gt;
their own infrastructure.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In general, the designation of CERT is helpful in applying real-world&lt;br /&gt;
solutions to various cybersecurity problems. They may be government&lt;br /&gt;
contractors or employees of a major corporation. For example, the U.S.&lt;br /&gt;
Computer Emergency Readiness Team (US-CERT) operates under the U.S.&lt;br /&gt;
Department of Homeland Security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.techopedia.com/definition/31003/computer-emergency-response-team-cert&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In Estonia CERT is designated as CERT-EE. It was established in 2006,&lt;br /&gt;
as an organization responsible for the management of security incidents&lt;br /&gt;
in .ee computer networks. It is also a national contact point for&lt;br /&gt;
international co-operation in the field of IT security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ria.ee/en/cyber-security/cert-ee.html&amp;lt;/p&amp;gt;&lt;br /&gt;
===Difference between SOC/CSIRT/CERT===&lt;br /&gt;
&amp;lt;p&amp;gt;How CSIRTs differ from CERTs and SOCs There are overlapping&lt;br /&gt;
responsibilities between a community emergency response team (CERT),&lt;br /&gt;
computer security incident response team (CSIRT), and security&lt;br /&gt;
operations center (SOC). To add to this confusion, frequently, the terms&lt;br /&gt;
CERT and CSIRT are used interchangeably, despite the important&lt;br /&gt;
differences.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image3.png&amp;quot; alt=&amp;quot;Overlapping in images/image3.png&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;Overlapping in&lt;br /&gt;
images/image3.png&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
==Understand the primary roles and characteristics of a CERT, CSIRT, and SOC.==&lt;br /&gt;
&amp;lt;p&amp;gt;So, using strict definitions, a CERT collects and disseminates&lt;br /&gt;
security information, typically for the benefit of a country or an&lt;br /&gt;
industry. A CSIRT is a cross-functional team that responds to incidents&lt;br /&gt;
on behalf of a country or an organization. A SOC is where a country or&lt;br /&gt;
organization monitors and defends its network, servers, applications,&lt;br /&gt;
and endpoints.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image4.png&amp;quot; alt=&amp;quot;table of explanation images/image4&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;table of explanation&lt;br /&gt;
images/image4&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
==Future==&lt;br /&gt;
&amp;lt;p&amp;gt;And the Cyber security problem is only getting bigger. According to a&lt;br /&gt;
report published by Accenture, the number of cyber security breaches&lt;br /&gt;
increased by 11 percent from 2017 to 2018. The cost of such breaches is&lt;br /&gt;
astronomical–about $600 billion worldwide, according to the Economic&lt;br /&gt;
Impact of Cybercrime report.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Job projections for cybersecurity are staggering. The Bureau of Labor&lt;br /&gt;
Statistics in US predicts that careers in the cybersecurity field will&lt;br /&gt;
grow by 32% by 2028. That makes cybersecurity one of the top 10&lt;br /&gt;
fastest-growing jobs in the country. In the United States alone, jobs&lt;br /&gt;
for Information Security Analysts are expected to grow by 15% by&lt;br /&gt;
2024.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Most likely this trend is also similar in other countries.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When checking Estonian job portals, there is a constant need for&lt;br /&gt;
people for cyber security related positions. Also, linkedin search gives&lt;br /&gt;
approximately 30 vacancies immediately. There are banks, logistics&lt;br /&gt;
companies, e-shops, and software producers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://ee.linkedin.com/jobs/cyber-security-jobs?countryRedirected=1&amp;amp;amp;position=1&amp;amp;amp;pageNum=0&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Trends that affect companies create need for constant cyber security&lt;br /&gt;
services. Increasing number of home/remote offices require secure&lt;br /&gt;
corporate networks and security of remote devices. One example is from&lt;br /&gt;
this year, when sloppy remote desktop set-up paralyzed systems of 17&lt;br /&gt;
companies.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.aripaev.ee/uudised/2022/04/20/ria-lohakas-kaugtoolaua-seadistus-halvas-martsis-vahemalt-17-juhul-ettevotete-it-susteemid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Also, no service can exists without robust infrastructure - servers,&lt;br /&gt;
databases, applications. As all previously mentioned devices and&lt;br /&gt;
services are at constant scanning and surveillance. So, the breach&lt;br /&gt;
detection and immediate action demands 24/7 services. Even if lot of&lt;br /&gt;
things could be automated, there is a need for human specialists (at&lt;br /&gt;
least, at the moment). Third growing field is also a forensic&lt;br /&gt;
investigation, as every attack must be investigated in order to be ready&lt;br /&gt;
to repel next attacks. So data recovery and evidence collection is&lt;br /&gt;
another important field of work that need skilled and professional&lt;br /&gt;
workers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Even, if the specifics of the entity, be it CSIRT, CERT or SOC, are&lt;br /&gt;
different, the fundamentals of the work are the same. Professional&lt;br /&gt;
knowledge of the networks, operational systems, hardware, scripting, and&lt;br /&gt;
several other wider IT related knowledge is needed. As there is no&lt;br /&gt;
single way to reach to it, every single person can find one’s strongest&lt;br /&gt;
sides and develop them with knowledge of weaker side, in order to know,&lt;br /&gt;
when to as for help.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/body&amp;gt;&lt;br /&gt;
&amp;lt;/html&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mavald</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142229</id>
		<title>Hiring a Cyber Security Incident Analyst</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142229"/>
		<updated>2022-05-01T15:48:47Z</updated>

		<summary type="html">&lt;p&gt;Mavald: /* SOC */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==A Cyber Security Incident Analyst==&lt;br /&gt;
&lt;br /&gt;
[[File:image1.png|600px|thumb|Job advertisement &amp;lt;ref&amp;gt;&amp;quot;Job Advertisement&amp;quot;. Available at https://www.projectpeople.com/jobs/&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
===Cyber security incident analyst in SOC/CSIRT/CERT===&lt;br /&gt;
This article delves into the job title of Cyber Security Incident&lt;br /&gt;
Analyst and provides an overview of the acronyms SOC/CSIRT/CERT. A brief&lt;br /&gt;
history of the job is discussed here, as well as a possible career path,&lt;br /&gt;
education, experience, and other characteristics required for work in&lt;br /&gt;
computer security-related organizations. The article also provides a&lt;br /&gt;
brief history of SOC/CSIRT/CERT, as well as a comparison of their&lt;br /&gt;
differences and similarities.&lt;br /&gt;
===Cyber Security Incident Analyst Skill Set===&lt;br /&gt;
What skill set is expected from the Cyber Security Incident Analyst? Below written lines are taken from the same job advertisement depicted&lt;br /&gt;
on the left side of this article:&lt;br /&gt;
As a Security Incident Analyst your responsibilities will include:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Continuous monitoring of security tooling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Performing regular and ad-hoc vulnerability assessments&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Carrying out ‘spot checks’&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Reporting vulnerabilities to the PVG via the alerts system&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintaining and documenting logging systems&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Developing centralized logging, reporting and intelligence&lt;br /&gt;
platforms&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;‘Light touch’ penetration testing with open source tooling&lt;br /&gt;
(Metasploit)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Knowledge &amp;amp;amp; Experience required:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;SOC, CSIRT or CERT operational environment experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Windows / Linux experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TCP /IP networking protocol knowledge&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience reviewing and analyzing Security Events from various&lt;br /&gt;
monitoring and logging sources&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience in website and web application security assessment or&lt;br /&gt;
penetration testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience of using Metasploit&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Scripting knowledge using BASH, Python, Perl, Ruby&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Skills in Host and Network Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
As one can see the description of the duties is wide and also the&lt;br /&gt;
knowledge and experience that is required is noteworthy. So, where to&lt;br /&gt;
start to find out the way to get this kind of knowledge and&lt;br /&gt;
expertize.&lt;br /&gt;
===Possible career path===&lt;br /&gt;
Next part of the paper is aiming to depict a possible ways, how to&lt;br /&gt;
develop oneself, and move along the career pathway in cybersecurity&lt;br /&gt;
field. Topics of development, education, experience and certification&lt;br /&gt;
are covered.&lt;br /&gt;
[[File:analystimage2.png|1000px|thumb|Career path &amp;lt;ref&amp;gt;&amp;quot;Possible Career Path&amp;quot;. Available at https://www.cyberseek.org/pathway.html&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
===Junior/Senior===&lt;br /&gt;
Start with an entry-level job in IT. Hands-on experience is often the&lt;br /&gt;
most effective way to prepare for certification exams. Start&lt;br /&gt;
accumulating work experience with an entry-level role as a cybersecurity&lt;br /&gt;
analyst. Many cybersecurity professionals start off in more general IT&lt;br /&gt;
roles. The skills, practices, and technologies you’ll use as a&lt;br /&gt;
cybersecurity professional will continue to evolve along with computer&lt;br /&gt;
and network technology. The desire to learn, ability to problem solve,&lt;br /&gt;
and attention to detail will serve you well in this field. Other, more&lt;br /&gt;
technical skills and technologies to learn include:&amp;lt;ref name=&amp;quot;certification&amp;quot;&amp;gt;Popular Cyber Security Certificates [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications  [Accessed 25 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====SIEM tools (security information and event management)====&lt;br /&gt;
Security Information and Event Management (SIEM) is a set of tools&lt;br /&gt;
and services offering a holistic view of an organization’s information&lt;br /&gt;
security. SIEM works by combining two technologies:&lt;br /&gt;
&amp;lt;li&amp;gt;Security information management (SIM), which collects data from log&lt;br /&gt;
files for analysis and reports on security threats and events, and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;security event management (SEM), which conducts real-time system&lt;br /&gt;
monitoring, notifies network admins about important issues and&lt;br /&gt;
establishes correlations between security events. There are a number of&lt;br /&gt;
security information and event management solutions on the market.&lt;br /&gt;
ArcSight ESM, IBM QRadar and Splunk are among the most popular. &amp;lt;ref name=&amp;quot;SIEM&amp;quot;&amp;gt;Application security, SIEM [Online]. Available: https://www.imperva.com/learn/application-security/siem/. [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Firewalls, Intrusion Detection Systems (IDS), and Intrusion Prevention Systems(IPS)====&lt;br /&gt;
Firewalls can be two types, hardware and software firewalls. Software&lt;br /&gt;
firewall is a firewall that is installed on a computer or server, and&lt;br /&gt;
tasked with network security. It works with a wide variety of other&lt;br /&gt;
technology security solutions to provide more robust and cohesive&lt;br /&gt;
security for enterprises of all sizes. When a software firewall is&lt;br /&gt;
installed on a server, it opens up like an umbrella of protection over&lt;br /&gt;
all other computers connected to the network. It is able to monitor both&lt;br /&gt;
incoming and outgoing traffic for potential risk or suspicious user&lt;br /&gt;
behavior, and also makes setting security policies much easier, faster&lt;br /&gt;
and more flexible. Hardware firewall is positioned between the network&lt;br /&gt;
and devices, allowing traffic to funnel through the firewall for a close&lt;br /&gt;
inspection and analysis. A hardware firewall, a term often&lt;br /&gt;
interchangeable with network or next-generation firewall, protects the&lt;br /&gt;
network gateways for an enterprise. Hardware firewall is physical&lt;br /&gt;
hardware, installed between network elements and connected devices, and&lt;br /&gt;
is tasked with filtering traffic for cyber threat to the network or&lt;br /&gt;
devices. Filtering out unauthorized or suspicious users based on traffic&lt;br /&gt;
analysis is one of the biggest benefits of hardware firewall. &amp;lt;ref name=&amp;quot;sangfor&amp;quot;&amp;gt;Sangfor, &amp;quot;What is Software Firewall? Difference between Hardware Firewall and Software Firewall, [Online]. Available: https://www.sangfor.com/blog/cybersecurity/what-is-software-firewall-difference-between-hardware-firewall-and-software-firewall [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems&lt;br /&gt;
(IPS) are both parts of the network infrastructure. IDS/IPS compare&lt;br /&gt;
network packets to a cyberthreat database containing known signatures of&lt;br /&gt;
cyberattacks — and flag any matching packets. IDS doesn’t alter the&lt;br /&gt;
network packets in any way, whereas IPS prevents the packet from&lt;br /&gt;
delivery based on the contents of the packet, much like how a firewall&lt;br /&gt;
prevents traffic by IP address. &amp;lt;ref name=&amp;quot;Varonis&amp;quot;&amp;gt;Varonis, &amp;quot;What is Software Firewall? IDS vs. IPS: What is the Difference?, [Online]. Available: https://www.varonis.com/blog/ids-vs-ips [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Digital forensics====&lt;br /&gt;
Digital forensics is a branch of forensic science that focuses on&lt;br /&gt;
identifying, acquiring, processing, analyzing, and reporting on data&lt;br /&gt;
stored electronically. Electronic evidence is a component of almost all&lt;br /&gt;
criminal activities and digital forensics support is crucial for law&lt;br /&gt;
enforcement investigations. Electronic evidence can be collected from a&lt;br /&gt;
wide array of sources, such as computers, smartphones, remote storage,&lt;br /&gt;
unmanned aerial systems, shipborne equipment, and more.&amp;lt;ref name=&amp;quot;interpol&amp;quot;&amp;gt;Interpol, &amp;quot;Digital forensics&amp;quot;. Available: https://www.interpol.int/How-we-work/Innovation/Digital-forensics. [Accessed 28 4 2022].&amp;lt;/ref&amp;gt; &lt;br /&gt;
Investigative process of digital forensics can be divided into several stages. There are four major stages: preservation, collection,&lt;br /&gt;
examination, and analysis. All these four stages need a deep understanding of computers, technology across a broad spectrum, and cybersecurity principles and&lt;br /&gt;
practices, a working knowledge of computers, networks, and coding, in-depth investigative abilities, critical-thinking skills and analytical talent the ability to effectively communicate and work with a&lt;br /&gt;
wide range of people. &amp;lt;ref name=&amp;quot;ecpi&amp;quot;&amp;gt;&amp;quot;Digital forensics&amp;quot;. Available: https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me. [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Mobile device management====&lt;br /&gt;
Mobile device management (MDM) is software that allows IT&lt;br /&gt;
administrators to control, secure and enforce policies on smartphones,&lt;br /&gt;
tablets and other endpoints. Mobile device management software emerged&lt;br /&gt;
in the early 2000s as a way to control and secure the personal digital&lt;br /&gt;
assistants and smartphones that business workers began to use. The&lt;br /&gt;
consumer smartphone boom that started with the launch of the Apple&lt;br /&gt;
iPhone in 2007 led to the bring your own device (BYOD) trend, which&lt;br /&gt;
fueled further interest in MDM.&amp;lt;ref name=&amp;quot;techtarget&amp;quot;&amp;gt;Techtarget, &amp;quot;Mobile Device Management&amp;quot;. Available: https://www.techtarget.com/searchmobilecomputing/definition/mobile-device-management [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Data management====&lt;br /&gt;
Sometimes the data management is neglected, but this part has a&lt;br /&gt;
crucial role when learning for good cyber security practices. Majority&lt;br /&gt;
of cyber security programs include a special courses on data management.&lt;br /&gt;
Data management is a method of organizing and maintaining data processes&lt;br /&gt;
that are required in almost every business operations. The benefits of&lt;br /&gt;
data management can be found accounting, statistics, logistics planning&lt;br /&gt;
and other disciplines including corporate computing.&amp;lt;ref name=&amp;quot;GlobalUni&amp;quot;&amp;gt;Global Universities, &amp;quot;MSc Data Management and Cyber Security&amp;quot;. Available: https://globaluniversities.in/msc-data-management-cyber-security. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Data governance (and management) play a fundamental role in&lt;br /&gt;
protecting an organization’s data. Ensuring that the right people have&lt;br /&gt;
the right access and that appropriate security controls are in place to&lt;br /&gt;
protect each system or service, based on the criticality or sensitivity&lt;br /&gt;
of the data sets these contain. &amp;lt;ref name=&amp;quot;CyberMagazine&amp;quot;&amp;gt;Cyber Security Magazine, &amp;quot;The Role of Data Governance in Cybersecurity&amp;quot;. Available: https://cybersecurity-magazine.com/the-role-of-data-governance-in-cybersecurity/?utm_source=rss&amp;amp;amp;utm_medium=rss&amp;amp;amp;utm_campaign=the-role-of-data-governance-in-cybersecurity. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Application security development====&lt;br /&gt;
Application security describes security measures at the application&lt;br /&gt;
level that aim to prevent data or code within the app from being stolen&lt;br /&gt;
or hijacked. It encompasses the security considerations that happen&lt;br /&gt;
during application development and design, but it also involves systems&lt;br /&gt;
and approaches to protect apps after they get deployed. Application&lt;br /&gt;
security may include hardware, software, and procedures that identify or&lt;br /&gt;
minimize security vulnerabilities.&amp;lt;ref name=&amp;quot;vmware&amp;quot;&amp;gt;VmWare, &amp;quot;What is application security?&amp;quot;. Available: https://www.vmware.com/topics/glossary/content/application-security.html [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Application security development is important to ensure that your&lt;br /&gt;
application is free from coding errors and bugs. And controls the risk&lt;br /&gt;
and helps safeguard against security vulnerabilities. Application&lt;br /&gt;
security development is the process of making applications more secure&lt;br /&gt;
by finding and fixing security vulnerabilities. This is often done by&lt;br /&gt;
enforcing software security best practices and using application&lt;br /&gt;
security testing tools. &lt;br /&gt;
&amp;lt;ref name=&amp;quot;perforce&amp;quot;&amp;gt;Perforce, &amp;quot;Application Security Development Best Practices&amp;quot;. Available: https://www.perforce.com/blog/kw/application-security-development-best-practices. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Audit and compliance knowledge====&lt;br /&gt;
A cyber security audit is designed to be a comprehensive review and&lt;br /&gt;
analysis of your business’s IT infrastructure. It identifies threats and&lt;br /&gt;
vulnerabilities, exposing weaknesses and high-risk practices.&lt;br /&gt;
Regulations such as the EU GDPR (General Data Protection Regulation) can&lt;br /&gt;
impose hefty penalties in the event of a breach that results in&lt;br /&gt;
exploited data. A cyber security audit will help mitigate the&lt;br /&gt;
consequences of a breach and demonstrate that your organization has&lt;br /&gt;
taken the necessary steps to protect client and company data. &amp;lt;ref name=&amp;quot;cyforsecure&amp;quot;&amp;gt;Cyfor Secure, &amp;quot;What is a Cyber Security Audit and how can it help your organisation?&amp;quot;. Available: https://cyforsecure.co.uk/services/cyber-assessment/cyber-security-audit/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cybersecurity compliance is the organizational risk management method&lt;br /&gt;
aligned with pre-defined security measures &amp;amp;amp; controls on how data&lt;br /&gt;
confidentiality is ensured by its administrative procedures.&amp;lt;ref name=&amp;quot;nordlayer&amp;quot;&amp;gt;NordLayer, &amp;quot;Cybersecurity compliance: Everything you need to know&amp;quot;. Available: https://nordlayer.com/blog/cybersecurity-compliance-everything-you-need-to-know/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
All needed skills are developed through courses and certification.&lt;br /&gt;
&lt;br /&gt;
===Entry-Level Incident Response Positions===&lt;br /&gt;
It is not always possible to advance to the position of incident&lt;br /&gt;
responder in a straight line. Many professionals advance from entry- to&lt;br /&gt;
mid-level positions before becoming a real incident responder or a&lt;br /&gt;
member of a computer emergency response team (CERT).&amp;lt;br /&amp;gt;&lt;br /&gt;
These are some examples: &amp;lt;ref name=&amp;quot;Infosec&amp;quot;&amp;gt;Infosec, &amp;quot;Incident Responder Career Roadmap: From Entry Level to Executive&amp;quot;. Available: https://resources.infosecinstitute.com/topic/incident-responder-career-roadmap-entry-level-executive/ [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;network-administrator&amp;quot;&amp;gt;Network administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;This position’s experience will help potential incident responders&lt;br /&gt;
develop networking skills. Attention to detail, as well as the ability&lt;br /&gt;
to sift through system configurations, site layouts, and general network&lt;br /&gt;
and communication setups, are essential in this field.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;system-administrator&amp;quot;&amp;gt;System administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Another crucial beginning point for an incident responder is to learn&lt;br /&gt;
how to manage resources inside your organization as well as user&lt;br /&gt;
behavior. Understanding the potential damage that users, inadequate&lt;br /&gt;
security setups, and ineffective IT policies and procedures can cause on&lt;br /&gt;
your network can provide prospective candidates with insight into the&lt;br /&gt;
human component of an incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;security-administrator&amp;quot;&amp;gt;Security administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In such a position, basic hacking skills, penetration testing, and&lt;br /&gt;
intrusion detection are all learned, which are crucial incident&lt;br /&gt;
responder skills when trying to replicate a breach or attack.&lt;br /&gt;
Understanding the paths a cybercriminal will take when attempting to&lt;br /&gt;
damage or obtain access to a system can greatly simplify the work of&lt;br /&gt;
reverse engineering the incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Mid-Level Incident Response Positions ===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5&lt;br /&gt;
id=&amp;quot;computer-security-incident-response-team-csirt-engineer&amp;quot;&amp;gt;Computer&lt;br /&gt;
security incident response team (CSIRT) engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;cyber-incident-responder&amp;quot;&amp;gt;Cyber incident responder&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-response-engineer&amp;quot;&amp;gt;Incident response&lt;br /&gt;
engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;While each of these positions is different, they generally require&lt;br /&gt;
very similar skills and characteristics in a candidate. At this level,&lt;br /&gt;
personal characteristics such as problem solving, time management, and&lt;br /&gt;
even presentation skills become more crucial as one’s career evolves&lt;br /&gt;
into a management-facing role.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Technical skills include the ability to identify and minimize threats&lt;br /&gt;
while maintaining communication with management and the rest of your&lt;br /&gt;
team. Data analysis and evidence gathering become increasingly crucial,&lt;br /&gt;
and the circumstances in which your services are deployed get more&lt;br /&gt;
serious.&amp;lt;/p&amp;gt;&lt;br /&gt;
Problem-solving skills are crucial at this level of incident&lt;br /&gt;
response, and as the stakes rise, so does the pressure in each&lt;br /&gt;
situation. At this level, programming abilities are essential since&lt;br /&gt;
incident responders may be needed to reverse engineer malicious code or&lt;br /&gt;
even create patches for vulnerable network applications or services. &amp;lt;ref name=&amp;quot;coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated]&amp;quot;. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Senior-Level Incident Response Positions===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;intrusion-detection-specialist&amp;quot;&amp;gt;Intrusion detection&lt;br /&gt;
specialist:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;A CISSP certification might help a potential candidate in preparing&lt;br /&gt;
for the profession. The role of an intrusion detection specialist is to&lt;br /&gt;
find and stop any unwanted communications.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-manager&amp;quot;&amp;gt;Incident manager:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Expected to plan, oversee, manage, and supervise all incident&lt;br /&gt;
response team actions. Is in charge of reporting all current events to&lt;br /&gt;
senior management and stakeholders, as well as acting as the technical&lt;br /&gt;
lead on active incidents for incident responders. Prepares threat and&lt;br /&gt;
impact assessments and reports them known to management.&amp;lt;ref name=&amp;quot;coursera&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Certificates== &lt;br /&gt;
There is a vast number of different certificates and the road map to&lt;br /&gt;
being a certified professional could be very different&amp;lt;ref name=&amp;quot;Coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated],&amp;quot; [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;NICCS&amp;quot;&amp;gt;NICCS, &amp;quot;Cybersecurity Certifications,&amp;quot; [Online]. Available: hhttps://niccs.cisa.gov/about-niccs/cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt; . One possible&lt;br /&gt;
approach is to start with basic certificates from the different branches&lt;br /&gt;
of service and move to more specific and demanding focused&lt;br /&gt;
certification. Also, some jobs require certain clearances, either from&lt;br /&gt;
industry, or from the government. One small selection of different&lt;br /&gt;
possible certificates is brought out in following paragraphs.&lt;br /&gt;
&lt;br /&gt;
Security+ is a CompTIA certification that is considered a basic cert&lt;br /&gt;
among cybersecurity professionals. It covers the topics of risk&lt;br /&gt;
management and threat assessment.&lt;br /&gt;
Network+ is also offered by CompTIA this certification (like the name&lt;br /&gt;
implies) focuses on networking infrastructure and operations. It is&lt;br /&gt;
considered a foundational certification.&lt;br /&gt;
The Certified Information Systems Security Professional (CISSP) is a&lt;br /&gt;
more advanced certification designed for cybersecurity professionals&lt;br /&gt;
with at least five years of work experience. The certification covers&lt;br /&gt;
topics such as architecture, engineering, and management.&amp;lt;/p&amp;gt;&lt;br /&gt;
The Certified Ethical Hacker (CEH) certification is also considered a&lt;br /&gt;
more advanced cert because it generally requires that applicants have&lt;br /&gt;
multiple years of work experience. The goal of an ethical hacker&lt;br /&gt;
certification is to be able to understand how cyber attacks unfold in&lt;br /&gt;
order to improve threat assessment and mitigation skills.&amp;lt;ref name=&amp;quot;cyberguide&amp;quot;&amp;gt;Cybersecurity Guide, &amp;quot;How to become a cybersecurity specialist&amp;quot;, [Online]. Available: https://cybersecurityguide.org/careers/security-specialist/. [Accessed 27 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
This is definitely not all, when one looks for more information, following link could be searched, to get more in depth knowledge about&lt;br /&gt;
different possibilities. Hereby, with the help of this matrix a possible taxonomy of different 436 listed certificates in branches are&lt;br /&gt;
presented.&amp;lt;ref name=&amp;quot;Pauljeremy&amp;quot;&amp;gt;&amp;quot;Cybersecurity Roadmap,&amp;quot; [Online]. Available: https://pauljerimy.com/2020/10/12/scr-oct-2020-update/. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:analystimage5.png|1000px|thumb|Certificate matrix &amp;lt;ref&amp;gt;&amp;quot;Certification roadmap&amp;quot;. Available at https://pauljerimy.com/security-certification-roadmap&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
=== Communication and Network Security===&lt;br /&gt;
Communication and network security covers the ability to secure&lt;br /&gt;
communication channels and networks. Topics include secure and converges&lt;br /&gt;
protocols, wireless networks, cellular networks, hardware operations&lt;br /&gt;
(warranty and redundant power), and third-party connectivity. IP&lt;br /&gt;
networking are also included in this domain.&lt;br /&gt;
===Identity and Access Management===&lt;br /&gt;
The identity and access management domain covers the attacks that&lt;br /&gt;
target the human gateway to gain access to data. Other topics include&lt;br /&gt;
ways to identify users with rights to access the information and&lt;br /&gt;
servers. Identity and access management covers the topics of&lt;br /&gt;
applications, Single sign-on authentication, privilege escalation,&lt;br /&gt;
Kerberos, rule-based or risk-based access control, proofing and&lt;br /&gt;
establishment of identity.&lt;br /&gt;
===Security Architecture and Engineering===&lt;br /&gt;
The security architecture and engineering domain covers important&lt;br /&gt;
topics concerning security engineering plans, designs and principles,&lt;br /&gt;
Topics include assessing and mitigating information system&lt;br /&gt;
vulnerabilities, fundamental concepts of security models and security&lt;br /&gt;
architectures in critical areas like access control. Cloud systems,&lt;br /&gt;
cryptography, system infiltrations (ransomware, fault-injection and&lt;br /&gt;
more) and virtualized systems are also covered in this domain.&lt;br /&gt;
===Asset Security===&lt;br /&gt;
The Asset Security domain deals with the issues related to the&lt;br /&gt;
collection, storage, maintenance, retention and destruction of data. It&lt;br /&gt;
also covers knowledge of different roles regarding data handling (owner,&lt;br /&gt;
controller and custodian) as well as data protection methods and data&lt;br /&gt;
states. Other topics include resource provision, asset classification&lt;br /&gt;
and data lifecycle management.&lt;br /&gt;
===Security and Risk Management===&lt;br /&gt;
The security and risk management domain covers general on skills&lt;br /&gt;
related to the implementation of user awareness programs as well as&lt;br /&gt;
security procedures. Emphasis is also placed on risk management&lt;br /&gt;
concerning the acquisition of new services, hardware and software&lt;br /&gt;
(supply chain). Other skills include social engineering defense&lt;br /&gt;
mechanisms.&lt;br /&gt;
===Security Assessment and Testing===&lt;br /&gt;
The security assessment and testing domain deals with all the&lt;br /&gt;
techniques and tools used to find system vulnerabilities, weaknesses and&lt;br /&gt;
potential areas of concern not addressed by security procedures and&lt;br /&gt;
policies. Attack simulations, vulnerability assessment, compliance&lt;br /&gt;
checks, and ethical disclosure also fall under this domain.&lt;br /&gt;
===Software Security===&lt;br /&gt;
The software development security domain deals with implementing&lt;br /&gt;
software-based security protocols within environment for which the IT&lt;br /&gt;
professional is responsible. Risk analysis, vulnerability identification&lt;br /&gt;
and auditing of source codes are all covered in this subset. Additional&lt;br /&gt;
topics include software-designed security, maturity models, development&lt;br /&gt;
methodologies, open-source and third-party development security.&lt;br /&gt;
===Security operations===&lt;br /&gt;
The security operations domain covers topics ranging from&lt;br /&gt;
investigations and digital forensic to detection and intrusion&lt;br /&gt;
prevention tools, sandboxing and firewalls. Topics include user and&lt;br /&gt;
entity behavior analytics, threat intelligence (threat hunting and&lt;br /&gt;
threat feeds) log management, artifacts (mobile, computer and network),&lt;br /&gt;
machine learning and AI-based tools, penetration testing, and&lt;br /&gt;
exploitation development. These for sub-domains are lister here.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Incident Handling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Penetration Testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Exploitation&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Education==&lt;br /&gt;
[[File:Analystimage7.png|400px|thumb|Comparison degree vs Certificate &amp;lt;ref&amp;gt;&amp;quot;Comparison Table&amp;quot;. Available at https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
The entry level monitoring specialist is hired by Estonian&lt;br /&gt;
Information System Authority even if there is no formal IT education,&lt;br /&gt;
but readiness to learn and moderate knowledge of different operation&lt;br /&gt;
systems is enough to start the career. &amp;lt;ref name=&amp;quot;cv&amp;quot;&amp;gt;cv.ee, &amp;quot;SEIRESPETSIALIST - tule Eesti küberruumi valvuriks!&amp;quot;. Available: https://www.cv.ee/en/vacancy/792782/riigi-infosusteemi-amet/seirespetsialist-tule-eesti-kuberruumi-valvuriks [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Nevertheless, like most other high qualification careers jobs falling&lt;br /&gt;
under the cybersecurity specialist category require some form of formal&lt;br /&gt;
education. However, since cybersecurity specialist jobs can fall across&lt;br /&gt;
a wide spectrum of job descriptions and responsibilities, it is possible&lt;br /&gt;
to obtain a specialist job after completing many levels of different&lt;br /&gt;
computer related education.&lt;br /&gt;
&lt;br /&gt;
If one is looking for a cybersecurity related education, for example&lt;br /&gt;
in EU, 137 courses/programs could be found that relate to keyword IT or&lt;br /&gt;
cybersecurity. &amp;lt;ref name=&amp;quot;enisa&amp;quot;&amp;gt;ENISA (European Union Agency for Cybersecurity), &amp;quot;Cybersecurity Education-Cybersecurity Higher Education Database&amp;quot;. Available: https://www.enisa.europa.eu/topics/cybersecurity-education/education-map/education-courses [Accessed 26 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Also, there is a great amount of discussion, if cyber security&lt;br /&gt;
professional should have a degree or would be certification just enough.&lt;br /&gt;
One interesting table is produces by Franklin University that compares&lt;br /&gt;
benefits and/or drawbacks of each type of credential.&amp;lt;ref name=&amp;quot;franklin&amp;quot;&amp;gt;Franklin University, &amp;quot;Is Getting a Master&#039;s Degree in Cyber Security Worth It?&amp;quot;. Available: https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Certifications are generally good for people with little practical&lt;br /&gt;
experience because they are known quantities in the industry and can&lt;br /&gt;
help you get your foot in the door. They set a minimum knowledge bar.&lt;br /&gt;
But some certifications are viewed more favorably than others.&lt;br /&gt;
Certifications with renewal requirements are viewed better by hiring&lt;br /&gt;
managers, but they also more costly in the long run because of the need&lt;br /&gt;
for continuing education. Certifications are also good for showing&lt;br /&gt;
in-depth expertise in a specialization within cybersecurity. Depending&lt;br /&gt;
on your career goals, it may be advantageous to have a master’s&lt;br /&gt;
degree—which shows your breadth of knowledge, critical thinking and&lt;br /&gt;
leadership skills—and a certificate—which shows specific skill&lt;br /&gt;
competency.&amp;lt;ref name=&amp;quot;franklin&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
As IT (Cyber) Security is still a relatively young discipline,&lt;br /&gt;
universities and colleges are still figuring out which is the best&lt;br /&gt;
approach for their degrees. Study programmes and curricula in Cyber&lt;br /&gt;
Security are different. In general, here are the duration of Cyber&lt;br /&gt;
Security degrees:&lt;br /&gt;
&amp;lt;ref name=&amp;quot;studyportal&amp;quot;&amp;gt;Studyportals, &amp;quot;Why You Should Study a Cyber Security Degree in 2022&amp;quot;. Available: https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Bachelor’s degrees in Cyber Security take 3 or 4 years in most&lt;br /&gt;
countries.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Master’s courses in Cyber Security take between 1-2 years to&lt;br /&gt;
complete.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;PhD programmes in Cyber Security last 3-5 years. Some only take 1&lt;br /&gt;
or 2 years, but they are less common.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Generalization could me made that on bachelor level the general&lt;br /&gt;
knowledge about the cyber issues are obtained. On master level the&lt;br /&gt;
specialization courses are taken and the person can choose more specific&lt;br /&gt;
topics to study. It is on master level where strengths of the cyber&lt;br /&gt;
specialist can be developed further and up-do date knowledge obtained in&lt;br /&gt;
specifics. PhD is serious science and involves teaching, lot of&lt;br /&gt;
scientific work and writing for publications.&lt;br /&gt;
&lt;br /&gt;
==Salary==&lt;br /&gt;
&amp;lt;p&amp;gt;Even if the salary can be very different, compared to the skills and&lt;br /&gt;
experience, an generalization can be made. Cyber Security professionals&lt;br /&gt;
in CSIRT, and in other entities earn quite well, from the start. First,&lt;br /&gt;
some comparison from the United States. The average CSIRT analyst salary&lt;br /&gt;
in the USA is $97,500 per year or $50 per hour. Entry level positions&lt;br /&gt;
start at $48,875 per year while most experienced workers make up to&lt;br /&gt;
$135,373 per year.&amp;lt;ref name=&amp;quot;talent&amp;quot;&amp;gt;talent.com, &amp;quot;Csirt Analyst average salary in USA 2022&amp;quot;. Available: https://www.talent.com/salary?job=csirt+analyst [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There are multiple positions you can occupy in this field. They have&lt;br /&gt;
in common great salaries and high demand for technical skills, attention&lt;br /&gt;
to details, problem-solving mentality, and the ability to analyze risks.&lt;br /&gt;
Here are the average annual salaries in the United States, according to&lt;br /&gt;
Payscale: &amp;lt;ref name=&amp;quot;studyportal&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Cryptographer – 100,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Information Security Officer – 91,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Assessor – 90,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Engineer – 88,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Penetration Tester – 81,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Forensics Expert – 71,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Administrator – 65,000 USD&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
When looking into salaries in Estonia, one can find that there is a&lt;br /&gt;
discussion that private sector is taking a toll from the public sector,&lt;br /&gt;
and that the salaries in important agencies, as Information System&lt;br /&gt;
Authority loose their employees to the better paid positions in private&lt;br /&gt;
sector.&amp;lt;ref name=&amp;quot;digigeenius&amp;quot;&amp;gt;DiGi Geenius, &amp;quot;Kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad&amp;quot;. Available: https://digi.geenius.ee/rubriik/uudis/kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad/ [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;tehnika&amp;quot;&amp;gt;Postimees, &amp;quot;Riigi-it-tootajate-palgamaarad-kasvasid&amp;quot;. Available: https://tehnika.postimees.ee/6887428/riigi-it-tootajate-palgamaarad-kasvasid [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
But there is also a different view that average private sector worker&lt;br /&gt;
could be hired as a top specialist in public sector and then the payment&lt;br /&gt;
is higher. Nevertheless, it seems that the average payment in cyber&lt;br /&gt;
security sector is any way higher that in other parts of the&lt;br /&gt;
e-services. &amp;lt;ref name=&amp;quot;digigeenius2&amp;quot;&amp;gt;DiGi Geenius, &amp;quot;5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka&amp;quot;. Available: https://digi.geenius.ee/rubriik/uudis/5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==SOC==&lt;br /&gt;
&amp;lt;p&amp;gt;A SOC is a facility where an organization’s network, applications,&lt;br /&gt;
and endpoints are monitored and defended. The term was adapted from&lt;br /&gt;
network operations centers (NOCs), where large telecommunication or&lt;br /&gt;
corporate networks are monitored. When network security became more of a&lt;br /&gt;
concern, security teams were formed within the NOCs, and eventually spun&lt;br /&gt;
off into larger organizations of their own as the responsibilities of&lt;br /&gt;
security teams grew increasingly complex and specialized. The security&lt;br /&gt;
staff working in a security operations center are often called the SOC&lt;br /&gt;
team.&amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;Exabeam, &amp;quot;CSIRT&amp;quot;. Available: https://www.exabeam.com/incident-response/csirt/ [Accessed 28 APr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;Functions of the SOC team include, but are not limited to:&amp;lt;ref name=&amp;quot;trellix&amp;quot;&amp;gt;Trellix, &amp;quot;What Is a Security Operations Center (SOC)?&amp;quot;. Available: https://www.trellix.com/en-us/security-awareness/operations/what-is-soc.html [Accessed 30 APr 2022].&amp;lt;/ref&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ol type=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Taking inventory of resources, to get a better understanding of the&lt;br /&gt;
structure they are protecting.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintanence of the system, by constantly making updates and adding&lt;br /&gt;
safeguards.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Monitoring the network for abnormalities with special tools.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Threat analysis of new attacks and vulnerabilities.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Responding to attacks, by acting as “first responders”. The SOC team&lt;br /&gt;
will shut down and/or isolate endpoints, deleting files and lowering the&lt;br /&gt;
impact as fast as possible.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Recovery of system stability and lost data. This may be done using&lt;br /&gt;
backups, restarting endpoints or reconfiguring systems.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Logging all actions on the system, to be later used for analysis or&lt;br /&gt;
forensics after an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigating the root cause of an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Auditing their own actions, to be in line with regulations of the&lt;br /&gt;
organization, industry or governing body.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==CSIRT==&lt;br /&gt;
&amp;lt;p&amp;gt;A CSIRT is a group that responds to security incidents when they&lt;br /&gt;
occur. Key responsibilities of a CSIRT include: &lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
===Creating and maintaining an incident response plan (IRP)===&lt;br /&gt;
An incident response plan (IRP) is a set of written instructions for&lt;br /&gt;
detecting, responding to and limiting the effects of an information&lt;br /&gt;
security event. Incident response plans provide instructions for&lt;br /&gt;
responding to many potential scenarios, including data breaches, denial&lt;br /&gt;
of service/distributed denial of service attacks, firewall breaches,&lt;br /&gt;
virus or malware outbreaks or insider threats. Without an incident&lt;br /&gt;
response plan in place, organizations may either not detect the attack&lt;br /&gt;
in the first place, or not follow proper protocol to contain the threat&lt;br /&gt;
and recover from it when a breach is detected.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.stratacore.com/incidentresponseplan&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
===Investigating and analyzing incidents===&lt;br /&gt;
CSIRTs are also involved in improvement activities. After major&lt;br /&gt;
computer security incidents occur, or when incidents are not handled in&lt;br /&gt;
a timely or effective manner, a CSIRT will generally perform a&lt;br /&gt;
postmortem of the incident and its response. This postmortem will&lt;br /&gt;
identify the strengths and weakness of the response effort. Such reviews&lt;br /&gt;
can identify weaknesses and holes in systems, infrastructure defenses,&lt;br /&gt;
or policies that allowed the incident to take place. It can also&lt;br /&gt;
identify problems with communication channels, interfaces, and&lt;br /&gt;
procedures that inhibited the efficient resolution of the reported&lt;br /&gt;
problem.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.cisa.gov/uscert/bsi/articles/best-practices/incident-management/defining-computer-security-incident-response-teams&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Managing internal communications and updates during or immediately after incidents occur===&lt;br /&gt;
===Communicating with employees, shareholders, customers, and the press about incidents as needed===&lt;br /&gt;
&amp;lt;p&amp;gt;There are various services within the CSIRT Services Framework that&lt;br /&gt;
address communications, as they relate to security operations and&lt;br /&gt;
incident response services. Some of these include Information Security&lt;br /&gt;
Incident Coordination, Crisis Management Support, Vulnerability&lt;br /&gt;
Disclosure, Situational Awareness Communication, and Awareness Building,&lt;br /&gt;
to name a few. Sharing information and communicating with the general&lt;br /&gt;
public and/or your constituency is appropriate in many different&lt;br /&gt;
scenarios. These can range from proactive communications to reactive&lt;br /&gt;
communications. Each scenario may be unique, and careful consideration&lt;br /&gt;
should be given to when to release information to the public and what&lt;br /&gt;
information should be released.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;https://resources.sei.cmu.edu/asset_files/Handbook/2021_002_001_651819.pdf&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Remediating incidents===&lt;br /&gt;
Threat remediation is a strong and capable tool for fighting the&lt;br /&gt;
cyber security compromises. As the word ‘remedy’ suggests, remediation&lt;br /&gt;
process involves the treatment of a security breach. With the&lt;br /&gt;
remediation practices, your cyber security team is able to eliminate&lt;br /&gt;
suspicious activities and malicious attacks in the form of malware,&lt;br /&gt;
ransomware, phishing and such. Even if you ‘kill’ the suspicious&lt;br /&gt;
activity, the attackers can remain in your systems. If you want to&lt;br /&gt;
contaminate and end the problem for good, your remediation processes&lt;br /&gt;
must involve the detection of the cause. &amp;lt;ref name=&amp;quot;logsign&amp;quot;&amp;gt;Logsign, &amp;quot;What-is-remediation-in-cyber-security&amp;quot;. Available: https://www.logsign.com/blog/what-is-remediation-in-cyber-security/. [Accessed 28 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Recommending technology, policy, governance, and training changes after security incidents===&lt;br /&gt;
After all these actions, the SCIRT must contribute to the development&lt;br /&gt;
of better policies, practices and has to recommend improvements. They&lt;br /&gt;
are not working in the vacuum and their work has to create new and&lt;br /&gt;
better standards for cyber security. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;Exabeam, &amp;quot;CSIRT&amp;quot;. Available: https://www.exabeam.com/incident-response/csirt/ [Accessed 28 APr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==CERT==&lt;br /&gt;
&amp;lt;p&amp;gt;The term “computer emergency response team” was coined in 1988. In&lt;br /&gt;
response to the Morris worm attack that impacted thousands of servers on&lt;br /&gt;
the Internet, DARPA funded the formation of the Computer Emergency&lt;br /&gt;
Response Team Coordination Center (CERT-CC) at Carnegie Mellon&lt;br /&gt;
University. The goal of CERT-CC was to help protect the internet by&lt;br /&gt;
collecting and disseminating information on critical security&lt;br /&gt;
vulnerabilities. Several other countries formed similar centers using&lt;br /&gt;
the same acronym (despite threats of legal action by Carnegie Mellon for&lt;br /&gt;
trademark infringement). Now the term CERT refers to any emergency&lt;br /&gt;
response team that deals with cyber threats. Many people use CERT-CC&lt;br /&gt;
interchangeably with CSIRT, though the charter of a CERT is information&lt;br /&gt;
sharing in order to help other response teams respond to threats against&lt;br /&gt;
their own infrastructure.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In general, the designation of CERT is helpful in applying real-world&lt;br /&gt;
solutions to various cybersecurity problems. They may be government&lt;br /&gt;
contractors or employees of a major corporation. For example, the U.S.&lt;br /&gt;
Computer Emergency Readiness Team (US-CERT) operates under the U.S.&lt;br /&gt;
Department of Homeland Security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.techopedia.com/definition/31003/computer-emergency-response-team-cert&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In Estonia CERT is designated as CERT-EE. It was established in 2006,&lt;br /&gt;
as an organization responsible for the management of security incidents&lt;br /&gt;
in .ee computer networks. It is also a national contact point for&lt;br /&gt;
international co-operation in the field of IT security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ria.ee/en/cyber-security/cert-ee.html&amp;lt;/p&amp;gt;&lt;br /&gt;
===Difference between SOC/CSIRT/CERT===&lt;br /&gt;
&amp;lt;p&amp;gt;How CSIRTs differ from CERTs and SOCs There are overlapping&lt;br /&gt;
responsibilities between a community emergency response team (CERT),&lt;br /&gt;
computer security incident response team (CSIRT), and security&lt;br /&gt;
operations center (SOC). To add to this confusion, frequently, the terms&lt;br /&gt;
CERT and CSIRT are used interchangeably, despite the important&lt;br /&gt;
differences.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image3.png&amp;quot; alt=&amp;quot;Overlapping in images/image3.png&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;Overlapping in&lt;br /&gt;
images/image3.png&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
==Understand the primary roles and characteristics of a CERT, CSIRT, and SOC.==&lt;br /&gt;
&amp;lt;p&amp;gt;So, using strict definitions, a CERT collects and disseminates&lt;br /&gt;
security information, typically for the benefit of a country or an&lt;br /&gt;
industry. A CSIRT is a cross-functional team that responds to incidents&lt;br /&gt;
on behalf of a country or an organization. A SOC is where a country or&lt;br /&gt;
organization monitors and defends its network, servers, applications,&lt;br /&gt;
and endpoints.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image4.png&amp;quot; alt=&amp;quot;table of explanation images/image4&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;table of explanation&lt;br /&gt;
images/image4&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
==Future==&lt;br /&gt;
&amp;lt;p&amp;gt;And the Cyber security problem is only getting bigger. According to a&lt;br /&gt;
report published by Accenture, the number of cyber security breaches&lt;br /&gt;
increased by 11 percent from 2017 to 2018. The cost of such breaches is&lt;br /&gt;
astronomical–about $600 billion worldwide, according to the Economic&lt;br /&gt;
Impact of Cybercrime report.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Job projections for cybersecurity are staggering. The Bureau of Labor&lt;br /&gt;
Statistics in US predicts that careers in the cybersecurity field will&lt;br /&gt;
grow by 32% by 2028. That makes cybersecurity one of the top 10&lt;br /&gt;
fastest-growing jobs in the country. In the United States alone, jobs&lt;br /&gt;
for Information Security Analysts are expected to grow by 15% by&lt;br /&gt;
2024.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Most likely this trend is also similar in other countries.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When checking Estonian job portals, there is a constant need for&lt;br /&gt;
people for cyber security related positions. Also, linkedin search gives&lt;br /&gt;
approximately 30 vacancies immediately. There are banks, logistics&lt;br /&gt;
companies, e-shops, and software producers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://ee.linkedin.com/jobs/cyber-security-jobs?countryRedirected=1&amp;amp;amp;position=1&amp;amp;amp;pageNum=0&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Trends that affect companies create need for constant cyber security&lt;br /&gt;
services. Increasing number of home/remote offices require secure&lt;br /&gt;
corporate networks and security of remote devices. One example is from&lt;br /&gt;
this year, when sloppy remote desktop set-up paralyzed systems of 17&lt;br /&gt;
companies.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.aripaev.ee/uudised/2022/04/20/ria-lohakas-kaugtoolaua-seadistus-halvas-martsis-vahemalt-17-juhul-ettevotete-it-susteemid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Also, no service can exists without robust infrastructure - servers,&lt;br /&gt;
databases, applications. As all previously mentioned devices and&lt;br /&gt;
services are at constant scanning and surveillance. So, the breach&lt;br /&gt;
detection and immediate action demands 24/7 services. Even if lot of&lt;br /&gt;
things could be automated, there is a need for human specialists (at&lt;br /&gt;
least, at the moment). Third growing field is also a forensic&lt;br /&gt;
investigation, as every attack must be investigated in order to be ready&lt;br /&gt;
to repel next attacks. So data recovery and evidence collection is&lt;br /&gt;
another important field of work that need skilled and professional&lt;br /&gt;
workers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Even, if the specifics of the entity, be it CSIRT, CERT or SOC, are&lt;br /&gt;
different, the fundamentals of the work are the same. Professional&lt;br /&gt;
knowledge of the networks, operational systems, hardware, scripting, and&lt;br /&gt;
several other wider IT related knowledge is needed. As there is no&lt;br /&gt;
single way to reach to it, every single person can find one’s strongest&lt;br /&gt;
sides and develop them with knowledge of weaker side, in order to know,&lt;br /&gt;
when to as for help.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/body&amp;gt;&lt;br /&gt;
&amp;lt;/html&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mavald</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142224</id>
		<title>Hiring a Cyber Security Incident Analyst</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142224"/>
		<updated>2022-05-01T15:45:31Z</updated>

		<summary type="html">&lt;p&gt;Mavald: /* Salary */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==A Cyber Security Incident Analyst==&lt;br /&gt;
&lt;br /&gt;
[[File:image1.png|600px|thumb|Job advertisement &amp;lt;ref&amp;gt;&amp;quot;Job Advertisement&amp;quot;. Available at https://www.projectpeople.com/jobs/&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
===Cyber security incident analyst in SOC/CSIRT/CERT===&lt;br /&gt;
This article delves into the job title of Cyber Security Incident&lt;br /&gt;
Analyst and provides an overview of the acronyms SOC/CSIRT/CERT. A brief&lt;br /&gt;
history of the job is discussed here, as well as a possible career path,&lt;br /&gt;
education, experience, and other characteristics required for work in&lt;br /&gt;
computer security-related organizations. The article also provides a&lt;br /&gt;
brief history of SOC/CSIRT/CERT, as well as a comparison of their&lt;br /&gt;
differences and similarities.&lt;br /&gt;
===Cyber Security Incident Analyst Skill Set===&lt;br /&gt;
What skill set is expected from the Cyber Security Incident Analyst? Below written lines are taken from the same job advertisement depicted&lt;br /&gt;
on the left side of this article:&lt;br /&gt;
As a Security Incident Analyst your responsibilities will include:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Continuous monitoring of security tooling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Performing regular and ad-hoc vulnerability assessments&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Carrying out ‘spot checks’&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Reporting vulnerabilities to the PVG via the alerts system&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintaining and documenting logging systems&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Developing centralized logging, reporting and intelligence&lt;br /&gt;
platforms&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;‘Light touch’ penetration testing with open source tooling&lt;br /&gt;
(Metasploit)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Knowledge &amp;amp;amp; Experience required:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;SOC, CSIRT or CERT operational environment experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Windows / Linux experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TCP /IP networking protocol knowledge&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience reviewing and analyzing Security Events from various&lt;br /&gt;
monitoring and logging sources&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience in website and web application security assessment or&lt;br /&gt;
penetration testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience of using Metasploit&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Scripting knowledge using BASH, Python, Perl, Ruby&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Skills in Host and Network Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
As one can see the description of the duties is wide and also the&lt;br /&gt;
knowledge and experience that is required is noteworthy. So, where to&lt;br /&gt;
start to find out the way to get this kind of knowledge and&lt;br /&gt;
expertize.&lt;br /&gt;
===Possible career path===&lt;br /&gt;
Next part of the paper is aiming to depict a possible ways, how to&lt;br /&gt;
develop oneself, and move along the career pathway in cybersecurity&lt;br /&gt;
field. Topics of development, education, experience and certification&lt;br /&gt;
are covered.&lt;br /&gt;
[[File:analystimage2.png|1000px|thumb|Career path &amp;lt;ref&amp;gt;&amp;quot;Possible Career Path&amp;quot;. Available at https://www.cyberseek.org/pathway.html&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
===Junior/Senior===&lt;br /&gt;
Start with an entry-level job in IT. Hands-on experience is often the&lt;br /&gt;
most effective way to prepare for certification exams. Start&lt;br /&gt;
accumulating work experience with an entry-level role as a cybersecurity&lt;br /&gt;
analyst. Many cybersecurity professionals start off in more general IT&lt;br /&gt;
roles. The skills, practices, and technologies you’ll use as a&lt;br /&gt;
cybersecurity professional will continue to evolve along with computer&lt;br /&gt;
and network technology. The desire to learn, ability to problem solve,&lt;br /&gt;
and attention to detail will serve you well in this field. Other, more&lt;br /&gt;
technical skills and technologies to learn include:&amp;lt;ref name=&amp;quot;certification&amp;quot;&amp;gt;Popular Cyber Security Certificates [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications  [Accessed 25 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====SIEM tools (security information and event management)====&lt;br /&gt;
Security Information and Event Management (SIEM) is a set of tools&lt;br /&gt;
and services offering a holistic view of an organization’s information&lt;br /&gt;
security. SIEM works by combining two technologies:&lt;br /&gt;
&amp;lt;li&amp;gt;Security information management (SIM), which collects data from log&lt;br /&gt;
files for analysis and reports on security threats and events, and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;security event management (SEM), which conducts real-time system&lt;br /&gt;
monitoring, notifies network admins about important issues and&lt;br /&gt;
establishes correlations between security events. There are a number of&lt;br /&gt;
security information and event management solutions on the market.&lt;br /&gt;
ArcSight ESM, IBM QRadar and Splunk are among the most popular. &amp;lt;ref name=&amp;quot;SIEM&amp;quot;&amp;gt;Application security, SIEM [Online]. Available: https://www.imperva.com/learn/application-security/siem/. [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Firewalls, Intrusion Detection Systems (IDS), and Intrusion Prevention Systems(IPS)====&lt;br /&gt;
Firewalls can be two types, hardware and software firewalls. Software&lt;br /&gt;
firewall is a firewall that is installed on a computer or server, and&lt;br /&gt;
tasked with network security. It works with a wide variety of other&lt;br /&gt;
technology security solutions to provide more robust and cohesive&lt;br /&gt;
security for enterprises of all sizes. When a software firewall is&lt;br /&gt;
installed on a server, it opens up like an umbrella of protection over&lt;br /&gt;
all other computers connected to the network. It is able to monitor both&lt;br /&gt;
incoming and outgoing traffic for potential risk or suspicious user&lt;br /&gt;
behavior, and also makes setting security policies much easier, faster&lt;br /&gt;
and more flexible. Hardware firewall is positioned between the network&lt;br /&gt;
and devices, allowing traffic to funnel through the firewall for a close&lt;br /&gt;
inspection and analysis. A hardware firewall, a term often&lt;br /&gt;
interchangeable with network or next-generation firewall, protects the&lt;br /&gt;
network gateways for an enterprise. Hardware firewall is physical&lt;br /&gt;
hardware, installed between network elements and connected devices, and&lt;br /&gt;
is tasked with filtering traffic for cyber threat to the network or&lt;br /&gt;
devices. Filtering out unauthorized or suspicious users based on traffic&lt;br /&gt;
analysis is one of the biggest benefits of hardware firewall. &amp;lt;ref name=&amp;quot;sangfor&amp;quot;&amp;gt;Sangfor, &amp;quot;What is Software Firewall? Difference between Hardware Firewall and Software Firewall, [Online]. Available: https://www.sangfor.com/blog/cybersecurity/what-is-software-firewall-difference-between-hardware-firewall-and-software-firewall [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems&lt;br /&gt;
(IPS) are both parts of the network infrastructure. IDS/IPS compare&lt;br /&gt;
network packets to a cyberthreat database containing known signatures of&lt;br /&gt;
cyberattacks — and flag any matching packets. IDS doesn’t alter the&lt;br /&gt;
network packets in any way, whereas IPS prevents the packet from&lt;br /&gt;
delivery based on the contents of the packet, much like how a firewall&lt;br /&gt;
prevents traffic by IP address. &amp;lt;ref name=&amp;quot;Varonis&amp;quot;&amp;gt;Varonis, &amp;quot;What is Software Firewall? IDS vs. IPS: What is the Difference?, [Online]. Available: https://www.varonis.com/blog/ids-vs-ips [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Digital forensics====&lt;br /&gt;
Digital forensics is a branch of forensic science that focuses on&lt;br /&gt;
identifying, acquiring, processing, analyzing, and reporting on data&lt;br /&gt;
stored electronically. Electronic evidence is a component of almost all&lt;br /&gt;
criminal activities and digital forensics support is crucial for law&lt;br /&gt;
enforcement investigations. Electronic evidence can be collected from a&lt;br /&gt;
wide array of sources, such as computers, smartphones, remote storage,&lt;br /&gt;
unmanned aerial systems, shipborne equipment, and more.&amp;lt;ref name=&amp;quot;interpol&amp;quot;&amp;gt;Interpol, &amp;quot;Digital forensics&amp;quot;. Available: https://www.interpol.int/How-we-work/Innovation/Digital-forensics. [Accessed 28 4 2022].&amp;lt;/ref&amp;gt; &lt;br /&gt;
Investigative process of digital forensics can be divided into several stages. There are four major stages: preservation, collection,&lt;br /&gt;
examination, and analysis. All these four stages need a deep understanding of computers, technology across a broad spectrum, and cybersecurity principles and&lt;br /&gt;
practices, a working knowledge of computers, networks, and coding, in-depth investigative abilities, critical-thinking skills and analytical talent the ability to effectively communicate and work with a&lt;br /&gt;
wide range of people. &amp;lt;ref name=&amp;quot;ecpi&amp;quot;&amp;gt;&amp;quot;Digital forensics&amp;quot;. Available: https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me. [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Mobile device management====&lt;br /&gt;
Mobile device management (MDM) is software that allows IT&lt;br /&gt;
administrators to control, secure and enforce policies on smartphones,&lt;br /&gt;
tablets and other endpoints. Mobile device management software emerged&lt;br /&gt;
in the early 2000s as a way to control and secure the personal digital&lt;br /&gt;
assistants and smartphones that business workers began to use. The&lt;br /&gt;
consumer smartphone boom that started with the launch of the Apple&lt;br /&gt;
iPhone in 2007 led to the bring your own device (BYOD) trend, which&lt;br /&gt;
fueled further interest in MDM.&amp;lt;ref name=&amp;quot;techtarget&amp;quot;&amp;gt;Techtarget, &amp;quot;Mobile Device Management&amp;quot;. Available: https://www.techtarget.com/searchmobilecomputing/definition/mobile-device-management [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Data management====&lt;br /&gt;
Sometimes the data management is neglected, but this part has a&lt;br /&gt;
crucial role when learning for good cyber security practices. Majority&lt;br /&gt;
of cyber security programs include a special courses on data management.&lt;br /&gt;
Data management is a method of organizing and maintaining data processes&lt;br /&gt;
that are required in almost every business operations. The benefits of&lt;br /&gt;
data management can be found accounting, statistics, logistics planning&lt;br /&gt;
and other disciplines including corporate computing.&amp;lt;ref name=&amp;quot;GlobalUni&amp;quot;&amp;gt;Global Universities, &amp;quot;MSc Data Management and Cyber Security&amp;quot;. Available: https://globaluniversities.in/msc-data-management-cyber-security. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Data governance (and management) play a fundamental role in&lt;br /&gt;
protecting an organization’s data. Ensuring that the right people have&lt;br /&gt;
the right access and that appropriate security controls are in place to&lt;br /&gt;
protect each system or service, based on the criticality or sensitivity&lt;br /&gt;
of the data sets these contain. &amp;lt;ref name=&amp;quot;CyberMagazine&amp;quot;&amp;gt;Cyber Security Magazine, &amp;quot;The Role of Data Governance in Cybersecurity&amp;quot;. Available: https://cybersecurity-magazine.com/the-role-of-data-governance-in-cybersecurity/?utm_source=rss&amp;amp;amp;utm_medium=rss&amp;amp;amp;utm_campaign=the-role-of-data-governance-in-cybersecurity. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Application security development====&lt;br /&gt;
Application security describes security measures at the application&lt;br /&gt;
level that aim to prevent data or code within the app from being stolen&lt;br /&gt;
or hijacked. It encompasses the security considerations that happen&lt;br /&gt;
during application development and design, but it also involves systems&lt;br /&gt;
and approaches to protect apps after they get deployed. Application&lt;br /&gt;
security may include hardware, software, and procedures that identify or&lt;br /&gt;
minimize security vulnerabilities.&amp;lt;ref name=&amp;quot;vmware&amp;quot;&amp;gt;VmWare, &amp;quot;What is application security?&amp;quot;. Available: https://www.vmware.com/topics/glossary/content/application-security.html [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Application security development is important to ensure that your&lt;br /&gt;
application is free from coding errors and bugs. And controls the risk&lt;br /&gt;
and helps safeguard against security vulnerabilities. Application&lt;br /&gt;
security development is the process of making applications more secure&lt;br /&gt;
by finding and fixing security vulnerabilities. This is often done by&lt;br /&gt;
enforcing software security best practices and using application&lt;br /&gt;
security testing tools. &lt;br /&gt;
&amp;lt;ref name=&amp;quot;perforce&amp;quot;&amp;gt;Perforce, &amp;quot;Application Security Development Best Practices&amp;quot;. Available: https://www.perforce.com/blog/kw/application-security-development-best-practices. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Audit and compliance knowledge====&lt;br /&gt;
A cyber security audit is designed to be a comprehensive review and&lt;br /&gt;
analysis of your business’s IT infrastructure. It identifies threats and&lt;br /&gt;
vulnerabilities, exposing weaknesses and high-risk practices.&lt;br /&gt;
Regulations such as the EU GDPR (General Data Protection Regulation) can&lt;br /&gt;
impose hefty penalties in the event of a breach that results in&lt;br /&gt;
exploited data. A cyber security audit will help mitigate the&lt;br /&gt;
consequences of a breach and demonstrate that your organization has&lt;br /&gt;
taken the necessary steps to protect client and company data. &amp;lt;ref name=&amp;quot;cyforsecure&amp;quot;&amp;gt;Cyfor Secure, &amp;quot;What is a Cyber Security Audit and how can it help your organisation?&amp;quot;. Available: https://cyforsecure.co.uk/services/cyber-assessment/cyber-security-audit/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cybersecurity compliance is the organizational risk management method&lt;br /&gt;
aligned with pre-defined security measures &amp;amp;amp; controls on how data&lt;br /&gt;
confidentiality is ensured by its administrative procedures.&amp;lt;ref name=&amp;quot;nordlayer&amp;quot;&amp;gt;NordLayer, &amp;quot;Cybersecurity compliance: Everything you need to know&amp;quot;. Available: https://nordlayer.com/blog/cybersecurity-compliance-everything-you-need-to-know/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
All needed skills are developed through courses and certification.&lt;br /&gt;
&lt;br /&gt;
===Entry-Level Incident Response Positions===&lt;br /&gt;
It is not always possible to advance to the position of incident&lt;br /&gt;
responder in a straight line. Many professionals advance from entry- to&lt;br /&gt;
mid-level positions before becoming a real incident responder or a&lt;br /&gt;
member of a computer emergency response team (CERT).&amp;lt;br /&amp;gt;&lt;br /&gt;
These are some examples: &amp;lt;ref name=&amp;quot;Infosec&amp;quot;&amp;gt;Infosec, &amp;quot;Incident Responder Career Roadmap: From Entry Level to Executive&amp;quot;. Available: https://resources.infosecinstitute.com/topic/incident-responder-career-roadmap-entry-level-executive/ [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;network-administrator&amp;quot;&amp;gt;Network administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;This position’s experience will help potential incident responders&lt;br /&gt;
develop networking skills. Attention to detail, as well as the ability&lt;br /&gt;
to sift through system configurations, site layouts, and general network&lt;br /&gt;
and communication setups, are essential in this field.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;system-administrator&amp;quot;&amp;gt;System administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Another crucial beginning point for an incident responder is to learn&lt;br /&gt;
how to manage resources inside your organization as well as user&lt;br /&gt;
behavior. Understanding the potential damage that users, inadequate&lt;br /&gt;
security setups, and ineffective IT policies and procedures can cause on&lt;br /&gt;
your network can provide prospective candidates with insight into the&lt;br /&gt;
human component of an incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;security-administrator&amp;quot;&amp;gt;Security administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In such a position, basic hacking skills, penetration testing, and&lt;br /&gt;
intrusion detection are all learned, which are crucial incident&lt;br /&gt;
responder skills when trying to replicate a breach or attack.&lt;br /&gt;
Understanding the paths a cybercriminal will take when attempting to&lt;br /&gt;
damage or obtain access to a system can greatly simplify the work of&lt;br /&gt;
reverse engineering the incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Mid-Level Incident Response Positions ===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5&lt;br /&gt;
id=&amp;quot;computer-security-incident-response-team-csirt-engineer&amp;quot;&amp;gt;Computer&lt;br /&gt;
security incident response team (CSIRT) engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;cyber-incident-responder&amp;quot;&amp;gt;Cyber incident responder&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-response-engineer&amp;quot;&amp;gt;Incident response&lt;br /&gt;
engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;While each of these positions is different, they generally require&lt;br /&gt;
very similar skills and characteristics in a candidate. At this level,&lt;br /&gt;
personal characteristics such as problem solving, time management, and&lt;br /&gt;
even presentation skills become more crucial as one’s career evolves&lt;br /&gt;
into a management-facing role.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Technical skills include the ability to identify and minimize threats&lt;br /&gt;
while maintaining communication with management and the rest of your&lt;br /&gt;
team. Data analysis and evidence gathering become increasingly crucial,&lt;br /&gt;
and the circumstances in which your services are deployed get more&lt;br /&gt;
serious.&amp;lt;/p&amp;gt;&lt;br /&gt;
Problem-solving skills are crucial at this level of incident&lt;br /&gt;
response, and as the stakes rise, so does the pressure in each&lt;br /&gt;
situation. At this level, programming abilities are essential since&lt;br /&gt;
incident responders may be needed to reverse engineer malicious code or&lt;br /&gt;
even create patches for vulnerable network applications or services. &amp;lt;ref name=&amp;quot;coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated]&amp;quot;. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Senior-Level Incident Response Positions===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;intrusion-detection-specialist&amp;quot;&amp;gt;Intrusion detection&lt;br /&gt;
specialist:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;A CISSP certification might help a potential candidate in preparing&lt;br /&gt;
for the profession. The role of an intrusion detection specialist is to&lt;br /&gt;
find and stop any unwanted communications.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-manager&amp;quot;&amp;gt;Incident manager:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Expected to plan, oversee, manage, and supervise all incident&lt;br /&gt;
response team actions. Is in charge of reporting all current events to&lt;br /&gt;
senior management and stakeholders, as well as acting as the technical&lt;br /&gt;
lead on active incidents for incident responders. Prepares threat and&lt;br /&gt;
impact assessments and reports them known to management.&amp;lt;ref name=&amp;quot;coursera&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Certificates== &lt;br /&gt;
There is a vast number of different certificates and the road map to&lt;br /&gt;
being a certified professional could be very different&amp;lt;ref name=&amp;quot;Coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated],&amp;quot; [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;NICCS&amp;quot;&amp;gt;NICCS, &amp;quot;Cybersecurity Certifications,&amp;quot; [Online]. Available: hhttps://niccs.cisa.gov/about-niccs/cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt; . One possible&lt;br /&gt;
approach is to start with basic certificates from the different branches&lt;br /&gt;
of service and move to more specific and demanding focused&lt;br /&gt;
certification. Also, some jobs require certain clearances, either from&lt;br /&gt;
industry, or from the government. One small selection of different&lt;br /&gt;
possible certificates is brought out in following paragraphs.&lt;br /&gt;
&lt;br /&gt;
Security+ is a CompTIA certification that is considered a basic cert&lt;br /&gt;
among cybersecurity professionals. It covers the topics of risk&lt;br /&gt;
management and threat assessment.&lt;br /&gt;
Network+ is also offered by CompTIA this certification (like the name&lt;br /&gt;
implies) focuses on networking infrastructure and operations. It is&lt;br /&gt;
considered a foundational certification.&lt;br /&gt;
The Certified Information Systems Security Professional (CISSP) is a&lt;br /&gt;
more advanced certification designed for cybersecurity professionals&lt;br /&gt;
with at least five years of work experience. The certification covers&lt;br /&gt;
topics such as architecture, engineering, and management.&amp;lt;/p&amp;gt;&lt;br /&gt;
The Certified Ethical Hacker (CEH) certification is also considered a&lt;br /&gt;
more advanced cert because it generally requires that applicants have&lt;br /&gt;
multiple years of work experience. The goal of an ethical hacker&lt;br /&gt;
certification is to be able to understand how cyber attacks unfold in&lt;br /&gt;
order to improve threat assessment and mitigation skills.&amp;lt;ref name=&amp;quot;cyberguide&amp;quot;&amp;gt;Cybersecurity Guide, &amp;quot;How to become a cybersecurity specialist&amp;quot;, [Online]. Available: https://cybersecurityguide.org/careers/security-specialist/. [Accessed 27 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
This is definitely not all, when one looks for more information, following link could be searched, to get more in depth knowledge about&lt;br /&gt;
different possibilities. Hereby, with the help of this matrix a possible taxonomy of different 436 listed certificates in branches are&lt;br /&gt;
presented.&amp;lt;ref name=&amp;quot;Pauljeremy&amp;quot;&amp;gt;&amp;quot;Cybersecurity Roadmap,&amp;quot; [Online]. Available: https://pauljerimy.com/2020/10/12/scr-oct-2020-update/. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:analystimage5.png|1000px|thumb|Certificate matrix &amp;lt;ref&amp;gt;&amp;quot;Certification roadmap&amp;quot;. Available at https://pauljerimy.com/security-certification-roadmap&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
=== Communication and Network Security===&lt;br /&gt;
Communication and network security covers the ability to secure&lt;br /&gt;
communication channels and networks. Topics include secure and converges&lt;br /&gt;
protocols, wireless networks, cellular networks, hardware operations&lt;br /&gt;
(warranty and redundant power), and third-party connectivity. IP&lt;br /&gt;
networking are also included in this domain.&lt;br /&gt;
===Identity and Access Management===&lt;br /&gt;
The identity and access management domain covers the attacks that&lt;br /&gt;
target the human gateway to gain access to data. Other topics include&lt;br /&gt;
ways to identify users with rights to access the information and&lt;br /&gt;
servers. Identity and access management covers the topics of&lt;br /&gt;
applications, Single sign-on authentication, privilege escalation,&lt;br /&gt;
Kerberos, rule-based or risk-based access control, proofing and&lt;br /&gt;
establishment of identity.&lt;br /&gt;
===Security Architecture and Engineering===&lt;br /&gt;
The security architecture and engineering domain covers important&lt;br /&gt;
topics concerning security engineering plans, designs and principles,&lt;br /&gt;
Topics include assessing and mitigating information system&lt;br /&gt;
vulnerabilities, fundamental concepts of security models and security&lt;br /&gt;
architectures in critical areas like access control. Cloud systems,&lt;br /&gt;
cryptography, system infiltrations (ransomware, fault-injection and&lt;br /&gt;
more) and virtualized systems are also covered in this domain.&lt;br /&gt;
===Asset Security===&lt;br /&gt;
The Asset Security domain deals with the issues related to the&lt;br /&gt;
collection, storage, maintenance, retention and destruction of data. It&lt;br /&gt;
also covers knowledge of different roles regarding data handling (owner,&lt;br /&gt;
controller and custodian) as well as data protection methods and data&lt;br /&gt;
states. Other topics include resource provision, asset classification&lt;br /&gt;
and data lifecycle management.&lt;br /&gt;
===Security and Risk Management===&lt;br /&gt;
The security and risk management domain covers general on skills&lt;br /&gt;
related to the implementation of user awareness programs as well as&lt;br /&gt;
security procedures. Emphasis is also placed on risk management&lt;br /&gt;
concerning the acquisition of new services, hardware and software&lt;br /&gt;
(supply chain). Other skills include social engineering defense&lt;br /&gt;
mechanisms.&lt;br /&gt;
===Security Assessment and Testing===&lt;br /&gt;
The security assessment and testing domain deals with all the&lt;br /&gt;
techniques and tools used to find system vulnerabilities, weaknesses and&lt;br /&gt;
potential areas of concern not addressed by security procedures and&lt;br /&gt;
policies. Attack simulations, vulnerability assessment, compliance&lt;br /&gt;
checks, and ethical disclosure also fall under this domain.&lt;br /&gt;
===Software Security===&lt;br /&gt;
The software development security domain deals with implementing&lt;br /&gt;
software-based security protocols within environment for which the IT&lt;br /&gt;
professional is responsible. Risk analysis, vulnerability identification&lt;br /&gt;
and auditing of source codes are all covered in this subset. Additional&lt;br /&gt;
topics include software-designed security, maturity models, development&lt;br /&gt;
methodologies, open-source and third-party development security.&lt;br /&gt;
===Security operations===&lt;br /&gt;
The security operations domain covers topics ranging from&lt;br /&gt;
investigations and digital forensic to detection and intrusion&lt;br /&gt;
prevention tools, sandboxing and firewalls. Topics include user and&lt;br /&gt;
entity behavior analytics, threat intelligence (threat hunting and&lt;br /&gt;
threat feeds) log management, artifacts (mobile, computer and network),&lt;br /&gt;
machine learning and AI-based tools, penetration testing, and&lt;br /&gt;
exploitation development. These for sub-domains are lister here.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Incident Handling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Penetration Testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Exploitation&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Education==&lt;br /&gt;
[[File:Analystimage7.png|400px|thumb|Comparison degree vs Certificate &amp;lt;ref&amp;gt;&amp;quot;Comparison Table&amp;quot;. Available at https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
The entry level monitoring specialist is hired by Estonian&lt;br /&gt;
Information System Authority even if there is no formal IT education,&lt;br /&gt;
but readiness to learn and moderate knowledge of different operation&lt;br /&gt;
systems is enough to start the career. &amp;lt;ref name=&amp;quot;cv&amp;quot;&amp;gt;cv.ee, &amp;quot;SEIRESPETSIALIST - tule Eesti küberruumi valvuriks!&amp;quot;. Available: https://www.cv.ee/en/vacancy/792782/riigi-infosusteemi-amet/seirespetsialist-tule-eesti-kuberruumi-valvuriks [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Nevertheless, like most other high qualification careers jobs falling&lt;br /&gt;
under the cybersecurity specialist category require some form of formal&lt;br /&gt;
education. However, since cybersecurity specialist jobs can fall across&lt;br /&gt;
a wide spectrum of job descriptions and responsibilities, it is possible&lt;br /&gt;
to obtain a specialist job after completing many levels of different&lt;br /&gt;
computer related education.&lt;br /&gt;
&lt;br /&gt;
If one is looking for a cybersecurity related education, for example&lt;br /&gt;
in EU, 137 courses/programs could be found that relate to keyword IT or&lt;br /&gt;
cybersecurity. &amp;lt;ref name=&amp;quot;enisa&amp;quot;&amp;gt;ENISA (European Union Agency for Cybersecurity), &amp;quot;Cybersecurity Education-Cybersecurity Higher Education Database&amp;quot;. Available: https://www.enisa.europa.eu/topics/cybersecurity-education/education-map/education-courses [Accessed 26 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Also, there is a great amount of discussion, if cyber security&lt;br /&gt;
professional should have a degree or would be certification just enough.&lt;br /&gt;
One interesting table is produces by Franklin University that compares&lt;br /&gt;
benefits and/or drawbacks of each type of credential.&amp;lt;ref name=&amp;quot;franklin&amp;quot;&amp;gt;Franklin University, &amp;quot;Is Getting a Master&#039;s Degree in Cyber Security Worth It?&amp;quot;. Available: https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Certifications are generally good for people with little practical&lt;br /&gt;
experience because they are known quantities in the industry and can&lt;br /&gt;
help you get your foot in the door. They set a minimum knowledge bar.&lt;br /&gt;
But some certifications are viewed more favorably than others.&lt;br /&gt;
Certifications with renewal requirements are viewed better by hiring&lt;br /&gt;
managers, but they also more costly in the long run because of the need&lt;br /&gt;
for continuing education. Certifications are also good for showing&lt;br /&gt;
in-depth expertise in a specialization within cybersecurity. Depending&lt;br /&gt;
on your career goals, it may be advantageous to have a master’s&lt;br /&gt;
degree—which shows your breadth of knowledge, critical thinking and&lt;br /&gt;
leadership skills—and a certificate—which shows specific skill&lt;br /&gt;
competency.&amp;lt;ref name=&amp;quot;franklin&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
As IT (Cyber) Security is still a relatively young discipline,&lt;br /&gt;
universities and colleges are still figuring out which is the best&lt;br /&gt;
approach for their degrees. Study programmes and curricula in Cyber&lt;br /&gt;
Security are different. In general, here are the duration of Cyber&lt;br /&gt;
Security degrees:&lt;br /&gt;
&amp;lt;ref name=&amp;quot;studyportal&amp;quot;&amp;gt;Studyportals, &amp;quot;Why You Should Study a Cyber Security Degree in 2022&amp;quot;. Available: https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Bachelor’s degrees in Cyber Security take 3 or 4 years in most&lt;br /&gt;
countries.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Master’s courses in Cyber Security take between 1-2 years to&lt;br /&gt;
complete.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;PhD programmes in Cyber Security last 3-5 years. Some only take 1&lt;br /&gt;
or 2 years, but they are less common.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Generalization could me made that on bachelor level the general&lt;br /&gt;
knowledge about the cyber issues are obtained. On master level the&lt;br /&gt;
specialization courses are taken and the person can choose more specific&lt;br /&gt;
topics to study. It is on master level where strengths of the cyber&lt;br /&gt;
specialist can be developed further and up-do date knowledge obtained in&lt;br /&gt;
specifics. PhD is serious science and involves teaching, lot of&lt;br /&gt;
scientific work and writing for publications.&lt;br /&gt;
&lt;br /&gt;
==Salary==&lt;br /&gt;
&amp;lt;p&amp;gt;Even if the salary can be very different, compared to the skills and&lt;br /&gt;
experience, an generalization can be made. Cyber Security professionals&lt;br /&gt;
in CSIRT, and in other entities earn quite well, from the start. First,&lt;br /&gt;
some comparison from the United States. The average CSIRT analyst salary&lt;br /&gt;
in the USA is $97,500 per year or $50 per hour. Entry level positions&lt;br /&gt;
start at $48,875 per year while most experienced workers make up to&lt;br /&gt;
$135,373 per year.&amp;lt;ref name=&amp;quot;talent&amp;quot;&amp;gt;talent.com, &amp;quot;Csirt Analyst average salary in USA 2022&amp;quot;. Available: https://www.talent.com/salary?job=csirt+analyst [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There are multiple positions you can occupy in this field. They have&lt;br /&gt;
in common great salaries and high demand for technical skills, attention&lt;br /&gt;
to details, problem-solving mentality, and the ability to analyze risks.&lt;br /&gt;
Here are the average annual salaries in the United States, according to&lt;br /&gt;
Payscale: &amp;lt;ref name=&amp;quot;studyportal&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Cryptographer – 100,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Information Security Officer – 91,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Assessor – 90,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Engineer – 88,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Penetration Tester – 81,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Forensics Expert – 71,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Administrator – 65,000 USD&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
When looking into salaries in Estonia, one can find that there is a&lt;br /&gt;
discussion that private sector is taking a toll from the public sector,&lt;br /&gt;
and that the salaries in important agencies, as Information System&lt;br /&gt;
Authority loose their employees to the better paid positions in private&lt;br /&gt;
sector.&amp;lt;ref name=&amp;quot;digigeenius&amp;quot;&amp;gt;DiGi Geenius, &amp;quot;Kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad&amp;quot;. Available: https://digi.geenius.ee/rubriik/uudis/kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad/ [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;tehnika&amp;quot;&amp;gt;Postimees, &amp;quot;Riigi-it-tootajate-palgamaarad-kasvasid&amp;quot;. Available: https://tehnika.postimees.ee/6887428/riigi-it-tootajate-palgamaarad-kasvasid [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
But there is also a different view that average private sector worker&lt;br /&gt;
could be hired as a top specialist in public sector and then the payment&lt;br /&gt;
is higher. Nevertheless, it seems that the average payment in cyber&lt;br /&gt;
security sector is any way higher that in other parts of the&lt;br /&gt;
e-services. &amp;lt;ref name=&amp;quot;digigeenius2&amp;quot;&amp;gt;DiGi Geenius, &amp;quot;5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka&amp;quot;. Available: https://digi.geenius.ee/rubriik/uudis/5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==SOC==&lt;br /&gt;
&amp;lt;p&amp;gt;A SOC is a facility where an organization’s network, applications,&lt;br /&gt;
and endpoints are monitored and defended. The term was adapted from&lt;br /&gt;
network operations centers (NOCs), where large telecommunication or&lt;br /&gt;
corporate networks are monitored. When network security became more of a&lt;br /&gt;
concern, security teams were formed within the NOCs, and eventually spun&lt;br /&gt;
off into larger organizations of their own as the responsibilities of&lt;br /&gt;
security teams grew increasingly complex and specialized. The security&lt;br /&gt;
staff working in a security operations center are often called the SOC&lt;br /&gt;
team.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Functions of the SOC team include, but are not limited to:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ol type=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Taking inventory of resources, to get a better understanding of the&lt;br /&gt;
structure they are protecting.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintanence of the system, by constantly making updates and adding&lt;br /&gt;
safeguards.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Monitoring the network for abnormalities with special tools.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Threat analysis of new attacks and vulnerabilities.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Responding to attacks, by acting as “first responders”. The SOC team&lt;br /&gt;
will shut down and/or isolate endpoints, deleting files and lowering the&lt;br /&gt;
impact as fast as possible.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Recovery of system stability and lost data. This may be done using&lt;br /&gt;
backups, restarting endpoints or reconfiguring systems.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Logging all actions on the system, to be later used for analysis or&lt;br /&gt;
forensics after an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigating the root cause of an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Auditing their own actions, to be in line with regulations of the&lt;br /&gt;
organization, industry or governing body.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.trellix.com/en-us/security-awareness/operations/what-is-soc.html&amp;lt;/p&amp;gt;&lt;br /&gt;
==CSIRT==&lt;br /&gt;
&amp;lt;p&amp;gt;A CSIRT is a group that responds to security incidents when they&lt;br /&gt;
occur. Key responsibilities of a CSIRT include: &lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
===Creating and maintaining an incident response plan (IRP)===&lt;br /&gt;
An incident response plan (IRP) is a set of written instructions for&lt;br /&gt;
detecting, responding to and limiting the effects of an information&lt;br /&gt;
security event. Incident response plans provide instructions for&lt;br /&gt;
responding to many potential scenarios, including data breaches, denial&lt;br /&gt;
of service/distributed denial of service attacks, firewall breaches,&lt;br /&gt;
virus or malware outbreaks or insider threats. Without an incident&lt;br /&gt;
response plan in place, organizations may either not detect the attack&lt;br /&gt;
in the first place, or not follow proper protocol to contain the threat&lt;br /&gt;
and recover from it when a breach is detected.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.stratacore.com/incidentresponseplan&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
===Investigating and analyzing incidents===&lt;br /&gt;
CSIRTs are also involved in improvement activities. After major&lt;br /&gt;
computer security incidents occur, or when incidents are not handled in&lt;br /&gt;
a timely or effective manner, a CSIRT will generally perform a&lt;br /&gt;
postmortem of the incident and its response. This postmortem will&lt;br /&gt;
identify the strengths and weakness of the response effort. Such reviews&lt;br /&gt;
can identify weaknesses and holes in systems, infrastructure defenses,&lt;br /&gt;
or policies that allowed the incident to take place. It can also&lt;br /&gt;
identify problems with communication channels, interfaces, and&lt;br /&gt;
procedures that inhibited the efficient resolution of the reported&lt;br /&gt;
problem.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.cisa.gov/uscert/bsi/articles/best-practices/incident-management/defining-computer-security-incident-response-teams&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Managing internal communications and updates during or immediately after incidents occur===&lt;br /&gt;
===Communicating with employees, shareholders, customers, and the press about incidents as needed===&lt;br /&gt;
&amp;lt;p&amp;gt;There are various services within the CSIRT Services Framework that&lt;br /&gt;
address communications, as they relate to security operations and&lt;br /&gt;
incident response services. Some of these include Information Security&lt;br /&gt;
Incident Coordination, Crisis Management Support, Vulnerability&lt;br /&gt;
Disclosure, Situational Awareness Communication, and Awareness Building,&lt;br /&gt;
to name a few. Sharing information and communicating with the general&lt;br /&gt;
public and/or your constituency is appropriate in many different&lt;br /&gt;
scenarios. These can range from proactive communications to reactive&lt;br /&gt;
communications. Each scenario may be unique, and careful consideration&lt;br /&gt;
should be given to when to release information to the public and what&lt;br /&gt;
information should be released.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;https://resources.sei.cmu.edu/asset_files/Handbook/2021_002_001_651819.pdf&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Remediating incidents===&lt;br /&gt;
Threat remediation is a strong and capable tool for fighting the&lt;br /&gt;
cyber security compromises. As the word ‘remedy’ suggests, remediation&lt;br /&gt;
process involves the treatment of a security breach. With the&lt;br /&gt;
remediation practices, your cyber security team is able to eliminate&lt;br /&gt;
suspicious activities and malicious attacks in the form of malware,&lt;br /&gt;
ransomware, phishing and such. Even if you ‘kill’ the suspicious&lt;br /&gt;
activity, the attackers can remain in your systems. If you want to&lt;br /&gt;
contaminate and end the problem for good, your remediation processes&lt;br /&gt;
must involve the detection of the cause. &amp;lt;ref name=&amp;quot;logsign&amp;quot;&amp;gt;Logsign, &amp;quot;What-is-remediation-in-cyber-security&amp;quot;. Available: https://www.logsign.com/blog/what-is-remediation-in-cyber-security/. [Accessed 28 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Recommending technology, policy, governance, and training changes after security incidents===&lt;br /&gt;
After all these actions, the SCIRT must contribute to the development&lt;br /&gt;
of better policies, practices and has to recommend improvements. They&lt;br /&gt;
are not working in the vacuum and their work has to create new and&lt;br /&gt;
better standards for cyber security. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;Exabeam, &amp;quot;CSIRT&amp;quot;. Available: https://www.exabeam.com/incident-response/csirt/ [Accessed 28 APr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==CERT==&lt;br /&gt;
&amp;lt;p&amp;gt;The term “computer emergency response team” was coined in 1988. In&lt;br /&gt;
response to the Morris worm attack that impacted thousands of servers on&lt;br /&gt;
the Internet, DARPA funded the formation of the Computer Emergency&lt;br /&gt;
Response Team Coordination Center (CERT-CC) at Carnegie Mellon&lt;br /&gt;
University. The goal of CERT-CC was to help protect the internet by&lt;br /&gt;
collecting and disseminating information on critical security&lt;br /&gt;
vulnerabilities. Several other countries formed similar centers using&lt;br /&gt;
the same acronym (despite threats of legal action by Carnegie Mellon for&lt;br /&gt;
trademark infringement). Now the term CERT refers to any emergency&lt;br /&gt;
response team that deals with cyber threats. Many people use CERT-CC&lt;br /&gt;
interchangeably with CSIRT, though the charter of a CERT is information&lt;br /&gt;
sharing in order to help other response teams respond to threats against&lt;br /&gt;
their own infrastructure.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In general, the designation of CERT is helpful in applying real-world&lt;br /&gt;
solutions to various cybersecurity problems. They may be government&lt;br /&gt;
contractors or employees of a major corporation. For example, the U.S.&lt;br /&gt;
Computer Emergency Readiness Team (US-CERT) operates under the U.S.&lt;br /&gt;
Department of Homeland Security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.techopedia.com/definition/31003/computer-emergency-response-team-cert&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In Estonia CERT is designated as CERT-EE. It was established in 2006,&lt;br /&gt;
as an organization responsible for the management of security incidents&lt;br /&gt;
in .ee computer networks. It is also a national contact point for&lt;br /&gt;
international co-operation in the field of IT security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ria.ee/en/cyber-security/cert-ee.html&amp;lt;/p&amp;gt;&lt;br /&gt;
===Difference between SOC/CSIRT/CERT===&lt;br /&gt;
&amp;lt;p&amp;gt;How CSIRTs differ from CERTs and SOCs There are overlapping&lt;br /&gt;
responsibilities between a community emergency response team (CERT),&lt;br /&gt;
computer security incident response team (CSIRT), and security&lt;br /&gt;
operations center (SOC). To add to this confusion, frequently, the terms&lt;br /&gt;
CERT and CSIRT are used interchangeably, despite the important&lt;br /&gt;
differences.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image3.png&amp;quot; alt=&amp;quot;Overlapping in images/image3.png&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;Overlapping in&lt;br /&gt;
images/image3.png&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
==Understand the primary roles and characteristics of a CERT, CSIRT, and SOC.==&lt;br /&gt;
&amp;lt;p&amp;gt;So, using strict definitions, a CERT collects and disseminates&lt;br /&gt;
security information, typically for the benefit of a country or an&lt;br /&gt;
industry. A CSIRT is a cross-functional team that responds to incidents&lt;br /&gt;
on behalf of a country or an organization. A SOC is where a country or&lt;br /&gt;
organization monitors and defends its network, servers, applications,&lt;br /&gt;
and endpoints.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image4.png&amp;quot; alt=&amp;quot;table of explanation images/image4&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;table of explanation&lt;br /&gt;
images/image4&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
==Future==&lt;br /&gt;
&amp;lt;p&amp;gt;And the Cyber security problem is only getting bigger. According to a&lt;br /&gt;
report published by Accenture, the number of cyber security breaches&lt;br /&gt;
increased by 11 percent from 2017 to 2018. The cost of such breaches is&lt;br /&gt;
astronomical–about $600 billion worldwide, according to the Economic&lt;br /&gt;
Impact of Cybercrime report.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Job projections for cybersecurity are staggering. The Bureau of Labor&lt;br /&gt;
Statistics in US predicts that careers in the cybersecurity field will&lt;br /&gt;
grow by 32% by 2028. That makes cybersecurity one of the top 10&lt;br /&gt;
fastest-growing jobs in the country. In the United States alone, jobs&lt;br /&gt;
for Information Security Analysts are expected to grow by 15% by&lt;br /&gt;
2024.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Most likely this trend is also similar in other countries.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When checking Estonian job portals, there is a constant need for&lt;br /&gt;
people for cyber security related positions. Also, linkedin search gives&lt;br /&gt;
approximately 30 vacancies immediately. There are banks, logistics&lt;br /&gt;
companies, e-shops, and software producers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://ee.linkedin.com/jobs/cyber-security-jobs?countryRedirected=1&amp;amp;amp;position=1&amp;amp;amp;pageNum=0&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Trends that affect companies create need for constant cyber security&lt;br /&gt;
services. Increasing number of home/remote offices require secure&lt;br /&gt;
corporate networks and security of remote devices. One example is from&lt;br /&gt;
this year, when sloppy remote desktop set-up paralyzed systems of 17&lt;br /&gt;
companies.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.aripaev.ee/uudised/2022/04/20/ria-lohakas-kaugtoolaua-seadistus-halvas-martsis-vahemalt-17-juhul-ettevotete-it-susteemid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Also, no service can exists without robust infrastructure - servers,&lt;br /&gt;
databases, applications. As all previously mentioned devices and&lt;br /&gt;
services are at constant scanning and surveillance. So, the breach&lt;br /&gt;
detection and immediate action demands 24/7 services. Even if lot of&lt;br /&gt;
things could be automated, there is a need for human specialists (at&lt;br /&gt;
least, at the moment). Third growing field is also a forensic&lt;br /&gt;
investigation, as every attack must be investigated in order to be ready&lt;br /&gt;
to repel next attacks. So data recovery and evidence collection is&lt;br /&gt;
another important field of work that need skilled and professional&lt;br /&gt;
workers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Even, if the specifics of the entity, be it CSIRT, CERT or SOC, are&lt;br /&gt;
different, the fundamentals of the work are the same. Professional&lt;br /&gt;
knowledge of the networks, operational systems, hardware, scripting, and&lt;br /&gt;
several other wider IT related knowledge is needed. As there is no&lt;br /&gt;
single way to reach to it, every single person can find one’s strongest&lt;br /&gt;
sides and develop them with knowledge of weaker side, in order to know,&lt;br /&gt;
when to as for help.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/body&amp;gt;&lt;br /&gt;
&amp;lt;/html&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mavald</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142223</id>
		<title>Hiring a Cyber Security Incident Analyst</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142223"/>
		<updated>2022-05-01T15:43:11Z</updated>

		<summary type="html">&lt;p&gt;Mavald: /* Salary */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==A Cyber Security Incident Analyst==&lt;br /&gt;
&lt;br /&gt;
[[File:image1.png|600px|thumb|Job advertisement &amp;lt;ref&amp;gt;&amp;quot;Job Advertisement&amp;quot;. Available at https://www.projectpeople.com/jobs/&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
===Cyber security incident analyst in SOC/CSIRT/CERT===&lt;br /&gt;
This article delves into the job title of Cyber Security Incident&lt;br /&gt;
Analyst and provides an overview of the acronyms SOC/CSIRT/CERT. A brief&lt;br /&gt;
history of the job is discussed here, as well as a possible career path,&lt;br /&gt;
education, experience, and other characteristics required for work in&lt;br /&gt;
computer security-related organizations. The article also provides a&lt;br /&gt;
brief history of SOC/CSIRT/CERT, as well as a comparison of their&lt;br /&gt;
differences and similarities.&lt;br /&gt;
===Cyber Security Incident Analyst Skill Set===&lt;br /&gt;
What skill set is expected from the Cyber Security Incident Analyst? Below written lines are taken from the same job advertisement depicted&lt;br /&gt;
on the left side of this article:&lt;br /&gt;
As a Security Incident Analyst your responsibilities will include:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Continuous monitoring of security tooling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Performing regular and ad-hoc vulnerability assessments&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Carrying out ‘spot checks’&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Reporting vulnerabilities to the PVG via the alerts system&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintaining and documenting logging systems&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Developing centralized logging, reporting and intelligence&lt;br /&gt;
platforms&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;‘Light touch’ penetration testing with open source tooling&lt;br /&gt;
(Metasploit)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Knowledge &amp;amp;amp; Experience required:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;SOC, CSIRT or CERT operational environment experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Windows / Linux experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TCP /IP networking protocol knowledge&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience reviewing and analyzing Security Events from various&lt;br /&gt;
monitoring and logging sources&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience in website and web application security assessment or&lt;br /&gt;
penetration testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience of using Metasploit&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Scripting knowledge using BASH, Python, Perl, Ruby&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Skills in Host and Network Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
As one can see the description of the duties is wide and also the&lt;br /&gt;
knowledge and experience that is required is noteworthy. So, where to&lt;br /&gt;
start to find out the way to get this kind of knowledge and&lt;br /&gt;
expertize.&lt;br /&gt;
===Possible career path===&lt;br /&gt;
Next part of the paper is aiming to depict a possible ways, how to&lt;br /&gt;
develop oneself, and move along the career pathway in cybersecurity&lt;br /&gt;
field. Topics of development, education, experience and certification&lt;br /&gt;
are covered.&lt;br /&gt;
[[File:analystimage2.png|1000px|thumb|Career path &amp;lt;ref&amp;gt;&amp;quot;Possible Career Path&amp;quot;. Available at https://www.cyberseek.org/pathway.html&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
===Junior/Senior===&lt;br /&gt;
Start with an entry-level job in IT. Hands-on experience is often the&lt;br /&gt;
most effective way to prepare for certification exams. Start&lt;br /&gt;
accumulating work experience with an entry-level role as a cybersecurity&lt;br /&gt;
analyst. Many cybersecurity professionals start off in more general IT&lt;br /&gt;
roles. The skills, practices, and technologies you’ll use as a&lt;br /&gt;
cybersecurity professional will continue to evolve along with computer&lt;br /&gt;
and network technology. The desire to learn, ability to problem solve,&lt;br /&gt;
and attention to detail will serve you well in this field. Other, more&lt;br /&gt;
technical skills and technologies to learn include:&amp;lt;ref name=&amp;quot;certification&amp;quot;&amp;gt;Popular Cyber Security Certificates [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications  [Accessed 25 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====SIEM tools (security information and event management)====&lt;br /&gt;
Security Information and Event Management (SIEM) is a set of tools&lt;br /&gt;
and services offering a holistic view of an organization’s information&lt;br /&gt;
security. SIEM works by combining two technologies:&lt;br /&gt;
&amp;lt;li&amp;gt;Security information management (SIM), which collects data from log&lt;br /&gt;
files for analysis and reports on security threats and events, and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;security event management (SEM), which conducts real-time system&lt;br /&gt;
monitoring, notifies network admins about important issues and&lt;br /&gt;
establishes correlations between security events. There are a number of&lt;br /&gt;
security information and event management solutions on the market.&lt;br /&gt;
ArcSight ESM, IBM QRadar and Splunk are among the most popular. &amp;lt;ref name=&amp;quot;SIEM&amp;quot;&amp;gt;Application security, SIEM [Online]. Available: https://www.imperva.com/learn/application-security/siem/. [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Firewalls, Intrusion Detection Systems (IDS), and Intrusion Prevention Systems(IPS)====&lt;br /&gt;
Firewalls can be two types, hardware and software firewalls. Software&lt;br /&gt;
firewall is a firewall that is installed on a computer or server, and&lt;br /&gt;
tasked with network security. It works with a wide variety of other&lt;br /&gt;
technology security solutions to provide more robust and cohesive&lt;br /&gt;
security for enterprises of all sizes. When a software firewall is&lt;br /&gt;
installed on a server, it opens up like an umbrella of protection over&lt;br /&gt;
all other computers connected to the network. It is able to monitor both&lt;br /&gt;
incoming and outgoing traffic for potential risk or suspicious user&lt;br /&gt;
behavior, and also makes setting security policies much easier, faster&lt;br /&gt;
and more flexible. Hardware firewall is positioned between the network&lt;br /&gt;
and devices, allowing traffic to funnel through the firewall for a close&lt;br /&gt;
inspection and analysis. A hardware firewall, a term often&lt;br /&gt;
interchangeable with network or next-generation firewall, protects the&lt;br /&gt;
network gateways for an enterprise. Hardware firewall is physical&lt;br /&gt;
hardware, installed between network elements and connected devices, and&lt;br /&gt;
is tasked with filtering traffic for cyber threat to the network or&lt;br /&gt;
devices. Filtering out unauthorized or suspicious users based on traffic&lt;br /&gt;
analysis is one of the biggest benefits of hardware firewall. &amp;lt;ref name=&amp;quot;sangfor&amp;quot;&amp;gt;Sangfor, &amp;quot;What is Software Firewall? Difference between Hardware Firewall and Software Firewall, [Online]. Available: https://www.sangfor.com/blog/cybersecurity/what-is-software-firewall-difference-between-hardware-firewall-and-software-firewall [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems&lt;br /&gt;
(IPS) are both parts of the network infrastructure. IDS/IPS compare&lt;br /&gt;
network packets to a cyberthreat database containing known signatures of&lt;br /&gt;
cyberattacks — and flag any matching packets. IDS doesn’t alter the&lt;br /&gt;
network packets in any way, whereas IPS prevents the packet from&lt;br /&gt;
delivery based on the contents of the packet, much like how a firewall&lt;br /&gt;
prevents traffic by IP address. &amp;lt;ref name=&amp;quot;Varonis&amp;quot;&amp;gt;Varonis, &amp;quot;What is Software Firewall? IDS vs. IPS: What is the Difference?, [Online]. Available: https://www.varonis.com/blog/ids-vs-ips [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Digital forensics====&lt;br /&gt;
Digital forensics is a branch of forensic science that focuses on&lt;br /&gt;
identifying, acquiring, processing, analyzing, and reporting on data&lt;br /&gt;
stored electronically. Electronic evidence is a component of almost all&lt;br /&gt;
criminal activities and digital forensics support is crucial for law&lt;br /&gt;
enforcement investigations. Electronic evidence can be collected from a&lt;br /&gt;
wide array of sources, such as computers, smartphones, remote storage,&lt;br /&gt;
unmanned aerial systems, shipborne equipment, and more.&amp;lt;ref name=&amp;quot;interpol&amp;quot;&amp;gt;Interpol, &amp;quot;Digital forensics&amp;quot;. Available: https://www.interpol.int/How-we-work/Innovation/Digital-forensics. [Accessed 28 4 2022].&amp;lt;/ref&amp;gt; &lt;br /&gt;
Investigative process of digital forensics can be divided into several stages. There are four major stages: preservation, collection,&lt;br /&gt;
examination, and analysis. All these four stages need a deep understanding of computers, technology across a broad spectrum, and cybersecurity principles and&lt;br /&gt;
practices, a working knowledge of computers, networks, and coding, in-depth investigative abilities, critical-thinking skills and analytical talent the ability to effectively communicate and work with a&lt;br /&gt;
wide range of people. &amp;lt;ref name=&amp;quot;ecpi&amp;quot;&amp;gt;&amp;quot;Digital forensics&amp;quot;. Available: https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me. [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Mobile device management====&lt;br /&gt;
Mobile device management (MDM) is software that allows IT&lt;br /&gt;
administrators to control, secure and enforce policies on smartphones,&lt;br /&gt;
tablets and other endpoints. Mobile device management software emerged&lt;br /&gt;
in the early 2000s as a way to control and secure the personal digital&lt;br /&gt;
assistants and smartphones that business workers began to use. The&lt;br /&gt;
consumer smartphone boom that started with the launch of the Apple&lt;br /&gt;
iPhone in 2007 led to the bring your own device (BYOD) trend, which&lt;br /&gt;
fueled further interest in MDM.&amp;lt;ref name=&amp;quot;techtarget&amp;quot;&amp;gt;Techtarget, &amp;quot;Mobile Device Management&amp;quot;. Available: https://www.techtarget.com/searchmobilecomputing/definition/mobile-device-management [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Data management====&lt;br /&gt;
Sometimes the data management is neglected, but this part has a&lt;br /&gt;
crucial role when learning for good cyber security practices. Majority&lt;br /&gt;
of cyber security programs include a special courses on data management.&lt;br /&gt;
Data management is a method of organizing and maintaining data processes&lt;br /&gt;
that are required in almost every business operations. The benefits of&lt;br /&gt;
data management can be found accounting, statistics, logistics planning&lt;br /&gt;
and other disciplines including corporate computing.&amp;lt;ref name=&amp;quot;GlobalUni&amp;quot;&amp;gt;Global Universities, &amp;quot;MSc Data Management and Cyber Security&amp;quot;. Available: https://globaluniversities.in/msc-data-management-cyber-security. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Data governance (and management) play a fundamental role in&lt;br /&gt;
protecting an organization’s data. Ensuring that the right people have&lt;br /&gt;
the right access and that appropriate security controls are in place to&lt;br /&gt;
protect each system or service, based on the criticality or sensitivity&lt;br /&gt;
of the data sets these contain. &amp;lt;ref name=&amp;quot;CyberMagazine&amp;quot;&amp;gt;Cyber Security Magazine, &amp;quot;The Role of Data Governance in Cybersecurity&amp;quot;. Available: https://cybersecurity-magazine.com/the-role-of-data-governance-in-cybersecurity/?utm_source=rss&amp;amp;amp;utm_medium=rss&amp;amp;amp;utm_campaign=the-role-of-data-governance-in-cybersecurity. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Application security development====&lt;br /&gt;
Application security describes security measures at the application&lt;br /&gt;
level that aim to prevent data or code within the app from being stolen&lt;br /&gt;
or hijacked. It encompasses the security considerations that happen&lt;br /&gt;
during application development and design, but it also involves systems&lt;br /&gt;
and approaches to protect apps after they get deployed. Application&lt;br /&gt;
security may include hardware, software, and procedures that identify or&lt;br /&gt;
minimize security vulnerabilities.&amp;lt;ref name=&amp;quot;vmware&amp;quot;&amp;gt;VmWare, &amp;quot;What is application security?&amp;quot;. Available: https://www.vmware.com/topics/glossary/content/application-security.html [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Application security development is important to ensure that your&lt;br /&gt;
application is free from coding errors and bugs. And controls the risk&lt;br /&gt;
and helps safeguard against security vulnerabilities. Application&lt;br /&gt;
security development is the process of making applications more secure&lt;br /&gt;
by finding and fixing security vulnerabilities. This is often done by&lt;br /&gt;
enforcing software security best practices and using application&lt;br /&gt;
security testing tools. &lt;br /&gt;
&amp;lt;ref name=&amp;quot;perforce&amp;quot;&amp;gt;Perforce, &amp;quot;Application Security Development Best Practices&amp;quot;. Available: https://www.perforce.com/blog/kw/application-security-development-best-practices. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Audit and compliance knowledge====&lt;br /&gt;
A cyber security audit is designed to be a comprehensive review and&lt;br /&gt;
analysis of your business’s IT infrastructure. It identifies threats and&lt;br /&gt;
vulnerabilities, exposing weaknesses and high-risk practices.&lt;br /&gt;
Regulations such as the EU GDPR (General Data Protection Regulation) can&lt;br /&gt;
impose hefty penalties in the event of a breach that results in&lt;br /&gt;
exploited data. A cyber security audit will help mitigate the&lt;br /&gt;
consequences of a breach and demonstrate that your organization has&lt;br /&gt;
taken the necessary steps to protect client and company data. &amp;lt;ref name=&amp;quot;cyforsecure&amp;quot;&amp;gt;Cyfor Secure, &amp;quot;What is a Cyber Security Audit and how can it help your organisation?&amp;quot;. Available: https://cyforsecure.co.uk/services/cyber-assessment/cyber-security-audit/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cybersecurity compliance is the organizational risk management method&lt;br /&gt;
aligned with pre-defined security measures &amp;amp;amp; controls on how data&lt;br /&gt;
confidentiality is ensured by its administrative procedures.&amp;lt;ref name=&amp;quot;nordlayer&amp;quot;&amp;gt;NordLayer, &amp;quot;Cybersecurity compliance: Everything you need to know&amp;quot;. Available: https://nordlayer.com/blog/cybersecurity-compliance-everything-you-need-to-know/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
All needed skills are developed through courses and certification.&lt;br /&gt;
&lt;br /&gt;
===Entry-Level Incident Response Positions===&lt;br /&gt;
It is not always possible to advance to the position of incident&lt;br /&gt;
responder in a straight line. Many professionals advance from entry- to&lt;br /&gt;
mid-level positions before becoming a real incident responder or a&lt;br /&gt;
member of a computer emergency response team (CERT).&amp;lt;br /&amp;gt;&lt;br /&gt;
These are some examples: &amp;lt;ref name=&amp;quot;Infosec&amp;quot;&amp;gt;Infosec, &amp;quot;Incident Responder Career Roadmap: From Entry Level to Executive&amp;quot;. Available: https://resources.infosecinstitute.com/topic/incident-responder-career-roadmap-entry-level-executive/ [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;network-administrator&amp;quot;&amp;gt;Network administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;This position’s experience will help potential incident responders&lt;br /&gt;
develop networking skills. Attention to detail, as well as the ability&lt;br /&gt;
to sift through system configurations, site layouts, and general network&lt;br /&gt;
and communication setups, are essential in this field.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;system-administrator&amp;quot;&amp;gt;System administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Another crucial beginning point for an incident responder is to learn&lt;br /&gt;
how to manage resources inside your organization as well as user&lt;br /&gt;
behavior. Understanding the potential damage that users, inadequate&lt;br /&gt;
security setups, and ineffective IT policies and procedures can cause on&lt;br /&gt;
your network can provide prospective candidates with insight into the&lt;br /&gt;
human component of an incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;security-administrator&amp;quot;&amp;gt;Security administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In such a position, basic hacking skills, penetration testing, and&lt;br /&gt;
intrusion detection are all learned, which are crucial incident&lt;br /&gt;
responder skills when trying to replicate a breach or attack.&lt;br /&gt;
Understanding the paths a cybercriminal will take when attempting to&lt;br /&gt;
damage or obtain access to a system can greatly simplify the work of&lt;br /&gt;
reverse engineering the incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Mid-Level Incident Response Positions ===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5&lt;br /&gt;
id=&amp;quot;computer-security-incident-response-team-csirt-engineer&amp;quot;&amp;gt;Computer&lt;br /&gt;
security incident response team (CSIRT) engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;cyber-incident-responder&amp;quot;&amp;gt;Cyber incident responder&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-response-engineer&amp;quot;&amp;gt;Incident response&lt;br /&gt;
engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;While each of these positions is different, they generally require&lt;br /&gt;
very similar skills and characteristics in a candidate. At this level,&lt;br /&gt;
personal characteristics such as problem solving, time management, and&lt;br /&gt;
even presentation skills become more crucial as one’s career evolves&lt;br /&gt;
into a management-facing role.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Technical skills include the ability to identify and minimize threats&lt;br /&gt;
while maintaining communication with management and the rest of your&lt;br /&gt;
team. Data analysis and evidence gathering become increasingly crucial,&lt;br /&gt;
and the circumstances in which your services are deployed get more&lt;br /&gt;
serious.&amp;lt;/p&amp;gt;&lt;br /&gt;
Problem-solving skills are crucial at this level of incident&lt;br /&gt;
response, and as the stakes rise, so does the pressure in each&lt;br /&gt;
situation. At this level, programming abilities are essential since&lt;br /&gt;
incident responders may be needed to reverse engineer malicious code or&lt;br /&gt;
even create patches for vulnerable network applications or services. &amp;lt;ref name=&amp;quot;coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated]&amp;quot;. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Senior-Level Incident Response Positions===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;intrusion-detection-specialist&amp;quot;&amp;gt;Intrusion detection&lt;br /&gt;
specialist:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;A CISSP certification might help a potential candidate in preparing&lt;br /&gt;
for the profession. The role of an intrusion detection specialist is to&lt;br /&gt;
find and stop any unwanted communications.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-manager&amp;quot;&amp;gt;Incident manager:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Expected to plan, oversee, manage, and supervise all incident&lt;br /&gt;
response team actions. Is in charge of reporting all current events to&lt;br /&gt;
senior management and stakeholders, as well as acting as the technical&lt;br /&gt;
lead on active incidents for incident responders. Prepares threat and&lt;br /&gt;
impact assessments and reports them known to management.&amp;lt;ref name=&amp;quot;coursera&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Certificates== &lt;br /&gt;
There is a vast number of different certificates and the road map to&lt;br /&gt;
being a certified professional could be very different&amp;lt;ref name=&amp;quot;Coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated],&amp;quot; [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;NICCS&amp;quot;&amp;gt;NICCS, &amp;quot;Cybersecurity Certifications,&amp;quot; [Online]. Available: hhttps://niccs.cisa.gov/about-niccs/cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt; . One possible&lt;br /&gt;
approach is to start with basic certificates from the different branches&lt;br /&gt;
of service and move to more specific and demanding focused&lt;br /&gt;
certification. Also, some jobs require certain clearances, either from&lt;br /&gt;
industry, or from the government. One small selection of different&lt;br /&gt;
possible certificates is brought out in following paragraphs.&lt;br /&gt;
&lt;br /&gt;
Security+ is a CompTIA certification that is considered a basic cert&lt;br /&gt;
among cybersecurity professionals. It covers the topics of risk&lt;br /&gt;
management and threat assessment.&lt;br /&gt;
Network+ is also offered by CompTIA this certification (like the name&lt;br /&gt;
implies) focuses on networking infrastructure and operations. It is&lt;br /&gt;
considered a foundational certification.&lt;br /&gt;
The Certified Information Systems Security Professional (CISSP) is a&lt;br /&gt;
more advanced certification designed for cybersecurity professionals&lt;br /&gt;
with at least five years of work experience. The certification covers&lt;br /&gt;
topics such as architecture, engineering, and management.&amp;lt;/p&amp;gt;&lt;br /&gt;
The Certified Ethical Hacker (CEH) certification is also considered a&lt;br /&gt;
more advanced cert because it generally requires that applicants have&lt;br /&gt;
multiple years of work experience. The goal of an ethical hacker&lt;br /&gt;
certification is to be able to understand how cyber attacks unfold in&lt;br /&gt;
order to improve threat assessment and mitigation skills.&amp;lt;ref name=&amp;quot;cyberguide&amp;quot;&amp;gt;Cybersecurity Guide, &amp;quot;How to become a cybersecurity specialist&amp;quot;, [Online]. Available: https://cybersecurityguide.org/careers/security-specialist/. [Accessed 27 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
This is definitely not all, when one looks for more information, following link could be searched, to get more in depth knowledge about&lt;br /&gt;
different possibilities. Hereby, with the help of this matrix a possible taxonomy of different 436 listed certificates in branches are&lt;br /&gt;
presented.&amp;lt;ref name=&amp;quot;Pauljeremy&amp;quot;&amp;gt;&amp;quot;Cybersecurity Roadmap,&amp;quot; [Online]. Available: https://pauljerimy.com/2020/10/12/scr-oct-2020-update/. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:analystimage5.png|1000px|thumb|Certificate matrix &amp;lt;ref&amp;gt;&amp;quot;Certification roadmap&amp;quot;. Available at https://pauljerimy.com/security-certification-roadmap&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
=== Communication and Network Security===&lt;br /&gt;
Communication and network security covers the ability to secure&lt;br /&gt;
communication channels and networks. Topics include secure and converges&lt;br /&gt;
protocols, wireless networks, cellular networks, hardware operations&lt;br /&gt;
(warranty and redundant power), and third-party connectivity. IP&lt;br /&gt;
networking are also included in this domain.&lt;br /&gt;
===Identity and Access Management===&lt;br /&gt;
The identity and access management domain covers the attacks that&lt;br /&gt;
target the human gateway to gain access to data. Other topics include&lt;br /&gt;
ways to identify users with rights to access the information and&lt;br /&gt;
servers. Identity and access management covers the topics of&lt;br /&gt;
applications, Single sign-on authentication, privilege escalation,&lt;br /&gt;
Kerberos, rule-based or risk-based access control, proofing and&lt;br /&gt;
establishment of identity.&lt;br /&gt;
===Security Architecture and Engineering===&lt;br /&gt;
The security architecture and engineering domain covers important&lt;br /&gt;
topics concerning security engineering plans, designs and principles,&lt;br /&gt;
Topics include assessing and mitigating information system&lt;br /&gt;
vulnerabilities, fundamental concepts of security models and security&lt;br /&gt;
architectures in critical areas like access control. Cloud systems,&lt;br /&gt;
cryptography, system infiltrations (ransomware, fault-injection and&lt;br /&gt;
more) and virtualized systems are also covered in this domain.&lt;br /&gt;
===Asset Security===&lt;br /&gt;
The Asset Security domain deals with the issues related to the&lt;br /&gt;
collection, storage, maintenance, retention and destruction of data. It&lt;br /&gt;
also covers knowledge of different roles regarding data handling (owner,&lt;br /&gt;
controller and custodian) as well as data protection methods and data&lt;br /&gt;
states. Other topics include resource provision, asset classification&lt;br /&gt;
and data lifecycle management.&lt;br /&gt;
===Security and Risk Management===&lt;br /&gt;
The security and risk management domain covers general on skills&lt;br /&gt;
related to the implementation of user awareness programs as well as&lt;br /&gt;
security procedures. Emphasis is also placed on risk management&lt;br /&gt;
concerning the acquisition of new services, hardware and software&lt;br /&gt;
(supply chain). Other skills include social engineering defense&lt;br /&gt;
mechanisms.&lt;br /&gt;
===Security Assessment and Testing===&lt;br /&gt;
The security assessment and testing domain deals with all the&lt;br /&gt;
techniques and tools used to find system vulnerabilities, weaknesses and&lt;br /&gt;
potential areas of concern not addressed by security procedures and&lt;br /&gt;
policies. Attack simulations, vulnerability assessment, compliance&lt;br /&gt;
checks, and ethical disclosure also fall under this domain.&lt;br /&gt;
===Software Security===&lt;br /&gt;
The software development security domain deals with implementing&lt;br /&gt;
software-based security protocols within environment for which the IT&lt;br /&gt;
professional is responsible. Risk analysis, vulnerability identification&lt;br /&gt;
and auditing of source codes are all covered in this subset. Additional&lt;br /&gt;
topics include software-designed security, maturity models, development&lt;br /&gt;
methodologies, open-source and third-party development security.&lt;br /&gt;
===Security operations===&lt;br /&gt;
The security operations domain covers topics ranging from&lt;br /&gt;
investigations and digital forensic to detection and intrusion&lt;br /&gt;
prevention tools, sandboxing and firewalls. Topics include user and&lt;br /&gt;
entity behavior analytics, threat intelligence (threat hunting and&lt;br /&gt;
threat feeds) log management, artifacts (mobile, computer and network),&lt;br /&gt;
machine learning and AI-based tools, penetration testing, and&lt;br /&gt;
exploitation development. These for sub-domains are lister here.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Incident Handling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Penetration Testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Exploitation&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Education==&lt;br /&gt;
[[File:Analystimage7.png|400px|thumb|Comparison degree vs Certificate &amp;lt;ref&amp;gt;&amp;quot;Comparison Table&amp;quot;. Available at https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
The entry level monitoring specialist is hired by Estonian&lt;br /&gt;
Information System Authority even if there is no formal IT education,&lt;br /&gt;
but readiness to learn and moderate knowledge of different operation&lt;br /&gt;
systems is enough to start the career. &amp;lt;ref name=&amp;quot;cv&amp;quot;&amp;gt;cv.ee, &amp;quot;SEIRESPETSIALIST - tule Eesti küberruumi valvuriks!&amp;quot;. Available: https://www.cv.ee/en/vacancy/792782/riigi-infosusteemi-amet/seirespetsialist-tule-eesti-kuberruumi-valvuriks [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Nevertheless, like most other high qualification careers jobs falling&lt;br /&gt;
under the cybersecurity specialist category require some form of formal&lt;br /&gt;
education. However, since cybersecurity specialist jobs can fall across&lt;br /&gt;
a wide spectrum of job descriptions and responsibilities, it is possible&lt;br /&gt;
to obtain a specialist job after completing many levels of different&lt;br /&gt;
computer related education.&lt;br /&gt;
&lt;br /&gt;
If one is looking for a cybersecurity related education, for example&lt;br /&gt;
in EU, 137 courses/programs could be found that relate to keyword IT or&lt;br /&gt;
cybersecurity. &amp;lt;ref name=&amp;quot;enisa&amp;quot;&amp;gt;ENISA (European Union Agency for Cybersecurity), &amp;quot;Cybersecurity Education-Cybersecurity Higher Education Database&amp;quot;. Available: https://www.enisa.europa.eu/topics/cybersecurity-education/education-map/education-courses [Accessed 26 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Also, there is a great amount of discussion, if cyber security&lt;br /&gt;
professional should have a degree or would be certification just enough.&lt;br /&gt;
One interesting table is produces by Franklin University that compares&lt;br /&gt;
benefits and/or drawbacks of each type of credential.&amp;lt;ref name=&amp;quot;franklin&amp;quot;&amp;gt;Franklin University, &amp;quot;Is Getting a Master&#039;s Degree in Cyber Security Worth It?&amp;quot;. Available: https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Certifications are generally good for people with little practical&lt;br /&gt;
experience because they are known quantities in the industry and can&lt;br /&gt;
help you get your foot in the door. They set a minimum knowledge bar.&lt;br /&gt;
But some certifications are viewed more favorably than others.&lt;br /&gt;
Certifications with renewal requirements are viewed better by hiring&lt;br /&gt;
managers, but they also more costly in the long run because of the need&lt;br /&gt;
for continuing education. Certifications are also good for showing&lt;br /&gt;
in-depth expertise in a specialization within cybersecurity. Depending&lt;br /&gt;
on your career goals, it may be advantageous to have a master’s&lt;br /&gt;
degree—which shows your breadth of knowledge, critical thinking and&lt;br /&gt;
leadership skills—and a certificate—which shows specific skill&lt;br /&gt;
competency.&amp;lt;ref name=&amp;quot;franklin&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
As IT (Cyber) Security is still a relatively young discipline,&lt;br /&gt;
universities and colleges are still figuring out which is the best&lt;br /&gt;
approach for their degrees. Study programmes and curricula in Cyber&lt;br /&gt;
Security are different. In general, here are the duration of Cyber&lt;br /&gt;
Security degrees:&lt;br /&gt;
&amp;lt;ref name=&amp;quot;studyportal&amp;quot;&amp;gt;Studyportals, &amp;quot;Why You Should Study a Cyber Security Degree in 2022&amp;quot;. Available: https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Bachelor’s degrees in Cyber Security take 3 or 4 years in most&lt;br /&gt;
countries.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Master’s courses in Cyber Security take between 1-2 years to&lt;br /&gt;
complete.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;PhD programmes in Cyber Security last 3-5 years. Some only take 1&lt;br /&gt;
or 2 years, but they are less common.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Generalization could me made that on bachelor level the general&lt;br /&gt;
knowledge about the cyber issues are obtained. On master level the&lt;br /&gt;
specialization courses are taken and the person can choose more specific&lt;br /&gt;
topics to study. It is on master level where strengths of the cyber&lt;br /&gt;
specialist can be developed further and up-do date knowledge obtained in&lt;br /&gt;
specifics. PhD is serious science and involves teaching, lot of&lt;br /&gt;
scientific work and writing for publications.&lt;br /&gt;
&lt;br /&gt;
==Salary==&lt;br /&gt;
&amp;lt;p&amp;gt;Even if the salary can be very different, compared to the skills and&lt;br /&gt;
experience, an generalization can be made. Cyber Security professionals&lt;br /&gt;
in CSIRT, and in other entities earn quite well, from the start. First,&lt;br /&gt;
some comparison from the United States. The average CSIRT analyst salary&lt;br /&gt;
in the USA is $97,500 per year or $50 per hour. Entry level positions&lt;br /&gt;
start at $48,875 per year while most experienced workers make up to&lt;br /&gt;
$135,373 per year.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.talent.com/salary?job=csirt+analyst&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;There are multiple positions you can occupy in this field. They have&lt;br /&gt;
in common great salaries and high demand for technical skills, attention&lt;br /&gt;
to details, problem-solving mentality, and the ability to analyze risks.&lt;br /&gt;
Here are the average annual salaries in the United States, according to&lt;br /&gt;
Payscale: &amp;lt;ref name=&amp;quot;studyportal&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Cryptographer – 100,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Information Security Officer – 91,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Assessor – 90,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Engineer – 88,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Penetration Tester – 81,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Forensics Expert – 71,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Administrator – 65,000 USD&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
When looking into salaries in Estonia, one can find that there is a&lt;br /&gt;
discussion that private sector is taking a toll from the public sector,&lt;br /&gt;
and that the salaries in important agencies, as Information System&lt;br /&gt;
Authority loose their employees to the better paid positions in private&lt;br /&gt;
sector.&amp;lt;ref name=&amp;quot;digigeenius&amp;quot;&amp;gt;DiGi Geenius, &amp;quot;Kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad&amp;quot;. Available: https://digi.geenius.ee/rubriik/uudis/kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad/ [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;tehnika&amp;quot;&amp;gt;Postimees, &amp;quot;Riigi-it-tootajate-palgamaarad-kasvasid&amp;quot;. Available: https://tehnika.postimees.ee/6887428/riigi-it-tootajate-palgamaarad-kasvasid [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
But there is also a different view that average private sector worker&lt;br /&gt;
could be hired as a top specialist in public sector and then the payment&lt;br /&gt;
is higher. Nevertheless, it seems that the average payment in cyber&lt;br /&gt;
security sector is any way higher that in other parts of the&lt;br /&gt;
e-services. &amp;lt;ref name=&amp;quot;digigeenius2&amp;quot;&amp;gt;DiGi Geenius, &amp;quot;5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka&amp;quot;. Available: https://digi.geenius.ee/rubriik/uudis/5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==SOC==&lt;br /&gt;
&amp;lt;p&amp;gt;A SOC is a facility where an organization’s network, applications,&lt;br /&gt;
and endpoints are monitored and defended. The term was adapted from&lt;br /&gt;
network operations centers (NOCs), where large telecommunication or&lt;br /&gt;
corporate networks are monitored. When network security became more of a&lt;br /&gt;
concern, security teams were formed within the NOCs, and eventually spun&lt;br /&gt;
off into larger organizations of their own as the responsibilities of&lt;br /&gt;
security teams grew increasingly complex and specialized. The security&lt;br /&gt;
staff working in a security operations center are often called the SOC&lt;br /&gt;
team.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Functions of the SOC team include, but are not limited to:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ol type=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Taking inventory of resources, to get a better understanding of the&lt;br /&gt;
structure they are protecting.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintanence of the system, by constantly making updates and adding&lt;br /&gt;
safeguards.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Monitoring the network for abnormalities with special tools.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Threat analysis of new attacks and vulnerabilities.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Responding to attacks, by acting as “first responders”. The SOC team&lt;br /&gt;
will shut down and/or isolate endpoints, deleting files and lowering the&lt;br /&gt;
impact as fast as possible.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Recovery of system stability and lost data. This may be done using&lt;br /&gt;
backups, restarting endpoints or reconfiguring systems.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Logging all actions on the system, to be later used for analysis or&lt;br /&gt;
forensics after an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigating the root cause of an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Auditing their own actions, to be in line with regulations of the&lt;br /&gt;
organization, industry or governing body.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.trellix.com/en-us/security-awareness/operations/what-is-soc.html&amp;lt;/p&amp;gt;&lt;br /&gt;
==CSIRT==&lt;br /&gt;
&amp;lt;p&amp;gt;A CSIRT is a group that responds to security incidents when they&lt;br /&gt;
occur. Key responsibilities of a CSIRT include: &lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
===Creating and maintaining an incident response plan (IRP)===&lt;br /&gt;
An incident response plan (IRP) is a set of written instructions for&lt;br /&gt;
detecting, responding to and limiting the effects of an information&lt;br /&gt;
security event. Incident response plans provide instructions for&lt;br /&gt;
responding to many potential scenarios, including data breaches, denial&lt;br /&gt;
of service/distributed denial of service attacks, firewall breaches,&lt;br /&gt;
virus or malware outbreaks or insider threats. Without an incident&lt;br /&gt;
response plan in place, organizations may either not detect the attack&lt;br /&gt;
in the first place, or not follow proper protocol to contain the threat&lt;br /&gt;
and recover from it when a breach is detected.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.stratacore.com/incidentresponseplan&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
===Investigating and analyzing incidents===&lt;br /&gt;
CSIRTs are also involved in improvement activities. After major&lt;br /&gt;
computer security incidents occur, or when incidents are not handled in&lt;br /&gt;
a timely or effective manner, a CSIRT will generally perform a&lt;br /&gt;
postmortem of the incident and its response. This postmortem will&lt;br /&gt;
identify the strengths and weakness of the response effort. Such reviews&lt;br /&gt;
can identify weaknesses and holes in systems, infrastructure defenses,&lt;br /&gt;
or policies that allowed the incident to take place. It can also&lt;br /&gt;
identify problems with communication channels, interfaces, and&lt;br /&gt;
procedures that inhibited the efficient resolution of the reported&lt;br /&gt;
problem.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.cisa.gov/uscert/bsi/articles/best-practices/incident-management/defining-computer-security-incident-response-teams&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Managing internal communications and updates during or immediately after incidents occur===&lt;br /&gt;
===Communicating with employees, shareholders, customers, and the press about incidents as needed===&lt;br /&gt;
&amp;lt;p&amp;gt;There are various services within the CSIRT Services Framework that&lt;br /&gt;
address communications, as they relate to security operations and&lt;br /&gt;
incident response services. Some of these include Information Security&lt;br /&gt;
Incident Coordination, Crisis Management Support, Vulnerability&lt;br /&gt;
Disclosure, Situational Awareness Communication, and Awareness Building,&lt;br /&gt;
to name a few. Sharing information and communicating with the general&lt;br /&gt;
public and/or your constituency is appropriate in many different&lt;br /&gt;
scenarios. These can range from proactive communications to reactive&lt;br /&gt;
communications. Each scenario may be unique, and careful consideration&lt;br /&gt;
should be given to when to release information to the public and what&lt;br /&gt;
information should be released.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;https://resources.sei.cmu.edu/asset_files/Handbook/2021_002_001_651819.pdf&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Remediating incidents===&lt;br /&gt;
Threat remediation is a strong and capable tool for fighting the&lt;br /&gt;
cyber security compromises. As the word ‘remedy’ suggests, remediation&lt;br /&gt;
process involves the treatment of a security breach. With the&lt;br /&gt;
remediation practices, your cyber security team is able to eliminate&lt;br /&gt;
suspicious activities and malicious attacks in the form of malware,&lt;br /&gt;
ransomware, phishing and such. Even if you ‘kill’ the suspicious&lt;br /&gt;
activity, the attackers can remain in your systems. If you want to&lt;br /&gt;
contaminate and end the problem for good, your remediation processes&lt;br /&gt;
must involve the detection of the cause. &amp;lt;ref name=&amp;quot;logsign&amp;quot;&amp;gt;Logsign, &amp;quot;What-is-remediation-in-cyber-security&amp;quot;. Available: https://www.logsign.com/blog/what-is-remediation-in-cyber-security/. [Accessed 28 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Recommending technology, policy, governance, and training changes after security incidents===&lt;br /&gt;
After all these actions, the SCIRT must contribute to the development&lt;br /&gt;
of better policies, practices and has to recommend improvements. They&lt;br /&gt;
are not working in the vacuum and their work has to create new and&lt;br /&gt;
better standards for cyber security. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;Exabeam, &amp;quot;CSIRT&amp;quot;. Available: https://www.exabeam.com/incident-response/csirt/ [Accessed 28 APr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==CERT==&lt;br /&gt;
&amp;lt;p&amp;gt;The term “computer emergency response team” was coined in 1988. In&lt;br /&gt;
response to the Morris worm attack that impacted thousands of servers on&lt;br /&gt;
the Internet, DARPA funded the formation of the Computer Emergency&lt;br /&gt;
Response Team Coordination Center (CERT-CC) at Carnegie Mellon&lt;br /&gt;
University. The goal of CERT-CC was to help protect the internet by&lt;br /&gt;
collecting and disseminating information on critical security&lt;br /&gt;
vulnerabilities. Several other countries formed similar centers using&lt;br /&gt;
the same acronym (despite threats of legal action by Carnegie Mellon for&lt;br /&gt;
trademark infringement). Now the term CERT refers to any emergency&lt;br /&gt;
response team that deals with cyber threats. Many people use CERT-CC&lt;br /&gt;
interchangeably with CSIRT, though the charter of a CERT is information&lt;br /&gt;
sharing in order to help other response teams respond to threats against&lt;br /&gt;
their own infrastructure.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In general, the designation of CERT is helpful in applying real-world&lt;br /&gt;
solutions to various cybersecurity problems. They may be government&lt;br /&gt;
contractors or employees of a major corporation. For example, the U.S.&lt;br /&gt;
Computer Emergency Readiness Team (US-CERT) operates under the U.S.&lt;br /&gt;
Department of Homeland Security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.techopedia.com/definition/31003/computer-emergency-response-team-cert&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In Estonia CERT is designated as CERT-EE. It was established in 2006,&lt;br /&gt;
as an organization responsible for the management of security incidents&lt;br /&gt;
in .ee computer networks. It is also a national contact point for&lt;br /&gt;
international co-operation in the field of IT security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ria.ee/en/cyber-security/cert-ee.html&amp;lt;/p&amp;gt;&lt;br /&gt;
===Difference between SOC/CSIRT/CERT===&lt;br /&gt;
&amp;lt;p&amp;gt;How CSIRTs differ from CERTs and SOCs There are overlapping&lt;br /&gt;
responsibilities between a community emergency response team (CERT),&lt;br /&gt;
computer security incident response team (CSIRT), and security&lt;br /&gt;
operations center (SOC). To add to this confusion, frequently, the terms&lt;br /&gt;
CERT and CSIRT are used interchangeably, despite the important&lt;br /&gt;
differences.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image3.png&amp;quot; alt=&amp;quot;Overlapping in images/image3.png&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;Overlapping in&lt;br /&gt;
images/image3.png&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
==Understand the primary roles and characteristics of a CERT, CSIRT, and SOC.==&lt;br /&gt;
&amp;lt;p&amp;gt;So, using strict definitions, a CERT collects and disseminates&lt;br /&gt;
security information, typically for the benefit of a country or an&lt;br /&gt;
industry. A CSIRT is a cross-functional team that responds to incidents&lt;br /&gt;
on behalf of a country or an organization. A SOC is where a country or&lt;br /&gt;
organization monitors and defends its network, servers, applications,&lt;br /&gt;
and endpoints.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image4.png&amp;quot; alt=&amp;quot;table of explanation images/image4&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;table of explanation&lt;br /&gt;
images/image4&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
==Future==&lt;br /&gt;
&amp;lt;p&amp;gt;And the Cyber security problem is only getting bigger. According to a&lt;br /&gt;
report published by Accenture, the number of cyber security breaches&lt;br /&gt;
increased by 11 percent from 2017 to 2018. The cost of such breaches is&lt;br /&gt;
astronomical–about $600 billion worldwide, according to the Economic&lt;br /&gt;
Impact of Cybercrime report.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Job projections for cybersecurity are staggering. The Bureau of Labor&lt;br /&gt;
Statistics in US predicts that careers in the cybersecurity field will&lt;br /&gt;
grow by 32% by 2028. That makes cybersecurity one of the top 10&lt;br /&gt;
fastest-growing jobs in the country. In the United States alone, jobs&lt;br /&gt;
for Information Security Analysts are expected to grow by 15% by&lt;br /&gt;
2024.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Most likely this trend is also similar in other countries.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When checking Estonian job portals, there is a constant need for&lt;br /&gt;
people for cyber security related positions. Also, linkedin search gives&lt;br /&gt;
approximately 30 vacancies immediately. There are banks, logistics&lt;br /&gt;
companies, e-shops, and software producers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://ee.linkedin.com/jobs/cyber-security-jobs?countryRedirected=1&amp;amp;amp;position=1&amp;amp;amp;pageNum=0&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Trends that affect companies create need for constant cyber security&lt;br /&gt;
services. Increasing number of home/remote offices require secure&lt;br /&gt;
corporate networks and security of remote devices. One example is from&lt;br /&gt;
this year, when sloppy remote desktop set-up paralyzed systems of 17&lt;br /&gt;
companies.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.aripaev.ee/uudised/2022/04/20/ria-lohakas-kaugtoolaua-seadistus-halvas-martsis-vahemalt-17-juhul-ettevotete-it-susteemid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Also, no service can exists without robust infrastructure - servers,&lt;br /&gt;
databases, applications. As all previously mentioned devices and&lt;br /&gt;
services are at constant scanning and surveillance. So, the breach&lt;br /&gt;
detection and immediate action demands 24/7 services. Even if lot of&lt;br /&gt;
things could be automated, there is a need for human specialists (at&lt;br /&gt;
least, at the moment). Third growing field is also a forensic&lt;br /&gt;
investigation, as every attack must be investigated in order to be ready&lt;br /&gt;
to repel next attacks. So data recovery and evidence collection is&lt;br /&gt;
another important field of work that need skilled and professional&lt;br /&gt;
workers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Even, if the specifics of the entity, be it CSIRT, CERT or SOC, are&lt;br /&gt;
different, the fundamentals of the work are the same. Professional&lt;br /&gt;
knowledge of the networks, operational systems, hardware, scripting, and&lt;br /&gt;
several other wider IT related knowledge is needed. As there is no&lt;br /&gt;
single way to reach to it, every single person can find one’s strongest&lt;br /&gt;
sides and develop them with knowledge of weaker side, in order to know,&lt;br /&gt;
when to as for help.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/body&amp;gt;&lt;br /&gt;
&amp;lt;/html&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mavald</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142215</id>
		<title>Hiring a Cyber Security Incident Analyst</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142215"/>
		<updated>2022-05-01T15:37:32Z</updated>

		<summary type="html">&lt;p&gt;Mavald: /* Education */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==A Cyber Security Incident Analyst==&lt;br /&gt;
&lt;br /&gt;
[[File:image1.png|600px|thumb|Job advertisement &amp;lt;ref&amp;gt;&amp;quot;Job Advertisement&amp;quot;. Available at https://www.projectpeople.com/jobs/&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
===Cyber security incident analyst in SOC/CSIRT/CERT===&lt;br /&gt;
This article delves into the job title of Cyber Security Incident&lt;br /&gt;
Analyst and provides an overview of the acronyms SOC/CSIRT/CERT. A brief&lt;br /&gt;
history of the job is discussed here, as well as a possible career path,&lt;br /&gt;
education, experience, and other characteristics required for work in&lt;br /&gt;
computer security-related organizations. The article also provides a&lt;br /&gt;
brief history of SOC/CSIRT/CERT, as well as a comparison of their&lt;br /&gt;
differences and similarities.&lt;br /&gt;
===Cyber Security Incident Analyst Skill Set===&lt;br /&gt;
What skill set is expected from the Cyber Security Incident Analyst? Below written lines are taken from the same job advertisement depicted&lt;br /&gt;
on the left side of this article:&lt;br /&gt;
As a Security Incident Analyst your responsibilities will include:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Continuous monitoring of security tooling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Performing regular and ad-hoc vulnerability assessments&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Carrying out ‘spot checks’&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Reporting vulnerabilities to the PVG via the alerts system&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintaining and documenting logging systems&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Developing centralized logging, reporting and intelligence&lt;br /&gt;
platforms&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;‘Light touch’ penetration testing with open source tooling&lt;br /&gt;
(Metasploit)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Knowledge &amp;amp;amp; Experience required:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;SOC, CSIRT or CERT operational environment experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Windows / Linux experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TCP /IP networking protocol knowledge&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience reviewing and analyzing Security Events from various&lt;br /&gt;
monitoring and logging sources&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience in website and web application security assessment or&lt;br /&gt;
penetration testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience of using Metasploit&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Scripting knowledge using BASH, Python, Perl, Ruby&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Skills in Host and Network Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
As one can see the description of the duties is wide and also the&lt;br /&gt;
knowledge and experience that is required is noteworthy. So, where to&lt;br /&gt;
start to find out the way to get this kind of knowledge and&lt;br /&gt;
expertize.&lt;br /&gt;
===Possible career path===&lt;br /&gt;
Next part of the paper is aiming to depict a possible ways, how to&lt;br /&gt;
develop oneself, and move along the career pathway in cybersecurity&lt;br /&gt;
field. Topics of development, education, experience and certification&lt;br /&gt;
are covered.&lt;br /&gt;
[[File:analystimage2.png|1000px|thumb|Career path &amp;lt;ref&amp;gt;&amp;quot;Possible Career Path&amp;quot;. Available at https://www.cyberseek.org/pathway.html&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
===Junior/Senior===&lt;br /&gt;
Start with an entry-level job in IT. Hands-on experience is often the&lt;br /&gt;
most effective way to prepare for certification exams. Start&lt;br /&gt;
accumulating work experience with an entry-level role as a cybersecurity&lt;br /&gt;
analyst. Many cybersecurity professionals start off in more general IT&lt;br /&gt;
roles. The skills, practices, and technologies you’ll use as a&lt;br /&gt;
cybersecurity professional will continue to evolve along with computer&lt;br /&gt;
and network technology. The desire to learn, ability to problem solve,&lt;br /&gt;
and attention to detail will serve you well in this field. Other, more&lt;br /&gt;
technical skills and technologies to learn include:&amp;lt;ref name=&amp;quot;certification&amp;quot;&amp;gt;Popular Cyber Security Certificates [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications  [Accessed 25 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====SIEM tools (security information and event management)====&lt;br /&gt;
Security Information and Event Management (SIEM) is a set of tools&lt;br /&gt;
and services offering a holistic view of an organization’s information&lt;br /&gt;
security. SIEM works by combining two technologies:&lt;br /&gt;
&amp;lt;li&amp;gt;Security information management (SIM), which collects data from log&lt;br /&gt;
files for analysis and reports on security threats and events, and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;security event management (SEM), which conducts real-time system&lt;br /&gt;
monitoring, notifies network admins about important issues and&lt;br /&gt;
establishes correlations between security events. There are a number of&lt;br /&gt;
security information and event management solutions on the market.&lt;br /&gt;
ArcSight ESM, IBM QRadar and Splunk are among the most popular. &amp;lt;ref name=&amp;quot;SIEM&amp;quot;&amp;gt;Application security, SIEM [Online]. Available: https://www.imperva.com/learn/application-security/siem/. [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Firewalls, Intrusion Detection Systems (IDS), and Intrusion Prevention Systems(IPS)====&lt;br /&gt;
Firewalls can be two types, hardware and software firewalls. Software&lt;br /&gt;
firewall is a firewall that is installed on a computer or server, and&lt;br /&gt;
tasked with network security. It works with a wide variety of other&lt;br /&gt;
technology security solutions to provide more robust and cohesive&lt;br /&gt;
security for enterprises of all sizes. When a software firewall is&lt;br /&gt;
installed on a server, it opens up like an umbrella of protection over&lt;br /&gt;
all other computers connected to the network. It is able to monitor both&lt;br /&gt;
incoming and outgoing traffic for potential risk or suspicious user&lt;br /&gt;
behavior, and also makes setting security policies much easier, faster&lt;br /&gt;
and more flexible. Hardware firewall is positioned between the network&lt;br /&gt;
and devices, allowing traffic to funnel through the firewall for a close&lt;br /&gt;
inspection and analysis. A hardware firewall, a term often&lt;br /&gt;
interchangeable with network or next-generation firewall, protects the&lt;br /&gt;
network gateways for an enterprise. Hardware firewall is physical&lt;br /&gt;
hardware, installed between network elements and connected devices, and&lt;br /&gt;
is tasked with filtering traffic for cyber threat to the network or&lt;br /&gt;
devices. Filtering out unauthorized or suspicious users based on traffic&lt;br /&gt;
analysis is one of the biggest benefits of hardware firewall. &amp;lt;ref name=&amp;quot;sangfor&amp;quot;&amp;gt;Sangfor, &amp;quot;What is Software Firewall? Difference between Hardware Firewall and Software Firewall, [Online]. Available: https://www.sangfor.com/blog/cybersecurity/what-is-software-firewall-difference-between-hardware-firewall-and-software-firewall [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems&lt;br /&gt;
(IPS) are both parts of the network infrastructure. IDS/IPS compare&lt;br /&gt;
network packets to a cyberthreat database containing known signatures of&lt;br /&gt;
cyberattacks — and flag any matching packets. IDS doesn’t alter the&lt;br /&gt;
network packets in any way, whereas IPS prevents the packet from&lt;br /&gt;
delivery based on the contents of the packet, much like how a firewall&lt;br /&gt;
prevents traffic by IP address. &amp;lt;ref name=&amp;quot;Varonis&amp;quot;&amp;gt;Varonis, &amp;quot;What is Software Firewall? IDS vs. IPS: What is the Difference?, [Online]. Available: https://www.varonis.com/blog/ids-vs-ips [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Digital forensics====&lt;br /&gt;
Digital forensics is a branch of forensic science that focuses on&lt;br /&gt;
identifying, acquiring, processing, analyzing, and reporting on data&lt;br /&gt;
stored electronically. Electronic evidence is a component of almost all&lt;br /&gt;
criminal activities and digital forensics support is crucial for law&lt;br /&gt;
enforcement investigations. Electronic evidence can be collected from a&lt;br /&gt;
wide array of sources, such as computers, smartphones, remote storage,&lt;br /&gt;
unmanned aerial systems, shipborne equipment, and more.&amp;lt;ref name=&amp;quot;interpol&amp;quot;&amp;gt;Interpol, &amp;quot;Digital forensics&amp;quot;. Available: https://www.interpol.int/How-we-work/Innovation/Digital-forensics. [Accessed 28 4 2022].&amp;lt;/ref&amp;gt; &lt;br /&gt;
Investigative process of digital forensics can be divided into several stages. There are four major stages: preservation, collection,&lt;br /&gt;
examination, and analysis. All these four stages need a deep understanding of computers, technology across a broad spectrum, and cybersecurity principles and&lt;br /&gt;
practices, a working knowledge of computers, networks, and coding, in-depth investigative abilities, critical-thinking skills and analytical talent the ability to effectively communicate and work with a&lt;br /&gt;
wide range of people. &amp;lt;ref name=&amp;quot;ecpi&amp;quot;&amp;gt;&amp;quot;Digital forensics&amp;quot;. Available: https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me. [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Mobile device management====&lt;br /&gt;
Mobile device management (MDM) is software that allows IT&lt;br /&gt;
administrators to control, secure and enforce policies on smartphones,&lt;br /&gt;
tablets and other endpoints. Mobile device management software emerged&lt;br /&gt;
in the early 2000s as a way to control and secure the personal digital&lt;br /&gt;
assistants and smartphones that business workers began to use. The&lt;br /&gt;
consumer smartphone boom that started with the launch of the Apple&lt;br /&gt;
iPhone in 2007 led to the bring your own device (BYOD) trend, which&lt;br /&gt;
fueled further interest in MDM.&amp;lt;ref name=&amp;quot;techtarget&amp;quot;&amp;gt;Techtarget, &amp;quot;Mobile Device Management&amp;quot;. Available: https://www.techtarget.com/searchmobilecomputing/definition/mobile-device-management [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Data management====&lt;br /&gt;
Sometimes the data management is neglected, but this part has a&lt;br /&gt;
crucial role when learning for good cyber security practices. Majority&lt;br /&gt;
of cyber security programs include a special courses on data management.&lt;br /&gt;
Data management is a method of organizing and maintaining data processes&lt;br /&gt;
that are required in almost every business operations. The benefits of&lt;br /&gt;
data management can be found accounting, statistics, logistics planning&lt;br /&gt;
and other disciplines including corporate computing.&amp;lt;ref name=&amp;quot;GlobalUni&amp;quot;&amp;gt;Global Universities, &amp;quot;MSc Data Management and Cyber Security&amp;quot;. Available: https://globaluniversities.in/msc-data-management-cyber-security. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Data governance (and management) play a fundamental role in&lt;br /&gt;
protecting an organization’s data. Ensuring that the right people have&lt;br /&gt;
the right access and that appropriate security controls are in place to&lt;br /&gt;
protect each system or service, based on the criticality or sensitivity&lt;br /&gt;
of the data sets these contain. &amp;lt;ref name=&amp;quot;CyberMagazine&amp;quot;&amp;gt;Cyber Security Magazine, &amp;quot;The Role of Data Governance in Cybersecurity&amp;quot;. Available: https://cybersecurity-magazine.com/the-role-of-data-governance-in-cybersecurity/?utm_source=rss&amp;amp;amp;utm_medium=rss&amp;amp;amp;utm_campaign=the-role-of-data-governance-in-cybersecurity. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Application security development====&lt;br /&gt;
Application security describes security measures at the application&lt;br /&gt;
level that aim to prevent data or code within the app from being stolen&lt;br /&gt;
or hijacked. It encompasses the security considerations that happen&lt;br /&gt;
during application development and design, but it also involves systems&lt;br /&gt;
and approaches to protect apps after they get deployed. Application&lt;br /&gt;
security may include hardware, software, and procedures that identify or&lt;br /&gt;
minimize security vulnerabilities.&amp;lt;ref name=&amp;quot;vmware&amp;quot;&amp;gt;VmWare, &amp;quot;What is application security?&amp;quot;. Available: https://www.vmware.com/topics/glossary/content/application-security.html [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Application security development is important to ensure that your&lt;br /&gt;
application is free from coding errors and bugs. And controls the risk&lt;br /&gt;
and helps safeguard against security vulnerabilities. Application&lt;br /&gt;
security development is the process of making applications more secure&lt;br /&gt;
by finding and fixing security vulnerabilities. This is often done by&lt;br /&gt;
enforcing software security best practices and using application&lt;br /&gt;
security testing tools. &lt;br /&gt;
&amp;lt;ref name=&amp;quot;perforce&amp;quot;&amp;gt;Perforce, &amp;quot;Application Security Development Best Practices&amp;quot;. Available: https://www.perforce.com/blog/kw/application-security-development-best-practices. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Audit and compliance knowledge====&lt;br /&gt;
A cyber security audit is designed to be a comprehensive review and&lt;br /&gt;
analysis of your business’s IT infrastructure. It identifies threats and&lt;br /&gt;
vulnerabilities, exposing weaknesses and high-risk practices.&lt;br /&gt;
Regulations such as the EU GDPR (General Data Protection Regulation) can&lt;br /&gt;
impose hefty penalties in the event of a breach that results in&lt;br /&gt;
exploited data. A cyber security audit will help mitigate the&lt;br /&gt;
consequences of a breach and demonstrate that your organization has&lt;br /&gt;
taken the necessary steps to protect client and company data. &amp;lt;ref name=&amp;quot;cyforsecure&amp;quot;&amp;gt;Cyfor Secure, &amp;quot;What is a Cyber Security Audit and how can it help your organisation?&amp;quot;. Available: https://cyforsecure.co.uk/services/cyber-assessment/cyber-security-audit/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cybersecurity compliance is the organizational risk management method&lt;br /&gt;
aligned with pre-defined security measures &amp;amp;amp; controls on how data&lt;br /&gt;
confidentiality is ensured by its administrative procedures.&amp;lt;ref name=&amp;quot;nordlayer&amp;quot;&amp;gt;NordLayer, &amp;quot;Cybersecurity compliance: Everything you need to know&amp;quot;. Available: https://nordlayer.com/blog/cybersecurity-compliance-everything-you-need-to-know/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
All needed skills are developed through courses and certification.&lt;br /&gt;
&lt;br /&gt;
===Entry-Level Incident Response Positions===&lt;br /&gt;
It is not always possible to advance to the position of incident&lt;br /&gt;
responder in a straight line. Many professionals advance from entry- to&lt;br /&gt;
mid-level positions before becoming a real incident responder or a&lt;br /&gt;
member of a computer emergency response team (CERT).&amp;lt;br /&amp;gt;&lt;br /&gt;
These are some examples: &amp;lt;ref name=&amp;quot;Infosec&amp;quot;&amp;gt;Infosec, &amp;quot;Incident Responder Career Roadmap: From Entry Level to Executive&amp;quot;. Available: https://resources.infosecinstitute.com/topic/incident-responder-career-roadmap-entry-level-executive/ [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;network-administrator&amp;quot;&amp;gt;Network administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;This position’s experience will help potential incident responders&lt;br /&gt;
develop networking skills. Attention to detail, as well as the ability&lt;br /&gt;
to sift through system configurations, site layouts, and general network&lt;br /&gt;
and communication setups, are essential in this field.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;system-administrator&amp;quot;&amp;gt;System administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Another crucial beginning point for an incident responder is to learn&lt;br /&gt;
how to manage resources inside your organization as well as user&lt;br /&gt;
behavior. Understanding the potential damage that users, inadequate&lt;br /&gt;
security setups, and ineffective IT policies and procedures can cause on&lt;br /&gt;
your network can provide prospective candidates with insight into the&lt;br /&gt;
human component of an incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;security-administrator&amp;quot;&amp;gt;Security administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In such a position, basic hacking skills, penetration testing, and&lt;br /&gt;
intrusion detection are all learned, which are crucial incident&lt;br /&gt;
responder skills when trying to replicate a breach or attack.&lt;br /&gt;
Understanding the paths a cybercriminal will take when attempting to&lt;br /&gt;
damage or obtain access to a system can greatly simplify the work of&lt;br /&gt;
reverse engineering the incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Mid-Level Incident Response Positions ===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5&lt;br /&gt;
id=&amp;quot;computer-security-incident-response-team-csirt-engineer&amp;quot;&amp;gt;Computer&lt;br /&gt;
security incident response team (CSIRT) engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;cyber-incident-responder&amp;quot;&amp;gt;Cyber incident responder&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-response-engineer&amp;quot;&amp;gt;Incident response&lt;br /&gt;
engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;While each of these positions is different, they generally require&lt;br /&gt;
very similar skills and characteristics in a candidate. At this level,&lt;br /&gt;
personal characteristics such as problem solving, time management, and&lt;br /&gt;
even presentation skills become more crucial as one’s career evolves&lt;br /&gt;
into a management-facing role.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Technical skills include the ability to identify and minimize threats&lt;br /&gt;
while maintaining communication with management and the rest of your&lt;br /&gt;
team. Data analysis and evidence gathering become increasingly crucial,&lt;br /&gt;
and the circumstances in which your services are deployed get more&lt;br /&gt;
serious.&amp;lt;/p&amp;gt;&lt;br /&gt;
Problem-solving skills are crucial at this level of incident&lt;br /&gt;
response, and as the stakes rise, so does the pressure in each&lt;br /&gt;
situation. At this level, programming abilities are essential since&lt;br /&gt;
incident responders may be needed to reverse engineer malicious code or&lt;br /&gt;
even create patches for vulnerable network applications or services. &amp;lt;ref name=&amp;quot;coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated]&amp;quot;. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Senior-Level Incident Response Positions===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;intrusion-detection-specialist&amp;quot;&amp;gt;Intrusion detection&lt;br /&gt;
specialist:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;A CISSP certification might help a potential candidate in preparing&lt;br /&gt;
for the profession. The role of an intrusion detection specialist is to&lt;br /&gt;
find and stop any unwanted communications.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-manager&amp;quot;&amp;gt;Incident manager:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Expected to plan, oversee, manage, and supervise all incident&lt;br /&gt;
response team actions. Is in charge of reporting all current events to&lt;br /&gt;
senior management and stakeholders, as well as acting as the technical&lt;br /&gt;
lead on active incidents for incident responders. Prepares threat and&lt;br /&gt;
impact assessments and reports them known to management.&amp;lt;ref name=&amp;quot;coursera&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Certificates== &lt;br /&gt;
There is a vast number of different certificates and the road map to&lt;br /&gt;
being a certified professional could be very different&amp;lt;ref name=&amp;quot;Coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated],&amp;quot; [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;NICCS&amp;quot;&amp;gt;NICCS, &amp;quot;Cybersecurity Certifications,&amp;quot; [Online]. Available: hhttps://niccs.cisa.gov/about-niccs/cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt; . One possible&lt;br /&gt;
approach is to start with basic certificates from the different branches&lt;br /&gt;
of service and move to more specific and demanding focused&lt;br /&gt;
certification. Also, some jobs require certain clearances, either from&lt;br /&gt;
industry, or from the government. One small selection of different&lt;br /&gt;
possible certificates is brought out in following paragraphs.&lt;br /&gt;
&lt;br /&gt;
Security+ is a CompTIA certification that is considered a basic cert&lt;br /&gt;
among cybersecurity professionals. It covers the topics of risk&lt;br /&gt;
management and threat assessment.&lt;br /&gt;
Network+ is also offered by CompTIA this certification (like the name&lt;br /&gt;
implies) focuses on networking infrastructure and operations. It is&lt;br /&gt;
considered a foundational certification.&lt;br /&gt;
The Certified Information Systems Security Professional (CISSP) is a&lt;br /&gt;
more advanced certification designed for cybersecurity professionals&lt;br /&gt;
with at least five years of work experience. The certification covers&lt;br /&gt;
topics such as architecture, engineering, and management.&amp;lt;/p&amp;gt;&lt;br /&gt;
The Certified Ethical Hacker (CEH) certification is also considered a&lt;br /&gt;
more advanced cert because it generally requires that applicants have&lt;br /&gt;
multiple years of work experience. The goal of an ethical hacker&lt;br /&gt;
certification is to be able to understand how cyber attacks unfold in&lt;br /&gt;
order to improve threat assessment and mitigation skills.&amp;lt;ref name=&amp;quot;cyberguide&amp;quot;&amp;gt;Cybersecurity Guide, &amp;quot;How to become a cybersecurity specialist&amp;quot;, [Online]. Available: https://cybersecurityguide.org/careers/security-specialist/. [Accessed 27 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
This is definitely not all, when one looks for more information, following link could be searched, to get more in depth knowledge about&lt;br /&gt;
different possibilities. Hereby, with the help of this matrix a possible taxonomy of different 436 listed certificates in branches are&lt;br /&gt;
presented.&amp;lt;ref name=&amp;quot;Pauljeremy&amp;quot;&amp;gt;&amp;quot;Cybersecurity Roadmap,&amp;quot; [Online]. Available: https://pauljerimy.com/2020/10/12/scr-oct-2020-update/. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:analystimage5.png|1000px|thumb|Certificate matrix &amp;lt;ref&amp;gt;&amp;quot;Certification roadmap&amp;quot;. Available at https://pauljerimy.com/security-certification-roadmap&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
=== Communication and Network Security===&lt;br /&gt;
Communication and network security covers the ability to secure&lt;br /&gt;
communication channels and networks. Topics include secure and converges&lt;br /&gt;
protocols, wireless networks, cellular networks, hardware operations&lt;br /&gt;
(warranty and redundant power), and third-party connectivity. IP&lt;br /&gt;
networking are also included in this domain.&lt;br /&gt;
===Identity and Access Management===&lt;br /&gt;
The identity and access management domain covers the attacks that&lt;br /&gt;
target the human gateway to gain access to data. Other topics include&lt;br /&gt;
ways to identify users with rights to access the information and&lt;br /&gt;
servers. Identity and access management covers the topics of&lt;br /&gt;
applications, Single sign-on authentication, privilege escalation,&lt;br /&gt;
Kerberos, rule-based or risk-based access control, proofing and&lt;br /&gt;
establishment of identity.&lt;br /&gt;
===Security Architecture and Engineering===&lt;br /&gt;
The security architecture and engineering domain covers important&lt;br /&gt;
topics concerning security engineering plans, designs and principles,&lt;br /&gt;
Topics include assessing and mitigating information system&lt;br /&gt;
vulnerabilities, fundamental concepts of security models and security&lt;br /&gt;
architectures in critical areas like access control. Cloud systems,&lt;br /&gt;
cryptography, system infiltrations (ransomware, fault-injection and&lt;br /&gt;
more) and virtualized systems are also covered in this domain.&lt;br /&gt;
===Asset Security===&lt;br /&gt;
The Asset Security domain deals with the issues related to the&lt;br /&gt;
collection, storage, maintenance, retention and destruction of data. It&lt;br /&gt;
also covers knowledge of different roles regarding data handling (owner,&lt;br /&gt;
controller and custodian) as well as data protection methods and data&lt;br /&gt;
states. Other topics include resource provision, asset classification&lt;br /&gt;
and data lifecycle management.&lt;br /&gt;
===Security and Risk Management===&lt;br /&gt;
The security and risk management domain covers general on skills&lt;br /&gt;
related to the implementation of user awareness programs as well as&lt;br /&gt;
security procedures. Emphasis is also placed on risk management&lt;br /&gt;
concerning the acquisition of new services, hardware and software&lt;br /&gt;
(supply chain). Other skills include social engineering defense&lt;br /&gt;
mechanisms.&lt;br /&gt;
===Security Assessment and Testing===&lt;br /&gt;
The security assessment and testing domain deals with all the&lt;br /&gt;
techniques and tools used to find system vulnerabilities, weaknesses and&lt;br /&gt;
potential areas of concern not addressed by security procedures and&lt;br /&gt;
policies. Attack simulations, vulnerability assessment, compliance&lt;br /&gt;
checks, and ethical disclosure also fall under this domain.&lt;br /&gt;
===Software Security===&lt;br /&gt;
The software development security domain deals with implementing&lt;br /&gt;
software-based security protocols within environment for which the IT&lt;br /&gt;
professional is responsible. Risk analysis, vulnerability identification&lt;br /&gt;
and auditing of source codes are all covered in this subset. Additional&lt;br /&gt;
topics include software-designed security, maturity models, development&lt;br /&gt;
methodologies, open-source and third-party development security.&lt;br /&gt;
===Security operations===&lt;br /&gt;
The security operations domain covers topics ranging from&lt;br /&gt;
investigations and digital forensic to detection and intrusion&lt;br /&gt;
prevention tools, sandboxing and firewalls. Topics include user and&lt;br /&gt;
entity behavior analytics, threat intelligence (threat hunting and&lt;br /&gt;
threat feeds) log management, artifacts (mobile, computer and network),&lt;br /&gt;
machine learning and AI-based tools, penetration testing, and&lt;br /&gt;
exploitation development. These for sub-domains are lister here.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Incident Handling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Penetration Testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Exploitation&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Education==&lt;br /&gt;
[[File:Analystimage7.png|400px|thumb|Comparison degree vs Certificate &amp;lt;ref&amp;gt;&amp;quot;Comparison Table&amp;quot;. Available at https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
The entry level monitoring specialist is hired by Estonian&lt;br /&gt;
Information System Authority even if there is no formal IT education,&lt;br /&gt;
but readiness to learn and moderate knowledge of different operation&lt;br /&gt;
systems is enough to start the career. &amp;lt;ref name=&amp;quot;cv&amp;quot;&amp;gt;cv.ee, &amp;quot;SEIRESPETSIALIST - tule Eesti küberruumi valvuriks!&amp;quot;. Available: https://www.cv.ee/en/vacancy/792782/riigi-infosusteemi-amet/seirespetsialist-tule-eesti-kuberruumi-valvuriks [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Nevertheless, like most other high qualification careers jobs falling&lt;br /&gt;
under the cybersecurity specialist category require some form of formal&lt;br /&gt;
education. However, since cybersecurity specialist jobs can fall across&lt;br /&gt;
a wide spectrum of job descriptions and responsibilities, it is possible&lt;br /&gt;
to obtain a specialist job after completing many levels of different&lt;br /&gt;
computer related education.&lt;br /&gt;
&lt;br /&gt;
If one is looking for a cybersecurity related education, for example&lt;br /&gt;
in EU, 137 courses/programs could be found that relate to keyword IT or&lt;br /&gt;
cybersecurity. &amp;lt;ref name=&amp;quot;enisa&amp;quot;&amp;gt;ENISA (European Union Agency for Cybersecurity), &amp;quot;Cybersecurity Education-Cybersecurity Higher Education Database&amp;quot;. Available: https://www.enisa.europa.eu/topics/cybersecurity-education/education-map/education-courses [Accessed 26 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Also, there is a great amount of discussion, if cyber security&lt;br /&gt;
professional should have a degree or would be certification just enough.&lt;br /&gt;
One interesting table is produces by Franklin University that compares&lt;br /&gt;
benefits and/or drawbacks of each type of credential.&amp;lt;ref name=&amp;quot;franklin&amp;quot;&amp;gt;Franklin University, &amp;quot;Is Getting a Master&#039;s Degree in Cyber Security Worth It?&amp;quot;. Available: https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Certifications are generally good for people with little practical&lt;br /&gt;
experience because they are known quantities in the industry and can&lt;br /&gt;
help you get your foot in the door. They set a minimum knowledge bar.&lt;br /&gt;
But some certifications are viewed more favorably than others.&lt;br /&gt;
Certifications with renewal requirements are viewed better by hiring&lt;br /&gt;
managers, but they also more costly in the long run because of the need&lt;br /&gt;
for continuing education. Certifications are also good for showing&lt;br /&gt;
in-depth expertise in a specialization within cybersecurity. Depending&lt;br /&gt;
on your career goals, it may be advantageous to have a master’s&lt;br /&gt;
degree—which shows your breadth of knowledge, critical thinking and&lt;br /&gt;
leadership skills—and a certificate—which shows specific skill&lt;br /&gt;
competency.&amp;lt;ref name=&amp;quot;franklin&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
As IT (Cyber) Security is still a relatively young discipline,&lt;br /&gt;
universities and colleges are still figuring out which is the best&lt;br /&gt;
approach for their degrees. Study programmes and curricula in Cyber&lt;br /&gt;
Security are different. In general, here are the duration of Cyber&lt;br /&gt;
Security degrees:&lt;br /&gt;
&amp;lt;ref name=&amp;quot;studyportal&amp;quot;&amp;gt;Studyportals, &amp;quot;Why You Should Study a Cyber Security Degree in 2022&amp;quot;. Available: https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Bachelor’s degrees in Cyber Security take 3 or 4 years in most&lt;br /&gt;
countries.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Master’s courses in Cyber Security take between 1-2 years to&lt;br /&gt;
complete.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;PhD programmes in Cyber Security last 3-5 years. Some only take 1&lt;br /&gt;
or 2 years, but they are less common.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Generalization could me made that on bachelor level the general&lt;br /&gt;
knowledge about the cyber issues are obtained. On master level the&lt;br /&gt;
specialization courses are taken and the person can choose more specific&lt;br /&gt;
topics to study. It is on master level where strengths of the cyber&lt;br /&gt;
specialist can be developed further and up-do date knowledge obtained in&lt;br /&gt;
specifics. PhD is serious science and involves teaching, lot of&lt;br /&gt;
scientific work and writing for publications.&lt;br /&gt;
&lt;br /&gt;
==Salary==&lt;br /&gt;
&amp;lt;p&amp;gt;Even if the salary can be very different, compared to the skills and&lt;br /&gt;
experience, an generalization can be made. Cyber Security professionals&lt;br /&gt;
in CSIRT, and in other entities earn quite well, from the start. First,&lt;br /&gt;
some comparison from the United States. The average CSIRT analyst salary&lt;br /&gt;
in the USA is $97,500 per year or $50 per hour. Entry level positions&lt;br /&gt;
start at $48,875 per year while most experienced workers make up to&lt;br /&gt;
$135,373 per year.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.talent.com/salary?job=csirt+analyst&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;There are multiple positions you can occupy in this field. They have&lt;br /&gt;
in common great salaries and high demand for technical skills, attention&lt;br /&gt;
to details, problem-solving mentality, and the ability to analyze risks.&lt;br /&gt;
Here are the average annual salaries in the United States, according to&lt;br /&gt;
Payscale:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.payscale.com/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Cryptographer – 100,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Information Security Officer – 91,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Assessor – 90,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Engineer – 88,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Penetration Tester – 81,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Forensics Expert – 71,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Administrator – 65,000 USD&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When looking into salaries in Estonia, one can find that there is a&lt;br /&gt;
discussion that private sector is taking a toll from the public sector,&lt;br /&gt;
and that the salaries in important agencies, as Information System&lt;br /&gt;
Authority loose their employees to the better paid positions in private&lt;br /&gt;
sector.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://digi.geenius.ee/rubriik/uudis/kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad/&lt;br /&gt;
https://tehnika.postimees.ee/6887428/riigi-it-tootajate-palgamaarad-kasvasid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;But there is also a different view that average private sector worker&lt;br /&gt;
could be hired as a top specialist in public sector and then the payment&lt;br /&gt;
is higher. Nevertheless, it seems that the average payment in cyber&lt;br /&gt;
security sector is any way higher that in other parts of the&lt;br /&gt;
e-services.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://digi.geenius.ee/rubriik/uudis/5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka/&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
==SOC==&lt;br /&gt;
&amp;lt;p&amp;gt;A SOC is a facility where an organization’s network, applications,&lt;br /&gt;
and endpoints are monitored and defended. The term was adapted from&lt;br /&gt;
network operations centers (NOCs), where large telecommunication or&lt;br /&gt;
corporate networks are monitored. When network security became more of a&lt;br /&gt;
concern, security teams were formed within the NOCs, and eventually spun&lt;br /&gt;
off into larger organizations of their own as the responsibilities of&lt;br /&gt;
security teams grew increasingly complex and specialized. The security&lt;br /&gt;
staff working in a security operations center are often called the SOC&lt;br /&gt;
team.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Functions of the SOC team include, but are not limited to:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ol type=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Taking inventory of resources, to get a better understanding of the&lt;br /&gt;
structure they are protecting.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintanence of the system, by constantly making updates and adding&lt;br /&gt;
safeguards.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Monitoring the network for abnormalities with special tools.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Threat analysis of new attacks and vulnerabilities.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Responding to attacks, by acting as “first responders”. The SOC team&lt;br /&gt;
will shut down and/or isolate endpoints, deleting files and lowering the&lt;br /&gt;
impact as fast as possible.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Recovery of system stability and lost data. This may be done using&lt;br /&gt;
backups, restarting endpoints or reconfiguring systems.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Logging all actions on the system, to be later used for analysis or&lt;br /&gt;
forensics after an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigating the root cause of an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Auditing their own actions, to be in line with regulations of the&lt;br /&gt;
organization, industry or governing body.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.trellix.com/en-us/security-awareness/operations/what-is-soc.html&amp;lt;/p&amp;gt;&lt;br /&gt;
==CSIRT==&lt;br /&gt;
&amp;lt;p&amp;gt;A CSIRT is a group that responds to security incidents when they&lt;br /&gt;
occur. Key responsibilities of a CSIRT include: &lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
===Creating and maintaining an incident response plan (IRP)===&lt;br /&gt;
An incident response plan (IRP) is a set of written instructions for&lt;br /&gt;
detecting, responding to and limiting the effects of an information&lt;br /&gt;
security event. Incident response plans provide instructions for&lt;br /&gt;
responding to many potential scenarios, including data breaches, denial&lt;br /&gt;
of service/distributed denial of service attacks, firewall breaches,&lt;br /&gt;
virus or malware outbreaks or insider threats. Without an incident&lt;br /&gt;
response plan in place, organizations may either not detect the attack&lt;br /&gt;
in the first place, or not follow proper protocol to contain the threat&lt;br /&gt;
and recover from it when a breach is detected.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.stratacore.com/incidentresponseplan&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
===Investigating and analyzing incidents===&lt;br /&gt;
CSIRTs are also involved in improvement activities. After major&lt;br /&gt;
computer security incidents occur, or when incidents are not handled in&lt;br /&gt;
a timely or effective manner, a CSIRT will generally perform a&lt;br /&gt;
postmortem of the incident and its response. This postmortem will&lt;br /&gt;
identify the strengths and weakness of the response effort. Such reviews&lt;br /&gt;
can identify weaknesses and holes in systems, infrastructure defenses,&lt;br /&gt;
or policies that allowed the incident to take place. It can also&lt;br /&gt;
identify problems with communication channels, interfaces, and&lt;br /&gt;
procedures that inhibited the efficient resolution of the reported&lt;br /&gt;
problem.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.cisa.gov/uscert/bsi/articles/best-practices/incident-management/defining-computer-security-incident-response-teams&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Managing internal communications and updates during or immediately after incidents occur===&lt;br /&gt;
===Communicating with employees, shareholders, customers, and the press about incidents as needed===&lt;br /&gt;
&amp;lt;p&amp;gt;There are various services within the CSIRT Services Framework that&lt;br /&gt;
address communications, as they relate to security operations and&lt;br /&gt;
incident response services. Some of these include Information Security&lt;br /&gt;
Incident Coordination, Crisis Management Support, Vulnerability&lt;br /&gt;
Disclosure, Situational Awareness Communication, and Awareness Building,&lt;br /&gt;
to name a few. Sharing information and communicating with the general&lt;br /&gt;
public and/or your constituency is appropriate in many different&lt;br /&gt;
scenarios. These can range from proactive communications to reactive&lt;br /&gt;
communications. Each scenario may be unique, and careful consideration&lt;br /&gt;
should be given to when to release information to the public and what&lt;br /&gt;
information should be released.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;https://resources.sei.cmu.edu/asset_files/Handbook/2021_002_001_651819.pdf&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Remediating incidents===&lt;br /&gt;
Threat remediation is a strong and capable tool for fighting the&lt;br /&gt;
cyber security compromises. As the word ‘remedy’ suggests, remediation&lt;br /&gt;
process involves the treatment of a security breach. With the&lt;br /&gt;
remediation practices, your cyber security team is able to eliminate&lt;br /&gt;
suspicious activities and malicious attacks in the form of malware,&lt;br /&gt;
ransomware, phishing and such. Even if you ‘kill’ the suspicious&lt;br /&gt;
activity, the attackers can remain in your systems. If you want to&lt;br /&gt;
contaminate and end the problem for good, your remediation processes&lt;br /&gt;
must involve the detection of the cause. &amp;lt;ref name=&amp;quot;logsign&amp;quot;&amp;gt;Logsign, &amp;quot;What-is-remediation-in-cyber-security&amp;quot;. Available: https://www.logsign.com/blog/what-is-remediation-in-cyber-security/. [Accessed 28 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Recommending technology, policy, governance, and training changes after security incidents===&lt;br /&gt;
After all these actions, the SCIRT must contribute to the development&lt;br /&gt;
of better policies, practices and has to recommend improvements. They&lt;br /&gt;
are not working in the vacuum and their work has to create new and&lt;br /&gt;
better standards for cyber security. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;Exabeam, &amp;quot;CSIRT&amp;quot;. Available: https://www.exabeam.com/incident-response/csirt/ [Accessed 28 APr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==CERT==&lt;br /&gt;
&amp;lt;p&amp;gt;The term “computer emergency response team” was coined in 1988. In&lt;br /&gt;
response to the Morris worm attack that impacted thousands of servers on&lt;br /&gt;
the Internet, DARPA funded the formation of the Computer Emergency&lt;br /&gt;
Response Team Coordination Center (CERT-CC) at Carnegie Mellon&lt;br /&gt;
University. The goal of CERT-CC was to help protect the internet by&lt;br /&gt;
collecting and disseminating information on critical security&lt;br /&gt;
vulnerabilities. Several other countries formed similar centers using&lt;br /&gt;
the same acronym (despite threats of legal action by Carnegie Mellon for&lt;br /&gt;
trademark infringement). Now the term CERT refers to any emergency&lt;br /&gt;
response team that deals with cyber threats. Many people use CERT-CC&lt;br /&gt;
interchangeably with CSIRT, though the charter of a CERT is information&lt;br /&gt;
sharing in order to help other response teams respond to threats against&lt;br /&gt;
their own infrastructure.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In general, the designation of CERT is helpful in applying real-world&lt;br /&gt;
solutions to various cybersecurity problems. They may be government&lt;br /&gt;
contractors or employees of a major corporation. For example, the U.S.&lt;br /&gt;
Computer Emergency Readiness Team (US-CERT) operates under the U.S.&lt;br /&gt;
Department of Homeland Security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.techopedia.com/definition/31003/computer-emergency-response-team-cert&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In Estonia CERT is designated as CERT-EE. It was established in 2006,&lt;br /&gt;
as an organization responsible for the management of security incidents&lt;br /&gt;
in .ee computer networks. It is also a national contact point for&lt;br /&gt;
international co-operation in the field of IT security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ria.ee/en/cyber-security/cert-ee.html&amp;lt;/p&amp;gt;&lt;br /&gt;
===Difference between SOC/CSIRT/CERT===&lt;br /&gt;
&amp;lt;p&amp;gt;How CSIRTs differ from CERTs and SOCs There are overlapping&lt;br /&gt;
responsibilities between a community emergency response team (CERT),&lt;br /&gt;
computer security incident response team (CSIRT), and security&lt;br /&gt;
operations center (SOC). To add to this confusion, frequently, the terms&lt;br /&gt;
CERT and CSIRT are used interchangeably, despite the important&lt;br /&gt;
differences.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image3.png&amp;quot; alt=&amp;quot;Overlapping in images/image3.png&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;Overlapping in&lt;br /&gt;
images/image3.png&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
==Understand the primary roles and characteristics of a CERT, CSIRT, and SOC.==&lt;br /&gt;
&amp;lt;p&amp;gt;So, using strict definitions, a CERT collects and disseminates&lt;br /&gt;
security information, typically for the benefit of a country or an&lt;br /&gt;
industry. A CSIRT is a cross-functional team that responds to incidents&lt;br /&gt;
on behalf of a country or an organization. A SOC is where a country or&lt;br /&gt;
organization monitors and defends its network, servers, applications,&lt;br /&gt;
and endpoints.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image4.png&amp;quot; alt=&amp;quot;table of explanation images/image4&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;table of explanation&lt;br /&gt;
images/image4&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
==Future==&lt;br /&gt;
&amp;lt;p&amp;gt;And the Cyber security problem is only getting bigger. According to a&lt;br /&gt;
report published by Accenture, the number of cyber security breaches&lt;br /&gt;
increased by 11 percent from 2017 to 2018. The cost of such breaches is&lt;br /&gt;
astronomical–about $600 billion worldwide, according to the Economic&lt;br /&gt;
Impact of Cybercrime report.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Job projections for cybersecurity are staggering. The Bureau of Labor&lt;br /&gt;
Statistics in US predicts that careers in the cybersecurity field will&lt;br /&gt;
grow by 32% by 2028. That makes cybersecurity one of the top 10&lt;br /&gt;
fastest-growing jobs in the country. In the United States alone, jobs&lt;br /&gt;
for Information Security Analysts are expected to grow by 15% by&lt;br /&gt;
2024.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Most likely this trend is also similar in other countries.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When checking Estonian job portals, there is a constant need for&lt;br /&gt;
people for cyber security related positions. Also, linkedin search gives&lt;br /&gt;
approximately 30 vacancies immediately. There are banks, logistics&lt;br /&gt;
companies, e-shops, and software producers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://ee.linkedin.com/jobs/cyber-security-jobs?countryRedirected=1&amp;amp;amp;position=1&amp;amp;amp;pageNum=0&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Trends that affect companies create need for constant cyber security&lt;br /&gt;
services. Increasing number of home/remote offices require secure&lt;br /&gt;
corporate networks and security of remote devices. One example is from&lt;br /&gt;
this year, when sloppy remote desktop set-up paralyzed systems of 17&lt;br /&gt;
companies.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.aripaev.ee/uudised/2022/04/20/ria-lohakas-kaugtoolaua-seadistus-halvas-martsis-vahemalt-17-juhul-ettevotete-it-susteemid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Also, no service can exists without robust infrastructure - servers,&lt;br /&gt;
databases, applications. As all previously mentioned devices and&lt;br /&gt;
services are at constant scanning and surveillance. So, the breach&lt;br /&gt;
detection and immediate action demands 24/7 services. Even if lot of&lt;br /&gt;
things could be automated, there is a need for human specialists (at&lt;br /&gt;
least, at the moment). Third growing field is also a forensic&lt;br /&gt;
investigation, as every attack must be investigated in order to be ready&lt;br /&gt;
to repel next attacks. So data recovery and evidence collection is&lt;br /&gt;
another important field of work that need skilled and professional&lt;br /&gt;
workers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Even, if the specifics of the entity, be it CSIRT, CERT or SOC, are&lt;br /&gt;
different, the fundamentals of the work are the same. Professional&lt;br /&gt;
knowledge of the networks, operational systems, hardware, scripting, and&lt;br /&gt;
several other wider IT related knowledge is needed. As there is no&lt;br /&gt;
single way to reach to it, every single person can find one’s strongest&lt;br /&gt;
sides and develop them with knowledge of weaker side, in order to know,&lt;br /&gt;
when to as for help.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/body&amp;gt;&lt;br /&gt;
&amp;lt;/html&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mavald</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142214</id>
		<title>Hiring a Cyber Security Incident Analyst</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142214"/>
		<updated>2022-05-01T15:36:55Z</updated>

		<summary type="html">&lt;p&gt;Mavald: /* Education */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==A Cyber Security Incident Analyst==&lt;br /&gt;
&lt;br /&gt;
[[File:image1.png|600px|thumb|Job advertisement &amp;lt;ref&amp;gt;&amp;quot;Job Advertisement&amp;quot;. Available at https://www.projectpeople.com/jobs/&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
===Cyber security incident analyst in SOC/CSIRT/CERT===&lt;br /&gt;
This article delves into the job title of Cyber Security Incident&lt;br /&gt;
Analyst and provides an overview of the acronyms SOC/CSIRT/CERT. A brief&lt;br /&gt;
history of the job is discussed here, as well as a possible career path,&lt;br /&gt;
education, experience, and other characteristics required for work in&lt;br /&gt;
computer security-related organizations. The article also provides a&lt;br /&gt;
brief history of SOC/CSIRT/CERT, as well as a comparison of their&lt;br /&gt;
differences and similarities.&lt;br /&gt;
===Cyber Security Incident Analyst Skill Set===&lt;br /&gt;
What skill set is expected from the Cyber Security Incident Analyst? Below written lines are taken from the same job advertisement depicted&lt;br /&gt;
on the left side of this article:&lt;br /&gt;
As a Security Incident Analyst your responsibilities will include:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Continuous monitoring of security tooling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Performing regular and ad-hoc vulnerability assessments&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Carrying out ‘spot checks’&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Reporting vulnerabilities to the PVG via the alerts system&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintaining and documenting logging systems&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Developing centralized logging, reporting and intelligence&lt;br /&gt;
platforms&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;‘Light touch’ penetration testing with open source tooling&lt;br /&gt;
(Metasploit)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Knowledge &amp;amp;amp; Experience required:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;SOC, CSIRT or CERT operational environment experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Windows / Linux experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TCP /IP networking protocol knowledge&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience reviewing and analyzing Security Events from various&lt;br /&gt;
monitoring and logging sources&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience in website and web application security assessment or&lt;br /&gt;
penetration testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience of using Metasploit&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Scripting knowledge using BASH, Python, Perl, Ruby&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Skills in Host and Network Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
As one can see the description of the duties is wide and also the&lt;br /&gt;
knowledge and experience that is required is noteworthy. So, where to&lt;br /&gt;
start to find out the way to get this kind of knowledge and&lt;br /&gt;
expertize.&lt;br /&gt;
===Possible career path===&lt;br /&gt;
Next part of the paper is aiming to depict a possible ways, how to&lt;br /&gt;
develop oneself, and move along the career pathway in cybersecurity&lt;br /&gt;
field. Topics of development, education, experience and certification&lt;br /&gt;
are covered.&lt;br /&gt;
[[File:analystimage2.png|1000px|thumb|Career path &amp;lt;ref&amp;gt;&amp;quot;Possible Career Path&amp;quot;. Available at https://www.cyberseek.org/pathway.html&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
===Junior/Senior===&lt;br /&gt;
Start with an entry-level job in IT. Hands-on experience is often the&lt;br /&gt;
most effective way to prepare for certification exams. Start&lt;br /&gt;
accumulating work experience with an entry-level role as a cybersecurity&lt;br /&gt;
analyst. Many cybersecurity professionals start off in more general IT&lt;br /&gt;
roles. The skills, practices, and technologies you’ll use as a&lt;br /&gt;
cybersecurity professional will continue to evolve along with computer&lt;br /&gt;
and network technology. The desire to learn, ability to problem solve,&lt;br /&gt;
and attention to detail will serve you well in this field. Other, more&lt;br /&gt;
technical skills and technologies to learn include:&amp;lt;ref name=&amp;quot;certification&amp;quot;&amp;gt;Popular Cyber Security Certificates [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications  [Accessed 25 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====SIEM tools (security information and event management)====&lt;br /&gt;
Security Information and Event Management (SIEM) is a set of tools&lt;br /&gt;
and services offering a holistic view of an organization’s information&lt;br /&gt;
security. SIEM works by combining two technologies:&lt;br /&gt;
&amp;lt;li&amp;gt;Security information management (SIM), which collects data from log&lt;br /&gt;
files for analysis and reports on security threats and events, and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;security event management (SEM), which conducts real-time system&lt;br /&gt;
monitoring, notifies network admins about important issues and&lt;br /&gt;
establishes correlations between security events. There are a number of&lt;br /&gt;
security information and event management solutions on the market.&lt;br /&gt;
ArcSight ESM, IBM QRadar and Splunk are among the most popular. &amp;lt;ref name=&amp;quot;SIEM&amp;quot;&amp;gt;Application security, SIEM [Online]. Available: https://www.imperva.com/learn/application-security/siem/. [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Firewalls, Intrusion Detection Systems (IDS), and Intrusion Prevention Systems(IPS)====&lt;br /&gt;
Firewalls can be two types, hardware and software firewalls. Software&lt;br /&gt;
firewall is a firewall that is installed on a computer or server, and&lt;br /&gt;
tasked with network security. It works with a wide variety of other&lt;br /&gt;
technology security solutions to provide more robust and cohesive&lt;br /&gt;
security for enterprises of all sizes. When a software firewall is&lt;br /&gt;
installed on a server, it opens up like an umbrella of protection over&lt;br /&gt;
all other computers connected to the network. It is able to monitor both&lt;br /&gt;
incoming and outgoing traffic for potential risk or suspicious user&lt;br /&gt;
behavior, and also makes setting security policies much easier, faster&lt;br /&gt;
and more flexible. Hardware firewall is positioned between the network&lt;br /&gt;
and devices, allowing traffic to funnel through the firewall for a close&lt;br /&gt;
inspection and analysis. A hardware firewall, a term often&lt;br /&gt;
interchangeable with network or next-generation firewall, protects the&lt;br /&gt;
network gateways for an enterprise. Hardware firewall is physical&lt;br /&gt;
hardware, installed between network elements and connected devices, and&lt;br /&gt;
is tasked with filtering traffic for cyber threat to the network or&lt;br /&gt;
devices. Filtering out unauthorized or suspicious users based on traffic&lt;br /&gt;
analysis is one of the biggest benefits of hardware firewall. &amp;lt;ref name=&amp;quot;sangfor&amp;quot;&amp;gt;Sangfor, &amp;quot;What is Software Firewall? Difference between Hardware Firewall and Software Firewall, [Online]. Available: https://www.sangfor.com/blog/cybersecurity/what-is-software-firewall-difference-between-hardware-firewall-and-software-firewall [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems&lt;br /&gt;
(IPS) are both parts of the network infrastructure. IDS/IPS compare&lt;br /&gt;
network packets to a cyberthreat database containing known signatures of&lt;br /&gt;
cyberattacks — and flag any matching packets. IDS doesn’t alter the&lt;br /&gt;
network packets in any way, whereas IPS prevents the packet from&lt;br /&gt;
delivery based on the contents of the packet, much like how a firewall&lt;br /&gt;
prevents traffic by IP address. &amp;lt;ref name=&amp;quot;Varonis&amp;quot;&amp;gt;Varonis, &amp;quot;What is Software Firewall? IDS vs. IPS: What is the Difference?, [Online]. Available: https://www.varonis.com/blog/ids-vs-ips [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Digital forensics====&lt;br /&gt;
Digital forensics is a branch of forensic science that focuses on&lt;br /&gt;
identifying, acquiring, processing, analyzing, and reporting on data&lt;br /&gt;
stored electronically. Electronic evidence is a component of almost all&lt;br /&gt;
criminal activities and digital forensics support is crucial for law&lt;br /&gt;
enforcement investigations. Electronic evidence can be collected from a&lt;br /&gt;
wide array of sources, such as computers, smartphones, remote storage,&lt;br /&gt;
unmanned aerial systems, shipborne equipment, and more.&amp;lt;ref name=&amp;quot;interpol&amp;quot;&amp;gt;Interpol, &amp;quot;Digital forensics&amp;quot;. Available: https://www.interpol.int/How-we-work/Innovation/Digital-forensics. [Accessed 28 4 2022].&amp;lt;/ref&amp;gt; &lt;br /&gt;
Investigative process of digital forensics can be divided into several stages. There are four major stages: preservation, collection,&lt;br /&gt;
examination, and analysis. All these four stages need a deep understanding of computers, technology across a broad spectrum, and cybersecurity principles and&lt;br /&gt;
practices, a working knowledge of computers, networks, and coding, in-depth investigative abilities, critical-thinking skills and analytical talent the ability to effectively communicate and work with a&lt;br /&gt;
wide range of people. &amp;lt;ref name=&amp;quot;ecpi&amp;quot;&amp;gt;&amp;quot;Digital forensics&amp;quot;. Available: https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me. [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Mobile device management====&lt;br /&gt;
Mobile device management (MDM) is software that allows IT&lt;br /&gt;
administrators to control, secure and enforce policies on smartphones,&lt;br /&gt;
tablets and other endpoints. Mobile device management software emerged&lt;br /&gt;
in the early 2000s as a way to control and secure the personal digital&lt;br /&gt;
assistants and smartphones that business workers began to use. The&lt;br /&gt;
consumer smartphone boom that started with the launch of the Apple&lt;br /&gt;
iPhone in 2007 led to the bring your own device (BYOD) trend, which&lt;br /&gt;
fueled further interest in MDM.&amp;lt;ref name=&amp;quot;techtarget&amp;quot;&amp;gt;Techtarget, &amp;quot;Mobile Device Management&amp;quot;. Available: https://www.techtarget.com/searchmobilecomputing/definition/mobile-device-management [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Data management====&lt;br /&gt;
Sometimes the data management is neglected, but this part has a&lt;br /&gt;
crucial role when learning for good cyber security practices. Majority&lt;br /&gt;
of cyber security programs include a special courses on data management.&lt;br /&gt;
Data management is a method of organizing and maintaining data processes&lt;br /&gt;
that are required in almost every business operations. The benefits of&lt;br /&gt;
data management can be found accounting, statistics, logistics planning&lt;br /&gt;
and other disciplines including corporate computing.&amp;lt;ref name=&amp;quot;GlobalUni&amp;quot;&amp;gt;Global Universities, &amp;quot;MSc Data Management and Cyber Security&amp;quot;. Available: https://globaluniversities.in/msc-data-management-cyber-security. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Data governance (and management) play a fundamental role in&lt;br /&gt;
protecting an organization’s data. Ensuring that the right people have&lt;br /&gt;
the right access and that appropriate security controls are in place to&lt;br /&gt;
protect each system or service, based on the criticality or sensitivity&lt;br /&gt;
of the data sets these contain. &amp;lt;ref name=&amp;quot;CyberMagazine&amp;quot;&amp;gt;Cyber Security Magazine, &amp;quot;The Role of Data Governance in Cybersecurity&amp;quot;. Available: https://cybersecurity-magazine.com/the-role-of-data-governance-in-cybersecurity/?utm_source=rss&amp;amp;amp;utm_medium=rss&amp;amp;amp;utm_campaign=the-role-of-data-governance-in-cybersecurity. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Application security development====&lt;br /&gt;
Application security describes security measures at the application&lt;br /&gt;
level that aim to prevent data or code within the app from being stolen&lt;br /&gt;
or hijacked. It encompasses the security considerations that happen&lt;br /&gt;
during application development and design, but it also involves systems&lt;br /&gt;
and approaches to protect apps after they get deployed. Application&lt;br /&gt;
security may include hardware, software, and procedures that identify or&lt;br /&gt;
minimize security vulnerabilities.&amp;lt;ref name=&amp;quot;vmware&amp;quot;&amp;gt;VmWare, &amp;quot;What is application security?&amp;quot;. Available: https://www.vmware.com/topics/glossary/content/application-security.html [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Application security development is important to ensure that your&lt;br /&gt;
application is free from coding errors and bugs. And controls the risk&lt;br /&gt;
and helps safeguard against security vulnerabilities. Application&lt;br /&gt;
security development is the process of making applications more secure&lt;br /&gt;
by finding and fixing security vulnerabilities. This is often done by&lt;br /&gt;
enforcing software security best practices and using application&lt;br /&gt;
security testing tools. &lt;br /&gt;
&amp;lt;ref name=&amp;quot;perforce&amp;quot;&amp;gt;Perforce, &amp;quot;Application Security Development Best Practices&amp;quot;. Available: https://www.perforce.com/blog/kw/application-security-development-best-practices. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Audit and compliance knowledge====&lt;br /&gt;
A cyber security audit is designed to be a comprehensive review and&lt;br /&gt;
analysis of your business’s IT infrastructure. It identifies threats and&lt;br /&gt;
vulnerabilities, exposing weaknesses and high-risk practices.&lt;br /&gt;
Regulations such as the EU GDPR (General Data Protection Regulation) can&lt;br /&gt;
impose hefty penalties in the event of a breach that results in&lt;br /&gt;
exploited data. A cyber security audit will help mitigate the&lt;br /&gt;
consequences of a breach and demonstrate that your organization has&lt;br /&gt;
taken the necessary steps to protect client and company data. &amp;lt;ref name=&amp;quot;cyforsecure&amp;quot;&amp;gt;Cyfor Secure, &amp;quot;What is a Cyber Security Audit and how can it help your organisation?&amp;quot;. Available: https://cyforsecure.co.uk/services/cyber-assessment/cyber-security-audit/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cybersecurity compliance is the organizational risk management method&lt;br /&gt;
aligned with pre-defined security measures &amp;amp;amp; controls on how data&lt;br /&gt;
confidentiality is ensured by its administrative procedures.&amp;lt;ref name=&amp;quot;nordlayer&amp;quot;&amp;gt;NordLayer, &amp;quot;Cybersecurity compliance: Everything you need to know&amp;quot;. Available: https://nordlayer.com/blog/cybersecurity-compliance-everything-you-need-to-know/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
All needed skills are developed through courses and certification.&lt;br /&gt;
&lt;br /&gt;
===Entry-Level Incident Response Positions===&lt;br /&gt;
It is not always possible to advance to the position of incident&lt;br /&gt;
responder in a straight line. Many professionals advance from entry- to&lt;br /&gt;
mid-level positions before becoming a real incident responder or a&lt;br /&gt;
member of a computer emergency response team (CERT).&amp;lt;br /&amp;gt;&lt;br /&gt;
These are some examples: &amp;lt;ref name=&amp;quot;Infosec&amp;quot;&amp;gt;Infosec, &amp;quot;Incident Responder Career Roadmap: From Entry Level to Executive&amp;quot;. Available: https://resources.infosecinstitute.com/topic/incident-responder-career-roadmap-entry-level-executive/ [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;network-administrator&amp;quot;&amp;gt;Network administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;This position’s experience will help potential incident responders&lt;br /&gt;
develop networking skills. Attention to detail, as well as the ability&lt;br /&gt;
to sift through system configurations, site layouts, and general network&lt;br /&gt;
and communication setups, are essential in this field.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;system-administrator&amp;quot;&amp;gt;System administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Another crucial beginning point for an incident responder is to learn&lt;br /&gt;
how to manage resources inside your organization as well as user&lt;br /&gt;
behavior. Understanding the potential damage that users, inadequate&lt;br /&gt;
security setups, and ineffective IT policies and procedures can cause on&lt;br /&gt;
your network can provide prospective candidates with insight into the&lt;br /&gt;
human component of an incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;security-administrator&amp;quot;&amp;gt;Security administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In such a position, basic hacking skills, penetration testing, and&lt;br /&gt;
intrusion detection are all learned, which are crucial incident&lt;br /&gt;
responder skills when trying to replicate a breach or attack.&lt;br /&gt;
Understanding the paths a cybercriminal will take when attempting to&lt;br /&gt;
damage or obtain access to a system can greatly simplify the work of&lt;br /&gt;
reverse engineering the incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Mid-Level Incident Response Positions ===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5&lt;br /&gt;
id=&amp;quot;computer-security-incident-response-team-csirt-engineer&amp;quot;&amp;gt;Computer&lt;br /&gt;
security incident response team (CSIRT) engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;cyber-incident-responder&amp;quot;&amp;gt;Cyber incident responder&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-response-engineer&amp;quot;&amp;gt;Incident response&lt;br /&gt;
engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;While each of these positions is different, they generally require&lt;br /&gt;
very similar skills and characteristics in a candidate. At this level,&lt;br /&gt;
personal characteristics such as problem solving, time management, and&lt;br /&gt;
even presentation skills become more crucial as one’s career evolves&lt;br /&gt;
into a management-facing role.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Technical skills include the ability to identify and minimize threats&lt;br /&gt;
while maintaining communication with management and the rest of your&lt;br /&gt;
team. Data analysis and evidence gathering become increasingly crucial,&lt;br /&gt;
and the circumstances in which your services are deployed get more&lt;br /&gt;
serious.&amp;lt;/p&amp;gt;&lt;br /&gt;
Problem-solving skills are crucial at this level of incident&lt;br /&gt;
response, and as the stakes rise, so does the pressure in each&lt;br /&gt;
situation. At this level, programming abilities are essential since&lt;br /&gt;
incident responders may be needed to reverse engineer malicious code or&lt;br /&gt;
even create patches for vulnerable network applications or services. &amp;lt;ref name=&amp;quot;coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated]&amp;quot;. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Senior-Level Incident Response Positions===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;intrusion-detection-specialist&amp;quot;&amp;gt;Intrusion detection&lt;br /&gt;
specialist:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;A CISSP certification might help a potential candidate in preparing&lt;br /&gt;
for the profession. The role of an intrusion detection specialist is to&lt;br /&gt;
find and stop any unwanted communications.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-manager&amp;quot;&amp;gt;Incident manager:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Expected to plan, oversee, manage, and supervise all incident&lt;br /&gt;
response team actions. Is in charge of reporting all current events to&lt;br /&gt;
senior management and stakeholders, as well as acting as the technical&lt;br /&gt;
lead on active incidents for incident responders. Prepares threat and&lt;br /&gt;
impact assessments and reports them known to management.&amp;lt;ref name=&amp;quot;coursera&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Certificates== &lt;br /&gt;
There is a vast number of different certificates and the road map to&lt;br /&gt;
being a certified professional could be very different&amp;lt;ref name=&amp;quot;Coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated],&amp;quot; [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;NICCS&amp;quot;&amp;gt;NICCS, &amp;quot;Cybersecurity Certifications,&amp;quot; [Online]. Available: hhttps://niccs.cisa.gov/about-niccs/cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt; . One possible&lt;br /&gt;
approach is to start with basic certificates from the different branches&lt;br /&gt;
of service and move to more specific and demanding focused&lt;br /&gt;
certification. Also, some jobs require certain clearances, either from&lt;br /&gt;
industry, or from the government. One small selection of different&lt;br /&gt;
possible certificates is brought out in following paragraphs.&lt;br /&gt;
&lt;br /&gt;
Security+ is a CompTIA certification that is considered a basic cert&lt;br /&gt;
among cybersecurity professionals. It covers the topics of risk&lt;br /&gt;
management and threat assessment.&lt;br /&gt;
Network+ is also offered by CompTIA this certification (like the name&lt;br /&gt;
implies) focuses on networking infrastructure and operations. It is&lt;br /&gt;
considered a foundational certification.&lt;br /&gt;
The Certified Information Systems Security Professional (CISSP) is a&lt;br /&gt;
more advanced certification designed for cybersecurity professionals&lt;br /&gt;
with at least five years of work experience. The certification covers&lt;br /&gt;
topics such as architecture, engineering, and management.&amp;lt;/p&amp;gt;&lt;br /&gt;
The Certified Ethical Hacker (CEH) certification is also considered a&lt;br /&gt;
more advanced cert because it generally requires that applicants have&lt;br /&gt;
multiple years of work experience. The goal of an ethical hacker&lt;br /&gt;
certification is to be able to understand how cyber attacks unfold in&lt;br /&gt;
order to improve threat assessment and mitigation skills.&amp;lt;ref name=&amp;quot;cyberguide&amp;quot;&amp;gt;Cybersecurity Guide, &amp;quot;How to become a cybersecurity specialist&amp;quot;, [Online]. Available: https://cybersecurityguide.org/careers/security-specialist/. [Accessed 27 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
This is definitely not all, when one looks for more information, following link could be searched, to get more in depth knowledge about&lt;br /&gt;
different possibilities. Hereby, with the help of this matrix a possible taxonomy of different 436 listed certificates in branches are&lt;br /&gt;
presented.&amp;lt;ref name=&amp;quot;Pauljeremy&amp;quot;&amp;gt;&amp;quot;Cybersecurity Roadmap,&amp;quot; [Online]. Available: https://pauljerimy.com/2020/10/12/scr-oct-2020-update/. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:analystimage5.png|1000px|thumb|Certificate matrix &amp;lt;ref&amp;gt;&amp;quot;Certification roadmap&amp;quot;. Available at https://pauljerimy.com/security-certification-roadmap&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
=== Communication and Network Security===&lt;br /&gt;
Communication and network security covers the ability to secure&lt;br /&gt;
communication channels and networks. Topics include secure and converges&lt;br /&gt;
protocols, wireless networks, cellular networks, hardware operations&lt;br /&gt;
(warranty and redundant power), and third-party connectivity. IP&lt;br /&gt;
networking are also included in this domain.&lt;br /&gt;
===Identity and Access Management===&lt;br /&gt;
The identity and access management domain covers the attacks that&lt;br /&gt;
target the human gateway to gain access to data. Other topics include&lt;br /&gt;
ways to identify users with rights to access the information and&lt;br /&gt;
servers. Identity and access management covers the topics of&lt;br /&gt;
applications, Single sign-on authentication, privilege escalation,&lt;br /&gt;
Kerberos, rule-based or risk-based access control, proofing and&lt;br /&gt;
establishment of identity.&lt;br /&gt;
===Security Architecture and Engineering===&lt;br /&gt;
The security architecture and engineering domain covers important&lt;br /&gt;
topics concerning security engineering plans, designs and principles,&lt;br /&gt;
Topics include assessing and mitigating information system&lt;br /&gt;
vulnerabilities, fundamental concepts of security models and security&lt;br /&gt;
architectures in critical areas like access control. Cloud systems,&lt;br /&gt;
cryptography, system infiltrations (ransomware, fault-injection and&lt;br /&gt;
more) and virtualized systems are also covered in this domain.&lt;br /&gt;
===Asset Security===&lt;br /&gt;
The Asset Security domain deals with the issues related to the&lt;br /&gt;
collection, storage, maintenance, retention and destruction of data. It&lt;br /&gt;
also covers knowledge of different roles regarding data handling (owner,&lt;br /&gt;
controller and custodian) as well as data protection methods and data&lt;br /&gt;
states. Other topics include resource provision, asset classification&lt;br /&gt;
and data lifecycle management.&lt;br /&gt;
===Security and Risk Management===&lt;br /&gt;
The security and risk management domain covers general on skills&lt;br /&gt;
related to the implementation of user awareness programs as well as&lt;br /&gt;
security procedures. Emphasis is also placed on risk management&lt;br /&gt;
concerning the acquisition of new services, hardware and software&lt;br /&gt;
(supply chain). Other skills include social engineering defense&lt;br /&gt;
mechanisms.&lt;br /&gt;
===Security Assessment and Testing===&lt;br /&gt;
The security assessment and testing domain deals with all the&lt;br /&gt;
techniques and tools used to find system vulnerabilities, weaknesses and&lt;br /&gt;
potential areas of concern not addressed by security procedures and&lt;br /&gt;
policies. Attack simulations, vulnerability assessment, compliance&lt;br /&gt;
checks, and ethical disclosure also fall under this domain.&lt;br /&gt;
===Software Security===&lt;br /&gt;
The software development security domain deals with implementing&lt;br /&gt;
software-based security protocols within environment for which the IT&lt;br /&gt;
professional is responsible. Risk analysis, vulnerability identification&lt;br /&gt;
and auditing of source codes are all covered in this subset. Additional&lt;br /&gt;
topics include software-designed security, maturity models, development&lt;br /&gt;
methodologies, open-source and third-party development security.&lt;br /&gt;
===Security operations===&lt;br /&gt;
The security operations domain covers topics ranging from&lt;br /&gt;
investigations and digital forensic to detection and intrusion&lt;br /&gt;
prevention tools, sandboxing and firewalls. Topics include user and&lt;br /&gt;
entity behavior analytics, threat intelligence (threat hunting and&lt;br /&gt;
threat feeds) log management, artifacts (mobile, computer and network),&lt;br /&gt;
machine learning and AI-based tools, penetration testing, and&lt;br /&gt;
exploitation development. These for sub-domains are lister here.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Incident Handling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Penetration Testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Exploitation&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Education==&lt;br /&gt;
[[File:Analystimage7.png|400px|thumb|Comparison degree vs Certificate &amp;lt;ref&amp;gt;&amp;quot;Comparison Table&amp;quot;. Available at https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
The entry level monitoring specialist is hired by Estonian&lt;br /&gt;
Information System Authority even if there is no formal IT education,&lt;br /&gt;
but readiness to learn and moderate knowledge of different operation&lt;br /&gt;
systems is enough to start the career. &amp;lt;ref name=&amp;quot;cv&amp;quot;&amp;gt;cv.ee, &amp;quot;SEIRESPETSIALIST - tule Eesti küberruumi valvuriks!&amp;quot;. Available: https://www.cv.ee/en/vacancy/792782/riigi-infosusteemi-amet/seirespetsialist-tule-eesti-kuberruumi-valvuriks [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Nevertheless, like most other high qualification careers jobs falling&lt;br /&gt;
under the cybersecurity specialist category require some form of formal&lt;br /&gt;
education. However, since cybersecurity specialist jobs can fall across&lt;br /&gt;
a wide spectrum of job descriptions and responsibilities, it is possible&lt;br /&gt;
to obtain a specialist job after completing many levels of different&lt;br /&gt;
computer related education.&lt;br /&gt;
&lt;br /&gt;
If one is looking for a cybersecurity related education, for example&lt;br /&gt;
in EU, 137 courses/programs could be found that relate to keyword IT or&lt;br /&gt;
cybersecurity. &amp;lt;ref name=&amp;quot;enisa&amp;quot;&amp;gt;ENISA (European Union Agency for Cybersecurity), &amp;quot;Cybersecurity Education-Cybersecurity Higher Education Database&amp;quot;. Available: https://www.enisa.europa.eu/topics/cybersecurity-education/education-map/education-courses [Accessed 26 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Also, there is a great amount of discussion, if cyber security&lt;br /&gt;
professional should have a degree or would be certification just enough.&lt;br /&gt;
One interesting table is produces by Franklin University that compares&lt;br /&gt;
benefits and/or drawbacks of each type of credential.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;franklin&amp;quot;&amp;gt;Franklin University, &amp;quot;Is Getting a Master&#039;s Degree in Cyber Security Worth It?&amp;quot;. Available: https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Certifications are generally good for people with little practical&lt;br /&gt;
experience because they are known quantities in the industry and can&lt;br /&gt;
help you get your foot in the door. They set a minimum knowledge bar.&lt;br /&gt;
But some certifications are viewed more favorably than others.&lt;br /&gt;
Certifications with renewal requirements are viewed better by hiring&lt;br /&gt;
managers, but they also more costly in the long run because of the need&lt;br /&gt;
for continuing education. Certifications are also good for showing&lt;br /&gt;
in-depth expertise in a specialization within cybersecurity. Depending&lt;br /&gt;
on your career goals, it may be advantageous to have a master’s&lt;br /&gt;
degree—which shows your breadth of knowledge, critical thinking and&lt;br /&gt;
leadership skills—and a certificate—which shows specific skill&lt;br /&gt;
competency.&amp;lt;ref name=&amp;quot;franklin&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
As IT (Cyber) Security is still a relatively young discipline,&lt;br /&gt;
universities and colleges are still figuring out which is the best&lt;br /&gt;
approach for their degrees. Study programmes and curricula in Cyber&lt;br /&gt;
Security are different. In general, here are the duration of Cyber&lt;br /&gt;
Security degrees:&lt;br /&gt;
&amp;lt;ref name=&amp;quot;studyportal&amp;quot;&amp;gt;Studyportals, &amp;quot;Why You Should Study a Cyber Security Degree in 2022&amp;quot;. Available: https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Bachelor’s degrees in Cyber Security take 3 or 4 years in most&lt;br /&gt;
countries.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Master’s courses in Cyber Security take between 1-2 years to&lt;br /&gt;
complete.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;PhD programmes in Cyber Security last 3-5 years. Some only take 1&lt;br /&gt;
or 2 years, but they are less common.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Generalization could me made that on bachelor level the general&lt;br /&gt;
knowledge about the cyber issues are obtained. On master level the&lt;br /&gt;
specialization courses are taken and the person can choose more specific&lt;br /&gt;
topics to study. It is on master level where strengths of the cyber&lt;br /&gt;
specialist can be developed further and up-do date knowledge obtained in&lt;br /&gt;
specifics. PhD is serious science and involves teaching, lot of&lt;br /&gt;
scientific work and writing for publications.&lt;br /&gt;
&lt;br /&gt;
==Salary==&lt;br /&gt;
&amp;lt;p&amp;gt;Even if the salary can be very different, compared to the skills and&lt;br /&gt;
experience, an generalization can be made. Cyber Security professionals&lt;br /&gt;
in CSIRT, and in other entities earn quite well, from the start. First,&lt;br /&gt;
some comparison from the United States. The average CSIRT analyst salary&lt;br /&gt;
in the USA is $97,500 per year or $50 per hour. Entry level positions&lt;br /&gt;
start at $48,875 per year while most experienced workers make up to&lt;br /&gt;
$135,373 per year.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.talent.com/salary?job=csirt+analyst&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;There are multiple positions you can occupy in this field. They have&lt;br /&gt;
in common great salaries and high demand for technical skills, attention&lt;br /&gt;
to details, problem-solving mentality, and the ability to analyze risks.&lt;br /&gt;
Here are the average annual salaries in the United States, according to&lt;br /&gt;
Payscale:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.payscale.com/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Cryptographer – 100,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Information Security Officer – 91,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Assessor – 90,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Engineer – 88,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Penetration Tester – 81,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Forensics Expert – 71,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Administrator – 65,000 USD&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When looking into salaries in Estonia, one can find that there is a&lt;br /&gt;
discussion that private sector is taking a toll from the public sector,&lt;br /&gt;
and that the salaries in important agencies, as Information System&lt;br /&gt;
Authority loose their employees to the better paid positions in private&lt;br /&gt;
sector.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://digi.geenius.ee/rubriik/uudis/kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad/&lt;br /&gt;
https://tehnika.postimees.ee/6887428/riigi-it-tootajate-palgamaarad-kasvasid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;But there is also a different view that average private sector worker&lt;br /&gt;
could be hired as a top specialist in public sector and then the payment&lt;br /&gt;
is higher. Nevertheless, it seems that the average payment in cyber&lt;br /&gt;
security sector is any way higher that in other parts of the&lt;br /&gt;
e-services.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://digi.geenius.ee/rubriik/uudis/5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka/&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
==SOC==&lt;br /&gt;
&amp;lt;p&amp;gt;A SOC is a facility where an organization’s network, applications,&lt;br /&gt;
and endpoints are monitored and defended. The term was adapted from&lt;br /&gt;
network operations centers (NOCs), where large telecommunication or&lt;br /&gt;
corporate networks are monitored. When network security became more of a&lt;br /&gt;
concern, security teams were formed within the NOCs, and eventually spun&lt;br /&gt;
off into larger organizations of their own as the responsibilities of&lt;br /&gt;
security teams grew increasingly complex and specialized. The security&lt;br /&gt;
staff working in a security operations center are often called the SOC&lt;br /&gt;
team.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Functions of the SOC team include, but are not limited to:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ol type=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Taking inventory of resources, to get a better understanding of the&lt;br /&gt;
structure they are protecting.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintanence of the system, by constantly making updates and adding&lt;br /&gt;
safeguards.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Monitoring the network for abnormalities with special tools.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Threat analysis of new attacks and vulnerabilities.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Responding to attacks, by acting as “first responders”. The SOC team&lt;br /&gt;
will shut down and/or isolate endpoints, deleting files and lowering the&lt;br /&gt;
impact as fast as possible.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Recovery of system stability and lost data. This may be done using&lt;br /&gt;
backups, restarting endpoints or reconfiguring systems.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Logging all actions on the system, to be later used for analysis or&lt;br /&gt;
forensics after an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigating the root cause of an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Auditing their own actions, to be in line with regulations of the&lt;br /&gt;
organization, industry or governing body.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.trellix.com/en-us/security-awareness/operations/what-is-soc.html&amp;lt;/p&amp;gt;&lt;br /&gt;
==CSIRT==&lt;br /&gt;
&amp;lt;p&amp;gt;A CSIRT is a group that responds to security incidents when they&lt;br /&gt;
occur. Key responsibilities of a CSIRT include: &lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
===Creating and maintaining an incident response plan (IRP)===&lt;br /&gt;
An incident response plan (IRP) is a set of written instructions for&lt;br /&gt;
detecting, responding to and limiting the effects of an information&lt;br /&gt;
security event. Incident response plans provide instructions for&lt;br /&gt;
responding to many potential scenarios, including data breaches, denial&lt;br /&gt;
of service/distributed denial of service attacks, firewall breaches,&lt;br /&gt;
virus or malware outbreaks or insider threats. Without an incident&lt;br /&gt;
response plan in place, organizations may either not detect the attack&lt;br /&gt;
in the first place, or not follow proper protocol to contain the threat&lt;br /&gt;
and recover from it when a breach is detected.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.stratacore.com/incidentresponseplan&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
===Investigating and analyzing incidents===&lt;br /&gt;
CSIRTs are also involved in improvement activities. After major&lt;br /&gt;
computer security incidents occur, or when incidents are not handled in&lt;br /&gt;
a timely or effective manner, a CSIRT will generally perform a&lt;br /&gt;
postmortem of the incident and its response. This postmortem will&lt;br /&gt;
identify the strengths and weakness of the response effort. Such reviews&lt;br /&gt;
can identify weaknesses and holes in systems, infrastructure defenses,&lt;br /&gt;
or policies that allowed the incident to take place. It can also&lt;br /&gt;
identify problems with communication channels, interfaces, and&lt;br /&gt;
procedures that inhibited the efficient resolution of the reported&lt;br /&gt;
problem.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.cisa.gov/uscert/bsi/articles/best-practices/incident-management/defining-computer-security-incident-response-teams&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Managing internal communications and updates during or immediately after incidents occur===&lt;br /&gt;
===Communicating with employees, shareholders, customers, and the press about incidents as needed===&lt;br /&gt;
&amp;lt;p&amp;gt;There are various services within the CSIRT Services Framework that&lt;br /&gt;
address communications, as they relate to security operations and&lt;br /&gt;
incident response services. Some of these include Information Security&lt;br /&gt;
Incident Coordination, Crisis Management Support, Vulnerability&lt;br /&gt;
Disclosure, Situational Awareness Communication, and Awareness Building,&lt;br /&gt;
to name a few. Sharing information and communicating with the general&lt;br /&gt;
public and/or your constituency is appropriate in many different&lt;br /&gt;
scenarios. These can range from proactive communications to reactive&lt;br /&gt;
communications. Each scenario may be unique, and careful consideration&lt;br /&gt;
should be given to when to release information to the public and what&lt;br /&gt;
information should be released.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;https://resources.sei.cmu.edu/asset_files/Handbook/2021_002_001_651819.pdf&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Remediating incidents===&lt;br /&gt;
Threat remediation is a strong and capable tool for fighting the&lt;br /&gt;
cyber security compromises. As the word ‘remedy’ suggests, remediation&lt;br /&gt;
process involves the treatment of a security breach. With the&lt;br /&gt;
remediation practices, your cyber security team is able to eliminate&lt;br /&gt;
suspicious activities and malicious attacks in the form of malware,&lt;br /&gt;
ransomware, phishing and such. Even if you ‘kill’ the suspicious&lt;br /&gt;
activity, the attackers can remain in your systems. If you want to&lt;br /&gt;
contaminate and end the problem for good, your remediation processes&lt;br /&gt;
must involve the detection of the cause. &amp;lt;ref name=&amp;quot;logsign&amp;quot;&amp;gt;Logsign, &amp;quot;What-is-remediation-in-cyber-security&amp;quot;. Available: https://www.logsign.com/blog/what-is-remediation-in-cyber-security/. [Accessed 28 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Recommending technology, policy, governance, and training changes after security incidents===&lt;br /&gt;
After all these actions, the SCIRT must contribute to the development&lt;br /&gt;
of better policies, practices and has to recommend improvements. They&lt;br /&gt;
are not working in the vacuum and their work has to create new and&lt;br /&gt;
better standards for cyber security. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;Exabeam, &amp;quot;CSIRT&amp;quot;. Available: https://www.exabeam.com/incident-response/csirt/ [Accessed 28 APr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==CERT==&lt;br /&gt;
&amp;lt;p&amp;gt;The term “computer emergency response team” was coined in 1988. In&lt;br /&gt;
response to the Morris worm attack that impacted thousands of servers on&lt;br /&gt;
the Internet, DARPA funded the formation of the Computer Emergency&lt;br /&gt;
Response Team Coordination Center (CERT-CC) at Carnegie Mellon&lt;br /&gt;
University. The goal of CERT-CC was to help protect the internet by&lt;br /&gt;
collecting and disseminating information on critical security&lt;br /&gt;
vulnerabilities. Several other countries formed similar centers using&lt;br /&gt;
the same acronym (despite threats of legal action by Carnegie Mellon for&lt;br /&gt;
trademark infringement). Now the term CERT refers to any emergency&lt;br /&gt;
response team that deals with cyber threats. Many people use CERT-CC&lt;br /&gt;
interchangeably with CSIRT, though the charter of a CERT is information&lt;br /&gt;
sharing in order to help other response teams respond to threats against&lt;br /&gt;
their own infrastructure.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In general, the designation of CERT is helpful in applying real-world&lt;br /&gt;
solutions to various cybersecurity problems. They may be government&lt;br /&gt;
contractors or employees of a major corporation. For example, the U.S.&lt;br /&gt;
Computer Emergency Readiness Team (US-CERT) operates under the U.S.&lt;br /&gt;
Department of Homeland Security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.techopedia.com/definition/31003/computer-emergency-response-team-cert&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In Estonia CERT is designated as CERT-EE. It was established in 2006,&lt;br /&gt;
as an organization responsible for the management of security incidents&lt;br /&gt;
in .ee computer networks. It is also a national contact point for&lt;br /&gt;
international co-operation in the field of IT security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ria.ee/en/cyber-security/cert-ee.html&amp;lt;/p&amp;gt;&lt;br /&gt;
===Difference between SOC/CSIRT/CERT===&lt;br /&gt;
&amp;lt;p&amp;gt;How CSIRTs differ from CERTs and SOCs There are overlapping&lt;br /&gt;
responsibilities between a community emergency response team (CERT),&lt;br /&gt;
computer security incident response team (CSIRT), and security&lt;br /&gt;
operations center (SOC). To add to this confusion, frequently, the terms&lt;br /&gt;
CERT and CSIRT are used interchangeably, despite the important&lt;br /&gt;
differences.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image3.png&amp;quot; alt=&amp;quot;Overlapping in images/image3.png&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;Overlapping in&lt;br /&gt;
images/image3.png&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
==Understand the primary roles and characteristics of a CERT, CSIRT, and SOC.==&lt;br /&gt;
&amp;lt;p&amp;gt;So, using strict definitions, a CERT collects and disseminates&lt;br /&gt;
security information, typically for the benefit of a country or an&lt;br /&gt;
industry. A CSIRT is a cross-functional team that responds to incidents&lt;br /&gt;
on behalf of a country or an organization. A SOC is where a country or&lt;br /&gt;
organization monitors and defends its network, servers, applications,&lt;br /&gt;
and endpoints.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image4.png&amp;quot; alt=&amp;quot;table of explanation images/image4&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;table of explanation&lt;br /&gt;
images/image4&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
==Future==&lt;br /&gt;
&amp;lt;p&amp;gt;And the Cyber security problem is only getting bigger. According to a&lt;br /&gt;
report published by Accenture, the number of cyber security breaches&lt;br /&gt;
increased by 11 percent from 2017 to 2018. The cost of such breaches is&lt;br /&gt;
astronomical–about $600 billion worldwide, according to the Economic&lt;br /&gt;
Impact of Cybercrime report.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Job projections for cybersecurity are staggering. The Bureau of Labor&lt;br /&gt;
Statistics in US predicts that careers in the cybersecurity field will&lt;br /&gt;
grow by 32% by 2028. That makes cybersecurity one of the top 10&lt;br /&gt;
fastest-growing jobs in the country. In the United States alone, jobs&lt;br /&gt;
for Information Security Analysts are expected to grow by 15% by&lt;br /&gt;
2024.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Most likely this trend is also similar in other countries.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When checking Estonian job portals, there is a constant need for&lt;br /&gt;
people for cyber security related positions. Also, linkedin search gives&lt;br /&gt;
approximately 30 vacancies immediately. There are banks, logistics&lt;br /&gt;
companies, e-shops, and software producers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://ee.linkedin.com/jobs/cyber-security-jobs?countryRedirected=1&amp;amp;amp;position=1&amp;amp;amp;pageNum=0&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Trends that affect companies create need for constant cyber security&lt;br /&gt;
services. Increasing number of home/remote offices require secure&lt;br /&gt;
corporate networks and security of remote devices. One example is from&lt;br /&gt;
this year, when sloppy remote desktop set-up paralyzed systems of 17&lt;br /&gt;
companies.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.aripaev.ee/uudised/2022/04/20/ria-lohakas-kaugtoolaua-seadistus-halvas-martsis-vahemalt-17-juhul-ettevotete-it-susteemid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Also, no service can exists without robust infrastructure - servers,&lt;br /&gt;
databases, applications. As all previously mentioned devices and&lt;br /&gt;
services are at constant scanning and surveillance. So, the breach&lt;br /&gt;
detection and immediate action demands 24/7 services. Even if lot of&lt;br /&gt;
things could be automated, there is a need for human specialists (at&lt;br /&gt;
least, at the moment). Third growing field is also a forensic&lt;br /&gt;
investigation, as every attack must be investigated in order to be ready&lt;br /&gt;
to repel next attacks. So data recovery and evidence collection is&lt;br /&gt;
another important field of work that need skilled and professional&lt;br /&gt;
workers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Even, if the specifics of the entity, be it CSIRT, CERT or SOC, are&lt;br /&gt;
different, the fundamentals of the work are the same. Professional&lt;br /&gt;
knowledge of the networks, operational systems, hardware, scripting, and&lt;br /&gt;
several other wider IT related knowledge is needed. As there is no&lt;br /&gt;
single way to reach to it, every single person can find one’s strongest&lt;br /&gt;
sides and develop them with knowledge of weaker side, in order to know,&lt;br /&gt;
when to as for help.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/body&amp;gt;&lt;br /&gt;
&amp;lt;/html&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mavald</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142211</id>
		<title>Hiring a Cyber Security Incident Analyst</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142211"/>
		<updated>2022-05-01T15:35:47Z</updated>

		<summary type="html">&lt;p&gt;Mavald: /* Education */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==A Cyber Security Incident Analyst==&lt;br /&gt;
&lt;br /&gt;
[[File:image1.png|600px|thumb|Job advertisement &amp;lt;ref&amp;gt;&amp;quot;Job Advertisement&amp;quot;. Available at https://www.projectpeople.com/jobs/&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
===Cyber security incident analyst in SOC/CSIRT/CERT===&lt;br /&gt;
This article delves into the job title of Cyber Security Incident&lt;br /&gt;
Analyst and provides an overview of the acronyms SOC/CSIRT/CERT. A brief&lt;br /&gt;
history of the job is discussed here, as well as a possible career path,&lt;br /&gt;
education, experience, and other characteristics required for work in&lt;br /&gt;
computer security-related organizations. The article also provides a&lt;br /&gt;
brief history of SOC/CSIRT/CERT, as well as a comparison of their&lt;br /&gt;
differences and similarities.&lt;br /&gt;
===Cyber Security Incident Analyst Skill Set===&lt;br /&gt;
What skill set is expected from the Cyber Security Incident Analyst? Below written lines are taken from the same job advertisement depicted&lt;br /&gt;
on the left side of this article:&lt;br /&gt;
As a Security Incident Analyst your responsibilities will include:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Continuous monitoring of security tooling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Performing regular and ad-hoc vulnerability assessments&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Carrying out ‘spot checks’&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Reporting vulnerabilities to the PVG via the alerts system&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintaining and documenting logging systems&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Developing centralized logging, reporting and intelligence&lt;br /&gt;
platforms&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;‘Light touch’ penetration testing with open source tooling&lt;br /&gt;
(Metasploit)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Knowledge &amp;amp;amp; Experience required:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;SOC, CSIRT or CERT operational environment experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Windows / Linux experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TCP /IP networking protocol knowledge&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience reviewing and analyzing Security Events from various&lt;br /&gt;
monitoring and logging sources&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience in website and web application security assessment or&lt;br /&gt;
penetration testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience of using Metasploit&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Scripting knowledge using BASH, Python, Perl, Ruby&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Skills in Host and Network Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
As one can see the description of the duties is wide and also the&lt;br /&gt;
knowledge and experience that is required is noteworthy. So, where to&lt;br /&gt;
start to find out the way to get this kind of knowledge and&lt;br /&gt;
expertize.&lt;br /&gt;
===Possible career path===&lt;br /&gt;
Next part of the paper is aiming to depict a possible ways, how to&lt;br /&gt;
develop oneself, and move along the career pathway in cybersecurity&lt;br /&gt;
field. Topics of development, education, experience and certification&lt;br /&gt;
are covered.&lt;br /&gt;
[[File:analystimage2.png|1000px|thumb|Career path &amp;lt;ref&amp;gt;&amp;quot;Possible Career Path&amp;quot;. Available at https://www.cyberseek.org/pathway.html&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
===Junior/Senior===&lt;br /&gt;
Start with an entry-level job in IT. Hands-on experience is often the&lt;br /&gt;
most effective way to prepare for certification exams. Start&lt;br /&gt;
accumulating work experience with an entry-level role as a cybersecurity&lt;br /&gt;
analyst. Many cybersecurity professionals start off in more general IT&lt;br /&gt;
roles. The skills, practices, and technologies you’ll use as a&lt;br /&gt;
cybersecurity professional will continue to evolve along with computer&lt;br /&gt;
and network technology. The desire to learn, ability to problem solve,&lt;br /&gt;
and attention to detail will serve you well in this field. Other, more&lt;br /&gt;
technical skills and technologies to learn include:&amp;lt;ref name=&amp;quot;certification&amp;quot;&amp;gt;Popular Cyber Security Certificates [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications  [Accessed 25 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====SIEM tools (security information and event management)====&lt;br /&gt;
Security Information and Event Management (SIEM) is a set of tools&lt;br /&gt;
and services offering a holistic view of an organization’s information&lt;br /&gt;
security. SIEM works by combining two technologies:&lt;br /&gt;
&amp;lt;li&amp;gt;Security information management (SIM), which collects data from log&lt;br /&gt;
files for analysis and reports on security threats and events, and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;security event management (SEM), which conducts real-time system&lt;br /&gt;
monitoring, notifies network admins about important issues and&lt;br /&gt;
establishes correlations between security events. There are a number of&lt;br /&gt;
security information and event management solutions on the market.&lt;br /&gt;
ArcSight ESM, IBM QRadar and Splunk are among the most popular. &amp;lt;ref name=&amp;quot;SIEM&amp;quot;&amp;gt;Application security, SIEM [Online]. Available: https://www.imperva.com/learn/application-security/siem/. [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Firewalls, Intrusion Detection Systems (IDS), and Intrusion Prevention Systems(IPS)====&lt;br /&gt;
Firewalls can be two types, hardware and software firewalls. Software&lt;br /&gt;
firewall is a firewall that is installed on a computer or server, and&lt;br /&gt;
tasked with network security. It works with a wide variety of other&lt;br /&gt;
technology security solutions to provide more robust and cohesive&lt;br /&gt;
security for enterprises of all sizes. When a software firewall is&lt;br /&gt;
installed on a server, it opens up like an umbrella of protection over&lt;br /&gt;
all other computers connected to the network. It is able to monitor both&lt;br /&gt;
incoming and outgoing traffic for potential risk or suspicious user&lt;br /&gt;
behavior, and also makes setting security policies much easier, faster&lt;br /&gt;
and more flexible. Hardware firewall is positioned between the network&lt;br /&gt;
and devices, allowing traffic to funnel through the firewall for a close&lt;br /&gt;
inspection and analysis. A hardware firewall, a term often&lt;br /&gt;
interchangeable with network or next-generation firewall, protects the&lt;br /&gt;
network gateways for an enterprise. Hardware firewall is physical&lt;br /&gt;
hardware, installed between network elements and connected devices, and&lt;br /&gt;
is tasked with filtering traffic for cyber threat to the network or&lt;br /&gt;
devices. Filtering out unauthorized or suspicious users based on traffic&lt;br /&gt;
analysis is one of the biggest benefits of hardware firewall. &amp;lt;ref name=&amp;quot;sangfor&amp;quot;&amp;gt;Sangfor, &amp;quot;What is Software Firewall? Difference between Hardware Firewall and Software Firewall, [Online]. Available: https://www.sangfor.com/blog/cybersecurity/what-is-software-firewall-difference-between-hardware-firewall-and-software-firewall [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems&lt;br /&gt;
(IPS) are both parts of the network infrastructure. IDS/IPS compare&lt;br /&gt;
network packets to a cyberthreat database containing known signatures of&lt;br /&gt;
cyberattacks — and flag any matching packets. IDS doesn’t alter the&lt;br /&gt;
network packets in any way, whereas IPS prevents the packet from&lt;br /&gt;
delivery based on the contents of the packet, much like how a firewall&lt;br /&gt;
prevents traffic by IP address. &amp;lt;ref name=&amp;quot;Varonis&amp;quot;&amp;gt;Varonis, &amp;quot;What is Software Firewall? IDS vs. IPS: What is the Difference?, [Online]. Available: https://www.varonis.com/blog/ids-vs-ips [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Digital forensics====&lt;br /&gt;
Digital forensics is a branch of forensic science that focuses on&lt;br /&gt;
identifying, acquiring, processing, analyzing, and reporting on data&lt;br /&gt;
stored electronically. Electronic evidence is a component of almost all&lt;br /&gt;
criminal activities and digital forensics support is crucial for law&lt;br /&gt;
enforcement investigations. Electronic evidence can be collected from a&lt;br /&gt;
wide array of sources, such as computers, smartphones, remote storage,&lt;br /&gt;
unmanned aerial systems, shipborne equipment, and more.&amp;lt;ref name=&amp;quot;interpol&amp;quot;&amp;gt;Interpol, &amp;quot;Digital forensics&amp;quot;. Available: https://www.interpol.int/How-we-work/Innovation/Digital-forensics. [Accessed 28 4 2022].&amp;lt;/ref&amp;gt; &lt;br /&gt;
Investigative process of digital forensics can be divided into several stages. There are four major stages: preservation, collection,&lt;br /&gt;
examination, and analysis. All these four stages need a deep understanding of computers, technology across a broad spectrum, and cybersecurity principles and&lt;br /&gt;
practices, a working knowledge of computers, networks, and coding, in-depth investigative abilities, critical-thinking skills and analytical talent the ability to effectively communicate and work with a&lt;br /&gt;
wide range of people. &amp;lt;ref name=&amp;quot;ecpi&amp;quot;&amp;gt;&amp;quot;Digital forensics&amp;quot;. Available: https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me. [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Mobile device management====&lt;br /&gt;
Mobile device management (MDM) is software that allows IT&lt;br /&gt;
administrators to control, secure and enforce policies on smartphones,&lt;br /&gt;
tablets and other endpoints. Mobile device management software emerged&lt;br /&gt;
in the early 2000s as a way to control and secure the personal digital&lt;br /&gt;
assistants and smartphones that business workers began to use. The&lt;br /&gt;
consumer smartphone boom that started with the launch of the Apple&lt;br /&gt;
iPhone in 2007 led to the bring your own device (BYOD) trend, which&lt;br /&gt;
fueled further interest in MDM.&amp;lt;ref name=&amp;quot;techtarget&amp;quot;&amp;gt;Techtarget, &amp;quot;Mobile Device Management&amp;quot;. Available: https://www.techtarget.com/searchmobilecomputing/definition/mobile-device-management [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Data management====&lt;br /&gt;
Sometimes the data management is neglected, but this part has a&lt;br /&gt;
crucial role when learning for good cyber security practices. Majority&lt;br /&gt;
of cyber security programs include a special courses on data management.&lt;br /&gt;
Data management is a method of organizing and maintaining data processes&lt;br /&gt;
that are required in almost every business operations. The benefits of&lt;br /&gt;
data management can be found accounting, statistics, logistics planning&lt;br /&gt;
and other disciplines including corporate computing.&amp;lt;ref name=&amp;quot;GlobalUni&amp;quot;&amp;gt;Global Universities, &amp;quot;MSc Data Management and Cyber Security&amp;quot;. Available: https://globaluniversities.in/msc-data-management-cyber-security. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Data governance (and management) play a fundamental role in&lt;br /&gt;
protecting an organization’s data. Ensuring that the right people have&lt;br /&gt;
the right access and that appropriate security controls are in place to&lt;br /&gt;
protect each system or service, based on the criticality or sensitivity&lt;br /&gt;
of the data sets these contain. &amp;lt;ref name=&amp;quot;CyberMagazine&amp;quot;&amp;gt;Cyber Security Magazine, &amp;quot;The Role of Data Governance in Cybersecurity&amp;quot;. Available: https://cybersecurity-magazine.com/the-role-of-data-governance-in-cybersecurity/?utm_source=rss&amp;amp;amp;utm_medium=rss&amp;amp;amp;utm_campaign=the-role-of-data-governance-in-cybersecurity. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Application security development====&lt;br /&gt;
Application security describes security measures at the application&lt;br /&gt;
level that aim to prevent data or code within the app from being stolen&lt;br /&gt;
or hijacked. It encompasses the security considerations that happen&lt;br /&gt;
during application development and design, but it also involves systems&lt;br /&gt;
and approaches to protect apps after they get deployed. Application&lt;br /&gt;
security may include hardware, software, and procedures that identify or&lt;br /&gt;
minimize security vulnerabilities.&amp;lt;ref name=&amp;quot;vmware&amp;quot;&amp;gt;VmWare, &amp;quot;What is application security?&amp;quot;. Available: https://www.vmware.com/topics/glossary/content/application-security.html [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Application security development is important to ensure that your&lt;br /&gt;
application is free from coding errors and bugs. And controls the risk&lt;br /&gt;
and helps safeguard against security vulnerabilities. Application&lt;br /&gt;
security development is the process of making applications more secure&lt;br /&gt;
by finding and fixing security vulnerabilities. This is often done by&lt;br /&gt;
enforcing software security best practices and using application&lt;br /&gt;
security testing tools. &lt;br /&gt;
&amp;lt;ref name=&amp;quot;perforce&amp;quot;&amp;gt;Perforce, &amp;quot;Application Security Development Best Practices&amp;quot;. Available: https://www.perforce.com/blog/kw/application-security-development-best-practices. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Audit and compliance knowledge====&lt;br /&gt;
A cyber security audit is designed to be a comprehensive review and&lt;br /&gt;
analysis of your business’s IT infrastructure. It identifies threats and&lt;br /&gt;
vulnerabilities, exposing weaknesses and high-risk practices.&lt;br /&gt;
Regulations such as the EU GDPR (General Data Protection Regulation) can&lt;br /&gt;
impose hefty penalties in the event of a breach that results in&lt;br /&gt;
exploited data. A cyber security audit will help mitigate the&lt;br /&gt;
consequences of a breach and demonstrate that your organization has&lt;br /&gt;
taken the necessary steps to protect client and company data. &amp;lt;ref name=&amp;quot;cyforsecure&amp;quot;&amp;gt;Cyfor Secure, &amp;quot;What is a Cyber Security Audit and how can it help your organisation?&amp;quot;. Available: https://cyforsecure.co.uk/services/cyber-assessment/cyber-security-audit/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cybersecurity compliance is the organizational risk management method&lt;br /&gt;
aligned with pre-defined security measures &amp;amp;amp; controls on how data&lt;br /&gt;
confidentiality is ensured by its administrative procedures.&amp;lt;ref name=&amp;quot;nordlayer&amp;quot;&amp;gt;NordLayer, &amp;quot;Cybersecurity compliance: Everything you need to know&amp;quot;. Available: https://nordlayer.com/blog/cybersecurity-compliance-everything-you-need-to-know/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
All needed skills are developed through courses and certification.&lt;br /&gt;
&lt;br /&gt;
===Entry-Level Incident Response Positions===&lt;br /&gt;
It is not always possible to advance to the position of incident&lt;br /&gt;
responder in a straight line. Many professionals advance from entry- to&lt;br /&gt;
mid-level positions before becoming a real incident responder or a&lt;br /&gt;
member of a computer emergency response team (CERT).&amp;lt;br /&amp;gt;&lt;br /&gt;
These are some examples: &amp;lt;ref name=&amp;quot;Infosec&amp;quot;&amp;gt;Infosec, &amp;quot;Incident Responder Career Roadmap: From Entry Level to Executive&amp;quot;. Available: https://resources.infosecinstitute.com/topic/incident-responder-career-roadmap-entry-level-executive/ [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;network-administrator&amp;quot;&amp;gt;Network administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;This position’s experience will help potential incident responders&lt;br /&gt;
develop networking skills. Attention to detail, as well as the ability&lt;br /&gt;
to sift through system configurations, site layouts, and general network&lt;br /&gt;
and communication setups, are essential in this field.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;system-administrator&amp;quot;&amp;gt;System administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Another crucial beginning point for an incident responder is to learn&lt;br /&gt;
how to manage resources inside your organization as well as user&lt;br /&gt;
behavior. Understanding the potential damage that users, inadequate&lt;br /&gt;
security setups, and ineffective IT policies and procedures can cause on&lt;br /&gt;
your network can provide prospective candidates with insight into the&lt;br /&gt;
human component of an incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;security-administrator&amp;quot;&amp;gt;Security administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In such a position, basic hacking skills, penetration testing, and&lt;br /&gt;
intrusion detection are all learned, which are crucial incident&lt;br /&gt;
responder skills when trying to replicate a breach or attack.&lt;br /&gt;
Understanding the paths a cybercriminal will take when attempting to&lt;br /&gt;
damage or obtain access to a system can greatly simplify the work of&lt;br /&gt;
reverse engineering the incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Mid-Level Incident Response Positions ===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5&lt;br /&gt;
id=&amp;quot;computer-security-incident-response-team-csirt-engineer&amp;quot;&amp;gt;Computer&lt;br /&gt;
security incident response team (CSIRT) engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;cyber-incident-responder&amp;quot;&amp;gt;Cyber incident responder&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-response-engineer&amp;quot;&amp;gt;Incident response&lt;br /&gt;
engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;While each of these positions is different, they generally require&lt;br /&gt;
very similar skills and characteristics in a candidate. At this level,&lt;br /&gt;
personal characteristics such as problem solving, time management, and&lt;br /&gt;
even presentation skills become more crucial as one’s career evolves&lt;br /&gt;
into a management-facing role.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Technical skills include the ability to identify and minimize threats&lt;br /&gt;
while maintaining communication with management and the rest of your&lt;br /&gt;
team. Data analysis and evidence gathering become increasingly crucial,&lt;br /&gt;
and the circumstances in which your services are deployed get more&lt;br /&gt;
serious.&amp;lt;/p&amp;gt;&lt;br /&gt;
Problem-solving skills are crucial at this level of incident&lt;br /&gt;
response, and as the stakes rise, so does the pressure in each&lt;br /&gt;
situation. At this level, programming abilities are essential since&lt;br /&gt;
incident responders may be needed to reverse engineer malicious code or&lt;br /&gt;
even create patches for vulnerable network applications or services. &amp;lt;ref name=&amp;quot;coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated]&amp;quot;. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Senior-Level Incident Response Positions===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;intrusion-detection-specialist&amp;quot;&amp;gt;Intrusion detection&lt;br /&gt;
specialist:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;A CISSP certification might help a potential candidate in preparing&lt;br /&gt;
for the profession. The role of an intrusion detection specialist is to&lt;br /&gt;
find and stop any unwanted communications.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-manager&amp;quot;&amp;gt;Incident manager:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Expected to plan, oversee, manage, and supervise all incident&lt;br /&gt;
response team actions. Is in charge of reporting all current events to&lt;br /&gt;
senior management and stakeholders, as well as acting as the technical&lt;br /&gt;
lead on active incidents for incident responders. Prepares threat and&lt;br /&gt;
impact assessments and reports them known to management.&amp;lt;ref name=&amp;quot;coursera&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Certificates== &lt;br /&gt;
There is a vast number of different certificates and the road map to&lt;br /&gt;
being a certified professional could be very different&amp;lt;ref name=&amp;quot;Coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated],&amp;quot; [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;NICCS&amp;quot;&amp;gt;NICCS, &amp;quot;Cybersecurity Certifications,&amp;quot; [Online]. Available: hhttps://niccs.cisa.gov/about-niccs/cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt; . One possible&lt;br /&gt;
approach is to start with basic certificates from the different branches&lt;br /&gt;
of service and move to more specific and demanding focused&lt;br /&gt;
certification. Also, some jobs require certain clearances, either from&lt;br /&gt;
industry, or from the government. One small selection of different&lt;br /&gt;
possible certificates is brought out in following paragraphs.&lt;br /&gt;
&lt;br /&gt;
Security+ is a CompTIA certification that is considered a basic cert&lt;br /&gt;
among cybersecurity professionals. It covers the topics of risk&lt;br /&gt;
management and threat assessment.&lt;br /&gt;
Network+ is also offered by CompTIA this certification (like the name&lt;br /&gt;
implies) focuses on networking infrastructure and operations. It is&lt;br /&gt;
considered a foundational certification.&lt;br /&gt;
The Certified Information Systems Security Professional (CISSP) is a&lt;br /&gt;
more advanced certification designed for cybersecurity professionals&lt;br /&gt;
with at least five years of work experience. The certification covers&lt;br /&gt;
topics such as architecture, engineering, and management.&amp;lt;/p&amp;gt;&lt;br /&gt;
The Certified Ethical Hacker (CEH) certification is also considered a&lt;br /&gt;
more advanced cert because it generally requires that applicants have&lt;br /&gt;
multiple years of work experience. The goal of an ethical hacker&lt;br /&gt;
certification is to be able to understand how cyber attacks unfold in&lt;br /&gt;
order to improve threat assessment and mitigation skills.&amp;lt;ref name=&amp;quot;cyberguide&amp;quot;&amp;gt;Cybersecurity Guide, &amp;quot;How to become a cybersecurity specialist&amp;quot;, [Online]. Available: https://cybersecurityguide.org/careers/security-specialist/. [Accessed 27 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
This is definitely not all, when one looks for more information, following link could be searched, to get more in depth knowledge about&lt;br /&gt;
different possibilities. Hereby, with the help of this matrix a possible taxonomy of different 436 listed certificates in branches are&lt;br /&gt;
presented.&amp;lt;ref name=&amp;quot;Pauljeremy&amp;quot;&amp;gt;&amp;quot;Cybersecurity Roadmap,&amp;quot; [Online]. Available: https://pauljerimy.com/2020/10/12/scr-oct-2020-update/. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:analystimage5.png|1000px|thumb|Certificate matrix &amp;lt;ref&amp;gt;&amp;quot;Certification roadmap&amp;quot;. Available at https://pauljerimy.com/security-certification-roadmap&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
=== Communication and Network Security===&lt;br /&gt;
Communication and network security covers the ability to secure&lt;br /&gt;
communication channels and networks. Topics include secure and converges&lt;br /&gt;
protocols, wireless networks, cellular networks, hardware operations&lt;br /&gt;
(warranty and redundant power), and third-party connectivity. IP&lt;br /&gt;
networking are also included in this domain.&lt;br /&gt;
===Identity and Access Management===&lt;br /&gt;
The identity and access management domain covers the attacks that&lt;br /&gt;
target the human gateway to gain access to data. Other topics include&lt;br /&gt;
ways to identify users with rights to access the information and&lt;br /&gt;
servers. Identity and access management covers the topics of&lt;br /&gt;
applications, Single sign-on authentication, privilege escalation,&lt;br /&gt;
Kerberos, rule-based or risk-based access control, proofing and&lt;br /&gt;
establishment of identity.&lt;br /&gt;
===Security Architecture and Engineering===&lt;br /&gt;
The security architecture and engineering domain covers important&lt;br /&gt;
topics concerning security engineering plans, designs and principles,&lt;br /&gt;
Topics include assessing and mitigating information system&lt;br /&gt;
vulnerabilities, fundamental concepts of security models and security&lt;br /&gt;
architectures in critical areas like access control. Cloud systems,&lt;br /&gt;
cryptography, system infiltrations (ransomware, fault-injection and&lt;br /&gt;
more) and virtualized systems are also covered in this domain.&lt;br /&gt;
===Asset Security===&lt;br /&gt;
The Asset Security domain deals with the issues related to the&lt;br /&gt;
collection, storage, maintenance, retention and destruction of data. It&lt;br /&gt;
also covers knowledge of different roles regarding data handling (owner,&lt;br /&gt;
controller and custodian) as well as data protection methods and data&lt;br /&gt;
states. Other topics include resource provision, asset classification&lt;br /&gt;
and data lifecycle management.&lt;br /&gt;
===Security and Risk Management===&lt;br /&gt;
The security and risk management domain covers general on skills&lt;br /&gt;
related to the implementation of user awareness programs as well as&lt;br /&gt;
security procedures. Emphasis is also placed on risk management&lt;br /&gt;
concerning the acquisition of new services, hardware and software&lt;br /&gt;
(supply chain). Other skills include social engineering defense&lt;br /&gt;
mechanisms.&lt;br /&gt;
===Security Assessment and Testing===&lt;br /&gt;
The security assessment and testing domain deals with all the&lt;br /&gt;
techniques and tools used to find system vulnerabilities, weaknesses and&lt;br /&gt;
potential areas of concern not addressed by security procedures and&lt;br /&gt;
policies. Attack simulations, vulnerability assessment, compliance&lt;br /&gt;
checks, and ethical disclosure also fall under this domain.&lt;br /&gt;
===Software Security===&lt;br /&gt;
The software development security domain deals with implementing&lt;br /&gt;
software-based security protocols within environment for which the IT&lt;br /&gt;
professional is responsible. Risk analysis, vulnerability identification&lt;br /&gt;
and auditing of source codes are all covered in this subset. Additional&lt;br /&gt;
topics include software-designed security, maturity models, development&lt;br /&gt;
methodologies, open-source and third-party development security.&lt;br /&gt;
===Security operations===&lt;br /&gt;
The security operations domain covers topics ranging from&lt;br /&gt;
investigations and digital forensic to detection and intrusion&lt;br /&gt;
prevention tools, sandboxing and firewalls. Topics include user and&lt;br /&gt;
entity behavior analytics, threat intelligence (threat hunting and&lt;br /&gt;
threat feeds) log management, artifacts (mobile, computer and network),&lt;br /&gt;
machine learning and AI-based tools, penetration testing, and&lt;br /&gt;
exploitation development. These for sub-domains are lister here.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Incident Handling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Penetration Testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Exploitation&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Education==&lt;br /&gt;
The entry level monitoring specialist is hired by Estonian&lt;br /&gt;
Information System Authority even if there is no formal IT education,&lt;br /&gt;
but readiness to learn and moderate knowledge of different operation&lt;br /&gt;
systems is enough to start the career. &amp;lt;ref name=&amp;quot;cv&amp;quot;&amp;gt;cv.ee, &amp;quot;SEIRESPETSIALIST - tule Eesti küberruumi valvuriks!&amp;quot;. Available: https://www.cv.ee/en/vacancy/792782/riigi-infosusteemi-amet/seirespetsialist-tule-eesti-kuberruumi-valvuriks [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
[[File:Analystimage7.png|500px|thumb|Comparison degree vs Certificate &amp;lt;ref&amp;gt;&amp;quot;Comparison Table&amp;quot;. Available at https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
Nevertheless, like most other high qualification careers jobs falling&lt;br /&gt;
under the cybersecurity specialist category require some form of formal&lt;br /&gt;
education. However, since cybersecurity specialist jobs can fall across&lt;br /&gt;
a wide spectrum of job descriptions and responsibilities, it is possible&lt;br /&gt;
to obtain a specialist job after completing many levels of different&lt;br /&gt;
computer related education.&lt;br /&gt;
If one is looking for a cybersecurity related education, for example&lt;br /&gt;
in EU, 137 courses/programs could be found that relate to keyword IT or&lt;br /&gt;
cybersecurity. &amp;lt;ref name=&amp;quot;enisa&amp;quot;&amp;gt;ENISA (European Union Agency for Cybersecurity), &amp;quot;Cybersecurity Education-Cybersecurity Higher Education Database&amp;quot;. Available: https://www.enisa.europa.eu/topics/cybersecurity-education/education-map/education-courses [Accessed 26 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Also, there is a great amount of discussion, if cyber security&lt;br /&gt;
professional should have a degree or would be certification just enough.&lt;br /&gt;
One interesting table is produces by Franklin University that compares&lt;br /&gt;
benefits and/or drawbacks of each type of credential.&lt;br /&gt;
&amp;lt;ref name=&amp;quot;franklin&amp;quot;&amp;gt;Franklin University, &amp;quot;Is Getting a Master&#039;s Degree in Cyber Security Worth It?&amp;quot;. Available: https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Certifications are generally good for people with little practical&lt;br /&gt;
experience because they are known quantities in the industry and can&lt;br /&gt;
help you get your foot in the door. They set a minimum knowledge bar.&lt;br /&gt;
But some certifications are viewed more favorably than others.&lt;br /&gt;
Certifications with renewal requirements are viewed better by hiring&lt;br /&gt;
managers, but they also more costly in the long run because of the need&lt;br /&gt;
for continuing education. Certifications are also good for showing&lt;br /&gt;
in-depth expertise in a specialization within cybersecurity. Depending&lt;br /&gt;
on your career goals, it may be advantageous to have a master’s&lt;br /&gt;
degree—which shows your breadth of knowledge, critical thinking and&lt;br /&gt;
leadership skills—and a certificate—which shows specific skill&lt;br /&gt;
competency.&amp;lt;ref name=&amp;quot;franklin&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
As IT (Cyber) Security is still a relatively young discipline,&lt;br /&gt;
universities and colleges are still figuring out which is the best&lt;br /&gt;
approach for their degrees. Study programmes and curricula in Cyber&lt;br /&gt;
Security are different. In general, here are the duration of Cyber&lt;br /&gt;
Security degrees:&lt;br /&gt;
&amp;lt;ref name=&amp;quot;studyportal&amp;quot;&amp;gt;Studyportals, &amp;quot;Why You Should Study a Cyber Security Degree in 2022&amp;quot;. Available: https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Bachelor’s degrees in Cyber Security take 3 or 4 years in most&lt;br /&gt;
countries.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Master’s courses in Cyber Security take between 1-2 years to&lt;br /&gt;
complete.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;PhD programmes in Cyber Security last 3-5 years. Some only take 1&lt;br /&gt;
or 2 years, but they are less common.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Generalization could me made that on bachelor level the general&lt;br /&gt;
knowledge about the cyber issues are obtained. On master level the&lt;br /&gt;
specialization courses are taken and the person can choose more specific&lt;br /&gt;
topics to study. It is on master level where strengths of the cyber&lt;br /&gt;
specialist can be developed further and up-do date knowledge obtained in&lt;br /&gt;
specifics. PhD is serious science and involves teaching, lot of&lt;br /&gt;
scientific work and writing for publications.&lt;br /&gt;
&lt;br /&gt;
==Salary==&lt;br /&gt;
&amp;lt;p&amp;gt;Even if the salary can be very different, compared to the skills and&lt;br /&gt;
experience, an generalization can be made. Cyber Security professionals&lt;br /&gt;
in CSIRT, and in other entities earn quite well, from the start. First,&lt;br /&gt;
some comparison from the United States. The average CSIRT analyst salary&lt;br /&gt;
in the USA is $97,500 per year or $50 per hour. Entry level positions&lt;br /&gt;
start at $48,875 per year while most experienced workers make up to&lt;br /&gt;
$135,373 per year.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.talent.com/salary?job=csirt+analyst&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;There are multiple positions you can occupy in this field. They have&lt;br /&gt;
in common great salaries and high demand for technical skills, attention&lt;br /&gt;
to details, problem-solving mentality, and the ability to analyze risks.&lt;br /&gt;
Here are the average annual salaries in the United States, according to&lt;br /&gt;
Payscale:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.payscale.com/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Cryptographer – 100,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Information Security Officer – 91,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Assessor – 90,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Engineer – 88,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Penetration Tester – 81,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Forensics Expert – 71,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Administrator – 65,000 USD&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When looking into salaries in Estonia, one can find that there is a&lt;br /&gt;
discussion that private sector is taking a toll from the public sector,&lt;br /&gt;
and that the salaries in important agencies, as Information System&lt;br /&gt;
Authority loose their employees to the better paid positions in private&lt;br /&gt;
sector.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://digi.geenius.ee/rubriik/uudis/kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad/&lt;br /&gt;
https://tehnika.postimees.ee/6887428/riigi-it-tootajate-palgamaarad-kasvasid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;But there is also a different view that average private sector worker&lt;br /&gt;
could be hired as a top specialist in public sector and then the payment&lt;br /&gt;
is higher. Nevertheless, it seems that the average payment in cyber&lt;br /&gt;
security sector is any way higher that in other parts of the&lt;br /&gt;
e-services.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://digi.geenius.ee/rubriik/uudis/5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka/&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
==SOC==&lt;br /&gt;
&amp;lt;p&amp;gt;A SOC is a facility where an organization’s network, applications,&lt;br /&gt;
and endpoints are monitored and defended. The term was adapted from&lt;br /&gt;
network operations centers (NOCs), where large telecommunication or&lt;br /&gt;
corporate networks are monitored. When network security became more of a&lt;br /&gt;
concern, security teams were formed within the NOCs, and eventually spun&lt;br /&gt;
off into larger organizations of their own as the responsibilities of&lt;br /&gt;
security teams grew increasingly complex and specialized. The security&lt;br /&gt;
staff working in a security operations center are often called the SOC&lt;br /&gt;
team.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Functions of the SOC team include, but are not limited to:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ol type=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Taking inventory of resources, to get a better understanding of the&lt;br /&gt;
structure they are protecting.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintanence of the system, by constantly making updates and adding&lt;br /&gt;
safeguards.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Monitoring the network for abnormalities with special tools.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Threat analysis of new attacks and vulnerabilities.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Responding to attacks, by acting as “first responders”. The SOC team&lt;br /&gt;
will shut down and/or isolate endpoints, deleting files and lowering the&lt;br /&gt;
impact as fast as possible.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Recovery of system stability and lost data. This may be done using&lt;br /&gt;
backups, restarting endpoints or reconfiguring systems.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Logging all actions on the system, to be later used for analysis or&lt;br /&gt;
forensics after an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigating the root cause of an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Auditing their own actions, to be in line with regulations of the&lt;br /&gt;
organization, industry or governing body.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.trellix.com/en-us/security-awareness/operations/what-is-soc.html&amp;lt;/p&amp;gt;&lt;br /&gt;
==CSIRT==&lt;br /&gt;
&amp;lt;p&amp;gt;A CSIRT is a group that responds to security incidents when they&lt;br /&gt;
occur. Key responsibilities of a CSIRT include: &lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
===Creating and maintaining an incident response plan (IRP)===&lt;br /&gt;
An incident response plan (IRP) is a set of written instructions for&lt;br /&gt;
detecting, responding to and limiting the effects of an information&lt;br /&gt;
security event. Incident response plans provide instructions for&lt;br /&gt;
responding to many potential scenarios, including data breaches, denial&lt;br /&gt;
of service/distributed denial of service attacks, firewall breaches,&lt;br /&gt;
virus or malware outbreaks or insider threats. Without an incident&lt;br /&gt;
response plan in place, organizations may either not detect the attack&lt;br /&gt;
in the first place, or not follow proper protocol to contain the threat&lt;br /&gt;
and recover from it when a breach is detected.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.stratacore.com/incidentresponseplan&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
===Investigating and analyzing incidents===&lt;br /&gt;
CSIRTs are also involved in improvement activities. After major&lt;br /&gt;
computer security incidents occur, or when incidents are not handled in&lt;br /&gt;
a timely or effective manner, a CSIRT will generally perform a&lt;br /&gt;
postmortem of the incident and its response. This postmortem will&lt;br /&gt;
identify the strengths and weakness of the response effort. Such reviews&lt;br /&gt;
can identify weaknesses and holes in systems, infrastructure defenses,&lt;br /&gt;
or policies that allowed the incident to take place. It can also&lt;br /&gt;
identify problems with communication channels, interfaces, and&lt;br /&gt;
procedures that inhibited the efficient resolution of the reported&lt;br /&gt;
problem.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.cisa.gov/uscert/bsi/articles/best-practices/incident-management/defining-computer-security-incident-response-teams&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Managing internal communications and updates during or immediately after incidents occur===&lt;br /&gt;
===Communicating with employees, shareholders, customers, and the press about incidents as needed===&lt;br /&gt;
&amp;lt;p&amp;gt;There are various services within the CSIRT Services Framework that&lt;br /&gt;
address communications, as they relate to security operations and&lt;br /&gt;
incident response services. Some of these include Information Security&lt;br /&gt;
Incident Coordination, Crisis Management Support, Vulnerability&lt;br /&gt;
Disclosure, Situational Awareness Communication, and Awareness Building,&lt;br /&gt;
to name a few. Sharing information and communicating with the general&lt;br /&gt;
public and/or your constituency is appropriate in many different&lt;br /&gt;
scenarios. These can range from proactive communications to reactive&lt;br /&gt;
communications. Each scenario may be unique, and careful consideration&lt;br /&gt;
should be given to when to release information to the public and what&lt;br /&gt;
information should be released.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;https://resources.sei.cmu.edu/asset_files/Handbook/2021_002_001_651819.pdf&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Remediating incidents===&lt;br /&gt;
Threat remediation is a strong and capable tool for fighting the&lt;br /&gt;
cyber security compromises. As the word ‘remedy’ suggests, remediation&lt;br /&gt;
process involves the treatment of a security breach. With the&lt;br /&gt;
remediation practices, your cyber security team is able to eliminate&lt;br /&gt;
suspicious activities and malicious attacks in the form of malware,&lt;br /&gt;
ransomware, phishing and such. Even if you ‘kill’ the suspicious&lt;br /&gt;
activity, the attackers can remain in your systems. If you want to&lt;br /&gt;
contaminate and end the problem for good, your remediation processes&lt;br /&gt;
must involve the detection of the cause. &amp;lt;ref name=&amp;quot;logsign&amp;quot;&amp;gt;Logsign, &amp;quot;What-is-remediation-in-cyber-security&amp;quot;. Available: https://www.logsign.com/blog/what-is-remediation-in-cyber-security/. [Accessed 28 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Recommending technology, policy, governance, and training changes after security incidents===&lt;br /&gt;
After all these actions, the SCIRT must contribute to the development&lt;br /&gt;
of better policies, practices and has to recommend improvements. They&lt;br /&gt;
are not working in the vacuum and their work has to create new and&lt;br /&gt;
better standards for cyber security. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;Exabeam, &amp;quot;CSIRT&amp;quot;. Available: https://www.exabeam.com/incident-response/csirt/ [Accessed 28 APr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==CERT==&lt;br /&gt;
&amp;lt;p&amp;gt;The term “computer emergency response team” was coined in 1988. In&lt;br /&gt;
response to the Morris worm attack that impacted thousands of servers on&lt;br /&gt;
the Internet, DARPA funded the formation of the Computer Emergency&lt;br /&gt;
Response Team Coordination Center (CERT-CC) at Carnegie Mellon&lt;br /&gt;
University. The goal of CERT-CC was to help protect the internet by&lt;br /&gt;
collecting and disseminating information on critical security&lt;br /&gt;
vulnerabilities. Several other countries formed similar centers using&lt;br /&gt;
the same acronym (despite threats of legal action by Carnegie Mellon for&lt;br /&gt;
trademark infringement). Now the term CERT refers to any emergency&lt;br /&gt;
response team that deals with cyber threats. Many people use CERT-CC&lt;br /&gt;
interchangeably with CSIRT, though the charter of a CERT is information&lt;br /&gt;
sharing in order to help other response teams respond to threats against&lt;br /&gt;
their own infrastructure.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In general, the designation of CERT is helpful in applying real-world&lt;br /&gt;
solutions to various cybersecurity problems. They may be government&lt;br /&gt;
contractors or employees of a major corporation. For example, the U.S.&lt;br /&gt;
Computer Emergency Readiness Team (US-CERT) operates under the U.S.&lt;br /&gt;
Department of Homeland Security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.techopedia.com/definition/31003/computer-emergency-response-team-cert&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In Estonia CERT is designated as CERT-EE. It was established in 2006,&lt;br /&gt;
as an organization responsible for the management of security incidents&lt;br /&gt;
in .ee computer networks. It is also a national contact point for&lt;br /&gt;
international co-operation in the field of IT security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ria.ee/en/cyber-security/cert-ee.html&amp;lt;/p&amp;gt;&lt;br /&gt;
===Difference between SOC/CSIRT/CERT===&lt;br /&gt;
&amp;lt;p&amp;gt;How CSIRTs differ from CERTs and SOCs There are overlapping&lt;br /&gt;
responsibilities between a community emergency response team (CERT),&lt;br /&gt;
computer security incident response team (CSIRT), and security&lt;br /&gt;
operations center (SOC). To add to this confusion, frequently, the terms&lt;br /&gt;
CERT and CSIRT are used interchangeably, despite the important&lt;br /&gt;
differences.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image3.png&amp;quot; alt=&amp;quot;Overlapping in images/image3.png&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;Overlapping in&lt;br /&gt;
images/image3.png&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
==Understand the primary roles and characteristics of a CERT, CSIRT, and SOC.==&lt;br /&gt;
&amp;lt;p&amp;gt;So, using strict definitions, a CERT collects and disseminates&lt;br /&gt;
security information, typically for the benefit of a country or an&lt;br /&gt;
industry. A CSIRT is a cross-functional team that responds to incidents&lt;br /&gt;
on behalf of a country or an organization. A SOC is where a country or&lt;br /&gt;
organization monitors and defends its network, servers, applications,&lt;br /&gt;
and endpoints.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image4.png&amp;quot; alt=&amp;quot;table of explanation images/image4&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;table of explanation&lt;br /&gt;
images/image4&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
==Future==&lt;br /&gt;
&amp;lt;p&amp;gt;And the Cyber security problem is only getting bigger. According to a&lt;br /&gt;
report published by Accenture, the number of cyber security breaches&lt;br /&gt;
increased by 11 percent from 2017 to 2018. The cost of such breaches is&lt;br /&gt;
astronomical–about $600 billion worldwide, according to the Economic&lt;br /&gt;
Impact of Cybercrime report.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Job projections for cybersecurity are staggering. The Bureau of Labor&lt;br /&gt;
Statistics in US predicts that careers in the cybersecurity field will&lt;br /&gt;
grow by 32% by 2028. That makes cybersecurity one of the top 10&lt;br /&gt;
fastest-growing jobs in the country. In the United States alone, jobs&lt;br /&gt;
for Information Security Analysts are expected to grow by 15% by&lt;br /&gt;
2024.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Most likely this trend is also similar in other countries.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When checking Estonian job portals, there is a constant need for&lt;br /&gt;
people for cyber security related positions. Also, linkedin search gives&lt;br /&gt;
approximately 30 vacancies immediately. There are banks, logistics&lt;br /&gt;
companies, e-shops, and software producers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://ee.linkedin.com/jobs/cyber-security-jobs?countryRedirected=1&amp;amp;amp;position=1&amp;amp;amp;pageNum=0&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Trends that affect companies create need for constant cyber security&lt;br /&gt;
services. Increasing number of home/remote offices require secure&lt;br /&gt;
corporate networks and security of remote devices. One example is from&lt;br /&gt;
this year, when sloppy remote desktop set-up paralyzed systems of 17&lt;br /&gt;
companies.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.aripaev.ee/uudised/2022/04/20/ria-lohakas-kaugtoolaua-seadistus-halvas-martsis-vahemalt-17-juhul-ettevotete-it-susteemid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Also, no service can exists without robust infrastructure - servers,&lt;br /&gt;
databases, applications. As all previously mentioned devices and&lt;br /&gt;
services are at constant scanning and surveillance. So, the breach&lt;br /&gt;
detection and immediate action demands 24/7 services. Even if lot of&lt;br /&gt;
things could be automated, there is a need for human specialists (at&lt;br /&gt;
least, at the moment). Third growing field is also a forensic&lt;br /&gt;
investigation, as every attack must be investigated in order to be ready&lt;br /&gt;
to repel next attacks. So data recovery and evidence collection is&lt;br /&gt;
another important field of work that need skilled and professional&lt;br /&gt;
workers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Even, if the specifics of the entity, be it CSIRT, CERT or SOC, are&lt;br /&gt;
different, the fundamentals of the work are the same. Professional&lt;br /&gt;
knowledge of the networks, operational systems, hardware, scripting, and&lt;br /&gt;
several other wider IT related knowledge is needed. As there is no&lt;br /&gt;
single way to reach to it, every single person can find one’s strongest&lt;br /&gt;
sides and develop them with knowledge of weaker side, in order to know,&lt;br /&gt;
when to as for help.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/body&amp;gt;&lt;br /&gt;
&amp;lt;/html&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mavald</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142210</id>
		<title>Hiring a Cyber Security Incident Analyst</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142210"/>
		<updated>2022-05-01T15:34:46Z</updated>

		<summary type="html">&lt;p&gt;Mavald: /* Education */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==A Cyber Security Incident Analyst==&lt;br /&gt;
&lt;br /&gt;
[[File:image1.png|600px|thumb|Job advertisement &amp;lt;ref&amp;gt;&amp;quot;Job Advertisement&amp;quot;. Available at https://www.projectpeople.com/jobs/&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
===Cyber security incident analyst in SOC/CSIRT/CERT===&lt;br /&gt;
This article delves into the job title of Cyber Security Incident&lt;br /&gt;
Analyst and provides an overview of the acronyms SOC/CSIRT/CERT. A brief&lt;br /&gt;
history of the job is discussed here, as well as a possible career path,&lt;br /&gt;
education, experience, and other characteristics required for work in&lt;br /&gt;
computer security-related organizations. The article also provides a&lt;br /&gt;
brief history of SOC/CSIRT/CERT, as well as a comparison of their&lt;br /&gt;
differences and similarities.&lt;br /&gt;
===Cyber Security Incident Analyst Skill Set===&lt;br /&gt;
What skill set is expected from the Cyber Security Incident Analyst? Below written lines are taken from the same job advertisement depicted&lt;br /&gt;
on the left side of this article:&lt;br /&gt;
As a Security Incident Analyst your responsibilities will include:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Continuous monitoring of security tooling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Performing regular and ad-hoc vulnerability assessments&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Carrying out ‘spot checks’&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Reporting vulnerabilities to the PVG via the alerts system&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintaining and documenting logging systems&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Developing centralized logging, reporting and intelligence&lt;br /&gt;
platforms&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;‘Light touch’ penetration testing with open source tooling&lt;br /&gt;
(Metasploit)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Knowledge &amp;amp;amp; Experience required:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;SOC, CSIRT or CERT operational environment experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Windows / Linux experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TCP /IP networking protocol knowledge&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience reviewing and analyzing Security Events from various&lt;br /&gt;
monitoring and logging sources&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience in website and web application security assessment or&lt;br /&gt;
penetration testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience of using Metasploit&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Scripting knowledge using BASH, Python, Perl, Ruby&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Skills in Host and Network Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
As one can see the description of the duties is wide and also the&lt;br /&gt;
knowledge and experience that is required is noteworthy. So, where to&lt;br /&gt;
start to find out the way to get this kind of knowledge and&lt;br /&gt;
expertize.&lt;br /&gt;
===Possible career path===&lt;br /&gt;
Next part of the paper is aiming to depict a possible ways, how to&lt;br /&gt;
develop oneself, and move along the career pathway in cybersecurity&lt;br /&gt;
field. Topics of development, education, experience and certification&lt;br /&gt;
are covered.&lt;br /&gt;
[[File:analystimage2.png|1000px|thumb|Career path &amp;lt;ref&amp;gt;&amp;quot;Possible Career Path&amp;quot;. Available at https://www.cyberseek.org/pathway.html&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
===Junior/Senior===&lt;br /&gt;
Start with an entry-level job in IT. Hands-on experience is often the&lt;br /&gt;
most effective way to prepare for certification exams. Start&lt;br /&gt;
accumulating work experience with an entry-level role as a cybersecurity&lt;br /&gt;
analyst. Many cybersecurity professionals start off in more general IT&lt;br /&gt;
roles. The skills, practices, and technologies you’ll use as a&lt;br /&gt;
cybersecurity professional will continue to evolve along with computer&lt;br /&gt;
and network technology. The desire to learn, ability to problem solve,&lt;br /&gt;
and attention to detail will serve you well in this field. Other, more&lt;br /&gt;
technical skills and technologies to learn include:&amp;lt;ref name=&amp;quot;certification&amp;quot;&amp;gt;Popular Cyber Security Certificates [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications  [Accessed 25 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====SIEM tools (security information and event management)====&lt;br /&gt;
Security Information and Event Management (SIEM) is a set of tools&lt;br /&gt;
and services offering a holistic view of an organization’s information&lt;br /&gt;
security. SIEM works by combining two technologies:&lt;br /&gt;
&amp;lt;li&amp;gt;Security information management (SIM), which collects data from log&lt;br /&gt;
files for analysis and reports on security threats and events, and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;security event management (SEM), which conducts real-time system&lt;br /&gt;
monitoring, notifies network admins about important issues and&lt;br /&gt;
establishes correlations between security events. There are a number of&lt;br /&gt;
security information and event management solutions on the market.&lt;br /&gt;
ArcSight ESM, IBM QRadar and Splunk are among the most popular. &amp;lt;ref name=&amp;quot;SIEM&amp;quot;&amp;gt;Application security, SIEM [Online]. Available: https://www.imperva.com/learn/application-security/siem/. [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Firewalls, Intrusion Detection Systems (IDS), and Intrusion Prevention Systems(IPS)====&lt;br /&gt;
Firewalls can be two types, hardware and software firewalls. Software&lt;br /&gt;
firewall is a firewall that is installed on a computer or server, and&lt;br /&gt;
tasked with network security. It works with a wide variety of other&lt;br /&gt;
technology security solutions to provide more robust and cohesive&lt;br /&gt;
security for enterprises of all sizes. When a software firewall is&lt;br /&gt;
installed on a server, it opens up like an umbrella of protection over&lt;br /&gt;
all other computers connected to the network. It is able to monitor both&lt;br /&gt;
incoming and outgoing traffic for potential risk or suspicious user&lt;br /&gt;
behavior, and also makes setting security policies much easier, faster&lt;br /&gt;
and more flexible. Hardware firewall is positioned between the network&lt;br /&gt;
and devices, allowing traffic to funnel through the firewall for a close&lt;br /&gt;
inspection and analysis. A hardware firewall, a term often&lt;br /&gt;
interchangeable with network or next-generation firewall, protects the&lt;br /&gt;
network gateways for an enterprise. Hardware firewall is physical&lt;br /&gt;
hardware, installed between network elements and connected devices, and&lt;br /&gt;
is tasked with filtering traffic for cyber threat to the network or&lt;br /&gt;
devices. Filtering out unauthorized or suspicious users based on traffic&lt;br /&gt;
analysis is one of the biggest benefits of hardware firewall. &amp;lt;ref name=&amp;quot;sangfor&amp;quot;&amp;gt;Sangfor, &amp;quot;What is Software Firewall? Difference between Hardware Firewall and Software Firewall, [Online]. Available: https://www.sangfor.com/blog/cybersecurity/what-is-software-firewall-difference-between-hardware-firewall-and-software-firewall [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems&lt;br /&gt;
(IPS) are both parts of the network infrastructure. IDS/IPS compare&lt;br /&gt;
network packets to a cyberthreat database containing known signatures of&lt;br /&gt;
cyberattacks — and flag any matching packets. IDS doesn’t alter the&lt;br /&gt;
network packets in any way, whereas IPS prevents the packet from&lt;br /&gt;
delivery based on the contents of the packet, much like how a firewall&lt;br /&gt;
prevents traffic by IP address. &amp;lt;ref name=&amp;quot;Varonis&amp;quot;&amp;gt;Varonis, &amp;quot;What is Software Firewall? IDS vs. IPS: What is the Difference?, [Online]. Available: https://www.varonis.com/blog/ids-vs-ips [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Digital forensics====&lt;br /&gt;
Digital forensics is a branch of forensic science that focuses on&lt;br /&gt;
identifying, acquiring, processing, analyzing, and reporting on data&lt;br /&gt;
stored electronically. Electronic evidence is a component of almost all&lt;br /&gt;
criminal activities and digital forensics support is crucial for law&lt;br /&gt;
enforcement investigations. Electronic evidence can be collected from a&lt;br /&gt;
wide array of sources, such as computers, smartphones, remote storage,&lt;br /&gt;
unmanned aerial systems, shipborne equipment, and more.&amp;lt;ref name=&amp;quot;interpol&amp;quot;&amp;gt;Interpol, &amp;quot;Digital forensics&amp;quot;. Available: https://www.interpol.int/How-we-work/Innovation/Digital-forensics. [Accessed 28 4 2022].&amp;lt;/ref&amp;gt; &lt;br /&gt;
Investigative process of digital forensics can be divided into several stages. There are four major stages: preservation, collection,&lt;br /&gt;
examination, and analysis. All these four stages need a deep understanding of computers, technology across a broad spectrum, and cybersecurity principles and&lt;br /&gt;
practices, a working knowledge of computers, networks, and coding, in-depth investigative abilities, critical-thinking skills and analytical talent the ability to effectively communicate and work with a&lt;br /&gt;
wide range of people. &amp;lt;ref name=&amp;quot;ecpi&amp;quot;&amp;gt;&amp;quot;Digital forensics&amp;quot;. Available: https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me. [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Mobile device management====&lt;br /&gt;
Mobile device management (MDM) is software that allows IT&lt;br /&gt;
administrators to control, secure and enforce policies on smartphones,&lt;br /&gt;
tablets and other endpoints. Mobile device management software emerged&lt;br /&gt;
in the early 2000s as a way to control and secure the personal digital&lt;br /&gt;
assistants and smartphones that business workers began to use. The&lt;br /&gt;
consumer smartphone boom that started with the launch of the Apple&lt;br /&gt;
iPhone in 2007 led to the bring your own device (BYOD) trend, which&lt;br /&gt;
fueled further interest in MDM.&amp;lt;ref name=&amp;quot;techtarget&amp;quot;&amp;gt;Techtarget, &amp;quot;Mobile Device Management&amp;quot;. Available: https://www.techtarget.com/searchmobilecomputing/definition/mobile-device-management [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Data management====&lt;br /&gt;
Sometimes the data management is neglected, but this part has a&lt;br /&gt;
crucial role when learning for good cyber security practices. Majority&lt;br /&gt;
of cyber security programs include a special courses on data management.&lt;br /&gt;
Data management is a method of organizing and maintaining data processes&lt;br /&gt;
that are required in almost every business operations. The benefits of&lt;br /&gt;
data management can be found accounting, statistics, logistics planning&lt;br /&gt;
and other disciplines including corporate computing.&amp;lt;ref name=&amp;quot;GlobalUni&amp;quot;&amp;gt;Global Universities, &amp;quot;MSc Data Management and Cyber Security&amp;quot;. Available: https://globaluniversities.in/msc-data-management-cyber-security. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Data governance (and management) play a fundamental role in&lt;br /&gt;
protecting an organization’s data. Ensuring that the right people have&lt;br /&gt;
the right access and that appropriate security controls are in place to&lt;br /&gt;
protect each system or service, based on the criticality or sensitivity&lt;br /&gt;
of the data sets these contain. &amp;lt;ref name=&amp;quot;CyberMagazine&amp;quot;&amp;gt;Cyber Security Magazine, &amp;quot;The Role of Data Governance in Cybersecurity&amp;quot;. Available: https://cybersecurity-magazine.com/the-role-of-data-governance-in-cybersecurity/?utm_source=rss&amp;amp;amp;utm_medium=rss&amp;amp;amp;utm_campaign=the-role-of-data-governance-in-cybersecurity. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Application security development====&lt;br /&gt;
Application security describes security measures at the application&lt;br /&gt;
level that aim to prevent data or code within the app from being stolen&lt;br /&gt;
or hijacked. It encompasses the security considerations that happen&lt;br /&gt;
during application development and design, but it also involves systems&lt;br /&gt;
and approaches to protect apps after they get deployed. Application&lt;br /&gt;
security may include hardware, software, and procedures that identify or&lt;br /&gt;
minimize security vulnerabilities.&amp;lt;ref name=&amp;quot;vmware&amp;quot;&amp;gt;VmWare, &amp;quot;What is application security?&amp;quot;. Available: https://www.vmware.com/topics/glossary/content/application-security.html [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Application security development is important to ensure that your&lt;br /&gt;
application is free from coding errors and bugs. And controls the risk&lt;br /&gt;
and helps safeguard against security vulnerabilities. Application&lt;br /&gt;
security development is the process of making applications more secure&lt;br /&gt;
by finding and fixing security vulnerabilities. This is often done by&lt;br /&gt;
enforcing software security best practices and using application&lt;br /&gt;
security testing tools. &lt;br /&gt;
&amp;lt;ref name=&amp;quot;perforce&amp;quot;&amp;gt;Perforce, &amp;quot;Application Security Development Best Practices&amp;quot;. Available: https://www.perforce.com/blog/kw/application-security-development-best-practices. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Audit and compliance knowledge====&lt;br /&gt;
A cyber security audit is designed to be a comprehensive review and&lt;br /&gt;
analysis of your business’s IT infrastructure. It identifies threats and&lt;br /&gt;
vulnerabilities, exposing weaknesses and high-risk practices.&lt;br /&gt;
Regulations such as the EU GDPR (General Data Protection Regulation) can&lt;br /&gt;
impose hefty penalties in the event of a breach that results in&lt;br /&gt;
exploited data. A cyber security audit will help mitigate the&lt;br /&gt;
consequences of a breach and demonstrate that your organization has&lt;br /&gt;
taken the necessary steps to protect client and company data. &amp;lt;ref name=&amp;quot;cyforsecure&amp;quot;&amp;gt;Cyfor Secure, &amp;quot;What is a Cyber Security Audit and how can it help your organisation?&amp;quot;. Available: https://cyforsecure.co.uk/services/cyber-assessment/cyber-security-audit/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cybersecurity compliance is the organizational risk management method&lt;br /&gt;
aligned with pre-defined security measures &amp;amp;amp; controls on how data&lt;br /&gt;
confidentiality is ensured by its administrative procedures.&amp;lt;ref name=&amp;quot;nordlayer&amp;quot;&amp;gt;NordLayer, &amp;quot;Cybersecurity compliance: Everything you need to know&amp;quot;. Available: https://nordlayer.com/blog/cybersecurity-compliance-everything-you-need-to-know/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
All needed skills are developed through courses and certification.&lt;br /&gt;
&lt;br /&gt;
===Entry-Level Incident Response Positions===&lt;br /&gt;
It is not always possible to advance to the position of incident&lt;br /&gt;
responder in a straight line. Many professionals advance from entry- to&lt;br /&gt;
mid-level positions before becoming a real incident responder or a&lt;br /&gt;
member of a computer emergency response team (CERT).&amp;lt;br /&amp;gt;&lt;br /&gt;
These are some examples: &amp;lt;ref name=&amp;quot;Infosec&amp;quot;&amp;gt;Infosec, &amp;quot;Incident Responder Career Roadmap: From Entry Level to Executive&amp;quot;. Available: https://resources.infosecinstitute.com/topic/incident-responder-career-roadmap-entry-level-executive/ [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;network-administrator&amp;quot;&amp;gt;Network administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;This position’s experience will help potential incident responders&lt;br /&gt;
develop networking skills. Attention to detail, as well as the ability&lt;br /&gt;
to sift through system configurations, site layouts, and general network&lt;br /&gt;
and communication setups, are essential in this field.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;system-administrator&amp;quot;&amp;gt;System administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Another crucial beginning point for an incident responder is to learn&lt;br /&gt;
how to manage resources inside your organization as well as user&lt;br /&gt;
behavior. Understanding the potential damage that users, inadequate&lt;br /&gt;
security setups, and ineffective IT policies and procedures can cause on&lt;br /&gt;
your network can provide prospective candidates with insight into the&lt;br /&gt;
human component of an incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;security-administrator&amp;quot;&amp;gt;Security administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In such a position, basic hacking skills, penetration testing, and&lt;br /&gt;
intrusion detection are all learned, which are crucial incident&lt;br /&gt;
responder skills when trying to replicate a breach or attack.&lt;br /&gt;
Understanding the paths a cybercriminal will take when attempting to&lt;br /&gt;
damage or obtain access to a system can greatly simplify the work of&lt;br /&gt;
reverse engineering the incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Mid-Level Incident Response Positions ===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5&lt;br /&gt;
id=&amp;quot;computer-security-incident-response-team-csirt-engineer&amp;quot;&amp;gt;Computer&lt;br /&gt;
security incident response team (CSIRT) engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;cyber-incident-responder&amp;quot;&amp;gt;Cyber incident responder&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-response-engineer&amp;quot;&amp;gt;Incident response&lt;br /&gt;
engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;While each of these positions is different, they generally require&lt;br /&gt;
very similar skills and characteristics in a candidate. At this level,&lt;br /&gt;
personal characteristics such as problem solving, time management, and&lt;br /&gt;
even presentation skills become more crucial as one’s career evolves&lt;br /&gt;
into a management-facing role.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Technical skills include the ability to identify and minimize threats&lt;br /&gt;
while maintaining communication with management and the rest of your&lt;br /&gt;
team. Data analysis and evidence gathering become increasingly crucial,&lt;br /&gt;
and the circumstances in which your services are deployed get more&lt;br /&gt;
serious.&amp;lt;/p&amp;gt;&lt;br /&gt;
Problem-solving skills are crucial at this level of incident&lt;br /&gt;
response, and as the stakes rise, so does the pressure in each&lt;br /&gt;
situation. At this level, programming abilities are essential since&lt;br /&gt;
incident responders may be needed to reverse engineer malicious code or&lt;br /&gt;
even create patches for vulnerable network applications or services. &amp;lt;ref name=&amp;quot;coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated]&amp;quot;. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Senior-Level Incident Response Positions===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;intrusion-detection-specialist&amp;quot;&amp;gt;Intrusion detection&lt;br /&gt;
specialist:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;A CISSP certification might help a potential candidate in preparing&lt;br /&gt;
for the profession. The role of an intrusion detection specialist is to&lt;br /&gt;
find and stop any unwanted communications.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-manager&amp;quot;&amp;gt;Incident manager:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Expected to plan, oversee, manage, and supervise all incident&lt;br /&gt;
response team actions. Is in charge of reporting all current events to&lt;br /&gt;
senior management and stakeholders, as well as acting as the technical&lt;br /&gt;
lead on active incidents for incident responders. Prepares threat and&lt;br /&gt;
impact assessments and reports them known to management.&amp;lt;ref name=&amp;quot;coursera&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Certificates== &lt;br /&gt;
There is a vast number of different certificates and the road map to&lt;br /&gt;
being a certified professional could be very different&amp;lt;ref name=&amp;quot;Coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated],&amp;quot; [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;NICCS&amp;quot;&amp;gt;NICCS, &amp;quot;Cybersecurity Certifications,&amp;quot; [Online]. Available: hhttps://niccs.cisa.gov/about-niccs/cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt; . One possible&lt;br /&gt;
approach is to start with basic certificates from the different branches&lt;br /&gt;
of service and move to more specific and demanding focused&lt;br /&gt;
certification. Also, some jobs require certain clearances, either from&lt;br /&gt;
industry, or from the government. One small selection of different&lt;br /&gt;
possible certificates is brought out in following paragraphs.&lt;br /&gt;
&lt;br /&gt;
Security+ is a CompTIA certification that is considered a basic cert&lt;br /&gt;
among cybersecurity professionals. It covers the topics of risk&lt;br /&gt;
management and threat assessment.&lt;br /&gt;
Network+ is also offered by CompTIA this certification (like the name&lt;br /&gt;
implies) focuses on networking infrastructure and operations. It is&lt;br /&gt;
considered a foundational certification.&lt;br /&gt;
The Certified Information Systems Security Professional (CISSP) is a&lt;br /&gt;
more advanced certification designed for cybersecurity professionals&lt;br /&gt;
with at least five years of work experience. The certification covers&lt;br /&gt;
topics such as architecture, engineering, and management.&amp;lt;/p&amp;gt;&lt;br /&gt;
The Certified Ethical Hacker (CEH) certification is also considered a&lt;br /&gt;
more advanced cert because it generally requires that applicants have&lt;br /&gt;
multiple years of work experience. The goal of an ethical hacker&lt;br /&gt;
certification is to be able to understand how cyber attacks unfold in&lt;br /&gt;
order to improve threat assessment and mitigation skills.&amp;lt;ref name=&amp;quot;cyberguide&amp;quot;&amp;gt;Cybersecurity Guide, &amp;quot;How to become a cybersecurity specialist&amp;quot;, [Online]. Available: https://cybersecurityguide.org/careers/security-specialist/. [Accessed 27 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
This is definitely not all, when one looks for more information, following link could be searched, to get more in depth knowledge about&lt;br /&gt;
different possibilities. Hereby, with the help of this matrix a possible taxonomy of different 436 listed certificates in branches are&lt;br /&gt;
presented.&amp;lt;ref name=&amp;quot;Pauljeremy&amp;quot;&amp;gt;&amp;quot;Cybersecurity Roadmap,&amp;quot; [Online]. Available: https://pauljerimy.com/2020/10/12/scr-oct-2020-update/. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:analystimage5.png|1000px|thumb|Certificate matrix &amp;lt;ref&amp;gt;&amp;quot;Certification roadmap&amp;quot;. Available at https://pauljerimy.com/security-certification-roadmap&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
=== Communication and Network Security===&lt;br /&gt;
Communication and network security covers the ability to secure&lt;br /&gt;
communication channels and networks. Topics include secure and converges&lt;br /&gt;
protocols, wireless networks, cellular networks, hardware operations&lt;br /&gt;
(warranty and redundant power), and third-party connectivity. IP&lt;br /&gt;
networking are also included in this domain.&lt;br /&gt;
===Identity and Access Management===&lt;br /&gt;
The identity and access management domain covers the attacks that&lt;br /&gt;
target the human gateway to gain access to data. Other topics include&lt;br /&gt;
ways to identify users with rights to access the information and&lt;br /&gt;
servers. Identity and access management covers the topics of&lt;br /&gt;
applications, Single sign-on authentication, privilege escalation,&lt;br /&gt;
Kerberos, rule-based or risk-based access control, proofing and&lt;br /&gt;
establishment of identity.&lt;br /&gt;
===Security Architecture and Engineering===&lt;br /&gt;
The security architecture and engineering domain covers important&lt;br /&gt;
topics concerning security engineering plans, designs and principles,&lt;br /&gt;
Topics include assessing and mitigating information system&lt;br /&gt;
vulnerabilities, fundamental concepts of security models and security&lt;br /&gt;
architectures in critical areas like access control. Cloud systems,&lt;br /&gt;
cryptography, system infiltrations (ransomware, fault-injection and&lt;br /&gt;
more) and virtualized systems are also covered in this domain.&lt;br /&gt;
===Asset Security===&lt;br /&gt;
The Asset Security domain deals with the issues related to the&lt;br /&gt;
collection, storage, maintenance, retention and destruction of data. It&lt;br /&gt;
also covers knowledge of different roles regarding data handling (owner,&lt;br /&gt;
controller and custodian) as well as data protection methods and data&lt;br /&gt;
states. Other topics include resource provision, asset classification&lt;br /&gt;
and data lifecycle management.&lt;br /&gt;
===Security and Risk Management===&lt;br /&gt;
The security and risk management domain covers general on skills&lt;br /&gt;
related to the implementation of user awareness programs as well as&lt;br /&gt;
security procedures. Emphasis is also placed on risk management&lt;br /&gt;
concerning the acquisition of new services, hardware and software&lt;br /&gt;
(supply chain). Other skills include social engineering defense&lt;br /&gt;
mechanisms.&lt;br /&gt;
===Security Assessment and Testing===&lt;br /&gt;
The security assessment and testing domain deals with all the&lt;br /&gt;
techniques and tools used to find system vulnerabilities, weaknesses and&lt;br /&gt;
potential areas of concern not addressed by security procedures and&lt;br /&gt;
policies. Attack simulations, vulnerability assessment, compliance&lt;br /&gt;
checks, and ethical disclosure also fall under this domain.&lt;br /&gt;
===Software Security===&lt;br /&gt;
The software development security domain deals with implementing&lt;br /&gt;
software-based security protocols within environment for which the IT&lt;br /&gt;
professional is responsible. Risk analysis, vulnerability identification&lt;br /&gt;
and auditing of source codes are all covered in this subset. Additional&lt;br /&gt;
topics include software-designed security, maturity models, development&lt;br /&gt;
methodologies, open-source and third-party development security.&lt;br /&gt;
===Security operations===&lt;br /&gt;
The security operations domain covers topics ranging from&lt;br /&gt;
investigations and digital forensic to detection and intrusion&lt;br /&gt;
prevention tools, sandboxing and firewalls. Topics include user and&lt;br /&gt;
entity behavior analytics, threat intelligence (threat hunting and&lt;br /&gt;
threat feeds) log management, artifacts (mobile, computer and network),&lt;br /&gt;
machine learning and AI-based tools, penetration testing, and&lt;br /&gt;
exploitation development. These for sub-domains are lister here.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Incident Handling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Penetration Testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Exploitation&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Education==&lt;br /&gt;
The entry level monitoring specialist is hired by Estonian&lt;br /&gt;
Information System Authority even if there is no formal IT education,&lt;br /&gt;
but readiness to learn and moderate knowledge of different operation&lt;br /&gt;
systems is enough to start the career. &amp;lt;ref name=&amp;quot;cv&amp;quot;&amp;gt;cv.ee, &amp;quot;SEIRESPETSIALIST - tule Eesti küberruumi valvuriks!&amp;quot;. Available: https://www.cv.ee/en/vacancy/792782/riigi-infosusteemi-amet/seirespetsialist-tule-eesti-kuberruumi-valvuriks [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Nevertheless, like most other high qualification careers jobs falling&lt;br /&gt;
under the cybersecurity specialist category require some form of formal&lt;br /&gt;
education. However, since cybersecurity specialist jobs can fall across&lt;br /&gt;
a wide spectrum of job descriptions and responsibilities, it is possible&lt;br /&gt;
to obtain a specialist job after completing many levels of different&lt;br /&gt;
computer related education.&lt;br /&gt;
If one is looking for a cybersecurity related education, for example&lt;br /&gt;
in EU, 137 courses/programs could be found that relate to keyword IT or&lt;br /&gt;
cybersecurity. &amp;lt;ref name=&amp;quot;enisa&amp;quot;&amp;gt;ENISA (European Union Agency for Cybersecurity), &amp;quot;Cybersecurity Education-Cybersecurity Higher Education Database&amp;quot;. Available: https://www.enisa.europa.eu/topics/cybersecurity-education/education-map/education-courses [Accessed 26 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Also, there is a great amount of discussion, if cyber security&lt;br /&gt;
professional should have a degree or would be certification just enough.&lt;br /&gt;
One interesting table is produces by Franklin University that compares&lt;br /&gt;
benefits and/or drawbacks of each type of credential.&lt;br /&gt;
&amp;lt;ref name=&amp;quot;franklin&amp;quot;&amp;gt;Franklin University, &amp;quot;Is Getting a Master&#039;s Degree in Cyber Security Worth It?&amp;quot;. Available: https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
[[File:Analystimage7.png|700px|thumb|Comparison degree vs Certificate &amp;lt;ref&amp;gt;&amp;quot;Comparison Table&amp;quot;. Available at https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
Certifications are generally good for people with little practical&lt;br /&gt;
experience because they are known quantities in the industry and can&lt;br /&gt;
help you get your foot in the door. They set a minimum knowledge bar.&lt;br /&gt;
But some certifications are viewed more favorably than others.&lt;br /&gt;
Certifications with renewal requirements are viewed better by hiring&lt;br /&gt;
managers, but they also more costly in the long run because of the need&lt;br /&gt;
for continuing education. Certifications are also good for showing&lt;br /&gt;
in-depth expertise in a specialization within cybersecurity. Depending&lt;br /&gt;
on your career goals, it may be advantageous to have a master’s&lt;br /&gt;
degree—which shows your breadth of knowledge, critical thinking and&lt;br /&gt;
leadership skills—and a certificate—which shows specific skill&lt;br /&gt;
competency.&amp;lt;ref name=&amp;quot;franklin&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
As IT (Cyber) Security is still a relatively young discipline,&lt;br /&gt;
universities and colleges are still figuring out which is the best&lt;br /&gt;
approach for their degrees. Study programmes and curricula in Cyber&lt;br /&gt;
Security are different. In general, here are the duration of Cyber&lt;br /&gt;
Security degrees:&lt;br /&gt;
&amp;lt;ref name=&amp;quot;studyportal&amp;quot;&amp;gt;Studyportals, &amp;quot;Why You Should Study a Cyber Security Degree in 2022&amp;quot;. Available: https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Bachelor’s degrees in Cyber Security take 3 or 4 years in most&lt;br /&gt;
countries.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Master’s courses in Cyber Security take between 1-2 years to&lt;br /&gt;
complete.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;PhD programmes in Cyber Security last 3-5 years. Some only take 1&lt;br /&gt;
or 2 years, but they are less common.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Generalization could me made that on bachelor level the general&lt;br /&gt;
knowledge about the cyber issues are obtained. On master level the&lt;br /&gt;
specialization courses are taken and the person can choose more specific&lt;br /&gt;
topics to study. It is on master level where strengths of the cyber&lt;br /&gt;
specialist can be developed further and up-do date knowledge obtained in&lt;br /&gt;
specifics. PhD is serious science and involves teaching, lot of&lt;br /&gt;
scientific work and writing for publications.&lt;br /&gt;
&lt;br /&gt;
==Salary==&lt;br /&gt;
&amp;lt;p&amp;gt;Even if the salary can be very different, compared to the skills and&lt;br /&gt;
experience, an generalization can be made. Cyber Security professionals&lt;br /&gt;
in CSIRT, and in other entities earn quite well, from the start. First,&lt;br /&gt;
some comparison from the United States. The average CSIRT analyst salary&lt;br /&gt;
in the USA is $97,500 per year or $50 per hour. Entry level positions&lt;br /&gt;
start at $48,875 per year while most experienced workers make up to&lt;br /&gt;
$135,373 per year.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.talent.com/salary?job=csirt+analyst&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;There are multiple positions you can occupy in this field. They have&lt;br /&gt;
in common great salaries and high demand for technical skills, attention&lt;br /&gt;
to details, problem-solving mentality, and the ability to analyze risks.&lt;br /&gt;
Here are the average annual salaries in the United States, according to&lt;br /&gt;
Payscale:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.payscale.com/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Cryptographer – 100,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Information Security Officer – 91,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Assessor – 90,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Engineer – 88,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Penetration Tester – 81,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Forensics Expert – 71,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Administrator – 65,000 USD&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When looking into salaries in Estonia, one can find that there is a&lt;br /&gt;
discussion that private sector is taking a toll from the public sector,&lt;br /&gt;
and that the salaries in important agencies, as Information System&lt;br /&gt;
Authority loose their employees to the better paid positions in private&lt;br /&gt;
sector.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://digi.geenius.ee/rubriik/uudis/kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad/&lt;br /&gt;
https://tehnika.postimees.ee/6887428/riigi-it-tootajate-palgamaarad-kasvasid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;But there is also a different view that average private sector worker&lt;br /&gt;
could be hired as a top specialist in public sector and then the payment&lt;br /&gt;
is higher. Nevertheless, it seems that the average payment in cyber&lt;br /&gt;
security sector is any way higher that in other parts of the&lt;br /&gt;
e-services.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://digi.geenius.ee/rubriik/uudis/5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka/&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
==SOC==&lt;br /&gt;
&amp;lt;p&amp;gt;A SOC is a facility where an organization’s network, applications,&lt;br /&gt;
and endpoints are monitored and defended. The term was adapted from&lt;br /&gt;
network operations centers (NOCs), where large telecommunication or&lt;br /&gt;
corporate networks are monitored. When network security became more of a&lt;br /&gt;
concern, security teams were formed within the NOCs, and eventually spun&lt;br /&gt;
off into larger organizations of their own as the responsibilities of&lt;br /&gt;
security teams grew increasingly complex and specialized. The security&lt;br /&gt;
staff working in a security operations center are often called the SOC&lt;br /&gt;
team.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Functions of the SOC team include, but are not limited to:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ol type=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Taking inventory of resources, to get a better understanding of the&lt;br /&gt;
structure they are protecting.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintanence of the system, by constantly making updates and adding&lt;br /&gt;
safeguards.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Monitoring the network for abnormalities with special tools.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Threat analysis of new attacks and vulnerabilities.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Responding to attacks, by acting as “first responders”. The SOC team&lt;br /&gt;
will shut down and/or isolate endpoints, deleting files and lowering the&lt;br /&gt;
impact as fast as possible.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Recovery of system stability and lost data. This may be done using&lt;br /&gt;
backups, restarting endpoints or reconfiguring systems.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Logging all actions on the system, to be later used for analysis or&lt;br /&gt;
forensics after an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigating the root cause of an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Auditing their own actions, to be in line with regulations of the&lt;br /&gt;
organization, industry or governing body.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.trellix.com/en-us/security-awareness/operations/what-is-soc.html&amp;lt;/p&amp;gt;&lt;br /&gt;
==CSIRT==&lt;br /&gt;
&amp;lt;p&amp;gt;A CSIRT is a group that responds to security incidents when they&lt;br /&gt;
occur. Key responsibilities of a CSIRT include: &lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
===Creating and maintaining an incident response plan (IRP)===&lt;br /&gt;
An incident response plan (IRP) is a set of written instructions for&lt;br /&gt;
detecting, responding to and limiting the effects of an information&lt;br /&gt;
security event. Incident response plans provide instructions for&lt;br /&gt;
responding to many potential scenarios, including data breaches, denial&lt;br /&gt;
of service/distributed denial of service attacks, firewall breaches,&lt;br /&gt;
virus or malware outbreaks or insider threats. Without an incident&lt;br /&gt;
response plan in place, organizations may either not detect the attack&lt;br /&gt;
in the first place, or not follow proper protocol to contain the threat&lt;br /&gt;
and recover from it when a breach is detected.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.stratacore.com/incidentresponseplan&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
===Investigating and analyzing incidents===&lt;br /&gt;
CSIRTs are also involved in improvement activities. After major&lt;br /&gt;
computer security incidents occur, or when incidents are not handled in&lt;br /&gt;
a timely or effective manner, a CSIRT will generally perform a&lt;br /&gt;
postmortem of the incident and its response. This postmortem will&lt;br /&gt;
identify the strengths and weakness of the response effort. Such reviews&lt;br /&gt;
can identify weaknesses and holes in systems, infrastructure defenses,&lt;br /&gt;
or policies that allowed the incident to take place. It can also&lt;br /&gt;
identify problems with communication channels, interfaces, and&lt;br /&gt;
procedures that inhibited the efficient resolution of the reported&lt;br /&gt;
problem.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.cisa.gov/uscert/bsi/articles/best-practices/incident-management/defining-computer-security-incident-response-teams&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Managing internal communications and updates during or immediately after incidents occur===&lt;br /&gt;
===Communicating with employees, shareholders, customers, and the press about incidents as needed===&lt;br /&gt;
&amp;lt;p&amp;gt;There are various services within the CSIRT Services Framework that&lt;br /&gt;
address communications, as they relate to security operations and&lt;br /&gt;
incident response services. Some of these include Information Security&lt;br /&gt;
Incident Coordination, Crisis Management Support, Vulnerability&lt;br /&gt;
Disclosure, Situational Awareness Communication, and Awareness Building,&lt;br /&gt;
to name a few. Sharing information and communicating with the general&lt;br /&gt;
public and/or your constituency is appropriate in many different&lt;br /&gt;
scenarios. These can range from proactive communications to reactive&lt;br /&gt;
communications. Each scenario may be unique, and careful consideration&lt;br /&gt;
should be given to when to release information to the public and what&lt;br /&gt;
information should be released.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;https://resources.sei.cmu.edu/asset_files/Handbook/2021_002_001_651819.pdf&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Remediating incidents===&lt;br /&gt;
Threat remediation is a strong and capable tool for fighting the&lt;br /&gt;
cyber security compromises. As the word ‘remedy’ suggests, remediation&lt;br /&gt;
process involves the treatment of a security breach. With the&lt;br /&gt;
remediation practices, your cyber security team is able to eliminate&lt;br /&gt;
suspicious activities and malicious attacks in the form of malware,&lt;br /&gt;
ransomware, phishing and such. Even if you ‘kill’ the suspicious&lt;br /&gt;
activity, the attackers can remain in your systems. If you want to&lt;br /&gt;
contaminate and end the problem for good, your remediation processes&lt;br /&gt;
must involve the detection of the cause. &amp;lt;ref name=&amp;quot;logsign&amp;quot;&amp;gt;Logsign, &amp;quot;What-is-remediation-in-cyber-security&amp;quot;. Available: https://www.logsign.com/blog/what-is-remediation-in-cyber-security/. [Accessed 28 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Recommending technology, policy, governance, and training changes after security incidents===&lt;br /&gt;
After all these actions, the SCIRT must contribute to the development&lt;br /&gt;
of better policies, practices and has to recommend improvements. They&lt;br /&gt;
are not working in the vacuum and their work has to create new and&lt;br /&gt;
better standards for cyber security. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;Exabeam, &amp;quot;CSIRT&amp;quot;. Available: https://www.exabeam.com/incident-response/csirt/ [Accessed 28 APr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==CERT==&lt;br /&gt;
&amp;lt;p&amp;gt;The term “computer emergency response team” was coined in 1988. In&lt;br /&gt;
response to the Morris worm attack that impacted thousands of servers on&lt;br /&gt;
the Internet, DARPA funded the formation of the Computer Emergency&lt;br /&gt;
Response Team Coordination Center (CERT-CC) at Carnegie Mellon&lt;br /&gt;
University. The goal of CERT-CC was to help protect the internet by&lt;br /&gt;
collecting and disseminating information on critical security&lt;br /&gt;
vulnerabilities. Several other countries formed similar centers using&lt;br /&gt;
the same acronym (despite threats of legal action by Carnegie Mellon for&lt;br /&gt;
trademark infringement). Now the term CERT refers to any emergency&lt;br /&gt;
response team that deals with cyber threats. Many people use CERT-CC&lt;br /&gt;
interchangeably with CSIRT, though the charter of a CERT is information&lt;br /&gt;
sharing in order to help other response teams respond to threats against&lt;br /&gt;
their own infrastructure.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In general, the designation of CERT is helpful in applying real-world&lt;br /&gt;
solutions to various cybersecurity problems. They may be government&lt;br /&gt;
contractors or employees of a major corporation. For example, the U.S.&lt;br /&gt;
Computer Emergency Readiness Team (US-CERT) operates under the U.S.&lt;br /&gt;
Department of Homeland Security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.techopedia.com/definition/31003/computer-emergency-response-team-cert&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In Estonia CERT is designated as CERT-EE. It was established in 2006,&lt;br /&gt;
as an organization responsible for the management of security incidents&lt;br /&gt;
in .ee computer networks. It is also a national contact point for&lt;br /&gt;
international co-operation in the field of IT security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ria.ee/en/cyber-security/cert-ee.html&amp;lt;/p&amp;gt;&lt;br /&gt;
===Difference between SOC/CSIRT/CERT===&lt;br /&gt;
&amp;lt;p&amp;gt;How CSIRTs differ from CERTs and SOCs There are overlapping&lt;br /&gt;
responsibilities between a community emergency response team (CERT),&lt;br /&gt;
computer security incident response team (CSIRT), and security&lt;br /&gt;
operations center (SOC). To add to this confusion, frequently, the terms&lt;br /&gt;
CERT and CSIRT are used interchangeably, despite the important&lt;br /&gt;
differences.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image3.png&amp;quot; alt=&amp;quot;Overlapping in images/image3.png&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;Overlapping in&lt;br /&gt;
images/image3.png&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
==Understand the primary roles and characteristics of a CERT, CSIRT, and SOC.==&lt;br /&gt;
&amp;lt;p&amp;gt;So, using strict definitions, a CERT collects and disseminates&lt;br /&gt;
security information, typically for the benefit of a country or an&lt;br /&gt;
industry. A CSIRT is a cross-functional team that responds to incidents&lt;br /&gt;
on behalf of a country or an organization. A SOC is where a country or&lt;br /&gt;
organization monitors and defends its network, servers, applications,&lt;br /&gt;
and endpoints.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image4.png&amp;quot; alt=&amp;quot;table of explanation images/image4&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;table of explanation&lt;br /&gt;
images/image4&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
==Future==&lt;br /&gt;
&amp;lt;p&amp;gt;And the Cyber security problem is only getting bigger. According to a&lt;br /&gt;
report published by Accenture, the number of cyber security breaches&lt;br /&gt;
increased by 11 percent from 2017 to 2018. The cost of such breaches is&lt;br /&gt;
astronomical–about $600 billion worldwide, according to the Economic&lt;br /&gt;
Impact of Cybercrime report.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Job projections for cybersecurity are staggering. The Bureau of Labor&lt;br /&gt;
Statistics in US predicts that careers in the cybersecurity field will&lt;br /&gt;
grow by 32% by 2028. That makes cybersecurity one of the top 10&lt;br /&gt;
fastest-growing jobs in the country. In the United States alone, jobs&lt;br /&gt;
for Information Security Analysts are expected to grow by 15% by&lt;br /&gt;
2024.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Most likely this trend is also similar in other countries.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When checking Estonian job portals, there is a constant need for&lt;br /&gt;
people for cyber security related positions. Also, linkedin search gives&lt;br /&gt;
approximately 30 vacancies immediately. There are banks, logistics&lt;br /&gt;
companies, e-shops, and software producers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://ee.linkedin.com/jobs/cyber-security-jobs?countryRedirected=1&amp;amp;amp;position=1&amp;amp;amp;pageNum=0&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Trends that affect companies create need for constant cyber security&lt;br /&gt;
services. Increasing number of home/remote offices require secure&lt;br /&gt;
corporate networks and security of remote devices. One example is from&lt;br /&gt;
this year, when sloppy remote desktop set-up paralyzed systems of 17&lt;br /&gt;
companies.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.aripaev.ee/uudised/2022/04/20/ria-lohakas-kaugtoolaua-seadistus-halvas-martsis-vahemalt-17-juhul-ettevotete-it-susteemid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Also, no service can exists without robust infrastructure - servers,&lt;br /&gt;
databases, applications. As all previously mentioned devices and&lt;br /&gt;
services are at constant scanning and surveillance. So, the breach&lt;br /&gt;
detection and immediate action demands 24/7 services. Even if lot of&lt;br /&gt;
things could be automated, there is a need for human specialists (at&lt;br /&gt;
least, at the moment). Third growing field is also a forensic&lt;br /&gt;
investigation, as every attack must be investigated in order to be ready&lt;br /&gt;
to repel next attacks. So data recovery and evidence collection is&lt;br /&gt;
another important field of work that need skilled and professional&lt;br /&gt;
workers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Even, if the specifics of the entity, be it CSIRT, CERT or SOC, are&lt;br /&gt;
different, the fundamentals of the work are the same. Professional&lt;br /&gt;
knowledge of the networks, operational systems, hardware, scripting, and&lt;br /&gt;
several other wider IT related knowledge is needed. As there is no&lt;br /&gt;
single way to reach to it, every single person can find one’s strongest&lt;br /&gt;
sides and develop them with knowledge of weaker side, in order to know,&lt;br /&gt;
when to as for help.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/body&amp;gt;&lt;br /&gt;
&amp;lt;/html&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mavald</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=File:Analystimage7.png&amp;diff=142209</id>
		<title>File:Analystimage7.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=File:Analystimage7.png&amp;diff=142209"/>
		<updated>2022-05-01T15:33:52Z</updated>

		<summary type="html">&lt;p&gt;Mavald: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Mavald</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142207</id>
		<title>Hiring a Cyber Security Incident Analyst</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142207"/>
		<updated>2022-05-01T15:33:14Z</updated>

		<summary type="html">&lt;p&gt;Mavald: /* Education */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==A Cyber Security Incident Analyst==&lt;br /&gt;
&lt;br /&gt;
[[File:image1.png|600px|thumb|Job advertisement &amp;lt;ref&amp;gt;&amp;quot;Job Advertisement&amp;quot;. Available at https://www.projectpeople.com/jobs/&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
===Cyber security incident analyst in SOC/CSIRT/CERT===&lt;br /&gt;
This article delves into the job title of Cyber Security Incident&lt;br /&gt;
Analyst and provides an overview of the acronyms SOC/CSIRT/CERT. A brief&lt;br /&gt;
history of the job is discussed here, as well as a possible career path,&lt;br /&gt;
education, experience, and other characteristics required for work in&lt;br /&gt;
computer security-related organizations. The article also provides a&lt;br /&gt;
brief history of SOC/CSIRT/CERT, as well as a comparison of their&lt;br /&gt;
differences and similarities.&lt;br /&gt;
===Cyber Security Incident Analyst Skill Set===&lt;br /&gt;
What skill set is expected from the Cyber Security Incident Analyst? Below written lines are taken from the same job advertisement depicted&lt;br /&gt;
on the left side of this article:&lt;br /&gt;
As a Security Incident Analyst your responsibilities will include:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Continuous monitoring of security tooling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Performing regular and ad-hoc vulnerability assessments&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Carrying out ‘spot checks’&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Reporting vulnerabilities to the PVG via the alerts system&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintaining and documenting logging systems&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Developing centralized logging, reporting and intelligence&lt;br /&gt;
platforms&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;‘Light touch’ penetration testing with open source tooling&lt;br /&gt;
(Metasploit)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Knowledge &amp;amp;amp; Experience required:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;SOC, CSIRT or CERT operational environment experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Windows / Linux experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TCP /IP networking protocol knowledge&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience reviewing and analyzing Security Events from various&lt;br /&gt;
monitoring and logging sources&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience in website and web application security assessment or&lt;br /&gt;
penetration testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience of using Metasploit&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Scripting knowledge using BASH, Python, Perl, Ruby&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Skills in Host and Network Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
As one can see the description of the duties is wide and also the&lt;br /&gt;
knowledge and experience that is required is noteworthy. So, where to&lt;br /&gt;
start to find out the way to get this kind of knowledge and&lt;br /&gt;
expertize.&lt;br /&gt;
===Possible career path===&lt;br /&gt;
Next part of the paper is aiming to depict a possible ways, how to&lt;br /&gt;
develop oneself, and move along the career pathway in cybersecurity&lt;br /&gt;
field. Topics of development, education, experience and certification&lt;br /&gt;
are covered.&lt;br /&gt;
[[File:analystimage2.png|1000px|thumb|Career path &amp;lt;ref&amp;gt;&amp;quot;Possible Career Path&amp;quot;. Available at https://www.cyberseek.org/pathway.html&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
===Junior/Senior===&lt;br /&gt;
Start with an entry-level job in IT. Hands-on experience is often the&lt;br /&gt;
most effective way to prepare for certification exams. Start&lt;br /&gt;
accumulating work experience with an entry-level role as a cybersecurity&lt;br /&gt;
analyst. Many cybersecurity professionals start off in more general IT&lt;br /&gt;
roles. The skills, practices, and technologies you’ll use as a&lt;br /&gt;
cybersecurity professional will continue to evolve along with computer&lt;br /&gt;
and network technology. The desire to learn, ability to problem solve,&lt;br /&gt;
and attention to detail will serve you well in this field. Other, more&lt;br /&gt;
technical skills and technologies to learn include:&amp;lt;ref name=&amp;quot;certification&amp;quot;&amp;gt;Popular Cyber Security Certificates [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications  [Accessed 25 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====SIEM tools (security information and event management)====&lt;br /&gt;
Security Information and Event Management (SIEM) is a set of tools&lt;br /&gt;
and services offering a holistic view of an organization’s information&lt;br /&gt;
security. SIEM works by combining two technologies:&lt;br /&gt;
&amp;lt;li&amp;gt;Security information management (SIM), which collects data from log&lt;br /&gt;
files for analysis and reports on security threats and events, and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;security event management (SEM), which conducts real-time system&lt;br /&gt;
monitoring, notifies network admins about important issues and&lt;br /&gt;
establishes correlations between security events. There are a number of&lt;br /&gt;
security information and event management solutions on the market.&lt;br /&gt;
ArcSight ESM, IBM QRadar and Splunk are among the most popular. &amp;lt;ref name=&amp;quot;SIEM&amp;quot;&amp;gt;Application security, SIEM [Online]. Available: https://www.imperva.com/learn/application-security/siem/. [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Firewalls, Intrusion Detection Systems (IDS), and Intrusion Prevention Systems(IPS)====&lt;br /&gt;
Firewalls can be two types, hardware and software firewalls. Software&lt;br /&gt;
firewall is a firewall that is installed on a computer or server, and&lt;br /&gt;
tasked with network security. It works with a wide variety of other&lt;br /&gt;
technology security solutions to provide more robust and cohesive&lt;br /&gt;
security for enterprises of all sizes. When a software firewall is&lt;br /&gt;
installed on a server, it opens up like an umbrella of protection over&lt;br /&gt;
all other computers connected to the network. It is able to monitor both&lt;br /&gt;
incoming and outgoing traffic for potential risk or suspicious user&lt;br /&gt;
behavior, and also makes setting security policies much easier, faster&lt;br /&gt;
and more flexible. Hardware firewall is positioned between the network&lt;br /&gt;
and devices, allowing traffic to funnel through the firewall for a close&lt;br /&gt;
inspection and analysis. A hardware firewall, a term often&lt;br /&gt;
interchangeable with network or next-generation firewall, protects the&lt;br /&gt;
network gateways for an enterprise. Hardware firewall is physical&lt;br /&gt;
hardware, installed between network elements and connected devices, and&lt;br /&gt;
is tasked with filtering traffic for cyber threat to the network or&lt;br /&gt;
devices. Filtering out unauthorized or suspicious users based on traffic&lt;br /&gt;
analysis is one of the biggest benefits of hardware firewall. &amp;lt;ref name=&amp;quot;sangfor&amp;quot;&amp;gt;Sangfor, &amp;quot;What is Software Firewall? Difference between Hardware Firewall and Software Firewall, [Online]. Available: https://www.sangfor.com/blog/cybersecurity/what-is-software-firewall-difference-between-hardware-firewall-and-software-firewall [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems&lt;br /&gt;
(IPS) are both parts of the network infrastructure. IDS/IPS compare&lt;br /&gt;
network packets to a cyberthreat database containing known signatures of&lt;br /&gt;
cyberattacks — and flag any matching packets. IDS doesn’t alter the&lt;br /&gt;
network packets in any way, whereas IPS prevents the packet from&lt;br /&gt;
delivery based on the contents of the packet, much like how a firewall&lt;br /&gt;
prevents traffic by IP address. &amp;lt;ref name=&amp;quot;Varonis&amp;quot;&amp;gt;Varonis, &amp;quot;What is Software Firewall? IDS vs. IPS: What is the Difference?, [Online]. Available: https://www.varonis.com/blog/ids-vs-ips [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Digital forensics====&lt;br /&gt;
Digital forensics is a branch of forensic science that focuses on&lt;br /&gt;
identifying, acquiring, processing, analyzing, and reporting on data&lt;br /&gt;
stored electronically. Electronic evidence is a component of almost all&lt;br /&gt;
criminal activities and digital forensics support is crucial for law&lt;br /&gt;
enforcement investigations. Electronic evidence can be collected from a&lt;br /&gt;
wide array of sources, such as computers, smartphones, remote storage,&lt;br /&gt;
unmanned aerial systems, shipborne equipment, and more.&amp;lt;ref name=&amp;quot;interpol&amp;quot;&amp;gt;Interpol, &amp;quot;Digital forensics&amp;quot;. Available: https://www.interpol.int/How-we-work/Innovation/Digital-forensics. [Accessed 28 4 2022].&amp;lt;/ref&amp;gt; &lt;br /&gt;
Investigative process of digital forensics can be divided into several stages. There are four major stages: preservation, collection,&lt;br /&gt;
examination, and analysis. All these four stages need a deep understanding of computers, technology across a broad spectrum, and cybersecurity principles and&lt;br /&gt;
practices, a working knowledge of computers, networks, and coding, in-depth investigative abilities, critical-thinking skills and analytical talent the ability to effectively communicate and work with a&lt;br /&gt;
wide range of people. &amp;lt;ref name=&amp;quot;ecpi&amp;quot;&amp;gt;&amp;quot;Digital forensics&amp;quot;. Available: https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me. [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Mobile device management====&lt;br /&gt;
Mobile device management (MDM) is software that allows IT&lt;br /&gt;
administrators to control, secure and enforce policies on smartphones,&lt;br /&gt;
tablets and other endpoints. Mobile device management software emerged&lt;br /&gt;
in the early 2000s as a way to control and secure the personal digital&lt;br /&gt;
assistants and smartphones that business workers began to use. The&lt;br /&gt;
consumer smartphone boom that started with the launch of the Apple&lt;br /&gt;
iPhone in 2007 led to the bring your own device (BYOD) trend, which&lt;br /&gt;
fueled further interest in MDM.&amp;lt;ref name=&amp;quot;techtarget&amp;quot;&amp;gt;Techtarget, &amp;quot;Mobile Device Management&amp;quot;. Available: https://www.techtarget.com/searchmobilecomputing/definition/mobile-device-management [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Data management====&lt;br /&gt;
Sometimes the data management is neglected, but this part has a&lt;br /&gt;
crucial role when learning for good cyber security practices. Majority&lt;br /&gt;
of cyber security programs include a special courses on data management.&lt;br /&gt;
Data management is a method of organizing and maintaining data processes&lt;br /&gt;
that are required in almost every business operations. The benefits of&lt;br /&gt;
data management can be found accounting, statistics, logistics planning&lt;br /&gt;
and other disciplines including corporate computing.&amp;lt;ref name=&amp;quot;GlobalUni&amp;quot;&amp;gt;Global Universities, &amp;quot;MSc Data Management and Cyber Security&amp;quot;. Available: https://globaluniversities.in/msc-data-management-cyber-security. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Data governance (and management) play a fundamental role in&lt;br /&gt;
protecting an organization’s data. Ensuring that the right people have&lt;br /&gt;
the right access and that appropriate security controls are in place to&lt;br /&gt;
protect each system or service, based on the criticality or sensitivity&lt;br /&gt;
of the data sets these contain. &amp;lt;ref name=&amp;quot;CyberMagazine&amp;quot;&amp;gt;Cyber Security Magazine, &amp;quot;The Role of Data Governance in Cybersecurity&amp;quot;. Available: https://cybersecurity-magazine.com/the-role-of-data-governance-in-cybersecurity/?utm_source=rss&amp;amp;amp;utm_medium=rss&amp;amp;amp;utm_campaign=the-role-of-data-governance-in-cybersecurity. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Application security development====&lt;br /&gt;
Application security describes security measures at the application&lt;br /&gt;
level that aim to prevent data or code within the app from being stolen&lt;br /&gt;
or hijacked. It encompasses the security considerations that happen&lt;br /&gt;
during application development and design, but it also involves systems&lt;br /&gt;
and approaches to protect apps after they get deployed. Application&lt;br /&gt;
security may include hardware, software, and procedures that identify or&lt;br /&gt;
minimize security vulnerabilities.&amp;lt;ref name=&amp;quot;vmware&amp;quot;&amp;gt;VmWare, &amp;quot;What is application security?&amp;quot;. Available: https://www.vmware.com/topics/glossary/content/application-security.html [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Application security development is important to ensure that your&lt;br /&gt;
application is free from coding errors and bugs. And controls the risk&lt;br /&gt;
and helps safeguard against security vulnerabilities. Application&lt;br /&gt;
security development is the process of making applications more secure&lt;br /&gt;
by finding and fixing security vulnerabilities. This is often done by&lt;br /&gt;
enforcing software security best practices and using application&lt;br /&gt;
security testing tools. &lt;br /&gt;
&amp;lt;ref name=&amp;quot;perforce&amp;quot;&amp;gt;Perforce, &amp;quot;Application Security Development Best Practices&amp;quot;. Available: https://www.perforce.com/blog/kw/application-security-development-best-practices. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Audit and compliance knowledge====&lt;br /&gt;
A cyber security audit is designed to be a comprehensive review and&lt;br /&gt;
analysis of your business’s IT infrastructure. It identifies threats and&lt;br /&gt;
vulnerabilities, exposing weaknesses and high-risk practices.&lt;br /&gt;
Regulations such as the EU GDPR (General Data Protection Regulation) can&lt;br /&gt;
impose hefty penalties in the event of a breach that results in&lt;br /&gt;
exploited data. A cyber security audit will help mitigate the&lt;br /&gt;
consequences of a breach and demonstrate that your organization has&lt;br /&gt;
taken the necessary steps to protect client and company data. &amp;lt;ref name=&amp;quot;cyforsecure&amp;quot;&amp;gt;Cyfor Secure, &amp;quot;What is a Cyber Security Audit and how can it help your organisation?&amp;quot;. Available: https://cyforsecure.co.uk/services/cyber-assessment/cyber-security-audit/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cybersecurity compliance is the organizational risk management method&lt;br /&gt;
aligned with pre-defined security measures &amp;amp;amp; controls on how data&lt;br /&gt;
confidentiality is ensured by its administrative procedures.&amp;lt;ref name=&amp;quot;nordlayer&amp;quot;&amp;gt;NordLayer, &amp;quot;Cybersecurity compliance: Everything you need to know&amp;quot;. Available: https://nordlayer.com/blog/cybersecurity-compliance-everything-you-need-to-know/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
All needed skills are developed through courses and certification.&lt;br /&gt;
&lt;br /&gt;
===Entry-Level Incident Response Positions===&lt;br /&gt;
It is not always possible to advance to the position of incident&lt;br /&gt;
responder in a straight line. Many professionals advance from entry- to&lt;br /&gt;
mid-level positions before becoming a real incident responder or a&lt;br /&gt;
member of a computer emergency response team (CERT).&amp;lt;br /&amp;gt;&lt;br /&gt;
These are some examples: &amp;lt;ref name=&amp;quot;Infosec&amp;quot;&amp;gt;Infosec, &amp;quot;Incident Responder Career Roadmap: From Entry Level to Executive&amp;quot;. Available: https://resources.infosecinstitute.com/topic/incident-responder-career-roadmap-entry-level-executive/ [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;network-administrator&amp;quot;&amp;gt;Network administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;This position’s experience will help potential incident responders&lt;br /&gt;
develop networking skills. Attention to detail, as well as the ability&lt;br /&gt;
to sift through system configurations, site layouts, and general network&lt;br /&gt;
and communication setups, are essential in this field.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;system-administrator&amp;quot;&amp;gt;System administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Another crucial beginning point for an incident responder is to learn&lt;br /&gt;
how to manage resources inside your organization as well as user&lt;br /&gt;
behavior. Understanding the potential damage that users, inadequate&lt;br /&gt;
security setups, and ineffective IT policies and procedures can cause on&lt;br /&gt;
your network can provide prospective candidates with insight into the&lt;br /&gt;
human component of an incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;security-administrator&amp;quot;&amp;gt;Security administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In such a position, basic hacking skills, penetration testing, and&lt;br /&gt;
intrusion detection are all learned, which are crucial incident&lt;br /&gt;
responder skills when trying to replicate a breach or attack.&lt;br /&gt;
Understanding the paths a cybercriminal will take when attempting to&lt;br /&gt;
damage or obtain access to a system can greatly simplify the work of&lt;br /&gt;
reverse engineering the incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Mid-Level Incident Response Positions ===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5&lt;br /&gt;
id=&amp;quot;computer-security-incident-response-team-csirt-engineer&amp;quot;&amp;gt;Computer&lt;br /&gt;
security incident response team (CSIRT) engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;cyber-incident-responder&amp;quot;&amp;gt;Cyber incident responder&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-response-engineer&amp;quot;&amp;gt;Incident response&lt;br /&gt;
engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;While each of these positions is different, they generally require&lt;br /&gt;
very similar skills and characteristics in a candidate. At this level,&lt;br /&gt;
personal characteristics such as problem solving, time management, and&lt;br /&gt;
even presentation skills become more crucial as one’s career evolves&lt;br /&gt;
into a management-facing role.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Technical skills include the ability to identify and minimize threats&lt;br /&gt;
while maintaining communication with management and the rest of your&lt;br /&gt;
team. Data analysis and evidence gathering become increasingly crucial,&lt;br /&gt;
and the circumstances in which your services are deployed get more&lt;br /&gt;
serious.&amp;lt;/p&amp;gt;&lt;br /&gt;
Problem-solving skills are crucial at this level of incident&lt;br /&gt;
response, and as the stakes rise, so does the pressure in each&lt;br /&gt;
situation. At this level, programming abilities are essential since&lt;br /&gt;
incident responders may be needed to reverse engineer malicious code or&lt;br /&gt;
even create patches for vulnerable network applications or services. &amp;lt;ref name=&amp;quot;coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated]&amp;quot;. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Senior-Level Incident Response Positions===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;intrusion-detection-specialist&amp;quot;&amp;gt;Intrusion detection&lt;br /&gt;
specialist:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;A CISSP certification might help a potential candidate in preparing&lt;br /&gt;
for the profession. The role of an intrusion detection specialist is to&lt;br /&gt;
find and stop any unwanted communications.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-manager&amp;quot;&amp;gt;Incident manager:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Expected to plan, oversee, manage, and supervise all incident&lt;br /&gt;
response team actions. Is in charge of reporting all current events to&lt;br /&gt;
senior management and stakeholders, as well as acting as the technical&lt;br /&gt;
lead on active incidents for incident responders. Prepares threat and&lt;br /&gt;
impact assessments and reports them known to management.&amp;lt;ref name=&amp;quot;coursera&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Certificates== &lt;br /&gt;
There is a vast number of different certificates and the road map to&lt;br /&gt;
being a certified professional could be very different&amp;lt;ref name=&amp;quot;Coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated],&amp;quot; [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;NICCS&amp;quot;&amp;gt;NICCS, &amp;quot;Cybersecurity Certifications,&amp;quot; [Online]. Available: hhttps://niccs.cisa.gov/about-niccs/cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt; . One possible&lt;br /&gt;
approach is to start with basic certificates from the different branches&lt;br /&gt;
of service and move to more specific and demanding focused&lt;br /&gt;
certification. Also, some jobs require certain clearances, either from&lt;br /&gt;
industry, or from the government. One small selection of different&lt;br /&gt;
possible certificates is brought out in following paragraphs.&lt;br /&gt;
&lt;br /&gt;
Security+ is a CompTIA certification that is considered a basic cert&lt;br /&gt;
among cybersecurity professionals. It covers the topics of risk&lt;br /&gt;
management and threat assessment.&lt;br /&gt;
Network+ is also offered by CompTIA this certification (like the name&lt;br /&gt;
implies) focuses on networking infrastructure and operations. It is&lt;br /&gt;
considered a foundational certification.&lt;br /&gt;
The Certified Information Systems Security Professional (CISSP) is a&lt;br /&gt;
more advanced certification designed for cybersecurity professionals&lt;br /&gt;
with at least five years of work experience. The certification covers&lt;br /&gt;
topics such as architecture, engineering, and management.&amp;lt;/p&amp;gt;&lt;br /&gt;
The Certified Ethical Hacker (CEH) certification is also considered a&lt;br /&gt;
more advanced cert because it generally requires that applicants have&lt;br /&gt;
multiple years of work experience. The goal of an ethical hacker&lt;br /&gt;
certification is to be able to understand how cyber attacks unfold in&lt;br /&gt;
order to improve threat assessment and mitigation skills.&amp;lt;ref name=&amp;quot;cyberguide&amp;quot;&amp;gt;Cybersecurity Guide, &amp;quot;How to become a cybersecurity specialist&amp;quot;, [Online]. Available: https://cybersecurityguide.org/careers/security-specialist/. [Accessed 27 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
This is definitely not all, when one looks for more information, following link could be searched, to get more in depth knowledge about&lt;br /&gt;
different possibilities. Hereby, with the help of this matrix a possible taxonomy of different 436 listed certificates in branches are&lt;br /&gt;
presented.&amp;lt;ref name=&amp;quot;Pauljeremy&amp;quot;&amp;gt;&amp;quot;Cybersecurity Roadmap,&amp;quot; [Online]. Available: https://pauljerimy.com/2020/10/12/scr-oct-2020-update/. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:analystimage5.png|1000px|thumb|Certificate matrix &amp;lt;ref&amp;gt;&amp;quot;Certification roadmap&amp;quot;. Available at https://pauljerimy.com/security-certification-roadmap&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
=== Communication and Network Security===&lt;br /&gt;
Communication and network security covers the ability to secure&lt;br /&gt;
communication channels and networks. Topics include secure and converges&lt;br /&gt;
protocols, wireless networks, cellular networks, hardware operations&lt;br /&gt;
(warranty and redundant power), and third-party connectivity. IP&lt;br /&gt;
networking are also included in this domain.&lt;br /&gt;
===Identity and Access Management===&lt;br /&gt;
The identity and access management domain covers the attacks that&lt;br /&gt;
target the human gateway to gain access to data. Other topics include&lt;br /&gt;
ways to identify users with rights to access the information and&lt;br /&gt;
servers. Identity and access management covers the topics of&lt;br /&gt;
applications, Single sign-on authentication, privilege escalation,&lt;br /&gt;
Kerberos, rule-based or risk-based access control, proofing and&lt;br /&gt;
establishment of identity.&lt;br /&gt;
===Security Architecture and Engineering===&lt;br /&gt;
The security architecture and engineering domain covers important&lt;br /&gt;
topics concerning security engineering plans, designs and principles,&lt;br /&gt;
Topics include assessing and mitigating information system&lt;br /&gt;
vulnerabilities, fundamental concepts of security models and security&lt;br /&gt;
architectures in critical areas like access control. Cloud systems,&lt;br /&gt;
cryptography, system infiltrations (ransomware, fault-injection and&lt;br /&gt;
more) and virtualized systems are also covered in this domain.&lt;br /&gt;
===Asset Security===&lt;br /&gt;
The Asset Security domain deals with the issues related to the&lt;br /&gt;
collection, storage, maintenance, retention and destruction of data. It&lt;br /&gt;
also covers knowledge of different roles regarding data handling (owner,&lt;br /&gt;
controller and custodian) as well as data protection methods and data&lt;br /&gt;
states. Other topics include resource provision, asset classification&lt;br /&gt;
and data lifecycle management.&lt;br /&gt;
===Security and Risk Management===&lt;br /&gt;
The security and risk management domain covers general on skills&lt;br /&gt;
related to the implementation of user awareness programs as well as&lt;br /&gt;
security procedures. Emphasis is also placed on risk management&lt;br /&gt;
concerning the acquisition of new services, hardware and software&lt;br /&gt;
(supply chain). Other skills include social engineering defense&lt;br /&gt;
mechanisms.&lt;br /&gt;
===Security Assessment and Testing===&lt;br /&gt;
The security assessment and testing domain deals with all the&lt;br /&gt;
techniques and tools used to find system vulnerabilities, weaknesses and&lt;br /&gt;
potential areas of concern not addressed by security procedures and&lt;br /&gt;
policies. Attack simulations, vulnerability assessment, compliance&lt;br /&gt;
checks, and ethical disclosure also fall under this domain.&lt;br /&gt;
===Software Security===&lt;br /&gt;
The software development security domain deals with implementing&lt;br /&gt;
software-based security protocols within environment for which the IT&lt;br /&gt;
professional is responsible. Risk analysis, vulnerability identification&lt;br /&gt;
and auditing of source codes are all covered in this subset. Additional&lt;br /&gt;
topics include software-designed security, maturity models, development&lt;br /&gt;
methodologies, open-source and third-party development security.&lt;br /&gt;
===Security operations===&lt;br /&gt;
The security operations domain covers topics ranging from&lt;br /&gt;
investigations and digital forensic to detection and intrusion&lt;br /&gt;
prevention tools, sandboxing and firewalls. Topics include user and&lt;br /&gt;
entity behavior analytics, threat intelligence (threat hunting and&lt;br /&gt;
threat feeds) log management, artifacts (mobile, computer and network),&lt;br /&gt;
machine learning and AI-based tools, penetration testing, and&lt;br /&gt;
exploitation development. These for sub-domains are lister here.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Incident Handling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Penetration Testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Exploitation&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Education==&lt;br /&gt;
The entry level monitoring specialist is hired by Estonian&lt;br /&gt;
Information System Authority even if there is no formal IT education,&lt;br /&gt;
but readiness to learn and moderate knowledge of different operation&lt;br /&gt;
systems is enough to start the career. &amp;lt;ref name=&amp;quot;cv&amp;quot;&amp;gt;cv.ee, &amp;quot;SEIRESPETSIALIST - tule Eesti küberruumi valvuriks!&amp;quot;. Available: https://www.cv.ee/en/vacancy/792782/riigi-infosusteemi-amet/seirespetsialist-tule-eesti-kuberruumi-valvuriks [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Nevertheless, like most other high qualification careers jobs falling&lt;br /&gt;
under the cybersecurity specialist category require some form of formal&lt;br /&gt;
education. However, since cybersecurity specialist jobs can fall across&lt;br /&gt;
a wide spectrum of job descriptions and responsibilities, it is possible&lt;br /&gt;
to obtain a specialist job after completing many levels of different&lt;br /&gt;
computer related education.&lt;br /&gt;
If one is looking for a cybersecurity related education, for example&lt;br /&gt;
in EU, 137 courses/programs could be found that relate to keyword IT or&lt;br /&gt;
cybersecurity. &amp;lt;ref name=&amp;quot;enisa&amp;quot;&amp;gt;ENISA (European Union Agency for Cybersecurity), &amp;quot;Cybersecurity Education-Cybersecurity Higher Education Database&amp;quot;. Available: https://www.enisa.europa.eu/topics/cybersecurity-education/education-map/education-courses [Accessed 26 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Also, there is a great amount of discussion, if cyber security&lt;br /&gt;
professional should have a degree or would be certification just enough.&lt;br /&gt;
One interesting table is produces by Franklin University that compares&lt;br /&gt;
benefits and/or drawbacks of each type of credential.&lt;br /&gt;
&amp;lt;ref name=&amp;quot;franklin&amp;quot;&amp;gt;Franklin University, &amp;quot;Is Getting a Master&#039;s Degree in Cyber Security Worth It?&amp;quot;. Available: https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
[[File:analystimage7.png|700px|thumb|Comparison degree vs Certificate &amp;lt;ref&amp;gt;&amp;quot;Comparison Table&amp;quot;. Available at https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
Certifications are generally good for people with little practical&lt;br /&gt;
experience because they are known quantities in the industry and can&lt;br /&gt;
help you get your foot in the door. They set a minimum knowledge bar.&lt;br /&gt;
But some certifications are viewed more favorably than others.&lt;br /&gt;
Certifications with renewal requirements are viewed better by hiring&lt;br /&gt;
managers, but they also more costly in the long run because of the need&lt;br /&gt;
for continuing education. Certifications are also good for showing&lt;br /&gt;
in-depth expertise in a specialization within cybersecurity. Depending&lt;br /&gt;
on your career goals, it may be advantageous to have a master’s&lt;br /&gt;
degree—which shows your breadth of knowledge, critical thinking and&lt;br /&gt;
leadership skills—and a certificate—which shows specific skill&lt;br /&gt;
competency.&amp;lt;ref name=&amp;quot;franklin&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
As IT (Cyber) Security is still a relatively young discipline,&lt;br /&gt;
universities and colleges are still figuring out which is the best&lt;br /&gt;
approach for their degrees. Study programmes and curricula in Cyber&lt;br /&gt;
Security are different. In general, here are the duration of Cyber&lt;br /&gt;
Security degrees:&lt;br /&gt;
&amp;lt;ref name=&amp;quot;studyportal&amp;quot;&amp;gt;Studyportals, &amp;quot;Why You Should Study a Cyber Security Degree in 2022&amp;quot;. Available: https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Bachelor’s degrees in Cyber Security take 3 or 4 years in most&lt;br /&gt;
countries.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Master’s courses in Cyber Security take between 1-2 years to&lt;br /&gt;
complete.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;PhD programmes in Cyber Security last 3-5 years. Some only take 1&lt;br /&gt;
or 2 years, but they are less common.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Generalization could me made that on bachelor level the general&lt;br /&gt;
knowledge about the cyber issues are obtained. On master level the&lt;br /&gt;
specialization courses are taken and the person can choose more specific&lt;br /&gt;
topics to study. It is on master level where strengths of the cyber&lt;br /&gt;
specialist can be developed further and up-do date knowledge obtained in&lt;br /&gt;
specifics. PhD is serious science and involves teaching, lot of&lt;br /&gt;
scientific work and writing for publications.&lt;br /&gt;
&lt;br /&gt;
==Salary==&lt;br /&gt;
&amp;lt;p&amp;gt;Even if the salary can be very different, compared to the skills and&lt;br /&gt;
experience, an generalization can be made. Cyber Security professionals&lt;br /&gt;
in CSIRT, and in other entities earn quite well, from the start. First,&lt;br /&gt;
some comparison from the United States. The average CSIRT analyst salary&lt;br /&gt;
in the USA is $97,500 per year or $50 per hour. Entry level positions&lt;br /&gt;
start at $48,875 per year while most experienced workers make up to&lt;br /&gt;
$135,373 per year.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.talent.com/salary?job=csirt+analyst&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;There are multiple positions you can occupy in this field. They have&lt;br /&gt;
in common great salaries and high demand for technical skills, attention&lt;br /&gt;
to details, problem-solving mentality, and the ability to analyze risks.&lt;br /&gt;
Here are the average annual salaries in the United States, according to&lt;br /&gt;
Payscale:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.payscale.com/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Cryptographer – 100,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Information Security Officer – 91,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Assessor – 90,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Engineer – 88,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Penetration Tester – 81,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Forensics Expert – 71,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Administrator – 65,000 USD&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When looking into salaries in Estonia, one can find that there is a&lt;br /&gt;
discussion that private sector is taking a toll from the public sector,&lt;br /&gt;
and that the salaries in important agencies, as Information System&lt;br /&gt;
Authority loose their employees to the better paid positions in private&lt;br /&gt;
sector.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://digi.geenius.ee/rubriik/uudis/kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad/&lt;br /&gt;
https://tehnika.postimees.ee/6887428/riigi-it-tootajate-palgamaarad-kasvasid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;But there is also a different view that average private sector worker&lt;br /&gt;
could be hired as a top specialist in public sector and then the payment&lt;br /&gt;
is higher. Nevertheless, it seems that the average payment in cyber&lt;br /&gt;
security sector is any way higher that in other parts of the&lt;br /&gt;
e-services.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://digi.geenius.ee/rubriik/uudis/5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka/&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
==SOC==&lt;br /&gt;
&amp;lt;p&amp;gt;A SOC is a facility where an organization’s network, applications,&lt;br /&gt;
and endpoints are monitored and defended. The term was adapted from&lt;br /&gt;
network operations centers (NOCs), where large telecommunication or&lt;br /&gt;
corporate networks are monitored. When network security became more of a&lt;br /&gt;
concern, security teams were formed within the NOCs, and eventually spun&lt;br /&gt;
off into larger organizations of their own as the responsibilities of&lt;br /&gt;
security teams grew increasingly complex and specialized. The security&lt;br /&gt;
staff working in a security operations center are often called the SOC&lt;br /&gt;
team.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Functions of the SOC team include, but are not limited to:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ol type=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Taking inventory of resources, to get a better understanding of the&lt;br /&gt;
structure they are protecting.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintanence of the system, by constantly making updates and adding&lt;br /&gt;
safeguards.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Monitoring the network for abnormalities with special tools.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Threat analysis of new attacks and vulnerabilities.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Responding to attacks, by acting as “first responders”. The SOC team&lt;br /&gt;
will shut down and/or isolate endpoints, deleting files and lowering the&lt;br /&gt;
impact as fast as possible.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Recovery of system stability and lost data. This may be done using&lt;br /&gt;
backups, restarting endpoints or reconfiguring systems.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Logging all actions on the system, to be later used for analysis or&lt;br /&gt;
forensics after an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigating the root cause of an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Auditing their own actions, to be in line with regulations of the&lt;br /&gt;
organization, industry or governing body.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.trellix.com/en-us/security-awareness/operations/what-is-soc.html&amp;lt;/p&amp;gt;&lt;br /&gt;
==CSIRT==&lt;br /&gt;
&amp;lt;p&amp;gt;A CSIRT is a group that responds to security incidents when they&lt;br /&gt;
occur. Key responsibilities of a CSIRT include: &lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
===Creating and maintaining an incident response plan (IRP)===&lt;br /&gt;
An incident response plan (IRP) is a set of written instructions for&lt;br /&gt;
detecting, responding to and limiting the effects of an information&lt;br /&gt;
security event. Incident response plans provide instructions for&lt;br /&gt;
responding to many potential scenarios, including data breaches, denial&lt;br /&gt;
of service/distributed denial of service attacks, firewall breaches,&lt;br /&gt;
virus or malware outbreaks or insider threats. Without an incident&lt;br /&gt;
response plan in place, organizations may either not detect the attack&lt;br /&gt;
in the first place, or not follow proper protocol to contain the threat&lt;br /&gt;
and recover from it when a breach is detected.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.stratacore.com/incidentresponseplan&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
===Investigating and analyzing incidents===&lt;br /&gt;
CSIRTs are also involved in improvement activities. After major&lt;br /&gt;
computer security incidents occur, or when incidents are not handled in&lt;br /&gt;
a timely or effective manner, a CSIRT will generally perform a&lt;br /&gt;
postmortem of the incident and its response. This postmortem will&lt;br /&gt;
identify the strengths and weakness of the response effort. Such reviews&lt;br /&gt;
can identify weaknesses and holes in systems, infrastructure defenses,&lt;br /&gt;
or policies that allowed the incident to take place. It can also&lt;br /&gt;
identify problems with communication channels, interfaces, and&lt;br /&gt;
procedures that inhibited the efficient resolution of the reported&lt;br /&gt;
problem.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.cisa.gov/uscert/bsi/articles/best-practices/incident-management/defining-computer-security-incident-response-teams&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Managing internal communications and updates during or immediately after incidents occur===&lt;br /&gt;
===Communicating with employees, shareholders, customers, and the press about incidents as needed===&lt;br /&gt;
&amp;lt;p&amp;gt;There are various services within the CSIRT Services Framework that&lt;br /&gt;
address communications, as they relate to security operations and&lt;br /&gt;
incident response services. Some of these include Information Security&lt;br /&gt;
Incident Coordination, Crisis Management Support, Vulnerability&lt;br /&gt;
Disclosure, Situational Awareness Communication, and Awareness Building,&lt;br /&gt;
to name a few. Sharing information and communicating with the general&lt;br /&gt;
public and/or your constituency is appropriate in many different&lt;br /&gt;
scenarios. These can range from proactive communications to reactive&lt;br /&gt;
communications. Each scenario may be unique, and careful consideration&lt;br /&gt;
should be given to when to release information to the public and what&lt;br /&gt;
information should be released.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;https://resources.sei.cmu.edu/asset_files/Handbook/2021_002_001_651819.pdf&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Remediating incidents===&lt;br /&gt;
Threat remediation is a strong and capable tool for fighting the&lt;br /&gt;
cyber security compromises. As the word ‘remedy’ suggests, remediation&lt;br /&gt;
process involves the treatment of a security breach. With the&lt;br /&gt;
remediation practices, your cyber security team is able to eliminate&lt;br /&gt;
suspicious activities and malicious attacks in the form of malware,&lt;br /&gt;
ransomware, phishing and such. Even if you ‘kill’ the suspicious&lt;br /&gt;
activity, the attackers can remain in your systems. If you want to&lt;br /&gt;
contaminate and end the problem for good, your remediation processes&lt;br /&gt;
must involve the detection of the cause. &amp;lt;ref name=&amp;quot;logsign&amp;quot;&amp;gt;Logsign, &amp;quot;What-is-remediation-in-cyber-security&amp;quot;. Available: https://www.logsign.com/blog/what-is-remediation-in-cyber-security/. [Accessed 28 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Recommending technology, policy, governance, and training changes after security incidents===&lt;br /&gt;
After all these actions, the SCIRT must contribute to the development&lt;br /&gt;
of better policies, practices and has to recommend improvements. They&lt;br /&gt;
are not working in the vacuum and their work has to create new and&lt;br /&gt;
better standards for cyber security. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;Exabeam, &amp;quot;CSIRT&amp;quot;. Available: https://www.exabeam.com/incident-response/csirt/ [Accessed 28 APr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==CERT==&lt;br /&gt;
&amp;lt;p&amp;gt;The term “computer emergency response team” was coined in 1988. In&lt;br /&gt;
response to the Morris worm attack that impacted thousands of servers on&lt;br /&gt;
the Internet, DARPA funded the formation of the Computer Emergency&lt;br /&gt;
Response Team Coordination Center (CERT-CC) at Carnegie Mellon&lt;br /&gt;
University. The goal of CERT-CC was to help protect the internet by&lt;br /&gt;
collecting and disseminating information on critical security&lt;br /&gt;
vulnerabilities. Several other countries formed similar centers using&lt;br /&gt;
the same acronym (despite threats of legal action by Carnegie Mellon for&lt;br /&gt;
trademark infringement). Now the term CERT refers to any emergency&lt;br /&gt;
response team that deals with cyber threats. Many people use CERT-CC&lt;br /&gt;
interchangeably with CSIRT, though the charter of a CERT is information&lt;br /&gt;
sharing in order to help other response teams respond to threats against&lt;br /&gt;
their own infrastructure.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In general, the designation of CERT is helpful in applying real-world&lt;br /&gt;
solutions to various cybersecurity problems. They may be government&lt;br /&gt;
contractors or employees of a major corporation. For example, the U.S.&lt;br /&gt;
Computer Emergency Readiness Team (US-CERT) operates under the U.S.&lt;br /&gt;
Department of Homeland Security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.techopedia.com/definition/31003/computer-emergency-response-team-cert&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In Estonia CERT is designated as CERT-EE. It was established in 2006,&lt;br /&gt;
as an organization responsible for the management of security incidents&lt;br /&gt;
in .ee computer networks. It is also a national contact point for&lt;br /&gt;
international co-operation in the field of IT security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ria.ee/en/cyber-security/cert-ee.html&amp;lt;/p&amp;gt;&lt;br /&gt;
===Difference between SOC/CSIRT/CERT===&lt;br /&gt;
&amp;lt;p&amp;gt;How CSIRTs differ from CERTs and SOCs There are overlapping&lt;br /&gt;
responsibilities between a community emergency response team (CERT),&lt;br /&gt;
computer security incident response team (CSIRT), and security&lt;br /&gt;
operations center (SOC). To add to this confusion, frequently, the terms&lt;br /&gt;
CERT and CSIRT are used interchangeably, despite the important&lt;br /&gt;
differences.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image3.png&amp;quot; alt=&amp;quot;Overlapping in images/image3.png&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;Overlapping in&lt;br /&gt;
images/image3.png&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
==Understand the primary roles and characteristics of a CERT, CSIRT, and SOC.==&lt;br /&gt;
&amp;lt;p&amp;gt;So, using strict definitions, a CERT collects and disseminates&lt;br /&gt;
security information, typically for the benefit of a country or an&lt;br /&gt;
industry. A CSIRT is a cross-functional team that responds to incidents&lt;br /&gt;
on behalf of a country or an organization. A SOC is where a country or&lt;br /&gt;
organization monitors and defends its network, servers, applications,&lt;br /&gt;
and endpoints.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image4.png&amp;quot; alt=&amp;quot;table of explanation images/image4&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;table of explanation&lt;br /&gt;
images/image4&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
==Future==&lt;br /&gt;
&amp;lt;p&amp;gt;And the Cyber security problem is only getting bigger. According to a&lt;br /&gt;
report published by Accenture, the number of cyber security breaches&lt;br /&gt;
increased by 11 percent from 2017 to 2018. The cost of such breaches is&lt;br /&gt;
astronomical–about $600 billion worldwide, according to the Economic&lt;br /&gt;
Impact of Cybercrime report.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Job projections for cybersecurity are staggering. The Bureau of Labor&lt;br /&gt;
Statistics in US predicts that careers in the cybersecurity field will&lt;br /&gt;
grow by 32% by 2028. That makes cybersecurity one of the top 10&lt;br /&gt;
fastest-growing jobs in the country. In the United States alone, jobs&lt;br /&gt;
for Information Security Analysts are expected to grow by 15% by&lt;br /&gt;
2024.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Most likely this trend is also similar in other countries.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When checking Estonian job portals, there is a constant need for&lt;br /&gt;
people for cyber security related positions. Also, linkedin search gives&lt;br /&gt;
approximately 30 vacancies immediately. There are banks, logistics&lt;br /&gt;
companies, e-shops, and software producers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://ee.linkedin.com/jobs/cyber-security-jobs?countryRedirected=1&amp;amp;amp;position=1&amp;amp;amp;pageNum=0&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Trends that affect companies create need for constant cyber security&lt;br /&gt;
services. Increasing number of home/remote offices require secure&lt;br /&gt;
corporate networks and security of remote devices. One example is from&lt;br /&gt;
this year, when sloppy remote desktop set-up paralyzed systems of 17&lt;br /&gt;
companies.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.aripaev.ee/uudised/2022/04/20/ria-lohakas-kaugtoolaua-seadistus-halvas-martsis-vahemalt-17-juhul-ettevotete-it-susteemid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Also, no service can exists without robust infrastructure - servers,&lt;br /&gt;
databases, applications. As all previously mentioned devices and&lt;br /&gt;
services are at constant scanning and surveillance. So, the breach&lt;br /&gt;
detection and immediate action demands 24/7 services. Even if lot of&lt;br /&gt;
things could be automated, there is a need for human specialists (at&lt;br /&gt;
least, at the moment). Third growing field is also a forensic&lt;br /&gt;
investigation, as every attack must be investigated in order to be ready&lt;br /&gt;
to repel next attacks. So data recovery and evidence collection is&lt;br /&gt;
another important field of work that need skilled and professional&lt;br /&gt;
workers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Even, if the specifics of the entity, be it CSIRT, CERT or SOC, are&lt;br /&gt;
different, the fundamentals of the work are the same. Professional&lt;br /&gt;
knowledge of the networks, operational systems, hardware, scripting, and&lt;br /&gt;
several other wider IT related knowledge is needed. As there is no&lt;br /&gt;
single way to reach to it, every single person can find one’s strongest&lt;br /&gt;
sides and develop them with knowledge of weaker side, in order to know,&lt;br /&gt;
when to as for help.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/body&amp;gt;&lt;br /&gt;
&amp;lt;/html&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mavald</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142206</id>
		<title>Hiring a Cyber Security Incident Analyst</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142206"/>
		<updated>2022-05-01T15:32:40Z</updated>

		<summary type="html">&lt;p&gt;Mavald: /* Education */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==A Cyber Security Incident Analyst==&lt;br /&gt;
&lt;br /&gt;
[[File:image1.png|600px|thumb|Job advertisement &amp;lt;ref&amp;gt;&amp;quot;Job Advertisement&amp;quot;. Available at https://www.projectpeople.com/jobs/&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
===Cyber security incident analyst in SOC/CSIRT/CERT===&lt;br /&gt;
This article delves into the job title of Cyber Security Incident&lt;br /&gt;
Analyst and provides an overview of the acronyms SOC/CSIRT/CERT. A brief&lt;br /&gt;
history of the job is discussed here, as well as a possible career path,&lt;br /&gt;
education, experience, and other characteristics required for work in&lt;br /&gt;
computer security-related organizations. The article also provides a&lt;br /&gt;
brief history of SOC/CSIRT/CERT, as well as a comparison of their&lt;br /&gt;
differences and similarities.&lt;br /&gt;
===Cyber Security Incident Analyst Skill Set===&lt;br /&gt;
What skill set is expected from the Cyber Security Incident Analyst? Below written lines are taken from the same job advertisement depicted&lt;br /&gt;
on the left side of this article:&lt;br /&gt;
As a Security Incident Analyst your responsibilities will include:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Continuous monitoring of security tooling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Performing regular and ad-hoc vulnerability assessments&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Carrying out ‘spot checks’&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Reporting vulnerabilities to the PVG via the alerts system&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintaining and documenting logging systems&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Developing centralized logging, reporting and intelligence&lt;br /&gt;
platforms&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;‘Light touch’ penetration testing with open source tooling&lt;br /&gt;
(Metasploit)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Knowledge &amp;amp;amp; Experience required:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;SOC, CSIRT or CERT operational environment experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Windows / Linux experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TCP /IP networking protocol knowledge&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience reviewing and analyzing Security Events from various&lt;br /&gt;
monitoring and logging sources&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience in website and web application security assessment or&lt;br /&gt;
penetration testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience of using Metasploit&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Scripting knowledge using BASH, Python, Perl, Ruby&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Skills in Host and Network Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
As one can see the description of the duties is wide and also the&lt;br /&gt;
knowledge and experience that is required is noteworthy. So, where to&lt;br /&gt;
start to find out the way to get this kind of knowledge and&lt;br /&gt;
expertize.&lt;br /&gt;
===Possible career path===&lt;br /&gt;
Next part of the paper is aiming to depict a possible ways, how to&lt;br /&gt;
develop oneself, and move along the career pathway in cybersecurity&lt;br /&gt;
field. Topics of development, education, experience and certification&lt;br /&gt;
are covered.&lt;br /&gt;
[[File:analystimage2.png|1000px|thumb|Career path &amp;lt;ref&amp;gt;&amp;quot;Possible Career Path&amp;quot;. Available at https://www.cyberseek.org/pathway.html&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
===Junior/Senior===&lt;br /&gt;
Start with an entry-level job in IT. Hands-on experience is often the&lt;br /&gt;
most effective way to prepare for certification exams. Start&lt;br /&gt;
accumulating work experience with an entry-level role as a cybersecurity&lt;br /&gt;
analyst. Many cybersecurity professionals start off in more general IT&lt;br /&gt;
roles. The skills, practices, and technologies you’ll use as a&lt;br /&gt;
cybersecurity professional will continue to evolve along with computer&lt;br /&gt;
and network technology. The desire to learn, ability to problem solve,&lt;br /&gt;
and attention to detail will serve you well in this field. Other, more&lt;br /&gt;
technical skills and technologies to learn include:&amp;lt;ref name=&amp;quot;certification&amp;quot;&amp;gt;Popular Cyber Security Certificates [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications  [Accessed 25 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====SIEM tools (security information and event management)====&lt;br /&gt;
Security Information and Event Management (SIEM) is a set of tools&lt;br /&gt;
and services offering a holistic view of an organization’s information&lt;br /&gt;
security. SIEM works by combining two technologies:&lt;br /&gt;
&amp;lt;li&amp;gt;Security information management (SIM), which collects data from log&lt;br /&gt;
files for analysis and reports on security threats and events, and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;security event management (SEM), which conducts real-time system&lt;br /&gt;
monitoring, notifies network admins about important issues and&lt;br /&gt;
establishes correlations between security events. There are a number of&lt;br /&gt;
security information and event management solutions on the market.&lt;br /&gt;
ArcSight ESM, IBM QRadar and Splunk are among the most popular. &amp;lt;ref name=&amp;quot;SIEM&amp;quot;&amp;gt;Application security, SIEM [Online]. Available: https://www.imperva.com/learn/application-security/siem/. [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Firewalls, Intrusion Detection Systems (IDS), and Intrusion Prevention Systems(IPS)====&lt;br /&gt;
Firewalls can be two types, hardware and software firewalls. Software&lt;br /&gt;
firewall is a firewall that is installed on a computer or server, and&lt;br /&gt;
tasked with network security. It works with a wide variety of other&lt;br /&gt;
technology security solutions to provide more robust and cohesive&lt;br /&gt;
security for enterprises of all sizes. When a software firewall is&lt;br /&gt;
installed on a server, it opens up like an umbrella of protection over&lt;br /&gt;
all other computers connected to the network. It is able to monitor both&lt;br /&gt;
incoming and outgoing traffic for potential risk or suspicious user&lt;br /&gt;
behavior, and also makes setting security policies much easier, faster&lt;br /&gt;
and more flexible. Hardware firewall is positioned between the network&lt;br /&gt;
and devices, allowing traffic to funnel through the firewall for a close&lt;br /&gt;
inspection and analysis. A hardware firewall, a term often&lt;br /&gt;
interchangeable with network or next-generation firewall, protects the&lt;br /&gt;
network gateways for an enterprise. Hardware firewall is physical&lt;br /&gt;
hardware, installed between network elements and connected devices, and&lt;br /&gt;
is tasked with filtering traffic for cyber threat to the network or&lt;br /&gt;
devices. Filtering out unauthorized or suspicious users based on traffic&lt;br /&gt;
analysis is one of the biggest benefits of hardware firewall. &amp;lt;ref name=&amp;quot;sangfor&amp;quot;&amp;gt;Sangfor, &amp;quot;What is Software Firewall? Difference between Hardware Firewall and Software Firewall, [Online]. Available: https://www.sangfor.com/blog/cybersecurity/what-is-software-firewall-difference-between-hardware-firewall-and-software-firewall [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems&lt;br /&gt;
(IPS) are both parts of the network infrastructure. IDS/IPS compare&lt;br /&gt;
network packets to a cyberthreat database containing known signatures of&lt;br /&gt;
cyberattacks — and flag any matching packets. IDS doesn’t alter the&lt;br /&gt;
network packets in any way, whereas IPS prevents the packet from&lt;br /&gt;
delivery based on the contents of the packet, much like how a firewall&lt;br /&gt;
prevents traffic by IP address. &amp;lt;ref name=&amp;quot;Varonis&amp;quot;&amp;gt;Varonis, &amp;quot;What is Software Firewall? IDS vs. IPS: What is the Difference?, [Online]. Available: https://www.varonis.com/blog/ids-vs-ips [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Digital forensics====&lt;br /&gt;
Digital forensics is a branch of forensic science that focuses on&lt;br /&gt;
identifying, acquiring, processing, analyzing, and reporting on data&lt;br /&gt;
stored electronically. Electronic evidence is a component of almost all&lt;br /&gt;
criminal activities and digital forensics support is crucial for law&lt;br /&gt;
enforcement investigations. Electronic evidence can be collected from a&lt;br /&gt;
wide array of sources, such as computers, smartphones, remote storage,&lt;br /&gt;
unmanned aerial systems, shipborne equipment, and more.&amp;lt;ref name=&amp;quot;interpol&amp;quot;&amp;gt;Interpol, &amp;quot;Digital forensics&amp;quot;. Available: https://www.interpol.int/How-we-work/Innovation/Digital-forensics. [Accessed 28 4 2022].&amp;lt;/ref&amp;gt; &lt;br /&gt;
Investigative process of digital forensics can be divided into several stages. There are four major stages: preservation, collection,&lt;br /&gt;
examination, and analysis. All these four stages need a deep understanding of computers, technology across a broad spectrum, and cybersecurity principles and&lt;br /&gt;
practices, a working knowledge of computers, networks, and coding, in-depth investigative abilities, critical-thinking skills and analytical talent the ability to effectively communicate and work with a&lt;br /&gt;
wide range of people. &amp;lt;ref name=&amp;quot;ecpi&amp;quot;&amp;gt;&amp;quot;Digital forensics&amp;quot;. Available: https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me. [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Mobile device management====&lt;br /&gt;
Mobile device management (MDM) is software that allows IT&lt;br /&gt;
administrators to control, secure and enforce policies on smartphones,&lt;br /&gt;
tablets and other endpoints. Mobile device management software emerged&lt;br /&gt;
in the early 2000s as a way to control and secure the personal digital&lt;br /&gt;
assistants and smartphones that business workers began to use. The&lt;br /&gt;
consumer smartphone boom that started with the launch of the Apple&lt;br /&gt;
iPhone in 2007 led to the bring your own device (BYOD) trend, which&lt;br /&gt;
fueled further interest in MDM.&amp;lt;ref name=&amp;quot;techtarget&amp;quot;&amp;gt;Techtarget, &amp;quot;Mobile Device Management&amp;quot;. Available: https://www.techtarget.com/searchmobilecomputing/definition/mobile-device-management [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Data management====&lt;br /&gt;
Sometimes the data management is neglected, but this part has a&lt;br /&gt;
crucial role when learning for good cyber security practices. Majority&lt;br /&gt;
of cyber security programs include a special courses on data management.&lt;br /&gt;
Data management is a method of organizing and maintaining data processes&lt;br /&gt;
that are required in almost every business operations. The benefits of&lt;br /&gt;
data management can be found accounting, statistics, logistics planning&lt;br /&gt;
and other disciplines including corporate computing.&amp;lt;ref name=&amp;quot;GlobalUni&amp;quot;&amp;gt;Global Universities, &amp;quot;MSc Data Management and Cyber Security&amp;quot;. Available: https://globaluniversities.in/msc-data-management-cyber-security. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Data governance (and management) play a fundamental role in&lt;br /&gt;
protecting an organization’s data. Ensuring that the right people have&lt;br /&gt;
the right access and that appropriate security controls are in place to&lt;br /&gt;
protect each system or service, based on the criticality or sensitivity&lt;br /&gt;
of the data sets these contain. &amp;lt;ref name=&amp;quot;CyberMagazine&amp;quot;&amp;gt;Cyber Security Magazine, &amp;quot;The Role of Data Governance in Cybersecurity&amp;quot;. Available: https://cybersecurity-magazine.com/the-role-of-data-governance-in-cybersecurity/?utm_source=rss&amp;amp;amp;utm_medium=rss&amp;amp;amp;utm_campaign=the-role-of-data-governance-in-cybersecurity. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Application security development====&lt;br /&gt;
Application security describes security measures at the application&lt;br /&gt;
level that aim to prevent data or code within the app from being stolen&lt;br /&gt;
or hijacked. It encompasses the security considerations that happen&lt;br /&gt;
during application development and design, but it also involves systems&lt;br /&gt;
and approaches to protect apps after they get deployed. Application&lt;br /&gt;
security may include hardware, software, and procedures that identify or&lt;br /&gt;
minimize security vulnerabilities.&amp;lt;ref name=&amp;quot;vmware&amp;quot;&amp;gt;VmWare, &amp;quot;What is application security?&amp;quot;. Available: https://www.vmware.com/topics/glossary/content/application-security.html [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Application security development is important to ensure that your&lt;br /&gt;
application is free from coding errors and bugs. And controls the risk&lt;br /&gt;
and helps safeguard against security vulnerabilities. Application&lt;br /&gt;
security development is the process of making applications more secure&lt;br /&gt;
by finding and fixing security vulnerabilities. This is often done by&lt;br /&gt;
enforcing software security best practices and using application&lt;br /&gt;
security testing tools. &lt;br /&gt;
&amp;lt;ref name=&amp;quot;perforce&amp;quot;&amp;gt;Perforce, &amp;quot;Application Security Development Best Practices&amp;quot;. Available: https://www.perforce.com/blog/kw/application-security-development-best-practices. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Audit and compliance knowledge====&lt;br /&gt;
A cyber security audit is designed to be a comprehensive review and&lt;br /&gt;
analysis of your business’s IT infrastructure. It identifies threats and&lt;br /&gt;
vulnerabilities, exposing weaknesses and high-risk practices.&lt;br /&gt;
Regulations such as the EU GDPR (General Data Protection Regulation) can&lt;br /&gt;
impose hefty penalties in the event of a breach that results in&lt;br /&gt;
exploited data. A cyber security audit will help mitigate the&lt;br /&gt;
consequences of a breach and demonstrate that your organization has&lt;br /&gt;
taken the necessary steps to protect client and company data. &amp;lt;ref name=&amp;quot;cyforsecure&amp;quot;&amp;gt;Cyfor Secure, &amp;quot;What is a Cyber Security Audit and how can it help your organisation?&amp;quot;. Available: https://cyforsecure.co.uk/services/cyber-assessment/cyber-security-audit/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cybersecurity compliance is the organizational risk management method&lt;br /&gt;
aligned with pre-defined security measures &amp;amp;amp; controls on how data&lt;br /&gt;
confidentiality is ensured by its administrative procedures.&amp;lt;ref name=&amp;quot;nordlayer&amp;quot;&amp;gt;NordLayer, &amp;quot;Cybersecurity compliance: Everything you need to know&amp;quot;. Available: https://nordlayer.com/blog/cybersecurity-compliance-everything-you-need-to-know/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
All needed skills are developed through courses and certification.&lt;br /&gt;
&lt;br /&gt;
===Entry-Level Incident Response Positions===&lt;br /&gt;
It is not always possible to advance to the position of incident&lt;br /&gt;
responder in a straight line. Many professionals advance from entry- to&lt;br /&gt;
mid-level positions before becoming a real incident responder or a&lt;br /&gt;
member of a computer emergency response team (CERT).&amp;lt;br /&amp;gt;&lt;br /&gt;
These are some examples: &amp;lt;ref name=&amp;quot;Infosec&amp;quot;&amp;gt;Infosec, &amp;quot;Incident Responder Career Roadmap: From Entry Level to Executive&amp;quot;. Available: https://resources.infosecinstitute.com/topic/incident-responder-career-roadmap-entry-level-executive/ [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;network-administrator&amp;quot;&amp;gt;Network administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;This position’s experience will help potential incident responders&lt;br /&gt;
develop networking skills. Attention to detail, as well as the ability&lt;br /&gt;
to sift through system configurations, site layouts, and general network&lt;br /&gt;
and communication setups, are essential in this field.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;system-administrator&amp;quot;&amp;gt;System administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Another crucial beginning point for an incident responder is to learn&lt;br /&gt;
how to manage resources inside your organization as well as user&lt;br /&gt;
behavior. Understanding the potential damage that users, inadequate&lt;br /&gt;
security setups, and ineffective IT policies and procedures can cause on&lt;br /&gt;
your network can provide prospective candidates with insight into the&lt;br /&gt;
human component of an incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;security-administrator&amp;quot;&amp;gt;Security administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In such a position, basic hacking skills, penetration testing, and&lt;br /&gt;
intrusion detection are all learned, which are crucial incident&lt;br /&gt;
responder skills when trying to replicate a breach or attack.&lt;br /&gt;
Understanding the paths a cybercriminal will take when attempting to&lt;br /&gt;
damage or obtain access to a system can greatly simplify the work of&lt;br /&gt;
reverse engineering the incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Mid-Level Incident Response Positions ===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5&lt;br /&gt;
id=&amp;quot;computer-security-incident-response-team-csirt-engineer&amp;quot;&amp;gt;Computer&lt;br /&gt;
security incident response team (CSIRT) engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;cyber-incident-responder&amp;quot;&amp;gt;Cyber incident responder&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-response-engineer&amp;quot;&amp;gt;Incident response&lt;br /&gt;
engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;While each of these positions is different, they generally require&lt;br /&gt;
very similar skills and characteristics in a candidate. At this level,&lt;br /&gt;
personal characteristics such as problem solving, time management, and&lt;br /&gt;
even presentation skills become more crucial as one’s career evolves&lt;br /&gt;
into a management-facing role.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Technical skills include the ability to identify and minimize threats&lt;br /&gt;
while maintaining communication with management and the rest of your&lt;br /&gt;
team. Data analysis and evidence gathering become increasingly crucial,&lt;br /&gt;
and the circumstances in which your services are deployed get more&lt;br /&gt;
serious.&amp;lt;/p&amp;gt;&lt;br /&gt;
Problem-solving skills are crucial at this level of incident&lt;br /&gt;
response, and as the stakes rise, so does the pressure in each&lt;br /&gt;
situation. At this level, programming abilities are essential since&lt;br /&gt;
incident responders may be needed to reverse engineer malicious code or&lt;br /&gt;
even create patches for vulnerable network applications or services. &amp;lt;ref name=&amp;quot;coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated]&amp;quot;. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Senior-Level Incident Response Positions===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;intrusion-detection-specialist&amp;quot;&amp;gt;Intrusion detection&lt;br /&gt;
specialist:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;A CISSP certification might help a potential candidate in preparing&lt;br /&gt;
for the profession. The role of an intrusion detection specialist is to&lt;br /&gt;
find and stop any unwanted communications.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-manager&amp;quot;&amp;gt;Incident manager:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Expected to plan, oversee, manage, and supervise all incident&lt;br /&gt;
response team actions. Is in charge of reporting all current events to&lt;br /&gt;
senior management and stakeholders, as well as acting as the technical&lt;br /&gt;
lead on active incidents for incident responders. Prepares threat and&lt;br /&gt;
impact assessments and reports them known to management.&amp;lt;ref name=&amp;quot;coursera&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Certificates== &lt;br /&gt;
There is a vast number of different certificates and the road map to&lt;br /&gt;
being a certified professional could be very different&amp;lt;ref name=&amp;quot;Coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated],&amp;quot; [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;NICCS&amp;quot;&amp;gt;NICCS, &amp;quot;Cybersecurity Certifications,&amp;quot; [Online]. Available: hhttps://niccs.cisa.gov/about-niccs/cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt; . One possible&lt;br /&gt;
approach is to start with basic certificates from the different branches&lt;br /&gt;
of service and move to more specific and demanding focused&lt;br /&gt;
certification. Also, some jobs require certain clearances, either from&lt;br /&gt;
industry, or from the government. One small selection of different&lt;br /&gt;
possible certificates is brought out in following paragraphs.&lt;br /&gt;
&lt;br /&gt;
Security+ is a CompTIA certification that is considered a basic cert&lt;br /&gt;
among cybersecurity professionals. It covers the topics of risk&lt;br /&gt;
management and threat assessment.&lt;br /&gt;
Network+ is also offered by CompTIA this certification (like the name&lt;br /&gt;
implies) focuses on networking infrastructure and operations. It is&lt;br /&gt;
considered a foundational certification.&lt;br /&gt;
The Certified Information Systems Security Professional (CISSP) is a&lt;br /&gt;
more advanced certification designed for cybersecurity professionals&lt;br /&gt;
with at least five years of work experience. The certification covers&lt;br /&gt;
topics such as architecture, engineering, and management.&amp;lt;/p&amp;gt;&lt;br /&gt;
The Certified Ethical Hacker (CEH) certification is also considered a&lt;br /&gt;
more advanced cert because it generally requires that applicants have&lt;br /&gt;
multiple years of work experience. The goal of an ethical hacker&lt;br /&gt;
certification is to be able to understand how cyber attacks unfold in&lt;br /&gt;
order to improve threat assessment and mitigation skills.&amp;lt;ref name=&amp;quot;cyberguide&amp;quot;&amp;gt;Cybersecurity Guide, &amp;quot;How to become a cybersecurity specialist&amp;quot;, [Online]. Available: https://cybersecurityguide.org/careers/security-specialist/. [Accessed 27 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
This is definitely not all, when one looks for more information, following link could be searched, to get more in depth knowledge about&lt;br /&gt;
different possibilities. Hereby, with the help of this matrix a possible taxonomy of different 436 listed certificates in branches are&lt;br /&gt;
presented.&amp;lt;ref name=&amp;quot;Pauljeremy&amp;quot;&amp;gt;&amp;quot;Cybersecurity Roadmap,&amp;quot; [Online]. Available: https://pauljerimy.com/2020/10/12/scr-oct-2020-update/. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:analystimage5.png|1000px|thumb|Certificate matrix &amp;lt;ref&amp;gt;&amp;quot;Certification roadmap&amp;quot;. Available at https://pauljerimy.com/security-certification-roadmap&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
=== Communication and Network Security===&lt;br /&gt;
Communication and network security covers the ability to secure&lt;br /&gt;
communication channels and networks. Topics include secure and converges&lt;br /&gt;
protocols, wireless networks, cellular networks, hardware operations&lt;br /&gt;
(warranty and redundant power), and third-party connectivity. IP&lt;br /&gt;
networking are also included in this domain.&lt;br /&gt;
===Identity and Access Management===&lt;br /&gt;
The identity and access management domain covers the attacks that&lt;br /&gt;
target the human gateway to gain access to data. Other topics include&lt;br /&gt;
ways to identify users with rights to access the information and&lt;br /&gt;
servers. Identity and access management covers the topics of&lt;br /&gt;
applications, Single sign-on authentication, privilege escalation,&lt;br /&gt;
Kerberos, rule-based or risk-based access control, proofing and&lt;br /&gt;
establishment of identity.&lt;br /&gt;
===Security Architecture and Engineering===&lt;br /&gt;
The security architecture and engineering domain covers important&lt;br /&gt;
topics concerning security engineering plans, designs and principles,&lt;br /&gt;
Topics include assessing and mitigating information system&lt;br /&gt;
vulnerabilities, fundamental concepts of security models and security&lt;br /&gt;
architectures in critical areas like access control. Cloud systems,&lt;br /&gt;
cryptography, system infiltrations (ransomware, fault-injection and&lt;br /&gt;
more) and virtualized systems are also covered in this domain.&lt;br /&gt;
===Asset Security===&lt;br /&gt;
The Asset Security domain deals with the issues related to the&lt;br /&gt;
collection, storage, maintenance, retention and destruction of data. It&lt;br /&gt;
also covers knowledge of different roles regarding data handling (owner,&lt;br /&gt;
controller and custodian) as well as data protection methods and data&lt;br /&gt;
states. Other topics include resource provision, asset classification&lt;br /&gt;
and data lifecycle management.&lt;br /&gt;
===Security and Risk Management===&lt;br /&gt;
The security and risk management domain covers general on skills&lt;br /&gt;
related to the implementation of user awareness programs as well as&lt;br /&gt;
security procedures. Emphasis is also placed on risk management&lt;br /&gt;
concerning the acquisition of new services, hardware and software&lt;br /&gt;
(supply chain). Other skills include social engineering defense&lt;br /&gt;
mechanisms.&lt;br /&gt;
===Security Assessment and Testing===&lt;br /&gt;
The security assessment and testing domain deals with all the&lt;br /&gt;
techniques and tools used to find system vulnerabilities, weaknesses and&lt;br /&gt;
potential areas of concern not addressed by security procedures and&lt;br /&gt;
policies. Attack simulations, vulnerability assessment, compliance&lt;br /&gt;
checks, and ethical disclosure also fall under this domain.&lt;br /&gt;
===Software Security===&lt;br /&gt;
The software development security domain deals with implementing&lt;br /&gt;
software-based security protocols within environment for which the IT&lt;br /&gt;
professional is responsible. Risk analysis, vulnerability identification&lt;br /&gt;
and auditing of source codes are all covered in this subset. Additional&lt;br /&gt;
topics include software-designed security, maturity models, development&lt;br /&gt;
methodologies, open-source and third-party development security.&lt;br /&gt;
===Security operations===&lt;br /&gt;
The security operations domain covers topics ranging from&lt;br /&gt;
investigations and digital forensic to detection and intrusion&lt;br /&gt;
prevention tools, sandboxing and firewalls. Topics include user and&lt;br /&gt;
entity behavior analytics, threat intelligence (threat hunting and&lt;br /&gt;
threat feeds) log management, artifacts (mobile, computer and network),&lt;br /&gt;
machine learning and AI-based tools, penetration testing, and&lt;br /&gt;
exploitation development. These for sub-domains are lister here.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Incident Handling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Penetration Testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Exploitation&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Education==&lt;br /&gt;
The entry level monitoring specialist is hired by Estonian&lt;br /&gt;
Information System Authority even if there is no formal IT education,&lt;br /&gt;
but readiness to learn and moderate knowledge of different operation&lt;br /&gt;
systems is enough to start the career. &amp;lt;ref name=&amp;quot;cv&amp;quot;&amp;gt;cv.ee, &amp;quot;SEIRESPETSIALIST - tule Eesti küberruumi valvuriks!&amp;quot;. Available: https://www.cv.ee/en/vacancy/792782/riigi-infosusteemi-amet/seirespetsialist-tule-eesti-kuberruumi-valvuriks [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Nevertheless, like most other high qualification careers jobs falling&lt;br /&gt;
under the cybersecurity specialist category require some form of formal&lt;br /&gt;
education. However, since cybersecurity specialist jobs can fall across&lt;br /&gt;
a wide spectrum of job descriptions and responsibilities, it is possible&lt;br /&gt;
to obtain a specialist job after completing many levels of different&lt;br /&gt;
computer related education.&lt;br /&gt;
If one is looking for a cybersecurity related education, for example&lt;br /&gt;
in EU, 137 courses/programs could be found that relate to keyword IT or&lt;br /&gt;
cybersecurity. &amp;lt;ref name=&amp;quot;enisa&amp;quot;&amp;gt;ENISA (European Union Agency for Cybersecurity), &amp;quot;Cybersecurity Education-Cybersecurity Higher Education Database&amp;quot;. Available: https://www.enisa.europa.eu/topics/cybersecurity-education/education-map/education-courses [Accessed 26 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Also, there is a great amount of discussion, if cyber security&lt;br /&gt;
professional should have a degree or would be certification just enough.&lt;br /&gt;
One interesting table is produces by Franklin University that compares&lt;br /&gt;
benefits and/or drawbacks of each type of credential.&lt;br /&gt;
&amp;lt;ref name=&amp;quot;franklin&amp;quot;&amp;gt;Franklin University, &amp;quot;Is Getting a Master&#039;s Degree in Cyber Security Worth It?&amp;quot;. Available: https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
[[File:analystimage7.png|700px|thumb|Comparison degree vs Certificate &amp;lt;ref&amp;gt;&amp;quot;Comparison Table&amp;quot;. Available at https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
Certifications are generally good for people with little practical&lt;br /&gt;
experience because they are known quantities in the industry and can&lt;br /&gt;
help you get your foot in the door. They set a minimum knowledge bar.&lt;br /&gt;
But some certifications are viewed more favorably than others.&lt;br /&gt;
Certifications with renewal requirements are viewed better by hiring&lt;br /&gt;
managers, but they also more costly in the long run because of the need&lt;br /&gt;
for continuing education. Certifications are also good for showing&lt;br /&gt;
in-depth expertise in a specialization within cybersecurity. Depending&lt;br /&gt;
on your career goals, it may be advantageous to have a master’s&lt;br /&gt;
degree—which shows your breadth of knowledge, critical thinking and&lt;br /&gt;
leadership skills—and a certificate—which shows specific skill&lt;br /&gt;
competency.&amp;lt;ref name=&amp;quot;franklin&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
As IT (Cyber) Security is still a relatively young discipline,&lt;br /&gt;
universities and colleges are still figuring out which is the best&lt;br /&gt;
approach for their degrees. Study programmes and curricula in Cyber&lt;br /&gt;
Security are different. In general, here are the duration of Cyber&lt;br /&gt;
Security degrees:&lt;br /&gt;
&amp;lt;ref name=&amp;quot;studyportal&amp;quot;&amp;gt;Studyportals, &amp;quot;Why You Should Study a Cyber Security Degree in 2022&amp;quot;. Available: https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Bachelor’s degrees in Cyber Security take 3 or 4 years in most&lt;br /&gt;
countries.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Master’s courses in Cyber Security take between 1-2 years to&lt;br /&gt;
complete.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;PhD programmes in Cyber Security last 3-5 years. Some only take 1&lt;br /&gt;
or 2 years, but they are less common.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Generalization could me made that on bachelor level the general&lt;br /&gt;
knowledge about the cyber issues are obtained. On master level the&lt;br /&gt;
specialization courses are taken and the person can choose more specific&lt;br /&gt;
topics to study. It is on master level where strengths of the cyber&lt;br /&gt;
specialist can be developed further and up-do date knowledge obtained in&lt;br /&gt;
specifics. PhD is serious science and involves teaching, lot of&lt;br /&gt;
scientific work and writing for publications.&lt;br /&gt;
&lt;br /&gt;
==Salary==&lt;br /&gt;
&amp;lt;p&amp;gt;Even if the salary can be very different, compared to the skills and&lt;br /&gt;
experience, an generalization can be made. Cyber Security professionals&lt;br /&gt;
in CSIRT, and in other entities earn quite well, from the start. First,&lt;br /&gt;
some comparison from the United States. The average CSIRT analyst salary&lt;br /&gt;
in the USA is $97,500 per year or $50 per hour. Entry level positions&lt;br /&gt;
start at $48,875 per year while most experienced workers make up to&lt;br /&gt;
$135,373 per year.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.talent.com/salary?job=csirt+analyst&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;There are multiple positions you can occupy in this field. They have&lt;br /&gt;
in common great salaries and high demand for technical skills, attention&lt;br /&gt;
to details, problem-solving mentality, and the ability to analyze risks.&lt;br /&gt;
Here are the average annual salaries in the United States, according to&lt;br /&gt;
Payscale:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.payscale.com/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Cryptographer – 100,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Information Security Officer – 91,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Assessor – 90,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Engineer – 88,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Penetration Tester – 81,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Forensics Expert – 71,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Administrator – 65,000 USD&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When looking into salaries in Estonia, one can find that there is a&lt;br /&gt;
discussion that private sector is taking a toll from the public sector,&lt;br /&gt;
and that the salaries in important agencies, as Information System&lt;br /&gt;
Authority loose their employees to the better paid positions in private&lt;br /&gt;
sector.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://digi.geenius.ee/rubriik/uudis/kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad/&lt;br /&gt;
https://tehnika.postimees.ee/6887428/riigi-it-tootajate-palgamaarad-kasvasid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;But there is also a different view that average private sector worker&lt;br /&gt;
could be hired as a top specialist in public sector and then the payment&lt;br /&gt;
is higher. Nevertheless, it seems that the average payment in cyber&lt;br /&gt;
security sector is any way higher that in other parts of the&lt;br /&gt;
e-services.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://digi.geenius.ee/rubriik/uudis/5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka/&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
==SOC==&lt;br /&gt;
&amp;lt;p&amp;gt;A SOC is a facility where an organization’s network, applications,&lt;br /&gt;
and endpoints are monitored and defended. The term was adapted from&lt;br /&gt;
network operations centers (NOCs), where large telecommunication or&lt;br /&gt;
corporate networks are monitored. When network security became more of a&lt;br /&gt;
concern, security teams were formed within the NOCs, and eventually spun&lt;br /&gt;
off into larger organizations of their own as the responsibilities of&lt;br /&gt;
security teams grew increasingly complex and specialized. The security&lt;br /&gt;
staff working in a security operations center are often called the SOC&lt;br /&gt;
team.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Functions of the SOC team include, but are not limited to:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ol type=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Taking inventory of resources, to get a better understanding of the&lt;br /&gt;
structure they are protecting.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintanence of the system, by constantly making updates and adding&lt;br /&gt;
safeguards.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Monitoring the network for abnormalities with special tools.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Threat analysis of new attacks and vulnerabilities.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Responding to attacks, by acting as “first responders”. The SOC team&lt;br /&gt;
will shut down and/or isolate endpoints, deleting files and lowering the&lt;br /&gt;
impact as fast as possible.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Recovery of system stability and lost data. This may be done using&lt;br /&gt;
backups, restarting endpoints or reconfiguring systems.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Logging all actions on the system, to be later used for analysis or&lt;br /&gt;
forensics after an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigating the root cause of an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Auditing their own actions, to be in line with regulations of the&lt;br /&gt;
organization, industry or governing body.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.trellix.com/en-us/security-awareness/operations/what-is-soc.html&amp;lt;/p&amp;gt;&lt;br /&gt;
==CSIRT==&lt;br /&gt;
&amp;lt;p&amp;gt;A CSIRT is a group that responds to security incidents when they&lt;br /&gt;
occur. Key responsibilities of a CSIRT include: &lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
===Creating and maintaining an incident response plan (IRP)===&lt;br /&gt;
An incident response plan (IRP) is a set of written instructions for&lt;br /&gt;
detecting, responding to and limiting the effects of an information&lt;br /&gt;
security event. Incident response plans provide instructions for&lt;br /&gt;
responding to many potential scenarios, including data breaches, denial&lt;br /&gt;
of service/distributed denial of service attacks, firewall breaches,&lt;br /&gt;
virus or malware outbreaks or insider threats. Without an incident&lt;br /&gt;
response plan in place, organizations may either not detect the attack&lt;br /&gt;
in the first place, or not follow proper protocol to contain the threat&lt;br /&gt;
and recover from it when a breach is detected.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.stratacore.com/incidentresponseplan&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
===Investigating and analyzing incidents===&lt;br /&gt;
CSIRTs are also involved in improvement activities. After major&lt;br /&gt;
computer security incidents occur, or when incidents are not handled in&lt;br /&gt;
a timely or effective manner, a CSIRT will generally perform a&lt;br /&gt;
postmortem of the incident and its response. This postmortem will&lt;br /&gt;
identify the strengths and weakness of the response effort. Such reviews&lt;br /&gt;
can identify weaknesses and holes in systems, infrastructure defenses,&lt;br /&gt;
or policies that allowed the incident to take place. It can also&lt;br /&gt;
identify problems with communication channels, interfaces, and&lt;br /&gt;
procedures that inhibited the efficient resolution of the reported&lt;br /&gt;
problem.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.cisa.gov/uscert/bsi/articles/best-practices/incident-management/defining-computer-security-incident-response-teams&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Managing internal communications and updates during or immediately after incidents occur===&lt;br /&gt;
===Communicating with employees, shareholders, customers, and the press about incidents as needed===&lt;br /&gt;
&amp;lt;p&amp;gt;There are various services within the CSIRT Services Framework that&lt;br /&gt;
address communications, as they relate to security operations and&lt;br /&gt;
incident response services. Some of these include Information Security&lt;br /&gt;
Incident Coordination, Crisis Management Support, Vulnerability&lt;br /&gt;
Disclosure, Situational Awareness Communication, and Awareness Building,&lt;br /&gt;
to name a few. Sharing information and communicating with the general&lt;br /&gt;
public and/or your constituency is appropriate in many different&lt;br /&gt;
scenarios. These can range from proactive communications to reactive&lt;br /&gt;
communications. Each scenario may be unique, and careful consideration&lt;br /&gt;
should be given to when to release information to the public and what&lt;br /&gt;
information should be released.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;https://resources.sei.cmu.edu/asset_files/Handbook/2021_002_001_651819.pdf&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Remediating incidents===&lt;br /&gt;
Threat remediation is a strong and capable tool for fighting the&lt;br /&gt;
cyber security compromises. As the word ‘remedy’ suggests, remediation&lt;br /&gt;
process involves the treatment of a security breach. With the&lt;br /&gt;
remediation practices, your cyber security team is able to eliminate&lt;br /&gt;
suspicious activities and malicious attacks in the form of malware,&lt;br /&gt;
ransomware, phishing and such. Even if you ‘kill’ the suspicious&lt;br /&gt;
activity, the attackers can remain in your systems. If you want to&lt;br /&gt;
contaminate and end the problem for good, your remediation processes&lt;br /&gt;
must involve the detection of the cause. &amp;lt;ref name=&amp;quot;logsign&amp;quot;&amp;gt;Logsign, &amp;quot;What-is-remediation-in-cyber-security&amp;quot;. Available: https://www.logsign.com/blog/what-is-remediation-in-cyber-security/. [Accessed 28 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Recommending technology, policy, governance, and training changes after security incidents===&lt;br /&gt;
After all these actions, the SCIRT must contribute to the development&lt;br /&gt;
of better policies, practices and has to recommend improvements. They&lt;br /&gt;
are not working in the vacuum and their work has to create new and&lt;br /&gt;
better standards for cyber security. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;Exabeam, &amp;quot;CSIRT&amp;quot;. Available: https://www.exabeam.com/incident-response/csirt/ [Accessed 28 APr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==CERT==&lt;br /&gt;
&amp;lt;p&amp;gt;The term “computer emergency response team” was coined in 1988. In&lt;br /&gt;
response to the Morris worm attack that impacted thousands of servers on&lt;br /&gt;
the Internet, DARPA funded the formation of the Computer Emergency&lt;br /&gt;
Response Team Coordination Center (CERT-CC) at Carnegie Mellon&lt;br /&gt;
University. The goal of CERT-CC was to help protect the internet by&lt;br /&gt;
collecting and disseminating information on critical security&lt;br /&gt;
vulnerabilities. Several other countries formed similar centers using&lt;br /&gt;
the same acronym (despite threats of legal action by Carnegie Mellon for&lt;br /&gt;
trademark infringement). Now the term CERT refers to any emergency&lt;br /&gt;
response team that deals with cyber threats. Many people use CERT-CC&lt;br /&gt;
interchangeably with CSIRT, though the charter of a CERT is information&lt;br /&gt;
sharing in order to help other response teams respond to threats against&lt;br /&gt;
their own infrastructure.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In general, the designation of CERT is helpful in applying real-world&lt;br /&gt;
solutions to various cybersecurity problems. They may be government&lt;br /&gt;
contractors or employees of a major corporation. For example, the U.S.&lt;br /&gt;
Computer Emergency Readiness Team (US-CERT) operates under the U.S.&lt;br /&gt;
Department of Homeland Security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.techopedia.com/definition/31003/computer-emergency-response-team-cert&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In Estonia CERT is designated as CERT-EE. It was established in 2006,&lt;br /&gt;
as an organization responsible for the management of security incidents&lt;br /&gt;
in .ee computer networks. It is also a national contact point for&lt;br /&gt;
international co-operation in the field of IT security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ria.ee/en/cyber-security/cert-ee.html&amp;lt;/p&amp;gt;&lt;br /&gt;
===Difference between SOC/CSIRT/CERT===&lt;br /&gt;
&amp;lt;p&amp;gt;How CSIRTs differ from CERTs and SOCs There are overlapping&lt;br /&gt;
responsibilities between a community emergency response team (CERT),&lt;br /&gt;
computer security incident response team (CSIRT), and security&lt;br /&gt;
operations center (SOC). To add to this confusion, frequently, the terms&lt;br /&gt;
CERT and CSIRT are used interchangeably, despite the important&lt;br /&gt;
differences.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image3.png&amp;quot; alt=&amp;quot;Overlapping in images/image3.png&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;Overlapping in&lt;br /&gt;
images/image3.png&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
==Understand the primary roles and characteristics of a CERT, CSIRT, and SOC.==&lt;br /&gt;
&amp;lt;p&amp;gt;So, using strict definitions, a CERT collects and disseminates&lt;br /&gt;
security information, typically for the benefit of a country or an&lt;br /&gt;
industry. A CSIRT is a cross-functional team that responds to incidents&lt;br /&gt;
on behalf of a country or an organization. A SOC is where a country or&lt;br /&gt;
organization monitors and defends its network, servers, applications,&lt;br /&gt;
and endpoints.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image4.png&amp;quot; alt=&amp;quot;table of explanation images/image4&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;table of explanation&lt;br /&gt;
images/image4&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
==Future==&lt;br /&gt;
&amp;lt;p&amp;gt;And the Cyber security problem is only getting bigger. According to a&lt;br /&gt;
report published by Accenture, the number of cyber security breaches&lt;br /&gt;
increased by 11 percent from 2017 to 2018. The cost of such breaches is&lt;br /&gt;
astronomical–about $600 billion worldwide, according to the Economic&lt;br /&gt;
Impact of Cybercrime report.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Job projections for cybersecurity are staggering. The Bureau of Labor&lt;br /&gt;
Statistics in US predicts that careers in the cybersecurity field will&lt;br /&gt;
grow by 32% by 2028. That makes cybersecurity one of the top 10&lt;br /&gt;
fastest-growing jobs in the country. In the United States alone, jobs&lt;br /&gt;
for Information Security Analysts are expected to grow by 15% by&lt;br /&gt;
2024.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Most likely this trend is also similar in other countries.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When checking Estonian job portals, there is a constant need for&lt;br /&gt;
people for cyber security related positions. Also, linkedin search gives&lt;br /&gt;
approximately 30 vacancies immediately. There are banks, logistics&lt;br /&gt;
companies, e-shops, and software producers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://ee.linkedin.com/jobs/cyber-security-jobs?countryRedirected=1&amp;amp;amp;position=1&amp;amp;amp;pageNum=0&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Trends that affect companies create need for constant cyber security&lt;br /&gt;
services. Increasing number of home/remote offices require secure&lt;br /&gt;
corporate networks and security of remote devices. One example is from&lt;br /&gt;
this year, when sloppy remote desktop set-up paralyzed systems of 17&lt;br /&gt;
companies.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.aripaev.ee/uudised/2022/04/20/ria-lohakas-kaugtoolaua-seadistus-halvas-martsis-vahemalt-17-juhul-ettevotete-it-susteemid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Also, no service can exists without robust infrastructure - servers,&lt;br /&gt;
databases, applications. As all previously mentioned devices and&lt;br /&gt;
services are at constant scanning and surveillance. So, the breach&lt;br /&gt;
detection and immediate action demands 24/7 services. Even if lot of&lt;br /&gt;
things could be automated, there is a need for human specialists (at&lt;br /&gt;
least, at the moment). Third growing field is also a forensic&lt;br /&gt;
investigation, as every attack must be investigated in order to be ready&lt;br /&gt;
to repel next attacks. So data recovery and evidence collection is&lt;br /&gt;
another important field of work that need skilled and professional&lt;br /&gt;
workers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Even, if the specifics of the entity, be it CSIRT, CERT or SOC, are&lt;br /&gt;
different, the fundamentals of the work are the same. Professional&lt;br /&gt;
knowledge of the networks, operational systems, hardware, scripting, and&lt;br /&gt;
several other wider IT related knowledge is needed. As there is no&lt;br /&gt;
single way to reach to it, every single person can find one’s strongest&lt;br /&gt;
sides and develop them with knowledge of weaker side, in order to know,&lt;br /&gt;
when to as for help.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/body&amp;gt;&lt;br /&gt;
&amp;lt;/html&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mavald</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142197</id>
		<title>Hiring a Cyber Security Incident Analyst</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142197"/>
		<updated>2022-05-01T15:18:31Z</updated>

		<summary type="html">&lt;p&gt;Mavald: /* Entry-Level Incident Response Positions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==A Cyber Security Incident Analyst==&lt;br /&gt;
&lt;br /&gt;
[[File:image1.png|600px|thumb|Job advertisement &amp;lt;ref&amp;gt;&amp;quot;Job Advertisement&amp;quot;. Available at https://www.projectpeople.com/jobs/&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
===Cyber security incident analyst in SOC/CSIRT/CERT===&lt;br /&gt;
This article delves into the job title of Cyber Security Incident&lt;br /&gt;
Analyst and provides an overview of the acronyms SOC/CSIRT/CERT. A brief&lt;br /&gt;
history of the job is discussed here, as well as a possible career path,&lt;br /&gt;
education, experience, and other characteristics required for work in&lt;br /&gt;
computer security-related organizations. The article also provides a&lt;br /&gt;
brief history of SOC/CSIRT/CERT, as well as a comparison of their&lt;br /&gt;
differences and similarities.&lt;br /&gt;
===Cyber Security Incident Analyst Skill Set===&lt;br /&gt;
What skill set is expected from the Cyber Security Incident Analyst? Below written lines are taken from the same job advertisement depicted&lt;br /&gt;
on the left side of this article:&lt;br /&gt;
As a Security Incident Analyst your responsibilities will include:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Continuous monitoring of security tooling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Performing regular and ad-hoc vulnerability assessments&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Carrying out ‘spot checks’&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Reporting vulnerabilities to the PVG via the alerts system&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintaining and documenting logging systems&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Developing centralized logging, reporting and intelligence&lt;br /&gt;
platforms&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;‘Light touch’ penetration testing with open source tooling&lt;br /&gt;
(Metasploit)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Knowledge &amp;amp;amp; Experience required:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;SOC, CSIRT or CERT operational environment experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Windows / Linux experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TCP /IP networking protocol knowledge&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience reviewing and analyzing Security Events from various&lt;br /&gt;
monitoring and logging sources&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience in website and web application security assessment or&lt;br /&gt;
penetration testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience of using Metasploit&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Scripting knowledge using BASH, Python, Perl, Ruby&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Skills in Host and Network Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
As one can see the description of the duties is wide and also the&lt;br /&gt;
knowledge and experience that is required is noteworthy. So, where to&lt;br /&gt;
start to find out the way to get this kind of knowledge and&lt;br /&gt;
expertize.&lt;br /&gt;
===Possible career path===&lt;br /&gt;
Next part of the paper is aiming to depict a possible ways, how to&lt;br /&gt;
develop oneself, and move along the career pathway in cybersecurity&lt;br /&gt;
field. Topics of development, education, experience and certification&lt;br /&gt;
are covered.&lt;br /&gt;
[[File:analystimage2.png|1000px|thumb|Career path &amp;lt;ref&amp;gt;&amp;quot;Possible Career Path&amp;quot;. Available at https://www.cyberseek.org/pathway.html&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
===Junior/Senior===&lt;br /&gt;
Start with an entry-level job in IT. Hands-on experience is often the&lt;br /&gt;
most effective way to prepare for certification exams. Start&lt;br /&gt;
accumulating work experience with an entry-level role as a cybersecurity&lt;br /&gt;
analyst. Many cybersecurity professionals start off in more general IT&lt;br /&gt;
roles. The skills, practices, and technologies you’ll use as a&lt;br /&gt;
cybersecurity professional will continue to evolve along with computer&lt;br /&gt;
and network technology. The desire to learn, ability to problem solve,&lt;br /&gt;
and attention to detail will serve you well in this field. Other, more&lt;br /&gt;
technical skills and technologies to learn include:&amp;lt;ref name=&amp;quot;certification&amp;quot;&amp;gt;Popular Cyber Security Certificates [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications  [Accessed 25 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====SIEM tools (security information and event management)====&lt;br /&gt;
Security Information and Event Management (SIEM) is a set of tools&lt;br /&gt;
and services offering a holistic view of an organization’s information&lt;br /&gt;
security. SIEM works by combining two technologies:&lt;br /&gt;
&amp;lt;li&amp;gt;Security information management (SIM), which collects data from log&lt;br /&gt;
files for analysis and reports on security threats and events, and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;security event management (SEM), which conducts real-time system&lt;br /&gt;
monitoring, notifies network admins about important issues and&lt;br /&gt;
establishes correlations between security events. There are a number of&lt;br /&gt;
security information and event management solutions on the market.&lt;br /&gt;
ArcSight ESM, IBM QRadar and Splunk are among the most popular. &amp;lt;ref name=&amp;quot;SIEM&amp;quot;&amp;gt;Application security, SIEM [Online]. Available: https://www.imperva.com/learn/application-security/siem/. [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Firewalls, Intrusion Detection Systems (IDS), and Intrusion Prevention Systems(IPS)====&lt;br /&gt;
Firewalls can be two types, hardware and software firewalls. Software&lt;br /&gt;
firewall is a firewall that is installed on a computer or server, and&lt;br /&gt;
tasked with network security. It works with a wide variety of other&lt;br /&gt;
technology security solutions to provide more robust and cohesive&lt;br /&gt;
security for enterprises of all sizes. When a software firewall is&lt;br /&gt;
installed on a server, it opens up like an umbrella of protection over&lt;br /&gt;
all other computers connected to the network. It is able to monitor both&lt;br /&gt;
incoming and outgoing traffic for potential risk or suspicious user&lt;br /&gt;
behavior, and also makes setting security policies much easier, faster&lt;br /&gt;
and more flexible. Hardware firewall is positioned between the network&lt;br /&gt;
and devices, allowing traffic to funnel through the firewall for a close&lt;br /&gt;
inspection and analysis. A hardware firewall, a term often&lt;br /&gt;
interchangeable with network or next-generation firewall, protects the&lt;br /&gt;
network gateways for an enterprise. Hardware firewall is physical&lt;br /&gt;
hardware, installed between network elements and connected devices, and&lt;br /&gt;
is tasked with filtering traffic for cyber threat to the network or&lt;br /&gt;
devices. Filtering out unauthorized or suspicious users based on traffic&lt;br /&gt;
analysis is one of the biggest benefits of hardware firewall. &amp;lt;ref name=&amp;quot;sangfor&amp;quot;&amp;gt;Sangfor, &amp;quot;What is Software Firewall? Difference between Hardware Firewall and Software Firewall, [Online]. Available: https://www.sangfor.com/blog/cybersecurity/what-is-software-firewall-difference-between-hardware-firewall-and-software-firewall [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems&lt;br /&gt;
(IPS) are both parts of the network infrastructure. IDS/IPS compare&lt;br /&gt;
network packets to a cyberthreat database containing known signatures of&lt;br /&gt;
cyberattacks — and flag any matching packets. IDS doesn’t alter the&lt;br /&gt;
network packets in any way, whereas IPS prevents the packet from&lt;br /&gt;
delivery based on the contents of the packet, much like how a firewall&lt;br /&gt;
prevents traffic by IP address. &amp;lt;ref name=&amp;quot;Varonis&amp;quot;&amp;gt;Varonis, &amp;quot;What is Software Firewall? IDS vs. IPS: What is the Difference?, [Online]. Available: https://www.varonis.com/blog/ids-vs-ips [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Digital forensics====&lt;br /&gt;
Digital forensics is a branch of forensic science that focuses on&lt;br /&gt;
identifying, acquiring, processing, analyzing, and reporting on data&lt;br /&gt;
stored electronically. Electronic evidence is a component of almost all&lt;br /&gt;
criminal activities and digital forensics support is crucial for law&lt;br /&gt;
enforcement investigations. Electronic evidence can be collected from a&lt;br /&gt;
wide array of sources, such as computers, smartphones, remote storage,&lt;br /&gt;
unmanned aerial systems, shipborne equipment, and more.&amp;lt;ref name=&amp;quot;interpol&amp;quot;&amp;gt;Interpol, &amp;quot;Digital forensics&amp;quot;. Available: https://www.interpol.int/How-we-work/Innovation/Digital-forensics. [Accessed 28 4 2022].&amp;lt;/ref&amp;gt; &lt;br /&gt;
Investigative process of digital forensics can be divided into several stages. There are four major stages: preservation, collection,&lt;br /&gt;
examination, and analysis. All these four stages need a deep understanding of computers, technology across a broad spectrum, and cybersecurity principles and&lt;br /&gt;
practices, a working knowledge of computers, networks, and coding, in-depth investigative abilities, critical-thinking skills and analytical talent the ability to effectively communicate and work with a&lt;br /&gt;
wide range of people. &amp;lt;ref name=&amp;quot;ecpi&amp;quot;&amp;gt;&amp;quot;Digital forensics&amp;quot;. Available: https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me. [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Mobile device management====&lt;br /&gt;
Mobile device management (MDM) is software that allows IT&lt;br /&gt;
administrators to control, secure and enforce policies on smartphones,&lt;br /&gt;
tablets and other endpoints. Mobile device management software emerged&lt;br /&gt;
in the early 2000s as a way to control and secure the personal digital&lt;br /&gt;
assistants and smartphones that business workers began to use. The&lt;br /&gt;
consumer smartphone boom that started with the launch of the Apple&lt;br /&gt;
iPhone in 2007 led to the bring your own device (BYOD) trend, which&lt;br /&gt;
fueled further interest in MDM.&amp;lt;ref name=&amp;quot;techtarget&amp;quot;&amp;gt;Techtarget, &amp;quot;Mobile Device Management&amp;quot;. Available: https://www.techtarget.com/searchmobilecomputing/definition/mobile-device-management [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Data management====&lt;br /&gt;
Sometimes the data management is neglected, but this part has a&lt;br /&gt;
crucial role when learning for good cyber security practices. Majority&lt;br /&gt;
of cyber security programs include a special courses on data management.&lt;br /&gt;
Data management is a method of organizing and maintaining data processes&lt;br /&gt;
that are required in almost every business operations. The benefits of&lt;br /&gt;
data management can be found accounting, statistics, logistics planning&lt;br /&gt;
and other disciplines including corporate computing.&amp;lt;ref name=&amp;quot;GlobalUni&amp;quot;&amp;gt;Global Universities, &amp;quot;MSc Data Management and Cyber Security&amp;quot;. Available: https://globaluniversities.in/msc-data-management-cyber-security. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Data governance (and management) play a fundamental role in&lt;br /&gt;
protecting an organization’s data. Ensuring that the right people have&lt;br /&gt;
the right access and that appropriate security controls are in place to&lt;br /&gt;
protect each system or service, based on the criticality or sensitivity&lt;br /&gt;
of the data sets these contain. &amp;lt;ref name=&amp;quot;CyberMagazine&amp;quot;&amp;gt;Cyber Security Magazine, &amp;quot;The Role of Data Governance in Cybersecurity&amp;quot;. Available: https://cybersecurity-magazine.com/the-role-of-data-governance-in-cybersecurity/?utm_source=rss&amp;amp;amp;utm_medium=rss&amp;amp;amp;utm_campaign=the-role-of-data-governance-in-cybersecurity. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Application security development====&lt;br /&gt;
Application security describes security measures at the application&lt;br /&gt;
level that aim to prevent data or code within the app from being stolen&lt;br /&gt;
or hijacked. It encompasses the security considerations that happen&lt;br /&gt;
during application development and design, but it also involves systems&lt;br /&gt;
and approaches to protect apps after they get deployed. Application&lt;br /&gt;
security may include hardware, software, and procedures that identify or&lt;br /&gt;
minimize security vulnerabilities.&amp;lt;ref name=&amp;quot;vmware&amp;quot;&amp;gt;VmWare, &amp;quot;What is application security?&amp;quot;. Available: https://www.vmware.com/topics/glossary/content/application-security.html [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Application security development is important to ensure that your&lt;br /&gt;
application is free from coding errors and bugs. And controls the risk&lt;br /&gt;
and helps safeguard against security vulnerabilities. Application&lt;br /&gt;
security development is the process of making applications more secure&lt;br /&gt;
by finding and fixing security vulnerabilities. This is often done by&lt;br /&gt;
enforcing software security best practices and using application&lt;br /&gt;
security testing tools. &lt;br /&gt;
&amp;lt;ref name=&amp;quot;perforce&amp;quot;&amp;gt;Perforce, &amp;quot;Application Security Development Best Practices&amp;quot;. Available: https://www.perforce.com/blog/kw/application-security-development-best-practices. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Audit and compliance knowledge====&lt;br /&gt;
A cyber security audit is designed to be a comprehensive review and&lt;br /&gt;
analysis of your business’s IT infrastructure. It identifies threats and&lt;br /&gt;
vulnerabilities, exposing weaknesses and high-risk practices.&lt;br /&gt;
Regulations such as the EU GDPR (General Data Protection Regulation) can&lt;br /&gt;
impose hefty penalties in the event of a breach that results in&lt;br /&gt;
exploited data. A cyber security audit will help mitigate the&lt;br /&gt;
consequences of a breach and demonstrate that your organization has&lt;br /&gt;
taken the necessary steps to protect client and company data. &amp;lt;ref name=&amp;quot;cyforsecure&amp;quot;&amp;gt;Cyfor Secure, &amp;quot;What is a Cyber Security Audit and how can it help your organisation?&amp;quot;. Available: https://cyforsecure.co.uk/services/cyber-assessment/cyber-security-audit/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cybersecurity compliance is the organizational risk management method&lt;br /&gt;
aligned with pre-defined security measures &amp;amp;amp; controls on how data&lt;br /&gt;
confidentiality is ensured by its administrative procedures.&amp;lt;ref name=&amp;quot;nordlayer&amp;quot;&amp;gt;NordLayer, &amp;quot;Cybersecurity compliance: Everything you need to know&amp;quot;. Available: https://nordlayer.com/blog/cybersecurity-compliance-everything-you-need-to-know/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
All needed skills are developed through courses and certification.&lt;br /&gt;
&lt;br /&gt;
===Entry-Level Incident Response Positions===&lt;br /&gt;
It is not always possible to advance to the position of incident&lt;br /&gt;
responder in a straight line. Many professionals advance from entry- to&lt;br /&gt;
mid-level positions before becoming a real incident responder or a&lt;br /&gt;
member of a computer emergency response team (CERT).&amp;lt;br /&amp;gt;&lt;br /&gt;
These are some examples: &amp;lt;ref name=&amp;quot;Infosec&amp;quot;&amp;gt;Infosec, &amp;quot;Incident Responder Career Roadmap: From Entry Level to Executive&amp;quot;. Available: https://resources.infosecinstitute.com/topic/incident-responder-career-roadmap-entry-level-executive/ [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;network-administrator&amp;quot;&amp;gt;Network administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;This position’s experience will help potential incident responders&lt;br /&gt;
develop networking skills. Attention to detail, as well as the ability&lt;br /&gt;
to sift through system configurations, site layouts, and general network&lt;br /&gt;
and communication setups, are essential in this field.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;system-administrator&amp;quot;&amp;gt;System administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Another crucial beginning point for an incident responder is to learn&lt;br /&gt;
how to manage resources inside your organization as well as user&lt;br /&gt;
behavior. Understanding the potential damage that users, inadequate&lt;br /&gt;
security setups, and ineffective IT policies and procedures can cause on&lt;br /&gt;
your network can provide prospective candidates with insight into the&lt;br /&gt;
human component of an incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;security-administrator&amp;quot;&amp;gt;Security administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In such a position, basic hacking skills, penetration testing, and&lt;br /&gt;
intrusion detection are all learned, which are crucial incident&lt;br /&gt;
responder skills when trying to replicate a breach or attack.&lt;br /&gt;
Understanding the paths a cybercriminal will take when attempting to&lt;br /&gt;
damage or obtain access to a system can greatly simplify the work of&lt;br /&gt;
reverse engineering the incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Mid-Level Incident Response Positions ===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5&lt;br /&gt;
id=&amp;quot;computer-security-incident-response-team-csirt-engineer&amp;quot;&amp;gt;Computer&lt;br /&gt;
security incident response team (CSIRT) engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;cyber-incident-responder&amp;quot;&amp;gt;Cyber incident responder&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-response-engineer&amp;quot;&amp;gt;Incident response&lt;br /&gt;
engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;While each of these positions is different, they generally require&lt;br /&gt;
very similar skills and characteristics in a candidate. At this level,&lt;br /&gt;
personal characteristics such as problem solving, time management, and&lt;br /&gt;
even presentation skills become more crucial as one’s career evolves&lt;br /&gt;
into a management-facing role.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Technical skills include the ability to identify and minimize threats&lt;br /&gt;
while maintaining communication with management and the rest of your&lt;br /&gt;
team. Data analysis and evidence gathering become increasingly crucial,&lt;br /&gt;
and the circumstances in which your services are deployed get more&lt;br /&gt;
serious.&amp;lt;/p&amp;gt;&lt;br /&gt;
Problem-solving skills are crucial at this level of incident&lt;br /&gt;
response, and as the stakes rise, so does the pressure in each&lt;br /&gt;
situation. At this level, programming abilities are essential since&lt;br /&gt;
incident responders may be needed to reverse engineer malicious code or&lt;br /&gt;
even create patches for vulnerable network applications or services. &amp;lt;ref name=&amp;quot;coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated]&amp;quot;. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Senior-Level Incident Response Positions===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;intrusion-detection-specialist&amp;quot;&amp;gt;Intrusion detection&lt;br /&gt;
specialist:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;A CISSP certification might help a potential candidate in preparing&lt;br /&gt;
for the profession. The role of an intrusion detection specialist is to&lt;br /&gt;
find and stop any unwanted communications.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-manager&amp;quot;&amp;gt;Incident manager:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Expected to plan, oversee, manage, and supervise all incident&lt;br /&gt;
response team actions. Is in charge of reporting all current events to&lt;br /&gt;
senior management and stakeholders, as well as acting as the technical&lt;br /&gt;
lead on active incidents for incident responders. Prepares threat and&lt;br /&gt;
impact assessments and reports them known to management.&amp;lt;ref name=&amp;quot;coursera&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Certificates== &lt;br /&gt;
There is a vast number of different certificates and the road map to&lt;br /&gt;
being a certified professional could be very different&amp;lt;ref name=&amp;quot;Coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated],&amp;quot; [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;NICCS&amp;quot;&amp;gt;NICCS, &amp;quot;Cybersecurity Certifications,&amp;quot; [Online]. Available: hhttps://niccs.cisa.gov/about-niccs/cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt; . One possible&lt;br /&gt;
approach is to start with basic certificates from the different branches&lt;br /&gt;
of service and move to more specific and demanding focused&lt;br /&gt;
certification. Also, some jobs require certain clearances, either from&lt;br /&gt;
industry, or from the government. One small selection of different&lt;br /&gt;
possible certificates is brought out in following paragraphs.&lt;br /&gt;
&lt;br /&gt;
Security+ is a CompTIA certification that is considered a basic cert&lt;br /&gt;
among cybersecurity professionals. It covers the topics of risk&lt;br /&gt;
management and threat assessment.&lt;br /&gt;
Network+ is also offered by CompTIA this certification (like the name&lt;br /&gt;
implies) focuses on networking infrastructure and operations. It is&lt;br /&gt;
considered a foundational certification.&lt;br /&gt;
The Certified Information Systems Security Professional (CISSP) is a&lt;br /&gt;
more advanced certification designed for cybersecurity professionals&lt;br /&gt;
with at least five years of work experience. The certification covers&lt;br /&gt;
topics such as architecture, engineering, and management.&amp;lt;/p&amp;gt;&lt;br /&gt;
The Certified Ethical Hacker (CEH) certification is also considered a&lt;br /&gt;
more advanced cert because it generally requires that applicants have&lt;br /&gt;
multiple years of work experience. The goal of an ethical hacker&lt;br /&gt;
certification is to be able to understand how cyber attacks unfold in&lt;br /&gt;
order to improve threat assessment and mitigation skills.&amp;lt;ref name=&amp;quot;cyberguide&amp;quot;&amp;gt;Cybersecurity Guide, &amp;quot;How to become a cybersecurity specialist&amp;quot;, [Online]. Available: https://cybersecurityguide.org/careers/security-specialist/. [Accessed 27 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
This is definitely not all, when one looks for more information, following link could be searched, to get more in depth knowledge about&lt;br /&gt;
different possibilities. Hereby, with the help of this matrix a possible taxonomy of different 436 listed certificates in branches are&lt;br /&gt;
presented.&amp;lt;ref name=&amp;quot;Pauljeremy&amp;quot;&amp;gt;&amp;quot;Cybersecurity Roadmap,&amp;quot; [Online]. Available: https://pauljerimy.com/2020/10/12/scr-oct-2020-update/. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:analystimage5.png|1000px|thumb|Certificate matrix &amp;lt;ref&amp;gt;&amp;quot;Certification roadmap&amp;quot;. Available at https://pauljerimy.com/security-certification-roadmap&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
=== Communication and Network Security===&lt;br /&gt;
Communication and network security covers the ability to secure&lt;br /&gt;
communication channels and networks. Topics include secure and converges&lt;br /&gt;
protocols, wireless networks, cellular networks, hardware operations&lt;br /&gt;
(warranty and redundant power), and third-party connectivity. IP&lt;br /&gt;
networking are also included in this domain.&lt;br /&gt;
===Identity and Access Management===&lt;br /&gt;
The identity and access management domain covers the attacks that&lt;br /&gt;
target the human gateway to gain access to data. Other topics include&lt;br /&gt;
ways to identify users with rights to access the information and&lt;br /&gt;
servers. Identity and access management covers the topics of&lt;br /&gt;
applications, Single sign-on authentication, privilege escalation,&lt;br /&gt;
Kerberos, rule-based or risk-based access control, proofing and&lt;br /&gt;
establishment of identity.&lt;br /&gt;
===Security Architecture and Engineering===&lt;br /&gt;
The security architecture and engineering domain covers important&lt;br /&gt;
topics concerning security engineering plans, designs and principles,&lt;br /&gt;
Topics include assessing and mitigating information system&lt;br /&gt;
vulnerabilities, fundamental concepts of security models and security&lt;br /&gt;
architectures in critical areas like access control. Cloud systems,&lt;br /&gt;
cryptography, system infiltrations (ransomware, fault-injection and&lt;br /&gt;
more) and virtualized systems are also covered in this domain.&lt;br /&gt;
===Asset Security===&lt;br /&gt;
The Asset Security domain deals with the issues related to the&lt;br /&gt;
collection, storage, maintenance, retention and destruction of data. It&lt;br /&gt;
also covers knowledge of different roles regarding data handling (owner,&lt;br /&gt;
controller and custodian) as well as data protection methods and data&lt;br /&gt;
states. Other topics include resource provision, asset classification&lt;br /&gt;
and data lifecycle management.&lt;br /&gt;
===Security and Risk Management===&lt;br /&gt;
The security and risk management domain covers general on skills&lt;br /&gt;
related to the implementation of user awareness programs as well as&lt;br /&gt;
security procedures. Emphasis is also placed on risk management&lt;br /&gt;
concerning the acquisition of new services, hardware and software&lt;br /&gt;
(supply chain). Other skills include social engineering defense&lt;br /&gt;
mechanisms.&lt;br /&gt;
===Security Assessment and Testing===&lt;br /&gt;
The security assessment and testing domain deals with all the&lt;br /&gt;
techniques and tools used to find system vulnerabilities, weaknesses and&lt;br /&gt;
potential areas of concern not addressed by security procedures and&lt;br /&gt;
policies. Attack simulations, vulnerability assessment, compliance&lt;br /&gt;
checks, and ethical disclosure also fall under this domain.&lt;br /&gt;
===Software Security===&lt;br /&gt;
The software development security domain deals with implementing&lt;br /&gt;
software-based security protocols within environment for which the IT&lt;br /&gt;
professional is responsible. Risk analysis, vulnerability identification&lt;br /&gt;
and auditing of source codes are all covered in this subset. Additional&lt;br /&gt;
topics include software-designed security, maturity models, development&lt;br /&gt;
methodologies, open-source and third-party development security.&lt;br /&gt;
===Security operations===&lt;br /&gt;
The security operations domain covers topics ranging from&lt;br /&gt;
investigations and digital forensic to detection and intrusion&lt;br /&gt;
prevention tools, sandboxing and firewalls. Topics include user and&lt;br /&gt;
entity behavior analytics, threat intelligence (threat hunting and&lt;br /&gt;
threat feeds) log management, artifacts (mobile, computer and network),&lt;br /&gt;
machine learning and AI-based tools, penetration testing, and&lt;br /&gt;
exploitation development. These for sub-domains are lister here.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Incident Handling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Penetration Testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Exploitation&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Education==&lt;br /&gt;
&amp;lt;p&amp;gt;The entry level monitoring specialist is hired by Estonian&lt;br /&gt;
Information System Authority even if there is no formal IT education,&lt;br /&gt;
but readiness to learn and moderate knowledge of different operation&lt;br /&gt;
systems is enough to start the career.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.cv.ee/en/vacancy/792782/riigi-infosusteemi-amet/seirespetsialist-tule-eesti-kuberruumi-valvuriks&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Nevertheless, like most other high qualification careers jobs falling&lt;br /&gt;
under the cybersecurity specialist category require some form of formal&lt;br /&gt;
education. However, since cybersecurity specialist jobs can fall across&lt;br /&gt;
a wide spectrum of job descriptions and responsibilities, it is possible&lt;br /&gt;
to obtain a specialist job after completing many levels of different&lt;br /&gt;
computer related education.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;If one is looking for a cybersecurity related education, for example&lt;br /&gt;
in EU, 137 courses/programs could be found that relate to keyword IT or&lt;br /&gt;
cybersecurity.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.enisa.europa.eu/topics/cybersecurity-education/education-map/education-courses&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Also, there is a great amount of discussion, if cuber security&lt;br /&gt;
professional should have a degree or would be certification just enough.&lt;br /&gt;
One interesting table is produces by Franklin University that compares&lt;br /&gt;
benefits and/or drawbacks of each type of credential.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image11.png&amp;quot; alt=&amp;quot;Comparison MSc vs certificate&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;Comparison MSc vs&lt;br /&gt;
certificate&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Certifications are generally good for people with little practical&lt;br /&gt;
experience because they are known quantities in the industry and can&lt;br /&gt;
help you get your foot in the door. They set a minimum knowledge bar.&lt;br /&gt;
But some certifications are viewed more favorably than others.&lt;br /&gt;
Certifications with renewal requirements are viewed better by hiring&lt;br /&gt;
managers, but they also more costly in the long run because of the need&lt;br /&gt;
for continuing education. Certifications are also good for showing&lt;br /&gt;
in-depth expertise in a specialization within cybersecurity. Depending&lt;br /&gt;
on your career goals, it may be advantageous to have a master’s&lt;br /&gt;
degree—which shows your breadth of knowledge, critical thinking and&lt;br /&gt;
leadership skills—and a certificate—which shows specific skill&lt;br /&gt;
competency.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;As IT (Cyber) Security is still a relatively young discipline,&lt;br /&gt;
universities and colleges are still figuring out which is the best&lt;br /&gt;
approach for their degrees. Study programmes and curricula in Cyber&lt;br /&gt;
Security are different. In general, here are the duration of Cyber&lt;br /&gt;
Security degrees:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Bachelor’s degrees in Cyber Security take 3 or 4 years in most&lt;br /&gt;
countries.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Master’s courses in Cyber Security take between 1-2 years to&lt;br /&gt;
complete.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;PhD programmes in Cyber Security last 3-5 years. Some only take 1&lt;br /&gt;
or 2 years, but they are less common.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Generalization could me made that on bachelor level the general&lt;br /&gt;
knowledge about the cyber issues are obtained. On master level the&lt;br /&gt;
specialization courses are taken and the person can choose more specific&lt;br /&gt;
topics to study. It is on master level where strengths of the cyber&lt;br /&gt;
specialist can be developed further and up-do date knowledge obtained in&lt;br /&gt;
specifics. PhD is serious science and involves teaching, lot of&lt;br /&gt;
scientific work and writing for publications.&amp;lt;/p&amp;gt;&lt;br /&gt;
==Salary==&lt;br /&gt;
&amp;lt;p&amp;gt;Even if the salary can be very different, compared to the skills and&lt;br /&gt;
experience, an generalization can be made. Cyber Security professionals&lt;br /&gt;
in CSIRT, and in other entities earn quite well, from the start. First,&lt;br /&gt;
some comparison from the United States. The average CSIRT analyst salary&lt;br /&gt;
in the USA is $97,500 per year or $50 per hour. Entry level positions&lt;br /&gt;
start at $48,875 per year while most experienced workers make up to&lt;br /&gt;
$135,373 per year.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.talent.com/salary?job=csirt+analyst&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;There are multiple positions you can occupy in this field. They have&lt;br /&gt;
in common great salaries and high demand for technical skills, attention&lt;br /&gt;
to details, problem-solving mentality, and the ability to analyze risks.&lt;br /&gt;
Here are the average annual salaries in the United States, according to&lt;br /&gt;
Payscale:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.payscale.com/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Cryptographer – 100,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Information Security Officer – 91,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Assessor – 90,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Engineer – 88,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Penetration Tester – 81,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Forensics Expert – 71,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Administrator – 65,000 USD&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When looking into salaries in Estonia, one can find that there is a&lt;br /&gt;
discussion that private sector is taking a toll from the public sector,&lt;br /&gt;
and that the salaries in important agencies, as Information System&lt;br /&gt;
Authority loose their employees to the better paid positions in private&lt;br /&gt;
sector.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://digi.geenius.ee/rubriik/uudis/kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad/&lt;br /&gt;
https://tehnika.postimees.ee/6887428/riigi-it-tootajate-palgamaarad-kasvasid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;But there is also a different view that average private sector worker&lt;br /&gt;
could be hired as a top specialist in public sector and then the payment&lt;br /&gt;
is higher. Nevertheless, it seems that the average payment in cyber&lt;br /&gt;
security sector is any way higher that in other parts of the&lt;br /&gt;
e-services.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://digi.geenius.ee/rubriik/uudis/5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka/&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
==SOC==&lt;br /&gt;
&amp;lt;p&amp;gt;A SOC is a facility where an organization’s network, applications,&lt;br /&gt;
and endpoints are monitored and defended. The term was adapted from&lt;br /&gt;
network operations centers (NOCs), where large telecommunication or&lt;br /&gt;
corporate networks are monitored. When network security became more of a&lt;br /&gt;
concern, security teams were formed within the NOCs, and eventually spun&lt;br /&gt;
off into larger organizations of their own as the responsibilities of&lt;br /&gt;
security teams grew increasingly complex and specialized. The security&lt;br /&gt;
staff working in a security operations center are often called the SOC&lt;br /&gt;
team.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Functions of the SOC team include, but are not limited to:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ol type=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Taking inventory of resources, to get a better understanding of the&lt;br /&gt;
structure they are protecting.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintanence of the system, by constantly making updates and adding&lt;br /&gt;
safeguards.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Monitoring the network for abnormalities with special tools.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Threat analysis of new attacks and vulnerabilities.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Responding to attacks, by acting as “first responders”. The SOC team&lt;br /&gt;
will shut down and/or isolate endpoints, deleting files and lowering the&lt;br /&gt;
impact as fast as possible.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Recovery of system stability and lost data. This may be done using&lt;br /&gt;
backups, restarting endpoints or reconfiguring systems.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Logging all actions on the system, to be later used for analysis or&lt;br /&gt;
forensics after an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigating the root cause of an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Auditing their own actions, to be in line with regulations of the&lt;br /&gt;
organization, industry or governing body.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.trellix.com/en-us/security-awareness/operations/what-is-soc.html&amp;lt;/p&amp;gt;&lt;br /&gt;
==CSIRT==&lt;br /&gt;
&amp;lt;p&amp;gt;A CSIRT is a group that responds to security incidents when they&lt;br /&gt;
occur. Key responsibilities of a CSIRT include: &lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
===Creating and maintaining an incident response plan (IRP)===&lt;br /&gt;
An incident response plan (IRP) is a set of written instructions for&lt;br /&gt;
detecting, responding to and limiting the effects of an information&lt;br /&gt;
security event. Incident response plans provide instructions for&lt;br /&gt;
responding to many potential scenarios, including data breaches, denial&lt;br /&gt;
of service/distributed denial of service attacks, firewall breaches,&lt;br /&gt;
virus or malware outbreaks or insider threats. Without an incident&lt;br /&gt;
response plan in place, organizations may either not detect the attack&lt;br /&gt;
in the first place, or not follow proper protocol to contain the threat&lt;br /&gt;
and recover from it when a breach is detected.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.stratacore.com/incidentresponseplan&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
===Investigating and analyzing incidents===&lt;br /&gt;
CSIRTs are also involved in improvement activities. After major&lt;br /&gt;
computer security incidents occur, or when incidents are not handled in&lt;br /&gt;
a timely or effective manner, a CSIRT will generally perform a&lt;br /&gt;
postmortem of the incident and its response. This postmortem will&lt;br /&gt;
identify the strengths and weakness of the response effort. Such reviews&lt;br /&gt;
can identify weaknesses and holes in systems, infrastructure defenses,&lt;br /&gt;
or policies that allowed the incident to take place. It can also&lt;br /&gt;
identify problems with communication channels, interfaces, and&lt;br /&gt;
procedures that inhibited the efficient resolution of the reported&lt;br /&gt;
problem.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.cisa.gov/uscert/bsi/articles/best-practices/incident-management/defining-computer-security-incident-response-teams&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Managing internal communications and updates during or immediately after incidents occur===&lt;br /&gt;
===Communicating with employees, shareholders, customers, and the press about incidents as needed===&lt;br /&gt;
&amp;lt;p&amp;gt;There are various services within the CSIRT Services Framework that&lt;br /&gt;
address communications, as they relate to security operations and&lt;br /&gt;
incident response services. Some of these include Information Security&lt;br /&gt;
Incident Coordination, Crisis Management Support, Vulnerability&lt;br /&gt;
Disclosure, Situational Awareness Communication, and Awareness Building,&lt;br /&gt;
to name a few. Sharing information and communicating with the general&lt;br /&gt;
public and/or your constituency is appropriate in many different&lt;br /&gt;
scenarios. These can range from proactive communications to reactive&lt;br /&gt;
communications. Each scenario may be unique, and careful consideration&lt;br /&gt;
should be given to when to release information to the public and what&lt;br /&gt;
information should be released.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;https://resources.sei.cmu.edu/asset_files/Handbook/2021_002_001_651819.pdf&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Remediating incidents===&lt;br /&gt;
Threat remediation is a strong and capable tool for fighting the&lt;br /&gt;
cyber security compromises. As the word ‘remedy’ suggests, remediation&lt;br /&gt;
process involves the treatment of a security breach. With the&lt;br /&gt;
remediation practices, your cyber security team is able to eliminate&lt;br /&gt;
suspicious activities and malicious attacks in the form of malware,&lt;br /&gt;
ransomware, phishing and such. Even if you ‘kill’ the suspicious&lt;br /&gt;
activity, the attackers can remain in your systems. If you want to&lt;br /&gt;
contaminate and end the problem for good, your remediation processes&lt;br /&gt;
must involve the detection of the cause. &amp;lt;ref name=&amp;quot;logsign&amp;quot;&amp;gt;Logsign, &amp;quot;What-is-remediation-in-cyber-security&amp;quot;. Available: https://www.logsign.com/blog/what-is-remediation-in-cyber-security/. [Accessed 28 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Recommending technology, policy, governance, and training changes after security incidents===&lt;br /&gt;
After all these actions, the SCIRT must contribute to the development&lt;br /&gt;
of better policies, practices and has to recommend improvements. They&lt;br /&gt;
are not working in the vacuum and their work has to create new and&lt;br /&gt;
better standards for cyber security. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;Exabeam, &amp;quot;CSIRT&amp;quot;. Available: https://www.exabeam.com/incident-response/csirt/ [Accessed 28 APr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==CERT==&lt;br /&gt;
&amp;lt;p&amp;gt;The term “computer emergency response team” was coined in 1988. In&lt;br /&gt;
response to the Morris worm attack that impacted thousands of servers on&lt;br /&gt;
the Internet, DARPA funded the formation of the Computer Emergency&lt;br /&gt;
Response Team Coordination Center (CERT-CC) at Carnegie Mellon&lt;br /&gt;
University. The goal of CERT-CC was to help protect the internet by&lt;br /&gt;
collecting and disseminating information on critical security&lt;br /&gt;
vulnerabilities. Several other countries formed similar centers using&lt;br /&gt;
the same acronym (despite threats of legal action by Carnegie Mellon for&lt;br /&gt;
trademark infringement). Now the term CERT refers to any emergency&lt;br /&gt;
response team that deals with cyber threats. Many people use CERT-CC&lt;br /&gt;
interchangeably with CSIRT, though the charter of a CERT is information&lt;br /&gt;
sharing in order to help other response teams respond to threats against&lt;br /&gt;
their own infrastructure.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In general, the designation of CERT is helpful in applying real-world&lt;br /&gt;
solutions to various cybersecurity problems. They may be government&lt;br /&gt;
contractors or employees of a major corporation. For example, the U.S.&lt;br /&gt;
Computer Emergency Readiness Team (US-CERT) operates under the U.S.&lt;br /&gt;
Department of Homeland Security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.techopedia.com/definition/31003/computer-emergency-response-team-cert&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In Estonia CERT is designated as CERT-EE. It was established in 2006,&lt;br /&gt;
as an organization responsible for the management of security incidents&lt;br /&gt;
in .ee computer networks. It is also a national contact point for&lt;br /&gt;
international co-operation in the field of IT security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ria.ee/en/cyber-security/cert-ee.html&amp;lt;/p&amp;gt;&lt;br /&gt;
===Difference between SOC/CSIRT/CERT===&lt;br /&gt;
&amp;lt;p&amp;gt;How CSIRTs differ from CERTs and SOCs There are overlapping&lt;br /&gt;
responsibilities between a community emergency response team (CERT),&lt;br /&gt;
computer security incident response team (CSIRT), and security&lt;br /&gt;
operations center (SOC). To add to this confusion, frequently, the terms&lt;br /&gt;
CERT and CSIRT are used interchangeably, despite the important&lt;br /&gt;
differences.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image3.png&amp;quot; alt=&amp;quot;Overlapping in images/image3.png&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;Overlapping in&lt;br /&gt;
images/image3.png&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
==Understand the primary roles and characteristics of a CERT, CSIRT, and SOC.==&lt;br /&gt;
&amp;lt;p&amp;gt;So, using strict definitions, a CERT collects and disseminates&lt;br /&gt;
security information, typically for the benefit of a country or an&lt;br /&gt;
industry. A CSIRT is a cross-functional team that responds to incidents&lt;br /&gt;
on behalf of a country or an organization. A SOC is where a country or&lt;br /&gt;
organization monitors and defends its network, servers, applications,&lt;br /&gt;
and endpoints.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image4.png&amp;quot; alt=&amp;quot;table of explanation images/image4&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;table of explanation&lt;br /&gt;
images/image4&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
==Future==&lt;br /&gt;
&amp;lt;p&amp;gt;And the Cyber security problem is only getting bigger. According to a&lt;br /&gt;
report published by Accenture, the number of cyber security breaches&lt;br /&gt;
increased by 11 percent from 2017 to 2018. The cost of such breaches is&lt;br /&gt;
astronomical–about $600 billion worldwide, according to the Economic&lt;br /&gt;
Impact of Cybercrime report.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Job projections for cybersecurity are staggering. The Bureau of Labor&lt;br /&gt;
Statistics in US predicts that careers in the cybersecurity field will&lt;br /&gt;
grow by 32% by 2028. That makes cybersecurity one of the top 10&lt;br /&gt;
fastest-growing jobs in the country. In the United States alone, jobs&lt;br /&gt;
for Information Security Analysts are expected to grow by 15% by&lt;br /&gt;
2024.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Most likely this trend is also similar in other countries.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When checking Estonian job portals, there is a constant need for&lt;br /&gt;
people for cyber security related positions. Also, linkedin search gives&lt;br /&gt;
approximately 30 vacancies immediately. There are banks, logistics&lt;br /&gt;
companies, e-shops, and software producers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://ee.linkedin.com/jobs/cyber-security-jobs?countryRedirected=1&amp;amp;amp;position=1&amp;amp;amp;pageNum=0&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Trends that affect companies create need for constant cyber security&lt;br /&gt;
services. Increasing number of home/remote offices require secure&lt;br /&gt;
corporate networks and security of remote devices. One example is from&lt;br /&gt;
this year, when sloppy remote desktop set-up paralyzed systems of 17&lt;br /&gt;
companies.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.aripaev.ee/uudised/2022/04/20/ria-lohakas-kaugtoolaua-seadistus-halvas-martsis-vahemalt-17-juhul-ettevotete-it-susteemid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Also, no service can exists without robust infrastructure - servers,&lt;br /&gt;
databases, applications. As all previously mentioned devices and&lt;br /&gt;
services are at constant scanning and surveillance. So, the breach&lt;br /&gt;
detection and immediate action demands 24/7 services. Even if lot of&lt;br /&gt;
things could be automated, there is a need for human specialists (at&lt;br /&gt;
least, at the moment). Third growing field is also a forensic&lt;br /&gt;
investigation, as every attack must be investigated in order to be ready&lt;br /&gt;
to repel next attacks. So data recovery and evidence collection is&lt;br /&gt;
another important field of work that need skilled and professional&lt;br /&gt;
workers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Even, if the specifics of the entity, be it CSIRT, CERT or SOC, are&lt;br /&gt;
different, the fundamentals of the work are the same. Professional&lt;br /&gt;
knowledge of the networks, operational systems, hardware, scripting, and&lt;br /&gt;
several other wider IT related knowledge is needed. As there is no&lt;br /&gt;
single way to reach to it, every single person can find one’s strongest&lt;br /&gt;
sides and develop them with knowledge of weaker side, in order to know,&lt;br /&gt;
when to as for help.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/body&amp;gt;&lt;br /&gt;
&amp;lt;/html&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mavald</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142196</id>
		<title>Hiring a Cyber Security Incident Analyst</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142196"/>
		<updated>2022-05-01T15:18:15Z</updated>

		<summary type="html">&lt;p&gt;Mavald: /* Entry-Level Incident Response Positions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==A Cyber Security Incident Analyst==&lt;br /&gt;
&lt;br /&gt;
[[File:image1.png|600px|thumb|Job advertisement &amp;lt;ref&amp;gt;&amp;quot;Job Advertisement&amp;quot;. Available at https://www.projectpeople.com/jobs/&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
===Cyber security incident analyst in SOC/CSIRT/CERT===&lt;br /&gt;
This article delves into the job title of Cyber Security Incident&lt;br /&gt;
Analyst and provides an overview of the acronyms SOC/CSIRT/CERT. A brief&lt;br /&gt;
history of the job is discussed here, as well as a possible career path,&lt;br /&gt;
education, experience, and other characteristics required for work in&lt;br /&gt;
computer security-related organizations. The article also provides a&lt;br /&gt;
brief history of SOC/CSIRT/CERT, as well as a comparison of their&lt;br /&gt;
differences and similarities.&lt;br /&gt;
===Cyber Security Incident Analyst Skill Set===&lt;br /&gt;
What skill set is expected from the Cyber Security Incident Analyst? Below written lines are taken from the same job advertisement depicted&lt;br /&gt;
on the left side of this article:&lt;br /&gt;
As a Security Incident Analyst your responsibilities will include:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Continuous monitoring of security tooling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Performing regular and ad-hoc vulnerability assessments&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Carrying out ‘spot checks’&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Reporting vulnerabilities to the PVG via the alerts system&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintaining and documenting logging systems&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Developing centralized logging, reporting and intelligence&lt;br /&gt;
platforms&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;‘Light touch’ penetration testing with open source tooling&lt;br /&gt;
(Metasploit)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Knowledge &amp;amp;amp; Experience required:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;SOC, CSIRT or CERT operational environment experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Windows / Linux experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TCP /IP networking protocol knowledge&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience reviewing and analyzing Security Events from various&lt;br /&gt;
monitoring and logging sources&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience in website and web application security assessment or&lt;br /&gt;
penetration testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience of using Metasploit&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Scripting knowledge using BASH, Python, Perl, Ruby&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Skills in Host and Network Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
As one can see the description of the duties is wide and also the&lt;br /&gt;
knowledge and experience that is required is noteworthy. So, where to&lt;br /&gt;
start to find out the way to get this kind of knowledge and&lt;br /&gt;
expertize.&lt;br /&gt;
===Possible career path===&lt;br /&gt;
Next part of the paper is aiming to depict a possible ways, how to&lt;br /&gt;
develop oneself, and move along the career pathway in cybersecurity&lt;br /&gt;
field. Topics of development, education, experience and certification&lt;br /&gt;
are covered.&lt;br /&gt;
[[File:analystimage2.png|1000px|thumb|Career path &amp;lt;ref&amp;gt;&amp;quot;Possible Career Path&amp;quot;. Available at https://www.cyberseek.org/pathway.html&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
===Junior/Senior===&lt;br /&gt;
Start with an entry-level job in IT. Hands-on experience is often the&lt;br /&gt;
most effective way to prepare for certification exams. Start&lt;br /&gt;
accumulating work experience with an entry-level role as a cybersecurity&lt;br /&gt;
analyst. Many cybersecurity professionals start off in more general IT&lt;br /&gt;
roles. The skills, practices, and technologies you’ll use as a&lt;br /&gt;
cybersecurity professional will continue to evolve along with computer&lt;br /&gt;
and network technology. The desire to learn, ability to problem solve,&lt;br /&gt;
and attention to detail will serve you well in this field. Other, more&lt;br /&gt;
technical skills and technologies to learn include:&amp;lt;ref name=&amp;quot;certification&amp;quot;&amp;gt;Popular Cyber Security Certificates [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications  [Accessed 25 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====SIEM tools (security information and event management)====&lt;br /&gt;
Security Information and Event Management (SIEM) is a set of tools&lt;br /&gt;
and services offering a holistic view of an organization’s information&lt;br /&gt;
security. SIEM works by combining two technologies:&lt;br /&gt;
&amp;lt;li&amp;gt;Security information management (SIM), which collects data from log&lt;br /&gt;
files for analysis and reports on security threats and events, and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;security event management (SEM), which conducts real-time system&lt;br /&gt;
monitoring, notifies network admins about important issues and&lt;br /&gt;
establishes correlations between security events. There are a number of&lt;br /&gt;
security information and event management solutions on the market.&lt;br /&gt;
ArcSight ESM, IBM QRadar and Splunk are among the most popular. &amp;lt;ref name=&amp;quot;SIEM&amp;quot;&amp;gt;Application security, SIEM [Online]. Available: https://www.imperva.com/learn/application-security/siem/. [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Firewalls, Intrusion Detection Systems (IDS), and Intrusion Prevention Systems(IPS)====&lt;br /&gt;
Firewalls can be two types, hardware and software firewalls. Software&lt;br /&gt;
firewall is a firewall that is installed on a computer or server, and&lt;br /&gt;
tasked with network security. It works with a wide variety of other&lt;br /&gt;
technology security solutions to provide more robust and cohesive&lt;br /&gt;
security for enterprises of all sizes. When a software firewall is&lt;br /&gt;
installed on a server, it opens up like an umbrella of protection over&lt;br /&gt;
all other computers connected to the network. It is able to monitor both&lt;br /&gt;
incoming and outgoing traffic for potential risk or suspicious user&lt;br /&gt;
behavior, and also makes setting security policies much easier, faster&lt;br /&gt;
and more flexible. Hardware firewall is positioned between the network&lt;br /&gt;
and devices, allowing traffic to funnel through the firewall for a close&lt;br /&gt;
inspection and analysis. A hardware firewall, a term often&lt;br /&gt;
interchangeable with network or next-generation firewall, protects the&lt;br /&gt;
network gateways for an enterprise. Hardware firewall is physical&lt;br /&gt;
hardware, installed between network elements and connected devices, and&lt;br /&gt;
is tasked with filtering traffic for cyber threat to the network or&lt;br /&gt;
devices. Filtering out unauthorized or suspicious users based on traffic&lt;br /&gt;
analysis is one of the biggest benefits of hardware firewall. &amp;lt;ref name=&amp;quot;sangfor&amp;quot;&amp;gt;Sangfor, &amp;quot;What is Software Firewall? Difference between Hardware Firewall and Software Firewall, [Online]. Available: https://www.sangfor.com/blog/cybersecurity/what-is-software-firewall-difference-between-hardware-firewall-and-software-firewall [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems&lt;br /&gt;
(IPS) are both parts of the network infrastructure. IDS/IPS compare&lt;br /&gt;
network packets to a cyberthreat database containing known signatures of&lt;br /&gt;
cyberattacks — and flag any matching packets. IDS doesn’t alter the&lt;br /&gt;
network packets in any way, whereas IPS prevents the packet from&lt;br /&gt;
delivery based on the contents of the packet, much like how a firewall&lt;br /&gt;
prevents traffic by IP address. &amp;lt;ref name=&amp;quot;Varonis&amp;quot;&amp;gt;Varonis, &amp;quot;What is Software Firewall? IDS vs. IPS: What is the Difference?, [Online]. Available: https://www.varonis.com/blog/ids-vs-ips [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Digital forensics====&lt;br /&gt;
Digital forensics is a branch of forensic science that focuses on&lt;br /&gt;
identifying, acquiring, processing, analyzing, and reporting on data&lt;br /&gt;
stored electronically. Electronic evidence is a component of almost all&lt;br /&gt;
criminal activities and digital forensics support is crucial for law&lt;br /&gt;
enforcement investigations. Electronic evidence can be collected from a&lt;br /&gt;
wide array of sources, such as computers, smartphones, remote storage,&lt;br /&gt;
unmanned aerial systems, shipborne equipment, and more.&amp;lt;ref name=&amp;quot;interpol&amp;quot;&amp;gt;Interpol, &amp;quot;Digital forensics&amp;quot;. Available: https://www.interpol.int/How-we-work/Innovation/Digital-forensics. [Accessed 28 4 2022].&amp;lt;/ref&amp;gt; &lt;br /&gt;
Investigative process of digital forensics can be divided into several stages. There are four major stages: preservation, collection,&lt;br /&gt;
examination, and analysis. All these four stages need a deep understanding of computers, technology across a broad spectrum, and cybersecurity principles and&lt;br /&gt;
practices, a working knowledge of computers, networks, and coding, in-depth investigative abilities, critical-thinking skills and analytical talent the ability to effectively communicate and work with a&lt;br /&gt;
wide range of people. &amp;lt;ref name=&amp;quot;ecpi&amp;quot;&amp;gt;&amp;quot;Digital forensics&amp;quot;. Available: https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me. [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Mobile device management====&lt;br /&gt;
Mobile device management (MDM) is software that allows IT&lt;br /&gt;
administrators to control, secure and enforce policies on smartphones,&lt;br /&gt;
tablets and other endpoints. Mobile device management software emerged&lt;br /&gt;
in the early 2000s as a way to control and secure the personal digital&lt;br /&gt;
assistants and smartphones that business workers began to use. The&lt;br /&gt;
consumer smartphone boom that started with the launch of the Apple&lt;br /&gt;
iPhone in 2007 led to the bring your own device (BYOD) trend, which&lt;br /&gt;
fueled further interest in MDM.&amp;lt;ref name=&amp;quot;techtarget&amp;quot;&amp;gt;Techtarget, &amp;quot;Mobile Device Management&amp;quot;. Available: https://www.techtarget.com/searchmobilecomputing/definition/mobile-device-management [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Data management====&lt;br /&gt;
Sometimes the data management is neglected, but this part has a&lt;br /&gt;
crucial role when learning for good cyber security practices. Majority&lt;br /&gt;
of cyber security programs include a special courses on data management.&lt;br /&gt;
Data management is a method of organizing and maintaining data processes&lt;br /&gt;
that are required in almost every business operations. The benefits of&lt;br /&gt;
data management can be found accounting, statistics, logistics planning&lt;br /&gt;
and other disciplines including corporate computing.&amp;lt;ref name=&amp;quot;GlobalUni&amp;quot;&amp;gt;Global Universities, &amp;quot;MSc Data Management and Cyber Security&amp;quot;. Available: https://globaluniversities.in/msc-data-management-cyber-security. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Data governance (and management) play a fundamental role in&lt;br /&gt;
protecting an organization’s data. Ensuring that the right people have&lt;br /&gt;
the right access and that appropriate security controls are in place to&lt;br /&gt;
protect each system or service, based on the criticality or sensitivity&lt;br /&gt;
of the data sets these contain. &amp;lt;ref name=&amp;quot;CyberMagazine&amp;quot;&amp;gt;Cyber Security Magazine, &amp;quot;The Role of Data Governance in Cybersecurity&amp;quot;. Available: https://cybersecurity-magazine.com/the-role-of-data-governance-in-cybersecurity/?utm_source=rss&amp;amp;amp;utm_medium=rss&amp;amp;amp;utm_campaign=the-role-of-data-governance-in-cybersecurity. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Application security development====&lt;br /&gt;
Application security describes security measures at the application&lt;br /&gt;
level that aim to prevent data or code within the app from being stolen&lt;br /&gt;
or hijacked. It encompasses the security considerations that happen&lt;br /&gt;
during application development and design, but it also involves systems&lt;br /&gt;
and approaches to protect apps after they get deployed. Application&lt;br /&gt;
security may include hardware, software, and procedures that identify or&lt;br /&gt;
minimize security vulnerabilities.&amp;lt;ref name=&amp;quot;vmware&amp;quot;&amp;gt;VmWare, &amp;quot;What is application security?&amp;quot;. Available: https://www.vmware.com/topics/glossary/content/application-security.html [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Application security development is important to ensure that your&lt;br /&gt;
application is free from coding errors and bugs. And controls the risk&lt;br /&gt;
and helps safeguard against security vulnerabilities. Application&lt;br /&gt;
security development is the process of making applications more secure&lt;br /&gt;
by finding and fixing security vulnerabilities. This is often done by&lt;br /&gt;
enforcing software security best practices and using application&lt;br /&gt;
security testing tools. &lt;br /&gt;
&amp;lt;ref name=&amp;quot;perforce&amp;quot;&amp;gt;Perforce, &amp;quot;Application Security Development Best Practices&amp;quot;. Available: https://www.perforce.com/blog/kw/application-security-development-best-practices. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Audit and compliance knowledge====&lt;br /&gt;
A cyber security audit is designed to be a comprehensive review and&lt;br /&gt;
analysis of your business’s IT infrastructure. It identifies threats and&lt;br /&gt;
vulnerabilities, exposing weaknesses and high-risk practices.&lt;br /&gt;
Regulations such as the EU GDPR (General Data Protection Regulation) can&lt;br /&gt;
impose hefty penalties in the event of a breach that results in&lt;br /&gt;
exploited data. A cyber security audit will help mitigate the&lt;br /&gt;
consequences of a breach and demonstrate that your organization has&lt;br /&gt;
taken the necessary steps to protect client and company data. &amp;lt;ref name=&amp;quot;cyforsecure&amp;quot;&amp;gt;Cyfor Secure, &amp;quot;What is a Cyber Security Audit and how can it help your organisation?&amp;quot;. Available: https://cyforsecure.co.uk/services/cyber-assessment/cyber-security-audit/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cybersecurity compliance is the organizational risk management method&lt;br /&gt;
aligned with pre-defined security measures &amp;amp;amp; controls on how data&lt;br /&gt;
confidentiality is ensured by its administrative procedures.&amp;lt;ref name=&amp;quot;nordlayer&amp;quot;&amp;gt;NordLayer, &amp;quot;Cybersecurity compliance: Everything you need to know&amp;quot;. Available: https://nordlayer.com/blog/cybersecurity-compliance-everything-you-need-to-know/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
All needed skills are developed through courses and certification.&lt;br /&gt;
&lt;br /&gt;
===Entry-Level Incident Response Positions===&lt;br /&gt;
It is not always possible to advance to the position of incident&lt;br /&gt;
responder in a straight line. Many professionals advance from entry- to&lt;br /&gt;
mid-level positions before becoming a real incident responder or a&lt;br /&gt;
member of a computer emergency response team (CERT).&amp;lt;br /&amp;gt;&lt;br /&gt;
These are some examples: &amp;lt;ref name=&amp;quot;Infosec&amp;quot;&amp;gt;Infosec, &amp;quot;Incident Responder Career Roadmap: From Entry Level to Executive&amp;quot;. Available: https://resources.infosecinstitute.com/topic/incident-responder-career-roadmap-entry-level-executive/ [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;network-administrator&amp;quot;&amp;gt;Network administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;This position’s experience will help potential incident responders&lt;br /&gt;
develop networking skills. Attention to detail, as well as the ability&lt;br /&gt;
to sift through system configurations, site layouts, and general network&lt;br /&gt;
and communication setups, are essential in this field.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;system-administrator&amp;quot;&amp;gt;System administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Another crucial beginning point for an incident responder is to learn&lt;br /&gt;
how to manage resources inside your organization as well as user&lt;br /&gt;
behavior. Understanding the potential damage that users, inadequate&lt;br /&gt;
security setups, and ineffective IT policies and procedures can cause on&lt;br /&gt;
your network can provide prospective candidates with insight into the&lt;br /&gt;
human component of an incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;security-administrator&amp;quot;&amp;gt;Security administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In such a position, basic hacking skills, penetration testing, and&lt;br /&gt;
intrusion detection are all learned, which are crucial incident&lt;br /&gt;
responder skills when trying to replicate a breach or attack.&lt;br /&gt;
Understanding the paths a cybercriminal will take when attempting to&lt;br /&gt;
damage or obtain access to a system can greatly simplify the work of&lt;br /&gt;
reverse engineering the incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://resources.infosecinstitute.com/topic/incident-responder-career-roadmap-entry-level-executive/&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Mid-Level Incident Response Positions ===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5&lt;br /&gt;
id=&amp;quot;computer-security-incident-response-team-csirt-engineer&amp;quot;&amp;gt;Computer&lt;br /&gt;
security incident response team (CSIRT) engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;cyber-incident-responder&amp;quot;&amp;gt;Cyber incident responder&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-response-engineer&amp;quot;&amp;gt;Incident response&lt;br /&gt;
engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;While each of these positions is different, they generally require&lt;br /&gt;
very similar skills and characteristics in a candidate. At this level,&lt;br /&gt;
personal characteristics such as problem solving, time management, and&lt;br /&gt;
even presentation skills become more crucial as one’s career evolves&lt;br /&gt;
into a management-facing role.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Technical skills include the ability to identify and minimize threats&lt;br /&gt;
while maintaining communication with management and the rest of your&lt;br /&gt;
team. Data analysis and evidence gathering become increasingly crucial,&lt;br /&gt;
and the circumstances in which your services are deployed get more&lt;br /&gt;
serious.&amp;lt;/p&amp;gt;&lt;br /&gt;
Problem-solving skills are crucial at this level of incident&lt;br /&gt;
response, and as the stakes rise, so does the pressure in each&lt;br /&gt;
situation. At this level, programming abilities are essential since&lt;br /&gt;
incident responders may be needed to reverse engineer malicious code or&lt;br /&gt;
even create patches for vulnerable network applications or services. &amp;lt;ref name=&amp;quot;coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated]&amp;quot;. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Senior-Level Incident Response Positions===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;intrusion-detection-specialist&amp;quot;&amp;gt;Intrusion detection&lt;br /&gt;
specialist:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;A CISSP certification might help a potential candidate in preparing&lt;br /&gt;
for the profession. The role of an intrusion detection specialist is to&lt;br /&gt;
find and stop any unwanted communications.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-manager&amp;quot;&amp;gt;Incident manager:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Expected to plan, oversee, manage, and supervise all incident&lt;br /&gt;
response team actions. Is in charge of reporting all current events to&lt;br /&gt;
senior management and stakeholders, as well as acting as the technical&lt;br /&gt;
lead on active incidents for incident responders. Prepares threat and&lt;br /&gt;
impact assessments and reports them known to management.&amp;lt;ref name=&amp;quot;coursera&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Certificates== &lt;br /&gt;
There is a vast number of different certificates and the road map to&lt;br /&gt;
being a certified professional could be very different&amp;lt;ref name=&amp;quot;Coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated],&amp;quot; [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;NICCS&amp;quot;&amp;gt;NICCS, &amp;quot;Cybersecurity Certifications,&amp;quot; [Online]. Available: hhttps://niccs.cisa.gov/about-niccs/cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt; . One possible&lt;br /&gt;
approach is to start with basic certificates from the different branches&lt;br /&gt;
of service and move to more specific and demanding focused&lt;br /&gt;
certification. Also, some jobs require certain clearances, either from&lt;br /&gt;
industry, or from the government. One small selection of different&lt;br /&gt;
possible certificates is brought out in following paragraphs.&lt;br /&gt;
&lt;br /&gt;
Security+ is a CompTIA certification that is considered a basic cert&lt;br /&gt;
among cybersecurity professionals. It covers the topics of risk&lt;br /&gt;
management and threat assessment.&lt;br /&gt;
Network+ is also offered by CompTIA this certification (like the name&lt;br /&gt;
implies) focuses on networking infrastructure and operations. It is&lt;br /&gt;
considered a foundational certification.&lt;br /&gt;
The Certified Information Systems Security Professional (CISSP) is a&lt;br /&gt;
more advanced certification designed for cybersecurity professionals&lt;br /&gt;
with at least five years of work experience. The certification covers&lt;br /&gt;
topics such as architecture, engineering, and management.&amp;lt;/p&amp;gt;&lt;br /&gt;
The Certified Ethical Hacker (CEH) certification is also considered a&lt;br /&gt;
more advanced cert because it generally requires that applicants have&lt;br /&gt;
multiple years of work experience. The goal of an ethical hacker&lt;br /&gt;
certification is to be able to understand how cyber attacks unfold in&lt;br /&gt;
order to improve threat assessment and mitigation skills.&amp;lt;ref name=&amp;quot;cyberguide&amp;quot;&amp;gt;Cybersecurity Guide, &amp;quot;How to become a cybersecurity specialist&amp;quot;, [Online]. Available: https://cybersecurityguide.org/careers/security-specialist/. [Accessed 27 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
This is definitely not all, when one looks for more information, following link could be searched, to get more in depth knowledge about&lt;br /&gt;
different possibilities. Hereby, with the help of this matrix a possible taxonomy of different 436 listed certificates in branches are&lt;br /&gt;
presented.&amp;lt;ref name=&amp;quot;Pauljeremy&amp;quot;&amp;gt;&amp;quot;Cybersecurity Roadmap,&amp;quot; [Online]. Available: https://pauljerimy.com/2020/10/12/scr-oct-2020-update/. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:analystimage5.png|1000px|thumb|Certificate matrix &amp;lt;ref&amp;gt;&amp;quot;Certification roadmap&amp;quot;. Available at https://pauljerimy.com/security-certification-roadmap&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
=== Communication and Network Security===&lt;br /&gt;
Communication and network security covers the ability to secure&lt;br /&gt;
communication channels and networks. Topics include secure and converges&lt;br /&gt;
protocols, wireless networks, cellular networks, hardware operations&lt;br /&gt;
(warranty and redundant power), and third-party connectivity. IP&lt;br /&gt;
networking are also included in this domain.&lt;br /&gt;
===Identity and Access Management===&lt;br /&gt;
The identity and access management domain covers the attacks that&lt;br /&gt;
target the human gateway to gain access to data. Other topics include&lt;br /&gt;
ways to identify users with rights to access the information and&lt;br /&gt;
servers. Identity and access management covers the topics of&lt;br /&gt;
applications, Single sign-on authentication, privilege escalation,&lt;br /&gt;
Kerberos, rule-based or risk-based access control, proofing and&lt;br /&gt;
establishment of identity.&lt;br /&gt;
===Security Architecture and Engineering===&lt;br /&gt;
The security architecture and engineering domain covers important&lt;br /&gt;
topics concerning security engineering plans, designs and principles,&lt;br /&gt;
Topics include assessing and mitigating information system&lt;br /&gt;
vulnerabilities, fundamental concepts of security models and security&lt;br /&gt;
architectures in critical areas like access control. Cloud systems,&lt;br /&gt;
cryptography, system infiltrations (ransomware, fault-injection and&lt;br /&gt;
more) and virtualized systems are also covered in this domain.&lt;br /&gt;
===Asset Security===&lt;br /&gt;
The Asset Security domain deals with the issues related to the&lt;br /&gt;
collection, storage, maintenance, retention and destruction of data. It&lt;br /&gt;
also covers knowledge of different roles regarding data handling (owner,&lt;br /&gt;
controller and custodian) as well as data protection methods and data&lt;br /&gt;
states. Other topics include resource provision, asset classification&lt;br /&gt;
and data lifecycle management.&lt;br /&gt;
===Security and Risk Management===&lt;br /&gt;
The security and risk management domain covers general on skills&lt;br /&gt;
related to the implementation of user awareness programs as well as&lt;br /&gt;
security procedures. Emphasis is also placed on risk management&lt;br /&gt;
concerning the acquisition of new services, hardware and software&lt;br /&gt;
(supply chain). Other skills include social engineering defense&lt;br /&gt;
mechanisms.&lt;br /&gt;
===Security Assessment and Testing===&lt;br /&gt;
The security assessment and testing domain deals with all the&lt;br /&gt;
techniques and tools used to find system vulnerabilities, weaknesses and&lt;br /&gt;
potential areas of concern not addressed by security procedures and&lt;br /&gt;
policies. Attack simulations, vulnerability assessment, compliance&lt;br /&gt;
checks, and ethical disclosure also fall under this domain.&lt;br /&gt;
===Software Security===&lt;br /&gt;
The software development security domain deals with implementing&lt;br /&gt;
software-based security protocols within environment for which the IT&lt;br /&gt;
professional is responsible. Risk analysis, vulnerability identification&lt;br /&gt;
and auditing of source codes are all covered in this subset. Additional&lt;br /&gt;
topics include software-designed security, maturity models, development&lt;br /&gt;
methodologies, open-source and third-party development security.&lt;br /&gt;
===Security operations===&lt;br /&gt;
The security operations domain covers topics ranging from&lt;br /&gt;
investigations and digital forensic to detection and intrusion&lt;br /&gt;
prevention tools, sandboxing and firewalls. Topics include user and&lt;br /&gt;
entity behavior analytics, threat intelligence (threat hunting and&lt;br /&gt;
threat feeds) log management, artifacts (mobile, computer and network),&lt;br /&gt;
machine learning and AI-based tools, penetration testing, and&lt;br /&gt;
exploitation development. These for sub-domains are lister here.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Incident Handling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Penetration Testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Exploitation&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Education==&lt;br /&gt;
&amp;lt;p&amp;gt;The entry level monitoring specialist is hired by Estonian&lt;br /&gt;
Information System Authority even if there is no formal IT education,&lt;br /&gt;
but readiness to learn and moderate knowledge of different operation&lt;br /&gt;
systems is enough to start the career.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.cv.ee/en/vacancy/792782/riigi-infosusteemi-amet/seirespetsialist-tule-eesti-kuberruumi-valvuriks&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Nevertheless, like most other high qualification careers jobs falling&lt;br /&gt;
under the cybersecurity specialist category require some form of formal&lt;br /&gt;
education. However, since cybersecurity specialist jobs can fall across&lt;br /&gt;
a wide spectrum of job descriptions and responsibilities, it is possible&lt;br /&gt;
to obtain a specialist job after completing many levels of different&lt;br /&gt;
computer related education.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;If one is looking for a cybersecurity related education, for example&lt;br /&gt;
in EU, 137 courses/programs could be found that relate to keyword IT or&lt;br /&gt;
cybersecurity.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.enisa.europa.eu/topics/cybersecurity-education/education-map/education-courses&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Also, there is a great amount of discussion, if cuber security&lt;br /&gt;
professional should have a degree or would be certification just enough.&lt;br /&gt;
One interesting table is produces by Franklin University that compares&lt;br /&gt;
benefits and/or drawbacks of each type of credential.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image11.png&amp;quot; alt=&amp;quot;Comparison MSc vs certificate&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;Comparison MSc vs&lt;br /&gt;
certificate&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Certifications are generally good for people with little practical&lt;br /&gt;
experience because they are known quantities in the industry and can&lt;br /&gt;
help you get your foot in the door. They set a minimum knowledge bar.&lt;br /&gt;
But some certifications are viewed more favorably than others.&lt;br /&gt;
Certifications with renewal requirements are viewed better by hiring&lt;br /&gt;
managers, but they also more costly in the long run because of the need&lt;br /&gt;
for continuing education. Certifications are also good for showing&lt;br /&gt;
in-depth expertise in a specialization within cybersecurity. Depending&lt;br /&gt;
on your career goals, it may be advantageous to have a master’s&lt;br /&gt;
degree—which shows your breadth of knowledge, critical thinking and&lt;br /&gt;
leadership skills—and a certificate—which shows specific skill&lt;br /&gt;
competency.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;As IT (Cyber) Security is still a relatively young discipline,&lt;br /&gt;
universities and colleges are still figuring out which is the best&lt;br /&gt;
approach for their degrees. Study programmes and curricula in Cyber&lt;br /&gt;
Security are different. In general, here are the duration of Cyber&lt;br /&gt;
Security degrees:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Bachelor’s degrees in Cyber Security take 3 or 4 years in most&lt;br /&gt;
countries.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Master’s courses in Cyber Security take between 1-2 years to&lt;br /&gt;
complete.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;PhD programmes in Cyber Security last 3-5 years. Some only take 1&lt;br /&gt;
or 2 years, but they are less common.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Generalization could me made that on bachelor level the general&lt;br /&gt;
knowledge about the cyber issues are obtained. On master level the&lt;br /&gt;
specialization courses are taken and the person can choose more specific&lt;br /&gt;
topics to study. It is on master level where strengths of the cyber&lt;br /&gt;
specialist can be developed further and up-do date knowledge obtained in&lt;br /&gt;
specifics. PhD is serious science and involves teaching, lot of&lt;br /&gt;
scientific work and writing for publications.&amp;lt;/p&amp;gt;&lt;br /&gt;
==Salary==&lt;br /&gt;
&amp;lt;p&amp;gt;Even if the salary can be very different, compared to the skills and&lt;br /&gt;
experience, an generalization can be made. Cyber Security professionals&lt;br /&gt;
in CSIRT, and in other entities earn quite well, from the start. First,&lt;br /&gt;
some comparison from the United States. The average CSIRT analyst salary&lt;br /&gt;
in the USA is $97,500 per year or $50 per hour. Entry level positions&lt;br /&gt;
start at $48,875 per year while most experienced workers make up to&lt;br /&gt;
$135,373 per year.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.talent.com/salary?job=csirt+analyst&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;There are multiple positions you can occupy in this field. They have&lt;br /&gt;
in common great salaries and high demand for technical skills, attention&lt;br /&gt;
to details, problem-solving mentality, and the ability to analyze risks.&lt;br /&gt;
Here are the average annual salaries in the United States, according to&lt;br /&gt;
Payscale:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.payscale.com/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Cryptographer – 100,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Information Security Officer – 91,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Assessor – 90,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Engineer – 88,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Penetration Tester – 81,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Forensics Expert – 71,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Administrator – 65,000 USD&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When looking into salaries in Estonia, one can find that there is a&lt;br /&gt;
discussion that private sector is taking a toll from the public sector,&lt;br /&gt;
and that the salaries in important agencies, as Information System&lt;br /&gt;
Authority loose their employees to the better paid positions in private&lt;br /&gt;
sector.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://digi.geenius.ee/rubriik/uudis/kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad/&lt;br /&gt;
https://tehnika.postimees.ee/6887428/riigi-it-tootajate-palgamaarad-kasvasid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;But there is also a different view that average private sector worker&lt;br /&gt;
could be hired as a top specialist in public sector and then the payment&lt;br /&gt;
is higher. Nevertheless, it seems that the average payment in cyber&lt;br /&gt;
security sector is any way higher that in other parts of the&lt;br /&gt;
e-services.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://digi.geenius.ee/rubriik/uudis/5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka/&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
==SOC==&lt;br /&gt;
&amp;lt;p&amp;gt;A SOC is a facility where an organization’s network, applications,&lt;br /&gt;
and endpoints are monitored and defended. The term was adapted from&lt;br /&gt;
network operations centers (NOCs), where large telecommunication or&lt;br /&gt;
corporate networks are monitored. When network security became more of a&lt;br /&gt;
concern, security teams were formed within the NOCs, and eventually spun&lt;br /&gt;
off into larger organizations of their own as the responsibilities of&lt;br /&gt;
security teams grew increasingly complex and specialized. The security&lt;br /&gt;
staff working in a security operations center are often called the SOC&lt;br /&gt;
team.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Functions of the SOC team include, but are not limited to:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ol type=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Taking inventory of resources, to get a better understanding of the&lt;br /&gt;
structure they are protecting.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintanence of the system, by constantly making updates and adding&lt;br /&gt;
safeguards.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Monitoring the network for abnormalities with special tools.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Threat analysis of new attacks and vulnerabilities.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Responding to attacks, by acting as “first responders”. The SOC team&lt;br /&gt;
will shut down and/or isolate endpoints, deleting files and lowering the&lt;br /&gt;
impact as fast as possible.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Recovery of system stability and lost data. This may be done using&lt;br /&gt;
backups, restarting endpoints or reconfiguring systems.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Logging all actions on the system, to be later used for analysis or&lt;br /&gt;
forensics after an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigating the root cause of an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Auditing their own actions, to be in line with regulations of the&lt;br /&gt;
organization, industry or governing body.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.trellix.com/en-us/security-awareness/operations/what-is-soc.html&amp;lt;/p&amp;gt;&lt;br /&gt;
==CSIRT==&lt;br /&gt;
&amp;lt;p&amp;gt;A CSIRT is a group that responds to security incidents when they&lt;br /&gt;
occur. Key responsibilities of a CSIRT include: &lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
===Creating and maintaining an incident response plan (IRP)===&lt;br /&gt;
An incident response plan (IRP) is a set of written instructions for&lt;br /&gt;
detecting, responding to and limiting the effects of an information&lt;br /&gt;
security event. Incident response plans provide instructions for&lt;br /&gt;
responding to many potential scenarios, including data breaches, denial&lt;br /&gt;
of service/distributed denial of service attacks, firewall breaches,&lt;br /&gt;
virus or malware outbreaks or insider threats. Without an incident&lt;br /&gt;
response plan in place, organizations may either not detect the attack&lt;br /&gt;
in the first place, or not follow proper protocol to contain the threat&lt;br /&gt;
and recover from it when a breach is detected.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.stratacore.com/incidentresponseplan&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
===Investigating and analyzing incidents===&lt;br /&gt;
CSIRTs are also involved in improvement activities. After major&lt;br /&gt;
computer security incidents occur, or when incidents are not handled in&lt;br /&gt;
a timely or effective manner, a CSIRT will generally perform a&lt;br /&gt;
postmortem of the incident and its response. This postmortem will&lt;br /&gt;
identify the strengths and weakness of the response effort. Such reviews&lt;br /&gt;
can identify weaknesses and holes in systems, infrastructure defenses,&lt;br /&gt;
or policies that allowed the incident to take place. It can also&lt;br /&gt;
identify problems with communication channels, interfaces, and&lt;br /&gt;
procedures that inhibited the efficient resolution of the reported&lt;br /&gt;
problem.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.cisa.gov/uscert/bsi/articles/best-practices/incident-management/defining-computer-security-incident-response-teams&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Managing internal communications and updates during or immediately after incidents occur===&lt;br /&gt;
===Communicating with employees, shareholders, customers, and the press about incidents as needed===&lt;br /&gt;
&amp;lt;p&amp;gt;There are various services within the CSIRT Services Framework that&lt;br /&gt;
address communications, as they relate to security operations and&lt;br /&gt;
incident response services. Some of these include Information Security&lt;br /&gt;
Incident Coordination, Crisis Management Support, Vulnerability&lt;br /&gt;
Disclosure, Situational Awareness Communication, and Awareness Building,&lt;br /&gt;
to name a few. Sharing information and communicating with the general&lt;br /&gt;
public and/or your constituency is appropriate in many different&lt;br /&gt;
scenarios. These can range from proactive communications to reactive&lt;br /&gt;
communications. Each scenario may be unique, and careful consideration&lt;br /&gt;
should be given to when to release information to the public and what&lt;br /&gt;
information should be released.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;https://resources.sei.cmu.edu/asset_files/Handbook/2021_002_001_651819.pdf&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Remediating incidents===&lt;br /&gt;
Threat remediation is a strong and capable tool for fighting the&lt;br /&gt;
cyber security compromises. As the word ‘remedy’ suggests, remediation&lt;br /&gt;
process involves the treatment of a security breach. With the&lt;br /&gt;
remediation practices, your cyber security team is able to eliminate&lt;br /&gt;
suspicious activities and malicious attacks in the form of malware,&lt;br /&gt;
ransomware, phishing and such. Even if you ‘kill’ the suspicious&lt;br /&gt;
activity, the attackers can remain in your systems. If you want to&lt;br /&gt;
contaminate and end the problem for good, your remediation processes&lt;br /&gt;
must involve the detection of the cause. &amp;lt;ref name=&amp;quot;logsign&amp;quot;&amp;gt;Logsign, &amp;quot;What-is-remediation-in-cyber-security&amp;quot;. Available: https://www.logsign.com/blog/what-is-remediation-in-cyber-security/. [Accessed 28 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Recommending technology, policy, governance, and training changes after security incidents===&lt;br /&gt;
After all these actions, the SCIRT must contribute to the development&lt;br /&gt;
of better policies, practices and has to recommend improvements. They&lt;br /&gt;
are not working in the vacuum and their work has to create new and&lt;br /&gt;
better standards for cyber security. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;Exabeam, &amp;quot;CSIRT&amp;quot;. Available: https://www.exabeam.com/incident-response/csirt/ [Accessed 28 APr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==CERT==&lt;br /&gt;
&amp;lt;p&amp;gt;The term “computer emergency response team” was coined in 1988. In&lt;br /&gt;
response to the Morris worm attack that impacted thousands of servers on&lt;br /&gt;
the Internet, DARPA funded the formation of the Computer Emergency&lt;br /&gt;
Response Team Coordination Center (CERT-CC) at Carnegie Mellon&lt;br /&gt;
University. The goal of CERT-CC was to help protect the internet by&lt;br /&gt;
collecting and disseminating information on critical security&lt;br /&gt;
vulnerabilities. Several other countries formed similar centers using&lt;br /&gt;
the same acronym (despite threats of legal action by Carnegie Mellon for&lt;br /&gt;
trademark infringement). Now the term CERT refers to any emergency&lt;br /&gt;
response team that deals with cyber threats. Many people use CERT-CC&lt;br /&gt;
interchangeably with CSIRT, though the charter of a CERT is information&lt;br /&gt;
sharing in order to help other response teams respond to threats against&lt;br /&gt;
their own infrastructure.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In general, the designation of CERT is helpful in applying real-world&lt;br /&gt;
solutions to various cybersecurity problems. They may be government&lt;br /&gt;
contractors or employees of a major corporation. For example, the U.S.&lt;br /&gt;
Computer Emergency Readiness Team (US-CERT) operates under the U.S.&lt;br /&gt;
Department of Homeland Security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.techopedia.com/definition/31003/computer-emergency-response-team-cert&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In Estonia CERT is designated as CERT-EE. It was established in 2006,&lt;br /&gt;
as an organization responsible for the management of security incidents&lt;br /&gt;
in .ee computer networks. It is also a national contact point for&lt;br /&gt;
international co-operation in the field of IT security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ria.ee/en/cyber-security/cert-ee.html&amp;lt;/p&amp;gt;&lt;br /&gt;
===Difference between SOC/CSIRT/CERT===&lt;br /&gt;
&amp;lt;p&amp;gt;How CSIRTs differ from CERTs and SOCs There are overlapping&lt;br /&gt;
responsibilities between a community emergency response team (CERT),&lt;br /&gt;
computer security incident response team (CSIRT), and security&lt;br /&gt;
operations center (SOC). To add to this confusion, frequently, the terms&lt;br /&gt;
CERT and CSIRT are used interchangeably, despite the important&lt;br /&gt;
differences.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image3.png&amp;quot; alt=&amp;quot;Overlapping in images/image3.png&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;Overlapping in&lt;br /&gt;
images/image3.png&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
==Understand the primary roles and characteristics of a CERT, CSIRT, and SOC.==&lt;br /&gt;
&amp;lt;p&amp;gt;So, using strict definitions, a CERT collects and disseminates&lt;br /&gt;
security information, typically for the benefit of a country or an&lt;br /&gt;
industry. A CSIRT is a cross-functional team that responds to incidents&lt;br /&gt;
on behalf of a country or an organization. A SOC is where a country or&lt;br /&gt;
organization monitors and defends its network, servers, applications,&lt;br /&gt;
and endpoints.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image4.png&amp;quot; alt=&amp;quot;table of explanation images/image4&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;table of explanation&lt;br /&gt;
images/image4&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
==Future==&lt;br /&gt;
&amp;lt;p&amp;gt;And the Cyber security problem is only getting bigger. According to a&lt;br /&gt;
report published by Accenture, the number of cyber security breaches&lt;br /&gt;
increased by 11 percent from 2017 to 2018. The cost of such breaches is&lt;br /&gt;
astronomical–about $600 billion worldwide, according to the Economic&lt;br /&gt;
Impact of Cybercrime report.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Job projections for cybersecurity are staggering. The Bureau of Labor&lt;br /&gt;
Statistics in US predicts that careers in the cybersecurity field will&lt;br /&gt;
grow by 32% by 2028. That makes cybersecurity one of the top 10&lt;br /&gt;
fastest-growing jobs in the country. In the United States alone, jobs&lt;br /&gt;
for Information Security Analysts are expected to grow by 15% by&lt;br /&gt;
2024.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Most likely this trend is also similar in other countries.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When checking Estonian job portals, there is a constant need for&lt;br /&gt;
people for cyber security related positions. Also, linkedin search gives&lt;br /&gt;
approximately 30 vacancies immediately. There are banks, logistics&lt;br /&gt;
companies, e-shops, and software producers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://ee.linkedin.com/jobs/cyber-security-jobs?countryRedirected=1&amp;amp;amp;position=1&amp;amp;amp;pageNum=0&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Trends that affect companies create need for constant cyber security&lt;br /&gt;
services. Increasing number of home/remote offices require secure&lt;br /&gt;
corporate networks and security of remote devices. One example is from&lt;br /&gt;
this year, when sloppy remote desktop set-up paralyzed systems of 17&lt;br /&gt;
companies.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.aripaev.ee/uudised/2022/04/20/ria-lohakas-kaugtoolaua-seadistus-halvas-martsis-vahemalt-17-juhul-ettevotete-it-susteemid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Also, no service can exists without robust infrastructure - servers,&lt;br /&gt;
databases, applications. As all previously mentioned devices and&lt;br /&gt;
services are at constant scanning and surveillance. So, the breach&lt;br /&gt;
detection and immediate action demands 24/7 services. Even if lot of&lt;br /&gt;
things could be automated, there is a need for human specialists (at&lt;br /&gt;
least, at the moment). Third growing field is also a forensic&lt;br /&gt;
investigation, as every attack must be investigated in order to be ready&lt;br /&gt;
to repel next attacks. So data recovery and evidence collection is&lt;br /&gt;
another important field of work that need skilled and professional&lt;br /&gt;
workers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Even, if the specifics of the entity, be it CSIRT, CERT or SOC, are&lt;br /&gt;
different, the fundamentals of the work are the same. Professional&lt;br /&gt;
knowledge of the networks, operational systems, hardware, scripting, and&lt;br /&gt;
several other wider IT related knowledge is needed. As there is no&lt;br /&gt;
single way to reach to it, every single person can find one’s strongest&lt;br /&gt;
sides and develop them with knowledge of weaker side, in order to know,&lt;br /&gt;
when to as for help.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/body&amp;gt;&lt;br /&gt;
&amp;lt;/html&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mavald</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142195</id>
		<title>Hiring a Cyber Security Incident Analyst</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142195"/>
		<updated>2022-05-01T15:10:32Z</updated>

		<summary type="html">&lt;p&gt;Mavald: /* Senior-Level Incident Response Positions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==A Cyber Security Incident Analyst==&lt;br /&gt;
&lt;br /&gt;
[[File:image1.png|600px|thumb|Job advertisement &amp;lt;ref&amp;gt;&amp;quot;Job Advertisement&amp;quot;. Available at https://www.projectpeople.com/jobs/&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
===Cyber security incident analyst in SOC/CSIRT/CERT===&lt;br /&gt;
This article delves into the job title of Cyber Security Incident&lt;br /&gt;
Analyst and provides an overview of the acronyms SOC/CSIRT/CERT. A brief&lt;br /&gt;
history of the job is discussed here, as well as a possible career path,&lt;br /&gt;
education, experience, and other characteristics required for work in&lt;br /&gt;
computer security-related organizations. The article also provides a&lt;br /&gt;
brief history of SOC/CSIRT/CERT, as well as a comparison of their&lt;br /&gt;
differences and similarities.&lt;br /&gt;
===Cyber Security Incident Analyst Skill Set===&lt;br /&gt;
What skill set is expected from the Cyber Security Incident Analyst? Below written lines are taken from the same job advertisement depicted&lt;br /&gt;
on the left side of this article:&lt;br /&gt;
As a Security Incident Analyst your responsibilities will include:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Continuous monitoring of security tooling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Performing regular and ad-hoc vulnerability assessments&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Carrying out ‘spot checks’&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Reporting vulnerabilities to the PVG via the alerts system&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintaining and documenting logging systems&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Developing centralized logging, reporting and intelligence&lt;br /&gt;
platforms&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;‘Light touch’ penetration testing with open source tooling&lt;br /&gt;
(Metasploit)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Knowledge &amp;amp;amp; Experience required:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;SOC, CSIRT or CERT operational environment experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Windows / Linux experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TCP /IP networking protocol knowledge&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience reviewing and analyzing Security Events from various&lt;br /&gt;
monitoring and logging sources&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience in website and web application security assessment or&lt;br /&gt;
penetration testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience of using Metasploit&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Scripting knowledge using BASH, Python, Perl, Ruby&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Skills in Host and Network Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
As one can see the description of the duties is wide and also the&lt;br /&gt;
knowledge and experience that is required is noteworthy. So, where to&lt;br /&gt;
start to find out the way to get this kind of knowledge and&lt;br /&gt;
expertize.&lt;br /&gt;
===Possible career path===&lt;br /&gt;
Next part of the paper is aiming to depict a possible ways, how to&lt;br /&gt;
develop oneself, and move along the career pathway in cybersecurity&lt;br /&gt;
field. Topics of development, education, experience and certification&lt;br /&gt;
are covered.&lt;br /&gt;
[[File:analystimage2.png|1000px|thumb|Career path &amp;lt;ref&amp;gt;&amp;quot;Possible Career Path&amp;quot;. Available at https://www.cyberseek.org/pathway.html&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
===Junior/Senior===&lt;br /&gt;
Start with an entry-level job in IT. Hands-on experience is often the&lt;br /&gt;
most effective way to prepare for certification exams. Start&lt;br /&gt;
accumulating work experience with an entry-level role as a cybersecurity&lt;br /&gt;
analyst. Many cybersecurity professionals start off in more general IT&lt;br /&gt;
roles. The skills, practices, and technologies you’ll use as a&lt;br /&gt;
cybersecurity professional will continue to evolve along with computer&lt;br /&gt;
and network technology. The desire to learn, ability to problem solve,&lt;br /&gt;
and attention to detail will serve you well in this field. Other, more&lt;br /&gt;
technical skills and technologies to learn include:&amp;lt;ref name=&amp;quot;certification&amp;quot;&amp;gt;Popular Cyber Security Certificates [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications  [Accessed 25 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====SIEM tools (security information and event management)====&lt;br /&gt;
Security Information and Event Management (SIEM) is a set of tools&lt;br /&gt;
and services offering a holistic view of an organization’s information&lt;br /&gt;
security. SIEM works by combining two technologies:&lt;br /&gt;
&amp;lt;li&amp;gt;Security information management (SIM), which collects data from log&lt;br /&gt;
files for analysis and reports on security threats and events, and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;security event management (SEM), which conducts real-time system&lt;br /&gt;
monitoring, notifies network admins about important issues and&lt;br /&gt;
establishes correlations between security events. There are a number of&lt;br /&gt;
security information and event management solutions on the market.&lt;br /&gt;
ArcSight ESM, IBM QRadar and Splunk are among the most popular. &amp;lt;ref name=&amp;quot;SIEM&amp;quot;&amp;gt;Application security, SIEM [Online]. Available: https://www.imperva.com/learn/application-security/siem/. [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Firewalls, Intrusion Detection Systems (IDS), and Intrusion Prevention Systems(IPS)====&lt;br /&gt;
Firewalls can be two types, hardware and software firewalls. Software&lt;br /&gt;
firewall is a firewall that is installed on a computer or server, and&lt;br /&gt;
tasked with network security. It works with a wide variety of other&lt;br /&gt;
technology security solutions to provide more robust and cohesive&lt;br /&gt;
security for enterprises of all sizes. When a software firewall is&lt;br /&gt;
installed on a server, it opens up like an umbrella of protection over&lt;br /&gt;
all other computers connected to the network. It is able to monitor both&lt;br /&gt;
incoming and outgoing traffic for potential risk or suspicious user&lt;br /&gt;
behavior, and also makes setting security policies much easier, faster&lt;br /&gt;
and more flexible. Hardware firewall is positioned between the network&lt;br /&gt;
and devices, allowing traffic to funnel through the firewall for a close&lt;br /&gt;
inspection and analysis. A hardware firewall, a term often&lt;br /&gt;
interchangeable with network or next-generation firewall, protects the&lt;br /&gt;
network gateways for an enterprise. Hardware firewall is physical&lt;br /&gt;
hardware, installed between network elements and connected devices, and&lt;br /&gt;
is tasked with filtering traffic for cyber threat to the network or&lt;br /&gt;
devices. Filtering out unauthorized or suspicious users based on traffic&lt;br /&gt;
analysis is one of the biggest benefits of hardware firewall. &amp;lt;ref name=&amp;quot;sangfor&amp;quot;&amp;gt;Sangfor, &amp;quot;What is Software Firewall? Difference between Hardware Firewall and Software Firewall, [Online]. Available: https://www.sangfor.com/blog/cybersecurity/what-is-software-firewall-difference-between-hardware-firewall-and-software-firewall [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems&lt;br /&gt;
(IPS) are both parts of the network infrastructure. IDS/IPS compare&lt;br /&gt;
network packets to a cyberthreat database containing known signatures of&lt;br /&gt;
cyberattacks — and flag any matching packets. IDS doesn’t alter the&lt;br /&gt;
network packets in any way, whereas IPS prevents the packet from&lt;br /&gt;
delivery based on the contents of the packet, much like how a firewall&lt;br /&gt;
prevents traffic by IP address. &amp;lt;ref name=&amp;quot;Varonis&amp;quot;&amp;gt;Varonis, &amp;quot;What is Software Firewall? IDS vs. IPS: What is the Difference?, [Online]. Available: https://www.varonis.com/blog/ids-vs-ips [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Digital forensics====&lt;br /&gt;
Digital forensics is a branch of forensic science that focuses on&lt;br /&gt;
identifying, acquiring, processing, analyzing, and reporting on data&lt;br /&gt;
stored electronically. Electronic evidence is a component of almost all&lt;br /&gt;
criminal activities and digital forensics support is crucial for law&lt;br /&gt;
enforcement investigations. Electronic evidence can be collected from a&lt;br /&gt;
wide array of sources, such as computers, smartphones, remote storage,&lt;br /&gt;
unmanned aerial systems, shipborne equipment, and more.&amp;lt;ref name=&amp;quot;interpol&amp;quot;&amp;gt;Interpol, &amp;quot;Digital forensics&amp;quot;. Available: https://www.interpol.int/How-we-work/Innovation/Digital-forensics. [Accessed 28 4 2022].&amp;lt;/ref&amp;gt; &lt;br /&gt;
Investigative process of digital forensics can be divided into several stages. There are four major stages: preservation, collection,&lt;br /&gt;
examination, and analysis. All these four stages need a deep understanding of computers, technology across a broad spectrum, and cybersecurity principles and&lt;br /&gt;
practices, a working knowledge of computers, networks, and coding, in-depth investigative abilities, critical-thinking skills and analytical talent the ability to effectively communicate and work with a&lt;br /&gt;
wide range of people. &amp;lt;ref name=&amp;quot;ecpi&amp;quot;&amp;gt;&amp;quot;Digital forensics&amp;quot;. Available: https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me. [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Mobile device management====&lt;br /&gt;
Mobile device management (MDM) is software that allows IT&lt;br /&gt;
administrators to control, secure and enforce policies on smartphones,&lt;br /&gt;
tablets and other endpoints. Mobile device management software emerged&lt;br /&gt;
in the early 2000s as a way to control and secure the personal digital&lt;br /&gt;
assistants and smartphones that business workers began to use. The&lt;br /&gt;
consumer smartphone boom that started with the launch of the Apple&lt;br /&gt;
iPhone in 2007 led to the bring your own device (BYOD) trend, which&lt;br /&gt;
fueled further interest in MDM.&amp;lt;ref name=&amp;quot;techtarget&amp;quot;&amp;gt;Techtarget, &amp;quot;Mobile Device Management&amp;quot;. Available: https://www.techtarget.com/searchmobilecomputing/definition/mobile-device-management [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Data management====&lt;br /&gt;
Sometimes the data management is neglected, but this part has a&lt;br /&gt;
crucial role when learning for good cyber security practices. Majority&lt;br /&gt;
of cyber security programs include a special courses on data management.&lt;br /&gt;
Data management is a method of organizing and maintaining data processes&lt;br /&gt;
that are required in almost every business operations. The benefits of&lt;br /&gt;
data management can be found accounting, statistics, logistics planning&lt;br /&gt;
and other disciplines including corporate computing.&amp;lt;ref name=&amp;quot;GlobalUni&amp;quot;&amp;gt;Global Universities, &amp;quot;MSc Data Management and Cyber Security&amp;quot;. Available: https://globaluniversities.in/msc-data-management-cyber-security. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Data governance (and management) play a fundamental role in&lt;br /&gt;
protecting an organization’s data. Ensuring that the right people have&lt;br /&gt;
the right access and that appropriate security controls are in place to&lt;br /&gt;
protect each system or service, based on the criticality or sensitivity&lt;br /&gt;
of the data sets these contain. &amp;lt;ref name=&amp;quot;CyberMagazine&amp;quot;&amp;gt;Cyber Security Magazine, &amp;quot;The Role of Data Governance in Cybersecurity&amp;quot;. Available: https://cybersecurity-magazine.com/the-role-of-data-governance-in-cybersecurity/?utm_source=rss&amp;amp;amp;utm_medium=rss&amp;amp;amp;utm_campaign=the-role-of-data-governance-in-cybersecurity. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Application security development====&lt;br /&gt;
Application security describes security measures at the application&lt;br /&gt;
level that aim to prevent data or code within the app from being stolen&lt;br /&gt;
or hijacked. It encompasses the security considerations that happen&lt;br /&gt;
during application development and design, but it also involves systems&lt;br /&gt;
and approaches to protect apps after they get deployed. Application&lt;br /&gt;
security may include hardware, software, and procedures that identify or&lt;br /&gt;
minimize security vulnerabilities.&amp;lt;ref name=&amp;quot;vmware&amp;quot;&amp;gt;VmWare, &amp;quot;What is application security?&amp;quot;. Available: https://www.vmware.com/topics/glossary/content/application-security.html [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Application security development is important to ensure that your&lt;br /&gt;
application is free from coding errors and bugs. And controls the risk&lt;br /&gt;
and helps safeguard against security vulnerabilities. Application&lt;br /&gt;
security development is the process of making applications more secure&lt;br /&gt;
by finding and fixing security vulnerabilities. This is often done by&lt;br /&gt;
enforcing software security best practices and using application&lt;br /&gt;
security testing tools. &lt;br /&gt;
&amp;lt;ref name=&amp;quot;perforce&amp;quot;&amp;gt;Perforce, &amp;quot;Application Security Development Best Practices&amp;quot;. Available: https://www.perforce.com/blog/kw/application-security-development-best-practices. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Audit and compliance knowledge====&lt;br /&gt;
A cyber security audit is designed to be a comprehensive review and&lt;br /&gt;
analysis of your business’s IT infrastructure. It identifies threats and&lt;br /&gt;
vulnerabilities, exposing weaknesses and high-risk practices.&lt;br /&gt;
Regulations such as the EU GDPR (General Data Protection Regulation) can&lt;br /&gt;
impose hefty penalties in the event of a breach that results in&lt;br /&gt;
exploited data. A cyber security audit will help mitigate the&lt;br /&gt;
consequences of a breach and demonstrate that your organization has&lt;br /&gt;
taken the necessary steps to protect client and company data. &amp;lt;ref name=&amp;quot;cyforsecure&amp;quot;&amp;gt;Cyfor Secure, &amp;quot;What is a Cyber Security Audit and how can it help your organisation?&amp;quot;. Available: https://cyforsecure.co.uk/services/cyber-assessment/cyber-security-audit/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cybersecurity compliance is the organizational risk management method&lt;br /&gt;
aligned with pre-defined security measures &amp;amp;amp; controls on how data&lt;br /&gt;
confidentiality is ensured by its administrative procedures.&amp;lt;ref name=&amp;quot;nordlayer&amp;quot;&amp;gt;NordLayer, &amp;quot;Cybersecurity compliance: Everything you need to know&amp;quot;. Available: https://nordlayer.com/blog/cybersecurity-compliance-everything-you-need-to-know/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
All needed skills are developed through courses and certification.&lt;br /&gt;
&lt;br /&gt;
===Entry-Level Incident Response Positions===&lt;br /&gt;
It is not always possible to advance to the position of incident&lt;br /&gt;
responder in a straight line. Many professionals advance from entry- to&lt;br /&gt;
mid-level positions before becoming a real incident responder or a&lt;br /&gt;
member of a computer emergency response team (CERT).&amp;lt;br /&amp;gt;&lt;br /&gt;
These are some examples:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;network-administrator&amp;quot;&amp;gt;Network administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;This position’s experience will help potential incident responders&lt;br /&gt;
develop networking skills. Attention to detail, as well as the ability&lt;br /&gt;
to sift through system configurations, site layouts, and general network&lt;br /&gt;
and communication setups, are essential in this field.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;system-administrator&amp;quot;&amp;gt;System administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Another crucial beginning point for an incident responder is to learn&lt;br /&gt;
how to manage resources inside your organization as well as user&lt;br /&gt;
behavior. Understanding the potential damage that users, inadequate&lt;br /&gt;
security setups, and ineffective IT policies and procedures can cause on&lt;br /&gt;
your network can provide prospective candidates with insight into the&lt;br /&gt;
human component of an incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;security-administrator&amp;quot;&amp;gt;Security administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In such a position, basic hacking skills, penetration testing, and&lt;br /&gt;
intrusion detection are all learned, which are crucial incident&lt;br /&gt;
responder skills when trying to replicate a breach or attack.&lt;br /&gt;
Understanding the paths a cybercriminal will take when attempting to&lt;br /&gt;
damage or obtain access to a system can greatly simplify the work of&lt;br /&gt;
reverse engineering the incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://resources.infosecinstitute.com/topic/incident-responder-career-roadmap-entry-level-executive/&amp;lt;/p&amp;gt;&lt;br /&gt;
=== Mid-Level Incident Response Positions ===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5&lt;br /&gt;
id=&amp;quot;computer-security-incident-response-team-csirt-engineer&amp;quot;&amp;gt;Computer&lt;br /&gt;
security incident response team (CSIRT) engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;cyber-incident-responder&amp;quot;&amp;gt;Cyber incident responder&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-response-engineer&amp;quot;&amp;gt;Incident response&lt;br /&gt;
engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;While each of these positions is different, they generally require&lt;br /&gt;
very similar skills and characteristics in a candidate. At this level,&lt;br /&gt;
personal characteristics such as problem solving, time management, and&lt;br /&gt;
even presentation skills become more crucial as one’s career evolves&lt;br /&gt;
into a management-facing role.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Technical skills include the ability to identify and minimize threats&lt;br /&gt;
while maintaining communication with management and the rest of your&lt;br /&gt;
team. Data analysis and evidence gathering become increasingly crucial,&lt;br /&gt;
and the circumstances in which your services are deployed get more&lt;br /&gt;
serious.&amp;lt;/p&amp;gt;&lt;br /&gt;
Problem-solving skills are crucial at this level of incident&lt;br /&gt;
response, and as the stakes rise, so does the pressure in each&lt;br /&gt;
situation. At this level, programming abilities are essential since&lt;br /&gt;
incident responders may be needed to reverse engineer malicious code or&lt;br /&gt;
even create patches for vulnerable network applications or services. &amp;lt;ref name=&amp;quot;coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated]&amp;quot;. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Senior-Level Incident Response Positions===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;intrusion-detection-specialist&amp;quot;&amp;gt;Intrusion detection&lt;br /&gt;
specialist:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;A CISSP certification might help a potential candidate in preparing&lt;br /&gt;
for the profession. The role of an intrusion detection specialist is to&lt;br /&gt;
find and stop any unwanted communications.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-manager&amp;quot;&amp;gt;Incident manager:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Expected to plan, oversee, manage, and supervise all incident&lt;br /&gt;
response team actions. Is in charge of reporting all current events to&lt;br /&gt;
senior management and stakeholders, as well as acting as the technical&lt;br /&gt;
lead on active incidents for incident responders. Prepares threat and&lt;br /&gt;
impact assessments and reports them known to management.&amp;lt;ref name=&amp;quot;coursera&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Certificates== &lt;br /&gt;
There is a vast number of different certificates and the road map to&lt;br /&gt;
being a certified professional could be very different&amp;lt;ref name=&amp;quot;Coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated],&amp;quot; [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;NICCS&amp;quot;&amp;gt;NICCS, &amp;quot;Cybersecurity Certifications,&amp;quot; [Online]. Available: hhttps://niccs.cisa.gov/about-niccs/cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt; . One possible&lt;br /&gt;
approach is to start with basic certificates from the different branches&lt;br /&gt;
of service and move to more specific and demanding focused&lt;br /&gt;
certification. Also, some jobs require certain clearances, either from&lt;br /&gt;
industry, or from the government. One small selection of different&lt;br /&gt;
possible certificates is brought out in following paragraphs.&lt;br /&gt;
&lt;br /&gt;
Security+ is a CompTIA certification that is considered a basic cert&lt;br /&gt;
among cybersecurity professionals. It covers the topics of risk&lt;br /&gt;
management and threat assessment.&lt;br /&gt;
Network+ is also offered by CompTIA this certification (like the name&lt;br /&gt;
implies) focuses on networking infrastructure and operations. It is&lt;br /&gt;
considered a foundational certification.&lt;br /&gt;
The Certified Information Systems Security Professional (CISSP) is a&lt;br /&gt;
more advanced certification designed for cybersecurity professionals&lt;br /&gt;
with at least five years of work experience. The certification covers&lt;br /&gt;
topics such as architecture, engineering, and management.&amp;lt;/p&amp;gt;&lt;br /&gt;
The Certified Ethical Hacker (CEH) certification is also considered a&lt;br /&gt;
more advanced cert because it generally requires that applicants have&lt;br /&gt;
multiple years of work experience. The goal of an ethical hacker&lt;br /&gt;
certification is to be able to understand how cyber attacks unfold in&lt;br /&gt;
order to improve threat assessment and mitigation skills.&amp;lt;ref name=&amp;quot;cyberguide&amp;quot;&amp;gt;Cybersecurity Guide, &amp;quot;How to become a cybersecurity specialist&amp;quot;, [Online]. Available: https://cybersecurityguide.org/careers/security-specialist/. [Accessed 27 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
This is definitely not all, when one looks for more information, following link could be searched, to get more in depth knowledge about&lt;br /&gt;
different possibilities. Hereby, with the help of this matrix a possible taxonomy of different 436 listed certificates in branches are&lt;br /&gt;
presented.&amp;lt;ref name=&amp;quot;Pauljeremy&amp;quot;&amp;gt;&amp;quot;Cybersecurity Roadmap,&amp;quot; [Online]. Available: https://pauljerimy.com/2020/10/12/scr-oct-2020-update/. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:analystimage5.png|1000px|thumb|Certificate matrix &amp;lt;ref&amp;gt;&amp;quot;Certification roadmap&amp;quot;. Available at https://pauljerimy.com/security-certification-roadmap&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
=== Communication and Network Security===&lt;br /&gt;
Communication and network security covers the ability to secure&lt;br /&gt;
communication channels and networks. Topics include secure and converges&lt;br /&gt;
protocols, wireless networks, cellular networks, hardware operations&lt;br /&gt;
(warranty and redundant power), and third-party connectivity. IP&lt;br /&gt;
networking are also included in this domain.&lt;br /&gt;
===Identity and Access Management===&lt;br /&gt;
The identity and access management domain covers the attacks that&lt;br /&gt;
target the human gateway to gain access to data. Other topics include&lt;br /&gt;
ways to identify users with rights to access the information and&lt;br /&gt;
servers. Identity and access management covers the topics of&lt;br /&gt;
applications, Single sign-on authentication, privilege escalation,&lt;br /&gt;
Kerberos, rule-based or risk-based access control, proofing and&lt;br /&gt;
establishment of identity.&lt;br /&gt;
===Security Architecture and Engineering===&lt;br /&gt;
The security architecture and engineering domain covers important&lt;br /&gt;
topics concerning security engineering plans, designs and principles,&lt;br /&gt;
Topics include assessing and mitigating information system&lt;br /&gt;
vulnerabilities, fundamental concepts of security models and security&lt;br /&gt;
architectures in critical areas like access control. Cloud systems,&lt;br /&gt;
cryptography, system infiltrations (ransomware, fault-injection and&lt;br /&gt;
more) and virtualized systems are also covered in this domain.&lt;br /&gt;
===Asset Security===&lt;br /&gt;
The Asset Security domain deals with the issues related to the&lt;br /&gt;
collection, storage, maintenance, retention and destruction of data. It&lt;br /&gt;
also covers knowledge of different roles regarding data handling (owner,&lt;br /&gt;
controller and custodian) as well as data protection methods and data&lt;br /&gt;
states. Other topics include resource provision, asset classification&lt;br /&gt;
and data lifecycle management.&lt;br /&gt;
===Security and Risk Management===&lt;br /&gt;
The security and risk management domain covers general on skills&lt;br /&gt;
related to the implementation of user awareness programs as well as&lt;br /&gt;
security procedures. Emphasis is also placed on risk management&lt;br /&gt;
concerning the acquisition of new services, hardware and software&lt;br /&gt;
(supply chain). Other skills include social engineering defense&lt;br /&gt;
mechanisms.&lt;br /&gt;
===Security Assessment and Testing===&lt;br /&gt;
The security assessment and testing domain deals with all the&lt;br /&gt;
techniques and tools used to find system vulnerabilities, weaknesses and&lt;br /&gt;
potential areas of concern not addressed by security procedures and&lt;br /&gt;
policies. Attack simulations, vulnerability assessment, compliance&lt;br /&gt;
checks, and ethical disclosure also fall under this domain.&lt;br /&gt;
===Software Security===&lt;br /&gt;
The software development security domain deals with implementing&lt;br /&gt;
software-based security protocols within environment for which the IT&lt;br /&gt;
professional is responsible. Risk analysis, vulnerability identification&lt;br /&gt;
and auditing of source codes are all covered in this subset. Additional&lt;br /&gt;
topics include software-designed security, maturity models, development&lt;br /&gt;
methodologies, open-source and third-party development security.&lt;br /&gt;
===Security operations===&lt;br /&gt;
The security operations domain covers topics ranging from&lt;br /&gt;
investigations and digital forensic to detection and intrusion&lt;br /&gt;
prevention tools, sandboxing and firewalls. Topics include user and&lt;br /&gt;
entity behavior analytics, threat intelligence (threat hunting and&lt;br /&gt;
threat feeds) log management, artifacts (mobile, computer and network),&lt;br /&gt;
machine learning and AI-based tools, penetration testing, and&lt;br /&gt;
exploitation development. These for sub-domains are lister here.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Incident Handling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Penetration Testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Exploitation&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Education==&lt;br /&gt;
&amp;lt;p&amp;gt;The entry level monitoring specialist is hired by Estonian&lt;br /&gt;
Information System Authority even if there is no formal IT education,&lt;br /&gt;
but readiness to learn and moderate knowledge of different operation&lt;br /&gt;
systems is enough to start the career.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.cv.ee/en/vacancy/792782/riigi-infosusteemi-amet/seirespetsialist-tule-eesti-kuberruumi-valvuriks&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Nevertheless, like most other high qualification careers jobs falling&lt;br /&gt;
under the cybersecurity specialist category require some form of formal&lt;br /&gt;
education. However, since cybersecurity specialist jobs can fall across&lt;br /&gt;
a wide spectrum of job descriptions and responsibilities, it is possible&lt;br /&gt;
to obtain a specialist job after completing many levels of different&lt;br /&gt;
computer related education.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;If one is looking for a cybersecurity related education, for example&lt;br /&gt;
in EU, 137 courses/programs could be found that relate to keyword IT or&lt;br /&gt;
cybersecurity.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.enisa.europa.eu/topics/cybersecurity-education/education-map/education-courses&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Also, there is a great amount of discussion, if cuber security&lt;br /&gt;
professional should have a degree or would be certification just enough.&lt;br /&gt;
One interesting table is produces by Franklin University that compares&lt;br /&gt;
benefits and/or drawbacks of each type of credential.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image11.png&amp;quot; alt=&amp;quot;Comparison MSc vs certificate&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;Comparison MSc vs&lt;br /&gt;
certificate&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Certifications are generally good for people with little practical&lt;br /&gt;
experience because they are known quantities in the industry and can&lt;br /&gt;
help you get your foot in the door. They set a minimum knowledge bar.&lt;br /&gt;
But some certifications are viewed more favorably than others.&lt;br /&gt;
Certifications with renewal requirements are viewed better by hiring&lt;br /&gt;
managers, but they also more costly in the long run because of the need&lt;br /&gt;
for continuing education. Certifications are also good for showing&lt;br /&gt;
in-depth expertise in a specialization within cybersecurity. Depending&lt;br /&gt;
on your career goals, it may be advantageous to have a master’s&lt;br /&gt;
degree—which shows your breadth of knowledge, critical thinking and&lt;br /&gt;
leadership skills—and a certificate—which shows specific skill&lt;br /&gt;
competency.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;As IT (Cyber) Security is still a relatively young discipline,&lt;br /&gt;
universities and colleges are still figuring out which is the best&lt;br /&gt;
approach for their degrees. Study programmes and curricula in Cyber&lt;br /&gt;
Security are different. In general, here are the duration of Cyber&lt;br /&gt;
Security degrees:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Bachelor’s degrees in Cyber Security take 3 or 4 years in most&lt;br /&gt;
countries.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Master’s courses in Cyber Security take between 1-2 years to&lt;br /&gt;
complete.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;PhD programmes in Cyber Security last 3-5 years. Some only take 1&lt;br /&gt;
or 2 years, but they are less common.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Generalization could me made that on bachelor level the general&lt;br /&gt;
knowledge about the cyber issues are obtained. On master level the&lt;br /&gt;
specialization courses are taken and the person can choose more specific&lt;br /&gt;
topics to study. It is on master level where strengths of the cyber&lt;br /&gt;
specialist can be developed further and up-do date knowledge obtained in&lt;br /&gt;
specifics. PhD is serious science and involves teaching, lot of&lt;br /&gt;
scientific work and writing for publications.&amp;lt;/p&amp;gt;&lt;br /&gt;
==Salary==&lt;br /&gt;
&amp;lt;p&amp;gt;Even if the salary can be very different, compared to the skills and&lt;br /&gt;
experience, an generalization can be made. Cyber Security professionals&lt;br /&gt;
in CSIRT, and in other entities earn quite well, from the start. First,&lt;br /&gt;
some comparison from the United States. The average CSIRT analyst salary&lt;br /&gt;
in the USA is $97,500 per year or $50 per hour. Entry level positions&lt;br /&gt;
start at $48,875 per year while most experienced workers make up to&lt;br /&gt;
$135,373 per year.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.talent.com/salary?job=csirt+analyst&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;There are multiple positions you can occupy in this field. They have&lt;br /&gt;
in common great salaries and high demand for technical skills, attention&lt;br /&gt;
to details, problem-solving mentality, and the ability to analyze risks.&lt;br /&gt;
Here are the average annual salaries in the United States, according to&lt;br /&gt;
Payscale:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.payscale.com/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Cryptographer – 100,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Information Security Officer – 91,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Assessor – 90,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Engineer – 88,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Penetration Tester – 81,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Forensics Expert – 71,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Administrator – 65,000 USD&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When looking into salaries in Estonia, one can find that there is a&lt;br /&gt;
discussion that private sector is taking a toll from the public sector,&lt;br /&gt;
and that the salaries in important agencies, as Information System&lt;br /&gt;
Authority loose their employees to the better paid positions in private&lt;br /&gt;
sector.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://digi.geenius.ee/rubriik/uudis/kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad/&lt;br /&gt;
https://tehnika.postimees.ee/6887428/riigi-it-tootajate-palgamaarad-kasvasid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;But there is also a different view that average private sector worker&lt;br /&gt;
could be hired as a top specialist in public sector and then the payment&lt;br /&gt;
is higher. Nevertheless, it seems that the average payment in cyber&lt;br /&gt;
security sector is any way higher that in other parts of the&lt;br /&gt;
e-services.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://digi.geenius.ee/rubriik/uudis/5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka/&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
==SOC==&lt;br /&gt;
&amp;lt;p&amp;gt;A SOC is a facility where an organization’s network, applications,&lt;br /&gt;
and endpoints are monitored and defended. The term was adapted from&lt;br /&gt;
network operations centers (NOCs), where large telecommunication or&lt;br /&gt;
corporate networks are monitored. When network security became more of a&lt;br /&gt;
concern, security teams were formed within the NOCs, and eventually spun&lt;br /&gt;
off into larger organizations of their own as the responsibilities of&lt;br /&gt;
security teams grew increasingly complex and specialized. The security&lt;br /&gt;
staff working in a security operations center are often called the SOC&lt;br /&gt;
team.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Functions of the SOC team include, but are not limited to:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ol type=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Taking inventory of resources, to get a better understanding of the&lt;br /&gt;
structure they are protecting.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintanence of the system, by constantly making updates and adding&lt;br /&gt;
safeguards.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Monitoring the network for abnormalities with special tools.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Threat analysis of new attacks and vulnerabilities.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Responding to attacks, by acting as “first responders”. The SOC team&lt;br /&gt;
will shut down and/or isolate endpoints, deleting files and lowering the&lt;br /&gt;
impact as fast as possible.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Recovery of system stability and lost data. This may be done using&lt;br /&gt;
backups, restarting endpoints or reconfiguring systems.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Logging all actions on the system, to be later used for analysis or&lt;br /&gt;
forensics after an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigating the root cause of an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Auditing their own actions, to be in line with regulations of the&lt;br /&gt;
organization, industry or governing body.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.trellix.com/en-us/security-awareness/operations/what-is-soc.html&amp;lt;/p&amp;gt;&lt;br /&gt;
==CSIRT==&lt;br /&gt;
&amp;lt;p&amp;gt;A CSIRT is a group that responds to security incidents when they&lt;br /&gt;
occur. Key responsibilities of a CSIRT include: &lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
===Creating and maintaining an incident response plan (IRP)===&lt;br /&gt;
An incident response plan (IRP) is a set of written instructions for&lt;br /&gt;
detecting, responding to and limiting the effects of an information&lt;br /&gt;
security event. Incident response plans provide instructions for&lt;br /&gt;
responding to many potential scenarios, including data breaches, denial&lt;br /&gt;
of service/distributed denial of service attacks, firewall breaches,&lt;br /&gt;
virus or malware outbreaks or insider threats. Without an incident&lt;br /&gt;
response plan in place, organizations may either not detect the attack&lt;br /&gt;
in the first place, or not follow proper protocol to contain the threat&lt;br /&gt;
and recover from it when a breach is detected.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.stratacore.com/incidentresponseplan&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
===Investigating and analyzing incidents===&lt;br /&gt;
CSIRTs are also involved in improvement activities. After major&lt;br /&gt;
computer security incidents occur, or when incidents are not handled in&lt;br /&gt;
a timely or effective manner, a CSIRT will generally perform a&lt;br /&gt;
postmortem of the incident and its response. This postmortem will&lt;br /&gt;
identify the strengths and weakness of the response effort. Such reviews&lt;br /&gt;
can identify weaknesses and holes in systems, infrastructure defenses,&lt;br /&gt;
or policies that allowed the incident to take place. It can also&lt;br /&gt;
identify problems with communication channels, interfaces, and&lt;br /&gt;
procedures that inhibited the efficient resolution of the reported&lt;br /&gt;
problem.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.cisa.gov/uscert/bsi/articles/best-practices/incident-management/defining-computer-security-incident-response-teams&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Managing internal communications and updates during or immediately after incidents occur===&lt;br /&gt;
===Communicating with employees, shareholders, customers, and the press about incidents as needed===&lt;br /&gt;
&amp;lt;p&amp;gt;There are various services within the CSIRT Services Framework that&lt;br /&gt;
address communications, as they relate to security operations and&lt;br /&gt;
incident response services. Some of these include Information Security&lt;br /&gt;
Incident Coordination, Crisis Management Support, Vulnerability&lt;br /&gt;
Disclosure, Situational Awareness Communication, and Awareness Building,&lt;br /&gt;
to name a few. Sharing information and communicating with the general&lt;br /&gt;
public and/or your constituency is appropriate in many different&lt;br /&gt;
scenarios. These can range from proactive communications to reactive&lt;br /&gt;
communications. Each scenario may be unique, and careful consideration&lt;br /&gt;
should be given to when to release information to the public and what&lt;br /&gt;
information should be released.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;https://resources.sei.cmu.edu/asset_files/Handbook/2021_002_001_651819.pdf&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Remediating incidents===&lt;br /&gt;
Threat remediation is a strong and capable tool for fighting the&lt;br /&gt;
cyber security compromises. As the word ‘remedy’ suggests, remediation&lt;br /&gt;
process involves the treatment of a security breach. With the&lt;br /&gt;
remediation practices, your cyber security team is able to eliminate&lt;br /&gt;
suspicious activities and malicious attacks in the form of malware,&lt;br /&gt;
ransomware, phishing and such. Even if you ‘kill’ the suspicious&lt;br /&gt;
activity, the attackers can remain in your systems. If you want to&lt;br /&gt;
contaminate and end the problem for good, your remediation processes&lt;br /&gt;
must involve the detection of the cause. &amp;lt;ref name=&amp;quot;logsign&amp;quot;&amp;gt;Logsign, &amp;quot;What-is-remediation-in-cyber-security&amp;quot;. Available: https://www.logsign.com/blog/what-is-remediation-in-cyber-security/. [Accessed 28 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Recommending technology, policy, governance, and training changes after security incidents===&lt;br /&gt;
After all these actions, the SCIRT must contribute to the development&lt;br /&gt;
of better policies, practices and has to recommend improvements. They&lt;br /&gt;
are not working in the vacuum and their work has to create new and&lt;br /&gt;
better standards for cyber security. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;Exabeam, &amp;quot;CSIRT&amp;quot;. Available: https://www.exabeam.com/incident-response/csirt/ [Accessed 28 APr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==CERT==&lt;br /&gt;
&amp;lt;p&amp;gt;The term “computer emergency response team” was coined in 1988. In&lt;br /&gt;
response to the Morris worm attack that impacted thousands of servers on&lt;br /&gt;
the Internet, DARPA funded the formation of the Computer Emergency&lt;br /&gt;
Response Team Coordination Center (CERT-CC) at Carnegie Mellon&lt;br /&gt;
University. The goal of CERT-CC was to help protect the internet by&lt;br /&gt;
collecting and disseminating information on critical security&lt;br /&gt;
vulnerabilities. Several other countries formed similar centers using&lt;br /&gt;
the same acronym (despite threats of legal action by Carnegie Mellon for&lt;br /&gt;
trademark infringement). Now the term CERT refers to any emergency&lt;br /&gt;
response team that deals with cyber threats. Many people use CERT-CC&lt;br /&gt;
interchangeably with CSIRT, though the charter of a CERT is information&lt;br /&gt;
sharing in order to help other response teams respond to threats against&lt;br /&gt;
their own infrastructure.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In general, the designation of CERT is helpful in applying real-world&lt;br /&gt;
solutions to various cybersecurity problems. They may be government&lt;br /&gt;
contractors or employees of a major corporation. For example, the U.S.&lt;br /&gt;
Computer Emergency Readiness Team (US-CERT) operates under the U.S.&lt;br /&gt;
Department of Homeland Security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.techopedia.com/definition/31003/computer-emergency-response-team-cert&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In Estonia CERT is designated as CERT-EE. It was established in 2006,&lt;br /&gt;
as an organization responsible for the management of security incidents&lt;br /&gt;
in .ee computer networks. It is also a national contact point for&lt;br /&gt;
international co-operation in the field of IT security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ria.ee/en/cyber-security/cert-ee.html&amp;lt;/p&amp;gt;&lt;br /&gt;
===Difference between SOC/CSIRT/CERT===&lt;br /&gt;
&amp;lt;p&amp;gt;How CSIRTs differ from CERTs and SOCs There are overlapping&lt;br /&gt;
responsibilities between a community emergency response team (CERT),&lt;br /&gt;
computer security incident response team (CSIRT), and security&lt;br /&gt;
operations center (SOC). To add to this confusion, frequently, the terms&lt;br /&gt;
CERT and CSIRT are used interchangeably, despite the important&lt;br /&gt;
differences.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image3.png&amp;quot; alt=&amp;quot;Overlapping in images/image3.png&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;Overlapping in&lt;br /&gt;
images/image3.png&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
==Understand the primary roles and characteristics of a CERT, CSIRT, and SOC.==&lt;br /&gt;
&amp;lt;p&amp;gt;So, using strict definitions, a CERT collects and disseminates&lt;br /&gt;
security information, typically for the benefit of a country or an&lt;br /&gt;
industry. A CSIRT is a cross-functional team that responds to incidents&lt;br /&gt;
on behalf of a country or an organization. A SOC is where a country or&lt;br /&gt;
organization monitors and defends its network, servers, applications,&lt;br /&gt;
and endpoints.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image4.png&amp;quot; alt=&amp;quot;table of explanation images/image4&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;table of explanation&lt;br /&gt;
images/image4&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
==Future==&lt;br /&gt;
&amp;lt;p&amp;gt;And the Cyber security problem is only getting bigger. According to a&lt;br /&gt;
report published by Accenture, the number of cyber security breaches&lt;br /&gt;
increased by 11 percent from 2017 to 2018. The cost of such breaches is&lt;br /&gt;
astronomical–about $600 billion worldwide, according to the Economic&lt;br /&gt;
Impact of Cybercrime report.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Job projections for cybersecurity are staggering. The Bureau of Labor&lt;br /&gt;
Statistics in US predicts that careers in the cybersecurity field will&lt;br /&gt;
grow by 32% by 2028. That makes cybersecurity one of the top 10&lt;br /&gt;
fastest-growing jobs in the country. In the United States alone, jobs&lt;br /&gt;
for Information Security Analysts are expected to grow by 15% by&lt;br /&gt;
2024.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Most likely this trend is also similar in other countries.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When checking Estonian job portals, there is a constant need for&lt;br /&gt;
people for cyber security related positions. Also, linkedin search gives&lt;br /&gt;
approximately 30 vacancies immediately. There are banks, logistics&lt;br /&gt;
companies, e-shops, and software producers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://ee.linkedin.com/jobs/cyber-security-jobs?countryRedirected=1&amp;amp;amp;position=1&amp;amp;amp;pageNum=0&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Trends that affect companies create need for constant cyber security&lt;br /&gt;
services. Increasing number of home/remote offices require secure&lt;br /&gt;
corporate networks and security of remote devices. One example is from&lt;br /&gt;
this year, when sloppy remote desktop set-up paralyzed systems of 17&lt;br /&gt;
companies.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.aripaev.ee/uudised/2022/04/20/ria-lohakas-kaugtoolaua-seadistus-halvas-martsis-vahemalt-17-juhul-ettevotete-it-susteemid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Also, no service can exists without robust infrastructure - servers,&lt;br /&gt;
databases, applications. As all previously mentioned devices and&lt;br /&gt;
services are at constant scanning and surveillance. So, the breach&lt;br /&gt;
detection and immediate action demands 24/7 services. Even if lot of&lt;br /&gt;
things could be automated, there is a need for human specialists (at&lt;br /&gt;
least, at the moment). Third growing field is also a forensic&lt;br /&gt;
investigation, as every attack must be investigated in order to be ready&lt;br /&gt;
to repel next attacks. So data recovery and evidence collection is&lt;br /&gt;
another important field of work that need skilled and professional&lt;br /&gt;
workers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Even, if the specifics of the entity, be it CSIRT, CERT or SOC, are&lt;br /&gt;
different, the fundamentals of the work are the same. Professional&lt;br /&gt;
knowledge of the networks, operational systems, hardware, scripting, and&lt;br /&gt;
several other wider IT related knowledge is needed. As there is no&lt;br /&gt;
single way to reach to it, every single person can find one’s strongest&lt;br /&gt;
sides and develop them with knowledge of weaker side, in order to know,&lt;br /&gt;
when to as for help.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/body&amp;gt;&lt;br /&gt;
&amp;lt;/html&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mavald</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142194</id>
		<title>Hiring a Cyber Security Incident Analyst</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142194"/>
		<updated>2022-05-01T15:10:06Z</updated>

		<summary type="html">&lt;p&gt;Mavald: /* Senior-Level Incident Response Positions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==A Cyber Security Incident Analyst==&lt;br /&gt;
&lt;br /&gt;
[[File:image1.png|600px|thumb|Job advertisement &amp;lt;ref&amp;gt;&amp;quot;Job Advertisement&amp;quot;. Available at https://www.projectpeople.com/jobs/&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
===Cyber security incident analyst in SOC/CSIRT/CERT===&lt;br /&gt;
This article delves into the job title of Cyber Security Incident&lt;br /&gt;
Analyst and provides an overview of the acronyms SOC/CSIRT/CERT. A brief&lt;br /&gt;
history of the job is discussed here, as well as a possible career path,&lt;br /&gt;
education, experience, and other characteristics required for work in&lt;br /&gt;
computer security-related organizations. The article also provides a&lt;br /&gt;
brief history of SOC/CSIRT/CERT, as well as a comparison of their&lt;br /&gt;
differences and similarities.&lt;br /&gt;
===Cyber Security Incident Analyst Skill Set===&lt;br /&gt;
What skill set is expected from the Cyber Security Incident Analyst? Below written lines are taken from the same job advertisement depicted&lt;br /&gt;
on the left side of this article:&lt;br /&gt;
As a Security Incident Analyst your responsibilities will include:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Continuous monitoring of security tooling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Performing regular and ad-hoc vulnerability assessments&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Carrying out ‘spot checks’&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Reporting vulnerabilities to the PVG via the alerts system&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintaining and documenting logging systems&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Developing centralized logging, reporting and intelligence&lt;br /&gt;
platforms&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;‘Light touch’ penetration testing with open source tooling&lt;br /&gt;
(Metasploit)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Knowledge &amp;amp;amp; Experience required:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;SOC, CSIRT or CERT operational environment experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Windows / Linux experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TCP /IP networking protocol knowledge&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience reviewing and analyzing Security Events from various&lt;br /&gt;
monitoring and logging sources&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience in website and web application security assessment or&lt;br /&gt;
penetration testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience of using Metasploit&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Scripting knowledge using BASH, Python, Perl, Ruby&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Skills in Host and Network Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
As one can see the description of the duties is wide and also the&lt;br /&gt;
knowledge and experience that is required is noteworthy. So, where to&lt;br /&gt;
start to find out the way to get this kind of knowledge and&lt;br /&gt;
expertize.&lt;br /&gt;
===Possible career path===&lt;br /&gt;
Next part of the paper is aiming to depict a possible ways, how to&lt;br /&gt;
develop oneself, and move along the career pathway in cybersecurity&lt;br /&gt;
field. Topics of development, education, experience and certification&lt;br /&gt;
are covered.&lt;br /&gt;
[[File:analystimage2.png|1000px|thumb|Career path &amp;lt;ref&amp;gt;&amp;quot;Possible Career Path&amp;quot;. Available at https://www.cyberseek.org/pathway.html&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
===Junior/Senior===&lt;br /&gt;
Start with an entry-level job in IT. Hands-on experience is often the&lt;br /&gt;
most effective way to prepare for certification exams. Start&lt;br /&gt;
accumulating work experience with an entry-level role as a cybersecurity&lt;br /&gt;
analyst. Many cybersecurity professionals start off in more general IT&lt;br /&gt;
roles. The skills, practices, and technologies you’ll use as a&lt;br /&gt;
cybersecurity professional will continue to evolve along with computer&lt;br /&gt;
and network technology. The desire to learn, ability to problem solve,&lt;br /&gt;
and attention to detail will serve you well in this field. Other, more&lt;br /&gt;
technical skills and technologies to learn include:&amp;lt;ref name=&amp;quot;certification&amp;quot;&amp;gt;Popular Cyber Security Certificates [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications  [Accessed 25 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====SIEM tools (security information and event management)====&lt;br /&gt;
Security Information and Event Management (SIEM) is a set of tools&lt;br /&gt;
and services offering a holistic view of an organization’s information&lt;br /&gt;
security. SIEM works by combining two technologies:&lt;br /&gt;
&amp;lt;li&amp;gt;Security information management (SIM), which collects data from log&lt;br /&gt;
files for analysis and reports on security threats and events, and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;security event management (SEM), which conducts real-time system&lt;br /&gt;
monitoring, notifies network admins about important issues and&lt;br /&gt;
establishes correlations between security events. There are a number of&lt;br /&gt;
security information and event management solutions on the market.&lt;br /&gt;
ArcSight ESM, IBM QRadar and Splunk are among the most popular. &amp;lt;ref name=&amp;quot;SIEM&amp;quot;&amp;gt;Application security, SIEM [Online]. Available: https://www.imperva.com/learn/application-security/siem/. [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Firewalls, Intrusion Detection Systems (IDS), and Intrusion Prevention Systems(IPS)====&lt;br /&gt;
Firewalls can be two types, hardware and software firewalls. Software&lt;br /&gt;
firewall is a firewall that is installed on a computer or server, and&lt;br /&gt;
tasked with network security. It works with a wide variety of other&lt;br /&gt;
technology security solutions to provide more robust and cohesive&lt;br /&gt;
security for enterprises of all sizes. When a software firewall is&lt;br /&gt;
installed on a server, it opens up like an umbrella of protection over&lt;br /&gt;
all other computers connected to the network. It is able to monitor both&lt;br /&gt;
incoming and outgoing traffic for potential risk or suspicious user&lt;br /&gt;
behavior, and also makes setting security policies much easier, faster&lt;br /&gt;
and more flexible. Hardware firewall is positioned between the network&lt;br /&gt;
and devices, allowing traffic to funnel through the firewall for a close&lt;br /&gt;
inspection and analysis. A hardware firewall, a term often&lt;br /&gt;
interchangeable with network or next-generation firewall, protects the&lt;br /&gt;
network gateways for an enterprise. Hardware firewall is physical&lt;br /&gt;
hardware, installed between network elements and connected devices, and&lt;br /&gt;
is tasked with filtering traffic for cyber threat to the network or&lt;br /&gt;
devices. Filtering out unauthorized or suspicious users based on traffic&lt;br /&gt;
analysis is one of the biggest benefits of hardware firewall. &amp;lt;ref name=&amp;quot;sangfor&amp;quot;&amp;gt;Sangfor, &amp;quot;What is Software Firewall? Difference between Hardware Firewall and Software Firewall, [Online]. Available: https://www.sangfor.com/blog/cybersecurity/what-is-software-firewall-difference-between-hardware-firewall-and-software-firewall [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems&lt;br /&gt;
(IPS) are both parts of the network infrastructure. IDS/IPS compare&lt;br /&gt;
network packets to a cyberthreat database containing known signatures of&lt;br /&gt;
cyberattacks — and flag any matching packets. IDS doesn’t alter the&lt;br /&gt;
network packets in any way, whereas IPS prevents the packet from&lt;br /&gt;
delivery based on the contents of the packet, much like how a firewall&lt;br /&gt;
prevents traffic by IP address. &amp;lt;ref name=&amp;quot;Varonis&amp;quot;&amp;gt;Varonis, &amp;quot;What is Software Firewall? IDS vs. IPS: What is the Difference?, [Online]. Available: https://www.varonis.com/blog/ids-vs-ips [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Digital forensics====&lt;br /&gt;
Digital forensics is a branch of forensic science that focuses on&lt;br /&gt;
identifying, acquiring, processing, analyzing, and reporting on data&lt;br /&gt;
stored electronically. Electronic evidence is a component of almost all&lt;br /&gt;
criminal activities and digital forensics support is crucial for law&lt;br /&gt;
enforcement investigations. Electronic evidence can be collected from a&lt;br /&gt;
wide array of sources, such as computers, smartphones, remote storage,&lt;br /&gt;
unmanned aerial systems, shipborne equipment, and more.&amp;lt;ref name=&amp;quot;interpol&amp;quot;&amp;gt;Interpol, &amp;quot;Digital forensics&amp;quot;. Available: https://www.interpol.int/How-we-work/Innovation/Digital-forensics. [Accessed 28 4 2022].&amp;lt;/ref&amp;gt; &lt;br /&gt;
Investigative process of digital forensics can be divided into several stages. There are four major stages: preservation, collection,&lt;br /&gt;
examination, and analysis. All these four stages need a deep understanding of computers, technology across a broad spectrum, and cybersecurity principles and&lt;br /&gt;
practices, a working knowledge of computers, networks, and coding, in-depth investigative abilities, critical-thinking skills and analytical talent the ability to effectively communicate and work with a&lt;br /&gt;
wide range of people. &amp;lt;ref name=&amp;quot;ecpi&amp;quot;&amp;gt;&amp;quot;Digital forensics&amp;quot;. Available: https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me. [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Mobile device management====&lt;br /&gt;
Mobile device management (MDM) is software that allows IT&lt;br /&gt;
administrators to control, secure and enforce policies on smartphones,&lt;br /&gt;
tablets and other endpoints. Mobile device management software emerged&lt;br /&gt;
in the early 2000s as a way to control and secure the personal digital&lt;br /&gt;
assistants and smartphones that business workers began to use. The&lt;br /&gt;
consumer smartphone boom that started with the launch of the Apple&lt;br /&gt;
iPhone in 2007 led to the bring your own device (BYOD) trend, which&lt;br /&gt;
fueled further interest in MDM.&amp;lt;ref name=&amp;quot;techtarget&amp;quot;&amp;gt;Techtarget, &amp;quot;Mobile Device Management&amp;quot;. Available: https://www.techtarget.com/searchmobilecomputing/definition/mobile-device-management [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Data management====&lt;br /&gt;
Sometimes the data management is neglected, but this part has a&lt;br /&gt;
crucial role when learning for good cyber security practices. Majority&lt;br /&gt;
of cyber security programs include a special courses on data management.&lt;br /&gt;
Data management is a method of organizing and maintaining data processes&lt;br /&gt;
that are required in almost every business operations. The benefits of&lt;br /&gt;
data management can be found accounting, statistics, logistics planning&lt;br /&gt;
and other disciplines including corporate computing.&amp;lt;ref name=&amp;quot;GlobalUni&amp;quot;&amp;gt;Global Universities, &amp;quot;MSc Data Management and Cyber Security&amp;quot;. Available: https://globaluniversities.in/msc-data-management-cyber-security. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Data governance (and management) play a fundamental role in&lt;br /&gt;
protecting an organization’s data. Ensuring that the right people have&lt;br /&gt;
the right access and that appropriate security controls are in place to&lt;br /&gt;
protect each system or service, based on the criticality or sensitivity&lt;br /&gt;
of the data sets these contain. &amp;lt;ref name=&amp;quot;CyberMagazine&amp;quot;&amp;gt;Cyber Security Magazine, &amp;quot;The Role of Data Governance in Cybersecurity&amp;quot;. Available: https://cybersecurity-magazine.com/the-role-of-data-governance-in-cybersecurity/?utm_source=rss&amp;amp;amp;utm_medium=rss&amp;amp;amp;utm_campaign=the-role-of-data-governance-in-cybersecurity. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Application security development====&lt;br /&gt;
Application security describes security measures at the application&lt;br /&gt;
level that aim to prevent data or code within the app from being stolen&lt;br /&gt;
or hijacked. It encompasses the security considerations that happen&lt;br /&gt;
during application development and design, but it also involves systems&lt;br /&gt;
and approaches to protect apps after they get deployed. Application&lt;br /&gt;
security may include hardware, software, and procedures that identify or&lt;br /&gt;
minimize security vulnerabilities.&amp;lt;ref name=&amp;quot;vmware&amp;quot;&amp;gt;VmWare, &amp;quot;What is application security?&amp;quot;. Available: https://www.vmware.com/topics/glossary/content/application-security.html [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Application security development is important to ensure that your&lt;br /&gt;
application is free from coding errors and bugs. And controls the risk&lt;br /&gt;
and helps safeguard against security vulnerabilities. Application&lt;br /&gt;
security development is the process of making applications more secure&lt;br /&gt;
by finding and fixing security vulnerabilities. This is often done by&lt;br /&gt;
enforcing software security best practices and using application&lt;br /&gt;
security testing tools. &lt;br /&gt;
&amp;lt;ref name=&amp;quot;perforce&amp;quot;&amp;gt;Perforce, &amp;quot;Application Security Development Best Practices&amp;quot;. Available: https://www.perforce.com/blog/kw/application-security-development-best-practices. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Audit and compliance knowledge====&lt;br /&gt;
A cyber security audit is designed to be a comprehensive review and&lt;br /&gt;
analysis of your business’s IT infrastructure. It identifies threats and&lt;br /&gt;
vulnerabilities, exposing weaknesses and high-risk practices.&lt;br /&gt;
Regulations such as the EU GDPR (General Data Protection Regulation) can&lt;br /&gt;
impose hefty penalties in the event of a breach that results in&lt;br /&gt;
exploited data. A cyber security audit will help mitigate the&lt;br /&gt;
consequences of a breach and demonstrate that your organization has&lt;br /&gt;
taken the necessary steps to protect client and company data. &amp;lt;ref name=&amp;quot;cyforsecure&amp;quot;&amp;gt;Cyfor Secure, &amp;quot;What is a Cyber Security Audit and how can it help your organisation?&amp;quot;. Available: https://cyforsecure.co.uk/services/cyber-assessment/cyber-security-audit/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cybersecurity compliance is the organizational risk management method&lt;br /&gt;
aligned with pre-defined security measures &amp;amp;amp; controls on how data&lt;br /&gt;
confidentiality is ensured by its administrative procedures.&amp;lt;ref name=&amp;quot;nordlayer&amp;quot;&amp;gt;NordLayer, &amp;quot;Cybersecurity compliance: Everything you need to know&amp;quot;. Available: https://nordlayer.com/blog/cybersecurity-compliance-everything-you-need-to-know/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
All needed skills are developed through courses and certification.&lt;br /&gt;
&lt;br /&gt;
===Entry-Level Incident Response Positions===&lt;br /&gt;
It is not always possible to advance to the position of incident&lt;br /&gt;
responder in a straight line. Many professionals advance from entry- to&lt;br /&gt;
mid-level positions before becoming a real incident responder or a&lt;br /&gt;
member of a computer emergency response team (CERT).&amp;lt;br /&amp;gt;&lt;br /&gt;
These are some examples:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;network-administrator&amp;quot;&amp;gt;Network administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;This position’s experience will help potential incident responders&lt;br /&gt;
develop networking skills. Attention to detail, as well as the ability&lt;br /&gt;
to sift through system configurations, site layouts, and general network&lt;br /&gt;
and communication setups, are essential in this field.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;system-administrator&amp;quot;&amp;gt;System administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Another crucial beginning point for an incident responder is to learn&lt;br /&gt;
how to manage resources inside your organization as well as user&lt;br /&gt;
behavior. Understanding the potential damage that users, inadequate&lt;br /&gt;
security setups, and ineffective IT policies and procedures can cause on&lt;br /&gt;
your network can provide prospective candidates with insight into the&lt;br /&gt;
human component of an incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;security-administrator&amp;quot;&amp;gt;Security administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In such a position, basic hacking skills, penetration testing, and&lt;br /&gt;
intrusion detection are all learned, which are crucial incident&lt;br /&gt;
responder skills when trying to replicate a breach or attack.&lt;br /&gt;
Understanding the paths a cybercriminal will take when attempting to&lt;br /&gt;
damage or obtain access to a system can greatly simplify the work of&lt;br /&gt;
reverse engineering the incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://resources.infosecinstitute.com/topic/incident-responder-career-roadmap-entry-level-executive/&amp;lt;/p&amp;gt;&lt;br /&gt;
=== Mid-Level Incident Response Positions ===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5&lt;br /&gt;
id=&amp;quot;computer-security-incident-response-team-csirt-engineer&amp;quot;&amp;gt;Computer&lt;br /&gt;
security incident response team (CSIRT) engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;cyber-incident-responder&amp;quot;&amp;gt;Cyber incident responder&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-response-engineer&amp;quot;&amp;gt;Incident response&lt;br /&gt;
engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;While each of these positions is different, they generally require&lt;br /&gt;
very similar skills and characteristics in a candidate. At this level,&lt;br /&gt;
personal characteristics such as problem solving, time management, and&lt;br /&gt;
even presentation skills become more crucial as one’s career evolves&lt;br /&gt;
into a management-facing role.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Technical skills include the ability to identify and minimize threats&lt;br /&gt;
while maintaining communication with management and the rest of your&lt;br /&gt;
team. Data analysis and evidence gathering become increasingly crucial,&lt;br /&gt;
and the circumstances in which your services are deployed get more&lt;br /&gt;
serious.&amp;lt;/p&amp;gt;&lt;br /&gt;
Problem-solving skills are crucial at this level of incident&lt;br /&gt;
response, and as the stakes rise, so does the pressure in each&lt;br /&gt;
situation. At this level, programming abilities are essential since&lt;br /&gt;
incident responders may be needed to reverse engineer malicious code or&lt;br /&gt;
even create patches for vulnerable network applications or services. &amp;lt;ref name=&amp;quot;coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated]&amp;quot;. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Senior-Level Incident Response Positions===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;intrusion-detection-specialist&amp;quot;&amp;gt;Intrusion detection&lt;br /&gt;
specialist:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;A CISSP certification might help a potential candidate in preparing&lt;br /&gt;
for the profession. The role of an intrusion detection specialist is to&lt;br /&gt;
find and stop any unwanted communications.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-manager&amp;quot;&amp;gt;Incident manager:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Expected to plan, oversee, manage, and supervise all incident&lt;br /&gt;
response team actions. Is in charge of reporting all current events to&lt;br /&gt;
senior management and stakeholders, as well as acting as the technical&lt;br /&gt;
lead on active incidents for incident responders. Prepares threat and&lt;br /&gt;
impact assessments and reports them known to management.&amp;lt;ref name=&amp;quot;coursera&amp;quot;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Certificates== &lt;br /&gt;
There is a vast number of different certificates and the road map to&lt;br /&gt;
being a certified professional could be very different&amp;lt;ref name=&amp;quot;Coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated],&amp;quot; [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;NICCS&amp;quot;&amp;gt;NICCS, &amp;quot;Cybersecurity Certifications,&amp;quot; [Online]. Available: hhttps://niccs.cisa.gov/about-niccs/cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt; . One possible&lt;br /&gt;
approach is to start with basic certificates from the different branches&lt;br /&gt;
of service and move to more specific and demanding focused&lt;br /&gt;
certification. Also, some jobs require certain clearances, either from&lt;br /&gt;
industry, or from the government. One small selection of different&lt;br /&gt;
possible certificates is brought out in following paragraphs.&lt;br /&gt;
&lt;br /&gt;
Security+ is a CompTIA certification that is considered a basic cert&lt;br /&gt;
among cybersecurity professionals. It covers the topics of risk&lt;br /&gt;
management and threat assessment.&lt;br /&gt;
Network+ is also offered by CompTIA this certification (like the name&lt;br /&gt;
implies) focuses on networking infrastructure and operations. It is&lt;br /&gt;
considered a foundational certification.&lt;br /&gt;
The Certified Information Systems Security Professional (CISSP) is a&lt;br /&gt;
more advanced certification designed for cybersecurity professionals&lt;br /&gt;
with at least five years of work experience. The certification covers&lt;br /&gt;
topics such as architecture, engineering, and management.&amp;lt;/p&amp;gt;&lt;br /&gt;
The Certified Ethical Hacker (CEH) certification is also considered a&lt;br /&gt;
more advanced cert because it generally requires that applicants have&lt;br /&gt;
multiple years of work experience. The goal of an ethical hacker&lt;br /&gt;
certification is to be able to understand how cyber attacks unfold in&lt;br /&gt;
order to improve threat assessment and mitigation skills.&amp;lt;ref name=&amp;quot;cyberguide&amp;quot;&amp;gt;Cybersecurity Guide, &amp;quot;How to become a cybersecurity specialist&amp;quot;, [Online]. Available: https://cybersecurityguide.org/careers/security-specialist/. [Accessed 27 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
This is definitely not all, when one looks for more information, following link could be searched, to get more in depth knowledge about&lt;br /&gt;
different possibilities. Hereby, with the help of this matrix a possible taxonomy of different 436 listed certificates in branches are&lt;br /&gt;
presented.&amp;lt;ref name=&amp;quot;Pauljeremy&amp;quot;&amp;gt;&amp;quot;Cybersecurity Roadmap,&amp;quot; [Online]. Available: https://pauljerimy.com/2020/10/12/scr-oct-2020-update/. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:analystimage5.png|1000px|thumb|Certificate matrix &amp;lt;ref&amp;gt;&amp;quot;Certification roadmap&amp;quot;. Available at https://pauljerimy.com/security-certification-roadmap&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
=== Communication and Network Security===&lt;br /&gt;
Communication and network security covers the ability to secure&lt;br /&gt;
communication channels and networks. Topics include secure and converges&lt;br /&gt;
protocols, wireless networks, cellular networks, hardware operations&lt;br /&gt;
(warranty and redundant power), and third-party connectivity. IP&lt;br /&gt;
networking are also included in this domain.&lt;br /&gt;
===Identity and Access Management===&lt;br /&gt;
The identity and access management domain covers the attacks that&lt;br /&gt;
target the human gateway to gain access to data. Other topics include&lt;br /&gt;
ways to identify users with rights to access the information and&lt;br /&gt;
servers. Identity and access management covers the topics of&lt;br /&gt;
applications, Single sign-on authentication, privilege escalation,&lt;br /&gt;
Kerberos, rule-based or risk-based access control, proofing and&lt;br /&gt;
establishment of identity.&lt;br /&gt;
===Security Architecture and Engineering===&lt;br /&gt;
The security architecture and engineering domain covers important&lt;br /&gt;
topics concerning security engineering plans, designs and principles,&lt;br /&gt;
Topics include assessing and mitigating information system&lt;br /&gt;
vulnerabilities, fundamental concepts of security models and security&lt;br /&gt;
architectures in critical areas like access control. Cloud systems,&lt;br /&gt;
cryptography, system infiltrations (ransomware, fault-injection and&lt;br /&gt;
more) and virtualized systems are also covered in this domain.&lt;br /&gt;
===Asset Security===&lt;br /&gt;
The Asset Security domain deals with the issues related to the&lt;br /&gt;
collection, storage, maintenance, retention and destruction of data. It&lt;br /&gt;
also covers knowledge of different roles regarding data handling (owner,&lt;br /&gt;
controller and custodian) as well as data protection methods and data&lt;br /&gt;
states. Other topics include resource provision, asset classification&lt;br /&gt;
and data lifecycle management.&lt;br /&gt;
===Security and Risk Management===&lt;br /&gt;
The security and risk management domain covers general on skills&lt;br /&gt;
related to the implementation of user awareness programs as well as&lt;br /&gt;
security procedures. Emphasis is also placed on risk management&lt;br /&gt;
concerning the acquisition of new services, hardware and software&lt;br /&gt;
(supply chain). Other skills include social engineering defense&lt;br /&gt;
mechanisms.&lt;br /&gt;
===Security Assessment and Testing===&lt;br /&gt;
The security assessment and testing domain deals with all the&lt;br /&gt;
techniques and tools used to find system vulnerabilities, weaknesses and&lt;br /&gt;
potential areas of concern not addressed by security procedures and&lt;br /&gt;
policies. Attack simulations, vulnerability assessment, compliance&lt;br /&gt;
checks, and ethical disclosure also fall under this domain.&lt;br /&gt;
===Software Security===&lt;br /&gt;
The software development security domain deals with implementing&lt;br /&gt;
software-based security protocols within environment for which the IT&lt;br /&gt;
professional is responsible. Risk analysis, vulnerability identification&lt;br /&gt;
and auditing of source codes are all covered in this subset. Additional&lt;br /&gt;
topics include software-designed security, maturity models, development&lt;br /&gt;
methodologies, open-source and third-party development security.&lt;br /&gt;
===Security operations===&lt;br /&gt;
The security operations domain covers topics ranging from&lt;br /&gt;
investigations and digital forensic to detection and intrusion&lt;br /&gt;
prevention tools, sandboxing and firewalls. Topics include user and&lt;br /&gt;
entity behavior analytics, threat intelligence (threat hunting and&lt;br /&gt;
threat feeds) log management, artifacts (mobile, computer and network),&lt;br /&gt;
machine learning and AI-based tools, penetration testing, and&lt;br /&gt;
exploitation development. These for sub-domains are lister here.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Incident Handling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Penetration Testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Exploitation&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Education==&lt;br /&gt;
&amp;lt;p&amp;gt;The entry level monitoring specialist is hired by Estonian&lt;br /&gt;
Information System Authority even if there is no formal IT education,&lt;br /&gt;
but readiness to learn and moderate knowledge of different operation&lt;br /&gt;
systems is enough to start the career.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.cv.ee/en/vacancy/792782/riigi-infosusteemi-amet/seirespetsialist-tule-eesti-kuberruumi-valvuriks&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Nevertheless, like most other high qualification careers jobs falling&lt;br /&gt;
under the cybersecurity specialist category require some form of formal&lt;br /&gt;
education. However, since cybersecurity specialist jobs can fall across&lt;br /&gt;
a wide spectrum of job descriptions and responsibilities, it is possible&lt;br /&gt;
to obtain a specialist job after completing many levels of different&lt;br /&gt;
computer related education.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;If one is looking for a cybersecurity related education, for example&lt;br /&gt;
in EU, 137 courses/programs could be found that relate to keyword IT or&lt;br /&gt;
cybersecurity.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.enisa.europa.eu/topics/cybersecurity-education/education-map/education-courses&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Also, there is a great amount of discussion, if cuber security&lt;br /&gt;
professional should have a degree or would be certification just enough.&lt;br /&gt;
One interesting table is produces by Franklin University that compares&lt;br /&gt;
benefits and/or drawbacks of each type of credential.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image11.png&amp;quot; alt=&amp;quot;Comparison MSc vs certificate&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;Comparison MSc vs&lt;br /&gt;
certificate&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Certifications are generally good for people with little practical&lt;br /&gt;
experience because they are known quantities in the industry and can&lt;br /&gt;
help you get your foot in the door. They set a minimum knowledge bar.&lt;br /&gt;
But some certifications are viewed more favorably than others.&lt;br /&gt;
Certifications with renewal requirements are viewed better by hiring&lt;br /&gt;
managers, but they also more costly in the long run because of the need&lt;br /&gt;
for continuing education. Certifications are also good for showing&lt;br /&gt;
in-depth expertise in a specialization within cybersecurity. Depending&lt;br /&gt;
on your career goals, it may be advantageous to have a master’s&lt;br /&gt;
degree—which shows your breadth of knowledge, critical thinking and&lt;br /&gt;
leadership skills—and a certificate—which shows specific skill&lt;br /&gt;
competency.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;As IT (Cyber) Security is still a relatively young discipline,&lt;br /&gt;
universities and colleges are still figuring out which is the best&lt;br /&gt;
approach for their degrees. Study programmes and curricula in Cyber&lt;br /&gt;
Security are different. In general, here are the duration of Cyber&lt;br /&gt;
Security degrees:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Bachelor’s degrees in Cyber Security take 3 or 4 years in most&lt;br /&gt;
countries.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Master’s courses in Cyber Security take between 1-2 years to&lt;br /&gt;
complete.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;PhD programmes in Cyber Security last 3-5 years. Some only take 1&lt;br /&gt;
or 2 years, but they are less common.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Generalization could me made that on bachelor level the general&lt;br /&gt;
knowledge about the cyber issues are obtained. On master level the&lt;br /&gt;
specialization courses are taken and the person can choose more specific&lt;br /&gt;
topics to study. It is on master level where strengths of the cyber&lt;br /&gt;
specialist can be developed further and up-do date knowledge obtained in&lt;br /&gt;
specifics. PhD is serious science and involves teaching, lot of&lt;br /&gt;
scientific work and writing for publications.&amp;lt;/p&amp;gt;&lt;br /&gt;
==Salary==&lt;br /&gt;
&amp;lt;p&amp;gt;Even if the salary can be very different, compared to the skills and&lt;br /&gt;
experience, an generalization can be made. Cyber Security professionals&lt;br /&gt;
in CSIRT, and in other entities earn quite well, from the start. First,&lt;br /&gt;
some comparison from the United States. The average CSIRT analyst salary&lt;br /&gt;
in the USA is $97,500 per year or $50 per hour. Entry level positions&lt;br /&gt;
start at $48,875 per year while most experienced workers make up to&lt;br /&gt;
$135,373 per year.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.talent.com/salary?job=csirt+analyst&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;There are multiple positions you can occupy in this field. They have&lt;br /&gt;
in common great salaries and high demand for technical skills, attention&lt;br /&gt;
to details, problem-solving mentality, and the ability to analyze risks.&lt;br /&gt;
Here are the average annual salaries in the United States, according to&lt;br /&gt;
Payscale:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.payscale.com/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Cryptographer – 100,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Information Security Officer – 91,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Assessor – 90,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Engineer – 88,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Penetration Tester – 81,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Forensics Expert – 71,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Administrator – 65,000 USD&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When looking into salaries in Estonia, one can find that there is a&lt;br /&gt;
discussion that private sector is taking a toll from the public sector,&lt;br /&gt;
and that the salaries in important agencies, as Information System&lt;br /&gt;
Authority loose their employees to the better paid positions in private&lt;br /&gt;
sector.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://digi.geenius.ee/rubriik/uudis/kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad/&lt;br /&gt;
https://tehnika.postimees.ee/6887428/riigi-it-tootajate-palgamaarad-kasvasid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;But there is also a different view that average private sector worker&lt;br /&gt;
could be hired as a top specialist in public sector and then the payment&lt;br /&gt;
is higher. Nevertheless, it seems that the average payment in cyber&lt;br /&gt;
security sector is any way higher that in other parts of the&lt;br /&gt;
e-services.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://digi.geenius.ee/rubriik/uudis/5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka/&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
==SOC==&lt;br /&gt;
&amp;lt;p&amp;gt;A SOC is a facility where an organization’s network, applications,&lt;br /&gt;
and endpoints are monitored and defended. The term was adapted from&lt;br /&gt;
network operations centers (NOCs), where large telecommunication or&lt;br /&gt;
corporate networks are monitored. When network security became more of a&lt;br /&gt;
concern, security teams were formed within the NOCs, and eventually spun&lt;br /&gt;
off into larger organizations of their own as the responsibilities of&lt;br /&gt;
security teams grew increasingly complex and specialized. The security&lt;br /&gt;
staff working in a security operations center are often called the SOC&lt;br /&gt;
team.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Functions of the SOC team include, but are not limited to:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ol type=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Taking inventory of resources, to get a better understanding of the&lt;br /&gt;
structure they are protecting.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintanence of the system, by constantly making updates and adding&lt;br /&gt;
safeguards.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Monitoring the network for abnormalities with special tools.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Threat analysis of new attacks and vulnerabilities.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Responding to attacks, by acting as “first responders”. The SOC team&lt;br /&gt;
will shut down and/or isolate endpoints, deleting files and lowering the&lt;br /&gt;
impact as fast as possible.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Recovery of system stability and lost data. This may be done using&lt;br /&gt;
backups, restarting endpoints or reconfiguring systems.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Logging all actions on the system, to be later used for analysis or&lt;br /&gt;
forensics after an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigating the root cause of an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Auditing their own actions, to be in line with regulations of the&lt;br /&gt;
organization, industry or governing body.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.trellix.com/en-us/security-awareness/operations/what-is-soc.html&amp;lt;/p&amp;gt;&lt;br /&gt;
==CSIRT==&lt;br /&gt;
&amp;lt;p&amp;gt;A CSIRT is a group that responds to security incidents when they&lt;br /&gt;
occur. Key responsibilities of a CSIRT include: &lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
===Creating and maintaining an incident response plan (IRP)===&lt;br /&gt;
An incident response plan (IRP) is a set of written instructions for&lt;br /&gt;
detecting, responding to and limiting the effects of an information&lt;br /&gt;
security event. Incident response plans provide instructions for&lt;br /&gt;
responding to many potential scenarios, including data breaches, denial&lt;br /&gt;
of service/distributed denial of service attacks, firewall breaches,&lt;br /&gt;
virus or malware outbreaks or insider threats. Without an incident&lt;br /&gt;
response plan in place, organizations may either not detect the attack&lt;br /&gt;
in the first place, or not follow proper protocol to contain the threat&lt;br /&gt;
and recover from it when a breach is detected.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.stratacore.com/incidentresponseplan&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
===Investigating and analyzing incidents===&lt;br /&gt;
CSIRTs are also involved in improvement activities. After major&lt;br /&gt;
computer security incidents occur, or when incidents are not handled in&lt;br /&gt;
a timely or effective manner, a CSIRT will generally perform a&lt;br /&gt;
postmortem of the incident and its response. This postmortem will&lt;br /&gt;
identify the strengths and weakness of the response effort. Such reviews&lt;br /&gt;
can identify weaknesses and holes in systems, infrastructure defenses,&lt;br /&gt;
or policies that allowed the incident to take place. It can also&lt;br /&gt;
identify problems with communication channels, interfaces, and&lt;br /&gt;
procedures that inhibited the efficient resolution of the reported&lt;br /&gt;
problem.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.cisa.gov/uscert/bsi/articles/best-practices/incident-management/defining-computer-security-incident-response-teams&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Managing internal communications and updates during or immediately after incidents occur===&lt;br /&gt;
===Communicating with employees, shareholders, customers, and the press about incidents as needed===&lt;br /&gt;
&amp;lt;p&amp;gt;There are various services within the CSIRT Services Framework that&lt;br /&gt;
address communications, as they relate to security operations and&lt;br /&gt;
incident response services. Some of these include Information Security&lt;br /&gt;
Incident Coordination, Crisis Management Support, Vulnerability&lt;br /&gt;
Disclosure, Situational Awareness Communication, and Awareness Building,&lt;br /&gt;
to name a few. Sharing information and communicating with the general&lt;br /&gt;
public and/or your constituency is appropriate in many different&lt;br /&gt;
scenarios. These can range from proactive communications to reactive&lt;br /&gt;
communications. Each scenario may be unique, and careful consideration&lt;br /&gt;
should be given to when to release information to the public and what&lt;br /&gt;
information should be released.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;https://resources.sei.cmu.edu/asset_files/Handbook/2021_002_001_651819.pdf&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Remediating incidents===&lt;br /&gt;
Threat remediation is a strong and capable tool for fighting the&lt;br /&gt;
cyber security compromises. As the word ‘remedy’ suggests, remediation&lt;br /&gt;
process involves the treatment of a security breach. With the&lt;br /&gt;
remediation practices, your cyber security team is able to eliminate&lt;br /&gt;
suspicious activities and malicious attacks in the form of malware,&lt;br /&gt;
ransomware, phishing and such. Even if you ‘kill’ the suspicious&lt;br /&gt;
activity, the attackers can remain in your systems. If you want to&lt;br /&gt;
contaminate and end the problem for good, your remediation processes&lt;br /&gt;
must involve the detection of the cause. &amp;lt;ref name=&amp;quot;logsign&amp;quot;&amp;gt;Logsign, &amp;quot;What-is-remediation-in-cyber-security&amp;quot;. Available: https://www.logsign.com/blog/what-is-remediation-in-cyber-security/. [Accessed 28 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Recommending technology, policy, governance, and training changes after security incidents===&lt;br /&gt;
After all these actions, the SCIRT must contribute to the development&lt;br /&gt;
of better policies, practices and has to recommend improvements. They&lt;br /&gt;
are not working in the vacuum and their work has to create new and&lt;br /&gt;
better standards for cyber security. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;Exabeam, &amp;quot;CSIRT&amp;quot;. Available: https://www.exabeam.com/incident-response/csirt/ [Accessed 28 APr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==CERT==&lt;br /&gt;
&amp;lt;p&amp;gt;The term “computer emergency response team” was coined in 1988. In&lt;br /&gt;
response to the Morris worm attack that impacted thousands of servers on&lt;br /&gt;
the Internet, DARPA funded the formation of the Computer Emergency&lt;br /&gt;
Response Team Coordination Center (CERT-CC) at Carnegie Mellon&lt;br /&gt;
University. The goal of CERT-CC was to help protect the internet by&lt;br /&gt;
collecting and disseminating information on critical security&lt;br /&gt;
vulnerabilities. Several other countries formed similar centers using&lt;br /&gt;
the same acronym (despite threats of legal action by Carnegie Mellon for&lt;br /&gt;
trademark infringement). Now the term CERT refers to any emergency&lt;br /&gt;
response team that deals with cyber threats. Many people use CERT-CC&lt;br /&gt;
interchangeably with CSIRT, though the charter of a CERT is information&lt;br /&gt;
sharing in order to help other response teams respond to threats against&lt;br /&gt;
their own infrastructure.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In general, the designation of CERT is helpful in applying real-world&lt;br /&gt;
solutions to various cybersecurity problems. They may be government&lt;br /&gt;
contractors or employees of a major corporation. For example, the U.S.&lt;br /&gt;
Computer Emergency Readiness Team (US-CERT) operates under the U.S.&lt;br /&gt;
Department of Homeland Security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.techopedia.com/definition/31003/computer-emergency-response-team-cert&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In Estonia CERT is designated as CERT-EE. It was established in 2006,&lt;br /&gt;
as an organization responsible for the management of security incidents&lt;br /&gt;
in .ee computer networks. It is also a national contact point for&lt;br /&gt;
international co-operation in the field of IT security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ria.ee/en/cyber-security/cert-ee.html&amp;lt;/p&amp;gt;&lt;br /&gt;
===Difference between SOC/CSIRT/CERT===&lt;br /&gt;
&amp;lt;p&amp;gt;How CSIRTs differ from CERTs and SOCs There are overlapping&lt;br /&gt;
responsibilities between a community emergency response team (CERT),&lt;br /&gt;
computer security incident response team (CSIRT), and security&lt;br /&gt;
operations center (SOC). To add to this confusion, frequently, the terms&lt;br /&gt;
CERT and CSIRT are used interchangeably, despite the important&lt;br /&gt;
differences.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image3.png&amp;quot; alt=&amp;quot;Overlapping in images/image3.png&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;Overlapping in&lt;br /&gt;
images/image3.png&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
==Understand the primary roles and characteristics of a CERT, CSIRT, and SOC.==&lt;br /&gt;
&amp;lt;p&amp;gt;So, using strict definitions, a CERT collects and disseminates&lt;br /&gt;
security information, typically for the benefit of a country or an&lt;br /&gt;
industry. A CSIRT is a cross-functional team that responds to incidents&lt;br /&gt;
on behalf of a country or an organization. A SOC is where a country or&lt;br /&gt;
organization monitors and defends its network, servers, applications,&lt;br /&gt;
and endpoints.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image4.png&amp;quot; alt=&amp;quot;table of explanation images/image4&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;table of explanation&lt;br /&gt;
images/image4&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
==Future==&lt;br /&gt;
&amp;lt;p&amp;gt;And the Cyber security problem is only getting bigger. According to a&lt;br /&gt;
report published by Accenture, the number of cyber security breaches&lt;br /&gt;
increased by 11 percent from 2017 to 2018. The cost of such breaches is&lt;br /&gt;
astronomical–about $600 billion worldwide, according to the Economic&lt;br /&gt;
Impact of Cybercrime report.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Job projections for cybersecurity are staggering. The Bureau of Labor&lt;br /&gt;
Statistics in US predicts that careers in the cybersecurity field will&lt;br /&gt;
grow by 32% by 2028. That makes cybersecurity one of the top 10&lt;br /&gt;
fastest-growing jobs in the country. In the United States alone, jobs&lt;br /&gt;
for Information Security Analysts are expected to grow by 15% by&lt;br /&gt;
2024.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Most likely this trend is also similar in other countries.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When checking Estonian job portals, there is a constant need for&lt;br /&gt;
people for cyber security related positions. Also, linkedin search gives&lt;br /&gt;
approximately 30 vacancies immediately. There are banks, logistics&lt;br /&gt;
companies, e-shops, and software producers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://ee.linkedin.com/jobs/cyber-security-jobs?countryRedirected=1&amp;amp;amp;position=1&amp;amp;amp;pageNum=0&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Trends that affect companies create need for constant cyber security&lt;br /&gt;
services. Increasing number of home/remote offices require secure&lt;br /&gt;
corporate networks and security of remote devices. One example is from&lt;br /&gt;
this year, when sloppy remote desktop set-up paralyzed systems of 17&lt;br /&gt;
companies.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.aripaev.ee/uudised/2022/04/20/ria-lohakas-kaugtoolaua-seadistus-halvas-martsis-vahemalt-17-juhul-ettevotete-it-susteemid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Also, no service can exists without robust infrastructure - servers,&lt;br /&gt;
databases, applications. As all previously mentioned devices and&lt;br /&gt;
services are at constant scanning and surveillance. So, the breach&lt;br /&gt;
detection and immediate action demands 24/7 services. Even if lot of&lt;br /&gt;
things could be automated, there is a need for human specialists (at&lt;br /&gt;
least, at the moment). Third growing field is also a forensic&lt;br /&gt;
investigation, as every attack must be investigated in order to be ready&lt;br /&gt;
to repel next attacks. So data recovery and evidence collection is&lt;br /&gt;
another important field of work that need skilled and professional&lt;br /&gt;
workers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Even, if the specifics of the entity, be it CSIRT, CERT or SOC, are&lt;br /&gt;
different, the fundamentals of the work are the same. Professional&lt;br /&gt;
knowledge of the networks, operational systems, hardware, scripting, and&lt;br /&gt;
several other wider IT related knowledge is needed. As there is no&lt;br /&gt;
single way to reach to it, every single person can find one’s strongest&lt;br /&gt;
sides and develop them with knowledge of weaker side, in order to know,&lt;br /&gt;
when to as for help.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/body&amp;gt;&lt;br /&gt;
&amp;lt;/html&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mavald</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142193</id>
		<title>Hiring a Cyber Security Incident Analyst</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142193"/>
		<updated>2022-05-01T15:09:09Z</updated>

		<summary type="html">&lt;p&gt;Mavald: /* Entry-Level Incident Response Positions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==A Cyber Security Incident Analyst==&lt;br /&gt;
&lt;br /&gt;
[[File:image1.png|600px|thumb|Job advertisement &amp;lt;ref&amp;gt;&amp;quot;Job Advertisement&amp;quot;. Available at https://www.projectpeople.com/jobs/&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
===Cyber security incident analyst in SOC/CSIRT/CERT===&lt;br /&gt;
This article delves into the job title of Cyber Security Incident&lt;br /&gt;
Analyst and provides an overview of the acronyms SOC/CSIRT/CERT. A brief&lt;br /&gt;
history of the job is discussed here, as well as a possible career path,&lt;br /&gt;
education, experience, and other characteristics required for work in&lt;br /&gt;
computer security-related organizations. The article also provides a&lt;br /&gt;
brief history of SOC/CSIRT/CERT, as well as a comparison of their&lt;br /&gt;
differences and similarities.&lt;br /&gt;
===Cyber Security Incident Analyst Skill Set===&lt;br /&gt;
What skill set is expected from the Cyber Security Incident Analyst? Below written lines are taken from the same job advertisement depicted&lt;br /&gt;
on the left side of this article:&lt;br /&gt;
As a Security Incident Analyst your responsibilities will include:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Continuous monitoring of security tooling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Performing regular and ad-hoc vulnerability assessments&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Carrying out ‘spot checks’&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Reporting vulnerabilities to the PVG via the alerts system&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintaining and documenting logging systems&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Developing centralized logging, reporting and intelligence&lt;br /&gt;
platforms&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;‘Light touch’ penetration testing with open source tooling&lt;br /&gt;
(Metasploit)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Knowledge &amp;amp;amp; Experience required:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;SOC, CSIRT or CERT operational environment experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Windows / Linux experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TCP /IP networking protocol knowledge&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience reviewing and analyzing Security Events from various&lt;br /&gt;
monitoring and logging sources&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience in website and web application security assessment or&lt;br /&gt;
penetration testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience of using Metasploit&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Scripting knowledge using BASH, Python, Perl, Ruby&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Skills in Host and Network Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
As one can see the description of the duties is wide and also the&lt;br /&gt;
knowledge and experience that is required is noteworthy. So, where to&lt;br /&gt;
start to find out the way to get this kind of knowledge and&lt;br /&gt;
expertize.&lt;br /&gt;
===Possible career path===&lt;br /&gt;
Next part of the paper is aiming to depict a possible ways, how to&lt;br /&gt;
develop oneself, and move along the career pathway in cybersecurity&lt;br /&gt;
field. Topics of development, education, experience and certification&lt;br /&gt;
are covered.&lt;br /&gt;
[[File:analystimage2.png|1000px|thumb|Career path &amp;lt;ref&amp;gt;&amp;quot;Possible Career Path&amp;quot;. Available at https://www.cyberseek.org/pathway.html&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
===Junior/Senior===&lt;br /&gt;
Start with an entry-level job in IT. Hands-on experience is often the&lt;br /&gt;
most effective way to prepare for certification exams. Start&lt;br /&gt;
accumulating work experience with an entry-level role as a cybersecurity&lt;br /&gt;
analyst. Many cybersecurity professionals start off in more general IT&lt;br /&gt;
roles. The skills, practices, and technologies you’ll use as a&lt;br /&gt;
cybersecurity professional will continue to evolve along with computer&lt;br /&gt;
and network technology. The desire to learn, ability to problem solve,&lt;br /&gt;
and attention to detail will serve you well in this field. Other, more&lt;br /&gt;
technical skills and technologies to learn include:&amp;lt;ref name=&amp;quot;certification&amp;quot;&amp;gt;Popular Cyber Security Certificates [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications  [Accessed 25 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====SIEM tools (security information and event management)====&lt;br /&gt;
Security Information and Event Management (SIEM) is a set of tools&lt;br /&gt;
and services offering a holistic view of an organization’s information&lt;br /&gt;
security. SIEM works by combining two technologies:&lt;br /&gt;
&amp;lt;li&amp;gt;Security information management (SIM), which collects data from log&lt;br /&gt;
files for analysis and reports on security threats and events, and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;security event management (SEM), which conducts real-time system&lt;br /&gt;
monitoring, notifies network admins about important issues and&lt;br /&gt;
establishes correlations between security events. There are a number of&lt;br /&gt;
security information and event management solutions on the market.&lt;br /&gt;
ArcSight ESM, IBM QRadar and Splunk are among the most popular. &amp;lt;ref name=&amp;quot;SIEM&amp;quot;&amp;gt;Application security, SIEM [Online]. Available: https://www.imperva.com/learn/application-security/siem/. [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Firewalls, Intrusion Detection Systems (IDS), and Intrusion Prevention Systems(IPS)====&lt;br /&gt;
Firewalls can be two types, hardware and software firewalls. Software&lt;br /&gt;
firewall is a firewall that is installed on a computer or server, and&lt;br /&gt;
tasked with network security. It works with a wide variety of other&lt;br /&gt;
technology security solutions to provide more robust and cohesive&lt;br /&gt;
security for enterprises of all sizes. When a software firewall is&lt;br /&gt;
installed on a server, it opens up like an umbrella of protection over&lt;br /&gt;
all other computers connected to the network. It is able to monitor both&lt;br /&gt;
incoming and outgoing traffic for potential risk or suspicious user&lt;br /&gt;
behavior, and also makes setting security policies much easier, faster&lt;br /&gt;
and more flexible. Hardware firewall is positioned between the network&lt;br /&gt;
and devices, allowing traffic to funnel through the firewall for a close&lt;br /&gt;
inspection and analysis. A hardware firewall, a term often&lt;br /&gt;
interchangeable with network or next-generation firewall, protects the&lt;br /&gt;
network gateways for an enterprise. Hardware firewall is physical&lt;br /&gt;
hardware, installed between network elements and connected devices, and&lt;br /&gt;
is tasked with filtering traffic for cyber threat to the network or&lt;br /&gt;
devices. Filtering out unauthorized or suspicious users based on traffic&lt;br /&gt;
analysis is one of the biggest benefits of hardware firewall. &amp;lt;ref name=&amp;quot;sangfor&amp;quot;&amp;gt;Sangfor, &amp;quot;What is Software Firewall? Difference between Hardware Firewall and Software Firewall, [Online]. Available: https://www.sangfor.com/blog/cybersecurity/what-is-software-firewall-difference-between-hardware-firewall-and-software-firewall [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems&lt;br /&gt;
(IPS) are both parts of the network infrastructure. IDS/IPS compare&lt;br /&gt;
network packets to a cyberthreat database containing known signatures of&lt;br /&gt;
cyberattacks — and flag any matching packets. IDS doesn’t alter the&lt;br /&gt;
network packets in any way, whereas IPS prevents the packet from&lt;br /&gt;
delivery based on the contents of the packet, much like how a firewall&lt;br /&gt;
prevents traffic by IP address. &amp;lt;ref name=&amp;quot;Varonis&amp;quot;&amp;gt;Varonis, &amp;quot;What is Software Firewall? IDS vs. IPS: What is the Difference?, [Online]. Available: https://www.varonis.com/blog/ids-vs-ips [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Digital forensics====&lt;br /&gt;
Digital forensics is a branch of forensic science that focuses on&lt;br /&gt;
identifying, acquiring, processing, analyzing, and reporting on data&lt;br /&gt;
stored electronically. Electronic evidence is a component of almost all&lt;br /&gt;
criminal activities and digital forensics support is crucial for law&lt;br /&gt;
enforcement investigations. Electronic evidence can be collected from a&lt;br /&gt;
wide array of sources, such as computers, smartphones, remote storage,&lt;br /&gt;
unmanned aerial systems, shipborne equipment, and more.&amp;lt;ref name=&amp;quot;interpol&amp;quot;&amp;gt;Interpol, &amp;quot;Digital forensics&amp;quot;. Available: https://www.interpol.int/How-we-work/Innovation/Digital-forensics. [Accessed 28 4 2022].&amp;lt;/ref&amp;gt; &lt;br /&gt;
Investigative process of digital forensics can be divided into several stages. There are four major stages: preservation, collection,&lt;br /&gt;
examination, and analysis. All these four stages need a deep understanding of computers, technology across a broad spectrum, and cybersecurity principles and&lt;br /&gt;
practices, a working knowledge of computers, networks, and coding, in-depth investigative abilities, critical-thinking skills and analytical talent the ability to effectively communicate and work with a&lt;br /&gt;
wide range of people. &amp;lt;ref name=&amp;quot;ecpi&amp;quot;&amp;gt;&amp;quot;Digital forensics&amp;quot;. Available: https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me. [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Mobile device management====&lt;br /&gt;
Mobile device management (MDM) is software that allows IT&lt;br /&gt;
administrators to control, secure and enforce policies on smartphones,&lt;br /&gt;
tablets and other endpoints. Mobile device management software emerged&lt;br /&gt;
in the early 2000s as a way to control and secure the personal digital&lt;br /&gt;
assistants and smartphones that business workers began to use. The&lt;br /&gt;
consumer smartphone boom that started with the launch of the Apple&lt;br /&gt;
iPhone in 2007 led to the bring your own device (BYOD) trend, which&lt;br /&gt;
fueled further interest in MDM.&amp;lt;ref name=&amp;quot;techtarget&amp;quot;&amp;gt;Techtarget, &amp;quot;Mobile Device Management&amp;quot;. Available: https://www.techtarget.com/searchmobilecomputing/definition/mobile-device-management [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Data management====&lt;br /&gt;
Sometimes the data management is neglected, but this part has a&lt;br /&gt;
crucial role when learning for good cyber security practices. Majority&lt;br /&gt;
of cyber security programs include a special courses on data management.&lt;br /&gt;
Data management is a method of organizing and maintaining data processes&lt;br /&gt;
that are required in almost every business operations. The benefits of&lt;br /&gt;
data management can be found accounting, statistics, logistics planning&lt;br /&gt;
and other disciplines including corporate computing.&amp;lt;ref name=&amp;quot;GlobalUni&amp;quot;&amp;gt;Global Universities, &amp;quot;MSc Data Management and Cyber Security&amp;quot;. Available: https://globaluniversities.in/msc-data-management-cyber-security. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Data governance (and management) play a fundamental role in&lt;br /&gt;
protecting an organization’s data. Ensuring that the right people have&lt;br /&gt;
the right access and that appropriate security controls are in place to&lt;br /&gt;
protect each system or service, based on the criticality or sensitivity&lt;br /&gt;
of the data sets these contain. &amp;lt;ref name=&amp;quot;CyberMagazine&amp;quot;&amp;gt;Cyber Security Magazine, &amp;quot;The Role of Data Governance in Cybersecurity&amp;quot;. Available: https://cybersecurity-magazine.com/the-role-of-data-governance-in-cybersecurity/?utm_source=rss&amp;amp;amp;utm_medium=rss&amp;amp;amp;utm_campaign=the-role-of-data-governance-in-cybersecurity. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Application security development====&lt;br /&gt;
Application security describes security measures at the application&lt;br /&gt;
level that aim to prevent data or code within the app from being stolen&lt;br /&gt;
or hijacked. It encompasses the security considerations that happen&lt;br /&gt;
during application development and design, but it also involves systems&lt;br /&gt;
and approaches to protect apps after they get deployed. Application&lt;br /&gt;
security may include hardware, software, and procedures that identify or&lt;br /&gt;
minimize security vulnerabilities.&amp;lt;ref name=&amp;quot;vmware&amp;quot;&amp;gt;VmWare, &amp;quot;What is application security?&amp;quot;. Available: https://www.vmware.com/topics/glossary/content/application-security.html [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Application security development is important to ensure that your&lt;br /&gt;
application is free from coding errors and bugs. And controls the risk&lt;br /&gt;
and helps safeguard against security vulnerabilities. Application&lt;br /&gt;
security development is the process of making applications more secure&lt;br /&gt;
by finding and fixing security vulnerabilities. This is often done by&lt;br /&gt;
enforcing software security best practices and using application&lt;br /&gt;
security testing tools. &lt;br /&gt;
&amp;lt;ref name=&amp;quot;perforce&amp;quot;&amp;gt;Perforce, &amp;quot;Application Security Development Best Practices&amp;quot;. Available: https://www.perforce.com/blog/kw/application-security-development-best-practices. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Audit and compliance knowledge====&lt;br /&gt;
A cyber security audit is designed to be a comprehensive review and&lt;br /&gt;
analysis of your business’s IT infrastructure. It identifies threats and&lt;br /&gt;
vulnerabilities, exposing weaknesses and high-risk practices.&lt;br /&gt;
Regulations such as the EU GDPR (General Data Protection Regulation) can&lt;br /&gt;
impose hefty penalties in the event of a breach that results in&lt;br /&gt;
exploited data. A cyber security audit will help mitigate the&lt;br /&gt;
consequences of a breach and demonstrate that your organization has&lt;br /&gt;
taken the necessary steps to protect client and company data. &amp;lt;ref name=&amp;quot;cyforsecure&amp;quot;&amp;gt;Cyfor Secure, &amp;quot;What is a Cyber Security Audit and how can it help your organisation?&amp;quot;. Available: https://cyforsecure.co.uk/services/cyber-assessment/cyber-security-audit/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cybersecurity compliance is the organizational risk management method&lt;br /&gt;
aligned with pre-defined security measures &amp;amp;amp; controls on how data&lt;br /&gt;
confidentiality is ensured by its administrative procedures.&amp;lt;ref name=&amp;quot;nordlayer&amp;quot;&amp;gt;NordLayer, &amp;quot;Cybersecurity compliance: Everything you need to know&amp;quot;. Available: https://nordlayer.com/blog/cybersecurity-compliance-everything-you-need-to-know/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
All needed skills are developed through courses and certification.&lt;br /&gt;
&lt;br /&gt;
===Entry-Level Incident Response Positions===&lt;br /&gt;
It is not always possible to advance to the position of incident&lt;br /&gt;
responder in a straight line. Many professionals advance from entry- to&lt;br /&gt;
mid-level positions before becoming a real incident responder or a&lt;br /&gt;
member of a computer emergency response team (CERT).&amp;lt;br /&amp;gt;&lt;br /&gt;
These are some examples:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;network-administrator&amp;quot;&amp;gt;Network administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;This position’s experience will help potential incident responders&lt;br /&gt;
develop networking skills. Attention to detail, as well as the ability&lt;br /&gt;
to sift through system configurations, site layouts, and general network&lt;br /&gt;
and communication setups, are essential in this field.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;system-administrator&amp;quot;&amp;gt;System administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Another crucial beginning point for an incident responder is to learn&lt;br /&gt;
how to manage resources inside your organization as well as user&lt;br /&gt;
behavior. Understanding the potential damage that users, inadequate&lt;br /&gt;
security setups, and ineffective IT policies and procedures can cause on&lt;br /&gt;
your network can provide prospective candidates with insight into the&lt;br /&gt;
human component of an incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;security-administrator&amp;quot;&amp;gt;Security administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In such a position, basic hacking skills, penetration testing, and&lt;br /&gt;
intrusion detection are all learned, which are crucial incident&lt;br /&gt;
responder skills when trying to replicate a breach or attack.&lt;br /&gt;
Understanding the paths a cybercriminal will take when attempting to&lt;br /&gt;
damage or obtain access to a system can greatly simplify the work of&lt;br /&gt;
reverse engineering the incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://resources.infosecinstitute.com/topic/incident-responder-career-roadmap-entry-level-executive/&amp;lt;/p&amp;gt;&lt;br /&gt;
=== Mid-Level Incident Response Positions ===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5&lt;br /&gt;
id=&amp;quot;computer-security-incident-response-team-csirt-engineer&amp;quot;&amp;gt;Computer&lt;br /&gt;
security incident response team (CSIRT) engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;cyber-incident-responder&amp;quot;&amp;gt;Cyber incident responder&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-response-engineer&amp;quot;&amp;gt;Incident response&lt;br /&gt;
engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;While each of these positions is different, they generally require&lt;br /&gt;
very similar skills and characteristics in a candidate. At this level,&lt;br /&gt;
personal characteristics such as problem solving, time management, and&lt;br /&gt;
even presentation skills become more crucial as one’s career evolves&lt;br /&gt;
into a management-facing role.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Technical skills include the ability to identify and minimize threats&lt;br /&gt;
while maintaining communication with management and the rest of your&lt;br /&gt;
team. Data analysis and evidence gathering become increasingly crucial,&lt;br /&gt;
and the circumstances in which your services are deployed get more&lt;br /&gt;
serious.&amp;lt;/p&amp;gt;&lt;br /&gt;
Problem-solving skills are crucial at this level of incident&lt;br /&gt;
response, and as the stakes rise, so does the pressure in each&lt;br /&gt;
situation. At this level, programming abilities are essential since&lt;br /&gt;
incident responders may be needed to reverse engineer malicious code or&lt;br /&gt;
even create patches for vulnerable network applications or services. &amp;lt;ref name=&amp;quot;coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated]&amp;quot;. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Senior-Level Incident Response Positions===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;intrusion-detection-specialist&amp;quot;&amp;gt;Intrusion detection&lt;br /&gt;
specialist:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;A CISSP certification might help a potential candidate in preparing&lt;br /&gt;
for the profession. The role of an intrusion detection specialist is to&lt;br /&gt;
find and stop any unwanted communications.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-manager&amp;quot;&amp;gt;Incident manager:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Expected to plan, oversee, manage, and supervise all incident&lt;br /&gt;
response team actions. Is in charge of reporting all current events to&lt;br /&gt;
senior management and stakeholders, as well as acting as the technical&lt;br /&gt;
lead on active incidents for incident responders. Prepares threat and&lt;br /&gt;
impact assessments and reports them known to management.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.coursera.org/articles/popular-cybersecurity-certifications&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Certificates== &lt;br /&gt;
There is a vast number of different certificates and the road map to&lt;br /&gt;
being a certified professional could be very different&amp;lt;ref name=&amp;quot;Coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated],&amp;quot; [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;NICCS&amp;quot;&amp;gt;NICCS, &amp;quot;Cybersecurity Certifications,&amp;quot; [Online]. Available: hhttps://niccs.cisa.gov/about-niccs/cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt; . One possible&lt;br /&gt;
approach is to start with basic certificates from the different branches&lt;br /&gt;
of service and move to more specific and demanding focused&lt;br /&gt;
certification. Also, some jobs require certain clearances, either from&lt;br /&gt;
industry, or from the government. One small selection of different&lt;br /&gt;
possible certificates is brought out in following paragraphs.&lt;br /&gt;
&lt;br /&gt;
Security+ is a CompTIA certification that is considered a basic cert&lt;br /&gt;
among cybersecurity professionals. It covers the topics of risk&lt;br /&gt;
management and threat assessment.&lt;br /&gt;
Network+ is also offered by CompTIA this certification (like the name&lt;br /&gt;
implies) focuses on networking infrastructure and operations. It is&lt;br /&gt;
considered a foundational certification.&lt;br /&gt;
The Certified Information Systems Security Professional (CISSP) is a&lt;br /&gt;
more advanced certification designed for cybersecurity professionals&lt;br /&gt;
with at least five years of work experience. The certification covers&lt;br /&gt;
topics such as architecture, engineering, and management.&amp;lt;/p&amp;gt;&lt;br /&gt;
The Certified Ethical Hacker (CEH) certification is also considered a&lt;br /&gt;
more advanced cert because it generally requires that applicants have&lt;br /&gt;
multiple years of work experience. The goal of an ethical hacker&lt;br /&gt;
certification is to be able to understand how cyber attacks unfold in&lt;br /&gt;
order to improve threat assessment and mitigation skills.&amp;lt;ref name=&amp;quot;cyberguide&amp;quot;&amp;gt;Cybersecurity Guide, &amp;quot;How to become a cybersecurity specialist&amp;quot;, [Online]. Available: https://cybersecurityguide.org/careers/security-specialist/. [Accessed 27 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
This is definitely not all, when one looks for more information, following link could be searched, to get more in depth knowledge about&lt;br /&gt;
different possibilities. Hereby, with the help of this matrix a possible taxonomy of different 436 listed certificates in branches are&lt;br /&gt;
presented.&amp;lt;ref name=&amp;quot;Pauljeremy&amp;quot;&amp;gt;&amp;quot;Cybersecurity Roadmap,&amp;quot; [Online]. Available: https://pauljerimy.com/2020/10/12/scr-oct-2020-update/. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:analystimage5.png|1000px|thumb|Certificate matrix &amp;lt;ref&amp;gt;&amp;quot;Certification roadmap&amp;quot;. Available at https://pauljerimy.com/security-certification-roadmap&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
=== Communication and Network Security===&lt;br /&gt;
Communication and network security covers the ability to secure&lt;br /&gt;
communication channels and networks. Topics include secure and converges&lt;br /&gt;
protocols, wireless networks, cellular networks, hardware operations&lt;br /&gt;
(warranty and redundant power), and third-party connectivity. IP&lt;br /&gt;
networking are also included in this domain.&lt;br /&gt;
===Identity and Access Management===&lt;br /&gt;
The identity and access management domain covers the attacks that&lt;br /&gt;
target the human gateway to gain access to data. Other topics include&lt;br /&gt;
ways to identify users with rights to access the information and&lt;br /&gt;
servers. Identity and access management covers the topics of&lt;br /&gt;
applications, Single sign-on authentication, privilege escalation,&lt;br /&gt;
Kerberos, rule-based or risk-based access control, proofing and&lt;br /&gt;
establishment of identity.&lt;br /&gt;
===Security Architecture and Engineering===&lt;br /&gt;
The security architecture and engineering domain covers important&lt;br /&gt;
topics concerning security engineering plans, designs and principles,&lt;br /&gt;
Topics include assessing and mitigating information system&lt;br /&gt;
vulnerabilities, fundamental concepts of security models and security&lt;br /&gt;
architectures in critical areas like access control. Cloud systems,&lt;br /&gt;
cryptography, system infiltrations (ransomware, fault-injection and&lt;br /&gt;
more) and virtualized systems are also covered in this domain.&lt;br /&gt;
===Asset Security===&lt;br /&gt;
The Asset Security domain deals with the issues related to the&lt;br /&gt;
collection, storage, maintenance, retention and destruction of data. It&lt;br /&gt;
also covers knowledge of different roles regarding data handling (owner,&lt;br /&gt;
controller and custodian) as well as data protection methods and data&lt;br /&gt;
states. Other topics include resource provision, asset classification&lt;br /&gt;
and data lifecycle management.&lt;br /&gt;
===Security and Risk Management===&lt;br /&gt;
The security and risk management domain covers general on skills&lt;br /&gt;
related to the implementation of user awareness programs as well as&lt;br /&gt;
security procedures. Emphasis is also placed on risk management&lt;br /&gt;
concerning the acquisition of new services, hardware and software&lt;br /&gt;
(supply chain). Other skills include social engineering defense&lt;br /&gt;
mechanisms.&lt;br /&gt;
===Security Assessment and Testing===&lt;br /&gt;
The security assessment and testing domain deals with all the&lt;br /&gt;
techniques and tools used to find system vulnerabilities, weaknesses and&lt;br /&gt;
potential areas of concern not addressed by security procedures and&lt;br /&gt;
policies. Attack simulations, vulnerability assessment, compliance&lt;br /&gt;
checks, and ethical disclosure also fall under this domain.&lt;br /&gt;
===Software Security===&lt;br /&gt;
The software development security domain deals with implementing&lt;br /&gt;
software-based security protocols within environment for which the IT&lt;br /&gt;
professional is responsible. Risk analysis, vulnerability identification&lt;br /&gt;
and auditing of source codes are all covered in this subset. Additional&lt;br /&gt;
topics include software-designed security, maturity models, development&lt;br /&gt;
methodologies, open-source and third-party development security.&lt;br /&gt;
===Security operations===&lt;br /&gt;
The security operations domain covers topics ranging from&lt;br /&gt;
investigations and digital forensic to detection and intrusion&lt;br /&gt;
prevention tools, sandboxing and firewalls. Topics include user and&lt;br /&gt;
entity behavior analytics, threat intelligence (threat hunting and&lt;br /&gt;
threat feeds) log management, artifacts (mobile, computer and network),&lt;br /&gt;
machine learning and AI-based tools, penetration testing, and&lt;br /&gt;
exploitation development. These for sub-domains are lister here.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Incident Handling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Penetration Testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Exploitation&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Education==&lt;br /&gt;
&amp;lt;p&amp;gt;The entry level monitoring specialist is hired by Estonian&lt;br /&gt;
Information System Authority even if there is no formal IT education,&lt;br /&gt;
but readiness to learn and moderate knowledge of different operation&lt;br /&gt;
systems is enough to start the career.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.cv.ee/en/vacancy/792782/riigi-infosusteemi-amet/seirespetsialist-tule-eesti-kuberruumi-valvuriks&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Nevertheless, like most other high qualification careers jobs falling&lt;br /&gt;
under the cybersecurity specialist category require some form of formal&lt;br /&gt;
education. However, since cybersecurity specialist jobs can fall across&lt;br /&gt;
a wide spectrum of job descriptions and responsibilities, it is possible&lt;br /&gt;
to obtain a specialist job after completing many levels of different&lt;br /&gt;
computer related education.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;If one is looking for a cybersecurity related education, for example&lt;br /&gt;
in EU, 137 courses/programs could be found that relate to keyword IT or&lt;br /&gt;
cybersecurity.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.enisa.europa.eu/topics/cybersecurity-education/education-map/education-courses&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Also, there is a great amount of discussion, if cuber security&lt;br /&gt;
professional should have a degree or would be certification just enough.&lt;br /&gt;
One interesting table is produces by Franklin University that compares&lt;br /&gt;
benefits and/or drawbacks of each type of credential.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image11.png&amp;quot; alt=&amp;quot;Comparison MSc vs certificate&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;Comparison MSc vs&lt;br /&gt;
certificate&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Certifications are generally good for people with little practical&lt;br /&gt;
experience because they are known quantities in the industry and can&lt;br /&gt;
help you get your foot in the door. They set a minimum knowledge bar.&lt;br /&gt;
But some certifications are viewed more favorably than others.&lt;br /&gt;
Certifications with renewal requirements are viewed better by hiring&lt;br /&gt;
managers, but they also more costly in the long run because of the need&lt;br /&gt;
for continuing education. Certifications are also good for showing&lt;br /&gt;
in-depth expertise in a specialization within cybersecurity. Depending&lt;br /&gt;
on your career goals, it may be advantageous to have a master’s&lt;br /&gt;
degree—which shows your breadth of knowledge, critical thinking and&lt;br /&gt;
leadership skills—and a certificate—which shows specific skill&lt;br /&gt;
competency.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;As IT (Cyber) Security is still a relatively young discipline,&lt;br /&gt;
universities and colleges are still figuring out which is the best&lt;br /&gt;
approach for their degrees. Study programmes and curricula in Cyber&lt;br /&gt;
Security are different. In general, here are the duration of Cyber&lt;br /&gt;
Security degrees:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Bachelor’s degrees in Cyber Security take 3 or 4 years in most&lt;br /&gt;
countries.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Master’s courses in Cyber Security take between 1-2 years to&lt;br /&gt;
complete.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;PhD programmes in Cyber Security last 3-5 years. Some only take 1&lt;br /&gt;
or 2 years, but they are less common.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Generalization could me made that on bachelor level the general&lt;br /&gt;
knowledge about the cyber issues are obtained. On master level the&lt;br /&gt;
specialization courses are taken and the person can choose more specific&lt;br /&gt;
topics to study. It is on master level where strengths of the cyber&lt;br /&gt;
specialist can be developed further and up-do date knowledge obtained in&lt;br /&gt;
specifics. PhD is serious science and involves teaching, lot of&lt;br /&gt;
scientific work and writing for publications.&amp;lt;/p&amp;gt;&lt;br /&gt;
==Salary==&lt;br /&gt;
&amp;lt;p&amp;gt;Even if the salary can be very different, compared to the skills and&lt;br /&gt;
experience, an generalization can be made. Cyber Security professionals&lt;br /&gt;
in CSIRT, and in other entities earn quite well, from the start. First,&lt;br /&gt;
some comparison from the United States. The average CSIRT analyst salary&lt;br /&gt;
in the USA is $97,500 per year or $50 per hour. Entry level positions&lt;br /&gt;
start at $48,875 per year while most experienced workers make up to&lt;br /&gt;
$135,373 per year.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.talent.com/salary?job=csirt+analyst&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;There are multiple positions you can occupy in this field. They have&lt;br /&gt;
in common great salaries and high demand for technical skills, attention&lt;br /&gt;
to details, problem-solving mentality, and the ability to analyze risks.&lt;br /&gt;
Here are the average annual salaries in the United States, according to&lt;br /&gt;
Payscale:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.payscale.com/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Cryptographer – 100,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Information Security Officer – 91,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Assessor – 90,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Engineer – 88,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Penetration Tester – 81,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Forensics Expert – 71,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Administrator – 65,000 USD&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When looking into salaries in Estonia, one can find that there is a&lt;br /&gt;
discussion that private sector is taking a toll from the public sector,&lt;br /&gt;
and that the salaries in important agencies, as Information System&lt;br /&gt;
Authority loose their employees to the better paid positions in private&lt;br /&gt;
sector.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://digi.geenius.ee/rubriik/uudis/kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad/&lt;br /&gt;
https://tehnika.postimees.ee/6887428/riigi-it-tootajate-palgamaarad-kasvasid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;But there is also a different view that average private sector worker&lt;br /&gt;
could be hired as a top specialist in public sector and then the payment&lt;br /&gt;
is higher. Nevertheless, it seems that the average payment in cyber&lt;br /&gt;
security sector is any way higher that in other parts of the&lt;br /&gt;
e-services.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://digi.geenius.ee/rubriik/uudis/5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka/&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
==SOC==&lt;br /&gt;
&amp;lt;p&amp;gt;A SOC is a facility where an organization’s network, applications,&lt;br /&gt;
and endpoints are monitored and defended. The term was adapted from&lt;br /&gt;
network operations centers (NOCs), where large telecommunication or&lt;br /&gt;
corporate networks are monitored. When network security became more of a&lt;br /&gt;
concern, security teams were formed within the NOCs, and eventually spun&lt;br /&gt;
off into larger organizations of their own as the responsibilities of&lt;br /&gt;
security teams grew increasingly complex and specialized. The security&lt;br /&gt;
staff working in a security operations center are often called the SOC&lt;br /&gt;
team.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Functions of the SOC team include, but are not limited to:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ol type=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Taking inventory of resources, to get a better understanding of the&lt;br /&gt;
structure they are protecting.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintanence of the system, by constantly making updates and adding&lt;br /&gt;
safeguards.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Monitoring the network for abnormalities with special tools.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Threat analysis of new attacks and vulnerabilities.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Responding to attacks, by acting as “first responders”. The SOC team&lt;br /&gt;
will shut down and/or isolate endpoints, deleting files and lowering the&lt;br /&gt;
impact as fast as possible.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Recovery of system stability and lost data. This may be done using&lt;br /&gt;
backups, restarting endpoints or reconfiguring systems.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Logging all actions on the system, to be later used for analysis or&lt;br /&gt;
forensics after an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigating the root cause of an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Auditing their own actions, to be in line with regulations of the&lt;br /&gt;
organization, industry or governing body.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.trellix.com/en-us/security-awareness/operations/what-is-soc.html&amp;lt;/p&amp;gt;&lt;br /&gt;
==CSIRT==&lt;br /&gt;
&amp;lt;p&amp;gt;A CSIRT is a group that responds to security incidents when they&lt;br /&gt;
occur. Key responsibilities of a CSIRT include: &lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
===Creating and maintaining an incident response plan (IRP)===&lt;br /&gt;
An incident response plan (IRP) is a set of written instructions for&lt;br /&gt;
detecting, responding to and limiting the effects of an information&lt;br /&gt;
security event. Incident response plans provide instructions for&lt;br /&gt;
responding to many potential scenarios, including data breaches, denial&lt;br /&gt;
of service/distributed denial of service attacks, firewall breaches,&lt;br /&gt;
virus or malware outbreaks or insider threats. Without an incident&lt;br /&gt;
response plan in place, organizations may either not detect the attack&lt;br /&gt;
in the first place, or not follow proper protocol to contain the threat&lt;br /&gt;
and recover from it when a breach is detected.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.stratacore.com/incidentresponseplan&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
===Investigating and analyzing incidents===&lt;br /&gt;
CSIRTs are also involved in improvement activities. After major&lt;br /&gt;
computer security incidents occur, or when incidents are not handled in&lt;br /&gt;
a timely or effective manner, a CSIRT will generally perform a&lt;br /&gt;
postmortem of the incident and its response. This postmortem will&lt;br /&gt;
identify the strengths and weakness of the response effort. Such reviews&lt;br /&gt;
can identify weaknesses and holes in systems, infrastructure defenses,&lt;br /&gt;
or policies that allowed the incident to take place. It can also&lt;br /&gt;
identify problems with communication channels, interfaces, and&lt;br /&gt;
procedures that inhibited the efficient resolution of the reported&lt;br /&gt;
problem.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.cisa.gov/uscert/bsi/articles/best-practices/incident-management/defining-computer-security-incident-response-teams&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Managing internal communications and updates during or immediately after incidents occur===&lt;br /&gt;
===Communicating with employees, shareholders, customers, and the press about incidents as needed===&lt;br /&gt;
&amp;lt;p&amp;gt;There are various services within the CSIRT Services Framework that&lt;br /&gt;
address communications, as they relate to security operations and&lt;br /&gt;
incident response services. Some of these include Information Security&lt;br /&gt;
Incident Coordination, Crisis Management Support, Vulnerability&lt;br /&gt;
Disclosure, Situational Awareness Communication, and Awareness Building,&lt;br /&gt;
to name a few. Sharing information and communicating with the general&lt;br /&gt;
public and/or your constituency is appropriate in many different&lt;br /&gt;
scenarios. These can range from proactive communications to reactive&lt;br /&gt;
communications. Each scenario may be unique, and careful consideration&lt;br /&gt;
should be given to when to release information to the public and what&lt;br /&gt;
information should be released.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;https://resources.sei.cmu.edu/asset_files/Handbook/2021_002_001_651819.pdf&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Remediating incidents===&lt;br /&gt;
Threat remediation is a strong and capable tool for fighting the&lt;br /&gt;
cyber security compromises. As the word ‘remedy’ suggests, remediation&lt;br /&gt;
process involves the treatment of a security breach. With the&lt;br /&gt;
remediation practices, your cyber security team is able to eliminate&lt;br /&gt;
suspicious activities and malicious attacks in the form of malware,&lt;br /&gt;
ransomware, phishing and such. Even if you ‘kill’ the suspicious&lt;br /&gt;
activity, the attackers can remain in your systems. If you want to&lt;br /&gt;
contaminate and end the problem for good, your remediation processes&lt;br /&gt;
must involve the detection of the cause. &amp;lt;ref name=&amp;quot;logsign&amp;quot;&amp;gt;Logsign, &amp;quot;What-is-remediation-in-cyber-security&amp;quot;. Available: https://www.logsign.com/blog/what-is-remediation-in-cyber-security/. [Accessed 28 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Recommending technology, policy, governance, and training changes after security incidents===&lt;br /&gt;
After all these actions, the SCIRT must contribute to the development&lt;br /&gt;
of better policies, practices and has to recommend improvements. They&lt;br /&gt;
are not working in the vacuum and their work has to create new and&lt;br /&gt;
better standards for cyber security. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;Exabeam, &amp;quot;CSIRT&amp;quot;. Available: https://www.exabeam.com/incident-response/csirt/ [Accessed 28 APr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==CERT==&lt;br /&gt;
&amp;lt;p&amp;gt;The term “computer emergency response team” was coined in 1988. In&lt;br /&gt;
response to the Morris worm attack that impacted thousands of servers on&lt;br /&gt;
the Internet, DARPA funded the formation of the Computer Emergency&lt;br /&gt;
Response Team Coordination Center (CERT-CC) at Carnegie Mellon&lt;br /&gt;
University. The goal of CERT-CC was to help protect the internet by&lt;br /&gt;
collecting and disseminating information on critical security&lt;br /&gt;
vulnerabilities. Several other countries formed similar centers using&lt;br /&gt;
the same acronym (despite threats of legal action by Carnegie Mellon for&lt;br /&gt;
trademark infringement). Now the term CERT refers to any emergency&lt;br /&gt;
response team that deals with cyber threats. Many people use CERT-CC&lt;br /&gt;
interchangeably with CSIRT, though the charter of a CERT is information&lt;br /&gt;
sharing in order to help other response teams respond to threats against&lt;br /&gt;
their own infrastructure.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In general, the designation of CERT is helpful in applying real-world&lt;br /&gt;
solutions to various cybersecurity problems. They may be government&lt;br /&gt;
contractors or employees of a major corporation. For example, the U.S.&lt;br /&gt;
Computer Emergency Readiness Team (US-CERT) operates under the U.S.&lt;br /&gt;
Department of Homeland Security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.techopedia.com/definition/31003/computer-emergency-response-team-cert&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In Estonia CERT is designated as CERT-EE. It was established in 2006,&lt;br /&gt;
as an organization responsible for the management of security incidents&lt;br /&gt;
in .ee computer networks. It is also a national contact point for&lt;br /&gt;
international co-operation in the field of IT security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ria.ee/en/cyber-security/cert-ee.html&amp;lt;/p&amp;gt;&lt;br /&gt;
===Difference between SOC/CSIRT/CERT===&lt;br /&gt;
&amp;lt;p&amp;gt;How CSIRTs differ from CERTs and SOCs There are overlapping&lt;br /&gt;
responsibilities between a community emergency response team (CERT),&lt;br /&gt;
computer security incident response team (CSIRT), and security&lt;br /&gt;
operations center (SOC). To add to this confusion, frequently, the terms&lt;br /&gt;
CERT and CSIRT are used interchangeably, despite the important&lt;br /&gt;
differences.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image3.png&amp;quot; alt=&amp;quot;Overlapping in images/image3.png&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;Overlapping in&lt;br /&gt;
images/image3.png&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
==Understand the primary roles and characteristics of a CERT, CSIRT, and SOC.==&lt;br /&gt;
&amp;lt;p&amp;gt;So, using strict definitions, a CERT collects and disseminates&lt;br /&gt;
security information, typically for the benefit of a country or an&lt;br /&gt;
industry. A CSIRT is a cross-functional team that responds to incidents&lt;br /&gt;
on behalf of a country or an organization. A SOC is where a country or&lt;br /&gt;
organization monitors and defends its network, servers, applications,&lt;br /&gt;
and endpoints.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image4.png&amp;quot; alt=&amp;quot;table of explanation images/image4&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;table of explanation&lt;br /&gt;
images/image4&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
==Future==&lt;br /&gt;
&amp;lt;p&amp;gt;And the Cyber security problem is only getting bigger. According to a&lt;br /&gt;
report published by Accenture, the number of cyber security breaches&lt;br /&gt;
increased by 11 percent from 2017 to 2018. The cost of such breaches is&lt;br /&gt;
astronomical–about $600 billion worldwide, according to the Economic&lt;br /&gt;
Impact of Cybercrime report.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Job projections for cybersecurity are staggering. The Bureau of Labor&lt;br /&gt;
Statistics in US predicts that careers in the cybersecurity field will&lt;br /&gt;
grow by 32% by 2028. That makes cybersecurity one of the top 10&lt;br /&gt;
fastest-growing jobs in the country. In the United States alone, jobs&lt;br /&gt;
for Information Security Analysts are expected to grow by 15% by&lt;br /&gt;
2024.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Most likely this trend is also similar in other countries.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When checking Estonian job portals, there is a constant need for&lt;br /&gt;
people for cyber security related positions. Also, linkedin search gives&lt;br /&gt;
approximately 30 vacancies immediately. There are banks, logistics&lt;br /&gt;
companies, e-shops, and software producers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://ee.linkedin.com/jobs/cyber-security-jobs?countryRedirected=1&amp;amp;amp;position=1&amp;amp;amp;pageNum=0&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Trends that affect companies create need for constant cyber security&lt;br /&gt;
services. Increasing number of home/remote offices require secure&lt;br /&gt;
corporate networks and security of remote devices. One example is from&lt;br /&gt;
this year, when sloppy remote desktop set-up paralyzed systems of 17&lt;br /&gt;
companies.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.aripaev.ee/uudised/2022/04/20/ria-lohakas-kaugtoolaua-seadistus-halvas-martsis-vahemalt-17-juhul-ettevotete-it-susteemid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Also, no service can exists without robust infrastructure - servers,&lt;br /&gt;
databases, applications. As all previously mentioned devices and&lt;br /&gt;
services are at constant scanning and surveillance. So, the breach&lt;br /&gt;
detection and immediate action demands 24/7 services. Even if lot of&lt;br /&gt;
things could be automated, there is a need for human specialists (at&lt;br /&gt;
least, at the moment). Third growing field is also a forensic&lt;br /&gt;
investigation, as every attack must be investigated in order to be ready&lt;br /&gt;
to repel next attacks. So data recovery and evidence collection is&lt;br /&gt;
another important field of work that need skilled and professional&lt;br /&gt;
workers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Even, if the specifics of the entity, be it CSIRT, CERT or SOC, are&lt;br /&gt;
different, the fundamentals of the work are the same. Professional&lt;br /&gt;
knowledge of the networks, operational systems, hardware, scripting, and&lt;br /&gt;
several other wider IT related knowledge is needed. As there is no&lt;br /&gt;
single way to reach to it, every single person can find one’s strongest&lt;br /&gt;
sides and develop them with knowledge of weaker side, in order to know,&lt;br /&gt;
when to as for help.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/body&amp;gt;&lt;br /&gt;
&amp;lt;/html&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mavald</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142192</id>
		<title>Hiring a Cyber Security Incident Analyst</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142192"/>
		<updated>2022-05-01T15:06:36Z</updated>

		<summary type="html">&lt;p&gt;Mavald: /* Entry-Level Incident Response Positions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==A Cyber Security Incident Analyst==&lt;br /&gt;
&lt;br /&gt;
[[File:image1.png|600px|thumb|Job advertisement &amp;lt;ref&amp;gt;&amp;quot;Job Advertisement&amp;quot;. Available at https://www.projectpeople.com/jobs/&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
===Cyber security incident analyst in SOC/CSIRT/CERT===&lt;br /&gt;
This article delves into the job title of Cyber Security Incident&lt;br /&gt;
Analyst and provides an overview of the acronyms SOC/CSIRT/CERT. A brief&lt;br /&gt;
history of the job is discussed here, as well as a possible career path,&lt;br /&gt;
education, experience, and other characteristics required for work in&lt;br /&gt;
computer security-related organizations. The article also provides a&lt;br /&gt;
brief history of SOC/CSIRT/CERT, as well as a comparison of their&lt;br /&gt;
differences and similarities.&lt;br /&gt;
===Cyber Security Incident Analyst Skill Set===&lt;br /&gt;
What skill set is expected from the Cyber Security Incident Analyst? Below written lines are taken from the same job advertisement depicted&lt;br /&gt;
on the left side of this article:&lt;br /&gt;
As a Security Incident Analyst your responsibilities will include:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Continuous monitoring of security tooling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Performing regular and ad-hoc vulnerability assessments&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Carrying out ‘spot checks’&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Reporting vulnerabilities to the PVG via the alerts system&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintaining and documenting logging systems&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Developing centralized logging, reporting and intelligence&lt;br /&gt;
platforms&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;‘Light touch’ penetration testing with open source tooling&lt;br /&gt;
(Metasploit)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Knowledge &amp;amp;amp; Experience required:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;SOC, CSIRT or CERT operational environment experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Windows / Linux experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TCP /IP networking protocol knowledge&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience reviewing and analyzing Security Events from various&lt;br /&gt;
monitoring and logging sources&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience in website and web application security assessment or&lt;br /&gt;
penetration testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience of using Metasploit&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Scripting knowledge using BASH, Python, Perl, Ruby&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Skills in Host and Network Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
As one can see the description of the duties is wide and also the&lt;br /&gt;
knowledge and experience that is required is noteworthy. So, where to&lt;br /&gt;
start to find out the way to get this kind of knowledge and&lt;br /&gt;
expertize.&lt;br /&gt;
===Possible career path===&lt;br /&gt;
Next part of the paper is aiming to depict a possible ways, how to&lt;br /&gt;
develop oneself, and move along the career pathway in cybersecurity&lt;br /&gt;
field. Topics of development, education, experience and certification&lt;br /&gt;
are covered.&lt;br /&gt;
[[File:analystimage2.png|1000px|thumb|Career path &amp;lt;ref&amp;gt;&amp;quot;Possible Career Path&amp;quot;. Available at https://www.cyberseek.org/pathway.html&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
===Junior/Senior===&lt;br /&gt;
Start with an entry-level job in IT. Hands-on experience is often the&lt;br /&gt;
most effective way to prepare for certification exams. Start&lt;br /&gt;
accumulating work experience with an entry-level role as a cybersecurity&lt;br /&gt;
analyst. Many cybersecurity professionals start off in more general IT&lt;br /&gt;
roles. The skills, practices, and technologies you’ll use as a&lt;br /&gt;
cybersecurity professional will continue to evolve along with computer&lt;br /&gt;
and network technology. The desire to learn, ability to problem solve,&lt;br /&gt;
and attention to detail will serve you well in this field. Other, more&lt;br /&gt;
technical skills and technologies to learn include:&amp;lt;ref name=&amp;quot;certification&amp;quot;&amp;gt;Popular Cyber Security Certificates [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications  [Accessed 25 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====SIEM tools (security information and event management)====&lt;br /&gt;
Security Information and Event Management (SIEM) is a set of tools&lt;br /&gt;
and services offering a holistic view of an organization’s information&lt;br /&gt;
security. SIEM works by combining two technologies:&lt;br /&gt;
&amp;lt;li&amp;gt;Security information management (SIM), which collects data from log&lt;br /&gt;
files for analysis and reports on security threats and events, and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;security event management (SEM), which conducts real-time system&lt;br /&gt;
monitoring, notifies network admins about important issues and&lt;br /&gt;
establishes correlations between security events. There are a number of&lt;br /&gt;
security information and event management solutions on the market.&lt;br /&gt;
ArcSight ESM, IBM QRadar and Splunk are among the most popular. &amp;lt;ref name=&amp;quot;SIEM&amp;quot;&amp;gt;Application security, SIEM [Online]. Available: https://www.imperva.com/learn/application-security/siem/. [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Firewalls, Intrusion Detection Systems (IDS), and Intrusion Prevention Systems(IPS)====&lt;br /&gt;
Firewalls can be two types, hardware and software firewalls. Software&lt;br /&gt;
firewall is a firewall that is installed on a computer or server, and&lt;br /&gt;
tasked with network security. It works with a wide variety of other&lt;br /&gt;
technology security solutions to provide more robust and cohesive&lt;br /&gt;
security for enterprises of all sizes. When a software firewall is&lt;br /&gt;
installed on a server, it opens up like an umbrella of protection over&lt;br /&gt;
all other computers connected to the network. It is able to monitor both&lt;br /&gt;
incoming and outgoing traffic for potential risk or suspicious user&lt;br /&gt;
behavior, and also makes setting security policies much easier, faster&lt;br /&gt;
and more flexible. Hardware firewall is positioned between the network&lt;br /&gt;
and devices, allowing traffic to funnel through the firewall for a close&lt;br /&gt;
inspection and analysis. A hardware firewall, a term often&lt;br /&gt;
interchangeable with network or next-generation firewall, protects the&lt;br /&gt;
network gateways for an enterprise. Hardware firewall is physical&lt;br /&gt;
hardware, installed between network elements and connected devices, and&lt;br /&gt;
is tasked with filtering traffic for cyber threat to the network or&lt;br /&gt;
devices. Filtering out unauthorized or suspicious users based on traffic&lt;br /&gt;
analysis is one of the biggest benefits of hardware firewall. &amp;lt;ref name=&amp;quot;sangfor&amp;quot;&amp;gt;Sangfor, &amp;quot;What is Software Firewall? Difference between Hardware Firewall and Software Firewall, [Online]. Available: https://www.sangfor.com/blog/cybersecurity/what-is-software-firewall-difference-between-hardware-firewall-and-software-firewall [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems&lt;br /&gt;
(IPS) are both parts of the network infrastructure. IDS/IPS compare&lt;br /&gt;
network packets to a cyberthreat database containing known signatures of&lt;br /&gt;
cyberattacks — and flag any matching packets. IDS doesn’t alter the&lt;br /&gt;
network packets in any way, whereas IPS prevents the packet from&lt;br /&gt;
delivery based on the contents of the packet, much like how a firewall&lt;br /&gt;
prevents traffic by IP address. &amp;lt;ref name=&amp;quot;Varonis&amp;quot;&amp;gt;Varonis, &amp;quot;What is Software Firewall? IDS vs. IPS: What is the Difference?, [Online]. Available: https://www.varonis.com/blog/ids-vs-ips [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Digital forensics====&lt;br /&gt;
Digital forensics is a branch of forensic science that focuses on&lt;br /&gt;
identifying, acquiring, processing, analyzing, and reporting on data&lt;br /&gt;
stored electronically. Electronic evidence is a component of almost all&lt;br /&gt;
criminal activities and digital forensics support is crucial for law&lt;br /&gt;
enforcement investigations. Electronic evidence can be collected from a&lt;br /&gt;
wide array of sources, such as computers, smartphones, remote storage,&lt;br /&gt;
unmanned aerial systems, shipborne equipment, and more.&amp;lt;ref name=&amp;quot;interpol&amp;quot;&amp;gt;Interpol, &amp;quot;Digital forensics&amp;quot;. Available: https://www.interpol.int/How-we-work/Innovation/Digital-forensics. [Accessed 28 4 2022].&amp;lt;/ref&amp;gt; &lt;br /&gt;
Investigative process of digital forensics can be divided into several stages. There are four major stages: preservation, collection,&lt;br /&gt;
examination, and analysis. All these four stages need a deep understanding of computers, technology across a broad spectrum, and cybersecurity principles and&lt;br /&gt;
practices, a working knowledge of computers, networks, and coding, in-depth investigative abilities, critical-thinking skills and analytical talent the ability to effectively communicate and work with a&lt;br /&gt;
wide range of people. &amp;lt;ref name=&amp;quot;ecpi&amp;quot;&amp;gt;&amp;quot;Digital forensics&amp;quot;. Available: https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me. [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Mobile device management====&lt;br /&gt;
Mobile device management (MDM) is software that allows IT&lt;br /&gt;
administrators to control, secure and enforce policies on smartphones,&lt;br /&gt;
tablets and other endpoints. Mobile device management software emerged&lt;br /&gt;
in the early 2000s as a way to control and secure the personal digital&lt;br /&gt;
assistants and smartphones that business workers began to use. The&lt;br /&gt;
consumer smartphone boom that started with the launch of the Apple&lt;br /&gt;
iPhone in 2007 led to the bring your own device (BYOD) trend, which&lt;br /&gt;
fueled further interest in MDM.&amp;lt;ref name=&amp;quot;techtarget&amp;quot;&amp;gt;Techtarget, &amp;quot;Mobile Device Management&amp;quot;. Available: https://www.techtarget.com/searchmobilecomputing/definition/mobile-device-management [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Data management====&lt;br /&gt;
Sometimes the data management is neglected, but this part has a&lt;br /&gt;
crucial role when learning for good cyber security practices. Majority&lt;br /&gt;
of cyber security programs include a special courses on data management.&lt;br /&gt;
Data management is a method of organizing and maintaining data processes&lt;br /&gt;
that are required in almost every business operations. The benefits of&lt;br /&gt;
data management can be found accounting, statistics, logistics planning&lt;br /&gt;
and other disciplines including corporate computing.&amp;lt;ref name=&amp;quot;GlobalUni&amp;quot;&amp;gt;Global Universities, &amp;quot;MSc Data Management and Cyber Security&amp;quot;. Available: https://globaluniversities.in/msc-data-management-cyber-security. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Data governance (and management) play a fundamental role in&lt;br /&gt;
protecting an organization’s data. Ensuring that the right people have&lt;br /&gt;
the right access and that appropriate security controls are in place to&lt;br /&gt;
protect each system or service, based on the criticality or sensitivity&lt;br /&gt;
of the data sets these contain. &amp;lt;ref name=&amp;quot;CyberMagazine&amp;quot;&amp;gt;Cyber Security Magazine, &amp;quot;The Role of Data Governance in Cybersecurity&amp;quot;. Available: https://cybersecurity-magazine.com/the-role-of-data-governance-in-cybersecurity/?utm_source=rss&amp;amp;amp;utm_medium=rss&amp;amp;amp;utm_campaign=the-role-of-data-governance-in-cybersecurity. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Application security development====&lt;br /&gt;
Application security describes security measures at the application&lt;br /&gt;
level that aim to prevent data or code within the app from being stolen&lt;br /&gt;
or hijacked. It encompasses the security considerations that happen&lt;br /&gt;
during application development and design, but it also involves systems&lt;br /&gt;
and approaches to protect apps after they get deployed. Application&lt;br /&gt;
security may include hardware, software, and procedures that identify or&lt;br /&gt;
minimize security vulnerabilities.&amp;lt;ref name=&amp;quot;vmware&amp;quot;&amp;gt;VmWare, &amp;quot;What is application security?&amp;quot;. Available: https://www.vmware.com/topics/glossary/content/application-security.html [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Application security development is important to ensure that your&lt;br /&gt;
application is free from coding errors and bugs. And controls the risk&lt;br /&gt;
and helps safeguard against security vulnerabilities. Application&lt;br /&gt;
security development is the process of making applications more secure&lt;br /&gt;
by finding and fixing security vulnerabilities. This is often done by&lt;br /&gt;
enforcing software security best practices and using application&lt;br /&gt;
security testing tools. &lt;br /&gt;
&amp;lt;ref name=&amp;quot;perforce&amp;quot;&amp;gt;Perforce, &amp;quot;Application Security Development Best Practices&amp;quot;. Available: https://www.perforce.com/blog/kw/application-security-development-best-practices. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Audit and compliance knowledge====&lt;br /&gt;
A cyber security audit is designed to be a comprehensive review and&lt;br /&gt;
analysis of your business’s IT infrastructure. It identifies threats and&lt;br /&gt;
vulnerabilities, exposing weaknesses and high-risk practices.&lt;br /&gt;
Regulations such as the EU GDPR (General Data Protection Regulation) can&lt;br /&gt;
impose hefty penalties in the event of a breach that results in&lt;br /&gt;
exploited data. A cyber security audit will help mitigate the&lt;br /&gt;
consequences of a breach and demonstrate that your organization has&lt;br /&gt;
taken the necessary steps to protect client and company data. &amp;lt;ref name=&amp;quot;cyforsecure&amp;quot;&amp;gt;Cyfor Secure, &amp;quot;What is a Cyber Security Audit and how can it help your organisation?&amp;quot;. Available: https://cyforsecure.co.uk/services/cyber-assessment/cyber-security-audit/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cybersecurity compliance is the organizational risk management method&lt;br /&gt;
aligned with pre-defined security measures &amp;amp;amp; controls on how data&lt;br /&gt;
confidentiality is ensured by its administrative procedures.&amp;lt;ref name=&amp;quot;nordlayer&amp;quot;&amp;gt;NordLayer, &amp;quot;Cybersecurity compliance: Everything you need to know&amp;quot;. Available: https://nordlayer.com/blog/cybersecurity-compliance-everything-you-need-to-know/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
All needed skills are developed through courses and certification.&lt;br /&gt;
&lt;br /&gt;
===Entry-Level Incident Response Positions===&lt;br /&gt;
It is not always possible to advance to the position of incident&lt;br /&gt;
responder in a straight line. Many professionals advance from entry- to&lt;br /&gt;
mid-level positions before becoming a real incident responder or a&lt;br /&gt;
member of a computer emergency response team (CERT).&amp;lt;br /&amp;gt;&lt;br /&gt;
These are some examples:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;network-administrator&amp;quot;&amp;gt;Network administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;This position’s experience will help potential incident responders&lt;br /&gt;
develop networking skills. Attention to detail, as well as the ability&lt;br /&gt;
to sift through system configurations, site layouts, and general network&lt;br /&gt;
and communication setups, are essential in this field.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;system-administrator&amp;quot;&amp;gt;System administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Another crucial beginning point for an incident responder is to learn&lt;br /&gt;
how to manage resources inside your organization as well as user&lt;br /&gt;
behavior. Understanding the potential damage that users, inadequate&lt;br /&gt;
security setups, and ineffective IT policies and procedures can cause on&lt;br /&gt;
your network can provide prospective candidates with insight into the&lt;br /&gt;
human component of an incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;security-administrator&amp;quot;&amp;gt;Security administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In such a position, basic hacking skills, penetration testing, and&lt;br /&gt;
intrusion detection are all learned, which are crucial incident&lt;br /&gt;
responder skills when trying to replicate a breach or attack.&lt;br /&gt;
Understanding the paths a cybercriminal will take when attempting to&lt;br /&gt;
damage or obtain access to a system can greatly simplify the work of&lt;br /&gt;
reverse engineering the incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://resources.infosecinstitute.com/topic/incident-responder-career-roadmap-entry-level-executive/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3 id=&amp;quot;mid-level-incident-response-positions&amp;quot;&amp;gt;Mid-Level Incident&lt;br /&gt;
Response Positions&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5&lt;br /&gt;
id=&amp;quot;computer-security-incident-response-team-csirt-engineer&amp;quot;&amp;gt;Computer&lt;br /&gt;
security incident response team (CSIRT) engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;cyber-incident-responder&amp;quot;&amp;gt;Cyber incident responder&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-response-engineer&amp;quot;&amp;gt;Incident response&lt;br /&gt;
engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;While each of these positions is different, they generally require&lt;br /&gt;
very similar skills and characteristics in a candidate. At this level,&lt;br /&gt;
personal characteristics such as problem solving, time management, and&lt;br /&gt;
even presentation skills become more crucial as one’s career evolves&lt;br /&gt;
into a management-facing role.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Technical skills include the ability to identify and minimize threats&lt;br /&gt;
while maintaining communication with management and the rest of your&lt;br /&gt;
team. Data analysis and evidence gathering become increasingly crucial,&lt;br /&gt;
and the circumstances in which your services are deployed get more&lt;br /&gt;
serious.&amp;lt;/p&amp;gt;&lt;br /&gt;
Problem-solving skills are crucial at this level of incident&lt;br /&gt;
response, and as the stakes rise, so does the pressure in each&lt;br /&gt;
situation. At this level, programming abilities are essential since&lt;br /&gt;
incident responders may be needed to reverse engineer malicious code or&lt;br /&gt;
even create patches for vulnerable network applications or services. &amp;lt;ref name=&amp;quot;corsera&amp;quot;&amp;gt;Perforce, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated]&amp;quot;. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;h3 id=&amp;quot;senior-level-incident-response-positions&amp;quot;&amp;gt;Senior-Level Incident&lt;br /&gt;
Response Positions&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;intrusion-detection-specialist&amp;quot;&amp;gt;Intrusion detection&lt;br /&gt;
specialist:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;A CISSP certification might help a potential candidate in preparing&lt;br /&gt;
for the profession. The role of an intrusion detection specialist is to&lt;br /&gt;
find and stop any unwanted communications.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-manager&amp;quot;&amp;gt;Incident manager:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Expected to plan, oversee, manage, and supervise all incident&lt;br /&gt;
response team actions. Is in charge of reporting all current events to&lt;br /&gt;
senior management and stakeholders, as well as acting as the technical&lt;br /&gt;
lead on active incidents for incident responders. Prepares threat and&lt;br /&gt;
impact assessments and reports them known to management.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.coursera.org/articles/popular-cybersecurity-certifications&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Certificates== &lt;br /&gt;
There is a vast number of different certificates and the road map to&lt;br /&gt;
being a certified professional could be very different&amp;lt;ref name=&amp;quot;Coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated],&amp;quot; [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;NICCS&amp;quot;&amp;gt;NICCS, &amp;quot;Cybersecurity Certifications,&amp;quot; [Online]. Available: hhttps://niccs.cisa.gov/about-niccs/cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt; . One possible&lt;br /&gt;
approach is to start with basic certificates from the different branches&lt;br /&gt;
of service and move to more specific and demanding focused&lt;br /&gt;
certification. Also, some jobs require certain clearances, either from&lt;br /&gt;
industry, or from the government. One small selection of different&lt;br /&gt;
possible certificates is brought out in following paragraphs.&lt;br /&gt;
&lt;br /&gt;
Security+ is a CompTIA certification that is considered a basic cert&lt;br /&gt;
among cybersecurity professionals. It covers the topics of risk&lt;br /&gt;
management and threat assessment.&lt;br /&gt;
Network+ is also offered by CompTIA this certification (like the name&lt;br /&gt;
implies) focuses on networking infrastructure and operations. It is&lt;br /&gt;
considered a foundational certification.&lt;br /&gt;
The Certified Information Systems Security Professional (CISSP) is a&lt;br /&gt;
more advanced certification designed for cybersecurity professionals&lt;br /&gt;
with at least five years of work experience. The certification covers&lt;br /&gt;
topics such as architecture, engineering, and management.&amp;lt;/p&amp;gt;&lt;br /&gt;
The Certified Ethical Hacker (CEH) certification is also considered a&lt;br /&gt;
more advanced cert because it generally requires that applicants have&lt;br /&gt;
multiple years of work experience. The goal of an ethical hacker&lt;br /&gt;
certification is to be able to understand how cyber attacks unfold in&lt;br /&gt;
order to improve threat assessment and mitigation skills.&amp;lt;ref name=&amp;quot;cyberguide&amp;quot;&amp;gt;Cybersecurity Guide, &amp;quot;How to become a cybersecurity specialist&amp;quot;, [Online]. Available: https://cybersecurityguide.org/careers/security-specialist/. [Accessed 27 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
This is definitely not all, when one looks for more information, following link could be searched, to get more in depth knowledge about&lt;br /&gt;
different possibilities. Hereby, with the help of this matrix a possible taxonomy of different 436 listed certificates in branches are&lt;br /&gt;
presented.&amp;lt;ref name=&amp;quot;Pauljeremy&amp;quot;&amp;gt;&amp;quot;Cybersecurity Roadmap,&amp;quot; [Online]. Available: https://pauljerimy.com/2020/10/12/scr-oct-2020-update/. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:analystimage5.png|1000px|thumb|Certificate matrix &amp;lt;ref&amp;gt;&amp;quot;Certification roadmap&amp;quot;. Available at https://pauljerimy.com/security-certification-roadmap&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
=== Communication and Network Security===&lt;br /&gt;
Communication and network security covers the ability to secure&lt;br /&gt;
communication channels and networks. Topics include secure and converges&lt;br /&gt;
protocols, wireless networks, cellular networks, hardware operations&lt;br /&gt;
(warranty and redundant power), and third-party connectivity. IP&lt;br /&gt;
networking are also included in this domain.&lt;br /&gt;
===Identity and Access Management===&lt;br /&gt;
The identity and access management domain covers the attacks that&lt;br /&gt;
target the human gateway to gain access to data. Other topics include&lt;br /&gt;
ways to identify users with rights to access the information and&lt;br /&gt;
servers. Identity and access management covers the topics of&lt;br /&gt;
applications, Single sign-on authentication, privilege escalation,&lt;br /&gt;
Kerberos, rule-based or risk-based access control, proofing and&lt;br /&gt;
establishment of identity.&lt;br /&gt;
===Security Architecture and Engineering===&lt;br /&gt;
The security architecture and engineering domain covers important&lt;br /&gt;
topics concerning security engineering plans, designs and principles,&lt;br /&gt;
Topics include assessing and mitigating information system&lt;br /&gt;
vulnerabilities, fundamental concepts of security models and security&lt;br /&gt;
architectures in critical areas like access control. Cloud systems,&lt;br /&gt;
cryptography, system infiltrations (ransomware, fault-injection and&lt;br /&gt;
more) and virtualized systems are also covered in this domain.&lt;br /&gt;
===Asset Security===&lt;br /&gt;
The Asset Security domain deals with the issues related to the&lt;br /&gt;
collection, storage, maintenance, retention and destruction of data. It&lt;br /&gt;
also covers knowledge of different roles regarding data handling (owner,&lt;br /&gt;
controller and custodian) as well as data protection methods and data&lt;br /&gt;
states. Other topics include resource provision, asset classification&lt;br /&gt;
and data lifecycle management.&lt;br /&gt;
===Security and Risk Management===&lt;br /&gt;
The security and risk management domain covers general on skills&lt;br /&gt;
related to the implementation of user awareness programs as well as&lt;br /&gt;
security procedures. Emphasis is also placed on risk management&lt;br /&gt;
concerning the acquisition of new services, hardware and software&lt;br /&gt;
(supply chain). Other skills include social engineering defense&lt;br /&gt;
mechanisms.&lt;br /&gt;
===Security Assessment and Testing===&lt;br /&gt;
The security assessment and testing domain deals with all the&lt;br /&gt;
techniques and tools used to find system vulnerabilities, weaknesses and&lt;br /&gt;
potential areas of concern not addressed by security procedures and&lt;br /&gt;
policies. Attack simulations, vulnerability assessment, compliance&lt;br /&gt;
checks, and ethical disclosure also fall under this domain.&lt;br /&gt;
===Software Security===&lt;br /&gt;
The software development security domain deals with implementing&lt;br /&gt;
software-based security protocols within environment for which the IT&lt;br /&gt;
professional is responsible. Risk analysis, vulnerability identification&lt;br /&gt;
and auditing of source codes are all covered in this subset. Additional&lt;br /&gt;
topics include software-designed security, maturity models, development&lt;br /&gt;
methodologies, open-source and third-party development security.&lt;br /&gt;
===Security operations===&lt;br /&gt;
The security operations domain covers topics ranging from&lt;br /&gt;
investigations and digital forensic to detection and intrusion&lt;br /&gt;
prevention tools, sandboxing and firewalls. Topics include user and&lt;br /&gt;
entity behavior analytics, threat intelligence (threat hunting and&lt;br /&gt;
threat feeds) log management, artifacts (mobile, computer and network),&lt;br /&gt;
machine learning and AI-based tools, penetration testing, and&lt;br /&gt;
exploitation development. These for sub-domains are lister here.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Incident Handling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Penetration Testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Exploitation&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Education==&lt;br /&gt;
&amp;lt;p&amp;gt;The entry level monitoring specialist is hired by Estonian&lt;br /&gt;
Information System Authority even if there is no formal IT education,&lt;br /&gt;
but readiness to learn and moderate knowledge of different operation&lt;br /&gt;
systems is enough to start the career.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.cv.ee/en/vacancy/792782/riigi-infosusteemi-amet/seirespetsialist-tule-eesti-kuberruumi-valvuriks&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Nevertheless, like most other high qualification careers jobs falling&lt;br /&gt;
under the cybersecurity specialist category require some form of formal&lt;br /&gt;
education. However, since cybersecurity specialist jobs can fall across&lt;br /&gt;
a wide spectrum of job descriptions and responsibilities, it is possible&lt;br /&gt;
to obtain a specialist job after completing many levels of different&lt;br /&gt;
computer related education.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;If one is looking for a cybersecurity related education, for example&lt;br /&gt;
in EU, 137 courses/programs could be found that relate to keyword IT or&lt;br /&gt;
cybersecurity.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.enisa.europa.eu/topics/cybersecurity-education/education-map/education-courses&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Also, there is a great amount of discussion, if cuber security&lt;br /&gt;
professional should have a degree or would be certification just enough.&lt;br /&gt;
One interesting table is produces by Franklin University that compares&lt;br /&gt;
benefits and/or drawbacks of each type of credential.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image11.png&amp;quot; alt=&amp;quot;Comparison MSc vs certificate&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;Comparison MSc vs&lt;br /&gt;
certificate&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Certifications are generally good for people with little practical&lt;br /&gt;
experience because they are known quantities in the industry and can&lt;br /&gt;
help you get your foot in the door. They set a minimum knowledge bar.&lt;br /&gt;
But some certifications are viewed more favorably than others.&lt;br /&gt;
Certifications with renewal requirements are viewed better by hiring&lt;br /&gt;
managers, but they also more costly in the long run because of the need&lt;br /&gt;
for continuing education. Certifications are also good for showing&lt;br /&gt;
in-depth expertise in a specialization within cybersecurity. Depending&lt;br /&gt;
on your career goals, it may be advantageous to have a master’s&lt;br /&gt;
degree—which shows your breadth of knowledge, critical thinking and&lt;br /&gt;
leadership skills—and a certificate—which shows specific skill&lt;br /&gt;
competency.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;As IT (Cyber) Security is still a relatively young discipline,&lt;br /&gt;
universities and colleges are still figuring out which is the best&lt;br /&gt;
approach for their degrees. Study programmes and curricula in Cyber&lt;br /&gt;
Security are different. In general, here are the duration of Cyber&lt;br /&gt;
Security degrees:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Bachelor’s degrees in Cyber Security take 3 or 4 years in most&lt;br /&gt;
countries.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Master’s courses in Cyber Security take between 1-2 years to&lt;br /&gt;
complete.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;PhD programmes in Cyber Security last 3-5 years. Some only take 1&lt;br /&gt;
or 2 years, but they are less common.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Generalization could me made that on bachelor level the general&lt;br /&gt;
knowledge about the cyber issues are obtained. On master level the&lt;br /&gt;
specialization courses are taken and the person can choose more specific&lt;br /&gt;
topics to study. It is on master level where strengths of the cyber&lt;br /&gt;
specialist can be developed further and up-do date knowledge obtained in&lt;br /&gt;
specifics. PhD is serious science and involves teaching, lot of&lt;br /&gt;
scientific work and writing for publications.&amp;lt;/p&amp;gt;&lt;br /&gt;
==Salary==&lt;br /&gt;
&amp;lt;p&amp;gt;Even if the salary can be very different, compared to the skills and&lt;br /&gt;
experience, an generalization can be made. Cyber Security professionals&lt;br /&gt;
in CSIRT, and in other entities earn quite well, from the start. First,&lt;br /&gt;
some comparison from the United States. The average CSIRT analyst salary&lt;br /&gt;
in the USA is $97,500 per year or $50 per hour. Entry level positions&lt;br /&gt;
start at $48,875 per year while most experienced workers make up to&lt;br /&gt;
$135,373 per year.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.talent.com/salary?job=csirt+analyst&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;There are multiple positions you can occupy in this field. They have&lt;br /&gt;
in common great salaries and high demand for technical skills, attention&lt;br /&gt;
to details, problem-solving mentality, and the ability to analyze risks.&lt;br /&gt;
Here are the average annual salaries in the United States, according to&lt;br /&gt;
Payscale:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.payscale.com/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Cryptographer – 100,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Information Security Officer – 91,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Assessor – 90,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Engineer – 88,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Penetration Tester – 81,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Forensics Expert – 71,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Administrator – 65,000 USD&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When looking into salaries in Estonia, one can find that there is a&lt;br /&gt;
discussion that private sector is taking a toll from the public sector,&lt;br /&gt;
and that the salaries in important agencies, as Information System&lt;br /&gt;
Authority loose their employees to the better paid positions in private&lt;br /&gt;
sector.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://digi.geenius.ee/rubriik/uudis/kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad/&lt;br /&gt;
https://tehnika.postimees.ee/6887428/riigi-it-tootajate-palgamaarad-kasvasid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;But there is also a different view that average private sector worker&lt;br /&gt;
could be hired as a top specialist in public sector and then the payment&lt;br /&gt;
is higher. Nevertheless, it seems that the average payment in cyber&lt;br /&gt;
security sector is any way higher that in other parts of the&lt;br /&gt;
e-services.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://digi.geenius.ee/rubriik/uudis/5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka/&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
==SOC==&lt;br /&gt;
&amp;lt;p&amp;gt;A SOC is a facility where an organization’s network, applications,&lt;br /&gt;
and endpoints are monitored and defended. The term was adapted from&lt;br /&gt;
network operations centers (NOCs), where large telecommunication or&lt;br /&gt;
corporate networks are monitored. When network security became more of a&lt;br /&gt;
concern, security teams were formed within the NOCs, and eventually spun&lt;br /&gt;
off into larger organizations of their own as the responsibilities of&lt;br /&gt;
security teams grew increasingly complex and specialized. The security&lt;br /&gt;
staff working in a security operations center are often called the SOC&lt;br /&gt;
team.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Functions of the SOC team include, but are not limited to:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ol type=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Taking inventory of resources, to get a better understanding of the&lt;br /&gt;
structure they are protecting.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintanence of the system, by constantly making updates and adding&lt;br /&gt;
safeguards.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Monitoring the network for abnormalities with special tools.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Threat analysis of new attacks and vulnerabilities.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Responding to attacks, by acting as “first responders”. The SOC team&lt;br /&gt;
will shut down and/or isolate endpoints, deleting files and lowering the&lt;br /&gt;
impact as fast as possible.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Recovery of system stability and lost data. This may be done using&lt;br /&gt;
backups, restarting endpoints or reconfiguring systems.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Logging all actions on the system, to be later used for analysis or&lt;br /&gt;
forensics after an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigating the root cause of an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Auditing their own actions, to be in line with regulations of the&lt;br /&gt;
organization, industry or governing body.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.trellix.com/en-us/security-awareness/operations/what-is-soc.html&amp;lt;/p&amp;gt;&lt;br /&gt;
==CSIRT==&lt;br /&gt;
&amp;lt;p&amp;gt;A CSIRT is a group that responds to security incidents when they&lt;br /&gt;
occur. Key responsibilities of a CSIRT include: &lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
===Creating and maintaining an incident response plan (IRP)===&lt;br /&gt;
An incident response plan (IRP) is a set of written instructions for&lt;br /&gt;
detecting, responding to and limiting the effects of an information&lt;br /&gt;
security event. Incident response plans provide instructions for&lt;br /&gt;
responding to many potential scenarios, including data breaches, denial&lt;br /&gt;
of service/distributed denial of service attacks, firewall breaches,&lt;br /&gt;
virus or malware outbreaks or insider threats. Without an incident&lt;br /&gt;
response plan in place, organizations may either not detect the attack&lt;br /&gt;
in the first place, or not follow proper protocol to contain the threat&lt;br /&gt;
and recover from it when a breach is detected.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.stratacore.com/incidentresponseplan&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
===Investigating and analyzing incidents===&lt;br /&gt;
CSIRTs are also involved in improvement activities. After major&lt;br /&gt;
computer security incidents occur, or when incidents are not handled in&lt;br /&gt;
a timely or effective manner, a CSIRT will generally perform a&lt;br /&gt;
postmortem of the incident and its response. This postmortem will&lt;br /&gt;
identify the strengths and weakness of the response effort. Such reviews&lt;br /&gt;
can identify weaknesses and holes in systems, infrastructure defenses,&lt;br /&gt;
or policies that allowed the incident to take place. It can also&lt;br /&gt;
identify problems with communication channels, interfaces, and&lt;br /&gt;
procedures that inhibited the efficient resolution of the reported&lt;br /&gt;
problem.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.cisa.gov/uscert/bsi/articles/best-practices/incident-management/defining-computer-security-incident-response-teams&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Managing internal communications and updates during or immediately after incidents occur===&lt;br /&gt;
===Communicating with employees, shareholders, customers, and the press about incidents as needed===&lt;br /&gt;
&amp;lt;p&amp;gt;There are various services within the CSIRT Services Framework that&lt;br /&gt;
address communications, as they relate to security operations and&lt;br /&gt;
incident response services. Some of these include Information Security&lt;br /&gt;
Incident Coordination, Crisis Management Support, Vulnerability&lt;br /&gt;
Disclosure, Situational Awareness Communication, and Awareness Building,&lt;br /&gt;
to name a few. Sharing information and communicating with the general&lt;br /&gt;
public and/or your constituency is appropriate in many different&lt;br /&gt;
scenarios. These can range from proactive communications to reactive&lt;br /&gt;
communications. Each scenario may be unique, and careful consideration&lt;br /&gt;
should be given to when to release information to the public and what&lt;br /&gt;
information should be released.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;https://resources.sei.cmu.edu/asset_files/Handbook/2021_002_001_651819.pdf&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Remediating incidents===&lt;br /&gt;
Threat remediation is a strong and capable tool for fighting the&lt;br /&gt;
cyber security compromises. As the word ‘remedy’ suggests, remediation&lt;br /&gt;
process involves the treatment of a security breach. With the&lt;br /&gt;
remediation practices, your cyber security team is able to eliminate&lt;br /&gt;
suspicious activities and malicious attacks in the form of malware,&lt;br /&gt;
ransomware, phishing and such. Even if you ‘kill’ the suspicious&lt;br /&gt;
activity, the attackers can remain in your systems. If you want to&lt;br /&gt;
contaminate and end the problem for good, your remediation processes&lt;br /&gt;
must involve the detection of the cause. &amp;lt;ref name=&amp;quot;logsign&amp;quot;&amp;gt;Logsign, &amp;quot;What-is-remediation-in-cyber-security&amp;quot;. Available: https://www.logsign.com/blog/what-is-remediation-in-cyber-security/. [Accessed 28 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Recommending technology, policy, governance, and training changes after security incidents===&lt;br /&gt;
After all these actions, the SCIRT must contribute to the development&lt;br /&gt;
of better policies, practices and has to recommend improvements. They&lt;br /&gt;
are not working in the vacuum and their work has to create new and&lt;br /&gt;
better standards for cyber security. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;Exabeam, &amp;quot;CSIRT&amp;quot;. Available: https://www.exabeam.com/incident-response/csirt/ [Accessed 28 APr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==CERT==&lt;br /&gt;
&amp;lt;p&amp;gt;The term “computer emergency response team” was coined in 1988. In&lt;br /&gt;
response to the Morris worm attack that impacted thousands of servers on&lt;br /&gt;
the Internet, DARPA funded the formation of the Computer Emergency&lt;br /&gt;
Response Team Coordination Center (CERT-CC) at Carnegie Mellon&lt;br /&gt;
University. The goal of CERT-CC was to help protect the internet by&lt;br /&gt;
collecting and disseminating information on critical security&lt;br /&gt;
vulnerabilities. Several other countries formed similar centers using&lt;br /&gt;
the same acronym (despite threats of legal action by Carnegie Mellon for&lt;br /&gt;
trademark infringement). Now the term CERT refers to any emergency&lt;br /&gt;
response team that deals with cyber threats. Many people use CERT-CC&lt;br /&gt;
interchangeably with CSIRT, though the charter of a CERT is information&lt;br /&gt;
sharing in order to help other response teams respond to threats against&lt;br /&gt;
their own infrastructure.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In general, the designation of CERT is helpful in applying real-world&lt;br /&gt;
solutions to various cybersecurity problems. They may be government&lt;br /&gt;
contractors or employees of a major corporation. For example, the U.S.&lt;br /&gt;
Computer Emergency Readiness Team (US-CERT) operates under the U.S.&lt;br /&gt;
Department of Homeland Security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.techopedia.com/definition/31003/computer-emergency-response-team-cert&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In Estonia CERT is designated as CERT-EE. It was established in 2006,&lt;br /&gt;
as an organization responsible for the management of security incidents&lt;br /&gt;
in .ee computer networks. It is also a national contact point for&lt;br /&gt;
international co-operation in the field of IT security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ria.ee/en/cyber-security/cert-ee.html&amp;lt;/p&amp;gt;&lt;br /&gt;
===Difference between SOC/CSIRT/CERT===&lt;br /&gt;
&amp;lt;p&amp;gt;How CSIRTs differ from CERTs and SOCs There are overlapping&lt;br /&gt;
responsibilities between a community emergency response team (CERT),&lt;br /&gt;
computer security incident response team (CSIRT), and security&lt;br /&gt;
operations center (SOC). To add to this confusion, frequently, the terms&lt;br /&gt;
CERT and CSIRT are used interchangeably, despite the important&lt;br /&gt;
differences.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image3.png&amp;quot; alt=&amp;quot;Overlapping in images/image3.png&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;Overlapping in&lt;br /&gt;
images/image3.png&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
==Understand the primary roles and characteristics of a CERT, CSIRT, and SOC.==&lt;br /&gt;
&amp;lt;p&amp;gt;So, using strict definitions, a CERT collects and disseminates&lt;br /&gt;
security information, typically for the benefit of a country or an&lt;br /&gt;
industry. A CSIRT is a cross-functional team that responds to incidents&lt;br /&gt;
on behalf of a country or an organization. A SOC is where a country or&lt;br /&gt;
organization monitors and defends its network, servers, applications,&lt;br /&gt;
and endpoints.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image4.png&amp;quot; alt=&amp;quot;table of explanation images/image4&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;table of explanation&lt;br /&gt;
images/image4&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
==Future==&lt;br /&gt;
&amp;lt;p&amp;gt;And the Cyber security problem is only getting bigger. According to a&lt;br /&gt;
report published by Accenture, the number of cyber security breaches&lt;br /&gt;
increased by 11 percent from 2017 to 2018. The cost of such breaches is&lt;br /&gt;
astronomical–about $600 billion worldwide, according to the Economic&lt;br /&gt;
Impact of Cybercrime report.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Job projections for cybersecurity are staggering. The Bureau of Labor&lt;br /&gt;
Statistics in US predicts that careers in the cybersecurity field will&lt;br /&gt;
grow by 32% by 2028. That makes cybersecurity one of the top 10&lt;br /&gt;
fastest-growing jobs in the country. In the United States alone, jobs&lt;br /&gt;
for Information Security Analysts are expected to grow by 15% by&lt;br /&gt;
2024.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Most likely this trend is also similar in other countries.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When checking Estonian job portals, there is a constant need for&lt;br /&gt;
people for cyber security related positions. Also, linkedin search gives&lt;br /&gt;
approximately 30 vacancies immediately. There are banks, logistics&lt;br /&gt;
companies, e-shops, and software producers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://ee.linkedin.com/jobs/cyber-security-jobs?countryRedirected=1&amp;amp;amp;position=1&amp;amp;amp;pageNum=0&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Trends that affect companies create need for constant cyber security&lt;br /&gt;
services. Increasing number of home/remote offices require secure&lt;br /&gt;
corporate networks and security of remote devices. One example is from&lt;br /&gt;
this year, when sloppy remote desktop set-up paralyzed systems of 17&lt;br /&gt;
companies.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.aripaev.ee/uudised/2022/04/20/ria-lohakas-kaugtoolaua-seadistus-halvas-martsis-vahemalt-17-juhul-ettevotete-it-susteemid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Also, no service can exists without robust infrastructure - servers,&lt;br /&gt;
databases, applications. As all previously mentioned devices and&lt;br /&gt;
services are at constant scanning and surveillance. So, the breach&lt;br /&gt;
detection and immediate action demands 24/7 services. Even if lot of&lt;br /&gt;
things could be automated, there is a need for human specialists (at&lt;br /&gt;
least, at the moment). Third growing field is also a forensic&lt;br /&gt;
investigation, as every attack must be investigated in order to be ready&lt;br /&gt;
to repel next attacks. So data recovery and evidence collection is&lt;br /&gt;
another important field of work that need skilled and professional&lt;br /&gt;
workers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Even, if the specifics of the entity, be it CSIRT, CERT or SOC, are&lt;br /&gt;
different, the fundamentals of the work are the same. Professional&lt;br /&gt;
knowledge of the networks, operational systems, hardware, scripting, and&lt;br /&gt;
several other wider IT related knowledge is needed. As there is no&lt;br /&gt;
single way to reach to it, every single person can find one’s strongest&lt;br /&gt;
sides and develop them with knowledge of weaker side, in order to know,&lt;br /&gt;
when to as for help.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/body&amp;gt;&lt;br /&gt;
&amp;lt;/html&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mavald</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142191</id>
		<title>Hiring a Cyber Security Incident Analyst</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142191"/>
		<updated>2022-05-01T15:02:43Z</updated>

		<summary type="html">&lt;p&gt;Mavald: /* Audit and compliance knowledge */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==A Cyber Security Incident Analyst==&lt;br /&gt;
&lt;br /&gt;
[[File:image1.png|600px|thumb|Job advertisement &amp;lt;ref&amp;gt;&amp;quot;Job Advertisement&amp;quot;. Available at https://www.projectpeople.com/jobs/&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
===Cyber security incident analyst in SOC/CSIRT/CERT===&lt;br /&gt;
This article delves into the job title of Cyber Security Incident&lt;br /&gt;
Analyst and provides an overview of the acronyms SOC/CSIRT/CERT. A brief&lt;br /&gt;
history of the job is discussed here, as well as a possible career path,&lt;br /&gt;
education, experience, and other characteristics required for work in&lt;br /&gt;
computer security-related organizations. The article also provides a&lt;br /&gt;
brief history of SOC/CSIRT/CERT, as well as a comparison of their&lt;br /&gt;
differences and similarities.&lt;br /&gt;
===Cyber Security Incident Analyst Skill Set===&lt;br /&gt;
What skill set is expected from the Cyber Security Incident Analyst? Below written lines are taken from the same job advertisement depicted&lt;br /&gt;
on the left side of this article:&lt;br /&gt;
As a Security Incident Analyst your responsibilities will include:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Continuous monitoring of security tooling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Performing regular and ad-hoc vulnerability assessments&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Carrying out ‘spot checks’&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Reporting vulnerabilities to the PVG via the alerts system&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintaining and documenting logging systems&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Developing centralized logging, reporting and intelligence&lt;br /&gt;
platforms&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;‘Light touch’ penetration testing with open source tooling&lt;br /&gt;
(Metasploit)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Knowledge &amp;amp;amp; Experience required:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;SOC, CSIRT or CERT operational environment experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Windows / Linux experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TCP /IP networking protocol knowledge&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience reviewing and analyzing Security Events from various&lt;br /&gt;
monitoring and logging sources&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience in website and web application security assessment or&lt;br /&gt;
penetration testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience of using Metasploit&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Scripting knowledge using BASH, Python, Perl, Ruby&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Skills in Host and Network Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
As one can see the description of the duties is wide and also the&lt;br /&gt;
knowledge and experience that is required is noteworthy. So, where to&lt;br /&gt;
start to find out the way to get this kind of knowledge and&lt;br /&gt;
expertize.&lt;br /&gt;
===Possible career path===&lt;br /&gt;
Next part of the paper is aiming to depict a possible ways, how to&lt;br /&gt;
develop oneself, and move along the career pathway in cybersecurity&lt;br /&gt;
field. Topics of development, education, experience and certification&lt;br /&gt;
are covered.&lt;br /&gt;
[[File:analystimage2.png|1000px|thumb|Career path &amp;lt;ref&amp;gt;&amp;quot;Possible Career Path&amp;quot;. Available at https://www.cyberseek.org/pathway.html&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
===Junior/Senior===&lt;br /&gt;
Start with an entry-level job in IT. Hands-on experience is often the&lt;br /&gt;
most effective way to prepare for certification exams. Start&lt;br /&gt;
accumulating work experience with an entry-level role as a cybersecurity&lt;br /&gt;
analyst. Many cybersecurity professionals start off in more general IT&lt;br /&gt;
roles. The skills, practices, and technologies you’ll use as a&lt;br /&gt;
cybersecurity professional will continue to evolve along with computer&lt;br /&gt;
and network technology. The desire to learn, ability to problem solve,&lt;br /&gt;
and attention to detail will serve you well in this field. Other, more&lt;br /&gt;
technical skills and technologies to learn include:&amp;lt;ref name=&amp;quot;certification&amp;quot;&amp;gt;Popular Cyber Security Certificates [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications  [Accessed 25 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====SIEM tools (security information and event management)====&lt;br /&gt;
Security Information and Event Management (SIEM) is a set of tools&lt;br /&gt;
and services offering a holistic view of an organization’s information&lt;br /&gt;
security. SIEM works by combining two technologies:&lt;br /&gt;
&amp;lt;li&amp;gt;Security information management (SIM), which collects data from log&lt;br /&gt;
files for analysis and reports on security threats and events, and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;security event management (SEM), which conducts real-time system&lt;br /&gt;
monitoring, notifies network admins about important issues and&lt;br /&gt;
establishes correlations between security events. There are a number of&lt;br /&gt;
security information and event management solutions on the market.&lt;br /&gt;
ArcSight ESM, IBM QRadar and Splunk are among the most popular. &amp;lt;ref name=&amp;quot;SIEM&amp;quot;&amp;gt;Application security, SIEM [Online]. Available: https://www.imperva.com/learn/application-security/siem/. [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Firewalls, Intrusion Detection Systems (IDS), and Intrusion Prevention Systems(IPS)====&lt;br /&gt;
Firewalls can be two types, hardware and software firewalls. Software&lt;br /&gt;
firewall is a firewall that is installed on a computer or server, and&lt;br /&gt;
tasked with network security. It works with a wide variety of other&lt;br /&gt;
technology security solutions to provide more robust and cohesive&lt;br /&gt;
security for enterprises of all sizes. When a software firewall is&lt;br /&gt;
installed on a server, it opens up like an umbrella of protection over&lt;br /&gt;
all other computers connected to the network. It is able to monitor both&lt;br /&gt;
incoming and outgoing traffic for potential risk or suspicious user&lt;br /&gt;
behavior, and also makes setting security policies much easier, faster&lt;br /&gt;
and more flexible. Hardware firewall is positioned between the network&lt;br /&gt;
and devices, allowing traffic to funnel through the firewall for a close&lt;br /&gt;
inspection and analysis. A hardware firewall, a term often&lt;br /&gt;
interchangeable with network or next-generation firewall, protects the&lt;br /&gt;
network gateways for an enterprise. Hardware firewall is physical&lt;br /&gt;
hardware, installed between network elements and connected devices, and&lt;br /&gt;
is tasked with filtering traffic for cyber threat to the network or&lt;br /&gt;
devices. Filtering out unauthorized or suspicious users based on traffic&lt;br /&gt;
analysis is one of the biggest benefits of hardware firewall. &amp;lt;ref name=&amp;quot;sangfor&amp;quot;&amp;gt;Sangfor, &amp;quot;What is Software Firewall? Difference between Hardware Firewall and Software Firewall, [Online]. Available: https://www.sangfor.com/blog/cybersecurity/what-is-software-firewall-difference-between-hardware-firewall-and-software-firewall [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems&lt;br /&gt;
(IPS) are both parts of the network infrastructure. IDS/IPS compare&lt;br /&gt;
network packets to a cyberthreat database containing known signatures of&lt;br /&gt;
cyberattacks — and flag any matching packets. IDS doesn’t alter the&lt;br /&gt;
network packets in any way, whereas IPS prevents the packet from&lt;br /&gt;
delivery based on the contents of the packet, much like how a firewall&lt;br /&gt;
prevents traffic by IP address. &amp;lt;ref name=&amp;quot;Varonis&amp;quot;&amp;gt;Varonis, &amp;quot;What is Software Firewall? IDS vs. IPS: What is the Difference?, [Online]. Available: https://www.varonis.com/blog/ids-vs-ips [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Digital forensics====&lt;br /&gt;
Digital forensics is a branch of forensic science that focuses on&lt;br /&gt;
identifying, acquiring, processing, analyzing, and reporting on data&lt;br /&gt;
stored electronically. Electronic evidence is a component of almost all&lt;br /&gt;
criminal activities and digital forensics support is crucial for law&lt;br /&gt;
enforcement investigations. Electronic evidence can be collected from a&lt;br /&gt;
wide array of sources, such as computers, smartphones, remote storage,&lt;br /&gt;
unmanned aerial systems, shipborne equipment, and more.&amp;lt;ref name=&amp;quot;interpol&amp;quot;&amp;gt;Interpol, &amp;quot;Digital forensics&amp;quot;. Available: https://www.interpol.int/How-we-work/Innovation/Digital-forensics. [Accessed 28 4 2022].&amp;lt;/ref&amp;gt; &lt;br /&gt;
Investigative process of digital forensics can be divided into several stages. There are four major stages: preservation, collection,&lt;br /&gt;
examination, and analysis. All these four stages need a deep understanding of computers, technology across a broad spectrum, and cybersecurity principles and&lt;br /&gt;
practices, a working knowledge of computers, networks, and coding, in-depth investigative abilities, critical-thinking skills and analytical talent the ability to effectively communicate and work with a&lt;br /&gt;
wide range of people. &amp;lt;ref name=&amp;quot;ecpi&amp;quot;&amp;gt;&amp;quot;Digital forensics&amp;quot;. Available: https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me. [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Mobile device management====&lt;br /&gt;
Mobile device management (MDM) is software that allows IT&lt;br /&gt;
administrators to control, secure and enforce policies on smartphones,&lt;br /&gt;
tablets and other endpoints. Mobile device management software emerged&lt;br /&gt;
in the early 2000s as a way to control and secure the personal digital&lt;br /&gt;
assistants and smartphones that business workers began to use. The&lt;br /&gt;
consumer smartphone boom that started with the launch of the Apple&lt;br /&gt;
iPhone in 2007 led to the bring your own device (BYOD) trend, which&lt;br /&gt;
fueled further interest in MDM.&amp;lt;ref name=&amp;quot;techtarget&amp;quot;&amp;gt;Techtarget, &amp;quot;Mobile Device Management&amp;quot;. Available: https://www.techtarget.com/searchmobilecomputing/definition/mobile-device-management [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Data management====&lt;br /&gt;
Sometimes the data management is neglected, but this part has a&lt;br /&gt;
crucial role when learning for good cyber security practices. Majority&lt;br /&gt;
of cyber security programs include a special courses on data management.&lt;br /&gt;
Data management is a method of organizing and maintaining data processes&lt;br /&gt;
that are required in almost every business operations. The benefits of&lt;br /&gt;
data management can be found accounting, statistics, logistics planning&lt;br /&gt;
and other disciplines including corporate computing.&amp;lt;ref name=&amp;quot;GlobalUni&amp;quot;&amp;gt;Global Universities, &amp;quot;MSc Data Management and Cyber Security&amp;quot;. Available: https://globaluniversities.in/msc-data-management-cyber-security. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Data governance (and management) play a fundamental role in&lt;br /&gt;
protecting an organization’s data. Ensuring that the right people have&lt;br /&gt;
the right access and that appropriate security controls are in place to&lt;br /&gt;
protect each system or service, based on the criticality or sensitivity&lt;br /&gt;
of the data sets these contain. &amp;lt;ref name=&amp;quot;CyberMagazine&amp;quot;&amp;gt;Cyber Security Magazine, &amp;quot;The Role of Data Governance in Cybersecurity&amp;quot;. Available: https://cybersecurity-magazine.com/the-role-of-data-governance-in-cybersecurity/?utm_source=rss&amp;amp;amp;utm_medium=rss&amp;amp;amp;utm_campaign=the-role-of-data-governance-in-cybersecurity. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Application security development====&lt;br /&gt;
Application security describes security measures at the application&lt;br /&gt;
level that aim to prevent data or code within the app from being stolen&lt;br /&gt;
or hijacked. It encompasses the security considerations that happen&lt;br /&gt;
during application development and design, but it also involves systems&lt;br /&gt;
and approaches to protect apps after they get deployed. Application&lt;br /&gt;
security may include hardware, software, and procedures that identify or&lt;br /&gt;
minimize security vulnerabilities.&amp;lt;ref name=&amp;quot;vmware&amp;quot;&amp;gt;VmWare, &amp;quot;What is application security?&amp;quot;. Available: https://www.vmware.com/topics/glossary/content/application-security.html [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Application security development is important to ensure that your&lt;br /&gt;
application is free from coding errors and bugs. And controls the risk&lt;br /&gt;
and helps safeguard against security vulnerabilities. Application&lt;br /&gt;
security development is the process of making applications more secure&lt;br /&gt;
by finding and fixing security vulnerabilities. This is often done by&lt;br /&gt;
enforcing software security best practices and using application&lt;br /&gt;
security testing tools. &lt;br /&gt;
&amp;lt;ref name=&amp;quot;perforce&amp;quot;&amp;gt;Perforce, &amp;quot;Application Security Development Best Practices&amp;quot;. Available: https://www.perforce.com/blog/kw/application-security-development-best-practices. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Audit and compliance knowledge====&lt;br /&gt;
A cyber security audit is designed to be a comprehensive review and&lt;br /&gt;
analysis of your business’s IT infrastructure. It identifies threats and&lt;br /&gt;
vulnerabilities, exposing weaknesses and high-risk practices.&lt;br /&gt;
Regulations such as the EU GDPR (General Data Protection Regulation) can&lt;br /&gt;
impose hefty penalties in the event of a breach that results in&lt;br /&gt;
exploited data. A cyber security audit will help mitigate the&lt;br /&gt;
consequences of a breach and demonstrate that your organization has&lt;br /&gt;
taken the necessary steps to protect client and company data. &amp;lt;ref name=&amp;quot;cyforsecure&amp;quot;&amp;gt;Cyfor Secure, &amp;quot;What is a Cyber Security Audit and how can it help your organisation?&amp;quot;. Available: https://cyforsecure.co.uk/services/cyber-assessment/cyber-security-audit/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cybersecurity compliance is the organizational risk management method&lt;br /&gt;
aligned with pre-defined security measures &amp;amp;amp; controls on how data&lt;br /&gt;
confidentiality is ensured by its administrative procedures.&amp;lt;ref name=&amp;quot;nordlayer&amp;quot;&amp;gt;NordLayer, &amp;quot;Cybersecurity compliance: Everything you need to know&amp;quot;. Available: https://nordlayer.com/blog/cybersecurity-compliance-everything-you-need-to-know/. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
All needed skills are developed through courses and certification.&lt;br /&gt;
&lt;br /&gt;
===Entry-Level Incident Response Positions===&lt;br /&gt;
&amp;lt;p&amp;gt;It is not always possible to advance to the position of incident&lt;br /&gt;
responder in a straight line. Many professionals advance from entry- to&lt;br /&gt;
mid-level positions before becoming a real incident responder or a&lt;br /&gt;
member of a computer emergency response team (CERT).&amp;lt;br /&amp;gt;&lt;br /&gt;
These are some examples:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;network-administrator&amp;quot;&amp;gt;Network administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;This position’s experience will help potential incident responders&lt;br /&gt;
develop networking skills. Attention to detail, as well as the ability&lt;br /&gt;
to sift through system configurations, site layouts, and general network&lt;br /&gt;
and communication setups, are essential in this field.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;system-administrator&amp;quot;&amp;gt;System administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Another crucial beginning point for an incident responder is to learn&lt;br /&gt;
how to manage resources inside your organization as well as user&lt;br /&gt;
behavior. Understanding the potential damage that users, inadequate&lt;br /&gt;
security setups, and ineffective IT policies and procedures can cause on&lt;br /&gt;
your network can provide prospective candidates with insight into the&lt;br /&gt;
human component of an incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;security-administrator&amp;quot;&amp;gt;Security administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In such a position, basic hacking skills, penetration testing, and&lt;br /&gt;
intrusion detection are all learned, which are crucial incident&lt;br /&gt;
responder skills when trying to replicate a breach or attack.&lt;br /&gt;
Understanding the paths a cybercriminal will take when attempting to&lt;br /&gt;
damage or obtain access to a system can greatly simplify the work of&lt;br /&gt;
reverse engineering the incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://resources.infosecinstitute.com/topic/incident-responder-career-roadmap-entry-level-executive/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3 id=&amp;quot;mid-level-incident-response-positions&amp;quot;&amp;gt;Mid-Level Incident&lt;br /&gt;
Response Positions&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5&lt;br /&gt;
id=&amp;quot;computer-security-incident-response-team-csirt-engineer&amp;quot;&amp;gt;Computer&lt;br /&gt;
security incident response team (CSIRT) engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;cyber-incident-responder&amp;quot;&amp;gt;Cyber incident responder&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-response-engineer&amp;quot;&amp;gt;Incident response&lt;br /&gt;
engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;While each of these positions is different, they generally require&lt;br /&gt;
very similar skills and characteristics in a candidate. At this level,&lt;br /&gt;
personal characteristics such as problem solving, time management, and&lt;br /&gt;
even presentation skills become more crucial as one’s career evolves&lt;br /&gt;
into a management-facing role.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Technical skills include the ability to identify and minimize threats&lt;br /&gt;
while maintaining communication with management and the rest of your&lt;br /&gt;
team. Data analysis and evidence gathering become increasingly crucial,&lt;br /&gt;
and the circumstances in which your services are deployed get more&lt;br /&gt;
serious.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Problem-solving skills are crucial at this level of incident&lt;br /&gt;
response, and as the stakes rise, so does the pressure in each&lt;br /&gt;
situation. At this level, programming abilities are essential since&lt;br /&gt;
incident responders may be needed to reverse engineer malicious code or&lt;br /&gt;
even create patches for vulnerable network applications or services.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.coursera.org/articles/popular-cybersecurity-certifications&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3 id=&amp;quot;senior-level-incident-response-positions&amp;quot;&amp;gt;Senior-Level Incident&lt;br /&gt;
Response Positions&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;intrusion-detection-specialist&amp;quot;&amp;gt;Intrusion detection&lt;br /&gt;
specialist:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;A CISSP certification might help a potential candidate in preparing&lt;br /&gt;
for the profession. The role of an intrusion detection specialist is to&lt;br /&gt;
find and stop any unwanted communications.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-manager&amp;quot;&amp;gt;Incident manager:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Expected to plan, oversee, manage, and supervise all incident&lt;br /&gt;
response team actions. Is in charge of reporting all current events to&lt;br /&gt;
senior management and stakeholders, as well as acting as the technical&lt;br /&gt;
lead on active incidents for incident responders. Prepares threat and&lt;br /&gt;
impact assessments and reports them known to management.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.coursera.org/articles/popular-cybersecurity-certifications&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Certificates== &lt;br /&gt;
There is a vast number of different certificates and the road map to&lt;br /&gt;
being a certified professional could be very different&amp;lt;ref name=&amp;quot;Coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated],&amp;quot; [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;NICCS&amp;quot;&amp;gt;NICCS, &amp;quot;Cybersecurity Certifications,&amp;quot; [Online]. Available: hhttps://niccs.cisa.gov/about-niccs/cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt; . One possible&lt;br /&gt;
approach is to start with basic certificates from the different branches&lt;br /&gt;
of service and move to more specific and demanding focused&lt;br /&gt;
certification. Also, some jobs require certain clearances, either from&lt;br /&gt;
industry, or from the government. One small selection of different&lt;br /&gt;
possible certificates is brought out in following paragraphs.&lt;br /&gt;
&lt;br /&gt;
Security+ is a CompTIA certification that is considered a basic cert&lt;br /&gt;
among cybersecurity professionals. It covers the topics of risk&lt;br /&gt;
management and threat assessment.&lt;br /&gt;
Network+ is also offered by CompTIA this certification (like the name&lt;br /&gt;
implies) focuses on networking infrastructure and operations. It is&lt;br /&gt;
considered a foundational certification.&lt;br /&gt;
The Certified Information Systems Security Professional (CISSP) is a&lt;br /&gt;
more advanced certification designed for cybersecurity professionals&lt;br /&gt;
with at least five years of work experience. The certification covers&lt;br /&gt;
topics such as architecture, engineering, and management.&amp;lt;/p&amp;gt;&lt;br /&gt;
The Certified Ethical Hacker (CEH) certification is also considered a&lt;br /&gt;
more advanced cert because it generally requires that applicants have&lt;br /&gt;
multiple years of work experience. The goal of an ethical hacker&lt;br /&gt;
certification is to be able to understand how cyber attacks unfold in&lt;br /&gt;
order to improve threat assessment and mitigation skills.&amp;lt;ref name=&amp;quot;cyberguide&amp;quot;&amp;gt;Cybersecurity Guide, &amp;quot;How to become a cybersecurity specialist&amp;quot;, [Online]. Available: https://cybersecurityguide.org/careers/security-specialist/. [Accessed 27 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
This is definitely not all, when one looks for more information, following link could be searched, to get more in depth knowledge about&lt;br /&gt;
different possibilities. Hereby, with the help of this matrix a possible taxonomy of different 436 listed certificates in branches are&lt;br /&gt;
presented.&amp;lt;ref name=&amp;quot;Pauljeremy&amp;quot;&amp;gt;&amp;quot;Cybersecurity Roadmap,&amp;quot; [Online]. Available: https://pauljerimy.com/2020/10/12/scr-oct-2020-update/. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:analystimage5.png|1000px|thumb|Certificate matrix &amp;lt;ref&amp;gt;&amp;quot;Certification roadmap&amp;quot;. Available at https://pauljerimy.com/security-certification-roadmap&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
=== Communication and Network Security===&lt;br /&gt;
Communication and network security covers the ability to secure&lt;br /&gt;
communication channels and networks. Topics include secure and converges&lt;br /&gt;
protocols, wireless networks, cellular networks, hardware operations&lt;br /&gt;
(warranty and redundant power), and third-party connectivity. IP&lt;br /&gt;
networking are also included in this domain.&lt;br /&gt;
===Identity and Access Management===&lt;br /&gt;
The identity and access management domain covers the attacks that&lt;br /&gt;
target the human gateway to gain access to data. Other topics include&lt;br /&gt;
ways to identify users with rights to access the information and&lt;br /&gt;
servers. Identity and access management covers the topics of&lt;br /&gt;
applications, Single sign-on authentication, privilege escalation,&lt;br /&gt;
Kerberos, rule-based or risk-based access control, proofing and&lt;br /&gt;
establishment of identity.&lt;br /&gt;
===Security Architecture and Engineering===&lt;br /&gt;
The security architecture and engineering domain covers important&lt;br /&gt;
topics concerning security engineering plans, designs and principles,&lt;br /&gt;
Topics include assessing and mitigating information system&lt;br /&gt;
vulnerabilities, fundamental concepts of security models and security&lt;br /&gt;
architectures in critical areas like access control. Cloud systems,&lt;br /&gt;
cryptography, system infiltrations (ransomware, fault-injection and&lt;br /&gt;
more) and virtualized systems are also covered in this domain.&lt;br /&gt;
===Asset Security===&lt;br /&gt;
The Asset Security domain deals with the issues related to the&lt;br /&gt;
collection, storage, maintenance, retention and destruction of data. It&lt;br /&gt;
also covers knowledge of different roles regarding data handling (owner,&lt;br /&gt;
controller and custodian) as well as data protection methods and data&lt;br /&gt;
states. Other topics include resource provision, asset classification&lt;br /&gt;
and data lifecycle management.&lt;br /&gt;
===Security and Risk Management===&lt;br /&gt;
The security and risk management domain covers general on skills&lt;br /&gt;
related to the implementation of user awareness programs as well as&lt;br /&gt;
security procedures. Emphasis is also placed on risk management&lt;br /&gt;
concerning the acquisition of new services, hardware and software&lt;br /&gt;
(supply chain). Other skills include social engineering defense&lt;br /&gt;
mechanisms.&lt;br /&gt;
===Security Assessment and Testing===&lt;br /&gt;
The security assessment and testing domain deals with all the&lt;br /&gt;
techniques and tools used to find system vulnerabilities, weaknesses and&lt;br /&gt;
potential areas of concern not addressed by security procedures and&lt;br /&gt;
policies. Attack simulations, vulnerability assessment, compliance&lt;br /&gt;
checks, and ethical disclosure also fall under this domain.&lt;br /&gt;
===Software Security===&lt;br /&gt;
The software development security domain deals with implementing&lt;br /&gt;
software-based security protocols within environment for which the IT&lt;br /&gt;
professional is responsible. Risk analysis, vulnerability identification&lt;br /&gt;
and auditing of source codes are all covered in this subset. Additional&lt;br /&gt;
topics include software-designed security, maturity models, development&lt;br /&gt;
methodologies, open-source and third-party development security.&lt;br /&gt;
===Security operations===&lt;br /&gt;
The security operations domain covers topics ranging from&lt;br /&gt;
investigations and digital forensic to detection and intrusion&lt;br /&gt;
prevention tools, sandboxing and firewalls. Topics include user and&lt;br /&gt;
entity behavior analytics, threat intelligence (threat hunting and&lt;br /&gt;
threat feeds) log management, artifacts (mobile, computer and network),&lt;br /&gt;
machine learning and AI-based tools, penetration testing, and&lt;br /&gt;
exploitation development. These for sub-domains are lister here.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Incident Handling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Penetration Testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Exploitation&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Education==&lt;br /&gt;
&amp;lt;p&amp;gt;The entry level monitoring specialist is hired by Estonian&lt;br /&gt;
Information System Authority even if there is no formal IT education,&lt;br /&gt;
but readiness to learn and moderate knowledge of different operation&lt;br /&gt;
systems is enough to start the career.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.cv.ee/en/vacancy/792782/riigi-infosusteemi-amet/seirespetsialist-tule-eesti-kuberruumi-valvuriks&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Nevertheless, like most other high qualification careers jobs falling&lt;br /&gt;
under the cybersecurity specialist category require some form of formal&lt;br /&gt;
education. However, since cybersecurity specialist jobs can fall across&lt;br /&gt;
a wide spectrum of job descriptions and responsibilities, it is possible&lt;br /&gt;
to obtain a specialist job after completing many levels of different&lt;br /&gt;
computer related education.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;If one is looking for a cybersecurity related education, for example&lt;br /&gt;
in EU, 137 courses/programs could be found that relate to keyword IT or&lt;br /&gt;
cybersecurity.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.enisa.europa.eu/topics/cybersecurity-education/education-map/education-courses&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Also, there is a great amount of discussion, if cuber security&lt;br /&gt;
professional should have a degree or would be certification just enough.&lt;br /&gt;
One interesting table is produces by Franklin University that compares&lt;br /&gt;
benefits and/or drawbacks of each type of credential.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image11.png&amp;quot; alt=&amp;quot;Comparison MSc vs certificate&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;Comparison MSc vs&lt;br /&gt;
certificate&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Certifications are generally good for people with little practical&lt;br /&gt;
experience because they are known quantities in the industry and can&lt;br /&gt;
help you get your foot in the door. They set a minimum knowledge bar.&lt;br /&gt;
But some certifications are viewed more favorably than others.&lt;br /&gt;
Certifications with renewal requirements are viewed better by hiring&lt;br /&gt;
managers, but they also more costly in the long run because of the need&lt;br /&gt;
for continuing education. Certifications are also good for showing&lt;br /&gt;
in-depth expertise in a specialization within cybersecurity. Depending&lt;br /&gt;
on your career goals, it may be advantageous to have a master’s&lt;br /&gt;
degree—which shows your breadth of knowledge, critical thinking and&lt;br /&gt;
leadership skills—and a certificate—which shows specific skill&lt;br /&gt;
competency.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;As IT (Cyber) Security is still a relatively young discipline,&lt;br /&gt;
universities and colleges are still figuring out which is the best&lt;br /&gt;
approach for their degrees. Study programmes and curricula in Cyber&lt;br /&gt;
Security are different. In general, here are the duration of Cyber&lt;br /&gt;
Security degrees:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Bachelor’s degrees in Cyber Security take 3 or 4 years in most&lt;br /&gt;
countries.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Master’s courses in Cyber Security take between 1-2 years to&lt;br /&gt;
complete.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;PhD programmes in Cyber Security last 3-5 years. Some only take 1&lt;br /&gt;
or 2 years, but they are less common.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Generalization could me made that on bachelor level the general&lt;br /&gt;
knowledge about the cyber issues are obtained. On master level the&lt;br /&gt;
specialization courses are taken and the person can choose more specific&lt;br /&gt;
topics to study. It is on master level where strengths of the cyber&lt;br /&gt;
specialist can be developed further and up-do date knowledge obtained in&lt;br /&gt;
specifics. PhD is serious science and involves teaching, lot of&lt;br /&gt;
scientific work and writing for publications.&amp;lt;/p&amp;gt;&lt;br /&gt;
==Salary==&lt;br /&gt;
&amp;lt;p&amp;gt;Even if the salary can be very different, compared to the skills and&lt;br /&gt;
experience, an generalization can be made. Cyber Security professionals&lt;br /&gt;
in CSIRT, and in other entities earn quite well, from the start. First,&lt;br /&gt;
some comparison from the United States. The average CSIRT analyst salary&lt;br /&gt;
in the USA is $97,500 per year or $50 per hour. Entry level positions&lt;br /&gt;
start at $48,875 per year while most experienced workers make up to&lt;br /&gt;
$135,373 per year.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.talent.com/salary?job=csirt+analyst&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;There are multiple positions you can occupy in this field. They have&lt;br /&gt;
in common great salaries and high demand for technical skills, attention&lt;br /&gt;
to details, problem-solving mentality, and the ability to analyze risks.&lt;br /&gt;
Here are the average annual salaries in the United States, according to&lt;br /&gt;
Payscale:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.payscale.com/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Cryptographer – 100,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Information Security Officer – 91,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Assessor – 90,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Engineer – 88,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Penetration Tester – 81,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Forensics Expert – 71,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Administrator – 65,000 USD&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When looking into salaries in Estonia, one can find that there is a&lt;br /&gt;
discussion that private sector is taking a toll from the public sector,&lt;br /&gt;
and that the salaries in important agencies, as Information System&lt;br /&gt;
Authority loose their employees to the better paid positions in private&lt;br /&gt;
sector.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://digi.geenius.ee/rubriik/uudis/kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad/&lt;br /&gt;
https://tehnika.postimees.ee/6887428/riigi-it-tootajate-palgamaarad-kasvasid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;But there is also a different view that average private sector worker&lt;br /&gt;
could be hired as a top specialist in public sector and then the payment&lt;br /&gt;
is higher. Nevertheless, it seems that the average payment in cyber&lt;br /&gt;
security sector is any way higher that in other parts of the&lt;br /&gt;
e-services.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://digi.geenius.ee/rubriik/uudis/5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka/&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
==SOC==&lt;br /&gt;
&amp;lt;p&amp;gt;A SOC is a facility where an organization’s network, applications,&lt;br /&gt;
and endpoints are monitored and defended. The term was adapted from&lt;br /&gt;
network operations centers (NOCs), where large telecommunication or&lt;br /&gt;
corporate networks are monitored. When network security became more of a&lt;br /&gt;
concern, security teams were formed within the NOCs, and eventually spun&lt;br /&gt;
off into larger organizations of their own as the responsibilities of&lt;br /&gt;
security teams grew increasingly complex and specialized. The security&lt;br /&gt;
staff working in a security operations center are often called the SOC&lt;br /&gt;
team.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Functions of the SOC team include, but are not limited to:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ol type=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Taking inventory of resources, to get a better understanding of the&lt;br /&gt;
structure they are protecting.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintanence of the system, by constantly making updates and adding&lt;br /&gt;
safeguards.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Monitoring the network for abnormalities with special tools.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Threat analysis of new attacks and vulnerabilities.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Responding to attacks, by acting as “first responders”. The SOC team&lt;br /&gt;
will shut down and/or isolate endpoints, deleting files and lowering the&lt;br /&gt;
impact as fast as possible.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Recovery of system stability and lost data. This may be done using&lt;br /&gt;
backups, restarting endpoints or reconfiguring systems.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Logging all actions on the system, to be later used for analysis or&lt;br /&gt;
forensics after an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigating the root cause of an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Auditing their own actions, to be in line with regulations of the&lt;br /&gt;
organization, industry or governing body.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.trellix.com/en-us/security-awareness/operations/what-is-soc.html&amp;lt;/p&amp;gt;&lt;br /&gt;
==CSIRT==&lt;br /&gt;
&amp;lt;p&amp;gt;A CSIRT is a group that responds to security incidents when they&lt;br /&gt;
occur. Key responsibilities of a CSIRT include: &lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
===Creating and maintaining an incident response plan (IRP)===&lt;br /&gt;
An incident response plan (IRP) is a set of written instructions for&lt;br /&gt;
detecting, responding to and limiting the effects of an information&lt;br /&gt;
security event. Incident response plans provide instructions for&lt;br /&gt;
responding to many potential scenarios, including data breaches, denial&lt;br /&gt;
of service/distributed denial of service attacks, firewall breaches,&lt;br /&gt;
virus or malware outbreaks or insider threats. Without an incident&lt;br /&gt;
response plan in place, organizations may either not detect the attack&lt;br /&gt;
in the first place, or not follow proper protocol to contain the threat&lt;br /&gt;
and recover from it when a breach is detected.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.stratacore.com/incidentresponseplan&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
===Investigating and analyzing incidents===&lt;br /&gt;
CSIRTs are also involved in improvement activities. After major&lt;br /&gt;
computer security incidents occur, or when incidents are not handled in&lt;br /&gt;
a timely or effective manner, a CSIRT will generally perform a&lt;br /&gt;
postmortem of the incident and its response. This postmortem will&lt;br /&gt;
identify the strengths and weakness of the response effort. Such reviews&lt;br /&gt;
can identify weaknesses and holes in systems, infrastructure defenses,&lt;br /&gt;
or policies that allowed the incident to take place. It can also&lt;br /&gt;
identify problems with communication channels, interfaces, and&lt;br /&gt;
procedures that inhibited the efficient resolution of the reported&lt;br /&gt;
problem.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.cisa.gov/uscert/bsi/articles/best-practices/incident-management/defining-computer-security-incident-response-teams&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Managing internal communications and updates during or immediately after incidents occur===&lt;br /&gt;
===Communicating with employees, shareholders, customers, and the press about incidents as needed===&lt;br /&gt;
&amp;lt;p&amp;gt;There are various services within the CSIRT Services Framework that&lt;br /&gt;
address communications, as they relate to security operations and&lt;br /&gt;
incident response services. Some of these include Information Security&lt;br /&gt;
Incident Coordination, Crisis Management Support, Vulnerability&lt;br /&gt;
Disclosure, Situational Awareness Communication, and Awareness Building,&lt;br /&gt;
to name a few. Sharing information and communicating with the general&lt;br /&gt;
public and/or your constituency is appropriate in many different&lt;br /&gt;
scenarios. These can range from proactive communications to reactive&lt;br /&gt;
communications. Each scenario may be unique, and careful consideration&lt;br /&gt;
should be given to when to release information to the public and what&lt;br /&gt;
information should be released.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;https://resources.sei.cmu.edu/asset_files/Handbook/2021_002_001_651819.pdf&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Remediating incidents===&lt;br /&gt;
Threat remediation is a strong and capable tool for fighting the&lt;br /&gt;
cyber security compromises. As the word ‘remedy’ suggests, remediation&lt;br /&gt;
process involves the treatment of a security breach. With the&lt;br /&gt;
remediation practices, your cyber security team is able to eliminate&lt;br /&gt;
suspicious activities and malicious attacks in the form of malware,&lt;br /&gt;
ransomware, phishing and such. Even if you ‘kill’ the suspicious&lt;br /&gt;
activity, the attackers can remain in your systems. If you want to&lt;br /&gt;
contaminate and end the problem for good, your remediation processes&lt;br /&gt;
must involve the detection of the cause. &amp;lt;ref name=&amp;quot;logsign&amp;quot;&amp;gt;Logsign, &amp;quot;What-is-remediation-in-cyber-security&amp;quot;. Available: https://www.logsign.com/blog/what-is-remediation-in-cyber-security/. [Accessed 28 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Recommending technology, policy, governance, and training changes after security incidents===&lt;br /&gt;
After all these actions, the SCIRT must contribute to the development&lt;br /&gt;
of better policies, practices and has to recommend improvements. They&lt;br /&gt;
are not working in the vacuum and their work has to create new and&lt;br /&gt;
better standards for cyber security. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;Exabeam, &amp;quot;CSIRT&amp;quot;. Available: https://www.exabeam.com/incident-response/csirt/ [Accessed 28 APr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==CERT==&lt;br /&gt;
&amp;lt;p&amp;gt;The term “computer emergency response team” was coined in 1988. In&lt;br /&gt;
response to the Morris worm attack that impacted thousands of servers on&lt;br /&gt;
the Internet, DARPA funded the formation of the Computer Emergency&lt;br /&gt;
Response Team Coordination Center (CERT-CC) at Carnegie Mellon&lt;br /&gt;
University. The goal of CERT-CC was to help protect the internet by&lt;br /&gt;
collecting and disseminating information on critical security&lt;br /&gt;
vulnerabilities. Several other countries formed similar centers using&lt;br /&gt;
the same acronym (despite threats of legal action by Carnegie Mellon for&lt;br /&gt;
trademark infringement). Now the term CERT refers to any emergency&lt;br /&gt;
response team that deals with cyber threats. Many people use CERT-CC&lt;br /&gt;
interchangeably with CSIRT, though the charter of a CERT is information&lt;br /&gt;
sharing in order to help other response teams respond to threats against&lt;br /&gt;
their own infrastructure.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In general, the designation of CERT is helpful in applying real-world&lt;br /&gt;
solutions to various cybersecurity problems. They may be government&lt;br /&gt;
contractors or employees of a major corporation. For example, the U.S.&lt;br /&gt;
Computer Emergency Readiness Team (US-CERT) operates under the U.S.&lt;br /&gt;
Department of Homeland Security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.techopedia.com/definition/31003/computer-emergency-response-team-cert&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In Estonia CERT is designated as CERT-EE. It was established in 2006,&lt;br /&gt;
as an organization responsible for the management of security incidents&lt;br /&gt;
in .ee computer networks. It is also a national contact point for&lt;br /&gt;
international co-operation in the field of IT security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ria.ee/en/cyber-security/cert-ee.html&amp;lt;/p&amp;gt;&lt;br /&gt;
===Difference between SOC/CSIRT/CERT===&lt;br /&gt;
&amp;lt;p&amp;gt;How CSIRTs differ from CERTs and SOCs There are overlapping&lt;br /&gt;
responsibilities between a community emergency response team (CERT),&lt;br /&gt;
computer security incident response team (CSIRT), and security&lt;br /&gt;
operations center (SOC). To add to this confusion, frequently, the terms&lt;br /&gt;
CERT and CSIRT are used interchangeably, despite the important&lt;br /&gt;
differences.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image3.png&amp;quot; alt=&amp;quot;Overlapping in images/image3.png&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;Overlapping in&lt;br /&gt;
images/image3.png&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
==Understand the primary roles and characteristics of a CERT, CSIRT, and SOC.==&lt;br /&gt;
&amp;lt;p&amp;gt;So, using strict definitions, a CERT collects and disseminates&lt;br /&gt;
security information, typically for the benefit of a country or an&lt;br /&gt;
industry. A CSIRT is a cross-functional team that responds to incidents&lt;br /&gt;
on behalf of a country or an organization. A SOC is where a country or&lt;br /&gt;
organization monitors and defends its network, servers, applications,&lt;br /&gt;
and endpoints.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image4.png&amp;quot; alt=&amp;quot;table of explanation images/image4&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;table of explanation&lt;br /&gt;
images/image4&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
==Future==&lt;br /&gt;
&amp;lt;p&amp;gt;And the Cyber security problem is only getting bigger. According to a&lt;br /&gt;
report published by Accenture, the number of cyber security breaches&lt;br /&gt;
increased by 11 percent from 2017 to 2018. The cost of such breaches is&lt;br /&gt;
astronomical–about $600 billion worldwide, according to the Economic&lt;br /&gt;
Impact of Cybercrime report.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Job projections for cybersecurity are staggering. The Bureau of Labor&lt;br /&gt;
Statistics in US predicts that careers in the cybersecurity field will&lt;br /&gt;
grow by 32% by 2028. That makes cybersecurity one of the top 10&lt;br /&gt;
fastest-growing jobs in the country. In the United States alone, jobs&lt;br /&gt;
for Information Security Analysts are expected to grow by 15% by&lt;br /&gt;
2024.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Most likely this trend is also similar in other countries.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When checking Estonian job portals, there is a constant need for&lt;br /&gt;
people for cyber security related positions. Also, linkedin search gives&lt;br /&gt;
approximately 30 vacancies immediately. There are banks, logistics&lt;br /&gt;
companies, e-shops, and software producers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://ee.linkedin.com/jobs/cyber-security-jobs?countryRedirected=1&amp;amp;amp;position=1&amp;amp;amp;pageNum=0&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Trends that affect companies create need for constant cyber security&lt;br /&gt;
services. Increasing number of home/remote offices require secure&lt;br /&gt;
corporate networks and security of remote devices. One example is from&lt;br /&gt;
this year, when sloppy remote desktop set-up paralyzed systems of 17&lt;br /&gt;
companies.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.aripaev.ee/uudised/2022/04/20/ria-lohakas-kaugtoolaua-seadistus-halvas-martsis-vahemalt-17-juhul-ettevotete-it-susteemid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Also, no service can exists without robust infrastructure - servers,&lt;br /&gt;
databases, applications. As all previously mentioned devices and&lt;br /&gt;
services are at constant scanning and surveillance. So, the breach&lt;br /&gt;
detection and immediate action demands 24/7 services. Even if lot of&lt;br /&gt;
things could be automated, there is a need for human specialists (at&lt;br /&gt;
least, at the moment). Third growing field is also a forensic&lt;br /&gt;
investigation, as every attack must be investigated in order to be ready&lt;br /&gt;
to repel next attacks. So data recovery and evidence collection is&lt;br /&gt;
another important field of work that need skilled and professional&lt;br /&gt;
workers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Even, if the specifics of the entity, be it CSIRT, CERT or SOC, are&lt;br /&gt;
different, the fundamentals of the work are the same. Professional&lt;br /&gt;
knowledge of the networks, operational systems, hardware, scripting, and&lt;br /&gt;
several other wider IT related knowledge is needed. As there is no&lt;br /&gt;
single way to reach to it, every single person can find one’s strongest&lt;br /&gt;
sides and develop them with knowledge of weaker side, in order to know,&lt;br /&gt;
when to as for help.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/body&amp;gt;&lt;br /&gt;
&amp;lt;/html&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mavald</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142188</id>
		<title>Hiring a Cyber Security Incident Analyst</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142188"/>
		<updated>2022-05-01T14:57:04Z</updated>

		<summary type="html">&lt;p&gt;Mavald: /* Application security development */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==A Cyber Security Incident Analyst==&lt;br /&gt;
&lt;br /&gt;
[[File:image1.png|600px|thumb|Job advertisement &amp;lt;ref&amp;gt;&amp;quot;Job Advertisement&amp;quot;. Available at https://www.projectpeople.com/jobs/&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
===Cyber security incident analyst in SOC/CSIRT/CERT===&lt;br /&gt;
This article delves into the job title of Cyber Security Incident&lt;br /&gt;
Analyst and provides an overview of the acronyms SOC/CSIRT/CERT. A brief&lt;br /&gt;
history of the job is discussed here, as well as a possible career path,&lt;br /&gt;
education, experience, and other characteristics required for work in&lt;br /&gt;
computer security-related organizations. The article also provides a&lt;br /&gt;
brief history of SOC/CSIRT/CERT, as well as a comparison of their&lt;br /&gt;
differences and similarities.&lt;br /&gt;
===Cyber Security Incident Analyst Skill Set===&lt;br /&gt;
What skill set is expected from the Cyber Security Incident Analyst? Below written lines are taken from the same job advertisement depicted&lt;br /&gt;
on the left side of this article:&lt;br /&gt;
As a Security Incident Analyst your responsibilities will include:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Continuous monitoring of security tooling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Performing regular and ad-hoc vulnerability assessments&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Carrying out ‘spot checks’&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Reporting vulnerabilities to the PVG via the alerts system&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintaining and documenting logging systems&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Developing centralized logging, reporting and intelligence&lt;br /&gt;
platforms&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;‘Light touch’ penetration testing with open source tooling&lt;br /&gt;
(Metasploit)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Knowledge &amp;amp;amp; Experience required:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;SOC, CSIRT or CERT operational environment experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Windows / Linux experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TCP /IP networking protocol knowledge&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience reviewing and analyzing Security Events from various&lt;br /&gt;
monitoring and logging sources&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience in website and web application security assessment or&lt;br /&gt;
penetration testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience of using Metasploit&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Scripting knowledge using BASH, Python, Perl, Ruby&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Skills in Host and Network Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
As one can see the description of the duties is wide and also the&lt;br /&gt;
knowledge and experience that is required is noteworthy. So, where to&lt;br /&gt;
start to find out the way to get this kind of knowledge and&lt;br /&gt;
expertize.&lt;br /&gt;
===Possible career path===&lt;br /&gt;
Next part of the paper is aiming to depict a possible ways, how to&lt;br /&gt;
develop oneself, and move along the career pathway in cybersecurity&lt;br /&gt;
field. Topics of development, education, experience and certification&lt;br /&gt;
are covered.&lt;br /&gt;
[[File:analystimage2.png|1000px|thumb|Career path &amp;lt;ref&amp;gt;&amp;quot;Possible Career Path&amp;quot;. Available at https://www.cyberseek.org/pathway.html&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
===Junior/Senior===&lt;br /&gt;
Start with an entry-level job in IT. Hands-on experience is often the&lt;br /&gt;
most effective way to prepare for certification exams. Start&lt;br /&gt;
accumulating work experience with an entry-level role as a cybersecurity&lt;br /&gt;
analyst. Many cybersecurity professionals start off in more general IT&lt;br /&gt;
roles. The skills, practices, and technologies you’ll use as a&lt;br /&gt;
cybersecurity professional will continue to evolve along with computer&lt;br /&gt;
and network technology. The desire to learn, ability to problem solve,&lt;br /&gt;
and attention to detail will serve you well in this field. Other, more&lt;br /&gt;
technical skills and technologies to learn include:&amp;lt;ref name=&amp;quot;certification&amp;quot;&amp;gt;Popular Cyber Security Certificates [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications  [Accessed 25 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====SIEM tools (security information and event management)====&lt;br /&gt;
Security Information and Event Management (SIEM) is a set of tools&lt;br /&gt;
and services offering a holistic view of an organization’s information&lt;br /&gt;
security. SIEM works by combining two technologies:&lt;br /&gt;
&amp;lt;li&amp;gt;Security information management (SIM), which collects data from log&lt;br /&gt;
files for analysis and reports on security threats and events, and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;security event management (SEM), which conducts real-time system&lt;br /&gt;
monitoring, notifies network admins about important issues and&lt;br /&gt;
establishes correlations between security events. There are a number of&lt;br /&gt;
security information and event management solutions on the market.&lt;br /&gt;
ArcSight ESM, IBM QRadar and Splunk are among the most popular. &amp;lt;ref name=&amp;quot;SIEM&amp;quot;&amp;gt;Application security, SIEM [Online]. Available: https://www.imperva.com/learn/application-security/siem/. [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Firewalls, Intrusion Detection Systems (IDS), and Intrusion Prevention Systems(IPS)====&lt;br /&gt;
Firewalls can be two types, hardware and software firewalls. Software&lt;br /&gt;
firewall is a firewall that is installed on a computer or server, and&lt;br /&gt;
tasked with network security. It works with a wide variety of other&lt;br /&gt;
technology security solutions to provide more robust and cohesive&lt;br /&gt;
security for enterprises of all sizes. When a software firewall is&lt;br /&gt;
installed on a server, it opens up like an umbrella of protection over&lt;br /&gt;
all other computers connected to the network. It is able to monitor both&lt;br /&gt;
incoming and outgoing traffic for potential risk or suspicious user&lt;br /&gt;
behavior, and also makes setting security policies much easier, faster&lt;br /&gt;
and more flexible. Hardware firewall is positioned between the network&lt;br /&gt;
and devices, allowing traffic to funnel through the firewall for a close&lt;br /&gt;
inspection and analysis. A hardware firewall, a term often&lt;br /&gt;
interchangeable with network or next-generation firewall, protects the&lt;br /&gt;
network gateways for an enterprise. Hardware firewall is physical&lt;br /&gt;
hardware, installed between network elements and connected devices, and&lt;br /&gt;
is tasked with filtering traffic for cyber threat to the network or&lt;br /&gt;
devices. Filtering out unauthorized or suspicious users based on traffic&lt;br /&gt;
analysis is one of the biggest benefits of hardware firewall. &amp;lt;ref name=&amp;quot;sangfor&amp;quot;&amp;gt;Sangfor, &amp;quot;What is Software Firewall? Difference between Hardware Firewall and Software Firewall, [Online]. Available: https://www.sangfor.com/blog/cybersecurity/what-is-software-firewall-difference-between-hardware-firewall-and-software-firewall [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems&lt;br /&gt;
(IPS) are both parts of the network infrastructure. IDS/IPS compare&lt;br /&gt;
network packets to a cyberthreat database containing known signatures of&lt;br /&gt;
cyberattacks — and flag any matching packets. IDS doesn’t alter the&lt;br /&gt;
network packets in any way, whereas IPS prevents the packet from&lt;br /&gt;
delivery based on the contents of the packet, much like how a firewall&lt;br /&gt;
prevents traffic by IP address. &amp;lt;ref name=&amp;quot;Varonis&amp;quot;&amp;gt;Varonis, &amp;quot;What is Software Firewall? IDS vs. IPS: What is the Difference?, [Online]. Available: https://www.varonis.com/blog/ids-vs-ips [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Digital forensics====&lt;br /&gt;
Digital forensics is a branch of forensic science that focuses on&lt;br /&gt;
identifying, acquiring, processing, analyzing, and reporting on data&lt;br /&gt;
stored electronically. Electronic evidence is a component of almost all&lt;br /&gt;
criminal activities and digital forensics support is crucial for law&lt;br /&gt;
enforcement investigations. Electronic evidence can be collected from a&lt;br /&gt;
wide array of sources, such as computers, smartphones, remote storage,&lt;br /&gt;
unmanned aerial systems, shipborne equipment, and more.&amp;lt;ref name=&amp;quot;interpol&amp;quot;&amp;gt;Interpol, &amp;quot;Digital forensics&amp;quot;. Available: https://www.interpol.int/How-we-work/Innovation/Digital-forensics. [Accessed 28 4 2022].&amp;lt;/ref&amp;gt; &lt;br /&gt;
Investigative process of digital forensics can be divided into several stages. There are four major stages: preservation, collection,&lt;br /&gt;
examination, and analysis. All these four stages need a deep understanding of computers, technology across a broad spectrum, and cybersecurity principles and&lt;br /&gt;
practices, a working knowledge of computers, networks, and coding, in-depth investigative abilities, critical-thinking skills and analytical talent the ability to effectively communicate and work with a&lt;br /&gt;
wide range of people. &amp;lt;ref name=&amp;quot;ecpi&amp;quot;&amp;gt;&amp;quot;Digital forensics&amp;quot;. Available: https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me. [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Mobile device management====&lt;br /&gt;
Mobile device management (MDM) is software that allows IT&lt;br /&gt;
administrators to control, secure and enforce policies on smartphones,&lt;br /&gt;
tablets and other endpoints. Mobile device management software emerged&lt;br /&gt;
in the early 2000s as a way to control and secure the personal digital&lt;br /&gt;
assistants and smartphones that business workers began to use. The&lt;br /&gt;
consumer smartphone boom that started with the launch of the Apple&lt;br /&gt;
iPhone in 2007 led to the bring your own device (BYOD) trend, which&lt;br /&gt;
fueled further interest in MDM.&amp;lt;ref name=&amp;quot;techtarget&amp;quot;&amp;gt;Techtarget, &amp;quot;Mobile Device Management&amp;quot;. Available: https://www.techtarget.com/searchmobilecomputing/definition/mobile-device-management [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Data management====&lt;br /&gt;
Sometimes the data management is neglected, but this part has a&lt;br /&gt;
crucial role when learning for good cyber security practices. Majority&lt;br /&gt;
of cyber security programs include a special courses on data management.&lt;br /&gt;
Data management is a method of organizing and maintaining data processes&lt;br /&gt;
that are required in almost every business operations. The benefits of&lt;br /&gt;
data management can be found accounting, statistics, logistics planning&lt;br /&gt;
and other disciplines including corporate computing.&amp;lt;ref name=&amp;quot;GlobalUni&amp;quot;&amp;gt;Global Universities, &amp;quot;MSc Data Management and Cyber Security&amp;quot;. Available: https://globaluniversities.in/msc-data-management-cyber-security. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Data governance (and management) play a fundamental role in&lt;br /&gt;
protecting an organization’s data. Ensuring that the right people have&lt;br /&gt;
the right access and that appropriate security controls are in place to&lt;br /&gt;
protect each system or service, based on the criticality or sensitivity&lt;br /&gt;
of the data sets these contain. &amp;lt;ref name=&amp;quot;CyberMagazine&amp;quot;&amp;gt;Cyber Security Magazine, &amp;quot;The Role of Data Governance in Cybersecurity&amp;quot;. Available: https://cybersecurity-magazine.com/the-role-of-data-governance-in-cybersecurity/?utm_source=rss&amp;amp;amp;utm_medium=rss&amp;amp;amp;utm_campaign=the-role-of-data-governance-in-cybersecurity. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Application security development====&lt;br /&gt;
Application security describes security measures at the application&lt;br /&gt;
level that aim to prevent data or code within the app from being stolen&lt;br /&gt;
or hijacked. It encompasses the security considerations that happen&lt;br /&gt;
during application development and design, but it also involves systems&lt;br /&gt;
and approaches to protect apps after they get deployed. Application&lt;br /&gt;
security may include hardware, software, and procedures that identify or&lt;br /&gt;
minimize security vulnerabilities.&amp;lt;ref name=&amp;quot;vmware&amp;quot;&amp;gt;VmWare, &amp;quot;What is application security?&amp;quot;. Available: https://www.vmware.com/topics/glossary/content/application-security.html [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Application security development is important to ensure that your&lt;br /&gt;
application is free from coding errors and bugs. And controls the risk&lt;br /&gt;
and helps safeguard against security vulnerabilities. Application&lt;br /&gt;
security development is the process of making applications more secure&lt;br /&gt;
by finding and fixing security vulnerabilities. This is often done by&lt;br /&gt;
enforcing software security best practices and using application&lt;br /&gt;
security testing tools. &lt;br /&gt;
&amp;lt;ref name=&amp;quot;perforce&amp;quot;&amp;gt;Perforce, &amp;quot;Application Security Development Best Practices&amp;quot;. Available: https://www.perforce.com/blog/kw/application-security-development-best-practices. [Accessed 28 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Audit and compliance knowledge====&lt;br /&gt;
A cyber security audit is designed to be a comprehensive review and&lt;br /&gt;
analysis of your business’s IT infrastructure. It identifies threats and&lt;br /&gt;
vulnerabilities, exposing weaknesses and high-risk practices.&lt;br /&gt;
Regulations such as the EU GDPR (General Data Protection Regulation) can&lt;br /&gt;
impose hefty penalties in the event of a breach that results in&lt;br /&gt;
exploited data. A cyber security audit will help mitigate the&lt;br /&gt;
consequences of a breach and demonstrate that your organization has&lt;br /&gt;
taken the necessary steps to protect client and company data.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://cyforsecure.co.uk/services/cyber-assessment/cyber-security-audit/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Cybersecurity compliance is the organizational risk management method&lt;br /&gt;
aligned with pre-defined security measures &amp;amp;amp; controls on how data&lt;br /&gt;
confidentiality is ensured by its administrational procedures.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://nordlayer.com/blog/cybersecurity-compliance-everything-you-need-to-know/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;All needed skills are developed through courses and&lt;br /&gt;
certification.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
===Entry-Level Incident Response Positions===&lt;br /&gt;
&amp;lt;p&amp;gt;It is not always possible to advance to the position of incident&lt;br /&gt;
responder in a straight line. Many professionals advance from entry- to&lt;br /&gt;
mid-level positions before becoming a real incident responder or a&lt;br /&gt;
member of a computer emergency response team (CERT).&amp;lt;br /&amp;gt;&lt;br /&gt;
These are some examples:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;network-administrator&amp;quot;&amp;gt;Network administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;This position’s experience will help potential incident responders&lt;br /&gt;
develop networking skills. Attention to detail, as well as the ability&lt;br /&gt;
to sift through system configurations, site layouts, and general network&lt;br /&gt;
and communication setups, are essential in this field.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;system-administrator&amp;quot;&amp;gt;System administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Another crucial beginning point for an incident responder is to learn&lt;br /&gt;
how to manage resources inside your organization as well as user&lt;br /&gt;
behavior. Understanding the potential damage that users, inadequate&lt;br /&gt;
security setups, and ineffective IT policies and procedures can cause on&lt;br /&gt;
your network can provide prospective candidates with insight into the&lt;br /&gt;
human component of an incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;security-administrator&amp;quot;&amp;gt;Security administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In such a position, basic hacking skills, penetration testing, and&lt;br /&gt;
intrusion detection are all learned, which are crucial incident&lt;br /&gt;
responder skills when trying to replicate a breach or attack.&lt;br /&gt;
Understanding the paths a cybercriminal will take when attempting to&lt;br /&gt;
damage or obtain access to a system can greatly simplify the work of&lt;br /&gt;
reverse engineering the incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://resources.infosecinstitute.com/topic/incident-responder-career-roadmap-entry-level-executive/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3 id=&amp;quot;mid-level-incident-response-positions&amp;quot;&amp;gt;Mid-Level Incident&lt;br /&gt;
Response Positions&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5&lt;br /&gt;
id=&amp;quot;computer-security-incident-response-team-csirt-engineer&amp;quot;&amp;gt;Computer&lt;br /&gt;
security incident response team (CSIRT) engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;cyber-incident-responder&amp;quot;&amp;gt;Cyber incident responder&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-response-engineer&amp;quot;&amp;gt;Incident response&lt;br /&gt;
engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;While each of these positions is different, they generally require&lt;br /&gt;
very similar skills and characteristics in a candidate. At this level,&lt;br /&gt;
personal characteristics such as problem solving, time management, and&lt;br /&gt;
even presentation skills become more crucial as one’s career evolves&lt;br /&gt;
into a management-facing role.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Technical skills include the ability to identify and minimize threats&lt;br /&gt;
while maintaining communication with management and the rest of your&lt;br /&gt;
team. Data analysis and evidence gathering become increasingly crucial,&lt;br /&gt;
and the circumstances in which your services are deployed get more&lt;br /&gt;
serious.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Problem-solving skills are crucial at this level of incident&lt;br /&gt;
response, and as the stakes rise, so does the pressure in each&lt;br /&gt;
situation. At this level, programming abilities are essential since&lt;br /&gt;
incident responders may be needed to reverse engineer malicious code or&lt;br /&gt;
even create patches for vulnerable network applications or services.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.coursera.org/articles/popular-cybersecurity-certifications&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3 id=&amp;quot;senior-level-incident-response-positions&amp;quot;&amp;gt;Senior-Level Incident&lt;br /&gt;
Response Positions&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;intrusion-detection-specialist&amp;quot;&amp;gt;Intrusion detection&lt;br /&gt;
specialist:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;A CISSP certification might help a potential candidate in preparing&lt;br /&gt;
for the profession. The role of an intrusion detection specialist is to&lt;br /&gt;
find and stop any unwanted communications.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-manager&amp;quot;&amp;gt;Incident manager:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Expected to plan, oversee, manage, and supervise all incident&lt;br /&gt;
response team actions. Is in charge of reporting all current events to&lt;br /&gt;
senior management and stakeholders, as well as acting as the technical&lt;br /&gt;
lead on active incidents for incident responders. Prepares threat and&lt;br /&gt;
impact assessments and reports them known to management.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.coursera.org/articles/popular-cybersecurity-certifications&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Certificates== &lt;br /&gt;
There is a vast number of different certificates and the road map to&lt;br /&gt;
being a certified professional could be very different&amp;lt;ref name=&amp;quot;Coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated],&amp;quot; [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;NICCS&amp;quot;&amp;gt;NICCS, &amp;quot;Cybersecurity Certifications,&amp;quot; [Online]. Available: hhttps://niccs.cisa.gov/about-niccs/cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt; . One possible&lt;br /&gt;
approach is to start with basic certificates from the different branches&lt;br /&gt;
of service and move to more specific and demanding focused&lt;br /&gt;
certification. Also, some jobs require certain clearances, either from&lt;br /&gt;
industry, or from the government. One small selection of different&lt;br /&gt;
possible certificates is brought out in following paragraphs.&lt;br /&gt;
&lt;br /&gt;
Security+ is a CompTIA certification that is considered a basic cert&lt;br /&gt;
among cybersecurity professionals. It covers the topics of risk&lt;br /&gt;
management and threat assessment.&lt;br /&gt;
Network+ is also offered by CompTIA this certification (like the name&lt;br /&gt;
implies) focuses on networking infrastructure and operations. It is&lt;br /&gt;
considered a foundational certification.&lt;br /&gt;
The Certified Information Systems Security Professional (CISSP) is a&lt;br /&gt;
more advanced certification designed for cybersecurity professionals&lt;br /&gt;
with at least five years of work experience. The certification covers&lt;br /&gt;
topics such as architecture, engineering, and management.&amp;lt;/p&amp;gt;&lt;br /&gt;
The Certified Ethical Hacker (CEH) certification is also considered a&lt;br /&gt;
more advanced cert because it generally requires that applicants have&lt;br /&gt;
multiple years of work experience. The goal of an ethical hacker&lt;br /&gt;
certification is to be able to understand how cyber attacks unfold in&lt;br /&gt;
order to improve threat assessment and mitigation skills.&amp;lt;ref name=&amp;quot;cyberguide&amp;quot;&amp;gt;Cybersecurity Guide, &amp;quot;How to become a cybersecurity specialist&amp;quot;, [Online]. Available: https://cybersecurityguide.org/careers/security-specialist/. [Accessed 27 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
This is definitely not all, when one looks for more information, following link could be searched, to get more in depth knowledge about&lt;br /&gt;
different possibilities. Hereby, with the help of this matrix a possible taxonomy of different 436 listed certificates in branches are&lt;br /&gt;
presented.&amp;lt;ref name=&amp;quot;Pauljeremy&amp;quot;&amp;gt;&amp;quot;Cybersecurity Roadmap,&amp;quot; [Online]. Available: https://pauljerimy.com/2020/10/12/scr-oct-2020-update/. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:analystimage5.png|1000px|thumb|Certificate matrix &amp;lt;ref&amp;gt;&amp;quot;Certification roadmap&amp;quot;. Available at https://pauljerimy.com/security-certification-roadmap&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
=== Communication and Network Security===&lt;br /&gt;
Communication and network security covers the ability to secure&lt;br /&gt;
communication channels and networks. Topics include secure and converges&lt;br /&gt;
protocols, wireless networks, cellular networks, hardware operations&lt;br /&gt;
(warranty and redundant power), and third-party connectivity. IP&lt;br /&gt;
networking are also included in this domain.&lt;br /&gt;
===Identity and Access Management===&lt;br /&gt;
The identity and access management domain covers the attacks that&lt;br /&gt;
target the human gateway to gain access to data. Other topics include&lt;br /&gt;
ways to identify users with rights to access the information and&lt;br /&gt;
servers. Identity and access management covers the topics of&lt;br /&gt;
applications, Single sign-on authentication, privilege escalation,&lt;br /&gt;
Kerberos, rule-based or risk-based access control, proofing and&lt;br /&gt;
establishment of identity.&lt;br /&gt;
===Security Architecture and Engineering===&lt;br /&gt;
The security architecture and engineering domain covers important&lt;br /&gt;
topics concerning security engineering plans, designs and principles,&lt;br /&gt;
Topics include assessing and mitigating information system&lt;br /&gt;
vulnerabilities, fundamental concepts of security models and security&lt;br /&gt;
architectures in critical areas like access control. Cloud systems,&lt;br /&gt;
cryptography, system infiltrations (ransomware, fault-injection and&lt;br /&gt;
more) and virtualized systems are also covered in this domain.&lt;br /&gt;
===Asset Security===&lt;br /&gt;
The Asset Security domain deals with the issues related to the&lt;br /&gt;
collection, storage, maintenance, retention and destruction of data. It&lt;br /&gt;
also covers knowledge of different roles regarding data handling (owner,&lt;br /&gt;
controller and custodian) as well as data protection methods and data&lt;br /&gt;
states. Other topics include resource provision, asset classification&lt;br /&gt;
and data lifecycle management.&lt;br /&gt;
===Security and Risk Management===&lt;br /&gt;
The security and risk management domain covers general on skills&lt;br /&gt;
related to the implementation of user awareness programs as well as&lt;br /&gt;
security procedures. Emphasis is also placed on risk management&lt;br /&gt;
concerning the acquisition of new services, hardware and software&lt;br /&gt;
(supply chain). Other skills include social engineering defense&lt;br /&gt;
mechanisms.&lt;br /&gt;
===Security Assessment and Testing===&lt;br /&gt;
The security assessment and testing domain deals with all the&lt;br /&gt;
techniques and tools used to find system vulnerabilities, weaknesses and&lt;br /&gt;
potential areas of concern not addressed by security procedures and&lt;br /&gt;
policies. Attack simulations, vulnerability assessment, compliance&lt;br /&gt;
checks, and ethical disclosure also fall under this domain.&lt;br /&gt;
===Software Security===&lt;br /&gt;
The software development security domain deals with implementing&lt;br /&gt;
software-based security protocols within environment for which the IT&lt;br /&gt;
professional is responsible. Risk analysis, vulnerability identification&lt;br /&gt;
and auditing of source codes are all covered in this subset. Additional&lt;br /&gt;
topics include software-designed security, maturity models, development&lt;br /&gt;
methodologies, open-source and third-party development security.&lt;br /&gt;
===Security operations===&lt;br /&gt;
The security operations domain covers topics ranging from&lt;br /&gt;
investigations and digital forensic to detection and intrusion&lt;br /&gt;
prevention tools, sandboxing and firewalls. Topics include user and&lt;br /&gt;
entity behavior analytics, threat intelligence (threat hunting and&lt;br /&gt;
threat feeds) log management, artifacts (mobile, computer and network),&lt;br /&gt;
machine learning and AI-based tools, penetration testing, and&lt;br /&gt;
exploitation development. These for sub-domains are lister here.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Incident Handling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Penetration Testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Exploitation&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Education==&lt;br /&gt;
&amp;lt;p&amp;gt;The entry level monitoring specialist is hired by Estonian&lt;br /&gt;
Information System Authority even if there is no formal IT education,&lt;br /&gt;
but readiness to learn and moderate knowledge of different operation&lt;br /&gt;
systems is enough to start the career.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.cv.ee/en/vacancy/792782/riigi-infosusteemi-amet/seirespetsialist-tule-eesti-kuberruumi-valvuriks&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Nevertheless, like most other high qualification careers jobs falling&lt;br /&gt;
under the cybersecurity specialist category require some form of formal&lt;br /&gt;
education. However, since cybersecurity specialist jobs can fall across&lt;br /&gt;
a wide spectrum of job descriptions and responsibilities, it is possible&lt;br /&gt;
to obtain a specialist job after completing many levels of different&lt;br /&gt;
computer related education.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;If one is looking for a cybersecurity related education, for example&lt;br /&gt;
in EU, 137 courses/programs could be found that relate to keyword IT or&lt;br /&gt;
cybersecurity.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.enisa.europa.eu/topics/cybersecurity-education/education-map/education-courses&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Also, there is a great amount of discussion, if cuber security&lt;br /&gt;
professional should have a degree or would be certification just enough.&lt;br /&gt;
One interesting table is produces by Franklin University that compares&lt;br /&gt;
benefits and/or drawbacks of each type of credential.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image11.png&amp;quot; alt=&amp;quot;Comparison MSc vs certificate&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;Comparison MSc vs&lt;br /&gt;
certificate&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Certifications are generally good for people with little practical&lt;br /&gt;
experience because they are known quantities in the industry and can&lt;br /&gt;
help you get your foot in the door. They set a minimum knowledge bar.&lt;br /&gt;
But some certifications are viewed more favorably than others.&lt;br /&gt;
Certifications with renewal requirements are viewed better by hiring&lt;br /&gt;
managers, but they also more costly in the long run because of the need&lt;br /&gt;
for continuing education. Certifications are also good for showing&lt;br /&gt;
in-depth expertise in a specialization within cybersecurity. Depending&lt;br /&gt;
on your career goals, it may be advantageous to have a master’s&lt;br /&gt;
degree—which shows your breadth of knowledge, critical thinking and&lt;br /&gt;
leadership skills—and a certificate—which shows specific skill&lt;br /&gt;
competency.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;As IT (Cyber) Security is still a relatively young discipline,&lt;br /&gt;
universities and colleges are still figuring out which is the best&lt;br /&gt;
approach for their degrees. Study programmes and curricula in Cyber&lt;br /&gt;
Security are different. In general, here are the duration of Cyber&lt;br /&gt;
Security degrees:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Bachelor’s degrees in Cyber Security take 3 or 4 years in most&lt;br /&gt;
countries.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Master’s courses in Cyber Security take between 1-2 years to&lt;br /&gt;
complete.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;PhD programmes in Cyber Security last 3-5 years. Some only take 1&lt;br /&gt;
or 2 years, but they are less common.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Generalization could me made that on bachelor level the general&lt;br /&gt;
knowledge about the cyber issues are obtained. On master level the&lt;br /&gt;
specialization courses are taken and the person can choose more specific&lt;br /&gt;
topics to study. It is on master level where strengths of the cyber&lt;br /&gt;
specialist can be developed further and up-do date knowledge obtained in&lt;br /&gt;
specifics. PhD is serious science and involves teaching, lot of&lt;br /&gt;
scientific work and writing for publications.&amp;lt;/p&amp;gt;&lt;br /&gt;
==Salary==&lt;br /&gt;
&amp;lt;p&amp;gt;Even if the salary can be very different, compared to the skills and&lt;br /&gt;
experience, an generalization can be made. Cyber Security professionals&lt;br /&gt;
in CSIRT, and in other entities earn quite well, from the start. First,&lt;br /&gt;
some comparison from the United States. The average CSIRT analyst salary&lt;br /&gt;
in the USA is $97,500 per year or $50 per hour. Entry level positions&lt;br /&gt;
start at $48,875 per year while most experienced workers make up to&lt;br /&gt;
$135,373 per year.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.talent.com/salary?job=csirt+analyst&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;There are multiple positions you can occupy in this field. They have&lt;br /&gt;
in common great salaries and high demand for technical skills, attention&lt;br /&gt;
to details, problem-solving mentality, and the ability to analyze risks.&lt;br /&gt;
Here are the average annual salaries in the United States, according to&lt;br /&gt;
Payscale:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.payscale.com/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Cryptographer – 100,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Information Security Officer – 91,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Assessor – 90,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Engineer – 88,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Penetration Tester – 81,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Forensics Expert – 71,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Administrator – 65,000 USD&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When looking into salaries in Estonia, one can find that there is a&lt;br /&gt;
discussion that private sector is taking a toll from the public sector,&lt;br /&gt;
and that the salaries in important agencies, as Information System&lt;br /&gt;
Authority loose their employees to the better paid positions in private&lt;br /&gt;
sector.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://digi.geenius.ee/rubriik/uudis/kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad/&lt;br /&gt;
https://tehnika.postimees.ee/6887428/riigi-it-tootajate-palgamaarad-kasvasid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;But there is also a different view that average private sector worker&lt;br /&gt;
could be hired as a top specialist in public sector and then the payment&lt;br /&gt;
is higher. Nevertheless, it seems that the average payment in cyber&lt;br /&gt;
security sector is any way higher that in other parts of the&lt;br /&gt;
e-services.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://digi.geenius.ee/rubriik/uudis/5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka/&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
==SOC==&lt;br /&gt;
&amp;lt;p&amp;gt;A SOC is a facility where an organization’s network, applications,&lt;br /&gt;
and endpoints are monitored and defended. The term was adapted from&lt;br /&gt;
network operations centers (NOCs), where large telecommunication or&lt;br /&gt;
corporate networks are monitored. When network security became more of a&lt;br /&gt;
concern, security teams were formed within the NOCs, and eventually spun&lt;br /&gt;
off into larger organizations of their own as the responsibilities of&lt;br /&gt;
security teams grew increasingly complex and specialized. The security&lt;br /&gt;
staff working in a security operations center are often called the SOC&lt;br /&gt;
team.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Functions of the SOC team include, but are not limited to:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ol type=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Taking inventory of resources, to get a better understanding of the&lt;br /&gt;
structure they are protecting.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintanence of the system, by constantly making updates and adding&lt;br /&gt;
safeguards.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Monitoring the network for abnormalities with special tools.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Threat analysis of new attacks and vulnerabilities.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Responding to attacks, by acting as “first responders”. The SOC team&lt;br /&gt;
will shut down and/or isolate endpoints, deleting files and lowering the&lt;br /&gt;
impact as fast as possible.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Recovery of system stability and lost data. This may be done using&lt;br /&gt;
backups, restarting endpoints or reconfiguring systems.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Logging all actions on the system, to be later used for analysis or&lt;br /&gt;
forensics after an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigating the root cause of an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Auditing their own actions, to be in line with regulations of the&lt;br /&gt;
organization, industry or governing body.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.trellix.com/en-us/security-awareness/operations/what-is-soc.html&amp;lt;/p&amp;gt;&lt;br /&gt;
==CSIRT==&lt;br /&gt;
&amp;lt;p&amp;gt;A CSIRT is a group that responds to security incidents when they&lt;br /&gt;
occur. Key responsibilities of a CSIRT include: &lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
===Creating and maintaining an incident response plan (IRP)===&lt;br /&gt;
An incident response plan (IRP) is a set of written instructions for&lt;br /&gt;
detecting, responding to and limiting the effects of an information&lt;br /&gt;
security event. Incident response plans provide instructions for&lt;br /&gt;
responding to many potential scenarios, including data breaches, denial&lt;br /&gt;
of service/distributed denial of service attacks, firewall breaches,&lt;br /&gt;
virus or malware outbreaks or insider threats. Without an incident&lt;br /&gt;
response plan in place, organizations may either not detect the attack&lt;br /&gt;
in the first place, or not follow proper protocol to contain the threat&lt;br /&gt;
and recover from it when a breach is detected.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.stratacore.com/incidentresponseplan&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
===Investigating and analyzing incidents===&lt;br /&gt;
CSIRTs are also involved in improvement activities. After major&lt;br /&gt;
computer security incidents occur, or when incidents are not handled in&lt;br /&gt;
a timely or effective manner, a CSIRT will generally perform a&lt;br /&gt;
postmortem of the incident and its response. This postmortem will&lt;br /&gt;
identify the strengths and weakness of the response effort. Such reviews&lt;br /&gt;
can identify weaknesses and holes in systems, infrastructure defenses,&lt;br /&gt;
or policies that allowed the incident to take place. It can also&lt;br /&gt;
identify problems with communication channels, interfaces, and&lt;br /&gt;
procedures that inhibited the efficient resolution of the reported&lt;br /&gt;
problem.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.cisa.gov/uscert/bsi/articles/best-practices/incident-management/defining-computer-security-incident-response-teams&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Managing internal communications and updates during or immediately after incidents occur===&lt;br /&gt;
===Communicating with employees, shareholders, customers, and the press about incidents as needed===&lt;br /&gt;
&amp;lt;p&amp;gt;There are various services within the CSIRT Services Framework that&lt;br /&gt;
address communications, as they relate to security operations and&lt;br /&gt;
incident response services. Some of these include Information Security&lt;br /&gt;
Incident Coordination, Crisis Management Support, Vulnerability&lt;br /&gt;
Disclosure, Situational Awareness Communication, and Awareness Building,&lt;br /&gt;
to name a few. Sharing information and communicating with the general&lt;br /&gt;
public and/or your constituency is appropriate in many different&lt;br /&gt;
scenarios. These can range from proactive communications to reactive&lt;br /&gt;
communications. Each scenario may be unique, and careful consideration&lt;br /&gt;
should be given to when to release information to the public and what&lt;br /&gt;
information should be released.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;https://resources.sei.cmu.edu/asset_files/Handbook/2021_002_001_651819.pdf&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Remediating incidents===&lt;br /&gt;
Threat remediation is a strong and capable tool for fighting the&lt;br /&gt;
cyber security compromises. As the word ‘remedy’ suggests, remediation&lt;br /&gt;
process involves the treatment of a security breach. With the&lt;br /&gt;
remediation practices, your cyber security team is able to eliminate&lt;br /&gt;
suspicious activities and malicious attacks in the form of malware,&lt;br /&gt;
ransomware, phishing and such. Even if you ‘kill’ the suspicious&lt;br /&gt;
activity, the attackers can remain in your systems. If you want to&lt;br /&gt;
contaminate and end the problem for good, your remediation processes&lt;br /&gt;
must involve the detection of the cause. &amp;lt;ref name=&amp;quot;logsign&amp;quot;&amp;gt;Logsign, &amp;quot;What-is-remediation-in-cyber-security&amp;quot;. Available: https://www.logsign.com/blog/what-is-remediation-in-cyber-security/. [Accessed 28 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Recommending technology, policy, governance, and training changes after security incidents===&lt;br /&gt;
After all these actions, the SCIRT must contribute to the development&lt;br /&gt;
of better policies, practices and has to recommend improvements. They&lt;br /&gt;
are not working in the vacuum and their work has to create new and&lt;br /&gt;
better standards for cyber security. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;Exabeam, &amp;quot;CSIRT&amp;quot;. Available: https://www.exabeam.com/incident-response/csirt/ [Accessed 28 APr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==CERT==&lt;br /&gt;
&amp;lt;p&amp;gt;The term “computer emergency response team” was coined in 1988. In&lt;br /&gt;
response to the Morris worm attack that impacted thousands of servers on&lt;br /&gt;
the Internet, DARPA funded the formation of the Computer Emergency&lt;br /&gt;
Response Team Coordination Center (CERT-CC) at Carnegie Mellon&lt;br /&gt;
University. The goal of CERT-CC was to help protect the internet by&lt;br /&gt;
collecting and disseminating information on critical security&lt;br /&gt;
vulnerabilities. Several other countries formed similar centers using&lt;br /&gt;
the same acronym (despite threats of legal action by Carnegie Mellon for&lt;br /&gt;
trademark infringement). Now the term CERT refers to any emergency&lt;br /&gt;
response team that deals with cyber threats. Many people use CERT-CC&lt;br /&gt;
interchangeably with CSIRT, though the charter of a CERT is information&lt;br /&gt;
sharing in order to help other response teams respond to threats against&lt;br /&gt;
their own infrastructure.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In general, the designation of CERT is helpful in applying real-world&lt;br /&gt;
solutions to various cybersecurity problems. They may be government&lt;br /&gt;
contractors or employees of a major corporation. For example, the U.S.&lt;br /&gt;
Computer Emergency Readiness Team (US-CERT) operates under the U.S.&lt;br /&gt;
Department of Homeland Security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.techopedia.com/definition/31003/computer-emergency-response-team-cert&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In Estonia CERT is designated as CERT-EE. It was established in 2006,&lt;br /&gt;
as an organization responsible for the management of security incidents&lt;br /&gt;
in .ee computer networks. It is also a national contact point for&lt;br /&gt;
international co-operation in the field of IT security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ria.ee/en/cyber-security/cert-ee.html&amp;lt;/p&amp;gt;&lt;br /&gt;
===Difference between SOC/CSIRT/CERT===&lt;br /&gt;
&amp;lt;p&amp;gt;How CSIRTs differ from CERTs and SOCs There are overlapping&lt;br /&gt;
responsibilities between a community emergency response team (CERT),&lt;br /&gt;
computer security incident response team (CSIRT), and security&lt;br /&gt;
operations center (SOC). To add to this confusion, frequently, the terms&lt;br /&gt;
CERT and CSIRT are used interchangeably, despite the important&lt;br /&gt;
differences.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image3.png&amp;quot; alt=&amp;quot;Overlapping in images/image3.png&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;Overlapping in&lt;br /&gt;
images/image3.png&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
==Understand the primary roles and characteristics of a CERT, CSIRT, and SOC.==&lt;br /&gt;
&amp;lt;p&amp;gt;So, using strict definitions, a CERT collects and disseminates&lt;br /&gt;
security information, typically for the benefit of a country or an&lt;br /&gt;
industry. A CSIRT is a cross-functional team that responds to incidents&lt;br /&gt;
on behalf of a country or an organization. A SOC is where a country or&lt;br /&gt;
organization monitors and defends its network, servers, applications,&lt;br /&gt;
and endpoints.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image4.png&amp;quot; alt=&amp;quot;table of explanation images/image4&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;table of explanation&lt;br /&gt;
images/image4&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
==Future==&lt;br /&gt;
&amp;lt;p&amp;gt;And the Cyber security problem is only getting bigger. According to a&lt;br /&gt;
report published by Accenture, the number of cyber security breaches&lt;br /&gt;
increased by 11 percent from 2017 to 2018. The cost of such breaches is&lt;br /&gt;
astronomical–about $600 billion worldwide, according to the Economic&lt;br /&gt;
Impact of Cybercrime report.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Job projections for cybersecurity are staggering. The Bureau of Labor&lt;br /&gt;
Statistics in US predicts that careers in the cybersecurity field will&lt;br /&gt;
grow by 32% by 2028. That makes cybersecurity one of the top 10&lt;br /&gt;
fastest-growing jobs in the country. In the United States alone, jobs&lt;br /&gt;
for Information Security Analysts are expected to grow by 15% by&lt;br /&gt;
2024.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Most likely this trend is also similar in other countries.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When checking Estonian job portals, there is a constant need for&lt;br /&gt;
people for cyber security related positions. Also, linkedin search gives&lt;br /&gt;
approximately 30 vacancies immediately. There are banks, logistics&lt;br /&gt;
companies, e-shops, and software producers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://ee.linkedin.com/jobs/cyber-security-jobs?countryRedirected=1&amp;amp;amp;position=1&amp;amp;amp;pageNum=0&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Trends that affect companies create need for constant cyber security&lt;br /&gt;
services. Increasing number of home/remote offices require secure&lt;br /&gt;
corporate networks and security of remote devices. One example is from&lt;br /&gt;
this year, when sloppy remote desktop set-up paralyzed systems of 17&lt;br /&gt;
companies.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.aripaev.ee/uudised/2022/04/20/ria-lohakas-kaugtoolaua-seadistus-halvas-martsis-vahemalt-17-juhul-ettevotete-it-susteemid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Also, no service can exists without robust infrastructure - servers,&lt;br /&gt;
databases, applications. As all previously mentioned devices and&lt;br /&gt;
services are at constant scanning and surveillance. So, the breach&lt;br /&gt;
detection and immediate action demands 24/7 services. Even if lot of&lt;br /&gt;
things could be automated, there is a need for human specialists (at&lt;br /&gt;
least, at the moment). Third growing field is also a forensic&lt;br /&gt;
investigation, as every attack must be investigated in order to be ready&lt;br /&gt;
to repel next attacks. So data recovery and evidence collection is&lt;br /&gt;
another important field of work that need skilled and professional&lt;br /&gt;
workers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Even, if the specifics of the entity, be it CSIRT, CERT or SOC, are&lt;br /&gt;
different, the fundamentals of the work are the same. Professional&lt;br /&gt;
knowledge of the networks, operational systems, hardware, scripting, and&lt;br /&gt;
several other wider IT related knowledge is needed. As there is no&lt;br /&gt;
single way to reach to it, every single person can find one’s strongest&lt;br /&gt;
sides and develop them with knowledge of weaker side, in order to know,&lt;br /&gt;
when to as for help.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/body&amp;gt;&lt;br /&gt;
&amp;lt;/html&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mavald</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142187</id>
		<title>Hiring a Cyber Security Incident Analyst</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142187"/>
		<updated>2022-05-01T14:53:25Z</updated>

		<summary type="html">&lt;p&gt;Mavald: /* CSIRT */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==A Cyber Security Incident Analyst==&lt;br /&gt;
&lt;br /&gt;
[[File:image1.png|600px|thumb|Job advertisement &amp;lt;ref&amp;gt;&amp;quot;Job Advertisement&amp;quot;. Available at https://www.projectpeople.com/jobs/&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
===Cyber security incident analyst in SOC/CSIRT/CERT===&lt;br /&gt;
This article delves into the job title of Cyber Security Incident&lt;br /&gt;
Analyst and provides an overview of the acronyms SOC/CSIRT/CERT. A brief&lt;br /&gt;
history of the job is discussed here, as well as a possible career path,&lt;br /&gt;
education, experience, and other characteristics required for work in&lt;br /&gt;
computer security-related organizations. The article also provides a&lt;br /&gt;
brief history of SOC/CSIRT/CERT, as well as a comparison of their&lt;br /&gt;
differences and similarities.&lt;br /&gt;
===Cyber Security Incident Analyst Skill Set===&lt;br /&gt;
What skill set is expected from the Cyber Security Incident Analyst? Below written lines are taken from the same job advertisement depicted&lt;br /&gt;
on the left side of this article:&lt;br /&gt;
As a Security Incident Analyst your responsibilities will include:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Continuous monitoring of security tooling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Performing regular and ad-hoc vulnerability assessments&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Carrying out ‘spot checks’&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Reporting vulnerabilities to the PVG via the alerts system&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintaining and documenting logging systems&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Developing centralized logging, reporting and intelligence&lt;br /&gt;
platforms&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;‘Light touch’ penetration testing with open source tooling&lt;br /&gt;
(Metasploit)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Knowledge &amp;amp;amp; Experience required:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;SOC, CSIRT or CERT operational environment experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Windows / Linux experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TCP /IP networking protocol knowledge&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience reviewing and analyzing Security Events from various&lt;br /&gt;
monitoring and logging sources&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience in website and web application security assessment or&lt;br /&gt;
penetration testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience of using Metasploit&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Scripting knowledge using BASH, Python, Perl, Ruby&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Skills in Host and Network Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
As one can see the description of the duties is wide and also the&lt;br /&gt;
knowledge and experience that is required is noteworthy. So, where to&lt;br /&gt;
start to find out the way to get this kind of knowledge and&lt;br /&gt;
expertize.&lt;br /&gt;
===Possible career path===&lt;br /&gt;
Next part of the paper is aiming to depict a possible ways, how to&lt;br /&gt;
develop oneself, and move along the career pathway in cybersecurity&lt;br /&gt;
field. Topics of development, education, experience and certification&lt;br /&gt;
are covered.&lt;br /&gt;
[[File:analystimage2.png|1000px|thumb|Career path &amp;lt;ref&amp;gt;&amp;quot;Possible Career Path&amp;quot;. Available at https://www.cyberseek.org/pathway.html&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
===Junior/Senior===&lt;br /&gt;
Start with an entry-level job in IT. Hands-on experience is often the&lt;br /&gt;
most effective way to prepare for certification exams. Start&lt;br /&gt;
accumulating work experience with an entry-level role as a cybersecurity&lt;br /&gt;
analyst. Many cybersecurity professionals start off in more general IT&lt;br /&gt;
roles. The skills, practices, and technologies you’ll use as a&lt;br /&gt;
cybersecurity professional will continue to evolve along with computer&lt;br /&gt;
and network technology. The desire to learn, ability to problem solve,&lt;br /&gt;
and attention to detail will serve you well in this field. Other, more&lt;br /&gt;
technical skills and technologies to learn include:&amp;lt;ref name=&amp;quot;certification&amp;quot;&amp;gt;Popular Cyber Security Certificates [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications  [Accessed 25 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====SIEM tools (security information and event management)====&lt;br /&gt;
Security Information and Event Management (SIEM) is a set of tools&lt;br /&gt;
and services offering a holistic view of an organization’s information&lt;br /&gt;
security. SIEM works by combining two technologies:&lt;br /&gt;
&amp;lt;li&amp;gt;Security information management (SIM), which collects data from log&lt;br /&gt;
files for analysis and reports on security threats and events, and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;security event management (SEM), which conducts real-time system&lt;br /&gt;
monitoring, notifies network admins about important issues and&lt;br /&gt;
establishes correlations between security events. There are a number of&lt;br /&gt;
security information and event management solutions on the market.&lt;br /&gt;
ArcSight ESM, IBM QRadar and Splunk are among the most popular. &amp;lt;ref name=&amp;quot;SIEM&amp;quot;&amp;gt;Application security, SIEM [Online]. Available: https://www.imperva.com/learn/application-security/siem/. [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Firewalls, Intrusion Detection Systems (IDS), and Intrusion Prevention Systems(IPS)====&lt;br /&gt;
Firewalls can be two types, hardware and software firewalls. Software&lt;br /&gt;
firewall is a firewall that is installed on a computer or server, and&lt;br /&gt;
tasked with network security. It works with a wide variety of other&lt;br /&gt;
technology security solutions to provide more robust and cohesive&lt;br /&gt;
security for enterprises of all sizes. When a software firewall is&lt;br /&gt;
installed on a server, it opens up like an umbrella of protection over&lt;br /&gt;
all other computers connected to the network. It is able to monitor both&lt;br /&gt;
incoming and outgoing traffic for potential risk or suspicious user&lt;br /&gt;
behavior, and also makes setting security policies much easier, faster&lt;br /&gt;
and more flexible. Hardware firewall is positioned between the network&lt;br /&gt;
and devices, allowing traffic to funnel through the firewall for a close&lt;br /&gt;
inspection and analysis. A hardware firewall, a term often&lt;br /&gt;
interchangeable with network or next-generation firewall, protects the&lt;br /&gt;
network gateways for an enterprise. Hardware firewall is physical&lt;br /&gt;
hardware, installed between network elements and connected devices, and&lt;br /&gt;
is tasked with filtering traffic for cyber threat to the network or&lt;br /&gt;
devices. Filtering out unauthorized or suspicious users based on traffic&lt;br /&gt;
analysis is one of the biggest benefits of hardware firewall. &amp;lt;ref name=&amp;quot;sangfor&amp;quot;&amp;gt;Sangfor, &amp;quot;What is Software Firewall? Difference between Hardware Firewall and Software Firewall, [Online]. Available: https://www.sangfor.com/blog/cybersecurity/what-is-software-firewall-difference-between-hardware-firewall-and-software-firewall [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems&lt;br /&gt;
(IPS) are both parts of the network infrastructure. IDS/IPS compare&lt;br /&gt;
network packets to a cyberthreat database containing known signatures of&lt;br /&gt;
cyberattacks — and flag any matching packets. IDS doesn’t alter the&lt;br /&gt;
network packets in any way, whereas IPS prevents the packet from&lt;br /&gt;
delivery based on the contents of the packet, much like how a firewall&lt;br /&gt;
prevents traffic by IP address. &amp;lt;ref name=&amp;quot;Varonis&amp;quot;&amp;gt;Varonis, &amp;quot;What is Software Firewall? IDS vs. IPS: What is the Difference?, [Online]. Available: https://www.varonis.com/blog/ids-vs-ips [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Digital forensics====&lt;br /&gt;
Digital forensics is a branch of forensic science that focuses on&lt;br /&gt;
identifying, acquiring, processing, analyzing, and reporting on data&lt;br /&gt;
stored electronically. Electronic evidence is a component of almost all&lt;br /&gt;
criminal activities and digital forensics support is crucial for law&lt;br /&gt;
enforcement investigations. Electronic evidence can be collected from a&lt;br /&gt;
wide array of sources, such as computers, smartphones, remote storage,&lt;br /&gt;
unmanned aerial systems, shipborne equipment, and more.&amp;lt;ref name=&amp;quot;interpol&amp;quot;&amp;gt;Interpol, &amp;quot;Digital forensics&amp;quot;. Available: https://www.interpol.int/How-we-work/Innovation/Digital-forensics. [Accessed 28 4 2022].&amp;lt;/ref&amp;gt; &lt;br /&gt;
Investigative process of digital forensics can be divided into several stages. There are four major stages: preservation, collection,&lt;br /&gt;
examination, and analysis. All these four stages need a deep understanding of computers, technology across a broad spectrum, and cybersecurity principles and&lt;br /&gt;
practices, a working knowledge of computers, networks, and coding, in-depth investigative abilities, critical-thinking skills and analytical talent the ability to effectively communicate and work with a&lt;br /&gt;
wide range of people. &amp;lt;ref name=&amp;quot;ecpi&amp;quot;&amp;gt;&amp;quot;Digital forensics&amp;quot;. Available: https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me. [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Mobile device management====&lt;br /&gt;
Mobile device management (MDM) is software that allows IT&lt;br /&gt;
administrators to control, secure and enforce policies on smartphones,&lt;br /&gt;
tablets and other endpoints. Mobile device management software emerged&lt;br /&gt;
in the early 2000s as a way to control and secure the personal digital&lt;br /&gt;
assistants and smartphones that business workers began to use. The&lt;br /&gt;
consumer smartphone boom that started with the launch of the Apple&lt;br /&gt;
iPhone in 2007 led to the bring your own device (BYOD) trend, which&lt;br /&gt;
fueled further interest in MDM.&amp;lt;ref name=&amp;quot;techtarget&amp;quot;&amp;gt;Techtarget, &amp;quot;Mobile Device Management&amp;quot;. Available: https://www.techtarget.com/searchmobilecomputing/definition/mobile-device-management [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Data management====&lt;br /&gt;
Sometimes the data management is neglected, but this part has a&lt;br /&gt;
crucial role when learning for good cyber security practices. Majority&lt;br /&gt;
of cyber security programs include a special courses on data management.&lt;br /&gt;
Data management is a method of organizing and maintaining data processes&lt;br /&gt;
that are required in almost every business operations. The benefits of&lt;br /&gt;
data management can be found accounting, statistics, logistics planning&lt;br /&gt;
and other disciplines including corporate computing.&amp;lt;ref name=&amp;quot;GlobalUni&amp;quot;&amp;gt;Global Universities, &amp;quot;MSc Data Management and Cyber Security&amp;quot;. Available: https://globaluniversities.in/msc-data-management-cyber-security. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Data governance (and management) play a fundamental role in&lt;br /&gt;
protecting an organization’s data. Ensuring that the right people have&lt;br /&gt;
the right access and that appropriate security controls are in place to&lt;br /&gt;
protect each system or service, based on the criticality or sensitivity&lt;br /&gt;
of the data sets these contain. &amp;lt;ref name=&amp;quot;CyberMagazine&amp;quot;&amp;gt;Cyber Security Magazine, &amp;quot;The Role of Data Governance in Cybersecurity&amp;quot;. Available: https://cybersecurity-magazine.com/the-role-of-data-governance-in-cybersecurity/?utm_source=rss&amp;amp;amp;utm_medium=rss&amp;amp;amp;utm_campaign=the-role-of-data-governance-in-cybersecurity. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Application security development====&lt;br /&gt;
Application security describes security measures at the application&lt;br /&gt;
level that aim to prevent data or code within the app from being stolen&lt;br /&gt;
or hijacked. It encompasses the security considerations that happen&lt;br /&gt;
during application development and design, but it also involves systems&lt;br /&gt;
and approaches to protect apps after they get deployed. Application&lt;br /&gt;
security may include hardware, software, and procedures that identify or&lt;br /&gt;
minimize security vulnerabilities.&lt;br /&gt;
https://www.vmware.com/topics/glossary/content/application-security.html&lt;br /&gt;
Application security development is important to ensure that your&lt;br /&gt;
application is free from coding errors and bugs. And controls the risk&lt;br /&gt;
and helps safeguard against security vulnerabilities. Application&lt;br /&gt;
security development is the process of making applications more secure&lt;br /&gt;
by finding and fixing security vulnerabilities. This is often done by&lt;br /&gt;
enforcing software security best practices and using application&lt;br /&gt;
security testing tools.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.perforce.com/blog/kw/application-security-development-best-practices&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Audit and compliance knowledge====&lt;br /&gt;
A cyber security audit is designed to be a comprehensive review and&lt;br /&gt;
analysis of your business’s IT infrastructure. It identifies threats and&lt;br /&gt;
vulnerabilities, exposing weaknesses and high-risk practices.&lt;br /&gt;
Regulations such as the EU GDPR (General Data Protection Regulation) can&lt;br /&gt;
impose hefty penalties in the event of a breach that results in&lt;br /&gt;
exploited data. A cyber security audit will help mitigate the&lt;br /&gt;
consequences of a breach and demonstrate that your organization has&lt;br /&gt;
taken the necessary steps to protect client and company data.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://cyforsecure.co.uk/services/cyber-assessment/cyber-security-audit/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Cybersecurity compliance is the organizational risk management method&lt;br /&gt;
aligned with pre-defined security measures &amp;amp;amp; controls on how data&lt;br /&gt;
confidentiality is ensured by its administrational procedures.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://nordlayer.com/blog/cybersecurity-compliance-everything-you-need-to-know/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;All needed skills are developed through courses and&lt;br /&gt;
certification.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
===Entry-Level Incident Response Positions===&lt;br /&gt;
&amp;lt;p&amp;gt;It is not always possible to advance to the position of incident&lt;br /&gt;
responder in a straight line. Many professionals advance from entry- to&lt;br /&gt;
mid-level positions before becoming a real incident responder or a&lt;br /&gt;
member of a computer emergency response team (CERT).&amp;lt;br /&amp;gt;&lt;br /&gt;
These are some examples:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;network-administrator&amp;quot;&amp;gt;Network administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;This position’s experience will help potential incident responders&lt;br /&gt;
develop networking skills. Attention to detail, as well as the ability&lt;br /&gt;
to sift through system configurations, site layouts, and general network&lt;br /&gt;
and communication setups, are essential in this field.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;system-administrator&amp;quot;&amp;gt;System administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Another crucial beginning point for an incident responder is to learn&lt;br /&gt;
how to manage resources inside your organization as well as user&lt;br /&gt;
behavior. Understanding the potential damage that users, inadequate&lt;br /&gt;
security setups, and ineffective IT policies and procedures can cause on&lt;br /&gt;
your network can provide prospective candidates with insight into the&lt;br /&gt;
human component of an incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;security-administrator&amp;quot;&amp;gt;Security administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In such a position, basic hacking skills, penetration testing, and&lt;br /&gt;
intrusion detection are all learned, which are crucial incident&lt;br /&gt;
responder skills when trying to replicate a breach or attack.&lt;br /&gt;
Understanding the paths a cybercriminal will take when attempting to&lt;br /&gt;
damage or obtain access to a system can greatly simplify the work of&lt;br /&gt;
reverse engineering the incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://resources.infosecinstitute.com/topic/incident-responder-career-roadmap-entry-level-executive/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3 id=&amp;quot;mid-level-incident-response-positions&amp;quot;&amp;gt;Mid-Level Incident&lt;br /&gt;
Response Positions&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5&lt;br /&gt;
id=&amp;quot;computer-security-incident-response-team-csirt-engineer&amp;quot;&amp;gt;Computer&lt;br /&gt;
security incident response team (CSIRT) engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;cyber-incident-responder&amp;quot;&amp;gt;Cyber incident responder&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-response-engineer&amp;quot;&amp;gt;Incident response&lt;br /&gt;
engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;While each of these positions is different, they generally require&lt;br /&gt;
very similar skills and characteristics in a candidate. At this level,&lt;br /&gt;
personal characteristics such as problem solving, time management, and&lt;br /&gt;
even presentation skills become more crucial as one’s career evolves&lt;br /&gt;
into a management-facing role.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Technical skills include the ability to identify and minimize threats&lt;br /&gt;
while maintaining communication with management and the rest of your&lt;br /&gt;
team. Data analysis and evidence gathering become increasingly crucial,&lt;br /&gt;
and the circumstances in which your services are deployed get more&lt;br /&gt;
serious.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Problem-solving skills are crucial at this level of incident&lt;br /&gt;
response, and as the stakes rise, so does the pressure in each&lt;br /&gt;
situation. At this level, programming abilities are essential since&lt;br /&gt;
incident responders may be needed to reverse engineer malicious code or&lt;br /&gt;
even create patches for vulnerable network applications or services.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.coursera.org/articles/popular-cybersecurity-certifications&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3 id=&amp;quot;senior-level-incident-response-positions&amp;quot;&amp;gt;Senior-Level Incident&lt;br /&gt;
Response Positions&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;intrusion-detection-specialist&amp;quot;&amp;gt;Intrusion detection&lt;br /&gt;
specialist:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;A CISSP certification might help a potential candidate in preparing&lt;br /&gt;
for the profession. The role of an intrusion detection specialist is to&lt;br /&gt;
find and stop any unwanted communications.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-manager&amp;quot;&amp;gt;Incident manager:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Expected to plan, oversee, manage, and supervise all incident&lt;br /&gt;
response team actions. Is in charge of reporting all current events to&lt;br /&gt;
senior management and stakeholders, as well as acting as the technical&lt;br /&gt;
lead on active incidents for incident responders. Prepares threat and&lt;br /&gt;
impact assessments and reports them known to management.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.coursera.org/articles/popular-cybersecurity-certifications&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Certificates== &lt;br /&gt;
There is a vast number of different certificates and the road map to&lt;br /&gt;
being a certified professional could be very different&amp;lt;ref name=&amp;quot;Coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated],&amp;quot; [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;NICCS&amp;quot;&amp;gt;NICCS, &amp;quot;Cybersecurity Certifications,&amp;quot; [Online]. Available: hhttps://niccs.cisa.gov/about-niccs/cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt; . One possible&lt;br /&gt;
approach is to start with basic certificates from the different branches&lt;br /&gt;
of service and move to more specific and demanding focused&lt;br /&gt;
certification. Also, some jobs require certain clearances, either from&lt;br /&gt;
industry, or from the government. One small selection of different&lt;br /&gt;
possible certificates is brought out in following paragraphs.&lt;br /&gt;
&lt;br /&gt;
Security+ is a CompTIA certification that is considered a basic cert&lt;br /&gt;
among cybersecurity professionals. It covers the topics of risk&lt;br /&gt;
management and threat assessment.&lt;br /&gt;
Network+ is also offered by CompTIA this certification (like the name&lt;br /&gt;
implies) focuses on networking infrastructure and operations. It is&lt;br /&gt;
considered a foundational certification.&lt;br /&gt;
The Certified Information Systems Security Professional (CISSP) is a&lt;br /&gt;
more advanced certification designed for cybersecurity professionals&lt;br /&gt;
with at least five years of work experience. The certification covers&lt;br /&gt;
topics such as architecture, engineering, and management.&amp;lt;/p&amp;gt;&lt;br /&gt;
The Certified Ethical Hacker (CEH) certification is also considered a&lt;br /&gt;
more advanced cert because it generally requires that applicants have&lt;br /&gt;
multiple years of work experience. The goal of an ethical hacker&lt;br /&gt;
certification is to be able to understand how cyber attacks unfold in&lt;br /&gt;
order to improve threat assessment and mitigation skills.&amp;lt;ref name=&amp;quot;cyberguide&amp;quot;&amp;gt;Cybersecurity Guide, &amp;quot;How to become a cybersecurity specialist&amp;quot;, [Online]. Available: https://cybersecurityguide.org/careers/security-specialist/. [Accessed 27 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
This is definitely not all, when one looks for more information, following link could be searched, to get more in depth knowledge about&lt;br /&gt;
different possibilities. Hereby, with the help of this matrix a possible taxonomy of different 436 listed certificates in branches are&lt;br /&gt;
presented.&amp;lt;ref name=&amp;quot;Pauljeremy&amp;quot;&amp;gt;&amp;quot;Cybersecurity Roadmap,&amp;quot; [Online]. Available: https://pauljerimy.com/2020/10/12/scr-oct-2020-update/. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:analystimage5.png|1000px|thumb|Certificate matrix &amp;lt;ref&amp;gt;&amp;quot;Certification roadmap&amp;quot;. Available at https://pauljerimy.com/security-certification-roadmap&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
=== Communication and Network Security===&lt;br /&gt;
Communication and network security covers the ability to secure&lt;br /&gt;
communication channels and networks. Topics include secure and converges&lt;br /&gt;
protocols, wireless networks, cellular networks, hardware operations&lt;br /&gt;
(warranty and redundant power), and third-party connectivity. IP&lt;br /&gt;
networking are also included in this domain.&lt;br /&gt;
===Identity and Access Management===&lt;br /&gt;
The identity and access management domain covers the attacks that&lt;br /&gt;
target the human gateway to gain access to data. Other topics include&lt;br /&gt;
ways to identify users with rights to access the information and&lt;br /&gt;
servers. Identity and access management covers the topics of&lt;br /&gt;
applications, Single sign-on authentication, privilege escalation,&lt;br /&gt;
Kerberos, rule-based or risk-based access control, proofing and&lt;br /&gt;
establishment of identity.&lt;br /&gt;
===Security Architecture and Engineering===&lt;br /&gt;
The security architecture and engineering domain covers important&lt;br /&gt;
topics concerning security engineering plans, designs and principles,&lt;br /&gt;
Topics include assessing and mitigating information system&lt;br /&gt;
vulnerabilities, fundamental concepts of security models and security&lt;br /&gt;
architectures in critical areas like access control. Cloud systems,&lt;br /&gt;
cryptography, system infiltrations (ransomware, fault-injection and&lt;br /&gt;
more) and virtualized systems are also covered in this domain.&lt;br /&gt;
===Asset Security===&lt;br /&gt;
The Asset Security domain deals with the issues related to the&lt;br /&gt;
collection, storage, maintenance, retention and destruction of data. It&lt;br /&gt;
also covers knowledge of different roles regarding data handling (owner,&lt;br /&gt;
controller and custodian) as well as data protection methods and data&lt;br /&gt;
states. Other topics include resource provision, asset classification&lt;br /&gt;
and data lifecycle management.&lt;br /&gt;
===Security and Risk Management===&lt;br /&gt;
The security and risk management domain covers general on skills&lt;br /&gt;
related to the implementation of user awareness programs as well as&lt;br /&gt;
security procedures. Emphasis is also placed on risk management&lt;br /&gt;
concerning the acquisition of new services, hardware and software&lt;br /&gt;
(supply chain). Other skills include social engineering defense&lt;br /&gt;
mechanisms.&lt;br /&gt;
===Security Assessment and Testing===&lt;br /&gt;
The security assessment and testing domain deals with all the&lt;br /&gt;
techniques and tools used to find system vulnerabilities, weaknesses and&lt;br /&gt;
potential areas of concern not addressed by security procedures and&lt;br /&gt;
policies. Attack simulations, vulnerability assessment, compliance&lt;br /&gt;
checks, and ethical disclosure also fall under this domain.&lt;br /&gt;
===Software Security===&lt;br /&gt;
The software development security domain deals with implementing&lt;br /&gt;
software-based security protocols within environment for which the IT&lt;br /&gt;
professional is responsible. Risk analysis, vulnerability identification&lt;br /&gt;
and auditing of source codes are all covered in this subset. Additional&lt;br /&gt;
topics include software-designed security, maturity models, development&lt;br /&gt;
methodologies, open-source and third-party development security.&lt;br /&gt;
===Security operations===&lt;br /&gt;
The security operations domain covers topics ranging from&lt;br /&gt;
investigations and digital forensic to detection and intrusion&lt;br /&gt;
prevention tools, sandboxing and firewalls. Topics include user and&lt;br /&gt;
entity behavior analytics, threat intelligence (threat hunting and&lt;br /&gt;
threat feeds) log management, artifacts (mobile, computer and network),&lt;br /&gt;
machine learning and AI-based tools, penetration testing, and&lt;br /&gt;
exploitation development. These for sub-domains are lister here.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Incident Handling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Penetration Testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Exploitation&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Education==&lt;br /&gt;
&amp;lt;p&amp;gt;The entry level monitoring specialist is hired by Estonian&lt;br /&gt;
Information System Authority even if there is no formal IT education,&lt;br /&gt;
but readiness to learn and moderate knowledge of different operation&lt;br /&gt;
systems is enough to start the career.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.cv.ee/en/vacancy/792782/riigi-infosusteemi-amet/seirespetsialist-tule-eesti-kuberruumi-valvuriks&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Nevertheless, like most other high qualification careers jobs falling&lt;br /&gt;
under the cybersecurity specialist category require some form of formal&lt;br /&gt;
education. However, since cybersecurity specialist jobs can fall across&lt;br /&gt;
a wide spectrum of job descriptions and responsibilities, it is possible&lt;br /&gt;
to obtain a specialist job after completing many levels of different&lt;br /&gt;
computer related education.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;If one is looking for a cybersecurity related education, for example&lt;br /&gt;
in EU, 137 courses/programs could be found that relate to keyword IT or&lt;br /&gt;
cybersecurity.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.enisa.europa.eu/topics/cybersecurity-education/education-map/education-courses&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Also, there is a great amount of discussion, if cuber security&lt;br /&gt;
professional should have a degree or would be certification just enough.&lt;br /&gt;
One interesting table is produces by Franklin University that compares&lt;br /&gt;
benefits and/or drawbacks of each type of credential.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image11.png&amp;quot; alt=&amp;quot;Comparison MSc vs certificate&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;Comparison MSc vs&lt;br /&gt;
certificate&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Certifications are generally good for people with little practical&lt;br /&gt;
experience because they are known quantities in the industry and can&lt;br /&gt;
help you get your foot in the door. They set a minimum knowledge bar.&lt;br /&gt;
But some certifications are viewed more favorably than others.&lt;br /&gt;
Certifications with renewal requirements are viewed better by hiring&lt;br /&gt;
managers, but they also more costly in the long run because of the need&lt;br /&gt;
for continuing education. Certifications are also good for showing&lt;br /&gt;
in-depth expertise in a specialization within cybersecurity. Depending&lt;br /&gt;
on your career goals, it may be advantageous to have a master’s&lt;br /&gt;
degree—which shows your breadth of knowledge, critical thinking and&lt;br /&gt;
leadership skills—and a certificate—which shows specific skill&lt;br /&gt;
competency.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;As IT (Cyber) Security is still a relatively young discipline,&lt;br /&gt;
universities and colleges are still figuring out which is the best&lt;br /&gt;
approach for their degrees. Study programmes and curricula in Cyber&lt;br /&gt;
Security are different. In general, here are the duration of Cyber&lt;br /&gt;
Security degrees:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Bachelor’s degrees in Cyber Security take 3 or 4 years in most&lt;br /&gt;
countries.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Master’s courses in Cyber Security take between 1-2 years to&lt;br /&gt;
complete.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;PhD programmes in Cyber Security last 3-5 years. Some only take 1&lt;br /&gt;
or 2 years, but they are less common.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Generalization could me made that on bachelor level the general&lt;br /&gt;
knowledge about the cyber issues are obtained. On master level the&lt;br /&gt;
specialization courses are taken and the person can choose more specific&lt;br /&gt;
topics to study. It is on master level where strengths of the cyber&lt;br /&gt;
specialist can be developed further and up-do date knowledge obtained in&lt;br /&gt;
specifics. PhD is serious science and involves teaching, lot of&lt;br /&gt;
scientific work and writing for publications.&amp;lt;/p&amp;gt;&lt;br /&gt;
==Salary==&lt;br /&gt;
&amp;lt;p&amp;gt;Even if the salary can be very different, compared to the skills and&lt;br /&gt;
experience, an generalization can be made. Cyber Security professionals&lt;br /&gt;
in CSIRT, and in other entities earn quite well, from the start. First,&lt;br /&gt;
some comparison from the United States. The average CSIRT analyst salary&lt;br /&gt;
in the USA is $97,500 per year or $50 per hour. Entry level positions&lt;br /&gt;
start at $48,875 per year while most experienced workers make up to&lt;br /&gt;
$135,373 per year.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.talent.com/salary?job=csirt+analyst&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;There are multiple positions you can occupy in this field. They have&lt;br /&gt;
in common great salaries and high demand for technical skills, attention&lt;br /&gt;
to details, problem-solving mentality, and the ability to analyze risks.&lt;br /&gt;
Here are the average annual salaries in the United States, according to&lt;br /&gt;
Payscale:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.payscale.com/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Cryptographer – 100,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Information Security Officer – 91,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Assessor – 90,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Engineer – 88,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Penetration Tester – 81,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Forensics Expert – 71,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Administrator – 65,000 USD&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When looking into salaries in Estonia, one can find that there is a&lt;br /&gt;
discussion that private sector is taking a toll from the public sector,&lt;br /&gt;
and that the salaries in important agencies, as Information System&lt;br /&gt;
Authority loose their employees to the better paid positions in private&lt;br /&gt;
sector.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://digi.geenius.ee/rubriik/uudis/kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad/&lt;br /&gt;
https://tehnika.postimees.ee/6887428/riigi-it-tootajate-palgamaarad-kasvasid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;But there is also a different view that average private sector worker&lt;br /&gt;
could be hired as a top specialist in public sector and then the payment&lt;br /&gt;
is higher. Nevertheless, it seems that the average payment in cyber&lt;br /&gt;
security sector is any way higher that in other parts of the&lt;br /&gt;
e-services.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://digi.geenius.ee/rubriik/uudis/5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka/&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
==SOC==&lt;br /&gt;
&amp;lt;p&amp;gt;A SOC is a facility where an organization’s network, applications,&lt;br /&gt;
and endpoints are monitored and defended. The term was adapted from&lt;br /&gt;
network operations centers (NOCs), where large telecommunication or&lt;br /&gt;
corporate networks are monitored. When network security became more of a&lt;br /&gt;
concern, security teams were formed within the NOCs, and eventually spun&lt;br /&gt;
off into larger organizations of their own as the responsibilities of&lt;br /&gt;
security teams grew increasingly complex and specialized. The security&lt;br /&gt;
staff working in a security operations center are often called the SOC&lt;br /&gt;
team.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Functions of the SOC team include, but are not limited to:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ol type=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Taking inventory of resources, to get a better understanding of the&lt;br /&gt;
structure they are protecting.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintanence of the system, by constantly making updates and adding&lt;br /&gt;
safeguards.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Monitoring the network for abnormalities with special tools.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Threat analysis of new attacks and vulnerabilities.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Responding to attacks, by acting as “first responders”. The SOC team&lt;br /&gt;
will shut down and/or isolate endpoints, deleting files and lowering the&lt;br /&gt;
impact as fast as possible.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Recovery of system stability and lost data. This may be done using&lt;br /&gt;
backups, restarting endpoints or reconfiguring systems.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Logging all actions on the system, to be later used for analysis or&lt;br /&gt;
forensics after an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigating the root cause of an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Auditing their own actions, to be in line with regulations of the&lt;br /&gt;
organization, industry or governing body.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.trellix.com/en-us/security-awareness/operations/what-is-soc.html&amp;lt;/p&amp;gt;&lt;br /&gt;
==CSIRT==&lt;br /&gt;
&amp;lt;p&amp;gt;A CSIRT is a group that responds to security incidents when they&lt;br /&gt;
occur. Key responsibilities of a CSIRT include: &lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
===Creating and maintaining an incident response plan (IRP)===&lt;br /&gt;
An incident response plan (IRP) is a set of written instructions for&lt;br /&gt;
detecting, responding to and limiting the effects of an information&lt;br /&gt;
security event. Incident response plans provide instructions for&lt;br /&gt;
responding to many potential scenarios, including data breaches, denial&lt;br /&gt;
of service/distributed denial of service attacks, firewall breaches,&lt;br /&gt;
virus or malware outbreaks or insider threats. Without an incident&lt;br /&gt;
response plan in place, organizations may either not detect the attack&lt;br /&gt;
in the first place, or not follow proper protocol to contain the threat&lt;br /&gt;
and recover from it when a breach is detected.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.stratacore.com/incidentresponseplan&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
===Investigating and analyzing incidents===&lt;br /&gt;
CSIRTs are also involved in improvement activities. After major&lt;br /&gt;
computer security incidents occur, or when incidents are not handled in&lt;br /&gt;
a timely or effective manner, a CSIRT will generally perform a&lt;br /&gt;
postmortem of the incident and its response. This postmortem will&lt;br /&gt;
identify the strengths and weakness of the response effort. Such reviews&lt;br /&gt;
can identify weaknesses and holes in systems, infrastructure defenses,&lt;br /&gt;
or policies that allowed the incident to take place. It can also&lt;br /&gt;
identify problems with communication channels, interfaces, and&lt;br /&gt;
procedures that inhibited the efficient resolution of the reported&lt;br /&gt;
problem.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.cisa.gov/uscert/bsi/articles/best-practices/incident-management/defining-computer-security-incident-response-teams&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Managing internal communications and updates during or immediately after incidents occur===&lt;br /&gt;
===Communicating with employees, shareholders, customers, and the press about incidents as needed===&lt;br /&gt;
&amp;lt;p&amp;gt;There are various services within the CSIRT Services Framework that&lt;br /&gt;
address communications, as they relate to security operations and&lt;br /&gt;
incident response services. Some of these include Information Security&lt;br /&gt;
Incident Coordination, Crisis Management Support, Vulnerability&lt;br /&gt;
Disclosure, Situational Awareness Communication, and Awareness Building,&lt;br /&gt;
to name a few. Sharing information and communicating with the general&lt;br /&gt;
public and/or your constituency is appropriate in many different&lt;br /&gt;
scenarios. These can range from proactive communications to reactive&lt;br /&gt;
communications. Each scenario may be unique, and careful consideration&lt;br /&gt;
should be given to when to release information to the public and what&lt;br /&gt;
information should be released.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;https://resources.sei.cmu.edu/asset_files/Handbook/2021_002_001_651819.pdf&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Remediating incidents===&lt;br /&gt;
Threat remediation is a strong and capable tool for fighting the&lt;br /&gt;
cyber security compromises. As the word ‘remedy’ suggests, remediation&lt;br /&gt;
process involves the treatment of a security breach. With the&lt;br /&gt;
remediation practices, your cyber security team is able to eliminate&lt;br /&gt;
suspicious activities and malicious attacks in the form of malware,&lt;br /&gt;
ransomware, phishing and such. Even if you ‘kill’ the suspicious&lt;br /&gt;
activity, the attackers can remain in your systems. If you want to&lt;br /&gt;
contaminate and end the problem for good, your remediation processes&lt;br /&gt;
must involve the detection of the cause. &amp;lt;ref name=&amp;quot;logsign&amp;quot;&amp;gt;Logsign, &amp;quot;What-is-remediation-in-cyber-security&amp;quot;. Available: https://www.logsign.com/blog/what-is-remediation-in-cyber-security/. [Accessed 28 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Recommending technology, policy, governance, and training changes after security incidents===&lt;br /&gt;
After all these actions, the SCIRT must contribute to the development&lt;br /&gt;
of better policies, practices and has to recommend improvements. They&lt;br /&gt;
are not working in the vacuum and their work has to create new and&lt;br /&gt;
better standards for cyber security. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;Exabeam, &amp;quot;CSIRT&amp;quot;. Available: https://www.exabeam.com/incident-response/csirt/ [Accessed 28 APr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==CERT==&lt;br /&gt;
&amp;lt;p&amp;gt;The term “computer emergency response team” was coined in 1988. In&lt;br /&gt;
response to the Morris worm attack that impacted thousands of servers on&lt;br /&gt;
the Internet, DARPA funded the formation of the Computer Emergency&lt;br /&gt;
Response Team Coordination Center (CERT-CC) at Carnegie Mellon&lt;br /&gt;
University. The goal of CERT-CC was to help protect the internet by&lt;br /&gt;
collecting and disseminating information on critical security&lt;br /&gt;
vulnerabilities. Several other countries formed similar centers using&lt;br /&gt;
the same acronym (despite threats of legal action by Carnegie Mellon for&lt;br /&gt;
trademark infringement). Now the term CERT refers to any emergency&lt;br /&gt;
response team that deals with cyber threats. Many people use CERT-CC&lt;br /&gt;
interchangeably with CSIRT, though the charter of a CERT is information&lt;br /&gt;
sharing in order to help other response teams respond to threats against&lt;br /&gt;
their own infrastructure.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In general, the designation of CERT is helpful in applying real-world&lt;br /&gt;
solutions to various cybersecurity problems. They may be government&lt;br /&gt;
contractors or employees of a major corporation. For example, the U.S.&lt;br /&gt;
Computer Emergency Readiness Team (US-CERT) operates under the U.S.&lt;br /&gt;
Department of Homeland Security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.techopedia.com/definition/31003/computer-emergency-response-team-cert&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In Estonia CERT is designated as CERT-EE. It was established in 2006,&lt;br /&gt;
as an organization responsible for the management of security incidents&lt;br /&gt;
in .ee computer networks. It is also a national contact point for&lt;br /&gt;
international co-operation in the field of IT security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ria.ee/en/cyber-security/cert-ee.html&amp;lt;/p&amp;gt;&lt;br /&gt;
===Difference between SOC/CSIRT/CERT===&lt;br /&gt;
&amp;lt;p&amp;gt;How CSIRTs differ from CERTs and SOCs There are overlapping&lt;br /&gt;
responsibilities between a community emergency response team (CERT),&lt;br /&gt;
computer security incident response team (CSIRT), and security&lt;br /&gt;
operations center (SOC). To add to this confusion, frequently, the terms&lt;br /&gt;
CERT and CSIRT are used interchangeably, despite the important&lt;br /&gt;
differences.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image3.png&amp;quot; alt=&amp;quot;Overlapping in images/image3.png&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;Overlapping in&lt;br /&gt;
images/image3.png&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
==Understand the primary roles and characteristics of a CERT, CSIRT, and SOC.==&lt;br /&gt;
&amp;lt;p&amp;gt;So, using strict definitions, a CERT collects and disseminates&lt;br /&gt;
security information, typically for the benefit of a country or an&lt;br /&gt;
industry. A CSIRT is a cross-functional team that responds to incidents&lt;br /&gt;
on behalf of a country or an organization. A SOC is where a country or&lt;br /&gt;
organization monitors and defends its network, servers, applications,&lt;br /&gt;
and endpoints.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image4.png&amp;quot; alt=&amp;quot;table of explanation images/image4&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;table of explanation&lt;br /&gt;
images/image4&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
==Future==&lt;br /&gt;
&amp;lt;p&amp;gt;And the Cyber security problem is only getting bigger. According to a&lt;br /&gt;
report published by Accenture, the number of cyber security breaches&lt;br /&gt;
increased by 11 percent from 2017 to 2018. The cost of such breaches is&lt;br /&gt;
astronomical–about $600 billion worldwide, according to the Economic&lt;br /&gt;
Impact of Cybercrime report.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Job projections for cybersecurity are staggering. The Bureau of Labor&lt;br /&gt;
Statistics in US predicts that careers in the cybersecurity field will&lt;br /&gt;
grow by 32% by 2028. That makes cybersecurity one of the top 10&lt;br /&gt;
fastest-growing jobs in the country. In the United States alone, jobs&lt;br /&gt;
for Information Security Analysts are expected to grow by 15% by&lt;br /&gt;
2024.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Most likely this trend is also similar in other countries.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When checking Estonian job portals, there is a constant need for&lt;br /&gt;
people for cyber security related positions. Also, linkedin search gives&lt;br /&gt;
approximately 30 vacancies immediately. There are banks, logistics&lt;br /&gt;
companies, e-shops, and software producers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://ee.linkedin.com/jobs/cyber-security-jobs?countryRedirected=1&amp;amp;amp;position=1&amp;amp;amp;pageNum=0&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Trends that affect companies create need for constant cyber security&lt;br /&gt;
services. Increasing number of home/remote offices require secure&lt;br /&gt;
corporate networks and security of remote devices. One example is from&lt;br /&gt;
this year, when sloppy remote desktop set-up paralyzed systems of 17&lt;br /&gt;
companies.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.aripaev.ee/uudised/2022/04/20/ria-lohakas-kaugtoolaua-seadistus-halvas-martsis-vahemalt-17-juhul-ettevotete-it-susteemid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Also, no service can exists without robust infrastructure - servers,&lt;br /&gt;
databases, applications. As all previously mentioned devices and&lt;br /&gt;
services are at constant scanning and surveillance. So, the breach&lt;br /&gt;
detection and immediate action demands 24/7 services. Even if lot of&lt;br /&gt;
things could be automated, there is a need for human specialists (at&lt;br /&gt;
least, at the moment). Third growing field is also a forensic&lt;br /&gt;
investigation, as every attack must be investigated in order to be ready&lt;br /&gt;
to repel next attacks. So data recovery and evidence collection is&lt;br /&gt;
another important field of work that need skilled and professional&lt;br /&gt;
workers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Even, if the specifics of the entity, be it CSIRT, CERT or SOC, are&lt;br /&gt;
different, the fundamentals of the work are the same. Professional&lt;br /&gt;
knowledge of the networks, operational systems, hardware, scripting, and&lt;br /&gt;
several other wider IT related knowledge is needed. As there is no&lt;br /&gt;
single way to reach to it, every single person can find one’s strongest&lt;br /&gt;
sides and develop them with knowledge of weaker side, in order to know,&lt;br /&gt;
when to as for help.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/body&amp;gt;&lt;br /&gt;
&amp;lt;/html&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mavald</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142186</id>
		<title>Hiring a Cyber Security Incident Analyst</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142186"/>
		<updated>2022-05-01T14:51:30Z</updated>

		<summary type="html">&lt;p&gt;Mavald: /* CSIRT */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==A Cyber Security Incident Analyst==&lt;br /&gt;
&lt;br /&gt;
[[File:image1.png|600px|thumb|Job advertisement &amp;lt;ref&amp;gt;&amp;quot;Job Advertisement&amp;quot;. Available at https://www.projectpeople.com/jobs/&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
===Cyber security incident analyst in SOC/CSIRT/CERT===&lt;br /&gt;
This article delves into the job title of Cyber Security Incident&lt;br /&gt;
Analyst and provides an overview of the acronyms SOC/CSIRT/CERT. A brief&lt;br /&gt;
history of the job is discussed here, as well as a possible career path,&lt;br /&gt;
education, experience, and other characteristics required for work in&lt;br /&gt;
computer security-related organizations. The article also provides a&lt;br /&gt;
brief history of SOC/CSIRT/CERT, as well as a comparison of their&lt;br /&gt;
differences and similarities.&lt;br /&gt;
===Cyber Security Incident Analyst Skill Set===&lt;br /&gt;
What skill set is expected from the Cyber Security Incident Analyst? Below written lines are taken from the same job advertisement depicted&lt;br /&gt;
on the left side of this article:&lt;br /&gt;
As a Security Incident Analyst your responsibilities will include:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Continuous monitoring of security tooling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Performing regular and ad-hoc vulnerability assessments&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Carrying out ‘spot checks’&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Reporting vulnerabilities to the PVG via the alerts system&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintaining and documenting logging systems&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Developing centralized logging, reporting and intelligence&lt;br /&gt;
platforms&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;‘Light touch’ penetration testing with open source tooling&lt;br /&gt;
(Metasploit)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Knowledge &amp;amp;amp; Experience required:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;SOC, CSIRT or CERT operational environment experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Windows / Linux experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TCP /IP networking protocol knowledge&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience reviewing and analyzing Security Events from various&lt;br /&gt;
monitoring and logging sources&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience in website and web application security assessment or&lt;br /&gt;
penetration testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience of using Metasploit&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Scripting knowledge using BASH, Python, Perl, Ruby&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Skills in Host and Network Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
As one can see the description of the duties is wide and also the&lt;br /&gt;
knowledge and experience that is required is noteworthy. So, where to&lt;br /&gt;
start to find out the way to get this kind of knowledge and&lt;br /&gt;
expertize.&lt;br /&gt;
===Possible career path===&lt;br /&gt;
Next part of the paper is aiming to depict a possible ways, how to&lt;br /&gt;
develop oneself, and move along the career pathway in cybersecurity&lt;br /&gt;
field. Topics of development, education, experience and certification&lt;br /&gt;
are covered.&lt;br /&gt;
[[File:analystimage2.png|1000px|thumb|Career path &amp;lt;ref&amp;gt;&amp;quot;Possible Career Path&amp;quot;. Available at https://www.cyberseek.org/pathway.html&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
===Junior/Senior===&lt;br /&gt;
Start with an entry-level job in IT. Hands-on experience is often the&lt;br /&gt;
most effective way to prepare for certification exams. Start&lt;br /&gt;
accumulating work experience with an entry-level role as a cybersecurity&lt;br /&gt;
analyst. Many cybersecurity professionals start off in more general IT&lt;br /&gt;
roles. The skills, practices, and technologies you’ll use as a&lt;br /&gt;
cybersecurity professional will continue to evolve along with computer&lt;br /&gt;
and network technology. The desire to learn, ability to problem solve,&lt;br /&gt;
and attention to detail will serve you well in this field. Other, more&lt;br /&gt;
technical skills and technologies to learn include:&amp;lt;ref name=&amp;quot;certification&amp;quot;&amp;gt;Popular Cyber Security Certificates [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications  [Accessed 25 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====SIEM tools (security information and event management)====&lt;br /&gt;
Security Information and Event Management (SIEM) is a set of tools&lt;br /&gt;
and services offering a holistic view of an organization’s information&lt;br /&gt;
security. SIEM works by combining two technologies:&lt;br /&gt;
&amp;lt;li&amp;gt;Security information management (SIM), which collects data from log&lt;br /&gt;
files for analysis and reports on security threats and events, and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;security event management (SEM), which conducts real-time system&lt;br /&gt;
monitoring, notifies network admins about important issues and&lt;br /&gt;
establishes correlations between security events. There are a number of&lt;br /&gt;
security information and event management solutions on the market.&lt;br /&gt;
ArcSight ESM, IBM QRadar and Splunk are among the most popular. &amp;lt;ref name=&amp;quot;SIEM&amp;quot;&amp;gt;Application security, SIEM [Online]. Available: https://www.imperva.com/learn/application-security/siem/. [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Firewalls, Intrusion Detection Systems (IDS), and Intrusion Prevention Systems(IPS)====&lt;br /&gt;
Firewalls can be two types, hardware and software firewalls. Software&lt;br /&gt;
firewall is a firewall that is installed on a computer or server, and&lt;br /&gt;
tasked with network security. It works with a wide variety of other&lt;br /&gt;
technology security solutions to provide more robust and cohesive&lt;br /&gt;
security for enterprises of all sizes. When a software firewall is&lt;br /&gt;
installed on a server, it opens up like an umbrella of protection over&lt;br /&gt;
all other computers connected to the network. It is able to monitor both&lt;br /&gt;
incoming and outgoing traffic for potential risk or suspicious user&lt;br /&gt;
behavior, and also makes setting security policies much easier, faster&lt;br /&gt;
and more flexible. Hardware firewall is positioned between the network&lt;br /&gt;
and devices, allowing traffic to funnel through the firewall for a close&lt;br /&gt;
inspection and analysis. A hardware firewall, a term often&lt;br /&gt;
interchangeable with network or next-generation firewall, protects the&lt;br /&gt;
network gateways for an enterprise. Hardware firewall is physical&lt;br /&gt;
hardware, installed between network elements and connected devices, and&lt;br /&gt;
is tasked with filtering traffic for cyber threat to the network or&lt;br /&gt;
devices. Filtering out unauthorized or suspicious users based on traffic&lt;br /&gt;
analysis is one of the biggest benefits of hardware firewall. &amp;lt;ref name=&amp;quot;sangfor&amp;quot;&amp;gt;Sangfor, &amp;quot;What is Software Firewall? Difference between Hardware Firewall and Software Firewall, [Online]. Available: https://www.sangfor.com/blog/cybersecurity/what-is-software-firewall-difference-between-hardware-firewall-and-software-firewall [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems&lt;br /&gt;
(IPS) are both parts of the network infrastructure. IDS/IPS compare&lt;br /&gt;
network packets to a cyberthreat database containing known signatures of&lt;br /&gt;
cyberattacks — and flag any matching packets. IDS doesn’t alter the&lt;br /&gt;
network packets in any way, whereas IPS prevents the packet from&lt;br /&gt;
delivery based on the contents of the packet, much like how a firewall&lt;br /&gt;
prevents traffic by IP address. &amp;lt;ref name=&amp;quot;Varonis&amp;quot;&amp;gt;Varonis, &amp;quot;What is Software Firewall? IDS vs. IPS: What is the Difference?, [Online]. Available: https://www.varonis.com/blog/ids-vs-ips [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Digital forensics====&lt;br /&gt;
Digital forensics is a branch of forensic science that focuses on&lt;br /&gt;
identifying, acquiring, processing, analyzing, and reporting on data&lt;br /&gt;
stored electronically. Electronic evidence is a component of almost all&lt;br /&gt;
criminal activities and digital forensics support is crucial for law&lt;br /&gt;
enforcement investigations. Electronic evidence can be collected from a&lt;br /&gt;
wide array of sources, such as computers, smartphones, remote storage,&lt;br /&gt;
unmanned aerial systems, shipborne equipment, and more.&amp;lt;ref name=&amp;quot;interpol&amp;quot;&amp;gt;Interpol, &amp;quot;Digital forensics&amp;quot;. Available: https://www.interpol.int/How-we-work/Innovation/Digital-forensics. [Accessed 28 4 2022].&amp;lt;/ref&amp;gt; &lt;br /&gt;
Investigative process of digital forensics can be divided into several stages. There are four major stages: preservation, collection,&lt;br /&gt;
examination, and analysis. All these four stages need a deep understanding of computers, technology across a broad spectrum, and cybersecurity principles and&lt;br /&gt;
practices, a working knowledge of computers, networks, and coding, in-depth investigative abilities, critical-thinking skills and analytical talent the ability to effectively communicate and work with a&lt;br /&gt;
wide range of people. &amp;lt;ref name=&amp;quot;ecpi&amp;quot;&amp;gt;&amp;quot;Digital forensics&amp;quot;. Available: https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me. [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Mobile device management====&lt;br /&gt;
Mobile device management (MDM) is software that allows IT&lt;br /&gt;
administrators to control, secure and enforce policies on smartphones,&lt;br /&gt;
tablets and other endpoints. Mobile device management software emerged&lt;br /&gt;
in the early 2000s as a way to control and secure the personal digital&lt;br /&gt;
assistants and smartphones that business workers began to use. The&lt;br /&gt;
consumer smartphone boom that started with the launch of the Apple&lt;br /&gt;
iPhone in 2007 led to the bring your own device (BYOD) trend, which&lt;br /&gt;
fueled further interest in MDM.&amp;lt;ref name=&amp;quot;techtarget&amp;quot;&amp;gt;Techtarget, &amp;quot;Mobile Device Management&amp;quot;. Available: https://www.techtarget.com/searchmobilecomputing/definition/mobile-device-management [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Data management====&lt;br /&gt;
Sometimes the data management is neglected, but this part has a&lt;br /&gt;
crucial role when learning for good cyber security practices. Majority&lt;br /&gt;
of cyber security programs include a special courses on data management.&lt;br /&gt;
Data management is a method of organizing and maintaining data processes&lt;br /&gt;
that are required in almost every business operations. The benefits of&lt;br /&gt;
data management can be found accounting, statistics, logistics planning&lt;br /&gt;
and other disciplines including corporate computing.&amp;lt;ref name=&amp;quot;GlobalUni&amp;quot;&amp;gt;Global Universities, &amp;quot;MSc Data Management and Cyber Security&amp;quot;. Available: https://globaluniversities.in/msc-data-management-cyber-security. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Data governance (and management) play a fundamental role in&lt;br /&gt;
protecting an organization’s data. Ensuring that the right people have&lt;br /&gt;
the right access and that appropriate security controls are in place to&lt;br /&gt;
protect each system or service, based on the criticality or sensitivity&lt;br /&gt;
of the data sets these contain. &amp;lt;ref name=&amp;quot;CyberMagazine&amp;quot;&amp;gt;Cyber Security Magazine, &amp;quot;The Role of Data Governance in Cybersecurity&amp;quot;. Available: https://cybersecurity-magazine.com/the-role-of-data-governance-in-cybersecurity/?utm_source=rss&amp;amp;amp;utm_medium=rss&amp;amp;amp;utm_campaign=the-role-of-data-governance-in-cybersecurity. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Application security development====&lt;br /&gt;
Application security describes security measures at the application&lt;br /&gt;
level that aim to prevent data or code within the app from being stolen&lt;br /&gt;
or hijacked. It encompasses the security considerations that happen&lt;br /&gt;
during application development and design, but it also involves systems&lt;br /&gt;
and approaches to protect apps after they get deployed. Application&lt;br /&gt;
security may include hardware, software, and procedures that identify or&lt;br /&gt;
minimize security vulnerabilities.&lt;br /&gt;
https://www.vmware.com/topics/glossary/content/application-security.html&lt;br /&gt;
Application security development is important to ensure that your&lt;br /&gt;
application is free from coding errors and bugs. And controls the risk&lt;br /&gt;
and helps safeguard against security vulnerabilities. Application&lt;br /&gt;
security development is the process of making applications more secure&lt;br /&gt;
by finding and fixing security vulnerabilities. This is often done by&lt;br /&gt;
enforcing software security best practices and using application&lt;br /&gt;
security testing tools.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.perforce.com/blog/kw/application-security-development-best-practices&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Audit and compliance knowledge====&lt;br /&gt;
A cyber security audit is designed to be a comprehensive review and&lt;br /&gt;
analysis of your business’s IT infrastructure. It identifies threats and&lt;br /&gt;
vulnerabilities, exposing weaknesses and high-risk practices.&lt;br /&gt;
Regulations such as the EU GDPR (General Data Protection Regulation) can&lt;br /&gt;
impose hefty penalties in the event of a breach that results in&lt;br /&gt;
exploited data. A cyber security audit will help mitigate the&lt;br /&gt;
consequences of a breach and demonstrate that your organization has&lt;br /&gt;
taken the necessary steps to protect client and company data.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://cyforsecure.co.uk/services/cyber-assessment/cyber-security-audit/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Cybersecurity compliance is the organizational risk management method&lt;br /&gt;
aligned with pre-defined security measures &amp;amp;amp; controls on how data&lt;br /&gt;
confidentiality is ensured by its administrational procedures.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://nordlayer.com/blog/cybersecurity-compliance-everything-you-need-to-know/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;All needed skills are developed through courses and&lt;br /&gt;
certification.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
===Entry-Level Incident Response Positions===&lt;br /&gt;
&amp;lt;p&amp;gt;It is not always possible to advance to the position of incident&lt;br /&gt;
responder in a straight line. Many professionals advance from entry- to&lt;br /&gt;
mid-level positions before becoming a real incident responder or a&lt;br /&gt;
member of a computer emergency response team (CERT).&amp;lt;br /&amp;gt;&lt;br /&gt;
These are some examples:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;network-administrator&amp;quot;&amp;gt;Network administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;This position’s experience will help potential incident responders&lt;br /&gt;
develop networking skills. Attention to detail, as well as the ability&lt;br /&gt;
to sift through system configurations, site layouts, and general network&lt;br /&gt;
and communication setups, are essential in this field.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;system-administrator&amp;quot;&amp;gt;System administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Another crucial beginning point for an incident responder is to learn&lt;br /&gt;
how to manage resources inside your organization as well as user&lt;br /&gt;
behavior. Understanding the potential damage that users, inadequate&lt;br /&gt;
security setups, and ineffective IT policies and procedures can cause on&lt;br /&gt;
your network can provide prospective candidates with insight into the&lt;br /&gt;
human component of an incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;security-administrator&amp;quot;&amp;gt;Security administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In such a position, basic hacking skills, penetration testing, and&lt;br /&gt;
intrusion detection are all learned, which are crucial incident&lt;br /&gt;
responder skills when trying to replicate a breach or attack.&lt;br /&gt;
Understanding the paths a cybercriminal will take when attempting to&lt;br /&gt;
damage or obtain access to a system can greatly simplify the work of&lt;br /&gt;
reverse engineering the incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://resources.infosecinstitute.com/topic/incident-responder-career-roadmap-entry-level-executive/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3 id=&amp;quot;mid-level-incident-response-positions&amp;quot;&amp;gt;Mid-Level Incident&lt;br /&gt;
Response Positions&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5&lt;br /&gt;
id=&amp;quot;computer-security-incident-response-team-csirt-engineer&amp;quot;&amp;gt;Computer&lt;br /&gt;
security incident response team (CSIRT) engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;cyber-incident-responder&amp;quot;&amp;gt;Cyber incident responder&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-response-engineer&amp;quot;&amp;gt;Incident response&lt;br /&gt;
engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;While each of these positions is different, they generally require&lt;br /&gt;
very similar skills and characteristics in a candidate. At this level,&lt;br /&gt;
personal characteristics such as problem solving, time management, and&lt;br /&gt;
even presentation skills become more crucial as one’s career evolves&lt;br /&gt;
into a management-facing role.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Technical skills include the ability to identify and minimize threats&lt;br /&gt;
while maintaining communication with management and the rest of your&lt;br /&gt;
team. Data analysis and evidence gathering become increasingly crucial,&lt;br /&gt;
and the circumstances in which your services are deployed get more&lt;br /&gt;
serious.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Problem-solving skills are crucial at this level of incident&lt;br /&gt;
response, and as the stakes rise, so does the pressure in each&lt;br /&gt;
situation. At this level, programming abilities are essential since&lt;br /&gt;
incident responders may be needed to reverse engineer malicious code or&lt;br /&gt;
even create patches for vulnerable network applications or services.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.coursera.org/articles/popular-cybersecurity-certifications&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3 id=&amp;quot;senior-level-incident-response-positions&amp;quot;&amp;gt;Senior-Level Incident&lt;br /&gt;
Response Positions&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;intrusion-detection-specialist&amp;quot;&amp;gt;Intrusion detection&lt;br /&gt;
specialist:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;A CISSP certification might help a potential candidate in preparing&lt;br /&gt;
for the profession. The role of an intrusion detection specialist is to&lt;br /&gt;
find and stop any unwanted communications.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-manager&amp;quot;&amp;gt;Incident manager:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Expected to plan, oversee, manage, and supervise all incident&lt;br /&gt;
response team actions. Is in charge of reporting all current events to&lt;br /&gt;
senior management and stakeholders, as well as acting as the technical&lt;br /&gt;
lead on active incidents for incident responders. Prepares threat and&lt;br /&gt;
impact assessments and reports them known to management.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.coursera.org/articles/popular-cybersecurity-certifications&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Certificates== &lt;br /&gt;
There is a vast number of different certificates and the road map to&lt;br /&gt;
being a certified professional could be very different&amp;lt;ref name=&amp;quot;Coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated],&amp;quot; [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;NICCS&amp;quot;&amp;gt;NICCS, &amp;quot;Cybersecurity Certifications,&amp;quot; [Online]. Available: hhttps://niccs.cisa.gov/about-niccs/cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt; . One possible&lt;br /&gt;
approach is to start with basic certificates from the different branches&lt;br /&gt;
of service and move to more specific and demanding focused&lt;br /&gt;
certification. Also, some jobs require certain clearances, either from&lt;br /&gt;
industry, or from the government. One small selection of different&lt;br /&gt;
possible certificates is brought out in following paragraphs.&lt;br /&gt;
&lt;br /&gt;
Security+ is a CompTIA certification that is considered a basic cert&lt;br /&gt;
among cybersecurity professionals. It covers the topics of risk&lt;br /&gt;
management and threat assessment.&lt;br /&gt;
Network+ is also offered by CompTIA this certification (like the name&lt;br /&gt;
implies) focuses on networking infrastructure and operations. It is&lt;br /&gt;
considered a foundational certification.&lt;br /&gt;
The Certified Information Systems Security Professional (CISSP) is a&lt;br /&gt;
more advanced certification designed for cybersecurity professionals&lt;br /&gt;
with at least five years of work experience. The certification covers&lt;br /&gt;
topics such as architecture, engineering, and management.&amp;lt;/p&amp;gt;&lt;br /&gt;
The Certified Ethical Hacker (CEH) certification is also considered a&lt;br /&gt;
more advanced cert because it generally requires that applicants have&lt;br /&gt;
multiple years of work experience. The goal of an ethical hacker&lt;br /&gt;
certification is to be able to understand how cyber attacks unfold in&lt;br /&gt;
order to improve threat assessment and mitigation skills.&amp;lt;ref name=&amp;quot;cyberguide&amp;quot;&amp;gt;Cybersecurity Guide, &amp;quot;How to become a cybersecurity specialist&amp;quot;, [Online]. Available: https://cybersecurityguide.org/careers/security-specialist/. [Accessed 27 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
This is definitely not all, when one looks for more information, following link could be searched, to get more in depth knowledge about&lt;br /&gt;
different possibilities. Hereby, with the help of this matrix a possible taxonomy of different 436 listed certificates in branches are&lt;br /&gt;
presented.&amp;lt;ref name=&amp;quot;Pauljeremy&amp;quot;&amp;gt;&amp;quot;Cybersecurity Roadmap,&amp;quot; [Online]. Available: https://pauljerimy.com/2020/10/12/scr-oct-2020-update/. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:analystimage5.png|1000px|thumb|Certificate matrix &amp;lt;ref&amp;gt;&amp;quot;Certification roadmap&amp;quot;. Available at https://pauljerimy.com/security-certification-roadmap&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
=== Communication and Network Security===&lt;br /&gt;
Communication and network security covers the ability to secure&lt;br /&gt;
communication channels and networks. Topics include secure and converges&lt;br /&gt;
protocols, wireless networks, cellular networks, hardware operations&lt;br /&gt;
(warranty and redundant power), and third-party connectivity. IP&lt;br /&gt;
networking are also included in this domain.&lt;br /&gt;
===Identity and Access Management===&lt;br /&gt;
The identity and access management domain covers the attacks that&lt;br /&gt;
target the human gateway to gain access to data. Other topics include&lt;br /&gt;
ways to identify users with rights to access the information and&lt;br /&gt;
servers. Identity and access management covers the topics of&lt;br /&gt;
applications, Single sign-on authentication, privilege escalation,&lt;br /&gt;
Kerberos, rule-based or risk-based access control, proofing and&lt;br /&gt;
establishment of identity.&lt;br /&gt;
===Security Architecture and Engineering===&lt;br /&gt;
The security architecture and engineering domain covers important&lt;br /&gt;
topics concerning security engineering plans, designs and principles,&lt;br /&gt;
Topics include assessing and mitigating information system&lt;br /&gt;
vulnerabilities, fundamental concepts of security models and security&lt;br /&gt;
architectures in critical areas like access control. Cloud systems,&lt;br /&gt;
cryptography, system infiltrations (ransomware, fault-injection and&lt;br /&gt;
more) and virtualized systems are also covered in this domain.&lt;br /&gt;
===Asset Security===&lt;br /&gt;
The Asset Security domain deals with the issues related to the&lt;br /&gt;
collection, storage, maintenance, retention and destruction of data. It&lt;br /&gt;
also covers knowledge of different roles regarding data handling (owner,&lt;br /&gt;
controller and custodian) as well as data protection methods and data&lt;br /&gt;
states. Other topics include resource provision, asset classification&lt;br /&gt;
and data lifecycle management.&lt;br /&gt;
===Security and Risk Management===&lt;br /&gt;
The security and risk management domain covers general on skills&lt;br /&gt;
related to the implementation of user awareness programs as well as&lt;br /&gt;
security procedures. Emphasis is also placed on risk management&lt;br /&gt;
concerning the acquisition of new services, hardware and software&lt;br /&gt;
(supply chain). Other skills include social engineering defense&lt;br /&gt;
mechanisms.&lt;br /&gt;
===Security Assessment and Testing===&lt;br /&gt;
The security assessment and testing domain deals with all the&lt;br /&gt;
techniques and tools used to find system vulnerabilities, weaknesses and&lt;br /&gt;
potential areas of concern not addressed by security procedures and&lt;br /&gt;
policies. Attack simulations, vulnerability assessment, compliance&lt;br /&gt;
checks, and ethical disclosure also fall under this domain.&lt;br /&gt;
===Software Security===&lt;br /&gt;
The software development security domain deals with implementing&lt;br /&gt;
software-based security protocols within environment for which the IT&lt;br /&gt;
professional is responsible. Risk analysis, vulnerability identification&lt;br /&gt;
and auditing of source codes are all covered in this subset. Additional&lt;br /&gt;
topics include software-designed security, maturity models, development&lt;br /&gt;
methodologies, open-source and third-party development security.&lt;br /&gt;
===Security operations===&lt;br /&gt;
The security operations domain covers topics ranging from&lt;br /&gt;
investigations and digital forensic to detection and intrusion&lt;br /&gt;
prevention tools, sandboxing and firewalls. Topics include user and&lt;br /&gt;
entity behavior analytics, threat intelligence (threat hunting and&lt;br /&gt;
threat feeds) log management, artifacts (mobile, computer and network),&lt;br /&gt;
machine learning and AI-based tools, penetration testing, and&lt;br /&gt;
exploitation development. These for sub-domains are lister here.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Incident Handling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Penetration Testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Exploitation&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Education==&lt;br /&gt;
&amp;lt;p&amp;gt;The entry level monitoring specialist is hired by Estonian&lt;br /&gt;
Information System Authority even if there is no formal IT education,&lt;br /&gt;
but readiness to learn and moderate knowledge of different operation&lt;br /&gt;
systems is enough to start the career.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.cv.ee/en/vacancy/792782/riigi-infosusteemi-amet/seirespetsialist-tule-eesti-kuberruumi-valvuriks&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Nevertheless, like most other high qualification careers jobs falling&lt;br /&gt;
under the cybersecurity specialist category require some form of formal&lt;br /&gt;
education. However, since cybersecurity specialist jobs can fall across&lt;br /&gt;
a wide spectrum of job descriptions and responsibilities, it is possible&lt;br /&gt;
to obtain a specialist job after completing many levels of different&lt;br /&gt;
computer related education.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;If one is looking for a cybersecurity related education, for example&lt;br /&gt;
in EU, 137 courses/programs could be found that relate to keyword IT or&lt;br /&gt;
cybersecurity.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.enisa.europa.eu/topics/cybersecurity-education/education-map/education-courses&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Also, there is a great amount of discussion, if cuber security&lt;br /&gt;
professional should have a degree or would be certification just enough.&lt;br /&gt;
One interesting table is produces by Franklin University that compares&lt;br /&gt;
benefits and/or drawbacks of each type of credential.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image11.png&amp;quot; alt=&amp;quot;Comparison MSc vs certificate&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;Comparison MSc vs&lt;br /&gt;
certificate&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Certifications are generally good for people with little practical&lt;br /&gt;
experience because they are known quantities in the industry and can&lt;br /&gt;
help you get your foot in the door. They set a minimum knowledge bar.&lt;br /&gt;
But some certifications are viewed more favorably than others.&lt;br /&gt;
Certifications with renewal requirements are viewed better by hiring&lt;br /&gt;
managers, but they also more costly in the long run because of the need&lt;br /&gt;
for continuing education. Certifications are also good for showing&lt;br /&gt;
in-depth expertise in a specialization within cybersecurity. Depending&lt;br /&gt;
on your career goals, it may be advantageous to have a master’s&lt;br /&gt;
degree—which shows your breadth of knowledge, critical thinking and&lt;br /&gt;
leadership skills—and a certificate—which shows specific skill&lt;br /&gt;
competency.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;As IT (Cyber) Security is still a relatively young discipline,&lt;br /&gt;
universities and colleges are still figuring out which is the best&lt;br /&gt;
approach for their degrees. Study programmes and curricula in Cyber&lt;br /&gt;
Security are different. In general, here are the duration of Cyber&lt;br /&gt;
Security degrees:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Bachelor’s degrees in Cyber Security take 3 or 4 years in most&lt;br /&gt;
countries.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Master’s courses in Cyber Security take between 1-2 years to&lt;br /&gt;
complete.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;PhD programmes in Cyber Security last 3-5 years. Some only take 1&lt;br /&gt;
or 2 years, but they are less common.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Generalization could me made that on bachelor level the general&lt;br /&gt;
knowledge about the cyber issues are obtained. On master level the&lt;br /&gt;
specialization courses are taken and the person can choose more specific&lt;br /&gt;
topics to study. It is on master level where strengths of the cyber&lt;br /&gt;
specialist can be developed further and up-do date knowledge obtained in&lt;br /&gt;
specifics. PhD is serious science and involves teaching, lot of&lt;br /&gt;
scientific work and writing for publications.&amp;lt;/p&amp;gt;&lt;br /&gt;
==Salary==&lt;br /&gt;
&amp;lt;p&amp;gt;Even if the salary can be very different, compared to the skills and&lt;br /&gt;
experience, an generalization can be made. Cyber Security professionals&lt;br /&gt;
in CSIRT, and in other entities earn quite well, from the start. First,&lt;br /&gt;
some comparison from the United States. The average CSIRT analyst salary&lt;br /&gt;
in the USA is $97,500 per year or $50 per hour. Entry level positions&lt;br /&gt;
start at $48,875 per year while most experienced workers make up to&lt;br /&gt;
$135,373 per year.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.talent.com/salary?job=csirt+analyst&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;There are multiple positions you can occupy in this field. They have&lt;br /&gt;
in common great salaries and high demand for technical skills, attention&lt;br /&gt;
to details, problem-solving mentality, and the ability to analyze risks.&lt;br /&gt;
Here are the average annual salaries in the United States, according to&lt;br /&gt;
Payscale:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.payscale.com/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Cryptographer – 100,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Information Security Officer – 91,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Assessor – 90,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Engineer – 88,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Penetration Tester – 81,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Forensics Expert – 71,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Administrator – 65,000 USD&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When looking into salaries in Estonia, one can find that there is a&lt;br /&gt;
discussion that private sector is taking a toll from the public sector,&lt;br /&gt;
and that the salaries in important agencies, as Information System&lt;br /&gt;
Authority loose their employees to the better paid positions in private&lt;br /&gt;
sector.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://digi.geenius.ee/rubriik/uudis/kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad/&lt;br /&gt;
https://tehnika.postimees.ee/6887428/riigi-it-tootajate-palgamaarad-kasvasid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;But there is also a different view that average private sector worker&lt;br /&gt;
could be hired as a top specialist in public sector and then the payment&lt;br /&gt;
is higher. Nevertheless, it seems that the average payment in cyber&lt;br /&gt;
security sector is any way higher that in other parts of the&lt;br /&gt;
e-services.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://digi.geenius.ee/rubriik/uudis/5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka/&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
==SOC==&lt;br /&gt;
&amp;lt;p&amp;gt;A SOC is a facility where an organization’s network, applications,&lt;br /&gt;
and endpoints are monitored and defended. The term was adapted from&lt;br /&gt;
network operations centers (NOCs), where large telecommunication or&lt;br /&gt;
corporate networks are monitored. When network security became more of a&lt;br /&gt;
concern, security teams were formed within the NOCs, and eventually spun&lt;br /&gt;
off into larger organizations of their own as the responsibilities of&lt;br /&gt;
security teams grew increasingly complex and specialized. The security&lt;br /&gt;
staff working in a security operations center are often called the SOC&lt;br /&gt;
team.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Functions of the SOC team include, but are not limited to:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ol type=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Taking inventory of resources, to get a better understanding of the&lt;br /&gt;
structure they are protecting.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintanence of the system, by constantly making updates and adding&lt;br /&gt;
safeguards.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Monitoring the network for abnormalities with special tools.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Threat analysis of new attacks and vulnerabilities.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Responding to attacks, by acting as “first responders”. The SOC team&lt;br /&gt;
will shut down and/or isolate endpoints, deleting files and lowering the&lt;br /&gt;
impact as fast as possible.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Recovery of system stability and lost data. This may be done using&lt;br /&gt;
backups, restarting endpoints or reconfiguring systems.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Logging all actions on the system, to be later used for analysis or&lt;br /&gt;
forensics after an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigating the root cause of an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Auditing their own actions, to be in line with regulations of the&lt;br /&gt;
organization, industry or governing body.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.trellix.com/en-us/security-awareness/operations/what-is-soc.html&amp;lt;/p&amp;gt;&lt;br /&gt;
==CSIRT==&lt;br /&gt;
&amp;lt;p&amp;gt;A CSIRT is a group that responds to security incidents when they&lt;br /&gt;
occur. Key responsibilities of a CSIRT include:&amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
===Creating and maintaining an incident response plan (IRP)===&lt;br /&gt;
An incident response plan (IRP) is a set of written instructions for&lt;br /&gt;
detecting, responding to and limiting the effects of an information&lt;br /&gt;
security event. Incident response plans provide instructions for&lt;br /&gt;
responding to many potential scenarios, including data breaches, denial&lt;br /&gt;
of service/distributed denial of service attacks, firewall breaches,&lt;br /&gt;
virus or malware outbreaks or insider threats. Without an incident&lt;br /&gt;
response plan in place, organizations may either not detect the attack&lt;br /&gt;
in the first place, or not follow proper protocol to contain the threat&lt;br /&gt;
and recover from it when a breach is detected.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.stratacore.com/incidentresponseplan&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
===Investigating and analyzing incidents===&lt;br /&gt;
CSIRTs are also involved in improvement activities. After major&lt;br /&gt;
computer security incidents occur, or when incidents are not handled in&lt;br /&gt;
a timely or effective manner, a CSIRT will generally perform a&lt;br /&gt;
postmortem of the incident and its response. This postmortem will&lt;br /&gt;
identify the strengths and weakness of the response effort. Such reviews&lt;br /&gt;
can identify weaknesses and holes in systems, infrastructure defenses,&lt;br /&gt;
or policies that allowed the incident to take place. It can also&lt;br /&gt;
identify problems with communication channels, interfaces, and&lt;br /&gt;
procedures that inhibited the efficient resolution of the reported&lt;br /&gt;
problem.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.cisa.gov/uscert/bsi/articles/best-practices/incident-management/defining-computer-security-incident-response-teams&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Managing internal communications and updates during or immediately after incidents occur===&lt;br /&gt;
===Communicating with employees, shareholders, customers, and the press about incidents as needed===&lt;br /&gt;
&amp;lt;p&amp;gt;There are various services within the CSIRT Services Framework that&lt;br /&gt;
address communications, as they relate to security operations and&lt;br /&gt;
incident response services. Some of these include Information Security&lt;br /&gt;
Incident Coordination, Crisis Management Support, Vulnerability&lt;br /&gt;
Disclosure, Situational Awareness Communication, and Awareness Building,&lt;br /&gt;
to name a few. Sharing information and communicating with the general&lt;br /&gt;
public and/or your constituency is appropriate in many different&lt;br /&gt;
scenarios. These can range from proactive communications to reactive&lt;br /&gt;
communications. Each scenario may be unique, and careful consideration&lt;br /&gt;
should be given to when to release information to the public and what&lt;br /&gt;
information should be released.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;https://resources.sei.cmu.edu/asset_files/Handbook/2021_002_001_651819.pdf&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Remediating incidents===&lt;br /&gt;
Threat remediation is a strong and capable tool for fighting the&lt;br /&gt;
cyber security compromises. As the word ‘remedy’ suggests, remediation&lt;br /&gt;
process involves the treatment of a security breach. With the&lt;br /&gt;
remediation practices, your cyber security team is able to eliminate&lt;br /&gt;
suspicious activities and malicious attacks in the form of malware,&lt;br /&gt;
ransomware, phishing and such. Even if you ‘kill’ the suspicious&lt;br /&gt;
activity, the attackers can remain in your systems. If you want to&lt;br /&gt;
contaminate and end the problem for good, your remediation processes&lt;br /&gt;
must involve the detection of the cause. &amp;lt;ref name=&amp;quot;logsign&amp;quot;&amp;gt;Logsign, &amp;quot;What-is-remediation-in-cyber-security&amp;quot;. Available: https://www.logsign.com/blog/what-is-remediation-in-cyber-security/. [Accessed 28 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Recommending technology, policy, governance, and training changes after security incidents===&lt;br /&gt;
After all these actions, the SCIRT must contribute to the development&lt;br /&gt;
of better policies, practices and has to recommend improvements. They&lt;br /&gt;
are not working in the vacuum and their work has to create new and&lt;br /&gt;
better standards for cyber security. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;Exabeam, &amp;quot;CSIRT&amp;quot;. Available: https://www.exabeam.com/incident-response/csirt/ [Accessed 28 APr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==CERT==&lt;br /&gt;
&amp;lt;p&amp;gt;The term “computer emergency response team” was coined in 1988. In&lt;br /&gt;
response to the Morris worm attack that impacted thousands of servers on&lt;br /&gt;
the Internet, DARPA funded the formation of the Computer Emergency&lt;br /&gt;
Response Team Coordination Center (CERT-CC) at Carnegie Mellon&lt;br /&gt;
University. The goal of CERT-CC was to help protect the internet by&lt;br /&gt;
collecting and disseminating information on critical security&lt;br /&gt;
vulnerabilities. Several other countries formed similar centers using&lt;br /&gt;
the same acronym (despite threats of legal action by Carnegie Mellon for&lt;br /&gt;
trademark infringement). Now the term CERT refers to any emergency&lt;br /&gt;
response team that deals with cyber threats. Many people use CERT-CC&lt;br /&gt;
interchangeably with CSIRT, though the charter of a CERT is information&lt;br /&gt;
sharing in order to help other response teams respond to threats against&lt;br /&gt;
their own infrastructure.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In general, the designation of CERT is helpful in applying real-world&lt;br /&gt;
solutions to various cybersecurity problems. They may be government&lt;br /&gt;
contractors or employees of a major corporation. For example, the U.S.&lt;br /&gt;
Computer Emergency Readiness Team (US-CERT) operates under the U.S.&lt;br /&gt;
Department of Homeland Security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.techopedia.com/definition/31003/computer-emergency-response-team-cert&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In Estonia CERT is designated as CERT-EE. It was established in 2006,&lt;br /&gt;
as an organization responsible for the management of security incidents&lt;br /&gt;
in .ee computer networks. It is also a national contact point for&lt;br /&gt;
international co-operation in the field of IT security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ria.ee/en/cyber-security/cert-ee.html&amp;lt;/p&amp;gt;&lt;br /&gt;
===Difference between SOC/CSIRT/CERT===&lt;br /&gt;
&amp;lt;p&amp;gt;How CSIRTs differ from CERTs and SOCs There are overlapping&lt;br /&gt;
responsibilities between a community emergency response team (CERT),&lt;br /&gt;
computer security incident response team (CSIRT), and security&lt;br /&gt;
operations center (SOC). To add to this confusion, frequently, the terms&lt;br /&gt;
CERT and CSIRT are used interchangeably, despite the important&lt;br /&gt;
differences.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image3.png&amp;quot; alt=&amp;quot;Overlapping in images/image3.png&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;Overlapping in&lt;br /&gt;
images/image3.png&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
==Understand the primary roles and characteristics of a CERT, CSIRT, and SOC.==&lt;br /&gt;
&amp;lt;p&amp;gt;So, using strict definitions, a CERT collects and disseminates&lt;br /&gt;
security information, typically for the benefit of a country or an&lt;br /&gt;
industry. A CSIRT is a cross-functional team that responds to incidents&lt;br /&gt;
on behalf of a country or an organization. A SOC is where a country or&lt;br /&gt;
organization monitors and defends its network, servers, applications,&lt;br /&gt;
and endpoints.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image4.png&amp;quot; alt=&amp;quot;table of explanation images/image4&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;table of explanation&lt;br /&gt;
images/image4&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
==Future==&lt;br /&gt;
&amp;lt;p&amp;gt;And the Cyber security problem is only getting bigger. According to a&lt;br /&gt;
report published by Accenture, the number of cyber security breaches&lt;br /&gt;
increased by 11 percent from 2017 to 2018. The cost of such breaches is&lt;br /&gt;
astronomical–about $600 billion worldwide, according to the Economic&lt;br /&gt;
Impact of Cybercrime report.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Job projections for cybersecurity are staggering. The Bureau of Labor&lt;br /&gt;
Statistics in US predicts that careers in the cybersecurity field will&lt;br /&gt;
grow by 32% by 2028. That makes cybersecurity one of the top 10&lt;br /&gt;
fastest-growing jobs in the country. In the United States alone, jobs&lt;br /&gt;
for Information Security Analysts are expected to grow by 15% by&lt;br /&gt;
2024.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Most likely this trend is also similar in other countries.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When checking Estonian job portals, there is a constant need for&lt;br /&gt;
people for cyber security related positions. Also, linkedin search gives&lt;br /&gt;
approximately 30 vacancies immediately. There are banks, logistics&lt;br /&gt;
companies, e-shops, and software producers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://ee.linkedin.com/jobs/cyber-security-jobs?countryRedirected=1&amp;amp;amp;position=1&amp;amp;amp;pageNum=0&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Trends that affect companies create need for constant cyber security&lt;br /&gt;
services. Increasing number of home/remote offices require secure&lt;br /&gt;
corporate networks and security of remote devices. One example is from&lt;br /&gt;
this year, when sloppy remote desktop set-up paralyzed systems of 17&lt;br /&gt;
companies.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.aripaev.ee/uudised/2022/04/20/ria-lohakas-kaugtoolaua-seadistus-halvas-martsis-vahemalt-17-juhul-ettevotete-it-susteemid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Also, no service can exists without robust infrastructure - servers,&lt;br /&gt;
databases, applications. As all previously mentioned devices and&lt;br /&gt;
services are at constant scanning and surveillance. So, the breach&lt;br /&gt;
detection and immediate action demands 24/7 services. Even if lot of&lt;br /&gt;
things could be automated, there is a need for human specialists (at&lt;br /&gt;
least, at the moment). Third growing field is also a forensic&lt;br /&gt;
investigation, as every attack must be investigated in order to be ready&lt;br /&gt;
to repel next attacks. So data recovery and evidence collection is&lt;br /&gt;
another important field of work that need skilled and professional&lt;br /&gt;
workers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Even, if the specifics of the entity, be it CSIRT, CERT or SOC, are&lt;br /&gt;
different, the fundamentals of the work are the same. Professional&lt;br /&gt;
knowledge of the networks, operational systems, hardware, scripting, and&lt;br /&gt;
several other wider IT related knowledge is needed. As there is no&lt;br /&gt;
single way to reach to it, every single person can find one’s strongest&lt;br /&gt;
sides and develop them with knowledge of weaker side, in order to know,&lt;br /&gt;
when to as for help.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/body&amp;gt;&lt;br /&gt;
&amp;lt;/html&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mavald</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142185</id>
		<title>Hiring a Cyber Security Incident Analyst</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142185"/>
		<updated>2022-05-01T14:50:19Z</updated>

		<summary type="html">&lt;p&gt;Mavald: /* Remediating incidents */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==A Cyber Security Incident Analyst==&lt;br /&gt;
&lt;br /&gt;
[[File:image1.png|600px|thumb|Job advertisement &amp;lt;ref&amp;gt;&amp;quot;Job Advertisement&amp;quot;. Available at https://www.projectpeople.com/jobs/&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
===Cyber security incident analyst in SOC/CSIRT/CERT===&lt;br /&gt;
This article delves into the job title of Cyber Security Incident&lt;br /&gt;
Analyst and provides an overview of the acronyms SOC/CSIRT/CERT. A brief&lt;br /&gt;
history of the job is discussed here, as well as a possible career path,&lt;br /&gt;
education, experience, and other characteristics required for work in&lt;br /&gt;
computer security-related organizations. The article also provides a&lt;br /&gt;
brief history of SOC/CSIRT/CERT, as well as a comparison of their&lt;br /&gt;
differences and similarities.&lt;br /&gt;
===Cyber Security Incident Analyst Skill Set===&lt;br /&gt;
What skill set is expected from the Cyber Security Incident Analyst? Below written lines are taken from the same job advertisement depicted&lt;br /&gt;
on the left side of this article:&lt;br /&gt;
As a Security Incident Analyst your responsibilities will include:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Continuous monitoring of security tooling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Performing regular and ad-hoc vulnerability assessments&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Carrying out ‘spot checks’&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Reporting vulnerabilities to the PVG via the alerts system&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintaining and documenting logging systems&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Developing centralized logging, reporting and intelligence&lt;br /&gt;
platforms&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;‘Light touch’ penetration testing with open source tooling&lt;br /&gt;
(Metasploit)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Knowledge &amp;amp;amp; Experience required:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;SOC, CSIRT or CERT operational environment experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Windows / Linux experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TCP /IP networking protocol knowledge&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience reviewing and analyzing Security Events from various&lt;br /&gt;
monitoring and logging sources&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience in website and web application security assessment or&lt;br /&gt;
penetration testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience of using Metasploit&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Scripting knowledge using BASH, Python, Perl, Ruby&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Skills in Host and Network Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
As one can see the description of the duties is wide and also the&lt;br /&gt;
knowledge and experience that is required is noteworthy. So, where to&lt;br /&gt;
start to find out the way to get this kind of knowledge and&lt;br /&gt;
expertize.&lt;br /&gt;
===Possible career path===&lt;br /&gt;
Next part of the paper is aiming to depict a possible ways, how to&lt;br /&gt;
develop oneself, and move along the career pathway in cybersecurity&lt;br /&gt;
field. Topics of development, education, experience and certification&lt;br /&gt;
are covered.&lt;br /&gt;
[[File:analystimage2.png|1000px|thumb|Career path &amp;lt;ref&amp;gt;&amp;quot;Possible Career Path&amp;quot;. Available at https://www.cyberseek.org/pathway.html&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
===Junior/Senior===&lt;br /&gt;
Start with an entry-level job in IT. Hands-on experience is often the&lt;br /&gt;
most effective way to prepare for certification exams. Start&lt;br /&gt;
accumulating work experience with an entry-level role as a cybersecurity&lt;br /&gt;
analyst. Many cybersecurity professionals start off in more general IT&lt;br /&gt;
roles. The skills, practices, and technologies you’ll use as a&lt;br /&gt;
cybersecurity professional will continue to evolve along with computer&lt;br /&gt;
and network technology. The desire to learn, ability to problem solve,&lt;br /&gt;
and attention to detail will serve you well in this field. Other, more&lt;br /&gt;
technical skills and technologies to learn include:&amp;lt;ref name=&amp;quot;certification&amp;quot;&amp;gt;Popular Cyber Security Certificates [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications  [Accessed 25 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====SIEM tools (security information and event management)====&lt;br /&gt;
Security Information and Event Management (SIEM) is a set of tools&lt;br /&gt;
and services offering a holistic view of an organization’s information&lt;br /&gt;
security. SIEM works by combining two technologies:&lt;br /&gt;
&amp;lt;li&amp;gt;Security information management (SIM), which collects data from log&lt;br /&gt;
files for analysis and reports on security threats and events, and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;security event management (SEM), which conducts real-time system&lt;br /&gt;
monitoring, notifies network admins about important issues and&lt;br /&gt;
establishes correlations between security events. There are a number of&lt;br /&gt;
security information and event management solutions on the market.&lt;br /&gt;
ArcSight ESM, IBM QRadar and Splunk are among the most popular. &amp;lt;ref name=&amp;quot;SIEM&amp;quot;&amp;gt;Application security, SIEM [Online]. Available: https://www.imperva.com/learn/application-security/siem/. [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Firewalls, Intrusion Detection Systems (IDS), and Intrusion Prevention Systems(IPS)====&lt;br /&gt;
Firewalls can be two types, hardware and software firewalls. Software&lt;br /&gt;
firewall is a firewall that is installed on a computer or server, and&lt;br /&gt;
tasked with network security. It works with a wide variety of other&lt;br /&gt;
technology security solutions to provide more robust and cohesive&lt;br /&gt;
security for enterprises of all sizes. When a software firewall is&lt;br /&gt;
installed on a server, it opens up like an umbrella of protection over&lt;br /&gt;
all other computers connected to the network. It is able to monitor both&lt;br /&gt;
incoming and outgoing traffic for potential risk or suspicious user&lt;br /&gt;
behavior, and also makes setting security policies much easier, faster&lt;br /&gt;
and more flexible. Hardware firewall is positioned between the network&lt;br /&gt;
and devices, allowing traffic to funnel through the firewall for a close&lt;br /&gt;
inspection and analysis. A hardware firewall, a term often&lt;br /&gt;
interchangeable with network or next-generation firewall, protects the&lt;br /&gt;
network gateways for an enterprise. Hardware firewall is physical&lt;br /&gt;
hardware, installed between network elements and connected devices, and&lt;br /&gt;
is tasked with filtering traffic for cyber threat to the network or&lt;br /&gt;
devices. Filtering out unauthorized or suspicious users based on traffic&lt;br /&gt;
analysis is one of the biggest benefits of hardware firewall. &amp;lt;ref name=&amp;quot;sangfor&amp;quot;&amp;gt;Sangfor, &amp;quot;What is Software Firewall? Difference between Hardware Firewall and Software Firewall, [Online]. Available: https://www.sangfor.com/blog/cybersecurity/what-is-software-firewall-difference-between-hardware-firewall-and-software-firewall [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems&lt;br /&gt;
(IPS) are both parts of the network infrastructure. IDS/IPS compare&lt;br /&gt;
network packets to a cyberthreat database containing known signatures of&lt;br /&gt;
cyberattacks — and flag any matching packets. IDS doesn’t alter the&lt;br /&gt;
network packets in any way, whereas IPS prevents the packet from&lt;br /&gt;
delivery based on the contents of the packet, much like how a firewall&lt;br /&gt;
prevents traffic by IP address. &amp;lt;ref name=&amp;quot;Varonis&amp;quot;&amp;gt;Varonis, &amp;quot;What is Software Firewall? IDS vs. IPS: What is the Difference?, [Online]. Available: https://www.varonis.com/blog/ids-vs-ips [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Digital forensics====&lt;br /&gt;
Digital forensics is a branch of forensic science that focuses on&lt;br /&gt;
identifying, acquiring, processing, analyzing, and reporting on data&lt;br /&gt;
stored electronically. Electronic evidence is a component of almost all&lt;br /&gt;
criminal activities and digital forensics support is crucial for law&lt;br /&gt;
enforcement investigations. Electronic evidence can be collected from a&lt;br /&gt;
wide array of sources, such as computers, smartphones, remote storage,&lt;br /&gt;
unmanned aerial systems, shipborne equipment, and more.&amp;lt;ref name=&amp;quot;interpol&amp;quot;&amp;gt;Interpol, &amp;quot;Digital forensics&amp;quot;. Available: https://www.interpol.int/How-we-work/Innovation/Digital-forensics. [Accessed 28 4 2022].&amp;lt;/ref&amp;gt; &lt;br /&gt;
Investigative process of digital forensics can be divided into several stages. There are four major stages: preservation, collection,&lt;br /&gt;
examination, and analysis. All these four stages need a deep understanding of computers, technology across a broad spectrum, and cybersecurity principles and&lt;br /&gt;
practices, a working knowledge of computers, networks, and coding, in-depth investigative abilities, critical-thinking skills and analytical talent the ability to effectively communicate and work with a&lt;br /&gt;
wide range of people. &amp;lt;ref name=&amp;quot;ecpi&amp;quot;&amp;gt;&amp;quot;Digital forensics&amp;quot;. Available: https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me. [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Mobile device management====&lt;br /&gt;
Mobile device management (MDM) is software that allows IT&lt;br /&gt;
administrators to control, secure and enforce policies on smartphones,&lt;br /&gt;
tablets and other endpoints. Mobile device management software emerged&lt;br /&gt;
in the early 2000s as a way to control and secure the personal digital&lt;br /&gt;
assistants and smartphones that business workers began to use. The&lt;br /&gt;
consumer smartphone boom that started with the launch of the Apple&lt;br /&gt;
iPhone in 2007 led to the bring your own device (BYOD) trend, which&lt;br /&gt;
fueled further interest in MDM.&amp;lt;ref name=&amp;quot;techtarget&amp;quot;&amp;gt;Techtarget, &amp;quot;Mobile Device Management&amp;quot;. Available: https://www.techtarget.com/searchmobilecomputing/definition/mobile-device-management [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Data management====&lt;br /&gt;
Sometimes the data management is neglected, but this part has a&lt;br /&gt;
crucial role when learning for good cyber security practices. Majority&lt;br /&gt;
of cyber security programs include a special courses on data management.&lt;br /&gt;
Data management is a method of organizing and maintaining data processes&lt;br /&gt;
that are required in almost every business operations. The benefits of&lt;br /&gt;
data management can be found accounting, statistics, logistics planning&lt;br /&gt;
and other disciplines including corporate computing.&amp;lt;ref name=&amp;quot;GlobalUni&amp;quot;&amp;gt;Global Universities, &amp;quot;MSc Data Management and Cyber Security&amp;quot;. Available: https://globaluniversities.in/msc-data-management-cyber-security. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Data governance (and management) play a fundamental role in&lt;br /&gt;
protecting an organization’s data. Ensuring that the right people have&lt;br /&gt;
the right access and that appropriate security controls are in place to&lt;br /&gt;
protect each system or service, based on the criticality or sensitivity&lt;br /&gt;
of the data sets these contain. &amp;lt;ref name=&amp;quot;CyberMagazine&amp;quot;&amp;gt;Cyber Security Magazine, &amp;quot;The Role of Data Governance in Cybersecurity&amp;quot;. Available: https://cybersecurity-magazine.com/the-role-of-data-governance-in-cybersecurity/?utm_source=rss&amp;amp;amp;utm_medium=rss&amp;amp;amp;utm_campaign=the-role-of-data-governance-in-cybersecurity. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Application security development====&lt;br /&gt;
Application security describes security measures at the application&lt;br /&gt;
level that aim to prevent data or code within the app from being stolen&lt;br /&gt;
or hijacked. It encompasses the security considerations that happen&lt;br /&gt;
during application development and design, but it also involves systems&lt;br /&gt;
and approaches to protect apps after they get deployed. Application&lt;br /&gt;
security may include hardware, software, and procedures that identify or&lt;br /&gt;
minimize security vulnerabilities.&lt;br /&gt;
https://www.vmware.com/topics/glossary/content/application-security.html&lt;br /&gt;
Application security development is important to ensure that your&lt;br /&gt;
application is free from coding errors and bugs. And controls the risk&lt;br /&gt;
and helps safeguard against security vulnerabilities. Application&lt;br /&gt;
security development is the process of making applications more secure&lt;br /&gt;
by finding and fixing security vulnerabilities. This is often done by&lt;br /&gt;
enforcing software security best practices and using application&lt;br /&gt;
security testing tools.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.perforce.com/blog/kw/application-security-development-best-practices&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Audit and compliance knowledge====&lt;br /&gt;
A cyber security audit is designed to be a comprehensive review and&lt;br /&gt;
analysis of your business’s IT infrastructure. It identifies threats and&lt;br /&gt;
vulnerabilities, exposing weaknesses and high-risk practices.&lt;br /&gt;
Regulations such as the EU GDPR (General Data Protection Regulation) can&lt;br /&gt;
impose hefty penalties in the event of a breach that results in&lt;br /&gt;
exploited data. A cyber security audit will help mitigate the&lt;br /&gt;
consequences of a breach and demonstrate that your organization has&lt;br /&gt;
taken the necessary steps to protect client and company data.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://cyforsecure.co.uk/services/cyber-assessment/cyber-security-audit/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Cybersecurity compliance is the organizational risk management method&lt;br /&gt;
aligned with pre-defined security measures &amp;amp;amp; controls on how data&lt;br /&gt;
confidentiality is ensured by its administrational procedures.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://nordlayer.com/blog/cybersecurity-compliance-everything-you-need-to-know/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;All needed skills are developed through courses and&lt;br /&gt;
certification.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
===Entry-Level Incident Response Positions===&lt;br /&gt;
&amp;lt;p&amp;gt;It is not always possible to advance to the position of incident&lt;br /&gt;
responder in a straight line. Many professionals advance from entry- to&lt;br /&gt;
mid-level positions before becoming a real incident responder or a&lt;br /&gt;
member of a computer emergency response team (CERT).&amp;lt;br /&amp;gt;&lt;br /&gt;
These are some examples:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;network-administrator&amp;quot;&amp;gt;Network administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;This position’s experience will help potential incident responders&lt;br /&gt;
develop networking skills. Attention to detail, as well as the ability&lt;br /&gt;
to sift through system configurations, site layouts, and general network&lt;br /&gt;
and communication setups, are essential in this field.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;system-administrator&amp;quot;&amp;gt;System administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Another crucial beginning point for an incident responder is to learn&lt;br /&gt;
how to manage resources inside your organization as well as user&lt;br /&gt;
behavior. Understanding the potential damage that users, inadequate&lt;br /&gt;
security setups, and ineffective IT policies and procedures can cause on&lt;br /&gt;
your network can provide prospective candidates with insight into the&lt;br /&gt;
human component of an incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;security-administrator&amp;quot;&amp;gt;Security administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In such a position, basic hacking skills, penetration testing, and&lt;br /&gt;
intrusion detection are all learned, which are crucial incident&lt;br /&gt;
responder skills when trying to replicate a breach or attack.&lt;br /&gt;
Understanding the paths a cybercriminal will take when attempting to&lt;br /&gt;
damage or obtain access to a system can greatly simplify the work of&lt;br /&gt;
reverse engineering the incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://resources.infosecinstitute.com/topic/incident-responder-career-roadmap-entry-level-executive/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3 id=&amp;quot;mid-level-incident-response-positions&amp;quot;&amp;gt;Mid-Level Incident&lt;br /&gt;
Response Positions&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5&lt;br /&gt;
id=&amp;quot;computer-security-incident-response-team-csirt-engineer&amp;quot;&amp;gt;Computer&lt;br /&gt;
security incident response team (CSIRT) engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;cyber-incident-responder&amp;quot;&amp;gt;Cyber incident responder&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-response-engineer&amp;quot;&amp;gt;Incident response&lt;br /&gt;
engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;While each of these positions is different, they generally require&lt;br /&gt;
very similar skills and characteristics in a candidate. At this level,&lt;br /&gt;
personal characteristics such as problem solving, time management, and&lt;br /&gt;
even presentation skills become more crucial as one’s career evolves&lt;br /&gt;
into a management-facing role.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Technical skills include the ability to identify and minimize threats&lt;br /&gt;
while maintaining communication with management and the rest of your&lt;br /&gt;
team. Data analysis and evidence gathering become increasingly crucial,&lt;br /&gt;
and the circumstances in which your services are deployed get more&lt;br /&gt;
serious.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Problem-solving skills are crucial at this level of incident&lt;br /&gt;
response, and as the stakes rise, so does the pressure in each&lt;br /&gt;
situation. At this level, programming abilities are essential since&lt;br /&gt;
incident responders may be needed to reverse engineer malicious code or&lt;br /&gt;
even create patches for vulnerable network applications or services.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.coursera.org/articles/popular-cybersecurity-certifications&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3 id=&amp;quot;senior-level-incident-response-positions&amp;quot;&amp;gt;Senior-Level Incident&lt;br /&gt;
Response Positions&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;intrusion-detection-specialist&amp;quot;&amp;gt;Intrusion detection&lt;br /&gt;
specialist:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;A CISSP certification might help a potential candidate in preparing&lt;br /&gt;
for the profession. The role of an intrusion detection specialist is to&lt;br /&gt;
find and stop any unwanted communications.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-manager&amp;quot;&amp;gt;Incident manager:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Expected to plan, oversee, manage, and supervise all incident&lt;br /&gt;
response team actions. Is in charge of reporting all current events to&lt;br /&gt;
senior management and stakeholders, as well as acting as the technical&lt;br /&gt;
lead on active incidents for incident responders. Prepares threat and&lt;br /&gt;
impact assessments and reports them known to management.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.coursera.org/articles/popular-cybersecurity-certifications&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Certificates== &lt;br /&gt;
There is a vast number of different certificates and the road map to&lt;br /&gt;
being a certified professional could be very different&amp;lt;ref name=&amp;quot;Coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated],&amp;quot; [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;NICCS&amp;quot;&amp;gt;NICCS, &amp;quot;Cybersecurity Certifications,&amp;quot; [Online]. Available: hhttps://niccs.cisa.gov/about-niccs/cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt; . One possible&lt;br /&gt;
approach is to start with basic certificates from the different branches&lt;br /&gt;
of service and move to more specific and demanding focused&lt;br /&gt;
certification. Also, some jobs require certain clearances, either from&lt;br /&gt;
industry, or from the government. One small selection of different&lt;br /&gt;
possible certificates is brought out in following paragraphs.&lt;br /&gt;
&lt;br /&gt;
Security+ is a CompTIA certification that is considered a basic cert&lt;br /&gt;
among cybersecurity professionals. It covers the topics of risk&lt;br /&gt;
management and threat assessment.&lt;br /&gt;
Network+ is also offered by CompTIA this certification (like the name&lt;br /&gt;
implies) focuses on networking infrastructure and operations. It is&lt;br /&gt;
considered a foundational certification.&lt;br /&gt;
The Certified Information Systems Security Professional (CISSP) is a&lt;br /&gt;
more advanced certification designed for cybersecurity professionals&lt;br /&gt;
with at least five years of work experience. The certification covers&lt;br /&gt;
topics such as architecture, engineering, and management.&amp;lt;/p&amp;gt;&lt;br /&gt;
The Certified Ethical Hacker (CEH) certification is also considered a&lt;br /&gt;
more advanced cert because it generally requires that applicants have&lt;br /&gt;
multiple years of work experience. The goal of an ethical hacker&lt;br /&gt;
certification is to be able to understand how cyber attacks unfold in&lt;br /&gt;
order to improve threat assessment and mitigation skills.&amp;lt;ref name=&amp;quot;cyberguide&amp;quot;&amp;gt;Cybersecurity Guide, &amp;quot;How to become a cybersecurity specialist&amp;quot;, [Online]. Available: https://cybersecurityguide.org/careers/security-specialist/. [Accessed 27 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
This is definitely not all, when one looks for more information, following link could be searched, to get more in depth knowledge about&lt;br /&gt;
different possibilities. Hereby, with the help of this matrix a possible taxonomy of different 436 listed certificates in branches are&lt;br /&gt;
presented.&amp;lt;ref name=&amp;quot;Pauljeremy&amp;quot;&amp;gt;&amp;quot;Cybersecurity Roadmap,&amp;quot; [Online]. Available: https://pauljerimy.com/2020/10/12/scr-oct-2020-update/. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:analystimage5.png|1000px|thumb|Certificate matrix &amp;lt;ref&amp;gt;&amp;quot;Certification roadmap&amp;quot;. Available at https://pauljerimy.com/security-certification-roadmap&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
=== Communication and Network Security===&lt;br /&gt;
Communication and network security covers the ability to secure&lt;br /&gt;
communication channels and networks. Topics include secure and converges&lt;br /&gt;
protocols, wireless networks, cellular networks, hardware operations&lt;br /&gt;
(warranty and redundant power), and third-party connectivity. IP&lt;br /&gt;
networking are also included in this domain.&lt;br /&gt;
===Identity and Access Management===&lt;br /&gt;
The identity and access management domain covers the attacks that&lt;br /&gt;
target the human gateway to gain access to data. Other topics include&lt;br /&gt;
ways to identify users with rights to access the information and&lt;br /&gt;
servers. Identity and access management covers the topics of&lt;br /&gt;
applications, Single sign-on authentication, privilege escalation,&lt;br /&gt;
Kerberos, rule-based or risk-based access control, proofing and&lt;br /&gt;
establishment of identity.&lt;br /&gt;
===Security Architecture and Engineering===&lt;br /&gt;
The security architecture and engineering domain covers important&lt;br /&gt;
topics concerning security engineering plans, designs and principles,&lt;br /&gt;
Topics include assessing and mitigating information system&lt;br /&gt;
vulnerabilities, fundamental concepts of security models and security&lt;br /&gt;
architectures in critical areas like access control. Cloud systems,&lt;br /&gt;
cryptography, system infiltrations (ransomware, fault-injection and&lt;br /&gt;
more) and virtualized systems are also covered in this domain.&lt;br /&gt;
===Asset Security===&lt;br /&gt;
The Asset Security domain deals with the issues related to the&lt;br /&gt;
collection, storage, maintenance, retention and destruction of data. It&lt;br /&gt;
also covers knowledge of different roles regarding data handling (owner,&lt;br /&gt;
controller and custodian) as well as data protection methods and data&lt;br /&gt;
states. Other topics include resource provision, asset classification&lt;br /&gt;
and data lifecycle management.&lt;br /&gt;
===Security and Risk Management===&lt;br /&gt;
The security and risk management domain covers general on skills&lt;br /&gt;
related to the implementation of user awareness programs as well as&lt;br /&gt;
security procedures. Emphasis is also placed on risk management&lt;br /&gt;
concerning the acquisition of new services, hardware and software&lt;br /&gt;
(supply chain). Other skills include social engineering defense&lt;br /&gt;
mechanisms.&lt;br /&gt;
===Security Assessment and Testing===&lt;br /&gt;
The security assessment and testing domain deals with all the&lt;br /&gt;
techniques and tools used to find system vulnerabilities, weaknesses and&lt;br /&gt;
potential areas of concern not addressed by security procedures and&lt;br /&gt;
policies. Attack simulations, vulnerability assessment, compliance&lt;br /&gt;
checks, and ethical disclosure also fall under this domain.&lt;br /&gt;
===Software Security===&lt;br /&gt;
The software development security domain deals with implementing&lt;br /&gt;
software-based security protocols within environment for which the IT&lt;br /&gt;
professional is responsible. Risk analysis, vulnerability identification&lt;br /&gt;
and auditing of source codes are all covered in this subset. Additional&lt;br /&gt;
topics include software-designed security, maturity models, development&lt;br /&gt;
methodologies, open-source and third-party development security.&lt;br /&gt;
===Security operations===&lt;br /&gt;
The security operations domain covers topics ranging from&lt;br /&gt;
investigations and digital forensic to detection and intrusion&lt;br /&gt;
prevention tools, sandboxing and firewalls. Topics include user and&lt;br /&gt;
entity behavior analytics, threat intelligence (threat hunting and&lt;br /&gt;
threat feeds) log management, artifacts (mobile, computer and network),&lt;br /&gt;
machine learning and AI-based tools, penetration testing, and&lt;br /&gt;
exploitation development. These for sub-domains are lister here.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Incident Handling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Penetration Testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Exploitation&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Education==&lt;br /&gt;
&amp;lt;p&amp;gt;The entry level monitoring specialist is hired by Estonian&lt;br /&gt;
Information System Authority even if there is no formal IT education,&lt;br /&gt;
but readiness to learn and moderate knowledge of different operation&lt;br /&gt;
systems is enough to start the career.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.cv.ee/en/vacancy/792782/riigi-infosusteemi-amet/seirespetsialist-tule-eesti-kuberruumi-valvuriks&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Nevertheless, like most other high qualification careers jobs falling&lt;br /&gt;
under the cybersecurity specialist category require some form of formal&lt;br /&gt;
education. However, since cybersecurity specialist jobs can fall across&lt;br /&gt;
a wide spectrum of job descriptions and responsibilities, it is possible&lt;br /&gt;
to obtain a specialist job after completing many levels of different&lt;br /&gt;
computer related education.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;If one is looking for a cybersecurity related education, for example&lt;br /&gt;
in EU, 137 courses/programs could be found that relate to keyword IT or&lt;br /&gt;
cybersecurity.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.enisa.europa.eu/topics/cybersecurity-education/education-map/education-courses&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Also, there is a great amount of discussion, if cuber security&lt;br /&gt;
professional should have a degree or would be certification just enough.&lt;br /&gt;
One interesting table is produces by Franklin University that compares&lt;br /&gt;
benefits and/or drawbacks of each type of credential.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image11.png&amp;quot; alt=&amp;quot;Comparison MSc vs certificate&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;Comparison MSc vs&lt;br /&gt;
certificate&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Certifications are generally good for people with little practical&lt;br /&gt;
experience because they are known quantities in the industry and can&lt;br /&gt;
help you get your foot in the door. They set a minimum knowledge bar.&lt;br /&gt;
But some certifications are viewed more favorably than others.&lt;br /&gt;
Certifications with renewal requirements are viewed better by hiring&lt;br /&gt;
managers, but they also more costly in the long run because of the need&lt;br /&gt;
for continuing education. Certifications are also good for showing&lt;br /&gt;
in-depth expertise in a specialization within cybersecurity. Depending&lt;br /&gt;
on your career goals, it may be advantageous to have a master’s&lt;br /&gt;
degree—which shows your breadth of knowledge, critical thinking and&lt;br /&gt;
leadership skills—and a certificate—which shows specific skill&lt;br /&gt;
competency.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;As IT (Cyber) Security is still a relatively young discipline,&lt;br /&gt;
universities and colleges are still figuring out which is the best&lt;br /&gt;
approach for their degrees. Study programmes and curricula in Cyber&lt;br /&gt;
Security are different. In general, here are the duration of Cyber&lt;br /&gt;
Security degrees:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Bachelor’s degrees in Cyber Security take 3 or 4 years in most&lt;br /&gt;
countries.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Master’s courses in Cyber Security take between 1-2 years to&lt;br /&gt;
complete.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;PhD programmes in Cyber Security last 3-5 years. Some only take 1&lt;br /&gt;
or 2 years, but they are less common.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Generalization could me made that on bachelor level the general&lt;br /&gt;
knowledge about the cyber issues are obtained. On master level the&lt;br /&gt;
specialization courses are taken and the person can choose more specific&lt;br /&gt;
topics to study. It is on master level where strengths of the cyber&lt;br /&gt;
specialist can be developed further and up-do date knowledge obtained in&lt;br /&gt;
specifics. PhD is serious science and involves teaching, lot of&lt;br /&gt;
scientific work and writing for publications.&amp;lt;/p&amp;gt;&lt;br /&gt;
==Salary==&lt;br /&gt;
&amp;lt;p&amp;gt;Even if the salary can be very different, compared to the skills and&lt;br /&gt;
experience, an generalization can be made. Cyber Security professionals&lt;br /&gt;
in CSIRT, and in other entities earn quite well, from the start. First,&lt;br /&gt;
some comparison from the United States. The average CSIRT analyst salary&lt;br /&gt;
in the USA is $97,500 per year or $50 per hour. Entry level positions&lt;br /&gt;
start at $48,875 per year while most experienced workers make up to&lt;br /&gt;
$135,373 per year.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.talent.com/salary?job=csirt+analyst&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;There are multiple positions you can occupy in this field. They have&lt;br /&gt;
in common great salaries and high demand for technical skills, attention&lt;br /&gt;
to details, problem-solving mentality, and the ability to analyze risks.&lt;br /&gt;
Here are the average annual salaries in the United States, according to&lt;br /&gt;
Payscale:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.payscale.com/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Cryptographer – 100,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Information Security Officer – 91,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Assessor – 90,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Engineer – 88,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Penetration Tester – 81,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Forensics Expert – 71,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Administrator – 65,000 USD&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When looking into salaries in Estonia, one can find that there is a&lt;br /&gt;
discussion that private sector is taking a toll from the public sector,&lt;br /&gt;
and that the salaries in important agencies, as Information System&lt;br /&gt;
Authority loose their employees to the better paid positions in private&lt;br /&gt;
sector.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://digi.geenius.ee/rubriik/uudis/kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad/&lt;br /&gt;
https://tehnika.postimees.ee/6887428/riigi-it-tootajate-palgamaarad-kasvasid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;But there is also a different view that average private sector worker&lt;br /&gt;
could be hired as a top specialist in public sector and then the payment&lt;br /&gt;
is higher. Nevertheless, it seems that the average payment in cyber&lt;br /&gt;
security sector is any way higher that in other parts of the&lt;br /&gt;
e-services.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://digi.geenius.ee/rubriik/uudis/5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka/&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
==SOC==&lt;br /&gt;
&amp;lt;p&amp;gt;A SOC is a facility where an organization’s network, applications,&lt;br /&gt;
and endpoints are monitored and defended. The term was adapted from&lt;br /&gt;
network operations centers (NOCs), where large telecommunication or&lt;br /&gt;
corporate networks are monitored. When network security became more of a&lt;br /&gt;
concern, security teams were formed within the NOCs, and eventually spun&lt;br /&gt;
off into larger organizations of their own as the responsibilities of&lt;br /&gt;
security teams grew increasingly complex and specialized. The security&lt;br /&gt;
staff working in a security operations center are often called the SOC&lt;br /&gt;
team.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Functions of the SOC team include, but are not limited to:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ol type=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Taking inventory of resources, to get a better understanding of the&lt;br /&gt;
structure they are protecting.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintanence of the system, by constantly making updates and adding&lt;br /&gt;
safeguards.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Monitoring the network for abnormalities with special tools.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Threat analysis of new attacks and vulnerabilities.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Responding to attacks, by acting as “first responders”. The SOC team&lt;br /&gt;
will shut down and/or isolate endpoints, deleting files and lowering the&lt;br /&gt;
impact as fast as possible.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Recovery of system stability and lost data. This may be done using&lt;br /&gt;
backups, restarting endpoints or reconfiguring systems.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Logging all actions on the system, to be later used for analysis or&lt;br /&gt;
forensics after an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigating the root cause of an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Auditing their own actions, to be in line with regulations of the&lt;br /&gt;
organization, industry or governing body.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.trellix.com/en-us/security-awareness/operations/what-is-soc.html&amp;lt;/p&amp;gt;&lt;br /&gt;
==CSIRT==&lt;br /&gt;
&amp;lt;p&amp;gt;A CSIRT is a group that responds to security incidents when they&lt;br /&gt;
occur. Key responsibilities of a CSIRT include:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
===Creating and maintaining an incident response plan (IRP)===&lt;br /&gt;
An incident response plan (IRP) is a set of written instructions for&lt;br /&gt;
detecting, responding to and limiting the effects of an information&lt;br /&gt;
security event. Incident response plans provide instructions for&lt;br /&gt;
responding to many potential scenarios, including data breaches, denial&lt;br /&gt;
of service/distributed denial of service attacks, firewall breaches,&lt;br /&gt;
virus or malware outbreaks or insider threats. Without an incident&lt;br /&gt;
response plan in place, organizations may either not detect the attack&lt;br /&gt;
in the first place, or not follow proper protocol to contain the threat&lt;br /&gt;
and recover from it when a breach is detected.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.stratacore.com/incidentresponseplan&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
===Investigating and analyzing incidents===&lt;br /&gt;
CSIRTs are also involved in improvement activities. After major&lt;br /&gt;
computer security incidents occur, or when incidents are not handled in&lt;br /&gt;
a timely or effective manner, a CSIRT will generally perform a&lt;br /&gt;
postmortem of the incident and its response. This postmortem will&lt;br /&gt;
identify the strengths and weakness of the response effort. Such reviews&lt;br /&gt;
can identify weaknesses and holes in systems, infrastructure defenses,&lt;br /&gt;
or policies that allowed the incident to take place. It can also&lt;br /&gt;
identify problems with communication channels, interfaces, and&lt;br /&gt;
procedures that inhibited the efficient resolution of the reported&lt;br /&gt;
problem.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.cisa.gov/uscert/bsi/articles/best-practices/incident-management/defining-computer-security-incident-response-teams&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Managing internal communications and updates during or immediately after incidents occur===&lt;br /&gt;
===Communicating with employees, shareholders, customers, and the press about incidents as needed===&lt;br /&gt;
&amp;lt;p&amp;gt;There are various services within the CSIRT Services Framework that&lt;br /&gt;
address communications, as they relate to security operations and&lt;br /&gt;
incident response services. Some of these include Information Security&lt;br /&gt;
Incident Coordination, Crisis Management Support, Vulnerability&lt;br /&gt;
Disclosure, Situational Awareness Communication, and Awareness Building,&lt;br /&gt;
to name a few. Sharing information and communicating with the general&lt;br /&gt;
public and/or your constituency is appropriate in many different&lt;br /&gt;
scenarios. These can range from proactive communications to reactive&lt;br /&gt;
communications. Each scenario may be unique, and careful consideration&lt;br /&gt;
should be given to when to release information to the public and what&lt;br /&gt;
information should be released.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;https://resources.sei.cmu.edu/asset_files/Handbook/2021_002_001_651819.pdf&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Remediating incidents===&lt;br /&gt;
Threat remediation is a strong and capable tool for fighting the&lt;br /&gt;
cyber security compromises. As the word ‘remedy’ suggests, remediation&lt;br /&gt;
process involves the treatment of a security breach. With the&lt;br /&gt;
remediation practices, your cyber security team is able to eliminate&lt;br /&gt;
suspicious activities and malicious attacks in the form of malware,&lt;br /&gt;
ransomware, phishing and such. Even if you ‘kill’ the suspicious&lt;br /&gt;
activity, the attackers can remain in your systems. If you want to&lt;br /&gt;
contaminate and end the problem for good, your remediation processes&lt;br /&gt;
must involve the detection of the cause. &amp;lt;ref name=&amp;quot;logsign&amp;quot;&amp;gt;Logsign, &amp;quot;What-is-remediation-in-cyber-security&amp;quot;. Available: https://www.logsign.com/blog/what-is-remediation-in-cyber-security/. [Accessed 28 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Recommending technology, policy, governance, and training changes after security incidents===&lt;br /&gt;
After all these actions, the SCIRT must contribute to the development&lt;br /&gt;
of better policies, practices and has to recommend improvements. They&lt;br /&gt;
are not working in the vacuum and their work has to create new and&lt;br /&gt;
better standards for cyber security. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;Exabeam, &amp;quot;CSIRT&amp;quot;. Available: https://www.exabeam.com/incident-response/csirt/ [Accessed 28 APr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==CERT==&lt;br /&gt;
&amp;lt;p&amp;gt;The term “computer emergency response team” was coined in 1988. In&lt;br /&gt;
response to the Morris worm attack that impacted thousands of servers on&lt;br /&gt;
the Internet, DARPA funded the formation of the Computer Emergency&lt;br /&gt;
Response Team Coordination Center (CERT-CC) at Carnegie Mellon&lt;br /&gt;
University. The goal of CERT-CC was to help protect the internet by&lt;br /&gt;
collecting and disseminating information on critical security&lt;br /&gt;
vulnerabilities. Several other countries formed similar centers using&lt;br /&gt;
the same acronym (despite threats of legal action by Carnegie Mellon for&lt;br /&gt;
trademark infringement). Now the term CERT refers to any emergency&lt;br /&gt;
response team that deals with cyber threats. Many people use CERT-CC&lt;br /&gt;
interchangeably with CSIRT, though the charter of a CERT is information&lt;br /&gt;
sharing in order to help other response teams respond to threats against&lt;br /&gt;
their own infrastructure.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In general, the designation of CERT is helpful in applying real-world&lt;br /&gt;
solutions to various cybersecurity problems. They may be government&lt;br /&gt;
contractors or employees of a major corporation. For example, the U.S.&lt;br /&gt;
Computer Emergency Readiness Team (US-CERT) operates under the U.S.&lt;br /&gt;
Department of Homeland Security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.techopedia.com/definition/31003/computer-emergency-response-team-cert&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In Estonia CERT is designated as CERT-EE. It was established in 2006,&lt;br /&gt;
as an organization responsible for the management of security incidents&lt;br /&gt;
in .ee computer networks. It is also a national contact point for&lt;br /&gt;
international co-operation in the field of IT security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ria.ee/en/cyber-security/cert-ee.html&amp;lt;/p&amp;gt;&lt;br /&gt;
===Difference between SOC/CSIRT/CERT===&lt;br /&gt;
&amp;lt;p&amp;gt;How CSIRTs differ from CERTs and SOCs There are overlapping&lt;br /&gt;
responsibilities between a community emergency response team (CERT),&lt;br /&gt;
computer security incident response team (CSIRT), and security&lt;br /&gt;
operations center (SOC). To add to this confusion, frequently, the terms&lt;br /&gt;
CERT and CSIRT are used interchangeably, despite the important&lt;br /&gt;
differences.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image3.png&amp;quot; alt=&amp;quot;Overlapping in images/image3.png&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;Overlapping in&lt;br /&gt;
images/image3.png&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
==Understand the primary roles and characteristics of a CERT, CSIRT, and SOC.==&lt;br /&gt;
&amp;lt;p&amp;gt;So, using strict definitions, a CERT collects and disseminates&lt;br /&gt;
security information, typically for the benefit of a country or an&lt;br /&gt;
industry. A CSIRT is a cross-functional team that responds to incidents&lt;br /&gt;
on behalf of a country or an organization. A SOC is where a country or&lt;br /&gt;
organization monitors and defends its network, servers, applications,&lt;br /&gt;
and endpoints.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image4.png&amp;quot; alt=&amp;quot;table of explanation images/image4&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;table of explanation&lt;br /&gt;
images/image4&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
==Future==&lt;br /&gt;
&amp;lt;p&amp;gt;And the Cyber security problem is only getting bigger. According to a&lt;br /&gt;
report published by Accenture, the number of cyber security breaches&lt;br /&gt;
increased by 11 percent from 2017 to 2018. The cost of such breaches is&lt;br /&gt;
astronomical–about $600 billion worldwide, according to the Economic&lt;br /&gt;
Impact of Cybercrime report.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Job projections for cybersecurity are staggering. The Bureau of Labor&lt;br /&gt;
Statistics in US predicts that careers in the cybersecurity field will&lt;br /&gt;
grow by 32% by 2028. That makes cybersecurity one of the top 10&lt;br /&gt;
fastest-growing jobs in the country. In the United States alone, jobs&lt;br /&gt;
for Information Security Analysts are expected to grow by 15% by&lt;br /&gt;
2024.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Most likely this trend is also similar in other countries.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When checking Estonian job portals, there is a constant need for&lt;br /&gt;
people for cyber security related positions. Also, linkedin search gives&lt;br /&gt;
approximately 30 vacancies immediately. There are banks, logistics&lt;br /&gt;
companies, e-shops, and software producers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://ee.linkedin.com/jobs/cyber-security-jobs?countryRedirected=1&amp;amp;amp;position=1&amp;amp;amp;pageNum=0&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Trends that affect companies create need for constant cyber security&lt;br /&gt;
services. Increasing number of home/remote offices require secure&lt;br /&gt;
corporate networks and security of remote devices. One example is from&lt;br /&gt;
this year, when sloppy remote desktop set-up paralyzed systems of 17&lt;br /&gt;
companies.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.aripaev.ee/uudised/2022/04/20/ria-lohakas-kaugtoolaua-seadistus-halvas-martsis-vahemalt-17-juhul-ettevotete-it-susteemid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Also, no service can exists without robust infrastructure - servers,&lt;br /&gt;
databases, applications. As all previously mentioned devices and&lt;br /&gt;
services are at constant scanning and surveillance. So, the breach&lt;br /&gt;
detection and immediate action demands 24/7 services. Even if lot of&lt;br /&gt;
things could be automated, there is a need for human specialists (at&lt;br /&gt;
least, at the moment). Third growing field is also a forensic&lt;br /&gt;
investigation, as every attack must be investigated in order to be ready&lt;br /&gt;
to repel next attacks. So data recovery and evidence collection is&lt;br /&gt;
another important field of work that need skilled and professional&lt;br /&gt;
workers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Even, if the specifics of the entity, be it CSIRT, CERT or SOC, are&lt;br /&gt;
different, the fundamentals of the work are the same. Professional&lt;br /&gt;
knowledge of the networks, operational systems, hardware, scripting, and&lt;br /&gt;
several other wider IT related knowledge is needed. As there is no&lt;br /&gt;
single way to reach to it, every single person can find one’s strongest&lt;br /&gt;
sides and develop them with knowledge of weaker side, in order to know,&lt;br /&gt;
when to as for help.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/body&amp;gt;&lt;br /&gt;
&amp;lt;/html&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mavald</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142184</id>
		<title>Hiring a Cyber Security Incident Analyst</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142184"/>
		<updated>2022-05-01T14:49:54Z</updated>

		<summary type="html">&lt;p&gt;Mavald: /* Remediating incidents */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==A Cyber Security Incident Analyst==&lt;br /&gt;
&lt;br /&gt;
[[File:image1.png|600px|thumb|Job advertisement &amp;lt;ref&amp;gt;&amp;quot;Job Advertisement&amp;quot;. Available at https://www.projectpeople.com/jobs/&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
===Cyber security incident analyst in SOC/CSIRT/CERT===&lt;br /&gt;
This article delves into the job title of Cyber Security Incident&lt;br /&gt;
Analyst and provides an overview of the acronyms SOC/CSIRT/CERT. A brief&lt;br /&gt;
history of the job is discussed here, as well as a possible career path,&lt;br /&gt;
education, experience, and other characteristics required for work in&lt;br /&gt;
computer security-related organizations. The article also provides a&lt;br /&gt;
brief history of SOC/CSIRT/CERT, as well as a comparison of their&lt;br /&gt;
differences and similarities.&lt;br /&gt;
===Cyber Security Incident Analyst Skill Set===&lt;br /&gt;
What skill set is expected from the Cyber Security Incident Analyst? Below written lines are taken from the same job advertisement depicted&lt;br /&gt;
on the left side of this article:&lt;br /&gt;
As a Security Incident Analyst your responsibilities will include:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Continuous monitoring of security tooling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Performing regular and ad-hoc vulnerability assessments&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Carrying out ‘spot checks’&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Reporting vulnerabilities to the PVG via the alerts system&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintaining and documenting logging systems&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Developing centralized logging, reporting and intelligence&lt;br /&gt;
platforms&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;‘Light touch’ penetration testing with open source tooling&lt;br /&gt;
(Metasploit)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Knowledge &amp;amp;amp; Experience required:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;SOC, CSIRT or CERT operational environment experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Windows / Linux experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TCP /IP networking protocol knowledge&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience reviewing and analyzing Security Events from various&lt;br /&gt;
monitoring and logging sources&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience in website and web application security assessment or&lt;br /&gt;
penetration testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience of using Metasploit&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Scripting knowledge using BASH, Python, Perl, Ruby&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Skills in Host and Network Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
As one can see the description of the duties is wide and also the&lt;br /&gt;
knowledge and experience that is required is noteworthy. So, where to&lt;br /&gt;
start to find out the way to get this kind of knowledge and&lt;br /&gt;
expertize.&lt;br /&gt;
===Possible career path===&lt;br /&gt;
Next part of the paper is aiming to depict a possible ways, how to&lt;br /&gt;
develop oneself, and move along the career pathway in cybersecurity&lt;br /&gt;
field. Topics of development, education, experience and certification&lt;br /&gt;
are covered.&lt;br /&gt;
[[File:analystimage2.png|1000px|thumb|Career path &amp;lt;ref&amp;gt;&amp;quot;Possible Career Path&amp;quot;. Available at https://www.cyberseek.org/pathway.html&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
===Junior/Senior===&lt;br /&gt;
Start with an entry-level job in IT. Hands-on experience is often the&lt;br /&gt;
most effective way to prepare for certification exams. Start&lt;br /&gt;
accumulating work experience with an entry-level role as a cybersecurity&lt;br /&gt;
analyst. Many cybersecurity professionals start off in more general IT&lt;br /&gt;
roles. The skills, practices, and technologies you’ll use as a&lt;br /&gt;
cybersecurity professional will continue to evolve along with computer&lt;br /&gt;
and network technology. The desire to learn, ability to problem solve,&lt;br /&gt;
and attention to detail will serve you well in this field. Other, more&lt;br /&gt;
technical skills and technologies to learn include:&amp;lt;ref name=&amp;quot;certification&amp;quot;&amp;gt;Popular Cyber Security Certificates [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications  [Accessed 25 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====SIEM tools (security information and event management)====&lt;br /&gt;
Security Information and Event Management (SIEM) is a set of tools&lt;br /&gt;
and services offering a holistic view of an organization’s information&lt;br /&gt;
security. SIEM works by combining two technologies:&lt;br /&gt;
&amp;lt;li&amp;gt;Security information management (SIM), which collects data from log&lt;br /&gt;
files for analysis and reports on security threats and events, and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;security event management (SEM), which conducts real-time system&lt;br /&gt;
monitoring, notifies network admins about important issues and&lt;br /&gt;
establishes correlations between security events. There are a number of&lt;br /&gt;
security information and event management solutions on the market.&lt;br /&gt;
ArcSight ESM, IBM QRadar and Splunk are among the most popular. &amp;lt;ref name=&amp;quot;SIEM&amp;quot;&amp;gt;Application security, SIEM [Online]. Available: https://www.imperva.com/learn/application-security/siem/. [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Firewalls, Intrusion Detection Systems (IDS), and Intrusion Prevention Systems(IPS)====&lt;br /&gt;
Firewalls can be two types, hardware and software firewalls. Software&lt;br /&gt;
firewall is a firewall that is installed on a computer or server, and&lt;br /&gt;
tasked with network security. It works with a wide variety of other&lt;br /&gt;
technology security solutions to provide more robust and cohesive&lt;br /&gt;
security for enterprises of all sizes. When a software firewall is&lt;br /&gt;
installed on a server, it opens up like an umbrella of protection over&lt;br /&gt;
all other computers connected to the network. It is able to monitor both&lt;br /&gt;
incoming and outgoing traffic for potential risk or suspicious user&lt;br /&gt;
behavior, and also makes setting security policies much easier, faster&lt;br /&gt;
and more flexible. Hardware firewall is positioned between the network&lt;br /&gt;
and devices, allowing traffic to funnel through the firewall for a close&lt;br /&gt;
inspection and analysis. A hardware firewall, a term often&lt;br /&gt;
interchangeable with network or next-generation firewall, protects the&lt;br /&gt;
network gateways for an enterprise. Hardware firewall is physical&lt;br /&gt;
hardware, installed between network elements and connected devices, and&lt;br /&gt;
is tasked with filtering traffic for cyber threat to the network or&lt;br /&gt;
devices. Filtering out unauthorized or suspicious users based on traffic&lt;br /&gt;
analysis is one of the biggest benefits of hardware firewall. &amp;lt;ref name=&amp;quot;sangfor&amp;quot;&amp;gt;Sangfor, &amp;quot;What is Software Firewall? Difference between Hardware Firewall and Software Firewall, [Online]. Available: https://www.sangfor.com/blog/cybersecurity/what-is-software-firewall-difference-between-hardware-firewall-and-software-firewall [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems&lt;br /&gt;
(IPS) are both parts of the network infrastructure. IDS/IPS compare&lt;br /&gt;
network packets to a cyberthreat database containing known signatures of&lt;br /&gt;
cyberattacks — and flag any matching packets. IDS doesn’t alter the&lt;br /&gt;
network packets in any way, whereas IPS prevents the packet from&lt;br /&gt;
delivery based on the contents of the packet, much like how a firewall&lt;br /&gt;
prevents traffic by IP address. &amp;lt;ref name=&amp;quot;Varonis&amp;quot;&amp;gt;Varonis, &amp;quot;What is Software Firewall? IDS vs. IPS: What is the Difference?, [Online]. Available: https://www.varonis.com/blog/ids-vs-ips [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Digital forensics====&lt;br /&gt;
Digital forensics is a branch of forensic science that focuses on&lt;br /&gt;
identifying, acquiring, processing, analyzing, and reporting on data&lt;br /&gt;
stored electronically. Electronic evidence is a component of almost all&lt;br /&gt;
criminal activities and digital forensics support is crucial for law&lt;br /&gt;
enforcement investigations. Electronic evidence can be collected from a&lt;br /&gt;
wide array of sources, such as computers, smartphones, remote storage,&lt;br /&gt;
unmanned aerial systems, shipborne equipment, and more.&amp;lt;ref name=&amp;quot;interpol&amp;quot;&amp;gt;Interpol, &amp;quot;Digital forensics&amp;quot;. Available: https://www.interpol.int/How-we-work/Innovation/Digital-forensics. [Accessed 28 4 2022].&amp;lt;/ref&amp;gt; &lt;br /&gt;
Investigative process of digital forensics can be divided into several stages. There are four major stages: preservation, collection,&lt;br /&gt;
examination, and analysis. All these four stages need a deep understanding of computers, technology across a broad spectrum, and cybersecurity principles and&lt;br /&gt;
practices, a working knowledge of computers, networks, and coding, in-depth investigative abilities, critical-thinking skills and analytical talent the ability to effectively communicate and work with a&lt;br /&gt;
wide range of people. &amp;lt;ref name=&amp;quot;ecpi&amp;quot;&amp;gt;&amp;quot;Digital forensics&amp;quot;. Available: https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me. [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Mobile device management====&lt;br /&gt;
Mobile device management (MDM) is software that allows IT&lt;br /&gt;
administrators to control, secure and enforce policies on smartphones,&lt;br /&gt;
tablets and other endpoints. Mobile device management software emerged&lt;br /&gt;
in the early 2000s as a way to control and secure the personal digital&lt;br /&gt;
assistants and smartphones that business workers began to use. The&lt;br /&gt;
consumer smartphone boom that started with the launch of the Apple&lt;br /&gt;
iPhone in 2007 led to the bring your own device (BYOD) trend, which&lt;br /&gt;
fueled further interest in MDM.&amp;lt;ref name=&amp;quot;techtarget&amp;quot;&amp;gt;Techtarget, &amp;quot;Mobile Device Management&amp;quot;. Available: https://www.techtarget.com/searchmobilecomputing/definition/mobile-device-management [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Data management====&lt;br /&gt;
Sometimes the data management is neglected, but this part has a&lt;br /&gt;
crucial role when learning for good cyber security practices. Majority&lt;br /&gt;
of cyber security programs include a special courses on data management.&lt;br /&gt;
Data management is a method of organizing and maintaining data processes&lt;br /&gt;
that are required in almost every business operations. The benefits of&lt;br /&gt;
data management can be found accounting, statistics, logistics planning&lt;br /&gt;
and other disciplines including corporate computing.&amp;lt;ref name=&amp;quot;GlobalUni&amp;quot;&amp;gt;Global Universities, &amp;quot;MSc Data Management and Cyber Security&amp;quot;. Available: https://globaluniversities.in/msc-data-management-cyber-security. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Data governance (and management) play a fundamental role in&lt;br /&gt;
protecting an organization’s data. Ensuring that the right people have&lt;br /&gt;
the right access and that appropriate security controls are in place to&lt;br /&gt;
protect each system or service, based on the criticality or sensitivity&lt;br /&gt;
of the data sets these contain. &amp;lt;ref name=&amp;quot;CyberMagazine&amp;quot;&amp;gt;Cyber Security Magazine, &amp;quot;The Role of Data Governance in Cybersecurity&amp;quot;. Available: https://cybersecurity-magazine.com/the-role-of-data-governance-in-cybersecurity/?utm_source=rss&amp;amp;amp;utm_medium=rss&amp;amp;amp;utm_campaign=the-role-of-data-governance-in-cybersecurity. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Application security development====&lt;br /&gt;
Application security describes security measures at the application&lt;br /&gt;
level that aim to prevent data or code within the app from being stolen&lt;br /&gt;
or hijacked. It encompasses the security considerations that happen&lt;br /&gt;
during application development and design, but it also involves systems&lt;br /&gt;
and approaches to protect apps after they get deployed. Application&lt;br /&gt;
security may include hardware, software, and procedures that identify or&lt;br /&gt;
minimize security vulnerabilities.&lt;br /&gt;
https://www.vmware.com/topics/glossary/content/application-security.html&lt;br /&gt;
Application security development is important to ensure that your&lt;br /&gt;
application is free from coding errors and bugs. And controls the risk&lt;br /&gt;
and helps safeguard against security vulnerabilities. Application&lt;br /&gt;
security development is the process of making applications more secure&lt;br /&gt;
by finding and fixing security vulnerabilities. This is often done by&lt;br /&gt;
enforcing software security best practices and using application&lt;br /&gt;
security testing tools.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.perforce.com/blog/kw/application-security-development-best-practices&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Audit and compliance knowledge====&lt;br /&gt;
A cyber security audit is designed to be a comprehensive review and&lt;br /&gt;
analysis of your business’s IT infrastructure. It identifies threats and&lt;br /&gt;
vulnerabilities, exposing weaknesses and high-risk practices.&lt;br /&gt;
Regulations such as the EU GDPR (General Data Protection Regulation) can&lt;br /&gt;
impose hefty penalties in the event of a breach that results in&lt;br /&gt;
exploited data. A cyber security audit will help mitigate the&lt;br /&gt;
consequences of a breach and demonstrate that your organization has&lt;br /&gt;
taken the necessary steps to protect client and company data.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://cyforsecure.co.uk/services/cyber-assessment/cyber-security-audit/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Cybersecurity compliance is the organizational risk management method&lt;br /&gt;
aligned with pre-defined security measures &amp;amp;amp; controls on how data&lt;br /&gt;
confidentiality is ensured by its administrational procedures.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://nordlayer.com/blog/cybersecurity-compliance-everything-you-need-to-know/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;All needed skills are developed through courses and&lt;br /&gt;
certification.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
===Entry-Level Incident Response Positions===&lt;br /&gt;
&amp;lt;p&amp;gt;It is not always possible to advance to the position of incident&lt;br /&gt;
responder in a straight line. Many professionals advance from entry- to&lt;br /&gt;
mid-level positions before becoming a real incident responder or a&lt;br /&gt;
member of a computer emergency response team (CERT).&amp;lt;br /&amp;gt;&lt;br /&gt;
These are some examples:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;network-administrator&amp;quot;&amp;gt;Network administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;This position’s experience will help potential incident responders&lt;br /&gt;
develop networking skills. Attention to detail, as well as the ability&lt;br /&gt;
to sift through system configurations, site layouts, and general network&lt;br /&gt;
and communication setups, are essential in this field.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;system-administrator&amp;quot;&amp;gt;System administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Another crucial beginning point for an incident responder is to learn&lt;br /&gt;
how to manage resources inside your organization as well as user&lt;br /&gt;
behavior. Understanding the potential damage that users, inadequate&lt;br /&gt;
security setups, and ineffective IT policies and procedures can cause on&lt;br /&gt;
your network can provide prospective candidates with insight into the&lt;br /&gt;
human component of an incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;security-administrator&amp;quot;&amp;gt;Security administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In such a position, basic hacking skills, penetration testing, and&lt;br /&gt;
intrusion detection are all learned, which are crucial incident&lt;br /&gt;
responder skills when trying to replicate a breach or attack.&lt;br /&gt;
Understanding the paths a cybercriminal will take when attempting to&lt;br /&gt;
damage or obtain access to a system can greatly simplify the work of&lt;br /&gt;
reverse engineering the incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://resources.infosecinstitute.com/topic/incident-responder-career-roadmap-entry-level-executive/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3 id=&amp;quot;mid-level-incident-response-positions&amp;quot;&amp;gt;Mid-Level Incident&lt;br /&gt;
Response Positions&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5&lt;br /&gt;
id=&amp;quot;computer-security-incident-response-team-csirt-engineer&amp;quot;&amp;gt;Computer&lt;br /&gt;
security incident response team (CSIRT) engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;cyber-incident-responder&amp;quot;&amp;gt;Cyber incident responder&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-response-engineer&amp;quot;&amp;gt;Incident response&lt;br /&gt;
engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;While each of these positions is different, they generally require&lt;br /&gt;
very similar skills and characteristics in a candidate. At this level,&lt;br /&gt;
personal characteristics such as problem solving, time management, and&lt;br /&gt;
even presentation skills become more crucial as one’s career evolves&lt;br /&gt;
into a management-facing role.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Technical skills include the ability to identify and minimize threats&lt;br /&gt;
while maintaining communication with management and the rest of your&lt;br /&gt;
team. Data analysis and evidence gathering become increasingly crucial,&lt;br /&gt;
and the circumstances in which your services are deployed get more&lt;br /&gt;
serious.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Problem-solving skills are crucial at this level of incident&lt;br /&gt;
response, and as the stakes rise, so does the pressure in each&lt;br /&gt;
situation. At this level, programming abilities are essential since&lt;br /&gt;
incident responders may be needed to reverse engineer malicious code or&lt;br /&gt;
even create patches for vulnerable network applications or services.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.coursera.org/articles/popular-cybersecurity-certifications&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3 id=&amp;quot;senior-level-incident-response-positions&amp;quot;&amp;gt;Senior-Level Incident&lt;br /&gt;
Response Positions&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;intrusion-detection-specialist&amp;quot;&amp;gt;Intrusion detection&lt;br /&gt;
specialist:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;A CISSP certification might help a potential candidate in preparing&lt;br /&gt;
for the profession. The role of an intrusion detection specialist is to&lt;br /&gt;
find and stop any unwanted communications.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-manager&amp;quot;&amp;gt;Incident manager:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Expected to plan, oversee, manage, and supervise all incident&lt;br /&gt;
response team actions. Is in charge of reporting all current events to&lt;br /&gt;
senior management and stakeholders, as well as acting as the technical&lt;br /&gt;
lead on active incidents for incident responders. Prepares threat and&lt;br /&gt;
impact assessments and reports them known to management.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.coursera.org/articles/popular-cybersecurity-certifications&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Certificates== &lt;br /&gt;
There is a vast number of different certificates and the road map to&lt;br /&gt;
being a certified professional could be very different&amp;lt;ref name=&amp;quot;Coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated],&amp;quot; [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;NICCS&amp;quot;&amp;gt;NICCS, &amp;quot;Cybersecurity Certifications,&amp;quot; [Online]. Available: hhttps://niccs.cisa.gov/about-niccs/cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt; . One possible&lt;br /&gt;
approach is to start with basic certificates from the different branches&lt;br /&gt;
of service and move to more specific and demanding focused&lt;br /&gt;
certification. Also, some jobs require certain clearances, either from&lt;br /&gt;
industry, or from the government. One small selection of different&lt;br /&gt;
possible certificates is brought out in following paragraphs.&lt;br /&gt;
&lt;br /&gt;
Security+ is a CompTIA certification that is considered a basic cert&lt;br /&gt;
among cybersecurity professionals. It covers the topics of risk&lt;br /&gt;
management and threat assessment.&lt;br /&gt;
Network+ is also offered by CompTIA this certification (like the name&lt;br /&gt;
implies) focuses on networking infrastructure and operations. It is&lt;br /&gt;
considered a foundational certification.&lt;br /&gt;
The Certified Information Systems Security Professional (CISSP) is a&lt;br /&gt;
more advanced certification designed for cybersecurity professionals&lt;br /&gt;
with at least five years of work experience. The certification covers&lt;br /&gt;
topics such as architecture, engineering, and management.&amp;lt;/p&amp;gt;&lt;br /&gt;
The Certified Ethical Hacker (CEH) certification is also considered a&lt;br /&gt;
more advanced cert because it generally requires that applicants have&lt;br /&gt;
multiple years of work experience. The goal of an ethical hacker&lt;br /&gt;
certification is to be able to understand how cyber attacks unfold in&lt;br /&gt;
order to improve threat assessment and mitigation skills.&amp;lt;ref name=&amp;quot;cyberguide&amp;quot;&amp;gt;Cybersecurity Guide, &amp;quot;How to become a cybersecurity specialist&amp;quot;, [Online]. Available: https://cybersecurityguide.org/careers/security-specialist/. [Accessed 27 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
This is definitely not all, when one looks for more information, following link could be searched, to get more in depth knowledge about&lt;br /&gt;
different possibilities. Hereby, with the help of this matrix a possible taxonomy of different 436 listed certificates in branches are&lt;br /&gt;
presented.&amp;lt;ref name=&amp;quot;Pauljeremy&amp;quot;&amp;gt;&amp;quot;Cybersecurity Roadmap,&amp;quot; [Online]. Available: https://pauljerimy.com/2020/10/12/scr-oct-2020-update/. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:analystimage5.png|1000px|thumb|Certificate matrix &amp;lt;ref&amp;gt;&amp;quot;Certification roadmap&amp;quot;. Available at https://pauljerimy.com/security-certification-roadmap&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
=== Communication and Network Security===&lt;br /&gt;
Communication and network security covers the ability to secure&lt;br /&gt;
communication channels and networks. Topics include secure and converges&lt;br /&gt;
protocols, wireless networks, cellular networks, hardware operations&lt;br /&gt;
(warranty and redundant power), and third-party connectivity. IP&lt;br /&gt;
networking are also included in this domain.&lt;br /&gt;
===Identity and Access Management===&lt;br /&gt;
The identity and access management domain covers the attacks that&lt;br /&gt;
target the human gateway to gain access to data. Other topics include&lt;br /&gt;
ways to identify users with rights to access the information and&lt;br /&gt;
servers. Identity and access management covers the topics of&lt;br /&gt;
applications, Single sign-on authentication, privilege escalation,&lt;br /&gt;
Kerberos, rule-based or risk-based access control, proofing and&lt;br /&gt;
establishment of identity.&lt;br /&gt;
===Security Architecture and Engineering===&lt;br /&gt;
The security architecture and engineering domain covers important&lt;br /&gt;
topics concerning security engineering plans, designs and principles,&lt;br /&gt;
Topics include assessing and mitigating information system&lt;br /&gt;
vulnerabilities, fundamental concepts of security models and security&lt;br /&gt;
architectures in critical areas like access control. Cloud systems,&lt;br /&gt;
cryptography, system infiltrations (ransomware, fault-injection and&lt;br /&gt;
more) and virtualized systems are also covered in this domain.&lt;br /&gt;
===Asset Security===&lt;br /&gt;
The Asset Security domain deals with the issues related to the&lt;br /&gt;
collection, storage, maintenance, retention and destruction of data. It&lt;br /&gt;
also covers knowledge of different roles regarding data handling (owner,&lt;br /&gt;
controller and custodian) as well as data protection methods and data&lt;br /&gt;
states. Other topics include resource provision, asset classification&lt;br /&gt;
and data lifecycle management.&lt;br /&gt;
===Security and Risk Management===&lt;br /&gt;
The security and risk management domain covers general on skills&lt;br /&gt;
related to the implementation of user awareness programs as well as&lt;br /&gt;
security procedures. Emphasis is also placed on risk management&lt;br /&gt;
concerning the acquisition of new services, hardware and software&lt;br /&gt;
(supply chain). Other skills include social engineering defense&lt;br /&gt;
mechanisms.&lt;br /&gt;
===Security Assessment and Testing===&lt;br /&gt;
The security assessment and testing domain deals with all the&lt;br /&gt;
techniques and tools used to find system vulnerabilities, weaknesses and&lt;br /&gt;
potential areas of concern not addressed by security procedures and&lt;br /&gt;
policies. Attack simulations, vulnerability assessment, compliance&lt;br /&gt;
checks, and ethical disclosure also fall under this domain.&lt;br /&gt;
===Software Security===&lt;br /&gt;
The software development security domain deals with implementing&lt;br /&gt;
software-based security protocols within environment for which the IT&lt;br /&gt;
professional is responsible. Risk analysis, vulnerability identification&lt;br /&gt;
and auditing of source codes are all covered in this subset. Additional&lt;br /&gt;
topics include software-designed security, maturity models, development&lt;br /&gt;
methodologies, open-source and third-party development security.&lt;br /&gt;
===Security operations===&lt;br /&gt;
The security operations domain covers topics ranging from&lt;br /&gt;
investigations and digital forensic to detection and intrusion&lt;br /&gt;
prevention tools, sandboxing and firewalls. Topics include user and&lt;br /&gt;
entity behavior analytics, threat intelligence (threat hunting and&lt;br /&gt;
threat feeds) log management, artifacts (mobile, computer and network),&lt;br /&gt;
machine learning and AI-based tools, penetration testing, and&lt;br /&gt;
exploitation development. These for sub-domains are lister here.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Incident Handling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Penetration Testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Exploitation&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Education==&lt;br /&gt;
&amp;lt;p&amp;gt;The entry level monitoring specialist is hired by Estonian&lt;br /&gt;
Information System Authority even if there is no formal IT education,&lt;br /&gt;
but readiness to learn and moderate knowledge of different operation&lt;br /&gt;
systems is enough to start the career.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.cv.ee/en/vacancy/792782/riigi-infosusteemi-amet/seirespetsialist-tule-eesti-kuberruumi-valvuriks&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Nevertheless, like most other high qualification careers jobs falling&lt;br /&gt;
under the cybersecurity specialist category require some form of formal&lt;br /&gt;
education. However, since cybersecurity specialist jobs can fall across&lt;br /&gt;
a wide spectrum of job descriptions and responsibilities, it is possible&lt;br /&gt;
to obtain a specialist job after completing many levels of different&lt;br /&gt;
computer related education.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;If one is looking for a cybersecurity related education, for example&lt;br /&gt;
in EU, 137 courses/programs could be found that relate to keyword IT or&lt;br /&gt;
cybersecurity.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.enisa.europa.eu/topics/cybersecurity-education/education-map/education-courses&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Also, there is a great amount of discussion, if cuber security&lt;br /&gt;
professional should have a degree or would be certification just enough.&lt;br /&gt;
One interesting table is produces by Franklin University that compares&lt;br /&gt;
benefits and/or drawbacks of each type of credential.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image11.png&amp;quot; alt=&amp;quot;Comparison MSc vs certificate&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;Comparison MSc vs&lt;br /&gt;
certificate&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Certifications are generally good for people with little practical&lt;br /&gt;
experience because they are known quantities in the industry and can&lt;br /&gt;
help you get your foot in the door. They set a minimum knowledge bar.&lt;br /&gt;
But some certifications are viewed more favorably than others.&lt;br /&gt;
Certifications with renewal requirements are viewed better by hiring&lt;br /&gt;
managers, but they also more costly in the long run because of the need&lt;br /&gt;
for continuing education. Certifications are also good for showing&lt;br /&gt;
in-depth expertise in a specialization within cybersecurity. Depending&lt;br /&gt;
on your career goals, it may be advantageous to have a master’s&lt;br /&gt;
degree—which shows your breadth of knowledge, critical thinking and&lt;br /&gt;
leadership skills—and a certificate—which shows specific skill&lt;br /&gt;
competency.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;As IT (Cyber) Security is still a relatively young discipline,&lt;br /&gt;
universities and colleges are still figuring out which is the best&lt;br /&gt;
approach for their degrees. Study programmes and curricula in Cyber&lt;br /&gt;
Security are different. In general, here are the duration of Cyber&lt;br /&gt;
Security degrees:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Bachelor’s degrees in Cyber Security take 3 or 4 years in most&lt;br /&gt;
countries.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Master’s courses in Cyber Security take between 1-2 years to&lt;br /&gt;
complete.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;PhD programmes in Cyber Security last 3-5 years. Some only take 1&lt;br /&gt;
or 2 years, but they are less common.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Generalization could me made that on bachelor level the general&lt;br /&gt;
knowledge about the cyber issues are obtained. On master level the&lt;br /&gt;
specialization courses are taken and the person can choose more specific&lt;br /&gt;
topics to study. It is on master level where strengths of the cyber&lt;br /&gt;
specialist can be developed further and up-do date knowledge obtained in&lt;br /&gt;
specifics. PhD is serious science and involves teaching, lot of&lt;br /&gt;
scientific work and writing for publications.&amp;lt;/p&amp;gt;&lt;br /&gt;
==Salary==&lt;br /&gt;
&amp;lt;p&amp;gt;Even if the salary can be very different, compared to the skills and&lt;br /&gt;
experience, an generalization can be made. Cyber Security professionals&lt;br /&gt;
in CSIRT, and in other entities earn quite well, from the start. First,&lt;br /&gt;
some comparison from the United States. The average CSIRT analyst salary&lt;br /&gt;
in the USA is $97,500 per year or $50 per hour. Entry level positions&lt;br /&gt;
start at $48,875 per year while most experienced workers make up to&lt;br /&gt;
$135,373 per year.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.talent.com/salary?job=csirt+analyst&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;There are multiple positions you can occupy in this field. They have&lt;br /&gt;
in common great salaries and high demand for technical skills, attention&lt;br /&gt;
to details, problem-solving mentality, and the ability to analyze risks.&lt;br /&gt;
Here are the average annual salaries in the United States, according to&lt;br /&gt;
Payscale:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.payscale.com/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Cryptographer – 100,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Information Security Officer – 91,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Assessor – 90,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Engineer – 88,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Penetration Tester – 81,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Forensics Expert – 71,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Administrator – 65,000 USD&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When looking into salaries in Estonia, one can find that there is a&lt;br /&gt;
discussion that private sector is taking a toll from the public sector,&lt;br /&gt;
and that the salaries in important agencies, as Information System&lt;br /&gt;
Authority loose their employees to the better paid positions in private&lt;br /&gt;
sector.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://digi.geenius.ee/rubriik/uudis/kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad/&lt;br /&gt;
https://tehnika.postimees.ee/6887428/riigi-it-tootajate-palgamaarad-kasvasid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;But there is also a different view that average private sector worker&lt;br /&gt;
could be hired as a top specialist in public sector and then the payment&lt;br /&gt;
is higher. Nevertheless, it seems that the average payment in cyber&lt;br /&gt;
security sector is any way higher that in other parts of the&lt;br /&gt;
e-services.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://digi.geenius.ee/rubriik/uudis/5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka/&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
==SOC==&lt;br /&gt;
&amp;lt;p&amp;gt;A SOC is a facility where an organization’s network, applications,&lt;br /&gt;
and endpoints are monitored and defended. The term was adapted from&lt;br /&gt;
network operations centers (NOCs), where large telecommunication or&lt;br /&gt;
corporate networks are monitored. When network security became more of a&lt;br /&gt;
concern, security teams were formed within the NOCs, and eventually spun&lt;br /&gt;
off into larger organizations of their own as the responsibilities of&lt;br /&gt;
security teams grew increasingly complex and specialized. The security&lt;br /&gt;
staff working in a security operations center are often called the SOC&lt;br /&gt;
team.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Functions of the SOC team include, but are not limited to:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ol type=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Taking inventory of resources, to get a better understanding of the&lt;br /&gt;
structure they are protecting.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintanence of the system, by constantly making updates and adding&lt;br /&gt;
safeguards.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Monitoring the network for abnormalities with special tools.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Threat analysis of new attacks and vulnerabilities.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Responding to attacks, by acting as “first responders”. The SOC team&lt;br /&gt;
will shut down and/or isolate endpoints, deleting files and lowering the&lt;br /&gt;
impact as fast as possible.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Recovery of system stability and lost data. This may be done using&lt;br /&gt;
backups, restarting endpoints or reconfiguring systems.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Logging all actions on the system, to be later used for analysis or&lt;br /&gt;
forensics after an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigating the root cause of an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Auditing their own actions, to be in line with regulations of the&lt;br /&gt;
organization, industry or governing body.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.trellix.com/en-us/security-awareness/operations/what-is-soc.html&amp;lt;/p&amp;gt;&lt;br /&gt;
==CSIRT==&lt;br /&gt;
&amp;lt;p&amp;gt;A CSIRT is a group that responds to security incidents when they&lt;br /&gt;
occur. Key responsibilities of a CSIRT include:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
===Creating and maintaining an incident response plan (IRP)===&lt;br /&gt;
An incident response plan (IRP) is a set of written instructions for&lt;br /&gt;
detecting, responding to and limiting the effects of an information&lt;br /&gt;
security event. Incident response plans provide instructions for&lt;br /&gt;
responding to many potential scenarios, including data breaches, denial&lt;br /&gt;
of service/distributed denial of service attacks, firewall breaches,&lt;br /&gt;
virus or malware outbreaks or insider threats. Without an incident&lt;br /&gt;
response plan in place, organizations may either not detect the attack&lt;br /&gt;
in the first place, or not follow proper protocol to contain the threat&lt;br /&gt;
and recover from it when a breach is detected.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.stratacore.com/incidentresponseplan&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
===Investigating and analyzing incidents===&lt;br /&gt;
CSIRTs are also involved in improvement activities. After major&lt;br /&gt;
computer security incidents occur, or when incidents are not handled in&lt;br /&gt;
a timely or effective manner, a CSIRT will generally perform a&lt;br /&gt;
postmortem of the incident and its response. This postmortem will&lt;br /&gt;
identify the strengths and weakness of the response effort. Such reviews&lt;br /&gt;
can identify weaknesses and holes in systems, infrastructure defenses,&lt;br /&gt;
or policies that allowed the incident to take place. It can also&lt;br /&gt;
identify problems with communication channels, interfaces, and&lt;br /&gt;
procedures that inhibited the efficient resolution of the reported&lt;br /&gt;
problem.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.cisa.gov/uscert/bsi/articles/best-practices/incident-management/defining-computer-security-incident-response-teams&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Managing internal communications and updates during or immediately after incidents occur===&lt;br /&gt;
===Communicating with employees, shareholders, customers, and the press about incidents as needed===&lt;br /&gt;
&amp;lt;p&amp;gt;There are various services within the CSIRT Services Framework that&lt;br /&gt;
address communications, as they relate to security operations and&lt;br /&gt;
incident response services. Some of these include Information Security&lt;br /&gt;
Incident Coordination, Crisis Management Support, Vulnerability&lt;br /&gt;
Disclosure, Situational Awareness Communication, and Awareness Building,&lt;br /&gt;
to name a few. Sharing information and communicating with the general&lt;br /&gt;
public and/or your constituency is appropriate in many different&lt;br /&gt;
scenarios. These can range from proactive communications to reactive&lt;br /&gt;
communications. Each scenario may be unique, and careful consideration&lt;br /&gt;
should be given to when to release information to the public and what&lt;br /&gt;
information should be released.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;https://resources.sei.cmu.edu/asset_files/Handbook/2021_002_001_651819.pdf&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Remediating incidents===&lt;br /&gt;
Threat remediation is a strong and capable tool for fighting the&lt;br /&gt;
cyber security compromises. As the word ‘remedy’ suggests, remediation&lt;br /&gt;
process involves the treatment of a security breach. With the&lt;br /&gt;
remediation practices, your cyber security team is able to eliminate&lt;br /&gt;
suspicious activities and malicious attacks in the form of malware,&lt;br /&gt;
ransomware, phishing and such. Even if you ‘kill’ the suspicious&lt;br /&gt;
activity, the attackers can remain in your systems. If you want to&lt;br /&gt;
contaminate and end the problem for good, your remediation processes&lt;br /&gt;
must involve the detection of the cause. &amp;lt;ref name=&amp;quot;logsign&amp;quot;&amp;gt;Logsign, &amp;quot;What-is-remediation-in-cyber-security&amp;quot;. Available: https://www.logsign.com/blog/what-is-remediation-in-cyber-security/. [Accessed 28 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Recommending technology, policy, governance, and training changes after security&lt;br /&gt;
incidents===&lt;br /&gt;
After all these actions, the SCIRT must contribute to the development&lt;br /&gt;
of better policies, practices and has to recommend improvements. They&lt;br /&gt;
are not working in the vacuum and their work has to create new and&lt;br /&gt;
better standards for cyber security. &amp;lt;ref name=&amp;quot;exabeam&amp;quot;&amp;gt;Exabeam, &amp;quot;CSIRT&amp;quot;. Available: https://www.exabeam.com/incident-response/csirt/ [Accessed 28 APr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==CERT==&lt;br /&gt;
&amp;lt;p&amp;gt;The term “computer emergency response team” was coined in 1988. In&lt;br /&gt;
response to the Morris worm attack that impacted thousands of servers on&lt;br /&gt;
the Internet, DARPA funded the formation of the Computer Emergency&lt;br /&gt;
Response Team Coordination Center (CERT-CC) at Carnegie Mellon&lt;br /&gt;
University. The goal of CERT-CC was to help protect the internet by&lt;br /&gt;
collecting and disseminating information on critical security&lt;br /&gt;
vulnerabilities. Several other countries formed similar centers using&lt;br /&gt;
the same acronym (despite threats of legal action by Carnegie Mellon for&lt;br /&gt;
trademark infringement). Now the term CERT refers to any emergency&lt;br /&gt;
response team that deals with cyber threats. Many people use CERT-CC&lt;br /&gt;
interchangeably with CSIRT, though the charter of a CERT is information&lt;br /&gt;
sharing in order to help other response teams respond to threats against&lt;br /&gt;
their own infrastructure.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In general, the designation of CERT is helpful in applying real-world&lt;br /&gt;
solutions to various cybersecurity problems. They may be government&lt;br /&gt;
contractors or employees of a major corporation. For example, the U.S.&lt;br /&gt;
Computer Emergency Readiness Team (US-CERT) operates under the U.S.&lt;br /&gt;
Department of Homeland Security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.techopedia.com/definition/31003/computer-emergency-response-team-cert&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In Estonia CERT is designated as CERT-EE. It was established in 2006,&lt;br /&gt;
as an organization responsible for the management of security incidents&lt;br /&gt;
in .ee computer networks. It is also a national contact point for&lt;br /&gt;
international co-operation in the field of IT security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ria.ee/en/cyber-security/cert-ee.html&amp;lt;/p&amp;gt;&lt;br /&gt;
===Difference between SOC/CSIRT/CERT===&lt;br /&gt;
&amp;lt;p&amp;gt;How CSIRTs differ from CERTs and SOCs There are overlapping&lt;br /&gt;
responsibilities between a community emergency response team (CERT),&lt;br /&gt;
computer security incident response team (CSIRT), and security&lt;br /&gt;
operations center (SOC). To add to this confusion, frequently, the terms&lt;br /&gt;
CERT and CSIRT are used interchangeably, despite the important&lt;br /&gt;
differences.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image3.png&amp;quot; alt=&amp;quot;Overlapping in images/image3.png&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;Overlapping in&lt;br /&gt;
images/image3.png&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
==Understand the primary roles and characteristics of a CERT, CSIRT, and SOC.==&lt;br /&gt;
&amp;lt;p&amp;gt;So, using strict definitions, a CERT collects and disseminates&lt;br /&gt;
security information, typically for the benefit of a country or an&lt;br /&gt;
industry. A CSIRT is a cross-functional team that responds to incidents&lt;br /&gt;
on behalf of a country or an organization. A SOC is where a country or&lt;br /&gt;
organization monitors and defends its network, servers, applications,&lt;br /&gt;
and endpoints.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image4.png&amp;quot; alt=&amp;quot;table of explanation images/image4&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;table of explanation&lt;br /&gt;
images/image4&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
==Future==&lt;br /&gt;
&amp;lt;p&amp;gt;And the Cyber security problem is only getting bigger. According to a&lt;br /&gt;
report published by Accenture, the number of cyber security breaches&lt;br /&gt;
increased by 11 percent from 2017 to 2018. The cost of such breaches is&lt;br /&gt;
astronomical–about $600 billion worldwide, according to the Economic&lt;br /&gt;
Impact of Cybercrime report.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Job projections for cybersecurity are staggering. The Bureau of Labor&lt;br /&gt;
Statistics in US predicts that careers in the cybersecurity field will&lt;br /&gt;
grow by 32% by 2028. That makes cybersecurity one of the top 10&lt;br /&gt;
fastest-growing jobs in the country. In the United States alone, jobs&lt;br /&gt;
for Information Security Analysts are expected to grow by 15% by&lt;br /&gt;
2024.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Most likely this trend is also similar in other countries.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When checking Estonian job portals, there is a constant need for&lt;br /&gt;
people for cyber security related positions. Also, linkedin search gives&lt;br /&gt;
approximately 30 vacancies immediately. There are banks, logistics&lt;br /&gt;
companies, e-shops, and software producers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://ee.linkedin.com/jobs/cyber-security-jobs?countryRedirected=1&amp;amp;amp;position=1&amp;amp;amp;pageNum=0&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Trends that affect companies create need for constant cyber security&lt;br /&gt;
services. Increasing number of home/remote offices require secure&lt;br /&gt;
corporate networks and security of remote devices. One example is from&lt;br /&gt;
this year, when sloppy remote desktop set-up paralyzed systems of 17&lt;br /&gt;
companies.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.aripaev.ee/uudised/2022/04/20/ria-lohakas-kaugtoolaua-seadistus-halvas-martsis-vahemalt-17-juhul-ettevotete-it-susteemid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Also, no service can exists without robust infrastructure - servers,&lt;br /&gt;
databases, applications. As all previously mentioned devices and&lt;br /&gt;
services are at constant scanning and surveillance. So, the breach&lt;br /&gt;
detection and immediate action demands 24/7 services. Even if lot of&lt;br /&gt;
things could be automated, there is a need for human specialists (at&lt;br /&gt;
least, at the moment). Third growing field is also a forensic&lt;br /&gt;
investigation, as every attack must be investigated in order to be ready&lt;br /&gt;
to repel next attacks. So data recovery and evidence collection is&lt;br /&gt;
another important field of work that need skilled and professional&lt;br /&gt;
workers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Even, if the specifics of the entity, be it CSIRT, CERT or SOC, are&lt;br /&gt;
different, the fundamentals of the work are the same. Professional&lt;br /&gt;
knowledge of the networks, operational systems, hardware, scripting, and&lt;br /&gt;
several other wider IT related knowledge is needed. As there is no&lt;br /&gt;
single way to reach to it, every single person can find one’s strongest&lt;br /&gt;
sides and develop them with knowledge of weaker side, in order to know,&lt;br /&gt;
when to as for help.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/body&amp;gt;&lt;br /&gt;
&amp;lt;/html&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mavald</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142182</id>
		<title>Hiring a Cyber Security Incident Analyst</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142182"/>
		<updated>2022-05-01T14:42:42Z</updated>

		<summary type="html">&lt;p&gt;Mavald: /* Possible career path */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==A Cyber Security Incident Analyst==&lt;br /&gt;
&lt;br /&gt;
[[File:image1.png|600px|thumb|Job advertisement &amp;lt;ref&amp;gt;&amp;quot;Job Advertisement&amp;quot;. Available at https://www.projectpeople.com/jobs/&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
===Cyber security incident analyst in SOC/CSIRT/CERT===&lt;br /&gt;
This article delves into the job title of Cyber Security Incident&lt;br /&gt;
Analyst and provides an overview of the acronyms SOC/CSIRT/CERT. A brief&lt;br /&gt;
history of the job is discussed here, as well as a possible career path,&lt;br /&gt;
education, experience, and other characteristics required for work in&lt;br /&gt;
computer security-related organizations. The article also provides a&lt;br /&gt;
brief history of SOC/CSIRT/CERT, as well as a comparison of their&lt;br /&gt;
differences and similarities.&lt;br /&gt;
===Cyber Security Incident Analyst Skill Set===&lt;br /&gt;
What skill set is expected from the Cyber Security Incident Analyst? Below written lines are taken from the same job advertisement depicted&lt;br /&gt;
on the left side of this article:&lt;br /&gt;
As a Security Incident Analyst your responsibilities will include:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Continuous monitoring of security tooling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Performing regular and ad-hoc vulnerability assessments&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Carrying out ‘spot checks’&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Reporting vulnerabilities to the PVG via the alerts system&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintaining and documenting logging systems&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Developing centralized logging, reporting and intelligence&lt;br /&gt;
platforms&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;‘Light touch’ penetration testing with open source tooling&lt;br /&gt;
(Metasploit)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Knowledge &amp;amp;amp; Experience required:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;SOC, CSIRT or CERT operational environment experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Windows / Linux experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TCP /IP networking protocol knowledge&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience reviewing and analyzing Security Events from various&lt;br /&gt;
monitoring and logging sources&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience in website and web application security assessment or&lt;br /&gt;
penetration testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience of using Metasploit&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Scripting knowledge using BASH, Python, Perl, Ruby&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Skills in Host and Network Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
As one can see the description of the duties is wide and also the&lt;br /&gt;
knowledge and experience that is required is noteworthy. So, where to&lt;br /&gt;
start to find out the way to get this kind of knowledge and&lt;br /&gt;
expertize.&lt;br /&gt;
===Possible career path===&lt;br /&gt;
Next part of the paper is aiming to depict a possible ways, how to&lt;br /&gt;
develop oneself, and move along the career pathway in cybersecurity&lt;br /&gt;
field. Topics of development, education, experience and certification&lt;br /&gt;
are covered.&lt;br /&gt;
[[File:analystimage2.png|1000px|thumb|Career path &amp;lt;ref&amp;gt;&amp;quot;Possible Career Path&amp;quot;. Available at https://www.cyberseek.org/pathway.html&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
===Junior/Senior===&lt;br /&gt;
Start with an entry-level job in IT. Hands-on experience is often the&lt;br /&gt;
most effective way to prepare for certification exams. Start&lt;br /&gt;
accumulating work experience with an entry-level role as a cybersecurity&lt;br /&gt;
analyst. Many cybersecurity professionals start off in more general IT&lt;br /&gt;
roles. The skills, practices, and technologies you’ll use as a&lt;br /&gt;
cybersecurity professional will continue to evolve along with computer&lt;br /&gt;
and network technology. The desire to learn, ability to problem solve,&lt;br /&gt;
and attention to detail will serve you well in this field. Other, more&lt;br /&gt;
technical skills and technologies to learn include:&amp;lt;ref name=&amp;quot;certification&amp;quot;&amp;gt;Popular Cyber Security Certificates [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications  [Accessed 25 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====SIEM tools (security information and event management)====&lt;br /&gt;
Security Information and Event Management (SIEM) is a set of tools&lt;br /&gt;
and services offering a holistic view of an organization’s information&lt;br /&gt;
security. SIEM works by combining two technologies:&lt;br /&gt;
&amp;lt;li&amp;gt;Security information management (SIM), which collects data from log&lt;br /&gt;
files for analysis and reports on security threats and events, and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;security event management (SEM), which conducts real-time system&lt;br /&gt;
monitoring, notifies network admins about important issues and&lt;br /&gt;
establishes correlations between security events. There are a number of&lt;br /&gt;
security information and event management solutions on the market.&lt;br /&gt;
ArcSight ESM, IBM QRadar and Splunk are among the most popular. &amp;lt;ref name=&amp;quot;SIEM&amp;quot;&amp;gt;Application security, SIEM [Online]. Available: https://www.imperva.com/learn/application-security/siem/. [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Firewalls, Intrusion Detection Systems (IDS), and Intrusion Prevention Systems(IPS)====&lt;br /&gt;
Firewalls can be two types, hardware and software firewalls. Software&lt;br /&gt;
firewall is a firewall that is installed on a computer or server, and&lt;br /&gt;
tasked with network security. It works with a wide variety of other&lt;br /&gt;
technology security solutions to provide more robust and cohesive&lt;br /&gt;
security for enterprises of all sizes. When a software firewall is&lt;br /&gt;
installed on a server, it opens up like an umbrella of protection over&lt;br /&gt;
all other computers connected to the network. It is able to monitor both&lt;br /&gt;
incoming and outgoing traffic for potential risk or suspicious user&lt;br /&gt;
behavior, and also makes setting security policies much easier, faster&lt;br /&gt;
and more flexible. Hardware firewall is positioned between the network&lt;br /&gt;
and devices, allowing traffic to funnel through the firewall for a close&lt;br /&gt;
inspection and analysis. A hardware firewall, a term often&lt;br /&gt;
interchangeable with network or next-generation firewall, protects the&lt;br /&gt;
network gateways for an enterprise. Hardware firewall is physical&lt;br /&gt;
hardware, installed between network elements and connected devices, and&lt;br /&gt;
is tasked with filtering traffic for cyber threat to the network or&lt;br /&gt;
devices. Filtering out unauthorized or suspicious users based on traffic&lt;br /&gt;
analysis is one of the biggest benefits of hardware firewall. &amp;lt;ref name=&amp;quot;sangfor&amp;quot;&amp;gt;Sangfor, &amp;quot;What is Software Firewall? Difference between Hardware Firewall and Software Firewall, [Online]. Available: https://www.sangfor.com/blog/cybersecurity/what-is-software-firewall-difference-between-hardware-firewall-and-software-firewall [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems&lt;br /&gt;
(IPS) are both parts of the network infrastructure. IDS/IPS compare&lt;br /&gt;
network packets to a cyberthreat database containing known signatures of&lt;br /&gt;
cyberattacks — and flag any matching packets. IDS doesn’t alter the&lt;br /&gt;
network packets in any way, whereas IPS prevents the packet from&lt;br /&gt;
delivery based on the contents of the packet, much like how a firewall&lt;br /&gt;
prevents traffic by IP address. &amp;lt;ref name=&amp;quot;Varonis&amp;quot;&amp;gt;Varonis, &amp;quot;What is Software Firewall? IDS vs. IPS: What is the Difference?, [Online]. Available: https://www.varonis.com/blog/ids-vs-ips [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Digital forensics====&lt;br /&gt;
Digital forensics is a branch of forensic science that focuses on&lt;br /&gt;
identifying, acquiring, processing, analyzing, and reporting on data&lt;br /&gt;
stored electronically. Electronic evidence is a component of almost all&lt;br /&gt;
criminal activities and digital forensics support is crucial for law&lt;br /&gt;
enforcement investigations. Electronic evidence can be collected from a&lt;br /&gt;
wide array of sources, such as computers, smartphones, remote storage,&lt;br /&gt;
unmanned aerial systems, shipborne equipment, and more.&amp;lt;ref name=&amp;quot;interpol&amp;quot;&amp;gt;Interpol, &amp;quot;Digital forensics&amp;quot;. Available: https://www.interpol.int/How-we-work/Innovation/Digital-forensics. [Accessed 28 4 2022].&amp;lt;/ref&amp;gt; &lt;br /&gt;
Investigative process of digital forensics can be divided into several stages. There are four major stages: preservation, collection,&lt;br /&gt;
examination, and analysis. All these four stages need a deep understanding of computers, technology across a broad spectrum, and cybersecurity principles and&lt;br /&gt;
practices, a working knowledge of computers, networks, and coding, in-depth investigative abilities, critical-thinking skills and analytical talent the ability to effectively communicate and work with a&lt;br /&gt;
wide range of people. &amp;lt;ref name=&amp;quot;ecpi&amp;quot;&amp;gt;&amp;quot;Digital forensics&amp;quot;. Available: https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me. [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Mobile device management====&lt;br /&gt;
Mobile device management (MDM) is software that allows IT&lt;br /&gt;
administrators to control, secure and enforce policies on smartphones,&lt;br /&gt;
tablets and other endpoints. Mobile device management software emerged&lt;br /&gt;
in the early 2000s as a way to control and secure the personal digital&lt;br /&gt;
assistants and smartphones that business workers began to use. The&lt;br /&gt;
consumer smartphone boom that started with the launch of the Apple&lt;br /&gt;
iPhone in 2007 led to the bring your own device (BYOD) trend, which&lt;br /&gt;
fueled further interest in MDM.&amp;lt;ref name=&amp;quot;techtarget&amp;quot;&amp;gt;Techtarget, &amp;quot;Mobile Device Management&amp;quot;. Available: https://www.techtarget.com/searchmobilecomputing/definition/mobile-device-management [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Data management====&lt;br /&gt;
Sometimes the data management is neglected, but this part has a&lt;br /&gt;
crucial role when learning for good cyber security practices. Majority&lt;br /&gt;
of cyber security programs include a special courses on data management.&lt;br /&gt;
Data management is a method of organizing and maintaining data processes&lt;br /&gt;
that are required in almost every business operations. The benefits of&lt;br /&gt;
data management can be found accounting, statistics, logistics planning&lt;br /&gt;
and other disciplines including corporate computing.&amp;lt;ref name=&amp;quot;GlobalUni&amp;quot;&amp;gt;Global Universities, &amp;quot;MSc Data Management and Cyber Security&amp;quot;. Available: https://globaluniversities.in/msc-data-management-cyber-security. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Data governance (and management) play a fundamental role in&lt;br /&gt;
protecting an organization’s data. Ensuring that the right people have&lt;br /&gt;
the right access and that appropriate security controls are in place to&lt;br /&gt;
protect each system or service, based on the criticality or sensitivity&lt;br /&gt;
of the data sets these contain. &amp;lt;ref name=&amp;quot;CyberMagazine&amp;quot;&amp;gt;Cyber Security Magazine, &amp;quot;The Role of Data Governance in Cybersecurity&amp;quot;. Available: https://cybersecurity-magazine.com/the-role-of-data-governance-in-cybersecurity/?utm_source=rss&amp;amp;amp;utm_medium=rss&amp;amp;amp;utm_campaign=the-role-of-data-governance-in-cybersecurity. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Application security development====&lt;br /&gt;
Application security describes security measures at the application&lt;br /&gt;
level that aim to prevent data or code within the app from being stolen&lt;br /&gt;
or hijacked. It encompasses the security considerations that happen&lt;br /&gt;
during application development and design, but it also involves systems&lt;br /&gt;
and approaches to protect apps after they get deployed. Application&lt;br /&gt;
security may include hardware, software, and procedures that identify or&lt;br /&gt;
minimize security vulnerabilities.&lt;br /&gt;
https://www.vmware.com/topics/glossary/content/application-security.html&lt;br /&gt;
Application security development is important to ensure that your&lt;br /&gt;
application is free from coding errors and bugs. And controls the risk&lt;br /&gt;
and helps safeguard against security vulnerabilities. Application&lt;br /&gt;
security development is the process of making applications more secure&lt;br /&gt;
by finding and fixing security vulnerabilities. This is often done by&lt;br /&gt;
enforcing software security best practices and using application&lt;br /&gt;
security testing tools.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.perforce.com/blog/kw/application-security-development-best-practices&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Audit and compliance knowledge====&lt;br /&gt;
A cyber security audit is designed to be a comprehensive review and&lt;br /&gt;
analysis of your business’s IT infrastructure. It identifies threats and&lt;br /&gt;
vulnerabilities, exposing weaknesses and high-risk practices.&lt;br /&gt;
Regulations such as the EU GDPR (General Data Protection Regulation) can&lt;br /&gt;
impose hefty penalties in the event of a breach that results in&lt;br /&gt;
exploited data. A cyber security audit will help mitigate the&lt;br /&gt;
consequences of a breach and demonstrate that your organization has&lt;br /&gt;
taken the necessary steps to protect client and company data.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://cyforsecure.co.uk/services/cyber-assessment/cyber-security-audit/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Cybersecurity compliance is the organizational risk management method&lt;br /&gt;
aligned with pre-defined security measures &amp;amp;amp; controls on how data&lt;br /&gt;
confidentiality is ensured by its administrational procedures.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://nordlayer.com/blog/cybersecurity-compliance-everything-you-need-to-know/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;All needed skills are developed through courses and&lt;br /&gt;
certification.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
===Entry-Level Incident Response Positions===&lt;br /&gt;
&amp;lt;p&amp;gt;It is not always possible to advance to the position of incident&lt;br /&gt;
responder in a straight line. Many professionals advance from entry- to&lt;br /&gt;
mid-level positions before becoming a real incident responder or a&lt;br /&gt;
member of a computer emergency response team (CERT).&amp;lt;br /&amp;gt;&lt;br /&gt;
These are some examples:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;network-administrator&amp;quot;&amp;gt;Network administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;This position’s experience will help potential incident responders&lt;br /&gt;
develop networking skills. Attention to detail, as well as the ability&lt;br /&gt;
to sift through system configurations, site layouts, and general network&lt;br /&gt;
and communication setups, are essential in this field.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;system-administrator&amp;quot;&amp;gt;System administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Another crucial beginning point for an incident responder is to learn&lt;br /&gt;
how to manage resources inside your organization as well as user&lt;br /&gt;
behavior. Understanding the potential damage that users, inadequate&lt;br /&gt;
security setups, and ineffective IT policies and procedures can cause on&lt;br /&gt;
your network can provide prospective candidates with insight into the&lt;br /&gt;
human component of an incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;security-administrator&amp;quot;&amp;gt;Security administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In such a position, basic hacking skills, penetration testing, and&lt;br /&gt;
intrusion detection are all learned, which are crucial incident&lt;br /&gt;
responder skills when trying to replicate a breach or attack.&lt;br /&gt;
Understanding the paths a cybercriminal will take when attempting to&lt;br /&gt;
damage or obtain access to a system can greatly simplify the work of&lt;br /&gt;
reverse engineering the incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://resources.infosecinstitute.com/topic/incident-responder-career-roadmap-entry-level-executive/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3 id=&amp;quot;mid-level-incident-response-positions&amp;quot;&amp;gt;Mid-Level Incident&lt;br /&gt;
Response Positions&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5&lt;br /&gt;
id=&amp;quot;computer-security-incident-response-team-csirt-engineer&amp;quot;&amp;gt;Computer&lt;br /&gt;
security incident response team (CSIRT) engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;cyber-incident-responder&amp;quot;&amp;gt;Cyber incident responder&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-response-engineer&amp;quot;&amp;gt;Incident response&lt;br /&gt;
engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;While each of these positions is different, they generally require&lt;br /&gt;
very similar skills and characteristics in a candidate. At this level,&lt;br /&gt;
personal characteristics such as problem solving, time management, and&lt;br /&gt;
even presentation skills become more crucial as one’s career evolves&lt;br /&gt;
into a management-facing role.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Technical skills include the ability to identify and minimize threats&lt;br /&gt;
while maintaining communication with management and the rest of your&lt;br /&gt;
team. Data analysis and evidence gathering become increasingly crucial,&lt;br /&gt;
and the circumstances in which your services are deployed get more&lt;br /&gt;
serious.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Problem-solving skills are crucial at this level of incident&lt;br /&gt;
response, and as the stakes rise, so does the pressure in each&lt;br /&gt;
situation. At this level, programming abilities are essential since&lt;br /&gt;
incident responders may be needed to reverse engineer malicious code or&lt;br /&gt;
even create patches for vulnerable network applications or services.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.coursera.org/articles/popular-cybersecurity-certifications&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3 id=&amp;quot;senior-level-incident-response-positions&amp;quot;&amp;gt;Senior-Level Incident&lt;br /&gt;
Response Positions&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;intrusion-detection-specialist&amp;quot;&amp;gt;Intrusion detection&lt;br /&gt;
specialist:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;A CISSP certification might help a potential candidate in preparing&lt;br /&gt;
for the profession. The role of an intrusion detection specialist is to&lt;br /&gt;
find and stop any unwanted communications.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-manager&amp;quot;&amp;gt;Incident manager:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Expected to plan, oversee, manage, and supervise all incident&lt;br /&gt;
response team actions. Is in charge of reporting all current events to&lt;br /&gt;
senior management and stakeholders, as well as acting as the technical&lt;br /&gt;
lead on active incidents for incident responders. Prepares threat and&lt;br /&gt;
impact assessments and reports them known to management.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.coursera.org/articles/popular-cybersecurity-certifications&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Certificates== &lt;br /&gt;
There is a vast number of different certificates and the road map to&lt;br /&gt;
being a certified professional could be very different&amp;lt;ref name=&amp;quot;Coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated],&amp;quot; [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;NICCS&amp;quot;&amp;gt;NICCS, &amp;quot;Cybersecurity Certifications,&amp;quot; [Online]. Available: hhttps://niccs.cisa.gov/about-niccs/cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt; . One possible&lt;br /&gt;
approach is to start with basic certificates from the different branches&lt;br /&gt;
of service and move to more specific and demanding focused&lt;br /&gt;
certification. Also, some jobs require certain clearances, either from&lt;br /&gt;
industry, or from the government. One small selection of different&lt;br /&gt;
possible certificates is brought out in following paragraphs.&lt;br /&gt;
&lt;br /&gt;
Security+ is a CompTIA certification that is considered a basic cert&lt;br /&gt;
among cybersecurity professionals. It covers the topics of risk&lt;br /&gt;
management and threat assessment.&lt;br /&gt;
Network+ is also offered by CompTIA this certification (like the name&lt;br /&gt;
implies) focuses on networking infrastructure and operations. It is&lt;br /&gt;
considered a foundational certification.&lt;br /&gt;
The Certified Information Systems Security Professional (CISSP) is a&lt;br /&gt;
more advanced certification designed for cybersecurity professionals&lt;br /&gt;
with at least five years of work experience. The certification covers&lt;br /&gt;
topics such as architecture, engineering, and management.&amp;lt;/p&amp;gt;&lt;br /&gt;
The Certified Ethical Hacker (CEH) certification is also considered a&lt;br /&gt;
more advanced cert because it generally requires that applicants have&lt;br /&gt;
multiple years of work experience. The goal of an ethical hacker&lt;br /&gt;
certification is to be able to understand how cyber attacks unfold in&lt;br /&gt;
order to improve threat assessment and mitigation skills.&amp;lt;ref name=&amp;quot;cyberguide&amp;quot;&amp;gt;Cybersecurity Guide, &amp;quot;How to become a cybersecurity specialist&amp;quot;, [Online]. Available: https://cybersecurityguide.org/careers/security-specialist/. [Accessed 27 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
This is definitely not all, when one looks for more information, following link could be searched, to get more in depth knowledge about&lt;br /&gt;
different possibilities. Hereby, with the help of this matrix a possible taxonomy of different 436 listed certificates in branches are&lt;br /&gt;
presented.&amp;lt;ref name=&amp;quot;Pauljeremy&amp;quot;&amp;gt;&amp;quot;Cybersecurity Roadmap,&amp;quot; [Online]. Available: https://pauljerimy.com/2020/10/12/scr-oct-2020-update/. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:analystimage5.png|1000px|thumb|Certificate matrix &amp;lt;ref&amp;gt;&amp;quot;Certification roadmap&amp;quot;. Available at https://pauljerimy.com/security-certification-roadmap&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
=== Communication and Network Security===&lt;br /&gt;
Communication and network security covers the ability to secure&lt;br /&gt;
communication channels and networks. Topics include secure and converges&lt;br /&gt;
protocols, wireless networks, cellular networks, hardware operations&lt;br /&gt;
(warranty and redundant power), and third-party connectivity. IP&lt;br /&gt;
networking are also included in this domain.&lt;br /&gt;
===Identity and Access Management===&lt;br /&gt;
The identity and access management domain covers the attacks that&lt;br /&gt;
target the human gateway to gain access to data. Other topics include&lt;br /&gt;
ways to identify users with rights to access the information and&lt;br /&gt;
servers. Identity and access management covers the topics of&lt;br /&gt;
applications, Single sign-on authentication, privilege escalation,&lt;br /&gt;
Kerberos, rule-based or risk-based access control, proofing and&lt;br /&gt;
establishment of identity.&lt;br /&gt;
===Security Architecture and Engineering===&lt;br /&gt;
The security architecture and engineering domain covers important&lt;br /&gt;
topics concerning security engineering plans, designs and principles,&lt;br /&gt;
Topics include assessing and mitigating information system&lt;br /&gt;
vulnerabilities, fundamental concepts of security models and security&lt;br /&gt;
architectures in critical areas like access control. Cloud systems,&lt;br /&gt;
cryptography, system infiltrations (ransomware, fault-injection and&lt;br /&gt;
more) and virtualized systems are also covered in this domain.&lt;br /&gt;
===Asset Security===&lt;br /&gt;
The Asset Security domain deals with the issues related to the&lt;br /&gt;
collection, storage, maintenance, retention and destruction of data. It&lt;br /&gt;
also covers knowledge of different roles regarding data handling (owner,&lt;br /&gt;
controller and custodian) as well as data protection methods and data&lt;br /&gt;
states. Other topics include resource provision, asset classification&lt;br /&gt;
and data lifecycle management.&lt;br /&gt;
===Security and Risk Management===&lt;br /&gt;
The security and risk management domain covers general on skills&lt;br /&gt;
related to the implementation of user awareness programs as well as&lt;br /&gt;
security procedures. Emphasis is also placed on risk management&lt;br /&gt;
concerning the acquisition of new services, hardware and software&lt;br /&gt;
(supply chain). Other skills include social engineering defense&lt;br /&gt;
mechanisms.&lt;br /&gt;
===Security Assessment and Testing===&lt;br /&gt;
The security assessment and testing domain deals with all the&lt;br /&gt;
techniques and tools used to find system vulnerabilities, weaknesses and&lt;br /&gt;
potential areas of concern not addressed by security procedures and&lt;br /&gt;
policies. Attack simulations, vulnerability assessment, compliance&lt;br /&gt;
checks, and ethical disclosure also fall under this domain.&lt;br /&gt;
===Software Security===&lt;br /&gt;
The software development security domain deals with implementing&lt;br /&gt;
software-based security protocols within environment for which the IT&lt;br /&gt;
professional is responsible. Risk analysis, vulnerability identification&lt;br /&gt;
and auditing of source codes are all covered in this subset. Additional&lt;br /&gt;
topics include software-designed security, maturity models, development&lt;br /&gt;
methodologies, open-source and third-party development security.&lt;br /&gt;
===Security operations===&lt;br /&gt;
The security operations domain covers topics ranging from&lt;br /&gt;
investigations and digital forensic to detection and intrusion&lt;br /&gt;
prevention tools, sandboxing and firewalls. Topics include user and&lt;br /&gt;
entity behavior analytics, threat intelligence (threat hunting and&lt;br /&gt;
threat feeds) log management, artifacts (mobile, computer and network),&lt;br /&gt;
machine learning and AI-based tools, penetration testing, and&lt;br /&gt;
exploitation development. These for sub-domains are lister here.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Incident Handling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Penetration Testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Exploitation&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Education==&lt;br /&gt;
&amp;lt;p&amp;gt;The entry level monitoring specialist is hired by Estonian&lt;br /&gt;
Information System Authority even if there is no formal IT education,&lt;br /&gt;
but readiness to learn and moderate knowledge of different operation&lt;br /&gt;
systems is enough to start the career.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.cv.ee/en/vacancy/792782/riigi-infosusteemi-amet/seirespetsialist-tule-eesti-kuberruumi-valvuriks&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Nevertheless, like most other high qualification careers jobs falling&lt;br /&gt;
under the cybersecurity specialist category require some form of formal&lt;br /&gt;
education. However, since cybersecurity specialist jobs can fall across&lt;br /&gt;
a wide spectrum of job descriptions and responsibilities, it is possible&lt;br /&gt;
to obtain a specialist job after completing many levels of different&lt;br /&gt;
computer related education.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;If one is looking for a cybersecurity related education, for example&lt;br /&gt;
in EU, 137 courses/programs could be found that relate to keyword IT or&lt;br /&gt;
cybersecurity.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.enisa.europa.eu/topics/cybersecurity-education/education-map/education-courses&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Also, there is a great amount of discussion, if cuber security&lt;br /&gt;
professional should have a degree or would be certification just enough.&lt;br /&gt;
One interesting table is produces by Franklin University that compares&lt;br /&gt;
benefits and/or drawbacks of each type of credential.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image11.png&amp;quot; alt=&amp;quot;Comparison MSc vs certificate&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;Comparison MSc vs&lt;br /&gt;
certificate&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Certifications are generally good for people with little practical&lt;br /&gt;
experience because they are known quantities in the industry and can&lt;br /&gt;
help you get your foot in the door. They set a minimum knowledge bar.&lt;br /&gt;
But some certifications are viewed more favorably than others.&lt;br /&gt;
Certifications with renewal requirements are viewed better by hiring&lt;br /&gt;
managers, but they also more costly in the long run because of the need&lt;br /&gt;
for continuing education. Certifications are also good for showing&lt;br /&gt;
in-depth expertise in a specialization within cybersecurity. Depending&lt;br /&gt;
on your career goals, it may be advantageous to have a master’s&lt;br /&gt;
degree—which shows your breadth of knowledge, critical thinking and&lt;br /&gt;
leadership skills—and a certificate—which shows specific skill&lt;br /&gt;
competency.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;As IT (Cyber) Security is still a relatively young discipline,&lt;br /&gt;
universities and colleges are still figuring out which is the best&lt;br /&gt;
approach for their degrees. Study programmes and curricula in Cyber&lt;br /&gt;
Security are different. In general, here are the duration of Cyber&lt;br /&gt;
Security degrees:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Bachelor’s degrees in Cyber Security take 3 or 4 years in most&lt;br /&gt;
countries.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Master’s courses in Cyber Security take between 1-2 years to&lt;br /&gt;
complete.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;PhD programmes in Cyber Security last 3-5 years. Some only take 1&lt;br /&gt;
or 2 years, but they are less common.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Generalization could me made that on bachelor level the general&lt;br /&gt;
knowledge about the cyber issues are obtained. On master level the&lt;br /&gt;
specialization courses are taken and the person can choose more specific&lt;br /&gt;
topics to study. It is on master level where strengths of the cyber&lt;br /&gt;
specialist can be developed further and up-do date knowledge obtained in&lt;br /&gt;
specifics. PhD is serious science and involves teaching, lot of&lt;br /&gt;
scientific work and writing for publications.&amp;lt;/p&amp;gt;&lt;br /&gt;
==Salary==&lt;br /&gt;
&amp;lt;p&amp;gt;Even if the salary can be very different, compared to the skills and&lt;br /&gt;
experience, an generalization can be made. Cyber Security professionals&lt;br /&gt;
in CSIRT, and in other entities earn quite well, from the start. First,&lt;br /&gt;
some comparison from the United States. The average CSIRT analyst salary&lt;br /&gt;
in the USA is $97,500 per year or $50 per hour. Entry level positions&lt;br /&gt;
start at $48,875 per year while most experienced workers make up to&lt;br /&gt;
$135,373 per year.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.talent.com/salary?job=csirt+analyst&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;There are multiple positions you can occupy in this field. They have&lt;br /&gt;
in common great salaries and high demand for technical skills, attention&lt;br /&gt;
to details, problem-solving mentality, and the ability to analyze risks.&lt;br /&gt;
Here are the average annual salaries in the United States, according to&lt;br /&gt;
Payscale:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.payscale.com/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Cryptographer – 100,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Information Security Officer – 91,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Assessor – 90,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Engineer – 88,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Penetration Tester – 81,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Forensics Expert – 71,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Administrator – 65,000 USD&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When looking into salaries in Estonia, one can find that there is a&lt;br /&gt;
discussion that private sector is taking a toll from the public sector,&lt;br /&gt;
and that the salaries in important agencies, as Information System&lt;br /&gt;
Authority loose their employees to the better paid positions in private&lt;br /&gt;
sector.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://digi.geenius.ee/rubriik/uudis/kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad/&lt;br /&gt;
https://tehnika.postimees.ee/6887428/riigi-it-tootajate-palgamaarad-kasvasid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;But there is also a different view that average private sector worker&lt;br /&gt;
could be hired as a top specialist in public sector and then the payment&lt;br /&gt;
is higher. Nevertheless, it seems that the average payment in cyber&lt;br /&gt;
security sector is any way higher that in other parts of the&lt;br /&gt;
e-services.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://digi.geenius.ee/rubriik/uudis/5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka/&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
==SOC==&lt;br /&gt;
&amp;lt;p&amp;gt;A SOC is a facility where an organization’s network, applications,&lt;br /&gt;
and endpoints are monitored and defended. The term was adapted from&lt;br /&gt;
network operations centers (NOCs), where large telecommunication or&lt;br /&gt;
corporate networks are monitored. When network security became more of a&lt;br /&gt;
concern, security teams were formed within the NOCs, and eventually spun&lt;br /&gt;
off into larger organizations of their own as the responsibilities of&lt;br /&gt;
security teams grew increasingly complex and specialized. The security&lt;br /&gt;
staff working in a security operations center are often called the SOC&lt;br /&gt;
team.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Functions of the SOC team include, but are not limited to:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ol type=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Taking inventory of resources, to get a better understanding of the&lt;br /&gt;
structure they are protecting.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintanence of the system, by constantly making updates and adding&lt;br /&gt;
safeguards.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Monitoring the network for abnormalities with special tools.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Threat analysis of new attacks and vulnerabilities.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Responding to attacks, by acting as “first responders”. The SOC team&lt;br /&gt;
will shut down and/or isolate endpoints, deleting files and lowering the&lt;br /&gt;
impact as fast as possible.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Recovery of system stability and lost data. This may be done using&lt;br /&gt;
backups, restarting endpoints or reconfiguring systems.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Logging all actions on the system, to be later used for analysis or&lt;br /&gt;
forensics after an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigating the root cause of an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Auditing their own actions, to be in line with regulations of the&lt;br /&gt;
organization, industry or governing body.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.trellix.com/en-us/security-awareness/operations/what-is-soc.html&amp;lt;/p&amp;gt;&lt;br /&gt;
==CSIRT==&lt;br /&gt;
&amp;lt;p&amp;gt;A CSIRT is a group that responds to security incidents when they&lt;br /&gt;
occur. Key responsibilities of a CSIRT include:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
===Creating and maintaining an incident response plan (IRP)===&lt;br /&gt;
An incident response plan (IRP) is a set of written instructions for&lt;br /&gt;
detecting, responding to and limiting the effects of an information&lt;br /&gt;
security event. Incident response plans provide instructions for&lt;br /&gt;
responding to many potential scenarios, including data breaches, denial&lt;br /&gt;
of service/distributed denial of service attacks, firewall breaches,&lt;br /&gt;
virus or malware outbreaks or insider threats. Without an incident&lt;br /&gt;
response plan in place, organizations may either not detect the attack&lt;br /&gt;
in the first place, or not follow proper protocol to contain the threat&lt;br /&gt;
and recover from it when a breach is detected.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.stratacore.com/incidentresponseplan&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
===Investigating and analyzing incidents===&lt;br /&gt;
CSIRTs are also involved in improvement activities. After major&lt;br /&gt;
computer security incidents occur, or when incidents are not handled in&lt;br /&gt;
a timely or effective manner, a CSIRT will generally perform a&lt;br /&gt;
postmortem of the incident and its response. This postmortem will&lt;br /&gt;
identify the strengths and weakness of the response effort. Such reviews&lt;br /&gt;
can identify weaknesses and holes in systems, infrastructure defenses,&lt;br /&gt;
or policies that allowed the incident to take place. It can also&lt;br /&gt;
identify problems with communication channels, interfaces, and&lt;br /&gt;
procedures that inhibited the efficient resolution of the reported&lt;br /&gt;
problem.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.cisa.gov/uscert/bsi/articles/best-practices/incident-management/defining-computer-security-incident-response-teams&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Managing internal communications and updates during or immediately after incidents occur===&lt;br /&gt;
===Communicating with employees, shareholders, customers, and the press about incidents as needed===&lt;br /&gt;
&amp;lt;p&amp;gt;There are various services within the CSIRT Services Framework that&lt;br /&gt;
address communications, as they relate to security operations and&lt;br /&gt;
incident response services. Some of these include Information Security&lt;br /&gt;
Incident Coordination, Crisis Management Support, Vulnerability&lt;br /&gt;
Disclosure, Situational Awareness Communication, and Awareness Building,&lt;br /&gt;
to name a few. Sharing information and communicating with the general&lt;br /&gt;
public and/or your constituency is appropriate in many different&lt;br /&gt;
scenarios. These can range from proactive communications to reactive&lt;br /&gt;
communications. Each scenario may be unique, and careful consideration&lt;br /&gt;
should be given to when to release information to the public and what&lt;br /&gt;
information should be released.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;https://resources.sei.cmu.edu/asset_files/Handbook/2021_002_001_651819.pdf&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Remediating incidents===&lt;br /&gt;
&amp;lt;p&amp;gt;Threat remediation is a strong and capable tool for fighting the&lt;br /&gt;
cyber security compromises. As the word ‘remedy’ suggests, remediation&lt;br /&gt;
process involves the treatment of a security breach. With the&lt;br /&gt;
remediation practices, your cyber security team is able to eliminate&lt;br /&gt;
suspicious activities and malicious attacks in the form of malware,&lt;br /&gt;
ransomware, phishing and such. Even if you ‘kill’ the suspicious&lt;br /&gt;
activity, the attackers can remain in your systems. If you want to&lt;br /&gt;
contaminate and end the problem for good, your remediation processes&lt;br /&gt;
must involve the detection of the cause.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.logsign.com/blog/what-is-remediation-in-cyber-security/&amp;lt;/p&amp;gt;&lt;br /&gt;
=== Recommending technology, policy, governance, and training changes after security&lt;br /&gt;
incidents===&lt;br /&gt;
&amp;lt;p&amp;gt;After all these actions, the SCIRT must contribute to the development&lt;br /&gt;
of better policies, practices and has to recommend improvements. They&lt;br /&gt;
are not working in the vacuum and their work has to create new and&lt;br /&gt;
better standards for cyber security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
==CERT==&lt;br /&gt;
&amp;lt;p&amp;gt;The term “computer emergency response team” was coined in 1988. In&lt;br /&gt;
response to the Morris worm attack that impacted thousands of servers on&lt;br /&gt;
the Internet, DARPA funded the formation of the Computer Emergency&lt;br /&gt;
Response Team Coordination Center (CERT-CC) at Carnegie Mellon&lt;br /&gt;
University. The goal of CERT-CC was to help protect the internet by&lt;br /&gt;
collecting and disseminating information on critical security&lt;br /&gt;
vulnerabilities. Several other countries formed similar centers using&lt;br /&gt;
the same acronym (despite threats of legal action by Carnegie Mellon for&lt;br /&gt;
trademark infringement). Now the term CERT refers to any emergency&lt;br /&gt;
response team that deals with cyber threats. Many people use CERT-CC&lt;br /&gt;
interchangeably with CSIRT, though the charter of a CERT is information&lt;br /&gt;
sharing in order to help other response teams respond to threats against&lt;br /&gt;
their own infrastructure.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In general, the designation of CERT is helpful in applying real-world&lt;br /&gt;
solutions to various cybersecurity problems. They may be government&lt;br /&gt;
contractors or employees of a major corporation. For example, the U.S.&lt;br /&gt;
Computer Emergency Readiness Team (US-CERT) operates under the U.S.&lt;br /&gt;
Department of Homeland Security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.techopedia.com/definition/31003/computer-emergency-response-team-cert&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In Estonia CERT is designated as CERT-EE. It was established in 2006,&lt;br /&gt;
as an organization responsible for the management of security incidents&lt;br /&gt;
in .ee computer networks. It is also a national contact point for&lt;br /&gt;
international co-operation in the field of IT security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ria.ee/en/cyber-security/cert-ee.html&amp;lt;/p&amp;gt;&lt;br /&gt;
===Difference between SOC/CSIRT/CERT===&lt;br /&gt;
&amp;lt;p&amp;gt;How CSIRTs differ from CERTs and SOCs There are overlapping&lt;br /&gt;
responsibilities between a community emergency response team (CERT),&lt;br /&gt;
computer security incident response team (CSIRT), and security&lt;br /&gt;
operations center (SOC). To add to this confusion, frequently, the terms&lt;br /&gt;
CERT and CSIRT are used interchangeably, despite the important&lt;br /&gt;
differences.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image3.png&amp;quot; alt=&amp;quot;Overlapping in images/image3.png&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;Overlapping in&lt;br /&gt;
images/image3.png&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
==Understand the primary roles and characteristics of a CERT, CSIRT, and SOC.==&lt;br /&gt;
&amp;lt;p&amp;gt;So, using strict definitions, a CERT collects and disseminates&lt;br /&gt;
security information, typically for the benefit of a country or an&lt;br /&gt;
industry. A CSIRT is a cross-functional team that responds to incidents&lt;br /&gt;
on behalf of a country or an organization. A SOC is where a country or&lt;br /&gt;
organization monitors and defends its network, servers, applications,&lt;br /&gt;
and endpoints.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image4.png&amp;quot; alt=&amp;quot;table of explanation images/image4&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;table of explanation&lt;br /&gt;
images/image4&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
==Future==&lt;br /&gt;
&amp;lt;p&amp;gt;And the Cyber security problem is only getting bigger. According to a&lt;br /&gt;
report published by Accenture, the number of cyber security breaches&lt;br /&gt;
increased by 11 percent from 2017 to 2018. The cost of such breaches is&lt;br /&gt;
astronomical–about $600 billion worldwide, according to the Economic&lt;br /&gt;
Impact of Cybercrime report.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Job projections for cybersecurity are staggering. The Bureau of Labor&lt;br /&gt;
Statistics in US predicts that careers in the cybersecurity field will&lt;br /&gt;
grow by 32% by 2028. That makes cybersecurity one of the top 10&lt;br /&gt;
fastest-growing jobs in the country. In the United States alone, jobs&lt;br /&gt;
for Information Security Analysts are expected to grow by 15% by&lt;br /&gt;
2024.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Most likely this trend is also similar in other countries.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When checking Estonian job portals, there is a constant need for&lt;br /&gt;
people for cyber security related positions. Also, linkedin search gives&lt;br /&gt;
approximately 30 vacancies immediately. There are banks, logistics&lt;br /&gt;
companies, e-shops, and software producers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://ee.linkedin.com/jobs/cyber-security-jobs?countryRedirected=1&amp;amp;amp;position=1&amp;amp;amp;pageNum=0&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Trends that affect companies create need for constant cyber security&lt;br /&gt;
services. Increasing number of home/remote offices require secure&lt;br /&gt;
corporate networks and security of remote devices. One example is from&lt;br /&gt;
this year, when sloppy remote desktop set-up paralyzed systems of 17&lt;br /&gt;
companies.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.aripaev.ee/uudised/2022/04/20/ria-lohakas-kaugtoolaua-seadistus-halvas-martsis-vahemalt-17-juhul-ettevotete-it-susteemid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Also, no service can exists without robust infrastructure - servers,&lt;br /&gt;
databases, applications. As all previously mentioned devices and&lt;br /&gt;
services are at constant scanning and surveillance. So, the breach&lt;br /&gt;
detection and immediate action demands 24/7 services. Even if lot of&lt;br /&gt;
things could be automated, there is a need for human specialists (at&lt;br /&gt;
least, at the moment). Third growing field is also a forensic&lt;br /&gt;
investigation, as every attack must be investigated in order to be ready&lt;br /&gt;
to repel next attacks. So data recovery and evidence collection is&lt;br /&gt;
another important field of work that need skilled and professional&lt;br /&gt;
workers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Even, if the specifics of the entity, be it CSIRT, CERT or SOC, are&lt;br /&gt;
different, the fundamentals of the work are the same. Professional&lt;br /&gt;
knowledge of the networks, operational systems, hardware, scripting, and&lt;br /&gt;
several other wider IT related knowledge is needed. As there is no&lt;br /&gt;
single way to reach to it, every single person can find one’s strongest&lt;br /&gt;
sides and develop them with knowledge of weaker side, in order to know,&lt;br /&gt;
when to as for help.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/body&amp;gt;&lt;br /&gt;
&amp;lt;/html&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mavald</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142181</id>
		<title>Hiring a Cyber Security Incident Analyst</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142181"/>
		<updated>2022-05-01T14:42:20Z</updated>

		<summary type="html">&lt;p&gt;Mavald: /* Data management */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==A Cyber Security Incident Analyst==&lt;br /&gt;
&lt;br /&gt;
[[File:image1.png|600px|thumb|Job advertisement &amp;lt;ref&amp;gt;&amp;quot;Job Advertisement&amp;quot;. Available at https://www.projectpeople.com/jobs/&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
===Cyber security incident analyst in SOC/CSIRT/CERT===&lt;br /&gt;
This article delves into the job title of Cyber Security Incident&lt;br /&gt;
Analyst and provides an overview of the acronyms SOC/CSIRT/CERT. A brief&lt;br /&gt;
history of the job is discussed here, as well as a possible career path,&lt;br /&gt;
education, experience, and other characteristics required for work in&lt;br /&gt;
computer security-related organizations. The article also provides a&lt;br /&gt;
brief history of SOC/CSIRT/CERT, as well as a comparison of their&lt;br /&gt;
differences and similarities.&lt;br /&gt;
===Cyber Security Incident Analyst Skill Set===&lt;br /&gt;
What skill set is expected from the Cyber Security Incident Analyst? Below written lines are taken from the same job advertisement depicted&lt;br /&gt;
on the left side of this article:&lt;br /&gt;
As a Security Incident Analyst your responsibilities will include:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Continuous monitoring of security tooling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Performing regular and ad-hoc vulnerability assessments&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Carrying out ‘spot checks’&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Reporting vulnerabilities to the PVG via the alerts system&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintaining and documenting logging systems&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Developing centralized logging, reporting and intelligence&lt;br /&gt;
platforms&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;‘Light touch’ penetration testing with open source tooling&lt;br /&gt;
(Metasploit)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Knowledge &amp;amp;amp; Experience required:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;SOC, CSIRT or CERT operational environment experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Windows / Linux experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TCP /IP networking protocol knowledge&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience reviewing and analyzing Security Events from various&lt;br /&gt;
monitoring and logging sources&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience in website and web application security assessment or&lt;br /&gt;
penetration testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience of using Metasploit&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Scripting knowledge using BASH, Python, Perl, Ruby&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Skills in Host and Network Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
As one can see the description of the duties is wide and also the&lt;br /&gt;
knowledge and experience that is required is noteworthy. So, where to&lt;br /&gt;
start to find out the way to get this kind of knowledge and&lt;br /&gt;
expertize.&lt;br /&gt;
===Possible career path===&lt;br /&gt;
Next part of the paper is aiming to depict a possible ways, how to&lt;br /&gt;
develop oneself, and move along the career pathway in cybersecurity&lt;br /&gt;
field. Topics of development, education, experience and certification&lt;br /&gt;
are covered.&lt;br /&gt;
[[File:analystimage2.png|700px|thumb|Career path &amp;lt;ref&amp;gt;&amp;quot;Possible Career Path&amp;quot;. Available at https://www.cyberseek.org/pathway.html&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
===Junior/Senior===&lt;br /&gt;
Start with an entry-level job in IT. Hands-on experience is often the&lt;br /&gt;
most effective way to prepare for certification exams. Start&lt;br /&gt;
accumulating work experience with an entry-level role as a cybersecurity&lt;br /&gt;
analyst. Many cybersecurity professionals start off in more general IT&lt;br /&gt;
roles. The skills, practices, and technologies you’ll use as a&lt;br /&gt;
cybersecurity professional will continue to evolve along with computer&lt;br /&gt;
and network technology. The desire to learn, ability to problem solve,&lt;br /&gt;
and attention to detail will serve you well in this field. Other, more&lt;br /&gt;
technical skills and technologies to learn include:&amp;lt;ref name=&amp;quot;certification&amp;quot;&amp;gt;Popular Cyber Security Certificates [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications  [Accessed 25 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====SIEM tools (security information and event management)====&lt;br /&gt;
Security Information and Event Management (SIEM) is a set of tools&lt;br /&gt;
and services offering a holistic view of an organization’s information&lt;br /&gt;
security. SIEM works by combining two technologies:&lt;br /&gt;
&amp;lt;li&amp;gt;Security information management (SIM), which collects data from log&lt;br /&gt;
files for analysis and reports on security threats and events, and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;security event management (SEM), which conducts real-time system&lt;br /&gt;
monitoring, notifies network admins about important issues and&lt;br /&gt;
establishes correlations between security events. There are a number of&lt;br /&gt;
security information and event management solutions on the market.&lt;br /&gt;
ArcSight ESM, IBM QRadar and Splunk are among the most popular. &amp;lt;ref name=&amp;quot;SIEM&amp;quot;&amp;gt;Application security, SIEM [Online]. Available: https://www.imperva.com/learn/application-security/siem/. [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Firewalls, Intrusion Detection Systems (IDS), and Intrusion Prevention Systems(IPS)====&lt;br /&gt;
Firewalls can be two types, hardware and software firewalls. Software&lt;br /&gt;
firewall is a firewall that is installed on a computer or server, and&lt;br /&gt;
tasked with network security. It works with a wide variety of other&lt;br /&gt;
technology security solutions to provide more robust and cohesive&lt;br /&gt;
security for enterprises of all sizes. When a software firewall is&lt;br /&gt;
installed on a server, it opens up like an umbrella of protection over&lt;br /&gt;
all other computers connected to the network. It is able to monitor both&lt;br /&gt;
incoming and outgoing traffic for potential risk or suspicious user&lt;br /&gt;
behavior, and also makes setting security policies much easier, faster&lt;br /&gt;
and more flexible. Hardware firewall is positioned between the network&lt;br /&gt;
and devices, allowing traffic to funnel through the firewall for a close&lt;br /&gt;
inspection and analysis. A hardware firewall, a term often&lt;br /&gt;
interchangeable with network or next-generation firewall, protects the&lt;br /&gt;
network gateways for an enterprise. Hardware firewall is physical&lt;br /&gt;
hardware, installed between network elements and connected devices, and&lt;br /&gt;
is tasked with filtering traffic for cyber threat to the network or&lt;br /&gt;
devices. Filtering out unauthorized or suspicious users based on traffic&lt;br /&gt;
analysis is one of the biggest benefits of hardware firewall. &amp;lt;ref name=&amp;quot;sangfor&amp;quot;&amp;gt;Sangfor, &amp;quot;What is Software Firewall? Difference between Hardware Firewall and Software Firewall, [Online]. Available: https://www.sangfor.com/blog/cybersecurity/what-is-software-firewall-difference-between-hardware-firewall-and-software-firewall [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems&lt;br /&gt;
(IPS) are both parts of the network infrastructure. IDS/IPS compare&lt;br /&gt;
network packets to a cyberthreat database containing known signatures of&lt;br /&gt;
cyberattacks — and flag any matching packets. IDS doesn’t alter the&lt;br /&gt;
network packets in any way, whereas IPS prevents the packet from&lt;br /&gt;
delivery based on the contents of the packet, much like how a firewall&lt;br /&gt;
prevents traffic by IP address. &amp;lt;ref name=&amp;quot;Varonis&amp;quot;&amp;gt;Varonis, &amp;quot;What is Software Firewall? IDS vs. IPS: What is the Difference?, [Online]. Available: https://www.varonis.com/blog/ids-vs-ips [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Digital forensics====&lt;br /&gt;
Digital forensics is a branch of forensic science that focuses on&lt;br /&gt;
identifying, acquiring, processing, analyzing, and reporting on data&lt;br /&gt;
stored electronically. Electronic evidence is a component of almost all&lt;br /&gt;
criminal activities and digital forensics support is crucial for law&lt;br /&gt;
enforcement investigations. Electronic evidence can be collected from a&lt;br /&gt;
wide array of sources, such as computers, smartphones, remote storage,&lt;br /&gt;
unmanned aerial systems, shipborne equipment, and more.&amp;lt;ref name=&amp;quot;interpol&amp;quot;&amp;gt;Interpol, &amp;quot;Digital forensics&amp;quot;. Available: https://www.interpol.int/How-we-work/Innovation/Digital-forensics. [Accessed 28 4 2022].&amp;lt;/ref&amp;gt; &lt;br /&gt;
Investigative process of digital forensics can be divided into several stages. There are four major stages: preservation, collection,&lt;br /&gt;
examination, and analysis. All these four stages need a deep understanding of computers, technology across a broad spectrum, and cybersecurity principles and&lt;br /&gt;
practices, a working knowledge of computers, networks, and coding, in-depth investigative abilities, critical-thinking skills and analytical talent the ability to effectively communicate and work with a&lt;br /&gt;
wide range of people. &amp;lt;ref name=&amp;quot;ecpi&amp;quot;&amp;gt;&amp;quot;Digital forensics&amp;quot;. Available: https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me. [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Mobile device management====&lt;br /&gt;
Mobile device management (MDM) is software that allows IT&lt;br /&gt;
administrators to control, secure and enforce policies on smartphones,&lt;br /&gt;
tablets and other endpoints. Mobile device management software emerged&lt;br /&gt;
in the early 2000s as a way to control and secure the personal digital&lt;br /&gt;
assistants and smartphones that business workers began to use. The&lt;br /&gt;
consumer smartphone boom that started with the launch of the Apple&lt;br /&gt;
iPhone in 2007 led to the bring your own device (BYOD) trend, which&lt;br /&gt;
fueled further interest in MDM.&amp;lt;ref name=&amp;quot;techtarget&amp;quot;&amp;gt;Techtarget, &amp;quot;Mobile Device Management&amp;quot;. Available: https://www.techtarget.com/searchmobilecomputing/definition/mobile-device-management [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Data management====&lt;br /&gt;
Sometimes the data management is neglected, but this part has a&lt;br /&gt;
crucial role when learning for good cyber security practices. Majority&lt;br /&gt;
of cyber security programs include a special courses on data management.&lt;br /&gt;
Data management is a method of organizing and maintaining data processes&lt;br /&gt;
that are required in almost every business operations. The benefits of&lt;br /&gt;
data management can be found accounting, statistics, logistics planning&lt;br /&gt;
and other disciplines including corporate computing.&amp;lt;ref name=&amp;quot;GlobalUni&amp;quot;&amp;gt;Global Universities, &amp;quot;MSc Data Management and Cyber Security&amp;quot;. Available: https://globaluniversities.in/msc-data-management-cyber-security. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
Data governance (and management) play a fundamental role in&lt;br /&gt;
protecting an organization’s data. Ensuring that the right people have&lt;br /&gt;
the right access and that appropriate security controls are in place to&lt;br /&gt;
protect each system or service, based on the criticality or sensitivity&lt;br /&gt;
of the data sets these contain. &amp;lt;ref name=&amp;quot;CyberMagazine&amp;quot;&amp;gt;Cyber Security Magazine, &amp;quot;The Role of Data Governance in Cybersecurity&amp;quot;. Available: https://cybersecurity-magazine.com/the-role-of-data-governance-in-cybersecurity/?utm_source=rss&amp;amp;amp;utm_medium=rss&amp;amp;amp;utm_campaign=the-role-of-data-governance-in-cybersecurity. [Accessed 26 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Application security development====&lt;br /&gt;
Application security describes security measures at the application&lt;br /&gt;
level that aim to prevent data or code within the app from being stolen&lt;br /&gt;
or hijacked. It encompasses the security considerations that happen&lt;br /&gt;
during application development and design, but it also involves systems&lt;br /&gt;
and approaches to protect apps after they get deployed. Application&lt;br /&gt;
security may include hardware, software, and procedures that identify or&lt;br /&gt;
minimize security vulnerabilities.&lt;br /&gt;
https://www.vmware.com/topics/glossary/content/application-security.html&lt;br /&gt;
Application security development is important to ensure that your&lt;br /&gt;
application is free from coding errors and bugs. And controls the risk&lt;br /&gt;
and helps safeguard against security vulnerabilities. Application&lt;br /&gt;
security development is the process of making applications more secure&lt;br /&gt;
by finding and fixing security vulnerabilities. This is often done by&lt;br /&gt;
enforcing software security best practices and using application&lt;br /&gt;
security testing tools.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.perforce.com/blog/kw/application-security-development-best-practices&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Audit and compliance knowledge====&lt;br /&gt;
A cyber security audit is designed to be a comprehensive review and&lt;br /&gt;
analysis of your business’s IT infrastructure. It identifies threats and&lt;br /&gt;
vulnerabilities, exposing weaknesses and high-risk practices.&lt;br /&gt;
Regulations such as the EU GDPR (General Data Protection Regulation) can&lt;br /&gt;
impose hefty penalties in the event of a breach that results in&lt;br /&gt;
exploited data. A cyber security audit will help mitigate the&lt;br /&gt;
consequences of a breach and demonstrate that your organization has&lt;br /&gt;
taken the necessary steps to protect client and company data.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://cyforsecure.co.uk/services/cyber-assessment/cyber-security-audit/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Cybersecurity compliance is the organizational risk management method&lt;br /&gt;
aligned with pre-defined security measures &amp;amp;amp; controls on how data&lt;br /&gt;
confidentiality is ensured by its administrational procedures.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://nordlayer.com/blog/cybersecurity-compliance-everything-you-need-to-know/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;All needed skills are developed through courses and&lt;br /&gt;
certification.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
===Entry-Level Incident Response Positions===&lt;br /&gt;
&amp;lt;p&amp;gt;It is not always possible to advance to the position of incident&lt;br /&gt;
responder in a straight line. Many professionals advance from entry- to&lt;br /&gt;
mid-level positions before becoming a real incident responder or a&lt;br /&gt;
member of a computer emergency response team (CERT).&amp;lt;br /&amp;gt;&lt;br /&gt;
These are some examples:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;network-administrator&amp;quot;&amp;gt;Network administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;This position’s experience will help potential incident responders&lt;br /&gt;
develop networking skills. Attention to detail, as well as the ability&lt;br /&gt;
to sift through system configurations, site layouts, and general network&lt;br /&gt;
and communication setups, are essential in this field.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;system-administrator&amp;quot;&amp;gt;System administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Another crucial beginning point for an incident responder is to learn&lt;br /&gt;
how to manage resources inside your organization as well as user&lt;br /&gt;
behavior. Understanding the potential damage that users, inadequate&lt;br /&gt;
security setups, and ineffective IT policies and procedures can cause on&lt;br /&gt;
your network can provide prospective candidates with insight into the&lt;br /&gt;
human component of an incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;security-administrator&amp;quot;&amp;gt;Security administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In such a position, basic hacking skills, penetration testing, and&lt;br /&gt;
intrusion detection are all learned, which are crucial incident&lt;br /&gt;
responder skills when trying to replicate a breach or attack.&lt;br /&gt;
Understanding the paths a cybercriminal will take when attempting to&lt;br /&gt;
damage or obtain access to a system can greatly simplify the work of&lt;br /&gt;
reverse engineering the incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://resources.infosecinstitute.com/topic/incident-responder-career-roadmap-entry-level-executive/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3 id=&amp;quot;mid-level-incident-response-positions&amp;quot;&amp;gt;Mid-Level Incident&lt;br /&gt;
Response Positions&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5&lt;br /&gt;
id=&amp;quot;computer-security-incident-response-team-csirt-engineer&amp;quot;&amp;gt;Computer&lt;br /&gt;
security incident response team (CSIRT) engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;cyber-incident-responder&amp;quot;&amp;gt;Cyber incident responder&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-response-engineer&amp;quot;&amp;gt;Incident response&lt;br /&gt;
engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;While each of these positions is different, they generally require&lt;br /&gt;
very similar skills and characteristics in a candidate. At this level,&lt;br /&gt;
personal characteristics such as problem solving, time management, and&lt;br /&gt;
even presentation skills become more crucial as one’s career evolves&lt;br /&gt;
into a management-facing role.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Technical skills include the ability to identify and minimize threats&lt;br /&gt;
while maintaining communication with management and the rest of your&lt;br /&gt;
team. Data analysis and evidence gathering become increasingly crucial,&lt;br /&gt;
and the circumstances in which your services are deployed get more&lt;br /&gt;
serious.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Problem-solving skills are crucial at this level of incident&lt;br /&gt;
response, and as the stakes rise, so does the pressure in each&lt;br /&gt;
situation. At this level, programming abilities are essential since&lt;br /&gt;
incident responders may be needed to reverse engineer malicious code or&lt;br /&gt;
even create patches for vulnerable network applications or services.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.coursera.org/articles/popular-cybersecurity-certifications&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3 id=&amp;quot;senior-level-incident-response-positions&amp;quot;&amp;gt;Senior-Level Incident&lt;br /&gt;
Response Positions&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;intrusion-detection-specialist&amp;quot;&amp;gt;Intrusion detection&lt;br /&gt;
specialist:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;A CISSP certification might help a potential candidate in preparing&lt;br /&gt;
for the profession. The role of an intrusion detection specialist is to&lt;br /&gt;
find and stop any unwanted communications.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-manager&amp;quot;&amp;gt;Incident manager:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Expected to plan, oversee, manage, and supervise all incident&lt;br /&gt;
response team actions. Is in charge of reporting all current events to&lt;br /&gt;
senior management and stakeholders, as well as acting as the technical&lt;br /&gt;
lead on active incidents for incident responders. Prepares threat and&lt;br /&gt;
impact assessments and reports them known to management.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.coursera.org/articles/popular-cybersecurity-certifications&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Certificates== &lt;br /&gt;
There is a vast number of different certificates and the road map to&lt;br /&gt;
being a certified professional could be very different&amp;lt;ref name=&amp;quot;Coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated],&amp;quot; [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;NICCS&amp;quot;&amp;gt;NICCS, &amp;quot;Cybersecurity Certifications,&amp;quot; [Online]. Available: hhttps://niccs.cisa.gov/about-niccs/cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt; . One possible&lt;br /&gt;
approach is to start with basic certificates from the different branches&lt;br /&gt;
of service and move to more specific and demanding focused&lt;br /&gt;
certification. Also, some jobs require certain clearances, either from&lt;br /&gt;
industry, or from the government. One small selection of different&lt;br /&gt;
possible certificates is brought out in following paragraphs.&lt;br /&gt;
&lt;br /&gt;
Security+ is a CompTIA certification that is considered a basic cert&lt;br /&gt;
among cybersecurity professionals. It covers the topics of risk&lt;br /&gt;
management and threat assessment.&lt;br /&gt;
Network+ is also offered by CompTIA this certification (like the name&lt;br /&gt;
implies) focuses on networking infrastructure and operations. It is&lt;br /&gt;
considered a foundational certification.&lt;br /&gt;
The Certified Information Systems Security Professional (CISSP) is a&lt;br /&gt;
more advanced certification designed for cybersecurity professionals&lt;br /&gt;
with at least five years of work experience. The certification covers&lt;br /&gt;
topics such as architecture, engineering, and management.&amp;lt;/p&amp;gt;&lt;br /&gt;
The Certified Ethical Hacker (CEH) certification is also considered a&lt;br /&gt;
more advanced cert because it generally requires that applicants have&lt;br /&gt;
multiple years of work experience. The goal of an ethical hacker&lt;br /&gt;
certification is to be able to understand how cyber attacks unfold in&lt;br /&gt;
order to improve threat assessment and mitigation skills.&amp;lt;ref name=&amp;quot;cyberguide&amp;quot;&amp;gt;Cybersecurity Guide, &amp;quot;How to become a cybersecurity specialist&amp;quot;, [Online]. Available: https://cybersecurityguide.org/careers/security-specialist/. [Accessed 27 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
This is definitely not all, when one looks for more information, following link could be searched, to get more in depth knowledge about&lt;br /&gt;
different possibilities. Hereby, with the help of this matrix a possible taxonomy of different 436 listed certificates in branches are&lt;br /&gt;
presented.&amp;lt;ref name=&amp;quot;Pauljeremy&amp;quot;&amp;gt;&amp;quot;Cybersecurity Roadmap,&amp;quot; [Online]. Available: https://pauljerimy.com/2020/10/12/scr-oct-2020-update/. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:analystimage5.png|1000px|thumb|Certificate matrix &amp;lt;ref&amp;gt;&amp;quot;Certification roadmap&amp;quot;. Available at https://pauljerimy.com/security-certification-roadmap&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
=== Communication and Network Security===&lt;br /&gt;
Communication and network security covers the ability to secure&lt;br /&gt;
communication channels and networks. Topics include secure and converges&lt;br /&gt;
protocols, wireless networks, cellular networks, hardware operations&lt;br /&gt;
(warranty and redundant power), and third-party connectivity. IP&lt;br /&gt;
networking are also included in this domain.&lt;br /&gt;
===Identity and Access Management===&lt;br /&gt;
The identity and access management domain covers the attacks that&lt;br /&gt;
target the human gateway to gain access to data. Other topics include&lt;br /&gt;
ways to identify users with rights to access the information and&lt;br /&gt;
servers. Identity and access management covers the topics of&lt;br /&gt;
applications, Single sign-on authentication, privilege escalation,&lt;br /&gt;
Kerberos, rule-based or risk-based access control, proofing and&lt;br /&gt;
establishment of identity.&lt;br /&gt;
===Security Architecture and Engineering===&lt;br /&gt;
The security architecture and engineering domain covers important&lt;br /&gt;
topics concerning security engineering plans, designs and principles,&lt;br /&gt;
Topics include assessing and mitigating information system&lt;br /&gt;
vulnerabilities, fundamental concepts of security models and security&lt;br /&gt;
architectures in critical areas like access control. Cloud systems,&lt;br /&gt;
cryptography, system infiltrations (ransomware, fault-injection and&lt;br /&gt;
more) and virtualized systems are also covered in this domain.&lt;br /&gt;
===Asset Security===&lt;br /&gt;
The Asset Security domain deals with the issues related to the&lt;br /&gt;
collection, storage, maintenance, retention and destruction of data. It&lt;br /&gt;
also covers knowledge of different roles regarding data handling (owner,&lt;br /&gt;
controller and custodian) as well as data protection methods and data&lt;br /&gt;
states. Other topics include resource provision, asset classification&lt;br /&gt;
and data lifecycle management.&lt;br /&gt;
===Security and Risk Management===&lt;br /&gt;
The security and risk management domain covers general on skills&lt;br /&gt;
related to the implementation of user awareness programs as well as&lt;br /&gt;
security procedures. Emphasis is also placed on risk management&lt;br /&gt;
concerning the acquisition of new services, hardware and software&lt;br /&gt;
(supply chain). Other skills include social engineering defense&lt;br /&gt;
mechanisms.&lt;br /&gt;
===Security Assessment and Testing===&lt;br /&gt;
The security assessment and testing domain deals with all the&lt;br /&gt;
techniques and tools used to find system vulnerabilities, weaknesses and&lt;br /&gt;
potential areas of concern not addressed by security procedures and&lt;br /&gt;
policies. Attack simulations, vulnerability assessment, compliance&lt;br /&gt;
checks, and ethical disclosure also fall under this domain.&lt;br /&gt;
===Software Security===&lt;br /&gt;
The software development security domain deals with implementing&lt;br /&gt;
software-based security protocols within environment for which the IT&lt;br /&gt;
professional is responsible. Risk analysis, vulnerability identification&lt;br /&gt;
and auditing of source codes are all covered in this subset. Additional&lt;br /&gt;
topics include software-designed security, maturity models, development&lt;br /&gt;
methodologies, open-source and third-party development security.&lt;br /&gt;
===Security operations===&lt;br /&gt;
The security operations domain covers topics ranging from&lt;br /&gt;
investigations and digital forensic to detection and intrusion&lt;br /&gt;
prevention tools, sandboxing and firewalls. Topics include user and&lt;br /&gt;
entity behavior analytics, threat intelligence (threat hunting and&lt;br /&gt;
threat feeds) log management, artifacts (mobile, computer and network),&lt;br /&gt;
machine learning and AI-based tools, penetration testing, and&lt;br /&gt;
exploitation development. These for sub-domains are lister here.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Incident Handling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Penetration Testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Exploitation&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Education==&lt;br /&gt;
&amp;lt;p&amp;gt;The entry level monitoring specialist is hired by Estonian&lt;br /&gt;
Information System Authority even if there is no formal IT education,&lt;br /&gt;
but readiness to learn and moderate knowledge of different operation&lt;br /&gt;
systems is enough to start the career.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.cv.ee/en/vacancy/792782/riigi-infosusteemi-amet/seirespetsialist-tule-eesti-kuberruumi-valvuriks&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Nevertheless, like most other high qualification careers jobs falling&lt;br /&gt;
under the cybersecurity specialist category require some form of formal&lt;br /&gt;
education. However, since cybersecurity specialist jobs can fall across&lt;br /&gt;
a wide spectrum of job descriptions and responsibilities, it is possible&lt;br /&gt;
to obtain a specialist job after completing many levels of different&lt;br /&gt;
computer related education.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;If one is looking for a cybersecurity related education, for example&lt;br /&gt;
in EU, 137 courses/programs could be found that relate to keyword IT or&lt;br /&gt;
cybersecurity.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.enisa.europa.eu/topics/cybersecurity-education/education-map/education-courses&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Also, there is a great amount of discussion, if cuber security&lt;br /&gt;
professional should have a degree or would be certification just enough.&lt;br /&gt;
One interesting table is produces by Franklin University that compares&lt;br /&gt;
benefits and/or drawbacks of each type of credential.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image11.png&amp;quot; alt=&amp;quot;Comparison MSc vs certificate&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;Comparison MSc vs&lt;br /&gt;
certificate&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Certifications are generally good for people with little practical&lt;br /&gt;
experience because they are known quantities in the industry and can&lt;br /&gt;
help you get your foot in the door. They set a minimum knowledge bar.&lt;br /&gt;
But some certifications are viewed more favorably than others.&lt;br /&gt;
Certifications with renewal requirements are viewed better by hiring&lt;br /&gt;
managers, but they also more costly in the long run because of the need&lt;br /&gt;
for continuing education. Certifications are also good for showing&lt;br /&gt;
in-depth expertise in a specialization within cybersecurity. Depending&lt;br /&gt;
on your career goals, it may be advantageous to have a master’s&lt;br /&gt;
degree—which shows your breadth of knowledge, critical thinking and&lt;br /&gt;
leadership skills—and a certificate—which shows specific skill&lt;br /&gt;
competency.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;As IT (Cyber) Security is still a relatively young discipline,&lt;br /&gt;
universities and colleges are still figuring out which is the best&lt;br /&gt;
approach for their degrees. Study programmes and curricula in Cyber&lt;br /&gt;
Security are different. In general, here are the duration of Cyber&lt;br /&gt;
Security degrees:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Bachelor’s degrees in Cyber Security take 3 or 4 years in most&lt;br /&gt;
countries.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Master’s courses in Cyber Security take between 1-2 years to&lt;br /&gt;
complete.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;PhD programmes in Cyber Security last 3-5 years. Some only take 1&lt;br /&gt;
or 2 years, but they are less common.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Generalization could me made that on bachelor level the general&lt;br /&gt;
knowledge about the cyber issues are obtained. On master level the&lt;br /&gt;
specialization courses are taken and the person can choose more specific&lt;br /&gt;
topics to study. It is on master level where strengths of the cyber&lt;br /&gt;
specialist can be developed further and up-do date knowledge obtained in&lt;br /&gt;
specifics. PhD is serious science and involves teaching, lot of&lt;br /&gt;
scientific work and writing for publications.&amp;lt;/p&amp;gt;&lt;br /&gt;
==Salary==&lt;br /&gt;
&amp;lt;p&amp;gt;Even if the salary can be very different, compared to the skills and&lt;br /&gt;
experience, an generalization can be made. Cyber Security professionals&lt;br /&gt;
in CSIRT, and in other entities earn quite well, from the start. First,&lt;br /&gt;
some comparison from the United States. The average CSIRT analyst salary&lt;br /&gt;
in the USA is $97,500 per year or $50 per hour. Entry level positions&lt;br /&gt;
start at $48,875 per year while most experienced workers make up to&lt;br /&gt;
$135,373 per year.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.talent.com/salary?job=csirt+analyst&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;There are multiple positions you can occupy in this field. They have&lt;br /&gt;
in common great salaries and high demand for technical skills, attention&lt;br /&gt;
to details, problem-solving mentality, and the ability to analyze risks.&lt;br /&gt;
Here are the average annual salaries in the United States, according to&lt;br /&gt;
Payscale:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.payscale.com/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Cryptographer – 100,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Information Security Officer – 91,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Assessor – 90,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Engineer – 88,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Penetration Tester – 81,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Forensics Expert – 71,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Administrator – 65,000 USD&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When looking into salaries in Estonia, one can find that there is a&lt;br /&gt;
discussion that private sector is taking a toll from the public sector,&lt;br /&gt;
and that the salaries in important agencies, as Information System&lt;br /&gt;
Authority loose their employees to the better paid positions in private&lt;br /&gt;
sector.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://digi.geenius.ee/rubriik/uudis/kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad/&lt;br /&gt;
https://tehnika.postimees.ee/6887428/riigi-it-tootajate-palgamaarad-kasvasid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;But there is also a different view that average private sector worker&lt;br /&gt;
could be hired as a top specialist in public sector and then the payment&lt;br /&gt;
is higher. Nevertheless, it seems that the average payment in cyber&lt;br /&gt;
security sector is any way higher that in other parts of the&lt;br /&gt;
e-services.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://digi.geenius.ee/rubriik/uudis/5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka/&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
==SOC==&lt;br /&gt;
&amp;lt;p&amp;gt;A SOC is a facility where an organization’s network, applications,&lt;br /&gt;
and endpoints are monitored and defended. The term was adapted from&lt;br /&gt;
network operations centers (NOCs), where large telecommunication or&lt;br /&gt;
corporate networks are monitored. When network security became more of a&lt;br /&gt;
concern, security teams were formed within the NOCs, and eventually spun&lt;br /&gt;
off into larger organizations of their own as the responsibilities of&lt;br /&gt;
security teams grew increasingly complex and specialized. The security&lt;br /&gt;
staff working in a security operations center are often called the SOC&lt;br /&gt;
team.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Functions of the SOC team include, but are not limited to:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ol type=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Taking inventory of resources, to get a better understanding of the&lt;br /&gt;
structure they are protecting.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintanence of the system, by constantly making updates and adding&lt;br /&gt;
safeguards.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Monitoring the network for abnormalities with special tools.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Threat analysis of new attacks and vulnerabilities.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Responding to attacks, by acting as “first responders”. The SOC team&lt;br /&gt;
will shut down and/or isolate endpoints, deleting files and lowering the&lt;br /&gt;
impact as fast as possible.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Recovery of system stability and lost data. This may be done using&lt;br /&gt;
backups, restarting endpoints or reconfiguring systems.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Logging all actions on the system, to be later used for analysis or&lt;br /&gt;
forensics after an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigating the root cause of an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Auditing their own actions, to be in line with regulations of the&lt;br /&gt;
organization, industry or governing body.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.trellix.com/en-us/security-awareness/operations/what-is-soc.html&amp;lt;/p&amp;gt;&lt;br /&gt;
==CSIRT==&lt;br /&gt;
&amp;lt;p&amp;gt;A CSIRT is a group that responds to security incidents when they&lt;br /&gt;
occur. Key responsibilities of a CSIRT include:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
===Creating and maintaining an incident response plan (IRP)===&lt;br /&gt;
An incident response plan (IRP) is a set of written instructions for&lt;br /&gt;
detecting, responding to and limiting the effects of an information&lt;br /&gt;
security event. Incident response plans provide instructions for&lt;br /&gt;
responding to many potential scenarios, including data breaches, denial&lt;br /&gt;
of service/distributed denial of service attacks, firewall breaches,&lt;br /&gt;
virus or malware outbreaks or insider threats. Without an incident&lt;br /&gt;
response plan in place, organizations may either not detect the attack&lt;br /&gt;
in the first place, or not follow proper protocol to contain the threat&lt;br /&gt;
and recover from it when a breach is detected.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.stratacore.com/incidentresponseplan&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
===Investigating and analyzing incidents===&lt;br /&gt;
CSIRTs are also involved in improvement activities. After major&lt;br /&gt;
computer security incidents occur, or when incidents are not handled in&lt;br /&gt;
a timely or effective manner, a CSIRT will generally perform a&lt;br /&gt;
postmortem of the incident and its response. This postmortem will&lt;br /&gt;
identify the strengths and weakness of the response effort. Such reviews&lt;br /&gt;
can identify weaknesses and holes in systems, infrastructure defenses,&lt;br /&gt;
or policies that allowed the incident to take place. It can also&lt;br /&gt;
identify problems with communication channels, interfaces, and&lt;br /&gt;
procedures that inhibited the efficient resolution of the reported&lt;br /&gt;
problem.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.cisa.gov/uscert/bsi/articles/best-practices/incident-management/defining-computer-security-incident-response-teams&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Managing internal communications and updates during or immediately after incidents occur===&lt;br /&gt;
===Communicating with employees, shareholders, customers, and the press about incidents as needed===&lt;br /&gt;
&amp;lt;p&amp;gt;There are various services within the CSIRT Services Framework that&lt;br /&gt;
address communications, as they relate to security operations and&lt;br /&gt;
incident response services. Some of these include Information Security&lt;br /&gt;
Incident Coordination, Crisis Management Support, Vulnerability&lt;br /&gt;
Disclosure, Situational Awareness Communication, and Awareness Building,&lt;br /&gt;
to name a few. Sharing information and communicating with the general&lt;br /&gt;
public and/or your constituency is appropriate in many different&lt;br /&gt;
scenarios. These can range from proactive communications to reactive&lt;br /&gt;
communications. Each scenario may be unique, and careful consideration&lt;br /&gt;
should be given to when to release information to the public and what&lt;br /&gt;
information should be released.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;https://resources.sei.cmu.edu/asset_files/Handbook/2021_002_001_651819.pdf&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Remediating incidents===&lt;br /&gt;
&amp;lt;p&amp;gt;Threat remediation is a strong and capable tool for fighting the&lt;br /&gt;
cyber security compromises. As the word ‘remedy’ suggests, remediation&lt;br /&gt;
process involves the treatment of a security breach. With the&lt;br /&gt;
remediation practices, your cyber security team is able to eliminate&lt;br /&gt;
suspicious activities and malicious attacks in the form of malware,&lt;br /&gt;
ransomware, phishing and such. Even if you ‘kill’ the suspicious&lt;br /&gt;
activity, the attackers can remain in your systems. If you want to&lt;br /&gt;
contaminate and end the problem for good, your remediation processes&lt;br /&gt;
must involve the detection of the cause.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.logsign.com/blog/what-is-remediation-in-cyber-security/&amp;lt;/p&amp;gt;&lt;br /&gt;
=== Recommending technology, policy, governance, and training changes after security&lt;br /&gt;
incidents===&lt;br /&gt;
&amp;lt;p&amp;gt;After all these actions, the SCIRT must contribute to the development&lt;br /&gt;
of better policies, practices and has to recommend improvements. They&lt;br /&gt;
are not working in the vacuum and their work has to create new and&lt;br /&gt;
better standards for cyber security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
==CERT==&lt;br /&gt;
&amp;lt;p&amp;gt;The term “computer emergency response team” was coined in 1988. In&lt;br /&gt;
response to the Morris worm attack that impacted thousands of servers on&lt;br /&gt;
the Internet, DARPA funded the formation of the Computer Emergency&lt;br /&gt;
Response Team Coordination Center (CERT-CC) at Carnegie Mellon&lt;br /&gt;
University. The goal of CERT-CC was to help protect the internet by&lt;br /&gt;
collecting and disseminating information on critical security&lt;br /&gt;
vulnerabilities. Several other countries formed similar centers using&lt;br /&gt;
the same acronym (despite threats of legal action by Carnegie Mellon for&lt;br /&gt;
trademark infringement). Now the term CERT refers to any emergency&lt;br /&gt;
response team that deals with cyber threats. Many people use CERT-CC&lt;br /&gt;
interchangeably with CSIRT, though the charter of a CERT is information&lt;br /&gt;
sharing in order to help other response teams respond to threats against&lt;br /&gt;
their own infrastructure.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In general, the designation of CERT is helpful in applying real-world&lt;br /&gt;
solutions to various cybersecurity problems. They may be government&lt;br /&gt;
contractors or employees of a major corporation. For example, the U.S.&lt;br /&gt;
Computer Emergency Readiness Team (US-CERT) operates under the U.S.&lt;br /&gt;
Department of Homeland Security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.techopedia.com/definition/31003/computer-emergency-response-team-cert&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In Estonia CERT is designated as CERT-EE. It was established in 2006,&lt;br /&gt;
as an organization responsible for the management of security incidents&lt;br /&gt;
in .ee computer networks. It is also a national contact point for&lt;br /&gt;
international co-operation in the field of IT security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ria.ee/en/cyber-security/cert-ee.html&amp;lt;/p&amp;gt;&lt;br /&gt;
===Difference between SOC/CSIRT/CERT===&lt;br /&gt;
&amp;lt;p&amp;gt;How CSIRTs differ from CERTs and SOCs There are overlapping&lt;br /&gt;
responsibilities between a community emergency response team (CERT),&lt;br /&gt;
computer security incident response team (CSIRT), and security&lt;br /&gt;
operations center (SOC). To add to this confusion, frequently, the terms&lt;br /&gt;
CERT and CSIRT are used interchangeably, despite the important&lt;br /&gt;
differences.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image3.png&amp;quot; alt=&amp;quot;Overlapping in images/image3.png&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;Overlapping in&lt;br /&gt;
images/image3.png&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
==Understand the primary roles and characteristics of a CERT, CSIRT, and SOC.==&lt;br /&gt;
&amp;lt;p&amp;gt;So, using strict definitions, a CERT collects and disseminates&lt;br /&gt;
security information, typically for the benefit of a country or an&lt;br /&gt;
industry. A CSIRT is a cross-functional team that responds to incidents&lt;br /&gt;
on behalf of a country or an organization. A SOC is where a country or&lt;br /&gt;
organization monitors and defends its network, servers, applications,&lt;br /&gt;
and endpoints.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image4.png&amp;quot; alt=&amp;quot;table of explanation images/image4&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;table of explanation&lt;br /&gt;
images/image4&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
==Future==&lt;br /&gt;
&amp;lt;p&amp;gt;And the Cyber security problem is only getting bigger. According to a&lt;br /&gt;
report published by Accenture, the number of cyber security breaches&lt;br /&gt;
increased by 11 percent from 2017 to 2018. The cost of such breaches is&lt;br /&gt;
astronomical–about $600 billion worldwide, according to the Economic&lt;br /&gt;
Impact of Cybercrime report.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Job projections for cybersecurity are staggering. The Bureau of Labor&lt;br /&gt;
Statistics in US predicts that careers in the cybersecurity field will&lt;br /&gt;
grow by 32% by 2028. That makes cybersecurity one of the top 10&lt;br /&gt;
fastest-growing jobs in the country. In the United States alone, jobs&lt;br /&gt;
for Information Security Analysts are expected to grow by 15% by&lt;br /&gt;
2024.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Most likely this trend is also similar in other countries.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When checking Estonian job portals, there is a constant need for&lt;br /&gt;
people for cyber security related positions. Also, linkedin search gives&lt;br /&gt;
approximately 30 vacancies immediately. There are banks, logistics&lt;br /&gt;
companies, e-shops, and software producers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://ee.linkedin.com/jobs/cyber-security-jobs?countryRedirected=1&amp;amp;amp;position=1&amp;amp;amp;pageNum=0&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Trends that affect companies create need for constant cyber security&lt;br /&gt;
services. Increasing number of home/remote offices require secure&lt;br /&gt;
corporate networks and security of remote devices. One example is from&lt;br /&gt;
this year, when sloppy remote desktop set-up paralyzed systems of 17&lt;br /&gt;
companies.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.aripaev.ee/uudised/2022/04/20/ria-lohakas-kaugtoolaua-seadistus-halvas-martsis-vahemalt-17-juhul-ettevotete-it-susteemid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Also, no service can exists without robust infrastructure - servers,&lt;br /&gt;
databases, applications. As all previously mentioned devices and&lt;br /&gt;
services are at constant scanning and surveillance. So, the breach&lt;br /&gt;
detection and immediate action demands 24/7 services. Even if lot of&lt;br /&gt;
things could be automated, there is a need for human specialists (at&lt;br /&gt;
least, at the moment). Third growing field is also a forensic&lt;br /&gt;
investigation, as every attack must be investigated in order to be ready&lt;br /&gt;
to repel next attacks. So data recovery and evidence collection is&lt;br /&gt;
another important field of work that need skilled and professional&lt;br /&gt;
workers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Even, if the specifics of the entity, be it CSIRT, CERT or SOC, are&lt;br /&gt;
different, the fundamentals of the work are the same. Professional&lt;br /&gt;
knowledge of the networks, operational systems, hardware, scripting, and&lt;br /&gt;
several other wider IT related knowledge is needed. As there is no&lt;br /&gt;
single way to reach to it, every single person can find one’s strongest&lt;br /&gt;
sides and develop them with knowledge of weaker side, in order to know,&lt;br /&gt;
when to as for help.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/body&amp;gt;&lt;br /&gt;
&amp;lt;/html&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mavald</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142177</id>
		<title>Hiring a Cyber Security Incident Analyst</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142177"/>
		<updated>2022-05-01T14:37:43Z</updated>

		<summary type="html">&lt;p&gt;Mavald: /* Mobile device management */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==A Cyber Security Incident Analyst==&lt;br /&gt;
&lt;br /&gt;
[[File:image1.png|600px|thumb|Job advertisement &amp;lt;ref&amp;gt;&amp;quot;Job Advertisement&amp;quot;. Available at https://www.projectpeople.com/jobs/&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
===Cyber security incident analyst in SOC/CSIRT/CERT===&lt;br /&gt;
This article delves into the job title of Cyber Security Incident&lt;br /&gt;
Analyst and provides an overview of the acronyms SOC/CSIRT/CERT. A brief&lt;br /&gt;
history of the job is discussed here, as well as a possible career path,&lt;br /&gt;
education, experience, and other characteristics required for work in&lt;br /&gt;
computer security-related organizations. The article also provides a&lt;br /&gt;
brief history of SOC/CSIRT/CERT, as well as a comparison of their&lt;br /&gt;
differences and similarities.&lt;br /&gt;
===Cyber Security Incident Analyst Skill Set===&lt;br /&gt;
What skill set is expected from the Cyber Security Incident Analyst? Below written lines are taken from the same job advertisement depicted&lt;br /&gt;
on the left side of this article:&lt;br /&gt;
As a Security Incident Analyst your responsibilities will include:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Continuous monitoring of security tooling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Performing regular and ad-hoc vulnerability assessments&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Carrying out ‘spot checks’&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Reporting vulnerabilities to the PVG via the alerts system&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintaining and documenting logging systems&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Developing centralized logging, reporting and intelligence&lt;br /&gt;
platforms&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;‘Light touch’ penetration testing with open source tooling&lt;br /&gt;
(Metasploit)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Knowledge &amp;amp;amp; Experience required:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;SOC, CSIRT or CERT operational environment experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Windows / Linux experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TCP /IP networking protocol knowledge&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience reviewing and analyzing Security Events from various&lt;br /&gt;
monitoring and logging sources&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience in website and web application security assessment or&lt;br /&gt;
penetration testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience of using Metasploit&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Scripting knowledge using BASH, Python, Perl, Ruby&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Skills in Host and Network Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
As one can see the description of the duties is wide and also the&lt;br /&gt;
knowledge and experience that is required is noteworthy. So, where to&lt;br /&gt;
start to find out the way to get this kind of knowledge and&lt;br /&gt;
expertize.&lt;br /&gt;
===Possible career path===&lt;br /&gt;
Next part of the paper is aiming to depict a possible ways, how to&lt;br /&gt;
develop oneself, and move along the career pathway in cybersecurity&lt;br /&gt;
field. Topics of development, education, experience and certification&lt;br /&gt;
are covered.&lt;br /&gt;
[[File:analystimage2.png|700px|thumb|Career path &amp;lt;ref&amp;gt;&amp;quot;Possible Career Path&amp;quot;. Available at https://www.cyberseek.org/pathway.html&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
===Junior/Senior===&lt;br /&gt;
Start with an entry-level job in IT. Hands-on experience is often the&lt;br /&gt;
most effective way to prepare for certification exams. Start&lt;br /&gt;
accumulating work experience with an entry-level role as a cybersecurity&lt;br /&gt;
analyst. Many cybersecurity professionals start off in more general IT&lt;br /&gt;
roles. The skills, practices, and technologies you’ll use as a&lt;br /&gt;
cybersecurity professional will continue to evolve along with computer&lt;br /&gt;
and network technology. The desire to learn, ability to problem solve,&lt;br /&gt;
and attention to detail will serve you well in this field. Other, more&lt;br /&gt;
technical skills and technologies to learn include:&amp;lt;ref name=&amp;quot;certification&amp;quot;&amp;gt;Popular Cyber Security Certificates [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications  [Accessed 25 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====SIEM tools (security information and event management)====&lt;br /&gt;
Security Information and Event Management (SIEM) is a set of tools&lt;br /&gt;
and services offering a holistic view of an organization’s information&lt;br /&gt;
security. SIEM works by combining two technologies:&lt;br /&gt;
&amp;lt;li&amp;gt;Security information management (SIM), which collects data from log&lt;br /&gt;
files for analysis and reports on security threats and events, and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;security event management (SEM), which conducts real-time system&lt;br /&gt;
monitoring, notifies network admins about important issues and&lt;br /&gt;
establishes correlations between security events. There are a number of&lt;br /&gt;
security information and event management solutions on the market.&lt;br /&gt;
ArcSight ESM, IBM QRadar and Splunk are among the most popular. &amp;lt;ref name=&amp;quot;SIEM&amp;quot;&amp;gt;Application security, SIEM [Online]. Available: https://www.imperva.com/learn/application-security/siem/. [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Firewalls, Intrusion Detection Systems (IDS), and Intrusion Prevention Systems(IPS)====&lt;br /&gt;
Firewalls can be two types, hardware and software firewalls. Software&lt;br /&gt;
firewall is a firewall that is installed on a computer or server, and&lt;br /&gt;
tasked with network security. It works with a wide variety of other&lt;br /&gt;
technology security solutions to provide more robust and cohesive&lt;br /&gt;
security for enterprises of all sizes. When a software firewall is&lt;br /&gt;
installed on a server, it opens up like an umbrella of protection over&lt;br /&gt;
all other computers connected to the network. It is able to monitor both&lt;br /&gt;
incoming and outgoing traffic for potential risk or suspicious user&lt;br /&gt;
behavior, and also makes setting security policies much easier, faster&lt;br /&gt;
and more flexible. Hardware firewall is positioned between the network&lt;br /&gt;
and devices, allowing traffic to funnel through the firewall for a close&lt;br /&gt;
inspection and analysis. A hardware firewall, a term often&lt;br /&gt;
interchangeable with network or next-generation firewall, protects the&lt;br /&gt;
network gateways for an enterprise. Hardware firewall is physical&lt;br /&gt;
hardware, installed between network elements and connected devices, and&lt;br /&gt;
is tasked with filtering traffic for cyber threat to the network or&lt;br /&gt;
devices. Filtering out unauthorized or suspicious users based on traffic&lt;br /&gt;
analysis is one of the biggest benefits of hardware firewall. &amp;lt;ref name=&amp;quot;sangfor&amp;quot;&amp;gt;Sangfor, &amp;quot;What is Software Firewall? Difference between Hardware Firewall and Software Firewall, [Online]. Available: https://www.sangfor.com/blog/cybersecurity/what-is-software-firewall-difference-between-hardware-firewall-and-software-firewall [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems&lt;br /&gt;
(IPS) are both parts of the network infrastructure. IDS/IPS compare&lt;br /&gt;
network packets to a cyberthreat database containing known signatures of&lt;br /&gt;
cyberattacks — and flag any matching packets. IDS doesn’t alter the&lt;br /&gt;
network packets in any way, whereas IPS prevents the packet from&lt;br /&gt;
delivery based on the contents of the packet, much like how a firewall&lt;br /&gt;
prevents traffic by IP address. &amp;lt;ref name=&amp;quot;Varonis&amp;quot;&amp;gt;Varonis, &amp;quot;What is Software Firewall? IDS vs. IPS: What is the Difference?, [Online]. Available: https://www.varonis.com/blog/ids-vs-ips [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Digital forensics====&lt;br /&gt;
Digital forensics is a branch of forensic science that focuses on&lt;br /&gt;
identifying, acquiring, processing, analyzing, and reporting on data&lt;br /&gt;
stored electronically. Electronic evidence is a component of almost all&lt;br /&gt;
criminal activities and digital forensics support is crucial for law&lt;br /&gt;
enforcement investigations. Electronic evidence can be collected from a&lt;br /&gt;
wide array of sources, such as computers, smartphones, remote storage,&lt;br /&gt;
unmanned aerial systems, shipborne equipment, and more.&amp;lt;ref name=&amp;quot;interpol&amp;quot;&amp;gt;Interpol, &amp;quot;Digital forensics&amp;quot;. Available: https://www.interpol.int/How-we-work/Innovation/Digital-forensics. [Accessed 28 4 2022].&amp;lt;/ref&amp;gt; &lt;br /&gt;
Investigative process of digital forensics can be divided into several stages. There are four major stages: preservation, collection,&lt;br /&gt;
examination, and analysis. All these four stages need a deep understanding of computers, technology across a broad spectrum, and cybersecurity principles and&lt;br /&gt;
practices, a working knowledge of computers, networks, and coding, in-depth investigative abilities, critical-thinking skills and analytical talent the ability to effectively communicate and work with a&lt;br /&gt;
wide range of people. &amp;lt;ref name=&amp;quot;ecpi&amp;quot;&amp;gt;&amp;quot;Digital forensics&amp;quot;. Available: https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me. [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Mobile device management====&lt;br /&gt;
Mobile device management (MDM) is software that allows IT&lt;br /&gt;
administrators to control, secure and enforce policies on smartphones,&lt;br /&gt;
tablets and other endpoints. Mobile device management software emerged&lt;br /&gt;
in the early 2000s as a way to control and secure the personal digital&lt;br /&gt;
assistants and smartphones that business workers began to use. The&lt;br /&gt;
consumer smartphone boom that started with the launch of the Apple&lt;br /&gt;
iPhone in 2007 led to the bring your own device (BYOD) trend, which&lt;br /&gt;
fueled further interest in MDM.&amp;lt;ref name=&amp;quot;techtarget&amp;quot;&amp;gt;Techtarget, &amp;quot;Mobile Device Management&amp;quot;. Available: https://www.techtarget.com/searchmobilecomputing/definition/mobile-device-management [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Data management====&lt;br /&gt;
Sometimes the data management is neglected, but this part has a&lt;br /&gt;
crucial role when learning for good cyber security practices. Majority&lt;br /&gt;
of cyber security programs include a special courses on data management.&lt;br /&gt;
Data management is a method of organizing and maintaining data processes&lt;br /&gt;
that are required in almost every business operations. The benefits of&lt;br /&gt;
data management can be found accounting, statistics, logistics planning&lt;br /&gt;
and other disciplines including corporate computing.&lt;br /&gt;
&amp;lt;p&amp;gt;https://globaluniversities.in/msc-data-management-cyber-security/&amp;lt;/p&amp;gt;&lt;br /&gt;
Data governance (and management) play a fundamental role in&lt;br /&gt;
protecting an organization’s data. Ensuring that the right people have&lt;br /&gt;
the right access and that appropriate security controls are in place to&lt;br /&gt;
protect each system or service, based on the criticality or sensitivity&lt;br /&gt;
of the data sets these contain.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://cybersecurity-magazine.com/the-role-of-data-governance-in-cybersecurity/?utm_source=rss&amp;amp;amp;utm_medium=rss&amp;amp;amp;utm_campaign=the-role-of-data-governance-in-cybersecurity&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Application security development====&lt;br /&gt;
Application security describes security measures at the application&lt;br /&gt;
level that aim to prevent data or code within the app from being stolen&lt;br /&gt;
or hijacked. It encompasses the security considerations that happen&lt;br /&gt;
during application development and design, but it also involves systems&lt;br /&gt;
and approaches to protect apps after they get deployed. Application&lt;br /&gt;
security may include hardware, software, and procedures that identify or&lt;br /&gt;
minimize security vulnerabilities.&lt;br /&gt;
https://www.vmware.com/topics/glossary/content/application-security.html&lt;br /&gt;
Application security development is important to ensure that your&lt;br /&gt;
application is free from coding errors and bugs. And controls the risk&lt;br /&gt;
and helps safeguard against security vulnerabilities. Application&lt;br /&gt;
security development is the process of making applications more secure&lt;br /&gt;
by finding and fixing security vulnerabilities. This is often done by&lt;br /&gt;
enforcing software security best practices and using application&lt;br /&gt;
security testing tools.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.perforce.com/blog/kw/application-security-development-best-practices&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Audit and compliance knowledge====&lt;br /&gt;
A cyber security audit is designed to be a comprehensive review and&lt;br /&gt;
analysis of your business’s IT infrastructure. It identifies threats and&lt;br /&gt;
vulnerabilities, exposing weaknesses and high-risk practices.&lt;br /&gt;
Regulations such as the EU GDPR (General Data Protection Regulation) can&lt;br /&gt;
impose hefty penalties in the event of a breach that results in&lt;br /&gt;
exploited data. A cyber security audit will help mitigate the&lt;br /&gt;
consequences of a breach and demonstrate that your organization has&lt;br /&gt;
taken the necessary steps to protect client and company data.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://cyforsecure.co.uk/services/cyber-assessment/cyber-security-audit/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Cybersecurity compliance is the organizational risk management method&lt;br /&gt;
aligned with pre-defined security measures &amp;amp;amp; controls on how data&lt;br /&gt;
confidentiality is ensured by its administrational procedures.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://nordlayer.com/blog/cybersecurity-compliance-everything-you-need-to-know/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;All needed skills are developed through courses and&lt;br /&gt;
certification.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
===Entry-Level Incident Response Positions===&lt;br /&gt;
&amp;lt;p&amp;gt;It is not always possible to advance to the position of incident&lt;br /&gt;
responder in a straight line. Many professionals advance from entry- to&lt;br /&gt;
mid-level positions before becoming a real incident responder or a&lt;br /&gt;
member of a computer emergency response team (CERT).&amp;lt;br /&amp;gt;&lt;br /&gt;
These are some examples:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;network-administrator&amp;quot;&amp;gt;Network administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;This position’s experience will help potential incident responders&lt;br /&gt;
develop networking skills. Attention to detail, as well as the ability&lt;br /&gt;
to sift through system configurations, site layouts, and general network&lt;br /&gt;
and communication setups, are essential in this field.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;system-administrator&amp;quot;&amp;gt;System administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Another crucial beginning point for an incident responder is to learn&lt;br /&gt;
how to manage resources inside your organization as well as user&lt;br /&gt;
behavior. Understanding the potential damage that users, inadequate&lt;br /&gt;
security setups, and ineffective IT policies and procedures can cause on&lt;br /&gt;
your network can provide prospective candidates with insight into the&lt;br /&gt;
human component of an incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;security-administrator&amp;quot;&amp;gt;Security administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In such a position, basic hacking skills, penetration testing, and&lt;br /&gt;
intrusion detection are all learned, which are crucial incident&lt;br /&gt;
responder skills when trying to replicate a breach or attack.&lt;br /&gt;
Understanding the paths a cybercriminal will take when attempting to&lt;br /&gt;
damage or obtain access to a system can greatly simplify the work of&lt;br /&gt;
reverse engineering the incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://resources.infosecinstitute.com/topic/incident-responder-career-roadmap-entry-level-executive/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3 id=&amp;quot;mid-level-incident-response-positions&amp;quot;&amp;gt;Mid-Level Incident&lt;br /&gt;
Response Positions&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5&lt;br /&gt;
id=&amp;quot;computer-security-incident-response-team-csirt-engineer&amp;quot;&amp;gt;Computer&lt;br /&gt;
security incident response team (CSIRT) engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;cyber-incident-responder&amp;quot;&amp;gt;Cyber incident responder&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-response-engineer&amp;quot;&amp;gt;Incident response&lt;br /&gt;
engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;While each of these positions is different, they generally require&lt;br /&gt;
very similar skills and characteristics in a candidate. At this level,&lt;br /&gt;
personal characteristics such as problem solving, time management, and&lt;br /&gt;
even presentation skills become more crucial as one’s career evolves&lt;br /&gt;
into a management-facing role.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Technical skills include the ability to identify and minimize threats&lt;br /&gt;
while maintaining communication with management and the rest of your&lt;br /&gt;
team. Data analysis and evidence gathering become increasingly crucial,&lt;br /&gt;
and the circumstances in which your services are deployed get more&lt;br /&gt;
serious.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Problem-solving skills are crucial at this level of incident&lt;br /&gt;
response, and as the stakes rise, so does the pressure in each&lt;br /&gt;
situation. At this level, programming abilities are essential since&lt;br /&gt;
incident responders may be needed to reverse engineer malicious code or&lt;br /&gt;
even create patches for vulnerable network applications or services.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.coursera.org/articles/popular-cybersecurity-certifications&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3 id=&amp;quot;senior-level-incident-response-positions&amp;quot;&amp;gt;Senior-Level Incident&lt;br /&gt;
Response Positions&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;intrusion-detection-specialist&amp;quot;&amp;gt;Intrusion detection&lt;br /&gt;
specialist:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;A CISSP certification might help a potential candidate in preparing&lt;br /&gt;
for the profession. The role of an intrusion detection specialist is to&lt;br /&gt;
find and stop any unwanted communications.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-manager&amp;quot;&amp;gt;Incident manager:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Expected to plan, oversee, manage, and supervise all incident&lt;br /&gt;
response team actions. Is in charge of reporting all current events to&lt;br /&gt;
senior management and stakeholders, as well as acting as the technical&lt;br /&gt;
lead on active incidents for incident responders. Prepares threat and&lt;br /&gt;
impact assessments and reports them known to management.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.coursera.org/articles/popular-cybersecurity-certifications&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Certificates== &lt;br /&gt;
There is a vast number of different certificates and the road map to&lt;br /&gt;
being a certified professional could be very different&amp;lt;ref name=&amp;quot;Coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated],&amp;quot; [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;NICCS&amp;quot;&amp;gt;NICCS, &amp;quot;Cybersecurity Certifications,&amp;quot; [Online]. Available: hhttps://niccs.cisa.gov/about-niccs/cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt; . One possible&lt;br /&gt;
approach is to start with basic certificates from the different branches&lt;br /&gt;
of service and move to more specific and demanding focused&lt;br /&gt;
certification. Also, some jobs require certain clearances, either from&lt;br /&gt;
industry, or from the government. One small selection of different&lt;br /&gt;
possible certificates is brought out in following paragraphs.&lt;br /&gt;
&lt;br /&gt;
Security+ is a CompTIA certification that is considered a basic cert&lt;br /&gt;
among cybersecurity professionals. It covers the topics of risk&lt;br /&gt;
management and threat assessment.&lt;br /&gt;
Network+ is also offered by CompTIA this certification (like the name&lt;br /&gt;
implies) focuses on networking infrastructure and operations. It is&lt;br /&gt;
considered a foundational certification.&lt;br /&gt;
The Certified Information Systems Security Professional (CISSP) is a&lt;br /&gt;
more advanced certification designed for cybersecurity professionals&lt;br /&gt;
with at least five years of work experience. The certification covers&lt;br /&gt;
topics such as architecture, engineering, and management.&amp;lt;/p&amp;gt;&lt;br /&gt;
The Certified Ethical Hacker (CEH) certification is also considered a&lt;br /&gt;
more advanced cert because it generally requires that applicants have&lt;br /&gt;
multiple years of work experience. The goal of an ethical hacker&lt;br /&gt;
certification is to be able to understand how cyber attacks unfold in&lt;br /&gt;
order to improve threat assessment and mitigation skills.&amp;lt;ref name=&amp;quot;cyberguide&amp;quot;&amp;gt;Cybersecurity Guide, &amp;quot;How to become a cybersecurity specialist&amp;quot;, [Online]. Available: https://cybersecurityguide.org/careers/security-specialist/. [Accessed 27 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
This is definitely not all, when one looks for more information, following link could be searched, to get more in depth knowledge about&lt;br /&gt;
different possibilities. Hereby, with the help of this matrix a possible taxonomy of different 436 listed certificates in branches are&lt;br /&gt;
presented.&amp;lt;ref name=&amp;quot;Pauljeremy&amp;quot;&amp;gt;&amp;quot;Cybersecurity Roadmap,&amp;quot; [Online]. Available: https://pauljerimy.com/2020/10/12/scr-oct-2020-update/. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:analystimage5.png|1000px|thumb|Certificate matrix &amp;lt;ref&amp;gt;&amp;quot;Certification roadmap&amp;quot;. Available at https://pauljerimy.com/security-certification-roadmap&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
=== Communication and Network Security===&lt;br /&gt;
Communication and network security covers the ability to secure&lt;br /&gt;
communication channels and networks. Topics include secure and converges&lt;br /&gt;
protocols, wireless networks, cellular networks, hardware operations&lt;br /&gt;
(warranty and redundant power), and third-party connectivity. IP&lt;br /&gt;
networking are also included in this domain.&lt;br /&gt;
===Identity and Access Management===&lt;br /&gt;
The identity and access management domain covers the attacks that&lt;br /&gt;
target the human gateway to gain access to data. Other topics include&lt;br /&gt;
ways to identify users with rights to access the information and&lt;br /&gt;
servers. Identity and access management covers the topics of&lt;br /&gt;
applications, Single sign-on authentication, privilege escalation,&lt;br /&gt;
Kerberos, rule-based or risk-based access control, proofing and&lt;br /&gt;
establishment of identity.&lt;br /&gt;
===Security Architecture and Engineering===&lt;br /&gt;
The security architecture and engineering domain covers important&lt;br /&gt;
topics concerning security engineering plans, designs and principles,&lt;br /&gt;
Topics include assessing and mitigating information system&lt;br /&gt;
vulnerabilities, fundamental concepts of security models and security&lt;br /&gt;
architectures in critical areas like access control. Cloud systems,&lt;br /&gt;
cryptography, system infiltrations (ransomware, fault-injection and&lt;br /&gt;
more) and virtualized systems are also covered in this domain.&lt;br /&gt;
===Asset Security===&lt;br /&gt;
The Asset Security domain deals with the issues related to the&lt;br /&gt;
collection, storage, maintenance, retention and destruction of data. It&lt;br /&gt;
also covers knowledge of different roles regarding data handling (owner,&lt;br /&gt;
controller and custodian) as well as data protection methods and data&lt;br /&gt;
states. Other topics include resource provision, asset classification&lt;br /&gt;
and data lifecycle management.&lt;br /&gt;
===Security and Risk Management===&lt;br /&gt;
The security and risk management domain covers general on skills&lt;br /&gt;
related to the implementation of user awareness programs as well as&lt;br /&gt;
security procedures. Emphasis is also placed on risk management&lt;br /&gt;
concerning the acquisition of new services, hardware and software&lt;br /&gt;
(supply chain). Other skills include social engineering defense&lt;br /&gt;
mechanisms.&lt;br /&gt;
===Security Assessment and Testing===&lt;br /&gt;
The security assessment and testing domain deals with all the&lt;br /&gt;
techniques and tools used to find system vulnerabilities, weaknesses and&lt;br /&gt;
potential areas of concern not addressed by security procedures and&lt;br /&gt;
policies. Attack simulations, vulnerability assessment, compliance&lt;br /&gt;
checks, and ethical disclosure also fall under this domain.&lt;br /&gt;
===Software Security===&lt;br /&gt;
The software development security domain deals with implementing&lt;br /&gt;
software-based security protocols within environment for which the IT&lt;br /&gt;
professional is responsible. Risk analysis, vulnerability identification&lt;br /&gt;
and auditing of source codes are all covered in this subset. Additional&lt;br /&gt;
topics include software-designed security, maturity models, development&lt;br /&gt;
methodologies, open-source and third-party development security.&lt;br /&gt;
===Security operations===&lt;br /&gt;
The security operations domain covers topics ranging from&lt;br /&gt;
investigations and digital forensic to detection and intrusion&lt;br /&gt;
prevention tools, sandboxing and firewalls. Topics include user and&lt;br /&gt;
entity behavior analytics, threat intelligence (threat hunting and&lt;br /&gt;
threat feeds) log management, artifacts (mobile, computer and network),&lt;br /&gt;
machine learning and AI-based tools, penetration testing, and&lt;br /&gt;
exploitation development. These for sub-domains are lister here.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Incident Handling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Penetration Testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Exploitation&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Education==&lt;br /&gt;
&amp;lt;p&amp;gt;The entry level monitoring specialist is hired by Estonian&lt;br /&gt;
Information System Authority even if there is no formal IT education,&lt;br /&gt;
but readiness to learn and moderate knowledge of different operation&lt;br /&gt;
systems is enough to start the career.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.cv.ee/en/vacancy/792782/riigi-infosusteemi-amet/seirespetsialist-tule-eesti-kuberruumi-valvuriks&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Nevertheless, like most other high qualification careers jobs falling&lt;br /&gt;
under the cybersecurity specialist category require some form of formal&lt;br /&gt;
education. However, since cybersecurity specialist jobs can fall across&lt;br /&gt;
a wide spectrum of job descriptions and responsibilities, it is possible&lt;br /&gt;
to obtain a specialist job after completing many levels of different&lt;br /&gt;
computer related education.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;If one is looking for a cybersecurity related education, for example&lt;br /&gt;
in EU, 137 courses/programs could be found that relate to keyword IT or&lt;br /&gt;
cybersecurity.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.enisa.europa.eu/topics/cybersecurity-education/education-map/education-courses&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Also, there is a great amount of discussion, if cuber security&lt;br /&gt;
professional should have a degree or would be certification just enough.&lt;br /&gt;
One interesting table is produces by Franklin University that compares&lt;br /&gt;
benefits and/or drawbacks of each type of credential.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image11.png&amp;quot; alt=&amp;quot;Comparison MSc vs certificate&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;Comparison MSc vs&lt;br /&gt;
certificate&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Certifications are generally good for people with little practical&lt;br /&gt;
experience because they are known quantities in the industry and can&lt;br /&gt;
help you get your foot in the door. They set a minimum knowledge bar.&lt;br /&gt;
But some certifications are viewed more favorably than others.&lt;br /&gt;
Certifications with renewal requirements are viewed better by hiring&lt;br /&gt;
managers, but they also more costly in the long run because of the need&lt;br /&gt;
for continuing education. Certifications are also good for showing&lt;br /&gt;
in-depth expertise in a specialization within cybersecurity. Depending&lt;br /&gt;
on your career goals, it may be advantageous to have a master’s&lt;br /&gt;
degree—which shows your breadth of knowledge, critical thinking and&lt;br /&gt;
leadership skills—and a certificate—which shows specific skill&lt;br /&gt;
competency.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;As IT (Cyber) Security is still a relatively young discipline,&lt;br /&gt;
universities and colleges are still figuring out which is the best&lt;br /&gt;
approach for their degrees. Study programmes and curricula in Cyber&lt;br /&gt;
Security are different. In general, here are the duration of Cyber&lt;br /&gt;
Security degrees:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Bachelor’s degrees in Cyber Security take 3 or 4 years in most&lt;br /&gt;
countries.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Master’s courses in Cyber Security take between 1-2 years to&lt;br /&gt;
complete.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;PhD programmes in Cyber Security last 3-5 years. Some only take 1&lt;br /&gt;
or 2 years, but they are less common.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Generalization could me made that on bachelor level the general&lt;br /&gt;
knowledge about the cyber issues are obtained. On master level the&lt;br /&gt;
specialization courses are taken and the person can choose more specific&lt;br /&gt;
topics to study. It is on master level where strengths of the cyber&lt;br /&gt;
specialist can be developed further and up-do date knowledge obtained in&lt;br /&gt;
specifics. PhD is serious science and involves teaching, lot of&lt;br /&gt;
scientific work and writing for publications.&amp;lt;/p&amp;gt;&lt;br /&gt;
==Salary==&lt;br /&gt;
&amp;lt;p&amp;gt;Even if the salary can be very different, compared to the skills and&lt;br /&gt;
experience, an generalization can be made. Cyber Security professionals&lt;br /&gt;
in CSIRT, and in other entities earn quite well, from the start. First,&lt;br /&gt;
some comparison from the United States. The average CSIRT analyst salary&lt;br /&gt;
in the USA is $97,500 per year or $50 per hour. Entry level positions&lt;br /&gt;
start at $48,875 per year while most experienced workers make up to&lt;br /&gt;
$135,373 per year.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.talent.com/salary?job=csirt+analyst&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;There are multiple positions you can occupy in this field. They have&lt;br /&gt;
in common great salaries and high demand for technical skills, attention&lt;br /&gt;
to details, problem-solving mentality, and the ability to analyze risks.&lt;br /&gt;
Here are the average annual salaries in the United States, according to&lt;br /&gt;
Payscale:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.payscale.com/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Cryptographer – 100,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Information Security Officer – 91,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Assessor – 90,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Engineer – 88,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Penetration Tester – 81,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Forensics Expert – 71,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Administrator – 65,000 USD&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When looking into salaries in Estonia, one can find that there is a&lt;br /&gt;
discussion that private sector is taking a toll from the public sector,&lt;br /&gt;
and that the salaries in important agencies, as Information System&lt;br /&gt;
Authority loose their employees to the better paid positions in private&lt;br /&gt;
sector.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://digi.geenius.ee/rubriik/uudis/kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad/&lt;br /&gt;
https://tehnika.postimees.ee/6887428/riigi-it-tootajate-palgamaarad-kasvasid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;But there is also a different view that average private sector worker&lt;br /&gt;
could be hired as a top specialist in public sector and then the payment&lt;br /&gt;
is higher. Nevertheless, it seems that the average payment in cyber&lt;br /&gt;
security sector is any way higher that in other parts of the&lt;br /&gt;
e-services.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://digi.geenius.ee/rubriik/uudis/5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka/&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
==SOC==&lt;br /&gt;
&amp;lt;p&amp;gt;A SOC is a facility where an organization’s network, applications,&lt;br /&gt;
and endpoints are monitored and defended. The term was adapted from&lt;br /&gt;
network operations centers (NOCs), where large telecommunication or&lt;br /&gt;
corporate networks are monitored. When network security became more of a&lt;br /&gt;
concern, security teams were formed within the NOCs, and eventually spun&lt;br /&gt;
off into larger organizations of their own as the responsibilities of&lt;br /&gt;
security teams grew increasingly complex and specialized. The security&lt;br /&gt;
staff working in a security operations center are often called the SOC&lt;br /&gt;
team.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Functions of the SOC team include, but are not limited to:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ol type=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Taking inventory of resources, to get a better understanding of the&lt;br /&gt;
structure they are protecting.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintanence of the system, by constantly making updates and adding&lt;br /&gt;
safeguards.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Monitoring the network for abnormalities with special tools.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Threat analysis of new attacks and vulnerabilities.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Responding to attacks, by acting as “first responders”. The SOC team&lt;br /&gt;
will shut down and/or isolate endpoints, deleting files and lowering the&lt;br /&gt;
impact as fast as possible.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Recovery of system stability and lost data. This may be done using&lt;br /&gt;
backups, restarting endpoints or reconfiguring systems.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Logging all actions on the system, to be later used for analysis or&lt;br /&gt;
forensics after an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigating the root cause of an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Auditing their own actions, to be in line with regulations of the&lt;br /&gt;
organization, industry or governing body.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.trellix.com/en-us/security-awareness/operations/what-is-soc.html&amp;lt;/p&amp;gt;&lt;br /&gt;
==CSIRT==&lt;br /&gt;
&amp;lt;p&amp;gt;A CSIRT is a group that responds to security incidents when they&lt;br /&gt;
occur. Key responsibilities of a CSIRT include:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
===Creating and maintaining an incident response plan (IRP)===&lt;br /&gt;
An incident response plan (IRP) is a set of written instructions for&lt;br /&gt;
detecting, responding to and limiting the effects of an information&lt;br /&gt;
security event. Incident response plans provide instructions for&lt;br /&gt;
responding to many potential scenarios, including data breaches, denial&lt;br /&gt;
of service/distributed denial of service attacks, firewall breaches,&lt;br /&gt;
virus or malware outbreaks or insider threats. Without an incident&lt;br /&gt;
response plan in place, organizations may either not detect the attack&lt;br /&gt;
in the first place, or not follow proper protocol to contain the threat&lt;br /&gt;
and recover from it when a breach is detected.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.stratacore.com/incidentresponseplan&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
===Investigating and analyzing incidents===&lt;br /&gt;
CSIRTs are also involved in improvement activities. After major&lt;br /&gt;
computer security incidents occur, or when incidents are not handled in&lt;br /&gt;
a timely or effective manner, a CSIRT will generally perform a&lt;br /&gt;
postmortem of the incident and its response. This postmortem will&lt;br /&gt;
identify the strengths and weakness of the response effort. Such reviews&lt;br /&gt;
can identify weaknesses and holes in systems, infrastructure defenses,&lt;br /&gt;
or policies that allowed the incident to take place. It can also&lt;br /&gt;
identify problems with communication channels, interfaces, and&lt;br /&gt;
procedures that inhibited the efficient resolution of the reported&lt;br /&gt;
problem.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.cisa.gov/uscert/bsi/articles/best-practices/incident-management/defining-computer-security-incident-response-teams&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Managing internal communications and updates during or immediately after incidents occur===&lt;br /&gt;
===Communicating with employees, shareholders, customers, and the press about incidents as needed===&lt;br /&gt;
&amp;lt;p&amp;gt;There are various services within the CSIRT Services Framework that&lt;br /&gt;
address communications, as they relate to security operations and&lt;br /&gt;
incident response services. Some of these include Information Security&lt;br /&gt;
Incident Coordination, Crisis Management Support, Vulnerability&lt;br /&gt;
Disclosure, Situational Awareness Communication, and Awareness Building,&lt;br /&gt;
to name a few. Sharing information and communicating with the general&lt;br /&gt;
public and/or your constituency is appropriate in many different&lt;br /&gt;
scenarios. These can range from proactive communications to reactive&lt;br /&gt;
communications. Each scenario may be unique, and careful consideration&lt;br /&gt;
should be given to when to release information to the public and what&lt;br /&gt;
information should be released.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;https://resources.sei.cmu.edu/asset_files/Handbook/2021_002_001_651819.pdf&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Remediating incidents===&lt;br /&gt;
&amp;lt;p&amp;gt;Threat remediation is a strong and capable tool for fighting the&lt;br /&gt;
cyber security compromises. As the word ‘remedy’ suggests, remediation&lt;br /&gt;
process involves the treatment of a security breach. With the&lt;br /&gt;
remediation practices, your cyber security team is able to eliminate&lt;br /&gt;
suspicious activities and malicious attacks in the form of malware,&lt;br /&gt;
ransomware, phishing and such. Even if you ‘kill’ the suspicious&lt;br /&gt;
activity, the attackers can remain in your systems. If you want to&lt;br /&gt;
contaminate and end the problem for good, your remediation processes&lt;br /&gt;
must involve the detection of the cause.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.logsign.com/blog/what-is-remediation-in-cyber-security/&amp;lt;/p&amp;gt;&lt;br /&gt;
=== Recommending technology, policy, governance, and training changes after security&lt;br /&gt;
incidents===&lt;br /&gt;
&amp;lt;p&amp;gt;After all these actions, the SCIRT must contribute to the development&lt;br /&gt;
of better policies, practices and has to recommend improvements. They&lt;br /&gt;
are not working in the vacuum and their work has to create new and&lt;br /&gt;
better standards for cyber security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
==CERT==&lt;br /&gt;
&amp;lt;p&amp;gt;The term “computer emergency response team” was coined in 1988. In&lt;br /&gt;
response to the Morris worm attack that impacted thousands of servers on&lt;br /&gt;
the Internet, DARPA funded the formation of the Computer Emergency&lt;br /&gt;
Response Team Coordination Center (CERT-CC) at Carnegie Mellon&lt;br /&gt;
University. The goal of CERT-CC was to help protect the internet by&lt;br /&gt;
collecting and disseminating information on critical security&lt;br /&gt;
vulnerabilities. Several other countries formed similar centers using&lt;br /&gt;
the same acronym (despite threats of legal action by Carnegie Mellon for&lt;br /&gt;
trademark infringement). Now the term CERT refers to any emergency&lt;br /&gt;
response team that deals with cyber threats. Many people use CERT-CC&lt;br /&gt;
interchangeably with CSIRT, though the charter of a CERT is information&lt;br /&gt;
sharing in order to help other response teams respond to threats against&lt;br /&gt;
their own infrastructure.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In general, the designation of CERT is helpful in applying real-world&lt;br /&gt;
solutions to various cybersecurity problems. They may be government&lt;br /&gt;
contractors or employees of a major corporation. For example, the U.S.&lt;br /&gt;
Computer Emergency Readiness Team (US-CERT) operates under the U.S.&lt;br /&gt;
Department of Homeland Security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.techopedia.com/definition/31003/computer-emergency-response-team-cert&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In Estonia CERT is designated as CERT-EE. It was established in 2006,&lt;br /&gt;
as an organization responsible for the management of security incidents&lt;br /&gt;
in .ee computer networks. It is also a national contact point for&lt;br /&gt;
international co-operation in the field of IT security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ria.ee/en/cyber-security/cert-ee.html&amp;lt;/p&amp;gt;&lt;br /&gt;
===Difference between SOC/CSIRT/CERT===&lt;br /&gt;
&amp;lt;p&amp;gt;How CSIRTs differ from CERTs and SOCs There are overlapping&lt;br /&gt;
responsibilities between a community emergency response team (CERT),&lt;br /&gt;
computer security incident response team (CSIRT), and security&lt;br /&gt;
operations center (SOC). To add to this confusion, frequently, the terms&lt;br /&gt;
CERT and CSIRT are used interchangeably, despite the important&lt;br /&gt;
differences.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image3.png&amp;quot; alt=&amp;quot;Overlapping in images/image3.png&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;Overlapping in&lt;br /&gt;
images/image3.png&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
==Understand the primary roles and characteristics of a CERT, CSIRT, and SOC.==&lt;br /&gt;
&amp;lt;p&amp;gt;So, using strict definitions, a CERT collects and disseminates&lt;br /&gt;
security information, typically for the benefit of a country or an&lt;br /&gt;
industry. A CSIRT is a cross-functional team that responds to incidents&lt;br /&gt;
on behalf of a country or an organization. A SOC is where a country or&lt;br /&gt;
organization monitors and defends its network, servers, applications,&lt;br /&gt;
and endpoints.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image4.png&amp;quot; alt=&amp;quot;table of explanation images/image4&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;table of explanation&lt;br /&gt;
images/image4&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
==Future==&lt;br /&gt;
&amp;lt;p&amp;gt;And the Cyber security problem is only getting bigger. According to a&lt;br /&gt;
report published by Accenture, the number of cyber security breaches&lt;br /&gt;
increased by 11 percent from 2017 to 2018. The cost of such breaches is&lt;br /&gt;
astronomical–about $600 billion worldwide, according to the Economic&lt;br /&gt;
Impact of Cybercrime report.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Job projections for cybersecurity are staggering. The Bureau of Labor&lt;br /&gt;
Statistics in US predicts that careers in the cybersecurity field will&lt;br /&gt;
grow by 32% by 2028. That makes cybersecurity one of the top 10&lt;br /&gt;
fastest-growing jobs in the country. In the United States alone, jobs&lt;br /&gt;
for Information Security Analysts are expected to grow by 15% by&lt;br /&gt;
2024.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Most likely this trend is also similar in other countries.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When checking Estonian job portals, there is a constant need for&lt;br /&gt;
people for cyber security related positions. Also, linkedin search gives&lt;br /&gt;
approximately 30 vacancies immediately. There are banks, logistics&lt;br /&gt;
companies, e-shops, and software producers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://ee.linkedin.com/jobs/cyber-security-jobs?countryRedirected=1&amp;amp;amp;position=1&amp;amp;amp;pageNum=0&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Trends that affect companies create need for constant cyber security&lt;br /&gt;
services. Increasing number of home/remote offices require secure&lt;br /&gt;
corporate networks and security of remote devices. One example is from&lt;br /&gt;
this year, when sloppy remote desktop set-up paralyzed systems of 17&lt;br /&gt;
companies.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.aripaev.ee/uudised/2022/04/20/ria-lohakas-kaugtoolaua-seadistus-halvas-martsis-vahemalt-17-juhul-ettevotete-it-susteemid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Also, no service can exists without robust infrastructure - servers,&lt;br /&gt;
databases, applications. As all previously mentioned devices and&lt;br /&gt;
services are at constant scanning and surveillance. So, the breach&lt;br /&gt;
detection and immediate action demands 24/7 services. Even if lot of&lt;br /&gt;
things could be automated, there is a need for human specialists (at&lt;br /&gt;
least, at the moment). Third growing field is also a forensic&lt;br /&gt;
investigation, as every attack must be investigated in order to be ready&lt;br /&gt;
to repel next attacks. So data recovery and evidence collection is&lt;br /&gt;
another important field of work that need skilled and professional&lt;br /&gt;
workers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Even, if the specifics of the entity, be it CSIRT, CERT or SOC, are&lt;br /&gt;
different, the fundamentals of the work are the same. Professional&lt;br /&gt;
knowledge of the networks, operational systems, hardware, scripting, and&lt;br /&gt;
several other wider IT related knowledge is needed. As there is no&lt;br /&gt;
single way to reach to it, every single person can find one’s strongest&lt;br /&gt;
sides and develop them with knowledge of weaker side, in order to know,&lt;br /&gt;
when to as for help.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/body&amp;gt;&lt;br /&gt;
&amp;lt;/html&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mavald</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142176</id>
		<title>Hiring a Cyber Security Incident Analyst</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142176"/>
		<updated>2022-05-01T14:34:13Z</updated>

		<summary type="html">&lt;p&gt;Mavald: /* Digital forensics */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==A Cyber Security Incident Analyst==&lt;br /&gt;
&lt;br /&gt;
[[File:image1.png|600px|thumb|Job advertisement &amp;lt;ref&amp;gt;&amp;quot;Job Advertisement&amp;quot;. Available at https://www.projectpeople.com/jobs/&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
===Cyber security incident analyst in SOC/CSIRT/CERT===&lt;br /&gt;
This article delves into the job title of Cyber Security Incident&lt;br /&gt;
Analyst and provides an overview of the acronyms SOC/CSIRT/CERT. A brief&lt;br /&gt;
history of the job is discussed here, as well as a possible career path,&lt;br /&gt;
education, experience, and other characteristics required for work in&lt;br /&gt;
computer security-related organizations. The article also provides a&lt;br /&gt;
brief history of SOC/CSIRT/CERT, as well as a comparison of their&lt;br /&gt;
differences and similarities.&lt;br /&gt;
===Cyber Security Incident Analyst Skill Set===&lt;br /&gt;
What skill set is expected from the Cyber Security Incident Analyst? Below written lines are taken from the same job advertisement depicted&lt;br /&gt;
on the left side of this article:&lt;br /&gt;
As a Security Incident Analyst your responsibilities will include:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Continuous monitoring of security tooling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Performing regular and ad-hoc vulnerability assessments&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Carrying out ‘spot checks’&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Reporting vulnerabilities to the PVG via the alerts system&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintaining and documenting logging systems&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Developing centralized logging, reporting and intelligence&lt;br /&gt;
platforms&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;‘Light touch’ penetration testing with open source tooling&lt;br /&gt;
(Metasploit)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Knowledge &amp;amp;amp; Experience required:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;SOC, CSIRT or CERT operational environment experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Windows / Linux experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TCP /IP networking protocol knowledge&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience reviewing and analyzing Security Events from various&lt;br /&gt;
monitoring and logging sources&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience in website and web application security assessment or&lt;br /&gt;
penetration testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience of using Metasploit&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Scripting knowledge using BASH, Python, Perl, Ruby&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Skills in Host and Network Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
As one can see the description of the duties is wide and also the&lt;br /&gt;
knowledge and experience that is required is noteworthy. So, where to&lt;br /&gt;
start to find out the way to get this kind of knowledge and&lt;br /&gt;
expertize.&lt;br /&gt;
===Possible career path===&lt;br /&gt;
Next part of the paper is aiming to depict a possible ways, how to&lt;br /&gt;
develop oneself, and move along the career pathway in cybersecurity&lt;br /&gt;
field. Topics of development, education, experience and certification&lt;br /&gt;
are covered.&lt;br /&gt;
[[File:analystimage2.png|700px|thumb|Career path &amp;lt;ref&amp;gt;&amp;quot;Possible Career Path&amp;quot;. Available at https://www.cyberseek.org/pathway.html&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
===Junior/Senior===&lt;br /&gt;
Start with an entry-level job in IT. Hands-on experience is often the&lt;br /&gt;
most effective way to prepare for certification exams. Start&lt;br /&gt;
accumulating work experience with an entry-level role as a cybersecurity&lt;br /&gt;
analyst. Many cybersecurity professionals start off in more general IT&lt;br /&gt;
roles. The skills, practices, and technologies you’ll use as a&lt;br /&gt;
cybersecurity professional will continue to evolve along with computer&lt;br /&gt;
and network technology. The desire to learn, ability to problem solve,&lt;br /&gt;
and attention to detail will serve you well in this field. Other, more&lt;br /&gt;
technical skills and technologies to learn include:&amp;lt;ref name=&amp;quot;certification&amp;quot;&amp;gt;Popular Cyber Security Certificates [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications  [Accessed 25 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====SIEM tools (security information and event management)====&lt;br /&gt;
Security Information and Event Management (SIEM) is a set of tools&lt;br /&gt;
and services offering a holistic view of an organization’s information&lt;br /&gt;
security. SIEM works by combining two technologies:&lt;br /&gt;
&amp;lt;li&amp;gt;Security information management (SIM), which collects data from log&lt;br /&gt;
files for analysis and reports on security threats and events, and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;security event management (SEM), which conducts real-time system&lt;br /&gt;
monitoring, notifies network admins about important issues and&lt;br /&gt;
establishes correlations between security events. There are a number of&lt;br /&gt;
security information and event management solutions on the market.&lt;br /&gt;
ArcSight ESM, IBM QRadar and Splunk are among the most popular. &amp;lt;ref name=&amp;quot;SIEM&amp;quot;&amp;gt;Application security, SIEM [Online]. Available: https://www.imperva.com/learn/application-security/siem/. [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Firewalls, Intrusion Detection Systems (IDS), and Intrusion Prevention Systems(IPS)====&lt;br /&gt;
Firewalls can be two types, hardware and software firewalls. Software&lt;br /&gt;
firewall is a firewall that is installed on a computer or server, and&lt;br /&gt;
tasked with network security. It works with a wide variety of other&lt;br /&gt;
technology security solutions to provide more robust and cohesive&lt;br /&gt;
security for enterprises of all sizes. When a software firewall is&lt;br /&gt;
installed on a server, it opens up like an umbrella of protection over&lt;br /&gt;
all other computers connected to the network. It is able to monitor both&lt;br /&gt;
incoming and outgoing traffic for potential risk or suspicious user&lt;br /&gt;
behavior, and also makes setting security policies much easier, faster&lt;br /&gt;
and more flexible. Hardware firewall is positioned between the network&lt;br /&gt;
and devices, allowing traffic to funnel through the firewall for a close&lt;br /&gt;
inspection and analysis. A hardware firewall, a term often&lt;br /&gt;
interchangeable with network or next-generation firewall, protects the&lt;br /&gt;
network gateways for an enterprise. Hardware firewall is physical&lt;br /&gt;
hardware, installed between network elements and connected devices, and&lt;br /&gt;
is tasked with filtering traffic for cyber threat to the network or&lt;br /&gt;
devices. Filtering out unauthorized or suspicious users based on traffic&lt;br /&gt;
analysis is one of the biggest benefits of hardware firewall. &amp;lt;ref name=&amp;quot;sangfor&amp;quot;&amp;gt;Sangfor, &amp;quot;What is Software Firewall? Difference between Hardware Firewall and Software Firewall, [Online]. Available: https://www.sangfor.com/blog/cybersecurity/what-is-software-firewall-difference-between-hardware-firewall-and-software-firewall [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems&lt;br /&gt;
(IPS) are both parts of the network infrastructure. IDS/IPS compare&lt;br /&gt;
network packets to a cyberthreat database containing known signatures of&lt;br /&gt;
cyberattacks — and flag any matching packets. IDS doesn’t alter the&lt;br /&gt;
network packets in any way, whereas IPS prevents the packet from&lt;br /&gt;
delivery based on the contents of the packet, much like how a firewall&lt;br /&gt;
prevents traffic by IP address. &amp;lt;ref name=&amp;quot;Varonis&amp;quot;&amp;gt;Varonis, &amp;quot;What is Software Firewall? IDS vs. IPS: What is the Difference?, [Online]. Available: https://www.varonis.com/blog/ids-vs-ips [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Digital forensics====&lt;br /&gt;
Digital forensics is a branch of forensic science that focuses on&lt;br /&gt;
identifying, acquiring, processing, analyzing, and reporting on data&lt;br /&gt;
stored electronically. Electronic evidence is a component of almost all&lt;br /&gt;
criminal activities and digital forensics support is crucial for law&lt;br /&gt;
enforcement investigations. Electronic evidence can be collected from a&lt;br /&gt;
wide array of sources, such as computers, smartphones, remote storage,&lt;br /&gt;
unmanned aerial systems, shipborne equipment, and more.&amp;lt;ref name=&amp;quot;interpol&amp;quot;&amp;gt;Interpol, &amp;quot;Digital forensics&amp;quot;. Available: https://www.interpol.int/How-we-work/Innovation/Digital-forensics. [Accessed 28 4 2022].&amp;lt;/ref&amp;gt; &lt;br /&gt;
Investigative process of digital forensics can be divided into several stages. There are four major stages: preservation, collection,&lt;br /&gt;
examination, and analysis. All these four stages need a deep understanding of computers, technology across a broad spectrum, and cybersecurity principles and&lt;br /&gt;
practices, a working knowledge of computers, networks, and coding, in-depth investigative abilities, critical-thinking skills and analytical talent the ability to effectively communicate and work with a&lt;br /&gt;
wide range of people. &amp;lt;ref name=&amp;quot;ecpi&amp;quot;&amp;gt;&amp;quot;Digital forensics&amp;quot;. Available: https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me. [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Mobile device management====&lt;br /&gt;
Mobile device management (MDM) is software that allows IT&lt;br /&gt;
administrators to control, secure and enforce policies on smartphones,&lt;br /&gt;
tablets and other endpoints. Mobile device management software emerged&lt;br /&gt;
in the early 2000s as a way to control and secure the personal digital&lt;br /&gt;
assistants and smartphones that business workers began to use. The&lt;br /&gt;
consumer smartphone boom that started with the launch of the Apple&lt;br /&gt;
iPhone in 2007 led to the bring your own device (BYOD) trend, which&lt;br /&gt;
fueled further interest in MDM.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.techtarget.com/searchmobilecomputing/definition/mobile-device-management&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Data management====&lt;br /&gt;
Sometimes the data management is neglected, but this part has a&lt;br /&gt;
crucial role when learning for good cyber security practices. Majority&lt;br /&gt;
of cyber security programs include a special courses on data management.&lt;br /&gt;
Data management is a method of organizing and maintaining data processes&lt;br /&gt;
that are required in almost every business operations. The benefits of&lt;br /&gt;
data management can be found accounting, statistics, logistics planning&lt;br /&gt;
and other disciplines including corporate computing.&lt;br /&gt;
&amp;lt;p&amp;gt;https://globaluniversities.in/msc-data-management-cyber-security/&amp;lt;/p&amp;gt;&lt;br /&gt;
Data governance (and management) play a fundamental role in&lt;br /&gt;
protecting an organization’s data. Ensuring that the right people have&lt;br /&gt;
the right access and that appropriate security controls are in place to&lt;br /&gt;
protect each system or service, based on the criticality or sensitivity&lt;br /&gt;
of the data sets these contain.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://cybersecurity-magazine.com/the-role-of-data-governance-in-cybersecurity/?utm_source=rss&amp;amp;amp;utm_medium=rss&amp;amp;amp;utm_campaign=the-role-of-data-governance-in-cybersecurity&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Application security development====&lt;br /&gt;
Application security describes security measures at the application&lt;br /&gt;
level that aim to prevent data or code within the app from being stolen&lt;br /&gt;
or hijacked. It encompasses the security considerations that happen&lt;br /&gt;
during application development and design, but it also involves systems&lt;br /&gt;
and approaches to protect apps after they get deployed. Application&lt;br /&gt;
security may include hardware, software, and procedures that identify or&lt;br /&gt;
minimize security vulnerabilities.&lt;br /&gt;
https://www.vmware.com/topics/glossary/content/application-security.html&lt;br /&gt;
Application security development is important to ensure that your&lt;br /&gt;
application is free from coding errors and bugs. And controls the risk&lt;br /&gt;
and helps safeguard against security vulnerabilities. Application&lt;br /&gt;
security development is the process of making applications more secure&lt;br /&gt;
by finding and fixing security vulnerabilities. This is often done by&lt;br /&gt;
enforcing software security best practices and using application&lt;br /&gt;
security testing tools.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.perforce.com/blog/kw/application-security-development-best-practices&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Audit and compliance knowledge====&lt;br /&gt;
A cyber security audit is designed to be a comprehensive review and&lt;br /&gt;
analysis of your business’s IT infrastructure. It identifies threats and&lt;br /&gt;
vulnerabilities, exposing weaknesses and high-risk practices.&lt;br /&gt;
Regulations such as the EU GDPR (General Data Protection Regulation) can&lt;br /&gt;
impose hefty penalties in the event of a breach that results in&lt;br /&gt;
exploited data. A cyber security audit will help mitigate the&lt;br /&gt;
consequences of a breach and demonstrate that your organization has&lt;br /&gt;
taken the necessary steps to protect client and company data.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://cyforsecure.co.uk/services/cyber-assessment/cyber-security-audit/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Cybersecurity compliance is the organizational risk management method&lt;br /&gt;
aligned with pre-defined security measures &amp;amp;amp; controls on how data&lt;br /&gt;
confidentiality is ensured by its administrational procedures.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://nordlayer.com/blog/cybersecurity-compliance-everything-you-need-to-know/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;All needed skills are developed through courses and&lt;br /&gt;
certification.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
===Entry-Level Incident Response Positions===&lt;br /&gt;
&amp;lt;p&amp;gt;It is not always possible to advance to the position of incident&lt;br /&gt;
responder in a straight line. Many professionals advance from entry- to&lt;br /&gt;
mid-level positions before becoming a real incident responder or a&lt;br /&gt;
member of a computer emergency response team (CERT).&amp;lt;br /&amp;gt;&lt;br /&gt;
These are some examples:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;network-administrator&amp;quot;&amp;gt;Network administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;This position’s experience will help potential incident responders&lt;br /&gt;
develop networking skills. Attention to detail, as well as the ability&lt;br /&gt;
to sift through system configurations, site layouts, and general network&lt;br /&gt;
and communication setups, are essential in this field.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;system-administrator&amp;quot;&amp;gt;System administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Another crucial beginning point for an incident responder is to learn&lt;br /&gt;
how to manage resources inside your organization as well as user&lt;br /&gt;
behavior. Understanding the potential damage that users, inadequate&lt;br /&gt;
security setups, and ineffective IT policies and procedures can cause on&lt;br /&gt;
your network can provide prospective candidates with insight into the&lt;br /&gt;
human component of an incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;security-administrator&amp;quot;&amp;gt;Security administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In such a position, basic hacking skills, penetration testing, and&lt;br /&gt;
intrusion detection are all learned, which are crucial incident&lt;br /&gt;
responder skills when trying to replicate a breach or attack.&lt;br /&gt;
Understanding the paths a cybercriminal will take when attempting to&lt;br /&gt;
damage or obtain access to a system can greatly simplify the work of&lt;br /&gt;
reverse engineering the incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://resources.infosecinstitute.com/topic/incident-responder-career-roadmap-entry-level-executive/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3 id=&amp;quot;mid-level-incident-response-positions&amp;quot;&amp;gt;Mid-Level Incident&lt;br /&gt;
Response Positions&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5&lt;br /&gt;
id=&amp;quot;computer-security-incident-response-team-csirt-engineer&amp;quot;&amp;gt;Computer&lt;br /&gt;
security incident response team (CSIRT) engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;cyber-incident-responder&amp;quot;&amp;gt;Cyber incident responder&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-response-engineer&amp;quot;&amp;gt;Incident response&lt;br /&gt;
engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;While each of these positions is different, they generally require&lt;br /&gt;
very similar skills and characteristics in a candidate. At this level,&lt;br /&gt;
personal characteristics such as problem solving, time management, and&lt;br /&gt;
even presentation skills become more crucial as one’s career evolves&lt;br /&gt;
into a management-facing role.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Technical skills include the ability to identify and minimize threats&lt;br /&gt;
while maintaining communication with management and the rest of your&lt;br /&gt;
team. Data analysis and evidence gathering become increasingly crucial,&lt;br /&gt;
and the circumstances in which your services are deployed get more&lt;br /&gt;
serious.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Problem-solving skills are crucial at this level of incident&lt;br /&gt;
response, and as the stakes rise, so does the pressure in each&lt;br /&gt;
situation. At this level, programming abilities are essential since&lt;br /&gt;
incident responders may be needed to reverse engineer malicious code or&lt;br /&gt;
even create patches for vulnerable network applications or services.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.coursera.org/articles/popular-cybersecurity-certifications&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3 id=&amp;quot;senior-level-incident-response-positions&amp;quot;&amp;gt;Senior-Level Incident&lt;br /&gt;
Response Positions&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;intrusion-detection-specialist&amp;quot;&amp;gt;Intrusion detection&lt;br /&gt;
specialist:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;A CISSP certification might help a potential candidate in preparing&lt;br /&gt;
for the profession. The role of an intrusion detection specialist is to&lt;br /&gt;
find and stop any unwanted communications.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-manager&amp;quot;&amp;gt;Incident manager:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Expected to plan, oversee, manage, and supervise all incident&lt;br /&gt;
response team actions. Is in charge of reporting all current events to&lt;br /&gt;
senior management and stakeholders, as well as acting as the technical&lt;br /&gt;
lead on active incidents for incident responders. Prepares threat and&lt;br /&gt;
impact assessments and reports them known to management.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.coursera.org/articles/popular-cybersecurity-certifications&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Certificates== &lt;br /&gt;
There is a vast number of different certificates and the road map to&lt;br /&gt;
being a certified professional could be very different&amp;lt;ref name=&amp;quot;Coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated],&amp;quot; [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;NICCS&amp;quot;&amp;gt;NICCS, &amp;quot;Cybersecurity Certifications,&amp;quot; [Online]. Available: hhttps://niccs.cisa.gov/about-niccs/cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt; . One possible&lt;br /&gt;
approach is to start with basic certificates from the different branches&lt;br /&gt;
of service and move to more specific and demanding focused&lt;br /&gt;
certification. Also, some jobs require certain clearances, either from&lt;br /&gt;
industry, or from the government. One small selection of different&lt;br /&gt;
possible certificates is brought out in following paragraphs.&lt;br /&gt;
&lt;br /&gt;
Security+ is a CompTIA certification that is considered a basic cert&lt;br /&gt;
among cybersecurity professionals. It covers the topics of risk&lt;br /&gt;
management and threat assessment.&lt;br /&gt;
Network+ is also offered by CompTIA this certification (like the name&lt;br /&gt;
implies) focuses on networking infrastructure and operations. It is&lt;br /&gt;
considered a foundational certification.&lt;br /&gt;
The Certified Information Systems Security Professional (CISSP) is a&lt;br /&gt;
more advanced certification designed for cybersecurity professionals&lt;br /&gt;
with at least five years of work experience. The certification covers&lt;br /&gt;
topics such as architecture, engineering, and management.&amp;lt;/p&amp;gt;&lt;br /&gt;
The Certified Ethical Hacker (CEH) certification is also considered a&lt;br /&gt;
more advanced cert because it generally requires that applicants have&lt;br /&gt;
multiple years of work experience. The goal of an ethical hacker&lt;br /&gt;
certification is to be able to understand how cyber attacks unfold in&lt;br /&gt;
order to improve threat assessment and mitigation skills.&amp;lt;ref name=&amp;quot;cyberguide&amp;quot;&amp;gt;Cybersecurity Guide, &amp;quot;How to become a cybersecurity specialist&amp;quot;, [Online]. Available: https://cybersecurityguide.org/careers/security-specialist/. [Accessed 27 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
This is definitely not all, when one looks for more information, following link could be searched, to get more in depth knowledge about&lt;br /&gt;
different possibilities. Hereby, with the help of this matrix a possible taxonomy of different 436 listed certificates in branches are&lt;br /&gt;
presented.&amp;lt;ref name=&amp;quot;Pauljeremy&amp;quot;&amp;gt;&amp;quot;Cybersecurity Roadmap,&amp;quot; [Online]. Available: https://pauljerimy.com/2020/10/12/scr-oct-2020-update/. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:analystimage5.png|1000px|thumb|Certificate matrix &amp;lt;ref&amp;gt;&amp;quot;Certification roadmap&amp;quot;. Available at https://pauljerimy.com/security-certification-roadmap&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
=== Communication and Network Security===&lt;br /&gt;
Communication and network security covers the ability to secure&lt;br /&gt;
communication channels and networks. Topics include secure and converges&lt;br /&gt;
protocols, wireless networks, cellular networks, hardware operations&lt;br /&gt;
(warranty and redundant power), and third-party connectivity. IP&lt;br /&gt;
networking are also included in this domain.&lt;br /&gt;
===Identity and Access Management===&lt;br /&gt;
The identity and access management domain covers the attacks that&lt;br /&gt;
target the human gateway to gain access to data. Other topics include&lt;br /&gt;
ways to identify users with rights to access the information and&lt;br /&gt;
servers. Identity and access management covers the topics of&lt;br /&gt;
applications, Single sign-on authentication, privilege escalation,&lt;br /&gt;
Kerberos, rule-based or risk-based access control, proofing and&lt;br /&gt;
establishment of identity.&lt;br /&gt;
===Security Architecture and Engineering===&lt;br /&gt;
The security architecture and engineering domain covers important&lt;br /&gt;
topics concerning security engineering plans, designs and principles,&lt;br /&gt;
Topics include assessing and mitigating information system&lt;br /&gt;
vulnerabilities, fundamental concepts of security models and security&lt;br /&gt;
architectures in critical areas like access control. Cloud systems,&lt;br /&gt;
cryptography, system infiltrations (ransomware, fault-injection and&lt;br /&gt;
more) and virtualized systems are also covered in this domain.&lt;br /&gt;
===Asset Security===&lt;br /&gt;
The Asset Security domain deals with the issues related to the&lt;br /&gt;
collection, storage, maintenance, retention and destruction of data. It&lt;br /&gt;
also covers knowledge of different roles regarding data handling (owner,&lt;br /&gt;
controller and custodian) as well as data protection methods and data&lt;br /&gt;
states. Other topics include resource provision, asset classification&lt;br /&gt;
and data lifecycle management.&lt;br /&gt;
===Security and Risk Management===&lt;br /&gt;
The security and risk management domain covers general on skills&lt;br /&gt;
related to the implementation of user awareness programs as well as&lt;br /&gt;
security procedures. Emphasis is also placed on risk management&lt;br /&gt;
concerning the acquisition of new services, hardware and software&lt;br /&gt;
(supply chain). Other skills include social engineering defense&lt;br /&gt;
mechanisms.&lt;br /&gt;
===Security Assessment and Testing===&lt;br /&gt;
The security assessment and testing domain deals with all the&lt;br /&gt;
techniques and tools used to find system vulnerabilities, weaknesses and&lt;br /&gt;
potential areas of concern not addressed by security procedures and&lt;br /&gt;
policies. Attack simulations, vulnerability assessment, compliance&lt;br /&gt;
checks, and ethical disclosure also fall under this domain.&lt;br /&gt;
===Software Security===&lt;br /&gt;
The software development security domain deals with implementing&lt;br /&gt;
software-based security protocols within environment for which the IT&lt;br /&gt;
professional is responsible. Risk analysis, vulnerability identification&lt;br /&gt;
and auditing of source codes are all covered in this subset. Additional&lt;br /&gt;
topics include software-designed security, maturity models, development&lt;br /&gt;
methodologies, open-source and third-party development security.&lt;br /&gt;
===Security operations===&lt;br /&gt;
The security operations domain covers topics ranging from&lt;br /&gt;
investigations and digital forensic to detection and intrusion&lt;br /&gt;
prevention tools, sandboxing and firewalls. Topics include user and&lt;br /&gt;
entity behavior analytics, threat intelligence (threat hunting and&lt;br /&gt;
threat feeds) log management, artifacts (mobile, computer and network),&lt;br /&gt;
machine learning and AI-based tools, penetration testing, and&lt;br /&gt;
exploitation development. These for sub-domains are lister here.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Incident Handling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Penetration Testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Exploitation&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Education==&lt;br /&gt;
&amp;lt;p&amp;gt;The entry level monitoring specialist is hired by Estonian&lt;br /&gt;
Information System Authority even if there is no formal IT education,&lt;br /&gt;
but readiness to learn and moderate knowledge of different operation&lt;br /&gt;
systems is enough to start the career.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.cv.ee/en/vacancy/792782/riigi-infosusteemi-amet/seirespetsialist-tule-eesti-kuberruumi-valvuriks&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Nevertheless, like most other high qualification careers jobs falling&lt;br /&gt;
under the cybersecurity specialist category require some form of formal&lt;br /&gt;
education. However, since cybersecurity specialist jobs can fall across&lt;br /&gt;
a wide spectrum of job descriptions and responsibilities, it is possible&lt;br /&gt;
to obtain a specialist job after completing many levels of different&lt;br /&gt;
computer related education.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;If one is looking for a cybersecurity related education, for example&lt;br /&gt;
in EU, 137 courses/programs could be found that relate to keyword IT or&lt;br /&gt;
cybersecurity.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.enisa.europa.eu/topics/cybersecurity-education/education-map/education-courses&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Also, there is a great amount of discussion, if cuber security&lt;br /&gt;
professional should have a degree or would be certification just enough.&lt;br /&gt;
One interesting table is produces by Franklin University that compares&lt;br /&gt;
benefits and/or drawbacks of each type of credential.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image11.png&amp;quot; alt=&amp;quot;Comparison MSc vs certificate&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;Comparison MSc vs&lt;br /&gt;
certificate&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Certifications are generally good for people with little practical&lt;br /&gt;
experience because they are known quantities in the industry and can&lt;br /&gt;
help you get your foot in the door. They set a minimum knowledge bar.&lt;br /&gt;
But some certifications are viewed more favorably than others.&lt;br /&gt;
Certifications with renewal requirements are viewed better by hiring&lt;br /&gt;
managers, but they also more costly in the long run because of the need&lt;br /&gt;
for continuing education. Certifications are also good for showing&lt;br /&gt;
in-depth expertise in a specialization within cybersecurity. Depending&lt;br /&gt;
on your career goals, it may be advantageous to have a master’s&lt;br /&gt;
degree—which shows your breadth of knowledge, critical thinking and&lt;br /&gt;
leadership skills—and a certificate—which shows specific skill&lt;br /&gt;
competency.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;As IT (Cyber) Security is still a relatively young discipline,&lt;br /&gt;
universities and colleges are still figuring out which is the best&lt;br /&gt;
approach for their degrees. Study programmes and curricula in Cyber&lt;br /&gt;
Security are different. In general, here are the duration of Cyber&lt;br /&gt;
Security degrees:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Bachelor’s degrees in Cyber Security take 3 or 4 years in most&lt;br /&gt;
countries.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Master’s courses in Cyber Security take between 1-2 years to&lt;br /&gt;
complete.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;PhD programmes in Cyber Security last 3-5 years. Some only take 1&lt;br /&gt;
or 2 years, but they are less common.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Generalization could me made that on bachelor level the general&lt;br /&gt;
knowledge about the cyber issues are obtained. On master level the&lt;br /&gt;
specialization courses are taken and the person can choose more specific&lt;br /&gt;
topics to study. It is on master level where strengths of the cyber&lt;br /&gt;
specialist can be developed further and up-do date knowledge obtained in&lt;br /&gt;
specifics. PhD is serious science and involves teaching, lot of&lt;br /&gt;
scientific work and writing for publications.&amp;lt;/p&amp;gt;&lt;br /&gt;
==Salary==&lt;br /&gt;
&amp;lt;p&amp;gt;Even if the salary can be very different, compared to the skills and&lt;br /&gt;
experience, an generalization can be made. Cyber Security professionals&lt;br /&gt;
in CSIRT, and in other entities earn quite well, from the start. First,&lt;br /&gt;
some comparison from the United States. The average CSIRT analyst salary&lt;br /&gt;
in the USA is $97,500 per year or $50 per hour. Entry level positions&lt;br /&gt;
start at $48,875 per year while most experienced workers make up to&lt;br /&gt;
$135,373 per year.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.talent.com/salary?job=csirt+analyst&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;There are multiple positions you can occupy in this field. They have&lt;br /&gt;
in common great salaries and high demand for technical skills, attention&lt;br /&gt;
to details, problem-solving mentality, and the ability to analyze risks.&lt;br /&gt;
Here are the average annual salaries in the United States, according to&lt;br /&gt;
Payscale:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.payscale.com/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Cryptographer – 100,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Information Security Officer – 91,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Assessor – 90,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Engineer – 88,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Penetration Tester – 81,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Forensics Expert – 71,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Administrator – 65,000 USD&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When looking into salaries in Estonia, one can find that there is a&lt;br /&gt;
discussion that private sector is taking a toll from the public sector,&lt;br /&gt;
and that the salaries in important agencies, as Information System&lt;br /&gt;
Authority loose their employees to the better paid positions in private&lt;br /&gt;
sector.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://digi.geenius.ee/rubriik/uudis/kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad/&lt;br /&gt;
https://tehnika.postimees.ee/6887428/riigi-it-tootajate-palgamaarad-kasvasid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;But there is also a different view that average private sector worker&lt;br /&gt;
could be hired as a top specialist in public sector and then the payment&lt;br /&gt;
is higher. Nevertheless, it seems that the average payment in cyber&lt;br /&gt;
security sector is any way higher that in other parts of the&lt;br /&gt;
e-services.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://digi.geenius.ee/rubriik/uudis/5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka/&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
==SOC==&lt;br /&gt;
&amp;lt;p&amp;gt;A SOC is a facility where an organization’s network, applications,&lt;br /&gt;
and endpoints are monitored and defended. The term was adapted from&lt;br /&gt;
network operations centers (NOCs), where large telecommunication or&lt;br /&gt;
corporate networks are monitored. When network security became more of a&lt;br /&gt;
concern, security teams were formed within the NOCs, and eventually spun&lt;br /&gt;
off into larger organizations of their own as the responsibilities of&lt;br /&gt;
security teams grew increasingly complex and specialized. The security&lt;br /&gt;
staff working in a security operations center are often called the SOC&lt;br /&gt;
team.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Functions of the SOC team include, but are not limited to:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ol type=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Taking inventory of resources, to get a better understanding of the&lt;br /&gt;
structure they are protecting.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintanence of the system, by constantly making updates and adding&lt;br /&gt;
safeguards.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Monitoring the network for abnormalities with special tools.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Threat analysis of new attacks and vulnerabilities.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Responding to attacks, by acting as “first responders”. The SOC team&lt;br /&gt;
will shut down and/or isolate endpoints, deleting files and lowering the&lt;br /&gt;
impact as fast as possible.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Recovery of system stability and lost data. This may be done using&lt;br /&gt;
backups, restarting endpoints or reconfiguring systems.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Logging all actions on the system, to be later used for analysis or&lt;br /&gt;
forensics after an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigating the root cause of an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Auditing their own actions, to be in line with regulations of the&lt;br /&gt;
organization, industry or governing body.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.trellix.com/en-us/security-awareness/operations/what-is-soc.html&amp;lt;/p&amp;gt;&lt;br /&gt;
==CSIRT==&lt;br /&gt;
&amp;lt;p&amp;gt;A CSIRT is a group that responds to security incidents when they&lt;br /&gt;
occur. Key responsibilities of a CSIRT include:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
===Creating and maintaining an incident response plan (IRP)===&lt;br /&gt;
An incident response plan (IRP) is a set of written instructions for&lt;br /&gt;
detecting, responding to and limiting the effects of an information&lt;br /&gt;
security event. Incident response plans provide instructions for&lt;br /&gt;
responding to many potential scenarios, including data breaches, denial&lt;br /&gt;
of service/distributed denial of service attacks, firewall breaches,&lt;br /&gt;
virus or malware outbreaks or insider threats. Without an incident&lt;br /&gt;
response plan in place, organizations may either not detect the attack&lt;br /&gt;
in the first place, or not follow proper protocol to contain the threat&lt;br /&gt;
and recover from it when a breach is detected.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.stratacore.com/incidentresponseplan&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
===Investigating and analyzing incidents===&lt;br /&gt;
CSIRTs are also involved in improvement activities. After major&lt;br /&gt;
computer security incidents occur, or when incidents are not handled in&lt;br /&gt;
a timely or effective manner, a CSIRT will generally perform a&lt;br /&gt;
postmortem of the incident and its response. This postmortem will&lt;br /&gt;
identify the strengths and weakness of the response effort. Such reviews&lt;br /&gt;
can identify weaknesses and holes in systems, infrastructure defenses,&lt;br /&gt;
or policies that allowed the incident to take place. It can also&lt;br /&gt;
identify problems with communication channels, interfaces, and&lt;br /&gt;
procedures that inhibited the efficient resolution of the reported&lt;br /&gt;
problem.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.cisa.gov/uscert/bsi/articles/best-practices/incident-management/defining-computer-security-incident-response-teams&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Managing internal communications and updates during or immediately after incidents occur===&lt;br /&gt;
===Communicating with employees, shareholders, customers, and the press about incidents as needed===&lt;br /&gt;
&amp;lt;p&amp;gt;There are various services within the CSIRT Services Framework that&lt;br /&gt;
address communications, as they relate to security operations and&lt;br /&gt;
incident response services. Some of these include Information Security&lt;br /&gt;
Incident Coordination, Crisis Management Support, Vulnerability&lt;br /&gt;
Disclosure, Situational Awareness Communication, and Awareness Building,&lt;br /&gt;
to name a few. Sharing information and communicating with the general&lt;br /&gt;
public and/or your constituency is appropriate in many different&lt;br /&gt;
scenarios. These can range from proactive communications to reactive&lt;br /&gt;
communications. Each scenario may be unique, and careful consideration&lt;br /&gt;
should be given to when to release information to the public and what&lt;br /&gt;
information should be released.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;https://resources.sei.cmu.edu/asset_files/Handbook/2021_002_001_651819.pdf&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Remediating incidents===&lt;br /&gt;
&amp;lt;p&amp;gt;Threat remediation is a strong and capable tool for fighting the&lt;br /&gt;
cyber security compromises. As the word ‘remedy’ suggests, remediation&lt;br /&gt;
process involves the treatment of a security breach. With the&lt;br /&gt;
remediation practices, your cyber security team is able to eliminate&lt;br /&gt;
suspicious activities and malicious attacks in the form of malware,&lt;br /&gt;
ransomware, phishing and such. Even if you ‘kill’ the suspicious&lt;br /&gt;
activity, the attackers can remain in your systems. If you want to&lt;br /&gt;
contaminate and end the problem for good, your remediation processes&lt;br /&gt;
must involve the detection of the cause.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.logsign.com/blog/what-is-remediation-in-cyber-security/&amp;lt;/p&amp;gt;&lt;br /&gt;
=== Recommending technology, policy, governance, and training changes after security&lt;br /&gt;
incidents===&lt;br /&gt;
&amp;lt;p&amp;gt;After all these actions, the SCIRT must contribute to the development&lt;br /&gt;
of better policies, practices and has to recommend improvements. They&lt;br /&gt;
are not working in the vacuum and their work has to create new and&lt;br /&gt;
better standards for cyber security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
==CERT==&lt;br /&gt;
&amp;lt;p&amp;gt;The term “computer emergency response team” was coined in 1988. In&lt;br /&gt;
response to the Morris worm attack that impacted thousands of servers on&lt;br /&gt;
the Internet, DARPA funded the formation of the Computer Emergency&lt;br /&gt;
Response Team Coordination Center (CERT-CC) at Carnegie Mellon&lt;br /&gt;
University. The goal of CERT-CC was to help protect the internet by&lt;br /&gt;
collecting and disseminating information on critical security&lt;br /&gt;
vulnerabilities. Several other countries formed similar centers using&lt;br /&gt;
the same acronym (despite threats of legal action by Carnegie Mellon for&lt;br /&gt;
trademark infringement). Now the term CERT refers to any emergency&lt;br /&gt;
response team that deals with cyber threats. Many people use CERT-CC&lt;br /&gt;
interchangeably with CSIRT, though the charter of a CERT is information&lt;br /&gt;
sharing in order to help other response teams respond to threats against&lt;br /&gt;
their own infrastructure.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In general, the designation of CERT is helpful in applying real-world&lt;br /&gt;
solutions to various cybersecurity problems. They may be government&lt;br /&gt;
contractors or employees of a major corporation. For example, the U.S.&lt;br /&gt;
Computer Emergency Readiness Team (US-CERT) operates under the U.S.&lt;br /&gt;
Department of Homeland Security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.techopedia.com/definition/31003/computer-emergency-response-team-cert&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In Estonia CERT is designated as CERT-EE. It was established in 2006,&lt;br /&gt;
as an organization responsible for the management of security incidents&lt;br /&gt;
in .ee computer networks. It is also a national contact point for&lt;br /&gt;
international co-operation in the field of IT security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ria.ee/en/cyber-security/cert-ee.html&amp;lt;/p&amp;gt;&lt;br /&gt;
===Difference between SOC/CSIRT/CERT===&lt;br /&gt;
&amp;lt;p&amp;gt;How CSIRTs differ from CERTs and SOCs There are overlapping&lt;br /&gt;
responsibilities between a community emergency response team (CERT),&lt;br /&gt;
computer security incident response team (CSIRT), and security&lt;br /&gt;
operations center (SOC). To add to this confusion, frequently, the terms&lt;br /&gt;
CERT and CSIRT are used interchangeably, despite the important&lt;br /&gt;
differences.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image3.png&amp;quot; alt=&amp;quot;Overlapping in images/image3.png&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;Overlapping in&lt;br /&gt;
images/image3.png&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
==Understand the primary roles and characteristics of a CERT, CSIRT, and SOC.==&lt;br /&gt;
&amp;lt;p&amp;gt;So, using strict definitions, a CERT collects and disseminates&lt;br /&gt;
security information, typically for the benefit of a country or an&lt;br /&gt;
industry. A CSIRT is a cross-functional team that responds to incidents&lt;br /&gt;
on behalf of a country or an organization. A SOC is where a country or&lt;br /&gt;
organization monitors and defends its network, servers, applications,&lt;br /&gt;
and endpoints.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image4.png&amp;quot; alt=&amp;quot;table of explanation images/image4&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;table of explanation&lt;br /&gt;
images/image4&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
==Future==&lt;br /&gt;
&amp;lt;p&amp;gt;And the Cyber security problem is only getting bigger. According to a&lt;br /&gt;
report published by Accenture, the number of cyber security breaches&lt;br /&gt;
increased by 11 percent from 2017 to 2018. The cost of such breaches is&lt;br /&gt;
astronomical–about $600 billion worldwide, according to the Economic&lt;br /&gt;
Impact of Cybercrime report.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Job projections for cybersecurity are staggering. The Bureau of Labor&lt;br /&gt;
Statistics in US predicts that careers in the cybersecurity field will&lt;br /&gt;
grow by 32% by 2028. That makes cybersecurity one of the top 10&lt;br /&gt;
fastest-growing jobs in the country. In the United States alone, jobs&lt;br /&gt;
for Information Security Analysts are expected to grow by 15% by&lt;br /&gt;
2024.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Most likely this trend is also similar in other countries.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When checking Estonian job portals, there is a constant need for&lt;br /&gt;
people for cyber security related positions. Also, linkedin search gives&lt;br /&gt;
approximately 30 vacancies immediately. There are banks, logistics&lt;br /&gt;
companies, e-shops, and software producers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://ee.linkedin.com/jobs/cyber-security-jobs?countryRedirected=1&amp;amp;amp;position=1&amp;amp;amp;pageNum=0&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Trends that affect companies create need for constant cyber security&lt;br /&gt;
services. Increasing number of home/remote offices require secure&lt;br /&gt;
corporate networks and security of remote devices. One example is from&lt;br /&gt;
this year, when sloppy remote desktop set-up paralyzed systems of 17&lt;br /&gt;
companies.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.aripaev.ee/uudised/2022/04/20/ria-lohakas-kaugtoolaua-seadistus-halvas-martsis-vahemalt-17-juhul-ettevotete-it-susteemid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Also, no service can exists without robust infrastructure - servers,&lt;br /&gt;
databases, applications. As all previously mentioned devices and&lt;br /&gt;
services are at constant scanning and surveillance. So, the breach&lt;br /&gt;
detection and immediate action demands 24/7 services. Even if lot of&lt;br /&gt;
things could be automated, there is a need for human specialists (at&lt;br /&gt;
least, at the moment). Third growing field is also a forensic&lt;br /&gt;
investigation, as every attack must be investigated in order to be ready&lt;br /&gt;
to repel next attacks. So data recovery and evidence collection is&lt;br /&gt;
another important field of work that need skilled and professional&lt;br /&gt;
workers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Even, if the specifics of the entity, be it CSIRT, CERT or SOC, are&lt;br /&gt;
different, the fundamentals of the work are the same. Professional&lt;br /&gt;
knowledge of the networks, operational systems, hardware, scripting, and&lt;br /&gt;
several other wider IT related knowledge is needed. As there is no&lt;br /&gt;
single way to reach to it, every single person can find one’s strongest&lt;br /&gt;
sides and develop them with knowledge of weaker side, in order to know,&lt;br /&gt;
when to as for help.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/body&amp;gt;&lt;br /&gt;
&amp;lt;/html&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mavald</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=File:Image11.png&amp;diff=142172</id>
		<title>File:Image11.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=File:Image11.png&amp;diff=142172"/>
		<updated>2022-05-01T14:27:22Z</updated>

		<summary type="html">&lt;p&gt;Mavald: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Mavald</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=File:Analystimage3.png&amp;diff=142171</id>
		<title>File:Analystimage3.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=File:Analystimage3.png&amp;diff=142171"/>
		<updated>2022-05-01T14:27:02Z</updated>

		<summary type="html">&lt;p&gt;Mavald: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Mavald</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=File:Analystimage4.png&amp;diff=142170</id>
		<title>File:Analystimage4.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=File:Analystimage4.png&amp;diff=142170"/>
		<updated>2022-05-01T14:26:45Z</updated>

		<summary type="html">&lt;p&gt;Mavald: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Mavald</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142169</id>
		<title>Hiring a Cyber Security Incident Analyst</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142169"/>
		<updated>2022-05-01T14:20:49Z</updated>

		<summary type="html">&lt;p&gt;Mavald: /* Certificates */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==A Cyber Security Incident Analyst==&lt;br /&gt;
&lt;br /&gt;
[[File:image1.png|600px|thumb|Job advertisement &amp;lt;ref&amp;gt;&amp;quot;Job Advertisement&amp;quot;. Available at https://www.projectpeople.com/jobs/&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
===Cyber security incident analyst in SOC/CSIRT/CERT===&lt;br /&gt;
This article delves into the job title of Cyber Security Incident&lt;br /&gt;
Analyst and provides an overview of the acronyms SOC/CSIRT/CERT. A brief&lt;br /&gt;
history of the job is discussed here, as well as a possible career path,&lt;br /&gt;
education, experience, and other characteristics required for work in&lt;br /&gt;
computer security-related organizations. The article also provides a&lt;br /&gt;
brief history of SOC/CSIRT/CERT, as well as a comparison of their&lt;br /&gt;
differences and similarities.&lt;br /&gt;
===Cyber Security Incident Analyst Skill Set===&lt;br /&gt;
What skill set is expected from the Cyber Security Incident Analyst? Below written lines are taken from the same job advertisement depicted&lt;br /&gt;
on the left side of this article:&lt;br /&gt;
As a Security Incident Analyst your responsibilities will include:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Continuous monitoring of security tooling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Performing regular and ad-hoc vulnerability assessments&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Carrying out ‘spot checks’&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Reporting vulnerabilities to the PVG via the alerts system&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintaining and documenting logging systems&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Developing centralized logging, reporting and intelligence&lt;br /&gt;
platforms&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;‘Light touch’ penetration testing with open source tooling&lt;br /&gt;
(Metasploit)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Knowledge &amp;amp;amp; Experience required:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;SOC, CSIRT or CERT operational environment experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Windows / Linux experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TCP /IP networking protocol knowledge&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience reviewing and analyzing Security Events from various&lt;br /&gt;
monitoring and logging sources&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience in website and web application security assessment or&lt;br /&gt;
penetration testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience of using Metasploit&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Scripting knowledge using BASH, Python, Perl, Ruby&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Skills in Host and Network Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
As one can see the description of the duties is wide and also the&lt;br /&gt;
knowledge and experience that is required is noteworthy. So, where to&lt;br /&gt;
start to find out the way to get this kind of knowledge and&lt;br /&gt;
expertize.&lt;br /&gt;
===Possible career path===&lt;br /&gt;
Next part of the paper is aiming to depict a possible ways, how to&lt;br /&gt;
develop oneself, and move along the career pathway in cybersecurity&lt;br /&gt;
field. Topics of development, education, experience and certification&lt;br /&gt;
are covered.&lt;br /&gt;
[[File:analystimage2.png|700px|thumb|Career path &amp;lt;ref&amp;gt;&amp;quot;Possible Career Path&amp;quot;. Available at https://www.cyberseek.org/pathway.html&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
===Junior/Senior===&lt;br /&gt;
Start with an entry-level job in IT. Hands-on experience is often the&lt;br /&gt;
most effective way to prepare for certification exams. Start&lt;br /&gt;
accumulating work experience with an entry-level role as a cybersecurity&lt;br /&gt;
analyst. Many cybersecurity professionals start off in more general IT&lt;br /&gt;
roles. The skills, practices, and technologies you’ll use as a&lt;br /&gt;
cybersecurity professional will continue to evolve along with computer&lt;br /&gt;
and network technology. The desire to learn, ability to problem solve,&lt;br /&gt;
and attention to detail will serve you well in this field. Other, more&lt;br /&gt;
technical skills and technologies to learn include:&amp;lt;ref name=&amp;quot;certification&amp;quot;&amp;gt;Popular Cyber Security Certificates [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications  [Accessed 25 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====SIEM tools (security information and event management)====&lt;br /&gt;
Security Information and Event Management (SIEM) is a set of tools&lt;br /&gt;
and services offering a holistic view of an organization’s information&lt;br /&gt;
security. SIEM works by combining two technologies:&lt;br /&gt;
&amp;lt;li&amp;gt;Security information management (SIM), which collects data from log&lt;br /&gt;
files for analysis and reports on security threats and events, and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;security event management (SEM), which conducts real-time system&lt;br /&gt;
monitoring, notifies network admins about important issues and&lt;br /&gt;
establishes correlations between security events. There are a number of&lt;br /&gt;
security information and event management solutions on the market.&lt;br /&gt;
ArcSight ESM, IBM QRadar and Splunk are among the most popular. &amp;lt;ref name=&amp;quot;SIEM&amp;quot;&amp;gt;Application security, SIEM [Online]. Available: https://www.imperva.com/learn/application-security/siem/. [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Firewalls, Intrusion Detection Systems (IDS), and Intrusion Prevention Systems(IPS)====&lt;br /&gt;
Firewalls can be two types, hardware and software firewalls. Software&lt;br /&gt;
firewall is a firewall that is installed on a computer or server, and&lt;br /&gt;
tasked with network security. It works with a wide variety of other&lt;br /&gt;
technology security solutions to provide more robust and cohesive&lt;br /&gt;
security for enterprises of all sizes. When a software firewall is&lt;br /&gt;
installed on a server, it opens up like an umbrella of protection over&lt;br /&gt;
all other computers connected to the network. It is able to monitor both&lt;br /&gt;
incoming and outgoing traffic for potential risk or suspicious user&lt;br /&gt;
behavior, and also makes setting security policies much easier, faster&lt;br /&gt;
and more flexible. Hardware firewall is positioned between the network&lt;br /&gt;
and devices, allowing traffic to funnel through the firewall for a close&lt;br /&gt;
inspection and analysis. A hardware firewall, a term often&lt;br /&gt;
interchangeable with network or next-generation firewall, protects the&lt;br /&gt;
network gateways for an enterprise. Hardware firewall is physical&lt;br /&gt;
hardware, installed between network elements and connected devices, and&lt;br /&gt;
is tasked with filtering traffic for cyber threat to the network or&lt;br /&gt;
devices. Filtering out unauthorized or suspicious users based on traffic&lt;br /&gt;
analysis is one of the biggest benefits of hardware firewall. &amp;lt;ref name=&amp;quot;sangfor&amp;quot;&amp;gt;Sangfor, &amp;quot;What is Software Firewall? Difference between Hardware Firewall and Software Firewall, [Online]. Available: https://www.sangfor.com/blog/cybersecurity/what-is-software-firewall-difference-between-hardware-firewall-and-software-firewall [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems&lt;br /&gt;
(IPS) are both parts of the network infrastructure. IDS/IPS compare&lt;br /&gt;
network packets to a cyberthreat database containing known signatures of&lt;br /&gt;
cyberattacks — and flag any matching packets. IDS doesn’t alter the&lt;br /&gt;
network packets in any way, whereas IPS prevents the packet from&lt;br /&gt;
delivery based on the contents of the packet, much like how a firewall&lt;br /&gt;
prevents traffic by IP address. &amp;lt;ref name=&amp;quot;Varonis&amp;quot;&amp;gt;Varonis, &amp;quot;What is Software Firewall? IDS vs. IPS: What is the Difference?, [Online]. Available: https://www.varonis.com/blog/ids-vs-ips [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Digital forensics====&lt;br /&gt;
&amp;lt;p&amp;gt;Digital forensics is a branch of forensic science that focuses on&lt;br /&gt;
identifying, acquiring, processing, analyzing, and reporting on data&lt;br /&gt;
stored electronically. Electronic evidence is a component of almost all&lt;br /&gt;
criminal activities and digital forensics support is crucial for law&lt;br /&gt;
enforcement investigations. Electronic evidence can be collected from a&lt;br /&gt;
wide array of sources, such as computers, smartphones, remote storage,&lt;br /&gt;
unmanned aerial systems, shipborne equipment, and more.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.interpol.int/How-we-work/Innovation/Digital-forensics&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Investigative process of digital forensics can be divided into&lt;br /&gt;
several stages. There are four major stages: preservation, collection,&lt;br /&gt;
examination, and analysis.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.258.7882&amp;amp;amp;rep=rep1&amp;amp;amp;type=pdf&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;All these four stages need a deep understanding of computers,&lt;br /&gt;
technology across a broad spectrum, and cybersecurity principles and&lt;br /&gt;
practices, a working knowledge of computers, networks, and coding,&lt;br /&gt;
in-depth investigative abilities, critical-thinking skills and&lt;br /&gt;
analytical talent the ability to effectively communicate and work with a&lt;br /&gt;
wide range of people.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Mobile device management====&lt;br /&gt;
Mobile device management (MDM) is software that allows IT&lt;br /&gt;
administrators to control, secure and enforce policies on smartphones,&lt;br /&gt;
tablets and other endpoints. Mobile device management software emerged&lt;br /&gt;
in the early 2000s as a way to control and secure the personal digital&lt;br /&gt;
assistants and smartphones that business workers began to use. The&lt;br /&gt;
consumer smartphone boom that started with the launch of the Apple&lt;br /&gt;
iPhone in 2007 led to the bring your own device (BYOD) trend, which&lt;br /&gt;
fueled further interest in MDM.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.techtarget.com/searchmobilecomputing/definition/mobile-device-management&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Data management====&lt;br /&gt;
Sometimes the data management is neglected, but this part has a&lt;br /&gt;
crucial role when learning for good cyber security practices. Majority&lt;br /&gt;
of cyber security programs include a special courses on data management.&lt;br /&gt;
Data management is a method of organizing and maintaining data processes&lt;br /&gt;
that are required in almost every business operations. The benefits of&lt;br /&gt;
data management can be found accounting, statistics, logistics planning&lt;br /&gt;
and other disciplines including corporate computing.&lt;br /&gt;
&amp;lt;p&amp;gt;https://globaluniversities.in/msc-data-management-cyber-security/&amp;lt;/p&amp;gt;&lt;br /&gt;
Data governance (and management) play a fundamental role in&lt;br /&gt;
protecting an organization’s data. Ensuring that the right people have&lt;br /&gt;
the right access and that appropriate security controls are in place to&lt;br /&gt;
protect each system or service, based on the criticality or sensitivity&lt;br /&gt;
of the data sets these contain.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://cybersecurity-magazine.com/the-role-of-data-governance-in-cybersecurity/?utm_source=rss&amp;amp;amp;utm_medium=rss&amp;amp;amp;utm_campaign=the-role-of-data-governance-in-cybersecurity&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Application security development====&lt;br /&gt;
Application security describes security measures at the application&lt;br /&gt;
level that aim to prevent data or code within the app from being stolen&lt;br /&gt;
or hijacked. It encompasses the security considerations that happen&lt;br /&gt;
during application development and design, but it also involves systems&lt;br /&gt;
and approaches to protect apps after they get deployed. Application&lt;br /&gt;
security may include hardware, software, and procedures that identify or&lt;br /&gt;
minimize security vulnerabilities.&lt;br /&gt;
https://www.vmware.com/topics/glossary/content/application-security.html&lt;br /&gt;
Application security development is important to ensure that your&lt;br /&gt;
application is free from coding errors and bugs. And controls the risk&lt;br /&gt;
and helps safeguard against security vulnerabilities. Application&lt;br /&gt;
security development is the process of making applications more secure&lt;br /&gt;
by finding and fixing security vulnerabilities. This is often done by&lt;br /&gt;
enforcing software security best practices and using application&lt;br /&gt;
security testing tools.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.perforce.com/blog/kw/application-security-development-best-practices&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Audit and compliance knowledge====&lt;br /&gt;
A cyber security audit is designed to be a comprehensive review and&lt;br /&gt;
analysis of your business’s IT infrastructure. It identifies threats and&lt;br /&gt;
vulnerabilities, exposing weaknesses and high-risk practices.&lt;br /&gt;
Regulations such as the EU GDPR (General Data Protection Regulation) can&lt;br /&gt;
impose hefty penalties in the event of a breach that results in&lt;br /&gt;
exploited data. A cyber security audit will help mitigate the&lt;br /&gt;
consequences of a breach and demonstrate that your organization has&lt;br /&gt;
taken the necessary steps to protect client and company data.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://cyforsecure.co.uk/services/cyber-assessment/cyber-security-audit/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Cybersecurity compliance is the organizational risk management method&lt;br /&gt;
aligned with pre-defined security measures &amp;amp;amp; controls on how data&lt;br /&gt;
confidentiality is ensured by its administrational procedures.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://nordlayer.com/blog/cybersecurity-compliance-everything-you-need-to-know/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;All needed skills are developed through courses and&lt;br /&gt;
certification.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
===Entry-Level Incident Response Positions===&lt;br /&gt;
&amp;lt;p&amp;gt;It is not always possible to advance to the position of incident&lt;br /&gt;
responder in a straight line. Many professionals advance from entry- to&lt;br /&gt;
mid-level positions before becoming a real incident responder or a&lt;br /&gt;
member of a computer emergency response team (CERT).&amp;lt;br /&amp;gt;&lt;br /&gt;
These are some examples:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;network-administrator&amp;quot;&amp;gt;Network administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;This position’s experience will help potential incident responders&lt;br /&gt;
develop networking skills. Attention to detail, as well as the ability&lt;br /&gt;
to sift through system configurations, site layouts, and general network&lt;br /&gt;
and communication setups, are essential in this field.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;system-administrator&amp;quot;&amp;gt;System administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Another crucial beginning point for an incident responder is to learn&lt;br /&gt;
how to manage resources inside your organization as well as user&lt;br /&gt;
behavior. Understanding the potential damage that users, inadequate&lt;br /&gt;
security setups, and ineffective IT policies and procedures can cause on&lt;br /&gt;
your network can provide prospective candidates with insight into the&lt;br /&gt;
human component of an incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;security-administrator&amp;quot;&amp;gt;Security administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In such a position, basic hacking skills, penetration testing, and&lt;br /&gt;
intrusion detection are all learned, which are crucial incident&lt;br /&gt;
responder skills when trying to replicate a breach or attack.&lt;br /&gt;
Understanding the paths a cybercriminal will take when attempting to&lt;br /&gt;
damage or obtain access to a system can greatly simplify the work of&lt;br /&gt;
reverse engineering the incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://resources.infosecinstitute.com/topic/incident-responder-career-roadmap-entry-level-executive/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3 id=&amp;quot;mid-level-incident-response-positions&amp;quot;&amp;gt;Mid-Level Incident&lt;br /&gt;
Response Positions&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5&lt;br /&gt;
id=&amp;quot;computer-security-incident-response-team-csirt-engineer&amp;quot;&amp;gt;Computer&lt;br /&gt;
security incident response team (CSIRT) engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;cyber-incident-responder&amp;quot;&amp;gt;Cyber incident responder&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-response-engineer&amp;quot;&amp;gt;Incident response&lt;br /&gt;
engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;While each of these positions is different, they generally require&lt;br /&gt;
very similar skills and characteristics in a candidate. At this level,&lt;br /&gt;
personal characteristics such as problem solving, time management, and&lt;br /&gt;
even presentation skills become more crucial as one’s career evolves&lt;br /&gt;
into a management-facing role.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Technical skills include the ability to identify and minimize threats&lt;br /&gt;
while maintaining communication with management and the rest of your&lt;br /&gt;
team. Data analysis and evidence gathering become increasingly crucial,&lt;br /&gt;
and the circumstances in which your services are deployed get more&lt;br /&gt;
serious.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Problem-solving skills are crucial at this level of incident&lt;br /&gt;
response, and as the stakes rise, so does the pressure in each&lt;br /&gt;
situation. At this level, programming abilities are essential since&lt;br /&gt;
incident responders may be needed to reverse engineer malicious code or&lt;br /&gt;
even create patches for vulnerable network applications or services.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.coursera.org/articles/popular-cybersecurity-certifications&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3 id=&amp;quot;senior-level-incident-response-positions&amp;quot;&amp;gt;Senior-Level Incident&lt;br /&gt;
Response Positions&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;intrusion-detection-specialist&amp;quot;&amp;gt;Intrusion detection&lt;br /&gt;
specialist:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;A CISSP certification might help a potential candidate in preparing&lt;br /&gt;
for the profession. The role of an intrusion detection specialist is to&lt;br /&gt;
find and stop any unwanted communications.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-manager&amp;quot;&amp;gt;Incident manager:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Expected to plan, oversee, manage, and supervise all incident&lt;br /&gt;
response team actions. Is in charge of reporting all current events to&lt;br /&gt;
senior management and stakeholders, as well as acting as the technical&lt;br /&gt;
lead on active incidents for incident responders. Prepares threat and&lt;br /&gt;
impact assessments and reports them known to management.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.coursera.org/articles/popular-cybersecurity-certifications&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Certificates== &lt;br /&gt;
There is a vast number of different certificates and the road map to&lt;br /&gt;
being a certified professional could be very different&amp;lt;ref name=&amp;quot;Coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated],&amp;quot; [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;NICCS&amp;quot;&amp;gt;NICCS, &amp;quot;Cybersecurity Certifications,&amp;quot; [Online]. Available: hhttps://niccs.cisa.gov/about-niccs/cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt; . One possible&lt;br /&gt;
approach is to start with basic certificates from the different branches&lt;br /&gt;
of service and move to more specific and demanding focused&lt;br /&gt;
certification. Also, some jobs require certain clearances, either from&lt;br /&gt;
industry, or from the government. One small selection of different&lt;br /&gt;
possible certificates is brought out in following paragraphs.&lt;br /&gt;
&lt;br /&gt;
Security+ is a CompTIA certification that is considered a basic cert&lt;br /&gt;
among cybersecurity professionals. It covers the topics of risk&lt;br /&gt;
management and threat assessment.&lt;br /&gt;
Network+ is also offered by CompTIA this certification (like the name&lt;br /&gt;
implies) focuses on networking infrastructure and operations. It is&lt;br /&gt;
considered a foundational certification.&lt;br /&gt;
The Certified Information Systems Security Professional (CISSP) is a&lt;br /&gt;
more advanced certification designed for cybersecurity professionals&lt;br /&gt;
with at least five years of work experience. The certification covers&lt;br /&gt;
topics such as architecture, engineering, and management.&amp;lt;/p&amp;gt;&lt;br /&gt;
The Certified Ethical Hacker (CEH) certification is also considered a&lt;br /&gt;
more advanced cert because it generally requires that applicants have&lt;br /&gt;
multiple years of work experience. The goal of an ethical hacker&lt;br /&gt;
certification is to be able to understand how cyber attacks unfold in&lt;br /&gt;
order to improve threat assessment and mitigation skills.&amp;lt;ref name=&amp;quot;cyberguide&amp;quot;&amp;gt;Cybersecurity Guide, &amp;quot;How to become a cybersecurity specialist&amp;quot;, [Online]. Available: https://cybersecurityguide.org/careers/security-specialist/. [Accessed 27 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
This is definitely not all, when one looks for more information, following link could be searched, to get more in depth knowledge about&lt;br /&gt;
different possibilities. Hereby, with the help of this matrix a possible taxonomy of different 436 listed certificates in branches are&lt;br /&gt;
presented.&amp;lt;ref name=&amp;quot;Pauljeremy&amp;quot;&amp;gt;&amp;quot;Cybersecurity Roadmap,&amp;quot; [Online]. Available: https://pauljerimy.com/2020/10/12/scr-oct-2020-update/. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:analystimage5.png|1000px|thumb|Certificate matrix &amp;lt;ref&amp;gt;&amp;quot;Certification roadmap&amp;quot;. Available at https://pauljerimy.com/security-certification-roadmap&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
=== Communication and Network Security===&lt;br /&gt;
Communication and network security covers the ability to secure&lt;br /&gt;
communication channels and networks. Topics include secure and converges&lt;br /&gt;
protocols, wireless networks, cellular networks, hardware operations&lt;br /&gt;
(warranty and redundant power), and third-party connectivity. IP&lt;br /&gt;
networking are also included in this domain.&lt;br /&gt;
===Identity and Access Management===&lt;br /&gt;
The identity and access management domain covers the attacks that&lt;br /&gt;
target the human gateway to gain access to data. Other topics include&lt;br /&gt;
ways to identify users with rights to access the information and&lt;br /&gt;
servers. Identity and access management covers the topics of&lt;br /&gt;
applications, Single sign-on authentication, privilege escalation,&lt;br /&gt;
Kerberos, rule-based or risk-based access control, proofing and&lt;br /&gt;
establishment of identity.&lt;br /&gt;
===Security Architecture and Engineering===&lt;br /&gt;
The security architecture and engineering domain covers important&lt;br /&gt;
topics concerning security engineering plans, designs and principles,&lt;br /&gt;
Topics include assessing and mitigating information system&lt;br /&gt;
vulnerabilities, fundamental concepts of security models and security&lt;br /&gt;
architectures in critical areas like access control. Cloud systems,&lt;br /&gt;
cryptography, system infiltrations (ransomware, fault-injection and&lt;br /&gt;
more) and virtualized systems are also covered in this domain.&lt;br /&gt;
===Asset Security===&lt;br /&gt;
The Asset Security domain deals with the issues related to the&lt;br /&gt;
collection, storage, maintenance, retention and destruction of data. It&lt;br /&gt;
also covers knowledge of different roles regarding data handling (owner,&lt;br /&gt;
controller and custodian) as well as data protection methods and data&lt;br /&gt;
states. Other topics include resource provision, asset classification&lt;br /&gt;
and data lifecycle management.&lt;br /&gt;
===Security and Risk Management===&lt;br /&gt;
The security and risk management domain covers general on skills&lt;br /&gt;
related to the implementation of user awareness programs as well as&lt;br /&gt;
security procedures. Emphasis is also placed on risk management&lt;br /&gt;
concerning the acquisition of new services, hardware and software&lt;br /&gt;
(supply chain). Other skills include social engineering defense&lt;br /&gt;
mechanisms.&lt;br /&gt;
===Security Assessment and Testing===&lt;br /&gt;
The security assessment and testing domain deals with all the&lt;br /&gt;
techniques and tools used to find system vulnerabilities, weaknesses and&lt;br /&gt;
potential areas of concern not addressed by security procedures and&lt;br /&gt;
policies. Attack simulations, vulnerability assessment, compliance&lt;br /&gt;
checks, and ethical disclosure also fall under this domain.&lt;br /&gt;
===Software Security===&lt;br /&gt;
The software development security domain deals with implementing&lt;br /&gt;
software-based security protocols within environment for which the IT&lt;br /&gt;
professional is responsible. Risk analysis, vulnerability identification&lt;br /&gt;
and auditing of source codes are all covered in this subset. Additional&lt;br /&gt;
topics include software-designed security, maturity models, development&lt;br /&gt;
methodologies, open-source and third-party development security.&lt;br /&gt;
===Security operations===&lt;br /&gt;
The security operations domain covers topics ranging from&lt;br /&gt;
investigations and digital forensic to detection and intrusion&lt;br /&gt;
prevention tools, sandboxing and firewalls. Topics include user and&lt;br /&gt;
entity behavior analytics, threat intelligence (threat hunting and&lt;br /&gt;
threat feeds) log management, artifacts (mobile, computer and network),&lt;br /&gt;
machine learning and AI-based tools, penetration testing, and&lt;br /&gt;
exploitation development. These for sub-domains are lister here.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Incident Handling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Penetration Testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Exploitation&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Education==&lt;br /&gt;
&amp;lt;p&amp;gt;The entry level monitoring specialist is hired by Estonian&lt;br /&gt;
Information System Authority even if there is no formal IT education,&lt;br /&gt;
but readiness to learn and moderate knowledge of different operation&lt;br /&gt;
systems is enough to start the career.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.cv.ee/en/vacancy/792782/riigi-infosusteemi-amet/seirespetsialist-tule-eesti-kuberruumi-valvuriks&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Nevertheless, like most other high qualification careers jobs falling&lt;br /&gt;
under the cybersecurity specialist category require some form of formal&lt;br /&gt;
education. However, since cybersecurity specialist jobs can fall across&lt;br /&gt;
a wide spectrum of job descriptions and responsibilities, it is possible&lt;br /&gt;
to obtain a specialist job after completing many levels of different&lt;br /&gt;
computer related education.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;If one is looking for a cybersecurity related education, for example&lt;br /&gt;
in EU, 137 courses/programs could be found that relate to keyword IT or&lt;br /&gt;
cybersecurity.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.enisa.europa.eu/topics/cybersecurity-education/education-map/education-courses&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Also, there is a great amount of discussion, if cuber security&lt;br /&gt;
professional should have a degree or would be certification just enough.&lt;br /&gt;
One interesting table is produces by Franklin University that compares&lt;br /&gt;
benefits and/or drawbacks of each type of credential.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image11.png&amp;quot; alt=&amp;quot;Comparison MSc vs certificate&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;Comparison MSc vs&lt;br /&gt;
certificate&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Certifications are generally good for people with little practical&lt;br /&gt;
experience because they are known quantities in the industry and can&lt;br /&gt;
help you get your foot in the door. They set a minimum knowledge bar.&lt;br /&gt;
But some certifications are viewed more favorably than others.&lt;br /&gt;
Certifications with renewal requirements are viewed better by hiring&lt;br /&gt;
managers, but they also more costly in the long run because of the need&lt;br /&gt;
for continuing education. Certifications are also good for showing&lt;br /&gt;
in-depth expertise in a specialization within cybersecurity. Depending&lt;br /&gt;
on your career goals, it may be advantageous to have a master’s&lt;br /&gt;
degree—which shows your breadth of knowledge, critical thinking and&lt;br /&gt;
leadership skills—and a certificate—which shows specific skill&lt;br /&gt;
competency.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;As IT (Cyber) Security is still a relatively young discipline,&lt;br /&gt;
universities and colleges are still figuring out which is the best&lt;br /&gt;
approach for their degrees. Study programmes and curricula in Cyber&lt;br /&gt;
Security are different. In general, here are the duration of Cyber&lt;br /&gt;
Security degrees:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Bachelor’s degrees in Cyber Security take 3 or 4 years in most&lt;br /&gt;
countries.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Master’s courses in Cyber Security take between 1-2 years to&lt;br /&gt;
complete.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;PhD programmes in Cyber Security last 3-5 years. Some only take 1&lt;br /&gt;
or 2 years, but they are less common.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Generalization could me made that on bachelor level the general&lt;br /&gt;
knowledge about the cyber issues are obtained. On master level the&lt;br /&gt;
specialization courses are taken and the person can choose more specific&lt;br /&gt;
topics to study. It is on master level where strengths of the cyber&lt;br /&gt;
specialist can be developed further and up-do date knowledge obtained in&lt;br /&gt;
specifics. PhD is serious science and involves teaching, lot of&lt;br /&gt;
scientific work and writing for publications.&amp;lt;/p&amp;gt;&lt;br /&gt;
==Salary==&lt;br /&gt;
&amp;lt;p&amp;gt;Even if the salary can be very different, compared to the skills and&lt;br /&gt;
experience, an generalization can be made. Cyber Security professionals&lt;br /&gt;
in CSIRT, and in other entities earn quite well, from the start. First,&lt;br /&gt;
some comparison from the United States. The average CSIRT analyst salary&lt;br /&gt;
in the USA is $97,500 per year or $50 per hour. Entry level positions&lt;br /&gt;
start at $48,875 per year while most experienced workers make up to&lt;br /&gt;
$135,373 per year.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.talent.com/salary?job=csirt+analyst&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;There are multiple positions you can occupy in this field. They have&lt;br /&gt;
in common great salaries and high demand for technical skills, attention&lt;br /&gt;
to details, problem-solving mentality, and the ability to analyze risks.&lt;br /&gt;
Here are the average annual salaries in the United States, according to&lt;br /&gt;
Payscale:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.payscale.com/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Cryptographer – 100,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Information Security Officer – 91,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Assessor – 90,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Engineer – 88,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Penetration Tester – 81,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Forensics Expert – 71,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Administrator – 65,000 USD&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When looking into salaries in Estonia, one can find that there is a&lt;br /&gt;
discussion that private sector is taking a toll from the public sector,&lt;br /&gt;
and that the salaries in important agencies, as Information System&lt;br /&gt;
Authority loose their employees to the better paid positions in private&lt;br /&gt;
sector.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://digi.geenius.ee/rubriik/uudis/kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad/&lt;br /&gt;
https://tehnika.postimees.ee/6887428/riigi-it-tootajate-palgamaarad-kasvasid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;But there is also a different view that average private sector worker&lt;br /&gt;
could be hired as a top specialist in public sector and then the payment&lt;br /&gt;
is higher. Nevertheless, it seems that the average payment in cyber&lt;br /&gt;
security sector is any way higher that in other parts of the&lt;br /&gt;
e-services.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://digi.geenius.ee/rubriik/uudis/5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka/&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
==SOC==&lt;br /&gt;
&amp;lt;p&amp;gt;A SOC is a facility where an organization’s network, applications,&lt;br /&gt;
and endpoints are monitored and defended. The term was adapted from&lt;br /&gt;
network operations centers (NOCs), where large telecommunication or&lt;br /&gt;
corporate networks are monitored. When network security became more of a&lt;br /&gt;
concern, security teams were formed within the NOCs, and eventually spun&lt;br /&gt;
off into larger organizations of their own as the responsibilities of&lt;br /&gt;
security teams grew increasingly complex and specialized. The security&lt;br /&gt;
staff working in a security operations center are often called the SOC&lt;br /&gt;
team.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Functions of the SOC team include, but are not limited to:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ol type=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Taking inventory of resources, to get a better understanding of the&lt;br /&gt;
structure they are protecting.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintanence of the system, by constantly making updates and adding&lt;br /&gt;
safeguards.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Monitoring the network for abnormalities with special tools.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Threat analysis of new attacks and vulnerabilities.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Responding to attacks, by acting as “first responders”. The SOC team&lt;br /&gt;
will shut down and/or isolate endpoints, deleting files and lowering the&lt;br /&gt;
impact as fast as possible.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Recovery of system stability and lost data. This may be done using&lt;br /&gt;
backups, restarting endpoints or reconfiguring systems.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Logging all actions on the system, to be later used for analysis or&lt;br /&gt;
forensics after an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigating the root cause of an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Auditing their own actions, to be in line with regulations of the&lt;br /&gt;
organization, industry or governing body.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.trellix.com/en-us/security-awareness/operations/what-is-soc.html&amp;lt;/p&amp;gt;&lt;br /&gt;
==CSIRT==&lt;br /&gt;
&amp;lt;p&amp;gt;A CSIRT is a group that responds to security incidents when they&lt;br /&gt;
occur. Key responsibilities of a CSIRT include:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
===Creating and maintaining an incident response plan (IRP)===&lt;br /&gt;
An incident response plan (IRP) is a set of written instructions for&lt;br /&gt;
detecting, responding to and limiting the effects of an information&lt;br /&gt;
security event. Incident response plans provide instructions for&lt;br /&gt;
responding to many potential scenarios, including data breaches, denial&lt;br /&gt;
of service/distributed denial of service attacks, firewall breaches,&lt;br /&gt;
virus or malware outbreaks or insider threats. Without an incident&lt;br /&gt;
response plan in place, organizations may either not detect the attack&lt;br /&gt;
in the first place, or not follow proper protocol to contain the threat&lt;br /&gt;
and recover from it when a breach is detected.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.stratacore.com/incidentresponseplan&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
===Investigating and analyzing incidents===&lt;br /&gt;
CSIRTs are also involved in improvement activities. After major&lt;br /&gt;
computer security incidents occur, or when incidents are not handled in&lt;br /&gt;
a timely or effective manner, a CSIRT will generally perform a&lt;br /&gt;
postmortem of the incident and its response. This postmortem will&lt;br /&gt;
identify the strengths and weakness of the response effort. Such reviews&lt;br /&gt;
can identify weaknesses and holes in systems, infrastructure defenses,&lt;br /&gt;
or policies that allowed the incident to take place. It can also&lt;br /&gt;
identify problems with communication channels, interfaces, and&lt;br /&gt;
procedures that inhibited the efficient resolution of the reported&lt;br /&gt;
problem.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.cisa.gov/uscert/bsi/articles/best-practices/incident-management/defining-computer-security-incident-response-teams&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Managing internal communications and updates during or immediately after incidents occur===&lt;br /&gt;
===Communicating with employees, shareholders, customers, and the press about incidents as needed===&lt;br /&gt;
&amp;lt;p&amp;gt;There are various services within the CSIRT Services Framework that&lt;br /&gt;
address communications, as they relate to security operations and&lt;br /&gt;
incident response services. Some of these include Information Security&lt;br /&gt;
Incident Coordination, Crisis Management Support, Vulnerability&lt;br /&gt;
Disclosure, Situational Awareness Communication, and Awareness Building,&lt;br /&gt;
to name a few. Sharing information and communicating with the general&lt;br /&gt;
public and/or your constituency is appropriate in many different&lt;br /&gt;
scenarios. These can range from proactive communications to reactive&lt;br /&gt;
communications. Each scenario may be unique, and careful consideration&lt;br /&gt;
should be given to when to release information to the public and what&lt;br /&gt;
information should be released.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;https://resources.sei.cmu.edu/asset_files/Handbook/2021_002_001_651819.pdf&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Remediating incidents===&lt;br /&gt;
&amp;lt;p&amp;gt;Threat remediation is a strong and capable tool for fighting the&lt;br /&gt;
cyber security compromises. As the word ‘remedy’ suggests, remediation&lt;br /&gt;
process involves the treatment of a security breach. With the&lt;br /&gt;
remediation practices, your cyber security team is able to eliminate&lt;br /&gt;
suspicious activities and malicious attacks in the form of malware,&lt;br /&gt;
ransomware, phishing and such. Even if you ‘kill’ the suspicious&lt;br /&gt;
activity, the attackers can remain in your systems. If you want to&lt;br /&gt;
contaminate and end the problem for good, your remediation processes&lt;br /&gt;
must involve the detection of the cause.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.logsign.com/blog/what-is-remediation-in-cyber-security/&amp;lt;/p&amp;gt;&lt;br /&gt;
=== Recommending technology, policy, governance, and training changes after security&lt;br /&gt;
incidents===&lt;br /&gt;
&amp;lt;p&amp;gt;After all these actions, the SCIRT must contribute to the development&lt;br /&gt;
of better policies, practices and has to recommend improvements. They&lt;br /&gt;
are not working in the vacuum and their work has to create new and&lt;br /&gt;
better standards for cyber security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
==CERT==&lt;br /&gt;
&amp;lt;p&amp;gt;The term “computer emergency response team” was coined in 1988. In&lt;br /&gt;
response to the Morris worm attack that impacted thousands of servers on&lt;br /&gt;
the Internet, DARPA funded the formation of the Computer Emergency&lt;br /&gt;
Response Team Coordination Center (CERT-CC) at Carnegie Mellon&lt;br /&gt;
University. The goal of CERT-CC was to help protect the internet by&lt;br /&gt;
collecting and disseminating information on critical security&lt;br /&gt;
vulnerabilities. Several other countries formed similar centers using&lt;br /&gt;
the same acronym (despite threats of legal action by Carnegie Mellon for&lt;br /&gt;
trademark infringement). Now the term CERT refers to any emergency&lt;br /&gt;
response team that deals with cyber threats. Many people use CERT-CC&lt;br /&gt;
interchangeably with CSIRT, though the charter of a CERT is information&lt;br /&gt;
sharing in order to help other response teams respond to threats against&lt;br /&gt;
their own infrastructure.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In general, the designation of CERT is helpful in applying real-world&lt;br /&gt;
solutions to various cybersecurity problems. They may be government&lt;br /&gt;
contractors or employees of a major corporation. For example, the U.S.&lt;br /&gt;
Computer Emergency Readiness Team (US-CERT) operates under the U.S.&lt;br /&gt;
Department of Homeland Security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.techopedia.com/definition/31003/computer-emergency-response-team-cert&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In Estonia CERT is designated as CERT-EE. It was established in 2006,&lt;br /&gt;
as an organization responsible for the management of security incidents&lt;br /&gt;
in .ee computer networks. It is also a national contact point for&lt;br /&gt;
international co-operation in the field of IT security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ria.ee/en/cyber-security/cert-ee.html&amp;lt;/p&amp;gt;&lt;br /&gt;
===Difference between SOC/CSIRT/CERT===&lt;br /&gt;
&amp;lt;p&amp;gt;How CSIRTs differ from CERTs and SOCs There are overlapping&lt;br /&gt;
responsibilities between a community emergency response team (CERT),&lt;br /&gt;
computer security incident response team (CSIRT), and security&lt;br /&gt;
operations center (SOC). To add to this confusion, frequently, the terms&lt;br /&gt;
CERT and CSIRT are used interchangeably, despite the important&lt;br /&gt;
differences.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image3.png&amp;quot; alt=&amp;quot;Overlapping in images/image3.png&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;Overlapping in&lt;br /&gt;
images/image3.png&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
==Understand the primary roles and characteristics of a CERT, CSIRT, and SOC.==&lt;br /&gt;
&amp;lt;p&amp;gt;So, using strict definitions, a CERT collects and disseminates&lt;br /&gt;
security information, typically for the benefit of a country or an&lt;br /&gt;
industry. A CSIRT is a cross-functional team that responds to incidents&lt;br /&gt;
on behalf of a country or an organization. A SOC is where a country or&lt;br /&gt;
organization monitors and defends its network, servers, applications,&lt;br /&gt;
and endpoints.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image4.png&amp;quot; alt=&amp;quot;table of explanation images/image4&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;table of explanation&lt;br /&gt;
images/image4&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
==Future==&lt;br /&gt;
&amp;lt;p&amp;gt;And the Cyber security problem is only getting bigger. According to a&lt;br /&gt;
report published by Accenture, the number of cyber security breaches&lt;br /&gt;
increased by 11 percent from 2017 to 2018. The cost of such breaches is&lt;br /&gt;
astronomical–about $600 billion worldwide, according to the Economic&lt;br /&gt;
Impact of Cybercrime report.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Job projections for cybersecurity are staggering. The Bureau of Labor&lt;br /&gt;
Statistics in US predicts that careers in the cybersecurity field will&lt;br /&gt;
grow by 32% by 2028. That makes cybersecurity one of the top 10&lt;br /&gt;
fastest-growing jobs in the country. In the United States alone, jobs&lt;br /&gt;
for Information Security Analysts are expected to grow by 15% by&lt;br /&gt;
2024.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Most likely this trend is also similar in other countries.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When checking Estonian job portals, there is a constant need for&lt;br /&gt;
people for cyber security related positions. Also, linkedin search gives&lt;br /&gt;
approximately 30 vacancies immediately. There are banks, logistics&lt;br /&gt;
companies, e-shops, and software producers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://ee.linkedin.com/jobs/cyber-security-jobs?countryRedirected=1&amp;amp;amp;position=1&amp;amp;amp;pageNum=0&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Trends that affect companies create need for constant cyber security&lt;br /&gt;
services. Increasing number of home/remote offices require secure&lt;br /&gt;
corporate networks and security of remote devices. One example is from&lt;br /&gt;
this year, when sloppy remote desktop set-up paralyzed systems of 17&lt;br /&gt;
companies.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.aripaev.ee/uudised/2022/04/20/ria-lohakas-kaugtoolaua-seadistus-halvas-martsis-vahemalt-17-juhul-ettevotete-it-susteemid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Also, no service can exists without robust infrastructure - servers,&lt;br /&gt;
databases, applications. As all previously mentioned devices and&lt;br /&gt;
services are at constant scanning and surveillance. So, the breach&lt;br /&gt;
detection and immediate action demands 24/7 services. Even if lot of&lt;br /&gt;
things could be automated, there is a need for human specialists (at&lt;br /&gt;
least, at the moment). Third growing field is also a forensic&lt;br /&gt;
investigation, as every attack must be investigated in order to be ready&lt;br /&gt;
to repel next attacks. So data recovery and evidence collection is&lt;br /&gt;
another important field of work that need skilled and professional&lt;br /&gt;
workers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Even, if the specifics of the entity, be it CSIRT, CERT or SOC, are&lt;br /&gt;
different, the fundamentals of the work are the same. Professional&lt;br /&gt;
knowledge of the networks, operational systems, hardware, scripting, and&lt;br /&gt;
several other wider IT related knowledge is needed. As there is no&lt;br /&gt;
single way to reach to it, every single person can find one’s strongest&lt;br /&gt;
sides and develop them with knowledge of weaker side, in order to know,&lt;br /&gt;
when to as for help.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/body&amp;gt;&lt;br /&gt;
&amp;lt;/html&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mavald</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142168</id>
		<title>Hiring a Cyber Security Incident Analyst</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142168"/>
		<updated>2022-05-01T14:20:30Z</updated>

		<summary type="html">&lt;p&gt;Mavald: /* Certificates */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==A Cyber Security Incident Analyst==&lt;br /&gt;
&lt;br /&gt;
[[File:image1.png|600px|thumb|Job advertisement &amp;lt;ref&amp;gt;&amp;quot;Job Advertisement&amp;quot;. Available at https://www.projectpeople.com/jobs/&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
===Cyber security incident analyst in SOC/CSIRT/CERT===&lt;br /&gt;
This article delves into the job title of Cyber Security Incident&lt;br /&gt;
Analyst and provides an overview of the acronyms SOC/CSIRT/CERT. A brief&lt;br /&gt;
history of the job is discussed here, as well as a possible career path,&lt;br /&gt;
education, experience, and other characteristics required for work in&lt;br /&gt;
computer security-related organizations. The article also provides a&lt;br /&gt;
brief history of SOC/CSIRT/CERT, as well as a comparison of their&lt;br /&gt;
differences and similarities.&lt;br /&gt;
===Cyber Security Incident Analyst Skill Set===&lt;br /&gt;
What skill set is expected from the Cyber Security Incident Analyst? Below written lines are taken from the same job advertisement depicted&lt;br /&gt;
on the left side of this article:&lt;br /&gt;
As a Security Incident Analyst your responsibilities will include:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Continuous monitoring of security tooling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Performing regular and ad-hoc vulnerability assessments&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Carrying out ‘spot checks’&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Reporting vulnerabilities to the PVG via the alerts system&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintaining and documenting logging systems&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Developing centralized logging, reporting and intelligence&lt;br /&gt;
platforms&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;‘Light touch’ penetration testing with open source tooling&lt;br /&gt;
(Metasploit)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Knowledge &amp;amp;amp; Experience required:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;SOC, CSIRT or CERT operational environment experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Windows / Linux experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TCP /IP networking protocol knowledge&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience reviewing and analyzing Security Events from various&lt;br /&gt;
monitoring and logging sources&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience in website and web application security assessment or&lt;br /&gt;
penetration testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience of using Metasploit&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Scripting knowledge using BASH, Python, Perl, Ruby&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Skills in Host and Network Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
As one can see the description of the duties is wide and also the&lt;br /&gt;
knowledge and experience that is required is noteworthy. So, where to&lt;br /&gt;
start to find out the way to get this kind of knowledge and&lt;br /&gt;
expertize.&lt;br /&gt;
===Possible career path===&lt;br /&gt;
Next part of the paper is aiming to depict a possible ways, how to&lt;br /&gt;
develop oneself, and move along the career pathway in cybersecurity&lt;br /&gt;
field. Topics of development, education, experience and certification&lt;br /&gt;
are covered.&lt;br /&gt;
[[File:analystimage2.png|700px|thumb|Career path &amp;lt;ref&amp;gt;&amp;quot;Possible Career Path&amp;quot;. Available at https://www.cyberseek.org/pathway.html&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
===Junior/Senior===&lt;br /&gt;
Start with an entry-level job in IT. Hands-on experience is often the&lt;br /&gt;
most effective way to prepare for certification exams. Start&lt;br /&gt;
accumulating work experience with an entry-level role as a cybersecurity&lt;br /&gt;
analyst. Many cybersecurity professionals start off in more general IT&lt;br /&gt;
roles. The skills, practices, and technologies you’ll use as a&lt;br /&gt;
cybersecurity professional will continue to evolve along with computer&lt;br /&gt;
and network technology. The desire to learn, ability to problem solve,&lt;br /&gt;
and attention to detail will serve you well in this field. Other, more&lt;br /&gt;
technical skills and technologies to learn include:&amp;lt;ref name=&amp;quot;certification&amp;quot;&amp;gt;Popular Cyber Security Certificates [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications  [Accessed 25 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====SIEM tools (security information and event management)====&lt;br /&gt;
Security Information and Event Management (SIEM) is a set of tools&lt;br /&gt;
and services offering a holistic view of an organization’s information&lt;br /&gt;
security. SIEM works by combining two technologies:&lt;br /&gt;
&amp;lt;li&amp;gt;Security information management (SIM), which collects data from log&lt;br /&gt;
files for analysis and reports on security threats and events, and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;security event management (SEM), which conducts real-time system&lt;br /&gt;
monitoring, notifies network admins about important issues and&lt;br /&gt;
establishes correlations between security events. There are a number of&lt;br /&gt;
security information and event management solutions on the market.&lt;br /&gt;
ArcSight ESM, IBM QRadar and Splunk are among the most popular. &amp;lt;ref name=&amp;quot;SIEM&amp;quot;&amp;gt;Application security, SIEM [Online]. Available: https://www.imperva.com/learn/application-security/siem/. [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Firewalls, Intrusion Detection Systems (IDS), and Intrusion Prevention Systems(IPS)====&lt;br /&gt;
Firewalls can be two types, hardware and software firewalls. Software&lt;br /&gt;
firewall is a firewall that is installed on a computer or server, and&lt;br /&gt;
tasked with network security. It works with a wide variety of other&lt;br /&gt;
technology security solutions to provide more robust and cohesive&lt;br /&gt;
security for enterprises of all sizes. When a software firewall is&lt;br /&gt;
installed on a server, it opens up like an umbrella of protection over&lt;br /&gt;
all other computers connected to the network. It is able to monitor both&lt;br /&gt;
incoming and outgoing traffic for potential risk or suspicious user&lt;br /&gt;
behavior, and also makes setting security policies much easier, faster&lt;br /&gt;
and more flexible. Hardware firewall is positioned between the network&lt;br /&gt;
and devices, allowing traffic to funnel through the firewall for a close&lt;br /&gt;
inspection and analysis. A hardware firewall, a term often&lt;br /&gt;
interchangeable with network or next-generation firewall, protects the&lt;br /&gt;
network gateways for an enterprise. Hardware firewall is physical&lt;br /&gt;
hardware, installed between network elements and connected devices, and&lt;br /&gt;
is tasked with filtering traffic for cyber threat to the network or&lt;br /&gt;
devices. Filtering out unauthorized or suspicious users based on traffic&lt;br /&gt;
analysis is one of the biggest benefits of hardware firewall. &amp;lt;ref name=&amp;quot;sangfor&amp;quot;&amp;gt;Sangfor, &amp;quot;What is Software Firewall? Difference between Hardware Firewall and Software Firewall, [Online]. Available: https://www.sangfor.com/blog/cybersecurity/what-is-software-firewall-difference-between-hardware-firewall-and-software-firewall [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems&lt;br /&gt;
(IPS) are both parts of the network infrastructure. IDS/IPS compare&lt;br /&gt;
network packets to a cyberthreat database containing known signatures of&lt;br /&gt;
cyberattacks — and flag any matching packets. IDS doesn’t alter the&lt;br /&gt;
network packets in any way, whereas IPS prevents the packet from&lt;br /&gt;
delivery based on the contents of the packet, much like how a firewall&lt;br /&gt;
prevents traffic by IP address. &amp;lt;ref name=&amp;quot;Varonis&amp;quot;&amp;gt;Varonis, &amp;quot;What is Software Firewall? IDS vs. IPS: What is the Difference?, [Online]. Available: https://www.varonis.com/blog/ids-vs-ips [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Digital forensics====&lt;br /&gt;
&amp;lt;p&amp;gt;Digital forensics is a branch of forensic science that focuses on&lt;br /&gt;
identifying, acquiring, processing, analyzing, and reporting on data&lt;br /&gt;
stored electronically. Electronic evidence is a component of almost all&lt;br /&gt;
criminal activities and digital forensics support is crucial for law&lt;br /&gt;
enforcement investigations. Electronic evidence can be collected from a&lt;br /&gt;
wide array of sources, such as computers, smartphones, remote storage,&lt;br /&gt;
unmanned aerial systems, shipborne equipment, and more.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.interpol.int/How-we-work/Innovation/Digital-forensics&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Investigative process of digital forensics can be divided into&lt;br /&gt;
several stages. There are four major stages: preservation, collection,&lt;br /&gt;
examination, and analysis.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.258.7882&amp;amp;amp;rep=rep1&amp;amp;amp;type=pdf&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;All these four stages need a deep understanding of computers,&lt;br /&gt;
technology across a broad spectrum, and cybersecurity principles and&lt;br /&gt;
practices, a working knowledge of computers, networks, and coding,&lt;br /&gt;
in-depth investigative abilities, critical-thinking skills and&lt;br /&gt;
analytical talent the ability to effectively communicate and work with a&lt;br /&gt;
wide range of people.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Mobile device management====&lt;br /&gt;
Mobile device management (MDM) is software that allows IT&lt;br /&gt;
administrators to control, secure and enforce policies on smartphones,&lt;br /&gt;
tablets and other endpoints. Mobile device management software emerged&lt;br /&gt;
in the early 2000s as a way to control and secure the personal digital&lt;br /&gt;
assistants and smartphones that business workers began to use. The&lt;br /&gt;
consumer smartphone boom that started with the launch of the Apple&lt;br /&gt;
iPhone in 2007 led to the bring your own device (BYOD) trend, which&lt;br /&gt;
fueled further interest in MDM.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.techtarget.com/searchmobilecomputing/definition/mobile-device-management&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Data management====&lt;br /&gt;
Sometimes the data management is neglected, but this part has a&lt;br /&gt;
crucial role when learning for good cyber security practices. Majority&lt;br /&gt;
of cyber security programs include a special courses on data management.&lt;br /&gt;
Data management is a method of organizing and maintaining data processes&lt;br /&gt;
that are required in almost every business operations. The benefits of&lt;br /&gt;
data management can be found accounting, statistics, logistics planning&lt;br /&gt;
and other disciplines including corporate computing.&lt;br /&gt;
&amp;lt;p&amp;gt;https://globaluniversities.in/msc-data-management-cyber-security/&amp;lt;/p&amp;gt;&lt;br /&gt;
Data governance (and management) play a fundamental role in&lt;br /&gt;
protecting an organization’s data. Ensuring that the right people have&lt;br /&gt;
the right access and that appropriate security controls are in place to&lt;br /&gt;
protect each system or service, based on the criticality or sensitivity&lt;br /&gt;
of the data sets these contain.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://cybersecurity-magazine.com/the-role-of-data-governance-in-cybersecurity/?utm_source=rss&amp;amp;amp;utm_medium=rss&amp;amp;amp;utm_campaign=the-role-of-data-governance-in-cybersecurity&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Application security development====&lt;br /&gt;
Application security describes security measures at the application&lt;br /&gt;
level that aim to prevent data or code within the app from being stolen&lt;br /&gt;
or hijacked. It encompasses the security considerations that happen&lt;br /&gt;
during application development and design, but it also involves systems&lt;br /&gt;
and approaches to protect apps after they get deployed. Application&lt;br /&gt;
security may include hardware, software, and procedures that identify or&lt;br /&gt;
minimize security vulnerabilities.&lt;br /&gt;
https://www.vmware.com/topics/glossary/content/application-security.html&lt;br /&gt;
Application security development is important to ensure that your&lt;br /&gt;
application is free from coding errors and bugs. And controls the risk&lt;br /&gt;
and helps safeguard against security vulnerabilities. Application&lt;br /&gt;
security development is the process of making applications more secure&lt;br /&gt;
by finding and fixing security vulnerabilities. This is often done by&lt;br /&gt;
enforcing software security best practices and using application&lt;br /&gt;
security testing tools.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.perforce.com/blog/kw/application-security-development-best-practices&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Audit and compliance knowledge====&lt;br /&gt;
A cyber security audit is designed to be a comprehensive review and&lt;br /&gt;
analysis of your business’s IT infrastructure. It identifies threats and&lt;br /&gt;
vulnerabilities, exposing weaknesses and high-risk practices.&lt;br /&gt;
Regulations such as the EU GDPR (General Data Protection Regulation) can&lt;br /&gt;
impose hefty penalties in the event of a breach that results in&lt;br /&gt;
exploited data. A cyber security audit will help mitigate the&lt;br /&gt;
consequences of a breach and demonstrate that your organization has&lt;br /&gt;
taken the necessary steps to protect client and company data.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://cyforsecure.co.uk/services/cyber-assessment/cyber-security-audit/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Cybersecurity compliance is the organizational risk management method&lt;br /&gt;
aligned with pre-defined security measures &amp;amp;amp; controls on how data&lt;br /&gt;
confidentiality is ensured by its administrational procedures.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://nordlayer.com/blog/cybersecurity-compliance-everything-you-need-to-know/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;All needed skills are developed through courses and&lt;br /&gt;
certification.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
===Entry-Level Incident Response Positions===&lt;br /&gt;
&amp;lt;p&amp;gt;It is not always possible to advance to the position of incident&lt;br /&gt;
responder in a straight line. Many professionals advance from entry- to&lt;br /&gt;
mid-level positions before becoming a real incident responder or a&lt;br /&gt;
member of a computer emergency response team (CERT).&amp;lt;br /&amp;gt;&lt;br /&gt;
These are some examples:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;network-administrator&amp;quot;&amp;gt;Network administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;This position’s experience will help potential incident responders&lt;br /&gt;
develop networking skills. Attention to detail, as well as the ability&lt;br /&gt;
to sift through system configurations, site layouts, and general network&lt;br /&gt;
and communication setups, are essential in this field.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;system-administrator&amp;quot;&amp;gt;System administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Another crucial beginning point for an incident responder is to learn&lt;br /&gt;
how to manage resources inside your organization as well as user&lt;br /&gt;
behavior. Understanding the potential damage that users, inadequate&lt;br /&gt;
security setups, and ineffective IT policies and procedures can cause on&lt;br /&gt;
your network can provide prospective candidates with insight into the&lt;br /&gt;
human component of an incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;security-administrator&amp;quot;&amp;gt;Security administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In such a position, basic hacking skills, penetration testing, and&lt;br /&gt;
intrusion detection are all learned, which are crucial incident&lt;br /&gt;
responder skills when trying to replicate a breach or attack.&lt;br /&gt;
Understanding the paths a cybercriminal will take when attempting to&lt;br /&gt;
damage or obtain access to a system can greatly simplify the work of&lt;br /&gt;
reverse engineering the incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://resources.infosecinstitute.com/topic/incident-responder-career-roadmap-entry-level-executive/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3 id=&amp;quot;mid-level-incident-response-positions&amp;quot;&amp;gt;Mid-Level Incident&lt;br /&gt;
Response Positions&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5&lt;br /&gt;
id=&amp;quot;computer-security-incident-response-team-csirt-engineer&amp;quot;&amp;gt;Computer&lt;br /&gt;
security incident response team (CSIRT) engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;cyber-incident-responder&amp;quot;&amp;gt;Cyber incident responder&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-response-engineer&amp;quot;&amp;gt;Incident response&lt;br /&gt;
engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;While each of these positions is different, they generally require&lt;br /&gt;
very similar skills and characteristics in a candidate. At this level,&lt;br /&gt;
personal characteristics such as problem solving, time management, and&lt;br /&gt;
even presentation skills become more crucial as one’s career evolves&lt;br /&gt;
into a management-facing role.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Technical skills include the ability to identify and minimize threats&lt;br /&gt;
while maintaining communication with management and the rest of your&lt;br /&gt;
team. Data analysis and evidence gathering become increasingly crucial,&lt;br /&gt;
and the circumstances in which your services are deployed get more&lt;br /&gt;
serious.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Problem-solving skills are crucial at this level of incident&lt;br /&gt;
response, and as the stakes rise, so does the pressure in each&lt;br /&gt;
situation. At this level, programming abilities are essential since&lt;br /&gt;
incident responders may be needed to reverse engineer malicious code or&lt;br /&gt;
even create patches for vulnerable network applications or services.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.coursera.org/articles/popular-cybersecurity-certifications&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3 id=&amp;quot;senior-level-incident-response-positions&amp;quot;&amp;gt;Senior-Level Incident&lt;br /&gt;
Response Positions&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;intrusion-detection-specialist&amp;quot;&amp;gt;Intrusion detection&lt;br /&gt;
specialist:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;A CISSP certification might help a potential candidate in preparing&lt;br /&gt;
for the profession. The role of an intrusion detection specialist is to&lt;br /&gt;
find and stop any unwanted communications.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-manager&amp;quot;&amp;gt;Incident manager:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Expected to plan, oversee, manage, and supervise all incident&lt;br /&gt;
response team actions. Is in charge of reporting all current events to&lt;br /&gt;
senior management and stakeholders, as well as acting as the technical&lt;br /&gt;
lead on active incidents for incident responders. Prepares threat and&lt;br /&gt;
impact assessments and reports them known to management.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.coursera.org/articles/popular-cybersecurity-certifications&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Certificates== &lt;br /&gt;
&amp;lt;ref name=&amp;quot;Coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated],&amp;quot; [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;NICCS&amp;quot;&amp;gt;NICCS, &amp;quot;Cybersecurity Certifications,&amp;quot; [Online]. Available: hhttps://niccs.cisa.gov/about-niccs/cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
There is a vast number of different certificates and the road map to&lt;br /&gt;
being a certified professional could be very different&amp;lt;ref name=&amp;quot;Coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated],&amp;quot; [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;NICCS&amp;quot;&amp;gt;NICCS, &amp;quot;Cybersecurity Certifications,&amp;quot; [Online]. Available: hhttps://niccs.cisa.gov/about-niccs/cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt; . One possible&lt;br /&gt;
approach is to start with basic certificates from the different branches&lt;br /&gt;
of service and move to more specific and demanding focused&lt;br /&gt;
certification. Also, some jobs require certain clearances, either from&lt;br /&gt;
industry, or from the government. One small selection of different&lt;br /&gt;
possible certificates is brought out in following paragraphs.&lt;br /&gt;
&lt;br /&gt;
Security+ is a CompTIA certification that is considered a basic cert&lt;br /&gt;
among cybersecurity professionals. It covers the topics of risk&lt;br /&gt;
management and threat assessment.&lt;br /&gt;
Network+ is also offered by CompTIA this certification (like the name&lt;br /&gt;
implies) focuses on networking infrastructure and operations. It is&lt;br /&gt;
considered a foundational certification.&lt;br /&gt;
The Certified Information Systems Security Professional (CISSP) is a&lt;br /&gt;
more advanced certification designed for cybersecurity professionals&lt;br /&gt;
with at least five years of work experience. The certification covers&lt;br /&gt;
topics such as architecture, engineering, and management.&amp;lt;/p&amp;gt;&lt;br /&gt;
The Certified Ethical Hacker (CEH) certification is also considered a&lt;br /&gt;
more advanced cert because it generally requires that applicants have&lt;br /&gt;
multiple years of work experience. The goal of an ethical hacker&lt;br /&gt;
certification is to be able to understand how cyber attacks unfold in&lt;br /&gt;
order to improve threat assessment and mitigation skills.&amp;lt;ref name=&amp;quot;cyberguide&amp;quot;&amp;gt;Cybersecurity Guide, &amp;quot;How to become a cybersecurity specialist&amp;quot;, [Online]. Available: https://cybersecurityguide.org/careers/security-specialist/. [Accessed 27 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
This is definitely not all, when one looks for more information, following link could be searched, to get more in depth knowledge about&lt;br /&gt;
different possibilities. Hereby, with the help of this matrix a possible taxonomy of different 436 listed certificates in branches are&lt;br /&gt;
presented.&amp;lt;ref name=&amp;quot;Pauljeremy&amp;quot;&amp;gt;&amp;quot;Cybersecurity Roadmap,&amp;quot; [Online]. Available: https://pauljerimy.com/2020/10/12/scr-oct-2020-update/. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:analystimage5.png|1000px|thumb|Certificate matrix &amp;lt;ref&amp;gt;&amp;quot;Certification roadmap&amp;quot;. Available at https://pauljerimy.com/security-certification-roadmap&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
=== Communication and Network Security===&lt;br /&gt;
Communication and network security covers the ability to secure&lt;br /&gt;
communication channels and networks. Topics include secure and converges&lt;br /&gt;
protocols, wireless networks, cellular networks, hardware operations&lt;br /&gt;
(warranty and redundant power), and third-party connectivity. IP&lt;br /&gt;
networking are also included in this domain.&lt;br /&gt;
===Identity and Access Management===&lt;br /&gt;
The identity and access management domain covers the attacks that&lt;br /&gt;
target the human gateway to gain access to data. Other topics include&lt;br /&gt;
ways to identify users with rights to access the information and&lt;br /&gt;
servers. Identity and access management covers the topics of&lt;br /&gt;
applications, Single sign-on authentication, privilege escalation,&lt;br /&gt;
Kerberos, rule-based or risk-based access control, proofing and&lt;br /&gt;
establishment of identity.&lt;br /&gt;
===Security Architecture and Engineering===&lt;br /&gt;
The security architecture and engineering domain covers important&lt;br /&gt;
topics concerning security engineering plans, designs and principles,&lt;br /&gt;
Topics include assessing and mitigating information system&lt;br /&gt;
vulnerabilities, fundamental concepts of security models and security&lt;br /&gt;
architectures in critical areas like access control. Cloud systems,&lt;br /&gt;
cryptography, system infiltrations (ransomware, fault-injection and&lt;br /&gt;
more) and virtualized systems are also covered in this domain.&lt;br /&gt;
===Asset Security===&lt;br /&gt;
The Asset Security domain deals with the issues related to the&lt;br /&gt;
collection, storage, maintenance, retention and destruction of data. It&lt;br /&gt;
also covers knowledge of different roles regarding data handling (owner,&lt;br /&gt;
controller and custodian) as well as data protection methods and data&lt;br /&gt;
states. Other topics include resource provision, asset classification&lt;br /&gt;
and data lifecycle management.&lt;br /&gt;
===Security and Risk Management===&lt;br /&gt;
The security and risk management domain covers general on skills&lt;br /&gt;
related to the implementation of user awareness programs as well as&lt;br /&gt;
security procedures. Emphasis is also placed on risk management&lt;br /&gt;
concerning the acquisition of new services, hardware and software&lt;br /&gt;
(supply chain). Other skills include social engineering defense&lt;br /&gt;
mechanisms.&lt;br /&gt;
===Security Assessment and Testing===&lt;br /&gt;
The security assessment and testing domain deals with all the&lt;br /&gt;
techniques and tools used to find system vulnerabilities, weaknesses and&lt;br /&gt;
potential areas of concern not addressed by security procedures and&lt;br /&gt;
policies. Attack simulations, vulnerability assessment, compliance&lt;br /&gt;
checks, and ethical disclosure also fall under this domain.&lt;br /&gt;
===Software Security===&lt;br /&gt;
The software development security domain deals with implementing&lt;br /&gt;
software-based security protocols within environment for which the IT&lt;br /&gt;
professional is responsible. Risk analysis, vulnerability identification&lt;br /&gt;
and auditing of source codes are all covered in this subset. Additional&lt;br /&gt;
topics include software-designed security, maturity models, development&lt;br /&gt;
methodologies, open-source and third-party development security.&lt;br /&gt;
===Security operations===&lt;br /&gt;
The security operations domain covers topics ranging from&lt;br /&gt;
investigations and digital forensic to detection and intrusion&lt;br /&gt;
prevention tools, sandboxing and firewalls. Topics include user and&lt;br /&gt;
entity behavior analytics, threat intelligence (threat hunting and&lt;br /&gt;
threat feeds) log management, artifacts (mobile, computer and network),&lt;br /&gt;
machine learning and AI-based tools, penetration testing, and&lt;br /&gt;
exploitation development. These for sub-domains are lister here.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Incident Handling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Penetration Testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Exploitation&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Education==&lt;br /&gt;
&amp;lt;p&amp;gt;The entry level monitoring specialist is hired by Estonian&lt;br /&gt;
Information System Authority even if there is no formal IT education,&lt;br /&gt;
but readiness to learn and moderate knowledge of different operation&lt;br /&gt;
systems is enough to start the career.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.cv.ee/en/vacancy/792782/riigi-infosusteemi-amet/seirespetsialist-tule-eesti-kuberruumi-valvuriks&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Nevertheless, like most other high qualification careers jobs falling&lt;br /&gt;
under the cybersecurity specialist category require some form of formal&lt;br /&gt;
education. However, since cybersecurity specialist jobs can fall across&lt;br /&gt;
a wide spectrum of job descriptions and responsibilities, it is possible&lt;br /&gt;
to obtain a specialist job after completing many levels of different&lt;br /&gt;
computer related education.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;If one is looking for a cybersecurity related education, for example&lt;br /&gt;
in EU, 137 courses/programs could be found that relate to keyword IT or&lt;br /&gt;
cybersecurity.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.enisa.europa.eu/topics/cybersecurity-education/education-map/education-courses&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Also, there is a great amount of discussion, if cuber security&lt;br /&gt;
professional should have a degree or would be certification just enough.&lt;br /&gt;
One interesting table is produces by Franklin University that compares&lt;br /&gt;
benefits and/or drawbacks of each type of credential.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image11.png&amp;quot; alt=&amp;quot;Comparison MSc vs certificate&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;Comparison MSc vs&lt;br /&gt;
certificate&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Certifications are generally good for people with little practical&lt;br /&gt;
experience because they are known quantities in the industry and can&lt;br /&gt;
help you get your foot in the door. They set a minimum knowledge bar.&lt;br /&gt;
But some certifications are viewed more favorably than others.&lt;br /&gt;
Certifications with renewal requirements are viewed better by hiring&lt;br /&gt;
managers, but they also more costly in the long run because of the need&lt;br /&gt;
for continuing education. Certifications are also good for showing&lt;br /&gt;
in-depth expertise in a specialization within cybersecurity. Depending&lt;br /&gt;
on your career goals, it may be advantageous to have a master’s&lt;br /&gt;
degree—which shows your breadth of knowledge, critical thinking and&lt;br /&gt;
leadership skills—and a certificate—which shows specific skill&lt;br /&gt;
competency.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;As IT (Cyber) Security is still a relatively young discipline,&lt;br /&gt;
universities and colleges are still figuring out which is the best&lt;br /&gt;
approach for their degrees. Study programmes and curricula in Cyber&lt;br /&gt;
Security are different. In general, here are the duration of Cyber&lt;br /&gt;
Security degrees:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Bachelor’s degrees in Cyber Security take 3 or 4 years in most&lt;br /&gt;
countries.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Master’s courses in Cyber Security take between 1-2 years to&lt;br /&gt;
complete.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;PhD programmes in Cyber Security last 3-5 years. Some only take 1&lt;br /&gt;
or 2 years, but they are less common.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Generalization could me made that on bachelor level the general&lt;br /&gt;
knowledge about the cyber issues are obtained. On master level the&lt;br /&gt;
specialization courses are taken and the person can choose more specific&lt;br /&gt;
topics to study. It is on master level where strengths of the cyber&lt;br /&gt;
specialist can be developed further and up-do date knowledge obtained in&lt;br /&gt;
specifics. PhD is serious science and involves teaching, lot of&lt;br /&gt;
scientific work and writing for publications.&amp;lt;/p&amp;gt;&lt;br /&gt;
==Salary==&lt;br /&gt;
&amp;lt;p&amp;gt;Even if the salary can be very different, compared to the skills and&lt;br /&gt;
experience, an generalization can be made. Cyber Security professionals&lt;br /&gt;
in CSIRT, and in other entities earn quite well, from the start. First,&lt;br /&gt;
some comparison from the United States. The average CSIRT analyst salary&lt;br /&gt;
in the USA is $97,500 per year or $50 per hour. Entry level positions&lt;br /&gt;
start at $48,875 per year while most experienced workers make up to&lt;br /&gt;
$135,373 per year.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.talent.com/salary?job=csirt+analyst&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;There are multiple positions you can occupy in this field. They have&lt;br /&gt;
in common great salaries and high demand for technical skills, attention&lt;br /&gt;
to details, problem-solving mentality, and the ability to analyze risks.&lt;br /&gt;
Here are the average annual salaries in the United States, according to&lt;br /&gt;
Payscale:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.payscale.com/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Cryptographer – 100,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Information Security Officer – 91,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Assessor – 90,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Engineer – 88,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Penetration Tester – 81,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Forensics Expert – 71,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Administrator – 65,000 USD&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When looking into salaries in Estonia, one can find that there is a&lt;br /&gt;
discussion that private sector is taking a toll from the public sector,&lt;br /&gt;
and that the salaries in important agencies, as Information System&lt;br /&gt;
Authority loose their employees to the better paid positions in private&lt;br /&gt;
sector.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://digi.geenius.ee/rubriik/uudis/kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad/&lt;br /&gt;
https://tehnika.postimees.ee/6887428/riigi-it-tootajate-palgamaarad-kasvasid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;But there is also a different view that average private sector worker&lt;br /&gt;
could be hired as a top specialist in public sector and then the payment&lt;br /&gt;
is higher. Nevertheless, it seems that the average payment in cyber&lt;br /&gt;
security sector is any way higher that in other parts of the&lt;br /&gt;
e-services.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://digi.geenius.ee/rubriik/uudis/5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka/&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
==SOC==&lt;br /&gt;
&amp;lt;p&amp;gt;A SOC is a facility where an organization’s network, applications,&lt;br /&gt;
and endpoints are monitored and defended. The term was adapted from&lt;br /&gt;
network operations centers (NOCs), where large telecommunication or&lt;br /&gt;
corporate networks are monitored. When network security became more of a&lt;br /&gt;
concern, security teams were formed within the NOCs, and eventually spun&lt;br /&gt;
off into larger organizations of their own as the responsibilities of&lt;br /&gt;
security teams grew increasingly complex and specialized. The security&lt;br /&gt;
staff working in a security operations center are often called the SOC&lt;br /&gt;
team.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Functions of the SOC team include, but are not limited to:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ol type=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Taking inventory of resources, to get a better understanding of the&lt;br /&gt;
structure they are protecting.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintanence of the system, by constantly making updates and adding&lt;br /&gt;
safeguards.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Monitoring the network for abnormalities with special tools.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Threat analysis of new attacks and vulnerabilities.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Responding to attacks, by acting as “first responders”. The SOC team&lt;br /&gt;
will shut down and/or isolate endpoints, deleting files and lowering the&lt;br /&gt;
impact as fast as possible.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Recovery of system stability and lost data. This may be done using&lt;br /&gt;
backups, restarting endpoints or reconfiguring systems.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Logging all actions on the system, to be later used for analysis or&lt;br /&gt;
forensics after an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigating the root cause of an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Auditing their own actions, to be in line with regulations of the&lt;br /&gt;
organization, industry or governing body.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.trellix.com/en-us/security-awareness/operations/what-is-soc.html&amp;lt;/p&amp;gt;&lt;br /&gt;
==CSIRT==&lt;br /&gt;
&amp;lt;p&amp;gt;A CSIRT is a group that responds to security incidents when they&lt;br /&gt;
occur. Key responsibilities of a CSIRT include:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
===Creating and maintaining an incident response plan (IRP)===&lt;br /&gt;
An incident response plan (IRP) is a set of written instructions for&lt;br /&gt;
detecting, responding to and limiting the effects of an information&lt;br /&gt;
security event. Incident response plans provide instructions for&lt;br /&gt;
responding to many potential scenarios, including data breaches, denial&lt;br /&gt;
of service/distributed denial of service attacks, firewall breaches,&lt;br /&gt;
virus or malware outbreaks or insider threats. Without an incident&lt;br /&gt;
response plan in place, organizations may either not detect the attack&lt;br /&gt;
in the first place, or not follow proper protocol to contain the threat&lt;br /&gt;
and recover from it when a breach is detected.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.stratacore.com/incidentresponseplan&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
===Investigating and analyzing incidents===&lt;br /&gt;
CSIRTs are also involved in improvement activities. After major&lt;br /&gt;
computer security incidents occur, or when incidents are not handled in&lt;br /&gt;
a timely or effective manner, a CSIRT will generally perform a&lt;br /&gt;
postmortem of the incident and its response. This postmortem will&lt;br /&gt;
identify the strengths and weakness of the response effort. Such reviews&lt;br /&gt;
can identify weaknesses and holes in systems, infrastructure defenses,&lt;br /&gt;
or policies that allowed the incident to take place. It can also&lt;br /&gt;
identify problems with communication channels, interfaces, and&lt;br /&gt;
procedures that inhibited the efficient resolution of the reported&lt;br /&gt;
problem.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.cisa.gov/uscert/bsi/articles/best-practices/incident-management/defining-computer-security-incident-response-teams&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Managing internal communications and updates during or immediately after incidents occur===&lt;br /&gt;
===Communicating with employees, shareholders, customers, and the press about incidents as needed===&lt;br /&gt;
&amp;lt;p&amp;gt;There are various services within the CSIRT Services Framework that&lt;br /&gt;
address communications, as they relate to security operations and&lt;br /&gt;
incident response services. Some of these include Information Security&lt;br /&gt;
Incident Coordination, Crisis Management Support, Vulnerability&lt;br /&gt;
Disclosure, Situational Awareness Communication, and Awareness Building,&lt;br /&gt;
to name a few. Sharing information and communicating with the general&lt;br /&gt;
public and/or your constituency is appropriate in many different&lt;br /&gt;
scenarios. These can range from proactive communications to reactive&lt;br /&gt;
communications. Each scenario may be unique, and careful consideration&lt;br /&gt;
should be given to when to release information to the public and what&lt;br /&gt;
information should be released.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;https://resources.sei.cmu.edu/asset_files/Handbook/2021_002_001_651819.pdf&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Remediating incidents===&lt;br /&gt;
&amp;lt;p&amp;gt;Threat remediation is a strong and capable tool for fighting the&lt;br /&gt;
cyber security compromises. As the word ‘remedy’ suggests, remediation&lt;br /&gt;
process involves the treatment of a security breach. With the&lt;br /&gt;
remediation practices, your cyber security team is able to eliminate&lt;br /&gt;
suspicious activities and malicious attacks in the form of malware,&lt;br /&gt;
ransomware, phishing and such. Even if you ‘kill’ the suspicious&lt;br /&gt;
activity, the attackers can remain in your systems. If you want to&lt;br /&gt;
contaminate and end the problem for good, your remediation processes&lt;br /&gt;
must involve the detection of the cause.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.logsign.com/blog/what-is-remediation-in-cyber-security/&amp;lt;/p&amp;gt;&lt;br /&gt;
=== Recommending technology, policy, governance, and training changes after security&lt;br /&gt;
incidents===&lt;br /&gt;
&amp;lt;p&amp;gt;After all these actions, the SCIRT must contribute to the development&lt;br /&gt;
of better policies, practices and has to recommend improvements. They&lt;br /&gt;
are not working in the vacuum and their work has to create new and&lt;br /&gt;
better standards for cyber security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
==CERT==&lt;br /&gt;
&amp;lt;p&amp;gt;The term “computer emergency response team” was coined in 1988. In&lt;br /&gt;
response to the Morris worm attack that impacted thousands of servers on&lt;br /&gt;
the Internet, DARPA funded the formation of the Computer Emergency&lt;br /&gt;
Response Team Coordination Center (CERT-CC) at Carnegie Mellon&lt;br /&gt;
University. The goal of CERT-CC was to help protect the internet by&lt;br /&gt;
collecting and disseminating information on critical security&lt;br /&gt;
vulnerabilities. Several other countries formed similar centers using&lt;br /&gt;
the same acronym (despite threats of legal action by Carnegie Mellon for&lt;br /&gt;
trademark infringement). Now the term CERT refers to any emergency&lt;br /&gt;
response team that deals with cyber threats. Many people use CERT-CC&lt;br /&gt;
interchangeably with CSIRT, though the charter of a CERT is information&lt;br /&gt;
sharing in order to help other response teams respond to threats against&lt;br /&gt;
their own infrastructure.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In general, the designation of CERT is helpful in applying real-world&lt;br /&gt;
solutions to various cybersecurity problems. They may be government&lt;br /&gt;
contractors or employees of a major corporation. For example, the U.S.&lt;br /&gt;
Computer Emergency Readiness Team (US-CERT) operates under the U.S.&lt;br /&gt;
Department of Homeland Security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.techopedia.com/definition/31003/computer-emergency-response-team-cert&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In Estonia CERT is designated as CERT-EE. It was established in 2006,&lt;br /&gt;
as an organization responsible for the management of security incidents&lt;br /&gt;
in .ee computer networks. It is also a national contact point for&lt;br /&gt;
international co-operation in the field of IT security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ria.ee/en/cyber-security/cert-ee.html&amp;lt;/p&amp;gt;&lt;br /&gt;
===Difference between SOC/CSIRT/CERT===&lt;br /&gt;
&amp;lt;p&amp;gt;How CSIRTs differ from CERTs and SOCs There are overlapping&lt;br /&gt;
responsibilities between a community emergency response team (CERT),&lt;br /&gt;
computer security incident response team (CSIRT), and security&lt;br /&gt;
operations center (SOC). To add to this confusion, frequently, the terms&lt;br /&gt;
CERT and CSIRT are used interchangeably, despite the important&lt;br /&gt;
differences.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image3.png&amp;quot; alt=&amp;quot;Overlapping in images/image3.png&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;Overlapping in&lt;br /&gt;
images/image3.png&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
==Understand the primary roles and characteristics of a CERT, CSIRT, and SOC.==&lt;br /&gt;
&amp;lt;p&amp;gt;So, using strict definitions, a CERT collects and disseminates&lt;br /&gt;
security information, typically for the benefit of a country or an&lt;br /&gt;
industry. A CSIRT is a cross-functional team that responds to incidents&lt;br /&gt;
on behalf of a country or an organization. A SOC is where a country or&lt;br /&gt;
organization monitors and defends its network, servers, applications,&lt;br /&gt;
and endpoints.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image4.png&amp;quot; alt=&amp;quot;table of explanation images/image4&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;table of explanation&lt;br /&gt;
images/image4&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
==Future==&lt;br /&gt;
&amp;lt;p&amp;gt;And the Cyber security problem is only getting bigger. According to a&lt;br /&gt;
report published by Accenture, the number of cyber security breaches&lt;br /&gt;
increased by 11 percent from 2017 to 2018. The cost of such breaches is&lt;br /&gt;
astronomical–about $600 billion worldwide, according to the Economic&lt;br /&gt;
Impact of Cybercrime report.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Job projections for cybersecurity are staggering. The Bureau of Labor&lt;br /&gt;
Statistics in US predicts that careers in the cybersecurity field will&lt;br /&gt;
grow by 32% by 2028. That makes cybersecurity one of the top 10&lt;br /&gt;
fastest-growing jobs in the country. In the United States alone, jobs&lt;br /&gt;
for Information Security Analysts are expected to grow by 15% by&lt;br /&gt;
2024.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Most likely this trend is also similar in other countries.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When checking Estonian job portals, there is a constant need for&lt;br /&gt;
people for cyber security related positions. Also, linkedin search gives&lt;br /&gt;
approximately 30 vacancies immediately. There are banks, logistics&lt;br /&gt;
companies, e-shops, and software producers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://ee.linkedin.com/jobs/cyber-security-jobs?countryRedirected=1&amp;amp;amp;position=1&amp;amp;amp;pageNum=0&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Trends that affect companies create need for constant cyber security&lt;br /&gt;
services. Increasing number of home/remote offices require secure&lt;br /&gt;
corporate networks and security of remote devices. One example is from&lt;br /&gt;
this year, when sloppy remote desktop set-up paralyzed systems of 17&lt;br /&gt;
companies.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.aripaev.ee/uudised/2022/04/20/ria-lohakas-kaugtoolaua-seadistus-halvas-martsis-vahemalt-17-juhul-ettevotete-it-susteemid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Also, no service can exists without robust infrastructure - servers,&lt;br /&gt;
databases, applications. As all previously mentioned devices and&lt;br /&gt;
services are at constant scanning and surveillance. So, the breach&lt;br /&gt;
detection and immediate action demands 24/7 services. Even if lot of&lt;br /&gt;
things could be automated, there is a need for human specialists (at&lt;br /&gt;
least, at the moment). Third growing field is also a forensic&lt;br /&gt;
investigation, as every attack must be investigated in order to be ready&lt;br /&gt;
to repel next attacks. So data recovery and evidence collection is&lt;br /&gt;
another important field of work that need skilled and professional&lt;br /&gt;
workers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Even, if the specifics of the entity, be it CSIRT, CERT or SOC, are&lt;br /&gt;
different, the fundamentals of the work are the same. Professional&lt;br /&gt;
knowledge of the networks, operational systems, hardware, scripting, and&lt;br /&gt;
several other wider IT related knowledge is needed. As there is no&lt;br /&gt;
single way to reach to it, every single person can find one’s strongest&lt;br /&gt;
sides and develop them with knowledge of weaker side, in order to know,&lt;br /&gt;
when to as for help.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/body&amp;gt;&lt;br /&gt;
&amp;lt;/html&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mavald</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142167</id>
		<title>Hiring a Cyber Security Incident Analyst</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142167"/>
		<updated>2022-05-01T14:17:48Z</updated>

		<summary type="html">&lt;p&gt;Mavald: /* Certificates */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==A Cyber Security Incident Analyst==&lt;br /&gt;
&lt;br /&gt;
[[File:image1.png|600px|thumb|Job advertisement &amp;lt;ref&amp;gt;&amp;quot;Job Advertisement&amp;quot;. Available at https://www.projectpeople.com/jobs/&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
===Cyber security incident analyst in SOC/CSIRT/CERT===&lt;br /&gt;
This article delves into the job title of Cyber Security Incident&lt;br /&gt;
Analyst and provides an overview of the acronyms SOC/CSIRT/CERT. A brief&lt;br /&gt;
history of the job is discussed here, as well as a possible career path,&lt;br /&gt;
education, experience, and other characteristics required for work in&lt;br /&gt;
computer security-related organizations. The article also provides a&lt;br /&gt;
brief history of SOC/CSIRT/CERT, as well as a comparison of their&lt;br /&gt;
differences and similarities.&lt;br /&gt;
===Cyber Security Incident Analyst Skill Set===&lt;br /&gt;
What skill set is expected from the Cyber Security Incident Analyst? Below written lines are taken from the same job advertisement depicted&lt;br /&gt;
on the left side of this article:&lt;br /&gt;
As a Security Incident Analyst your responsibilities will include:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Continuous monitoring of security tooling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Performing regular and ad-hoc vulnerability assessments&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Carrying out ‘spot checks’&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Reporting vulnerabilities to the PVG via the alerts system&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintaining and documenting logging systems&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Developing centralized logging, reporting and intelligence&lt;br /&gt;
platforms&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;‘Light touch’ penetration testing with open source tooling&lt;br /&gt;
(Metasploit)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Knowledge &amp;amp;amp; Experience required:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;SOC, CSIRT or CERT operational environment experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Windows / Linux experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TCP /IP networking protocol knowledge&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience reviewing and analyzing Security Events from various&lt;br /&gt;
monitoring and logging sources&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience in website and web application security assessment or&lt;br /&gt;
penetration testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience of using Metasploit&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Scripting knowledge using BASH, Python, Perl, Ruby&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Skills in Host and Network Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
As one can see the description of the duties is wide and also the&lt;br /&gt;
knowledge and experience that is required is noteworthy. So, where to&lt;br /&gt;
start to find out the way to get this kind of knowledge and&lt;br /&gt;
expertize.&lt;br /&gt;
===Possible career path===&lt;br /&gt;
Next part of the paper is aiming to depict a possible ways, how to&lt;br /&gt;
develop oneself, and move along the career pathway in cybersecurity&lt;br /&gt;
field. Topics of development, education, experience and certification&lt;br /&gt;
are covered.&lt;br /&gt;
[[File:analystimage2.png|700px|thumb|Career path &amp;lt;ref&amp;gt;&amp;quot;Possible Career Path&amp;quot;. Available at https://www.cyberseek.org/pathway.html&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
===Junior/Senior===&lt;br /&gt;
Start with an entry-level job in IT. Hands-on experience is often the&lt;br /&gt;
most effective way to prepare for certification exams. Start&lt;br /&gt;
accumulating work experience with an entry-level role as a cybersecurity&lt;br /&gt;
analyst. Many cybersecurity professionals start off in more general IT&lt;br /&gt;
roles. The skills, practices, and technologies you’ll use as a&lt;br /&gt;
cybersecurity professional will continue to evolve along with computer&lt;br /&gt;
and network technology. The desire to learn, ability to problem solve,&lt;br /&gt;
and attention to detail will serve you well in this field. Other, more&lt;br /&gt;
technical skills and technologies to learn include:&amp;lt;ref name=&amp;quot;certification&amp;quot;&amp;gt;Popular Cyber Security Certificates [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications  [Accessed 25 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====SIEM tools (security information and event management)====&lt;br /&gt;
Security Information and Event Management (SIEM) is a set of tools&lt;br /&gt;
and services offering a holistic view of an organization’s information&lt;br /&gt;
security. SIEM works by combining two technologies:&lt;br /&gt;
&amp;lt;li&amp;gt;Security information management (SIM), which collects data from log&lt;br /&gt;
files for analysis and reports on security threats and events, and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;security event management (SEM), which conducts real-time system&lt;br /&gt;
monitoring, notifies network admins about important issues and&lt;br /&gt;
establishes correlations between security events. There are a number of&lt;br /&gt;
security information and event management solutions on the market.&lt;br /&gt;
ArcSight ESM, IBM QRadar and Splunk are among the most popular. &amp;lt;ref name=&amp;quot;SIEM&amp;quot;&amp;gt;Application security, SIEM [Online]. Available: https://www.imperva.com/learn/application-security/siem/. [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Firewalls, Intrusion Detection Systems (IDS), and Intrusion Prevention Systems(IPS)====&lt;br /&gt;
Firewalls can be two types, hardware and software firewalls. Software&lt;br /&gt;
firewall is a firewall that is installed on a computer or server, and&lt;br /&gt;
tasked with network security. It works with a wide variety of other&lt;br /&gt;
technology security solutions to provide more robust and cohesive&lt;br /&gt;
security for enterprises of all sizes. When a software firewall is&lt;br /&gt;
installed on a server, it opens up like an umbrella of protection over&lt;br /&gt;
all other computers connected to the network. It is able to monitor both&lt;br /&gt;
incoming and outgoing traffic for potential risk or suspicious user&lt;br /&gt;
behavior, and also makes setting security policies much easier, faster&lt;br /&gt;
and more flexible. Hardware firewall is positioned between the network&lt;br /&gt;
and devices, allowing traffic to funnel through the firewall for a close&lt;br /&gt;
inspection and analysis. A hardware firewall, a term often&lt;br /&gt;
interchangeable with network or next-generation firewall, protects the&lt;br /&gt;
network gateways for an enterprise. Hardware firewall is physical&lt;br /&gt;
hardware, installed between network elements and connected devices, and&lt;br /&gt;
is tasked with filtering traffic for cyber threat to the network or&lt;br /&gt;
devices. Filtering out unauthorized or suspicious users based on traffic&lt;br /&gt;
analysis is one of the biggest benefits of hardware firewall. &amp;lt;ref name=&amp;quot;sangfor&amp;quot;&amp;gt;Sangfor, &amp;quot;What is Software Firewall? Difference between Hardware Firewall and Software Firewall, [Online]. Available: https://www.sangfor.com/blog/cybersecurity/what-is-software-firewall-difference-between-hardware-firewall-and-software-firewall [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems&lt;br /&gt;
(IPS) are both parts of the network infrastructure. IDS/IPS compare&lt;br /&gt;
network packets to a cyberthreat database containing known signatures of&lt;br /&gt;
cyberattacks — and flag any matching packets. IDS doesn’t alter the&lt;br /&gt;
network packets in any way, whereas IPS prevents the packet from&lt;br /&gt;
delivery based on the contents of the packet, much like how a firewall&lt;br /&gt;
prevents traffic by IP address. &amp;lt;ref name=&amp;quot;Varonis&amp;quot;&amp;gt;Varonis, &amp;quot;What is Software Firewall? IDS vs. IPS: What is the Difference?, [Online]. Available: https://www.varonis.com/blog/ids-vs-ips [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Digital forensics====&lt;br /&gt;
&amp;lt;p&amp;gt;Digital forensics is a branch of forensic science that focuses on&lt;br /&gt;
identifying, acquiring, processing, analyzing, and reporting on data&lt;br /&gt;
stored electronically. Electronic evidence is a component of almost all&lt;br /&gt;
criminal activities and digital forensics support is crucial for law&lt;br /&gt;
enforcement investigations. Electronic evidence can be collected from a&lt;br /&gt;
wide array of sources, such as computers, smartphones, remote storage,&lt;br /&gt;
unmanned aerial systems, shipborne equipment, and more.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.interpol.int/How-we-work/Innovation/Digital-forensics&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Investigative process of digital forensics can be divided into&lt;br /&gt;
several stages. There are four major stages: preservation, collection,&lt;br /&gt;
examination, and analysis.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.258.7882&amp;amp;amp;rep=rep1&amp;amp;amp;type=pdf&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;All these four stages need a deep understanding of computers,&lt;br /&gt;
technology across a broad spectrum, and cybersecurity principles and&lt;br /&gt;
practices, a working knowledge of computers, networks, and coding,&lt;br /&gt;
in-depth investigative abilities, critical-thinking skills and&lt;br /&gt;
analytical talent the ability to effectively communicate and work with a&lt;br /&gt;
wide range of people.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Mobile device management====&lt;br /&gt;
Mobile device management (MDM) is software that allows IT&lt;br /&gt;
administrators to control, secure and enforce policies on smartphones,&lt;br /&gt;
tablets and other endpoints. Mobile device management software emerged&lt;br /&gt;
in the early 2000s as a way to control and secure the personal digital&lt;br /&gt;
assistants and smartphones that business workers began to use. The&lt;br /&gt;
consumer smartphone boom that started with the launch of the Apple&lt;br /&gt;
iPhone in 2007 led to the bring your own device (BYOD) trend, which&lt;br /&gt;
fueled further interest in MDM.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.techtarget.com/searchmobilecomputing/definition/mobile-device-management&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Data management====&lt;br /&gt;
Sometimes the data management is neglected, but this part has a&lt;br /&gt;
crucial role when learning for good cyber security practices. Majority&lt;br /&gt;
of cyber security programs include a special courses on data management.&lt;br /&gt;
Data management is a method of organizing and maintaining data processes&lt;br /&gt;
that are required in almost every business operations. The benefits of&lt;br /&gt;
data management can be found accounting, statistics, logistics planning&lt;br /&gt;
and other disciplines including corporate computing.&lt;br /&gt;
&amp;lt;p&amp;gt;https://globaluniversities.in/msc-data-management-cyber-security/&amp;lt;/p&amp;gt;&lt;br /&gt;
Data governance (and management) play a fundamental role in&lt;br /&gt;
protecting an organization’s data. Ensuring that the right people have&lt;br /&gt;
the right access and that appropriate security controls are in place to&lt;br /&gt;
protect each system or service, based on the criticality or sensitivity&lt;br /&gt;
of the data sets these contain.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://cybersecurity-magazine.com/the-role-of-data-governance-in-cybersecurity/?utm_source=rss&amp;amp;amp;utm_medium=rss&amp;amp;amp;utm_campaign=the-role-of-data-governance-in-cybersecurity&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Application security development====&lt;br /&gt;
Application security describes security measures at the application&lt;br /&gt;
level that aim to prevent data or code within the app from being stolen&lt;br /&gt;
or hijacked. It encompasses the security considerations that happen&lt;br /&gt;
during application development and design, but it also involves systems&lt;br /&gt;
and approaches to protect apps after they get deployed. Application&lt;br /&gt;
security may include hardware, software, and procedures that identify or&lt;br /&gt;
minimize security vulnerabilities.&lt;br /&gt;
https://www.vmware.com/topics/glossary/content/application-security.html&lt;br /&gt;
Application security development is important to ensure that your&lt;br /&gt;
application is free from coding errors and bugs. And controls the risk&lt;br /&gt;
and helps safeguard against security vulnerabilities. Application&lt;br /&gt;
security development is the process of making applications more secure&lt;br /&gt;
by finding and fixing security vulnerabilities. This is often done by&lt;br /&gt;
enforcing software security best practices and using application&lt;br /&gt;
security testing tools.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.perforce.com/blog/kw/application-security-development-best-practices&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Audit and compliance knowledge====&lt;br /&gt;
A cyber security audit is designed to be a comprehensive review and&lt;br /&gt;
analysis of your business’s IT infrastructure. It identifies threats and&lt;br /&gt;
vulnerabilities, exposing weaknesses and high-risk practices.&lt;br /&gt;
Regulations such as the EU GDPR (General Data Protection Regulation) can&lt;br /&gt;
impose hefty penalties in the event of a breach that results in&lt;br /&gt;
exploited data. A cyber security audit will help mitigate the&lt;br /&gt;
consequences of a breach and demonstrate that your organization has&lt;br /&gt;
taken the necessary steps to protect client and company data.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://cyforsecure.co.uk/services/cyber-assessment/cyber-security-audit/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Cybersecurity compliance is the organizational risk management method&lt;br /&gt;
aligned with pre-defined security measures &amp;amp;amp; controls on how data&lt;br /&gt;
confidentiality is ensured by its administrational procedures.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://nordlayer.com/blog/cybersecurity-compliance-everything-you-need-to-know/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;All needed skills are developed through courses and&lt;br /&gt;
certification.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
===Entry-Level Incident Response Positions===&lt;br /&gt;
&amp;lt;p&amp;gt;It is not always possible to advance to the position of incident&lt;br /&gt;
responder in a straight line. Many professionals advance from entry- to&lt;br /&gt;
mid-level positions before becoming a real incident responder or a&lt;br /&gt;
member of a computer emergency response team (CERT).&amp;lt;br /&amp;gt;&lt;br /&gt;
These are some examples:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;network-administrator&amp;quot;&amp;gt;Network administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;This position’s experience will help potential incident responders&lt;br /&gt;
develop networking skills. Attention to detail, as well as the ability&lt;br /&gt;
to sift through system configurations, site layouts, and general network&lt;br /&gt;
and communication setups, are essential in this field.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;system-administrator&amp;quot;&amp;gt;System administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Another crucial beginning point for an incident responder is to learn&lt;br /&gt;
how to manage resources inside your organization as well as user&lt;br /&gt;
behavior. Understanding the potential damage that users, inadequate&lt;br /&gt;
security setups, and ineffective IT policies and procedures can cause on&lt;br /&gt;
your network can provide prospective candidates with insight into the&lt;br /&gt;
human component of an incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;security-administrator&amp;quot;&amp;gt;Security administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In such a position, basic hacking skills, penetration testing, and&lt;br /&gt;
intrusion detection are all learned, which are crucial incident&lt;br /&gt;
responder skills when trying to replicate a breach or attack.&lt;br /&gt;
Understanding the paths a cybercriminal will take when attempting to&lt;br /&gt;
damage or obtain access to a system can greatly simplify the work of&lt;br /&gt;
reverse engineering the incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://resources.infosecinstitute.com/topic/incident-responder-career-roadmap-entry-level-executive/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3 id=&amp;quot;mid-level-incident-response-positions&amp;quot;&amp;gt;Mid-Level Incident&lt;br /&gt;
Response Positions&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5&lt;br /&gt;
id=&amp;quot;computer-security-incident-response-team-csirt-engineer&amp;quot;&amp;gt;Computer&lt;br /&gt;
security incident response team (CSIRT) engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;cyber-incident-responder&amp;quot;&amp;gt;Cyber incident responder&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-response-engineer&amp;quot;&amp;gt;Incident response&lt;br /&gt;
engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;While each of these positions is different, they generally require&lt;br /&gt;
very similar skills and characteristics in a candidate. At this level,&lt;br /&gt;
personal characteristics such as problem solving, time management, and&lt;br /&gt;
even presentation skills become more crucial as one’s career evolves&lt;br /&gt;
into a management-facing role.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Technical skills include the ability to identify and minimize threats&lt;br /&gt;
while maintaining communication with management and the rest of your&lt;br /&gt;
team. Data analysis and evidence gathering become increasingly crucial,&lt;br /&gt;
and the circumstances in which your services are deployed get more&lt;br /&gt;
serious.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Problem-solving skills are crucial at this level of incident&lt;br /&gt;
response, and as the stakes rise, so does the pressure in each&lt;br /&gt;
situation. At this level, programming abilities are essential since&lt;br /&gt;
incident responders may be needed to reverse engineer malicious code or&lt;br /&gt;
even create patches for vulnerable network applications or services.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.coursera.org/articles/popular-cybersecurity-certifications&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3 id=&amp;quot;senior-level-incident-response-positions&amp;quot;&amp;gt;Senior-Level Incident&lt;br /&gt;
Response Positions&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;intrusion-detection-specialist&amp;quot;&amp;gt;Intrusion detection&lt;br /&gt;
specialist:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;A CISSP certification might help a potential candidate in preparing&lt;br /&gt;
for the profession. The role of an intrusion detection specialist is to&lt;br /&gt;
find and stop any unwanted communications.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-manager&amp;quot;&amp;gt;Incident manager:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Expected to plan, oversee, manage, and supervise all incident&lt;br /&gt;
response team actions. Is in charge of reporting all current events to&lt;br /&gt;
senior management and stakeholders, as well as acting as the technical&lt;br /&gt;
lead on active incidents for incident responders. Prepares threat and&lt;br /&gt;
impact assessments and reports them known to management.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.coursera.org/articles/popular-cybersecurity-certifications&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Certificates== &lt;br /&gt;
&amp;lt;ref name=&amp;quot;Coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated],&amp;quot; [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;NICCS&amp;quot;&amp;gt;NICCS, &amp;quot;Cybersecurity Certifications,&amp;quot; [Online]. Available: hhttps://niccs.cisa.gov/about-niccs/cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There is a vast number of different certificates and the road map to&lt;br /&gt;
being a certified professional could be very different. One possible&lt;br /&gt;
approach is to start with basic certificates from the different branches&lt;br /&gt;
of service and move to more specific and demanding focused&lt;br /&gt;
certification. Also, some jobs require certain clearances, either from&lt;br /&gt;
industry, or from the government. One small selection of different&lt;br /&gt;
possible certificates is brought out in following paragraphs.&lt;br /&gt;
&lt;br /&gt;
Security+ is a CompTIA certification that is considered a basic cert&lt;br /&gt;
among cybersecurity professionals. It covers the topics of risk&lt;br /&gt;
management and threat assessment.&lt;br /&gt;
Network+ is also offered by CompTIA this certification (like the name&lt;br /&gt;
implies) focuses on networking infrastructure and operations. It is&lt;br /&gt;
considered a foundational certification.&lt;br /&gt;
The Certified Information Systems Security Professional (CISSP) is a&lt;br /&gt;
more advanced certification designed for cybersecurity professionals&lt;br /&gt;
with at least five years of work experience. The certification covers&lt;br /&gt;
topics such as architecture, engineering, and management.&amp;lt;/p&amp;gt;&lt;br /&gt;
The Certified Ethical Hacker (CEH) certification is also considered a&lt;br /&gt;
more advanced cert because it generally requires that applicants have&lt;br /&gt;
multiple years of work experience. The goal of an ethical hacker&lt;br /&gt;
certification is to be able to understand how cyber attacks unfold in&lt;br /&gt;
order to improve threat assessment and mitigation skills.&amp;lt;ref name=&amp;quot;cyberguide&amp;quot;&amp;gt;Cybersecurity Guide, &amp;quot;How to become a cybersecurity specialist&amp;quot;, [Online]. Available: https://cybersecurityguide.org/careers/security-specialist/. [Accessed 27 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
This is definitely not all, when one looks for more information, following link could be searched, to get more in depth knowledge about&lt;br /&gt;
different possibilities. Hereby, with the help of this matrix a possible taxonomy of different 436 listed certificates in branches are&lt;br /&gt;
presented.&amp;lt;ref name=&amp;quot;Pauljeremy&amp;quot;&amp;gt;&amp;quot;Cybersecurity Roadmap,&amp;quot; [Online]. Available: https://pauljerimy.com/security-certification-roadmap. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:analystimage5.png|1000px|thumb|Certificate matrix &amp;lt;ref&amp;gt;&amp;quot;Certification roadmap&amp;quot;. Available at https://pauljerimy.com/security-certification-roadmap&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
=== Communication and Network Security===&lt;br /&gt;
Communication and network security covers the ability to secure&lt;br /&gt;
communication channels and networks. Topics include secure and converges&lt;br /&gt;
protocols, wireless networks, cellular networks, hardware operations&lt;br /&gt;
(warranty and redundant power), and third-party connectivity. IP&lt;br /&gt;
networking are also included in this domain.&lt;br /&gt;
===Identity and Access Management===&lt;br /&gt;
The identity and access management domain covers the attacks that&lt;br /&gt;
target the human gateway to gain access to data. Other topics include&lt;br /&gt;
ways to identify users with rights to access the information and&lt;br /&gt;
servers. Identity and access management covers the topics of&lt;br /&gt;
applications, Single sign-on authentication, privilege escalation,&lt;br /&gt;
Kerberos, rule-based or risk-based access control, proofing and&lt;br /&gt;
establishment of identity.&lt;br /&gt;
===Security Architecture and Engineering===&lt;br /&gt;
The security architecture and engineering domain covers important&lt;br /&gt;
topics concerning security engineering plans, designs and principles,&lt;br /&gt;
Topics include assessing and mitigating information system&lt;br /&gt;
vulnerabilities, fundamental concepts of security models and security&lt;br /&gt;
architectures in critical areas like access control. Cloud systems,&lt;br /&gt;
cryptography, system infiltrations (ransomware, fault-injection and&lt;br /&gt;
more) and virtualized systems are also covered in this domain.&lt;br /&gt;
===Asset Security===&lt;br /&gt;
The Asset Security domain deals with the issues related to the&lt;br /&gt;
collection, storage, maintenance, retention and destruction of data. It&lt;br /&gt;
also covers knowledge of different roles regarding data handling (owner,&lt;br /&gt;
controller and custodian) as well as data protection methods and data&lt;br /&gt;
states. Other topics include resource provision, asset classification&lt;br /&gt;
and data lifecycle management.&lt;br /&gt;
===Security and Risk Management===&lt;br /&gt;
The security and risk management domain covers general on skills&lt;br /&gt;
related to the implementation of user awareness programs as well as&lt;br /&gt;
security procedures. Emphasis is also placed on risk management&lt;br /&gt;
concerning the acquisition of new services, hardware and software&lt;br /&gt;
(supply chain). Other skills include social engineering defense&lt;br /&gt;
mechanisms.&lt;br /&gt;
===Security Assessment and Testing===&lt;br /&gt;
The security assessment and testing domain deals with all the&lt;br /&gt;
techniques and tools used to find system vulnerabilities, weaknesses and&lt;br /&gt;
potential areas of concern not addressed by security procedures and&lt;br /&gt;
policies. Attack simulations, vulnerability assessment, compliance&lt;br /&gt;
checks, and ethical disclosure also fall under this domain.&lt;br /&gt;
===Software Security===&lt;br /&gt;
The software development security domain deals with implementing&lt;br /&gt;
software-based security protocols within environment for which the IT&lt;br /&gt;
professional is responsible. Risk analysis, vulnerability identification&lt;br /&gt;
and auditing of source codes are all covered in this subset. Additional&lt;br /&gt;
topics include software-designed security, maturity models, development&lt;br /&gt;
methodologies, open-source and third-party development security.&lt;br /&gt;
===Security operations===&lt;br /&gt;
The security operations domain covers topics ranging from&lt;br /&gt;
investigations and digital forensic to detection and intrusion&lt;br /&gt;
prevention tools, sandboxing and firewalls. Topics include user and&lt;br /&gt;
entity behavior analytics, threat intelligence (threat hunting and&lt;br /&gt;
threat feeds) log management, artifacts (mobile, computer and network),&lt;br /&gt;
machine learning and AI-based tools, penetration testing, and&lt;br /&gt;
exploitation development. These for sub-domains are lister here.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Incident Handling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Penetration Testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Exploitation&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Education==&lt;br /&gt;
&amp;lt;p&amp;gt;The entry level monitoring specialist is hired by Estonian&lt;br /&gt;
Information System Authority even if there is no formal IT education,&lt;br /&gt;
but readiness to learn and moderate knowledge of different operation&lt;br /&gt;
systems is enough to start the career.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.cv.ee/en/vacancy/792782/riigi-infosusteemi-amet/seirespetsialist-tule-eesti-kuberruumi-valvuriks&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Nevertheless, like most other high qualification careers jobs falling&lt;br /&gt;
under the cybersecurity specialist category require some form of formal&lt;br /&gt;
education. However, since cybersecurity specialist jobs can fall across&lt;br /&gt;
a wide spectrum of job descriptions and responsibilities, it is possible&lt;br /&gt;
to obtain a specialist job after completing many levels of different&lt;br /&gt;
computer related education.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;If one is looking for a cybersecurity related education, for example&lt;br /&gt;
in EU, 137 courses/programs could be found that relate to keyword IT or&lt;br /&gt;
cybersecurity.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.enisa.europa.eu/topics/cybersecurity-education/education-map/education-courses&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Also, there is a great amount of discussion, if cuber security&lt;br /&gt;
professional should have a degree or would be certification just enough.&lt;br /&gt;
One interesting table is produces by Franklin University that compares&lt;br /&gt;
benefits and/or drawbacks of each type of credential.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image11.png&amp;quot; alt=&amp;quot;Comparison MSc vs certificate&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;Comparison MSc vs&lt;br /&gt;
certificate&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Certifications are generally good for people with little practical&lt;br /&gt;
experience because they are known quantities in the industry and can&lt;br /&gt;
help you get your foot in the door. They set a minimum knowledge bar.&lt;br /&gt;
But some certifications are viewed more favorably than others.&lt;br /&gt;
Certifications with renewal requirements are viewed better by hiring&lt;br /&gt;
managers, but they also more costly in the long run because of the need&lt;br /&gt;
for continuing education. Certifications are also good for showing&lt;br /&gt;
in-depth expertise in a specialization within cybersecurity. Depending&lt;br /&gt;
on your career goals, it may be advantageous to have a master’s&lt;br /&gt;
degree—which shows your breadth of knowledge, critical thinking and&lt;br /&gt;
leadership skills—and a certificate—which shows specific skill&lt;br /&gt;
competency.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;As IT (Cyber) Security is still a relatively young discipline,&lt;br /&gt;
universities and colleges are still figuring out which is the best&lt;br /&gt;
approach for their degrees. Study programmes and curricula in Cyber&lt;br /&gt;
Security are different. In general, here are the duration of Cyber&lt;br /&gt;
Security degrees:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Bachelor’s degrees in Cyber Security take 3 or 4 years in most&lt;br /&gt;
countries.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Master’s courses in Cyber Security take between 1-2 years to&lt;br /&gt;
complete.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;PhD programmes in Cyber Security last 3-5 years. Some only take 1&lt;br /&gt;
or 2 years, but they are less common.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Generalization could me made that on bachelor level the general&lt;br /&gt;
knowledge about the cyber issues are obtained. On master level the&lt;br /&gt;
specialization courses are taken and the person can choose more specific&lt;br /&gt;
topics to study. It is on master level where strengths of the cyber&lt;br /&gt;
specialist can be developed further and up-do date knowledge obtained in&lt;br /&gt;
specifics. PhD is serious science and involves teaching, lot of&lt;br /&gt;
scientific work and writing for publications.&amp;lt;/p&amp;gt;&lt;br /&gt;
==Salary==&lt;br /&gt;
&amp;lt;p&amp;gt;Even if the salary can be very different, compared to the skills and&lt;br /&gt;
experience, an generalization can be made. Cyber Security professionals&lt;br /&gt;
in CSIRT, and in other entities earn quite well, from the start. First,&lt;br /&gt;
some comparison from the United States. The average CSIRT analyst salary&lt;br /&gt;
in the USA is $97,500 per year or $50 per hour. Entry level positions&lt;br /&gt;
start at $48,875 per year while most experienced workers make up to&lt;br /&gt;
$135,373 per year.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.talent.com/salary?job=csirt+analyst&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;There are multiple positions you can occupy in this field. They have&lt;br /&gt;
in common great salaries and high demand for technical skills, attention&lt;br /&gt;
to details, problem-solving mentality, and the ability to analyze risks.&lt;br /&gt;
Here are the average annual salaries in the United States, according to&lt;br /&gt;
Payscale:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.payscale.com/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Cryptographer – 100,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Information Security Officer – 91,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Assessor – 90,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Engineer – 88,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Penetration Tester – 81,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Forensics Expert – 71,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Administrator – 65,000 USD&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When looking into salaries in Estonia, one can find that there is a&lt;br /&gt;
discussion that private sector is taking a toll from the public sector,&lt;br /&gt;
and that the salaries in important agencies, as Information System&lt;br /&gt;
Authority loose their employees to the better paid positions in private&lt;br /&gt;
sector.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://digi.geenius.ee/rubriik/uudis/kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad/&lt;br /&gt;
https://tehnika.postimees.ee/6887428/riigi-it-tootajate-palgamaarad-kasvasid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;But there is also a different view that average private sector worker&lt;br /&gt;
could be hired as a top specialist in public sector and then the payment&lt;br /&gt;
is higher. Nevertheless, it seems that the average payment in cyber&lt;br /&gt;
security sector is any way higher that in other parts of the&lt;br /&gt;
e-services.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://digi.geenius.ee/rubriik/uudis/5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka/&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
==SOC==&lt;br /&gt;
&amp;lt;p&amp;gt;A SOC is a facility where an organization’s network, applications,&lt;br /&gt;
and endpoints are monitored and defended. The term was adapted from&lt;br /&gt;
network operations centers (NOCs), where large telecommunication or&lt;br /&gt;
corporate networks are monitored. When network security became more of a&lt;br /&gt;
concern, security teams were formed within the NOCs, and eventually spun&lt;br /&gt;
off into larger organizations of their own as the responsibilities of&lt;br /&gt;
security teams grew increasingly complex and specialized. The security&lt;br /&gt;
staff working in a security operations center are often called the SOC&lt;br /&gt;
team.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Functions of the SOC team include, but are not limited to:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ol type=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Taking inventory of resources, to get a better understanding of the&lt;br /&gt;
structure they are protecting.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintanence of the system, by constantly making updates and adding&lt;br /&gt;
safeguards.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Monitoring the network for abnormalities with special tools.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Threat analysis of new attacks and vulnerabilities.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Responding to attacks, by acting as “first responders”. The SOC team&lt;br /&gt;
will shut down and/or isolate endpoints, deleting files and lowering the&lt;br /&gt;
impact as fast as possible.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Recovery of system stability and lost data. This may be done using&lt;br /&gt;
backups, restarting endpoints or reconfiguring systems.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Logging all actions on the system, to be later used for analysis or&lt;br /&gt;
forensics after an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigating the root cause of an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Auditing their own actions, to be in line with regulations of the&lt;br /&gt;
organization, industry or governing body.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.trellix.com/en-us/security-awareness/operations/what-is-soc.html&amp;lt;/p&amp;gt;&lt;br /&gt;
==CSIRT==&lt;br /&gt;
&amp;lt;p&amp;gt;A CSIRT is a group that responds to security incidents when they&lt;br /&gt;
occur. Key responsibilities of a CSIRT include:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
===Creating and maintaining an incident response plan (IRP)===&lt;br /&gt;
An incident response plan (IRP) is a set of written instructions for&lt;br /&gt;
detecting, responding to and limiting the effects of an information&lt;br /&gt;
security event. Incident response plans provide instructions for&lt;br /&gt;
responding to many potential scenarios, including data breaches, denial&lt;br /&gt;
of service/distributed denial of service attacks, firewall breaches,&lt;br /&gt;
virus or malware outbreaks or insider threats. Without an incident&lt;br /&gt;
response plan in place, organizations may either not detect the attack&lt;br /&gt;
in the first place, or not follow proper protocol to contain the threat&lt;br /&gt;
and recover from it when a breach is detected.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.stratacore.com/incidentresponseplan&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
===Investigating and analyzing incidents===&lt;br /&gt;
CSIRTs are also involved in improvement activities. After major&lt;br /&gt;
computer security incidents occur, or when incidents are not handled in&lt;br /&gt;
a timely or effective manner, a CSIRT will generally perform a&lt;br /&gt;
postmortem of the incident and its response. This postmortem will&lt;br /&gt;
identify the strengths and weakness of the response effort. Such reviews&lt;br /&gt;
can identify weaknesses and holes in systems, infrastructure defenses,&lt;br /&gt;
or policies that allowed the incident to take place. It can also&lt;br /&gt;
identify problems with communication channels, interfaces, and&lt;br /&gt;
procedures that inhibited the efficient resolution of the reported&lt;br /&gt;
problem.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.cisa.gov/uscert/bsi/articles/best-practices/incident-management/defining-computer-security-incident-response-teams&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Managing internal communications and updates during or immediately after incidents occur===&lt;br /&gt;
===Communicating with employees, shareholders, customers, and the press about incidents as needed===&lt;br /&gt;
&amp;lt;p&amp;gt;There are various services within the CSIRT Services Framework that&lt;br /&gt;
address communications, as they relate to security operations and&lt;br /&gt;
incident response services. Some of these include Information Security&lt;br /&gt;
Incident Coordination, Crisis Management Support, Vulnerability&lt;br /&gt;
Disclosure, Situational Awareness Communication, and Awareness Building,&lt;br /&gt;
to name a few. Sharing information and communicating with the general&lt;br /&gt;
public and/or your constituency is appropriate in many different&lt;br /&gt;
scenarios. These can range from proactive communications to reactive&lt;br /&gt;
communications. Each scenario may be unique, and careful consideration&lt;br /&gt;
should be given to when to release information to the public and what&lt;br /&gt;
information should be released.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;https://resources.sei.cmu.edu/asset_files/Handbook/2021_002_001_651819.pdf&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Remediating incidents===&lt;br /&gt;
&amp;lt;p&amp;gt;Threat remediation is a strong and capable tool for fighting the&lt;br /&gt;
cyber security compromises. As the word ‘remedy’ suggests, remediation&lt;br /&gt;
process involves the treatment of a security breach. With the&lt;br /&gt;
remediation practices, your cyber security team is able to eliminate&lt;br /&gt;
suspicious activities and malicious attacks in the form of malware,&lt;br /&gt;
ransomware, phishing and such. Even if you ‘kill’ the suspicious&lt;br /&gt;
activity, the attackers can remain in your systems. If you want to&lt;br /&gt;
contaminate and end the problem for good, your remediation processes&lt;br /&gt;
must involve the detection of the cause.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.logsign.com/blog/what-is-remediation-in-cyber-security/&amp;lt;/p&amp;gt;&lt;br /&gt;
=== Recommending technology, policy, governance, and training changes after security&lt;br /&gt;
incidents===&lt;br /&gt;
&amp;lt;p&amp;gt;After all these actions, the SCIRT must contribute to the development&lt;br /&gt;
of better policies, practices and has to recommend improvements. They&lt;br /&gt;
are not working in the vacuum and their work has to create new and&lt;br /&gt;
better standards for cyber security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
==CERT==&lt;br /&gt;
&amp;lt;p&amp;gt;The term “computer emergency response team” was coined in 1988. In&lt;br /&gt;
response to the Morris worm attack that impacted thousands of servers on&lt;br /&gt;
the Internet, DARPA funded the formation of the Computer Emergency&lt;br /&gt;
Response Team Coordination Center (CERT-CC) at Carnegie Mellon&lt;br /&gt;
University. The goal of CERT-CC was to help protect the internet by&lt;br /&gt;
collecting and disseminating information on critical security&lt;br /&gt;
vulnerabilities. Several other countries formed similar centers using&lt;br /&gt;
the same acronym (despite threats of legal action by Carnegie Mellon for&lt;br /&gt;
trademark infringement). Now the term CERT refers to any emergency&lt;br /&gt;
response team that deals with cyber threats. Many people use CERT-CC&lt;br /&gt;
interchangeably with CSIRT, though the charter of a CERT is information&lt;br /&gt;
sharing in order to help other response teams respond to threats against&lt;br /&gt;
their own infrastructure.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In general, the designation of CERT is helpful in applying real-world&lt;br /&gt;
solutions to various cybersecurity problems. They may be government&lt;br /&gt;
contractors or employees of a major corporation. For example, the U.S.&lt;br /&gt;
Computer Emergency Readiness Team (US-CERT) operates under the U.S.&lt;br /&gt;
Department of Homeland Security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.techopedia.com/definition/31003/computer-emergency-response-team-cert&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In Estonia CERT is designated as CERT-EE. It was established in 2006,&lt;br /&gt;
as an organization responsible for the management of security incidents&lt;br /&gt;
in .ee computer networks. It is also a national contact point for&lt;br /&gt;
international co-operation in the field of IT security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ria.ee/en/cyber-security/cert-ee.html&amp;lt;/p&amp;gt;&lt;br /&gt;
===Difference between SOC/CSIRT/CERT===&lt;br /&gt;
&amp;lt;p&amp;gt;How CSIRTs differ from CERTs and SOCs There are overlapping&lt;br /&gt;
responsibilities between a community emergency response team (CERT),&lt;br /&gt;
computer security incident response team (CSIRT), and security&lt;br /&gt;
operations center (SOC). To add to this confusion, frequently, the terms&lt;br /&gt;
CERT and CSIRT are used interchangeably, despite the important&lt;br /&gt;
differences.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image3.png&amp;quot; alt=&amp;quot;Overlapping in images/image3.png&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;Overlapping in&lt;br /&gt;
images/image3.png&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
==Understand the primary roles and characteristics of a CERT, CSIRT, and SOC.==&lt;br /&gt;
&amp;lt;p&amp;gt;So, using strict definitions, a CERT collects and disseminates&lt;br /&gt;
security information, typically for the benefit of a country or an&lt;br /&gt;
industry. A CSIRT is a cross-functional team that responds to incidents&lt;br /&gt;
on behalf of a country or an organization. A SOC is where a country or&lt;br /&gt;
organization monitors and defends its network, servers, applications,&lt;br /&gt;
and endpoints.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image4.png&amp;quot; alt=&amp;quot;table of explanation images/image4&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;table of explanation&lt;br /&gt;
images/image4&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
==Future==&lt;br /&gt;
&amp;lt;p&amp;gt;And the Cyber security problem is only getting bigger. According to a&lt;br /&gt;
report published by Accenture, the number of cyber security breaches&lt;br /&gt;
increased by 11 percent from 2017 to 2018. The cost of such breaches is&lt;br /&gt;
astronomical–about $600 billion worldwide, according to the Economic&lt;br /&gt;
Impact of Cybercrime report.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Job projections for cybersecurity are staggering. The Bureau of Labor&lt;br /&gt;
Statistics in US predicts that careers in the cybersecurity field will&lt;br /&gt;
grow by 32% by 2028. That makes cybersecurity one of the top 10&lt;br /&gt;
fastest-growing jobs in the country. In the United States alone, jobs&lt;br /&gt;
for Information Security Analysts are expected to grow by 15% by&lt;br /&gt;
2024.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Most likely this trend is also similar in other countries.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When checking Estonian job portals, there is a constant need for&lt;br /&gt;
people for cyber security related positions. Also, linkedin search gives&lt;br /&gt;
approximately 30 vacancies immediately. There are banks, logistics&lt;br /&gt;
companies, e-shops, and software producers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://ee.linkedin.com/jobs/cyber-security-jobs?countryRedirected=1&amp;amp;amp;position=1&amp;amp;amp;pageNum=0&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Trends that affect companies create need for constant cyber security&lt;br /&gt;
services. Increasing number of home/remote offices require secure&lt;br /&gt;
corporate networks and security of remote devices. One example is from&lt;br /&gt;
this year, when sloppy remote desktop set-up paralyzed systems of 17&lt;br /&gt;
companies.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.aripaev.ee/uudised/2022/04/20/ria-lohakas-kaugtoolaua-seadistus-halvas-martsis-vahemalt-17-juhul-ettevotete-it-susteemid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Also, no service can exists without robust infrastructure - servers,&lt;br /&gt;
databases, applications. As all previously mentioned devices and&lt;br /&gt;
services are at constant scanning and surveillance. So, the breach&lt;br /&gt;
detection and immediate action demands 24/7 services. Even if lot of&lt;br /&gt;
things could be automated, there is a need for human specialists (at&lt;br /&gt;
least, at the moment). Third growing field is also a forensic&lt;br /&gt;
investigation, as every attack must be investigated in order to be ready&lt;br /&gt;
to repel next attacks. So data recovery and evidence collection is&lt;br /&gt;
another important field of work that need skilled and professional&lt;br /&gt;
workers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Even, if the specifics of the entity, be it CSIRT, CERT or SOC, are&lt;br /&gt;
different, the fundamentals of the work are the same. Professional&lt;br /&gt;
knowledge of the networks, operational systems, hardware, scripting, and&lt;br /&gt;
several other wider IT related knowledge is needed. As there is no&lt;br /&gt;
single way to reach to it, every single person can find one’s strongest&lt;br /&gt;
sides and develop them with knowledge of weaker side, in order to know,&lt;br /&gt;
when to as for help.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/body&amp;gt;&lt;br /&gt;
&amp;lt;/html&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mavald</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142166</id>
		<title>Hiring a Cyber Security Incident Analyst</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Hiring_a_Cyber_Security_Incident_Analyst&amp;diff=142166"/>
		<updated>2022-05-01T14:13:38Z</updated>

		<summary type="html">&lt;p&gt;Mavald: /* Certificates */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==A Cyber Security Incident Analyst==&lt;br /&gt;
&lt;br /&gt;
[[File:image1.png|600px|thumb|Job advertisement &amp;lt;ref&amp;gt;&amp;quot;Job Advertisement&amp;quot;. Available at https://www.projectpeople.com/jobs/&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
===Cyber security incident analyst in SOC/CSIRT/CERT===&lt;br /&gt;
This article delves into the job title of Cyber Security Incident&lt;br /&gt;
Analyst and provides an overview of the acronyms SOC/CSIRT/CERT. A brief&lt;br /&gt;
history of the job is discussed here, as well as a possible career path,&lt;br /&gt;
education, experience, and other characteristics required for work in&lt;br /&gt;
computer security-related organizations. The article also provides a&lt;br /&gt;
brief history of SOC/CSIRT/CERT, as well as a comparison of their&lt;br /&gt;
differences and similarities.&lt;br /&gt;
===Cyber Security Incident Analyst Skill Set===&lt;br /&gt;
What skill set is expected from the Cyber Security Incident Analyst? Below written lines are taken from the same job advertisement depicted&lt;br /&gt;
on the left side of this article:&lt;br /&gt;
As a Security Incident Analyst your responsibilities will include:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Continuous monitoring of security tooling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Performing regular and ad-hoc vulnerability assessments&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Carrying out ‘spot checks’&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Reporting vulnerabilities to the PVG via the alerts system&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintaining and documenting logging systems&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Developing centralized logging, reporting and intelligence&lt;br /&gt;
platforms&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;‘Light touch’ penetration testing with open source tooling&lt;br /&gt;
(Metasploit)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Knowledge &amp;amp;amp; Experience required:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;SOC, CSIRT or CERT operational environment experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Windows / Linux experience&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TCP /IP networking protocol knowledge&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience reviewing and analyzing Security Events from various&lt;br /&gt;
monitoring and logging sources&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience in website and web application security assessment or&lt;br /&gt;
penetration testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Experience of using Metasploit&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Scripting knowledge using BASH, Python, Perl, Ruby&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Skills in Host and Network Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
As one can see the description of the duties is wide and also the&lt;br /&gt;
knowledge and experience that is required is noteworthy. So, where to&lt;br /&gt;
start to find out the way to get this kind of knowledge and&lt;br /&gt;
expertize.&lt;br /&gt;
===Possible career path===&lt;br /&gt;
Next part of the paper is aiming to depict a possible ways, how to&lt;br /&gt;
develop oneself, and move along the career pathway in cybersecurity&lt;br /&gt;
field. Topics of development, education, experience and certification&lt;br /&gt;
are covered.&lt;br /&gt;
[[File:analystimage2.png|700px|thumb|Career path &amp;lt;ref&amp;gt;&amp;quot;Possible Career Path&amp;quot;. Available at https://www.cyberseek.org/pathway.html&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
===Junior/Senior===&lt;br /&gt;
Start with an entry-level job in IT. Hands-on experience is often the&lt;br /&gt;
most effective way to prepare for certification exams. Start&lt;br /&gt;
accumulating work experience with an entry-level role as a cybersecurity&lt;br /&gt;
analyst. Many cybersecurity professionals start off in more general IT&lt;br /&gt;
roles. The skills, practices, and technologies you’ll use as a&lt;br /&gt;
cybersecurity professional will continue to evolve along with computer&lt;br /&gt;
and network technology. The desire to learn, ability to problem solve,&lt;br /&gt;
and attention to detail will serve you well in this field. Other, more&lt;br /&gt;
technical skills and technologies to learn include:&amp;lt;ref name=&amp;quot;certification&amp;quot;&amp;gt;Popular Cyber Security Certificates [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications  [Accessed 25 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====SIEM tools (security information and event management)====&lt;br /&gt;
Security Information and Event Management (SIEM) is a set of tools&lt;br /&gt;
and services offering a holistic view of an organization’s information&lt;br /&gt;
security. SIEM works by combining two technologies:&lt;br /&gt;
&amp;lt;li&amp;gt;Security information management (SIM), which collects data from log&lt;br /&gt;
files for analysis and reports on security threats and events, and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;security event management (SEM), which conducts real-time system&lt;br /&gt;
monitoring, notifies network admins about important issues and&lt;br /&gt;
establishes correlations between security events. There are a number of&lt;br /&gt;
security information and event management solutions on the market.&lt;br /&gt;
ArcSight ESM, IBM QRadar and Splunk are among the most popular. &amp;lt;ref name=&amp;quot;SIEM&amp;quot;&amp;gt;Application security, SIEM [Online]. Available: https://www.imperva.com/learn/application-security/siem/. [Accessed 27 4 2022].&amp;lt;/ref&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Firewalls, Intrusion Detection Systems (IDS), and Intrusion Prevention Systems(IPS)====&lt;br /&gt;
Firewalls can be two types, hardware and software firewalls. Software&lt;br /&gt;
firewall is a firewall that is installed on a computer or server, and&lt;br /&gt;
tasked with network security. It works with a wide variety of other&lt;br /&gt;
technology security solutions to provide more robust and cohesive&lt;br /&gt;
security for enterprises of all sizes. When a software firewall is&lt;br /&gt;
installed on a server, it opens up like an umbrella of protection over&lt;br /&gt;
all other computers connected to the network. It is able to monitor both&lt;br /&gt;
incoming and outgoing traffic for potential risk or suspicious user&lt;br /&gt;
behavior, and also makes setting security policies much easier, faster&lt;br /&gt;
and more flexible. Hardware firewall is positioned between the network&lt;br /&gt;
and devices, allowing traffic to funnel through the firewall for a close&lt;br /&gt;
inspection and analysis. A hardware firewall, a term often&lt;br /&gt;
interchangeable with network or next-generation firewall, protects the&lt;br /&gt;
network gateways for an enterprise. Hardware firewall is physical&lt;br /&gt;
hardware, installed between network elements and connected devices, and&lt;br /&gt;
is tasked with filtering traffic for cyber threat to the network or&lt;br /&gt;
devices. Filtering out unauthorized or suspicious users based on traffic&lt;br /&gt;
analysis is one of the biggest benefits of hardware firewall. &amp;lt;ref name=&amp;quot;sangfor&amp;quot;&amp;gt;Sangfor, &amp;quot;What is Software Firewall? Difference between Hardware Firewall and Software Firewall, [Online]. Available: https://www.sangfor.com/blog/cybersecurity/what-is-software-firewall-difference-between-hardware-firewall-and-software-firewall [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems&lt;br /&gt;
(IPS) are both parts of the network infrastructure. IDS/IPS compare&lt;br /&gt;
network packets to a cyberthreat database containing known signatures of&lt;br /&gt;
cyberattacks — and flag any matching packets. IDS doesn’t alter the&lt;br /&gt;
network packets in any way, whereas IPS prevents the packet from&lt;br /&gt;
delivery based on the contents of the packet, much like how a firewall&lt;br /&gt;
prevents traffic by IP address. &amp;lt;ref name=&amp;quot;Varonis&amp;quot;&amp;gt;Varonis, &amp;quot;What is Software Firewall? IDS vs. IPS: What is the Difference?, [Online]. Available: https://www.varonis.com/blog/ids-vs-ips [Accessed 26 4 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Digital forensics====&lt;br /&gt;
&amp;lt;p&amp;gt;Digital forensics is a branch of forensic science that focuses on&lt;br /&gt;
identifying, acquiring, processing, analyzing, and reporting on data&lt;br /&gt;
stored electronically. Electronic evidence is a component of almost all&lt;br /&gt;
criminal activities and digital forensics support is crucial for law&lt;br /&gt;
enforcement investigations. Electronic evidence can be collected from a&lt;br /&gt;
wide array of sources, such as computers, smartphones, remote storage,&lt;br /&gt;
unmanned aerial systems, shipborne equipment, and more.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.interpol.int/How-we-work/Innovation/Digital-forensics&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Investigative process of digital forensics can be divided into&lt;br /&gt;
several stages. There are four major stages: preservation, collection,&lt;br /&gt;
examination, and analysis.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.258.7882&amp;amp;amp;rep=rep1&amp;amp;amp;type=pdf&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;All these four stages need a deep understanding of computers,&lt;br /&gt;
technology across a broad spectrum, and cybersecurity principles and&lt;br /&gt;
practices, a working knowledge of computers, networks, and coding,&lt;br /&gt;
in-depth investigative abilities, critical-thinking skills and&lt;br /&gt;
analytical talent the ability to effectively communicate and work with a&lt;br /&gt;
wide range of people.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Mobile device management====&lt;br /&gt;
Mobile device management (MDM) is software that allows IT&lt;br /&gt;
administrators to control, secure and enforce policies on smartphones,&lt;br /&gt;
tablets and other endpoints. Mobile device management software emerged&lt;br /&gt;
in the early 2000s as a way to control and secure the personal digital&lt;br /&gt;
assistants and smartphones that business workers began to use. The&lt;br /&gt;
consumer smartphone boom that started with the launch of the Apple&lt;br /&gt;
iPhone in 2007 led to the bring your own device (BYOD) trend, which&lt;br /&gt;
fueled further interest in MDM.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.techtarget.com/searchmobilecomputing/definition/mobile-device-management&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Data management====&lt;br /&gt;
Sometimes the data management is neglected, but this part has a&lt;br /&gt;
crucial role when learning for good cyber security practices. Majority&lt;br /&gt;
of cyber security programs include a special courses on data management.&lt;br /&gt;
Data management is a method of organizing and maintaining data processes&lt;br /&gt;
that are required in almost every business operations. The benefits of&lt;br /&gt;
data management can be found accounting, statistics, logistics planning&lt;br /&gt;
and other disciplines including corporate computing.&lt;br /&gt;
&amp;lt;p&amp;gt;https://globaluniversities.in/msc-data-management-cyber-security/&amp;lt;/p&amp;gt;&lt;br /&gt;
Data governance (and management) play a fundamental role in&lt;br /&gt;
protecting an organization’s data. Ensuring that the right people have&lt;br /&gt;
the right access and that appropriate security controls are in place to&lt;br /&gt;
protect each system or service, based on the criticality or sensitivity&lt;br /&gt;
of the data sets these contain.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://cybersecurity-magazine.com/the-role-of-data-governance-in-cybersecurity/?utm_source=rss&amp;amp;amp;utm_medium=rss&amp;amp;amp;utm_campaign=the-role-of-data-governance-in-cybersecurity&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Application security development====&lt;br /&gt;
Application security describes security measures at the application&lt;br /&gt;
level that aim to prevent data or code within the app from being stolen&lt;br /&gt;
or hijacked. It encompasses the security considerations that happen&lt;br /&gt;
during application development and design, but it also involves systems&lt;br /&gt;
and approaches to protect apps after they get deployed. Application&lt;br /&gt;
security may include hardware, software, and procedures that identify or&lt;br /&gt;
minimize security vulnerabilities.&lt;br /&gt;
https://www.vmware.com/topics/glossary/content/application-security.html&lt;br /&gt;
Application security development is important to ensure that your&lt;br /&gt;
application is free from coding errors and bugs. And controls the risk&lt;br /&gt;
and helps safeguard against security vulnerabilities. Application&lt;br /&gt;
security development is the process of making applications more secure&lt;br /&gt;
by finding and fixing security vulnerabilities. This is often done by&lt;br /&gt;
enforcing software security best practices and using application&lt;br /&gt;
security testing tools.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.perforce.com/blog/kw/application-security-development-best-practices&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Audit and compliance knowledge====&lt;br /&gt;
A cyber security audit is designed to be a comprehensive review and&lt;br /&gt;
analysis of your business’s IT infrastructure. It identifies threats and&lt;br /&gt;
vulnerabilities, exposing weaknesses and high-risk practices.&lt;br /&gt;
Regulations such as the EU GDPR (General Data Protection Regulation) can&lt;br /&gt;
impose hefty penalties in the event of a breach that results in&lt;br /&gt;
exploited data. A cyber security audit will help mitigate the&lt;br /&gt;
consequences of a breach and demonstrate that your organization has&lt;br /&gt;
taken the necessary steps to protect client and company data.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://cyforsecure.co.uk/services/cyber-assessment/cyber-security-audit/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Cybersecurity compliance is the organizational risk management method&lt;br /&gt;
aligned with pre-defined security measures &amp;amp;amp; controls on how data&lt;br /&gt;
confidentiality is ensured by its administrational procedures.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://nordlayer.com/blog/cybersecurity-compliance-everything-you-need-to-know/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;All needed skills are developed through courses and&lt;br /&gt;
certification.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
===Entry-Level Incident Response Positions===&lt;br /&gt;
&amp;lt;p&amp;gt;It is not always possible to advance to the position of incident&lt;br /&gt;
responder in a straight line. Many professionals advance from entry- to&lt;br /&gt;
mid-level positions before becoming a real incident responder or a&lt;br /&gt;
member of a computer emergency response team (CERT).&amp;lt;br /&amp;gt;&lt;br /&gt;
These are some examples:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;network-administrator&amp;quot;&amp;gt;Network administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;This position’s experience will help potential incident responders&lt;br /&gt;
develop networking skills. Attention to detail, as well as the ability&lt;br /&gt;
to sift through system configurations, site layouts, and general network&lt;br /&gt;
and communication setups, are essential in this field.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;system-administrator&amp;quot;&amp;gt;System administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Another crucial beginning point for an incident responder is to learn&lt;br /&gt;
how to manage resources inside your organization as well as user&lt;br /&gt;
behavior. Understanding the potential damage that users, inadequate&lt;br /&gt;
security setups, and ineffective IT policies and procedures can cause on&lt;br /&gt;
your network can provide prospective candidates with insight into the&lt;br /&gt;
human component of an incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;security-administrator&amp;quot;&amp;gt;Security administrator&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In such a position, basic hacking skills, penetration testing, and&lt;br /&gt;
intrusion detection are all learned, which are crucial incident&lt;br /&gt;
responder skills when trying to replicate a breach or attack.&lt;br /&gt;
Understanding the paths a cybercriminal will take when attempting to&lt;br /&gt;
damage or obtain access to a system can greatly simplify the work of&lt;br /&gt;
reverse engineering the incident.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://resources.infosecinstitute.com/topic/incident-responder-career-roadmap-entry-level-executive/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3 id=&amp;quot;mid-level-incident-response-positions&amp;quot;&amp;gt;Mid-Level Incident&lt;br /&gt;
Response Positions&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5&lt;br /&gt;
id=&amp;quot;computer-security-incident-response-team-csirt-engineer&amp;quot;&amp;gt;Computer&lt;br /&gt;
security incident response team (CSIRT) engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;cyber-incident-responder&amp;quot;&amp;gt;Cyber incident responder&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-response-engineer&amp;quot;&amp;gt;Incident response&lt;br /&gt;
engineer&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;While each of these positions is different, they generally require&lt;br /&gt;
very similar skills and characteristics in a candidate. At this level,&lt;br /&gt;
personal characteristics such as problem solving, time management, and&lt;br /&gt;
even presentation skills become more crucial as one’s career evolves&lt;br /&gt;
into a management-facing role.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Technical skills include the ability to identify and minimize threats&lt;br /&gt;
while maintaining communication with management and the rest of your&lt;br /&gt;
team. Data analysis and evidence gathering become increasingly crucial,&lt;br /&gt;
and the circumstances in which your services are deployed get more&lt;br /&gt;
serious.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Problem-solving skills are crucial at this level of incident&lt;br /&gt;
response, and as the stakes rise, so does the pressure in each&lt;br /&gt;
situation. At this level, programming abilities are essential since&lt;br /&gt;
incident responders may be needed to reverse engineer malicious code or&lt;br /&gt;
even create patches for vulnerable network applications or services.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.coursera.org/articles/popular-cybersecurity-certifications&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3 id=&amp;quot;senior-level-incident-response-positions&amp;quot;&amp;gt;Senior-Level Incident&lt;br /&gt;
Response Positions&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;intrusion-detection-specialist&amp;quot;&amp;gt;Intrusion detection&lt;br /&gt;
specialist:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;A CISSP certification might help a potential candidate in preparing&lt;br /&gt;
for the profession. The role of an intrusion detection specialist is to&lt;br /&gt;
find and stop any unwanted communications.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;h5 id=&amp;quot;incident-manager&amp;quot;&amp;gt;Incident manager:&amp;lt;/h5&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Expected to plan, oversee, manage, and supervise all incident&lt;br /&gt;
response team actions. Is in charge of reporting all current events to&lt;br /&gt;
senior management and stakeholders, as well as acting as the technical&lt;br /&gt;
lead on active incidents for incident responders. Prepares threat and&lt;br /&gt;
impact assessments and reports them known to management.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.coursera.org/articles/popular-cybersecurity-certifications&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Certificates== &lt;br /&gt;
&amp;lt;ref name=&amp;quot;Coursera&amp;quot;&amp;gt;Coursera, &amp;quot;10 Popular Cybersecurity Certifications [2022 Updated],&amp;quot; [Online]. Available: https://www.coursera.org/articles/popular-cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;NICCS&amp;quot;&amp;gt;NICCS, &amp;quot;Cybersecurity Certifications,&amp;quot; [Online]. Available: hhttps://niccs.cisa.gov/about-niccs/cybersecurity-certifications. [Accessed 30 Apr 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;https://pauljerimy.com/security-certification-roadmap/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There is a vast number of different certificates and the road map to&lt;br /&gt;
being a certified professional could be very different. One possible&lt;br /&gt;
approach is to start with basic certificates from the different branches&lt;br /&gt;
of service and move to more specific and demanding focused&lt;br /&gt;
certification. Also, some jobs require certain clearances, either from&lt;br /&gt;
industry, or from the government. One small selection of different&lt;br /&gt;
possible certificates is brought out in following paragraphs.&lt;br /&gt;
&lt;br /&gt;
Security+ is a CompTIA certification that is considered a basic cert&lt;br /&gt;
among cybersecurity professionals. It covers the topics of risk&lt;br /&gt;
management and threat assessment.&lt;br /&gt;
Network+ is also offered by CompTIA this certification (like the name&lt;br /&gt;
implies) focuses on networking infrastructure and operations. It is&lt;br /&gt;
considered a foundational certification.&lt;br /&gt;
The Certified Information Systems Security Professional (CISSP) is a&lt;br /&gt;
more advanced certification designed for cybersecurity professionals&lt;br /&gt;
with at least five years of work experience. The certification covers&lt;br /&gt;
topics such as architecture, engineering, and management.&amp;lt;/p&amp;gt;&lt;br /&gt;
The Certified Ethical Hacker (CEH) certification is also considered a&lt;br /&gt;
more advanced cert because it generally requires that applicants have&lt;br /&gt;
multiple years of work experience. The goal of an ethical hacker&lt;br /&gt;
certification is to be able to understand how cyber attacks unfold in&lt;br /&gt;
order to improve threat assessment and mitigation skills.&amp;lt;ref name=&amp;quot;cyberguide&amp;quot;&amp;gt;Cybersecurity Guide, &amp;quot;How to become a cybersecurity specialist&amp;quot;, [Online]. Available: https://cybersecurityguide.org/careers/security-specialist/. [Accessed 27 April 2022].&amp;lt;/ref&amp;gt;&lt;br /&gt;
This is definitely not all, when one looks for more information, following link could be searched, to get more in depth knowledge about&lt;br /&gt;
different possibilities. Hereby, with the help of this matrix a possible taxonomy of different 436 listed certificates in branches are&lt;br /&gt;
presented.&lt;br /&gt;
&lt;br /&gt;
[[File:analystimage5.png|1000px|thumb|Certificate matrix &amp;lt;ref&amp;gt;&amp;quot;Certification roadmap&amp;quot;. Available at https://pauljerimy.com/security-certification-roadmap&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
=== Communication and Network Security===&lt;br /&gt;
Communication and network security covers the ability to secure&lt;br /&gt;
communication channels and networks. Topics include secure and converges&lt;br /&gt;
protocols, wireless networks, cellular networks, hardware operations&lt;br /&gt;
(warranty and redundant power), and third-party connectivity. IP&lt;br /&gt;
networking are also included in this domain.&lt;br /&gt;
===Identity and Access Management===&lt;br /&gt;
The identity and access management domain covers the attacks that&lt;br /&gt;
target the human gateway to gain access to data. Other topics include&lt;br /&gt;
ways to identify users with rights to access the information and&lt;br /&gt;
servers. Identity and access management covers the topics of&lt;br /&gt;
applications, Single sign-on authentication, privilege escalation,&lt;br /&gt;
Kerberos, rule-based or risk-based access control, proofing and&lt;br /&gt;
establishment of identity.&lt;br /&gt;
===Security Architecture and Engineering===&lt;br /&gt;
The security architecture and engineering domain covers important&lt;br /&gt;
topics concerning security engineering plans, designs and principles,&lt;br /&gt;
Topics include assessing and mitigating information system&lt;br /&gt;
vulnerabilities, fundamental concepts of security models and security&lt;br /&gt;
architectures in critical areas like access control. Cloud systems,&lt;br /&gt;
cryptography, system infiltrations (ransomware, fault-injection and&lt;br /&gt;
more) and virtualized systems are also covered in this domain.&lt;br /&gt;
===Asset Security===&lt;br /&gt;
The Asset Security domain deals with the issues related to the&lt;br /&gt;
collection, storage, maintenance, retention and destruction of data. It&lt;br /&gt;
also covers knowledge of different roles regarding data handling (owner,&lt;br /&gt;
controller and custodian) as well as data protection methods and data&lt;br /&gt;
states. Other topics include resource provision, asset classification&lt;br /&gt;
and data lifecycle management.&lt;br /&gt;
===Security and Risk Management===&lt;br /&gt;
The security and risk management domain covers general on skills&lt;br /&gt;
related to the implementation of user awareness programs as well as&lt;br /&gt;
security procedures. Emphasis is also placed on risk management&lt;br /&gt;
concerning the acquisition of new services, hardware and software&lt;br /&gt;
(supply chain). Other skills include social engineering defense&lt;br /&gt;
mechanisms.&lt;br /&gt;
===Security Assessment and Testing===&lt;br /&gt;
The security assessment and testing domain deals with all the&lt;br /&gt;
techniques and tools used to find system vulnerabilities, weaknesses and&lt;br /&gt;
potential areas of concern not addressed by security procedures and&lt;br /&gt;
policies. Attack simulations, vulnerability assessment, compliance&lt;br /&gt;
checks, and ethical disclosure also fall under this domain.&lt;br /&gt;
===Software Security===&lt;br /&gt;
The software development security domain deals with implementing&lt;br /&gt;
software-based security protocols within environment for which the IT&lt;br /&gt;
professional is responsible. Risk analysis, vulnerability identification&lt;br /&gt;
and auditing of source codes are all covered in this subset. Additional&lt;br /&gt;
topics include software-designed security, maturity models, development&lt;br /&gt;
methodologies, open-source and third-party development security.&lt;br /&gt;
===Security operations===&lt;br /&gt;
The security operations domain covers topics ranging from&lt;br /&gt;
investigations and digital forensic to detection and intrusion&lt;br /&gt;
prevention tools, sandboxing and firewalls. Topics include user and&lt;br /&gt;
entity behavior analytics, threat intelligence (threat hunting and&lt;br /&gt;
threat feeds) log management, artifacts (mobile, computer and network),&lt;br /&gt;
machine learning and AI-based tools, penetration testing, and&lt;br /&gt;
exploitation development. These for sub-domains are lister here.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Forensics&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Incident Handling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Penetration Testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Exploitation&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Education==&lt;br /&gt;
&amp;lt;p&amp;gt;The entry level monitoring specialist is hired by Estonian&lt;br /&gt;
Information System Authority even if there is no formal IT education,&lt;br /&gt;
but readiness to learn and moderate knowledge of different operation&lt;br /&gt;
systems is enough to start the career.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.cv.ee/en/vacancy/792782/riigi-infosusteemi-amet/seirespetsialist-tule-eesti-kuberruumi-valvuriks&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Nevertheless, like most other high qualification careers jobs falling&lt;br /&gt;
under the cybersecurity specialist category require some form of formal&lt;br /&gt;
education. However, since cybersecurity specialist jobs can fall across&lt;br /&gt;
a wide spectrum of job descriptions and responsibilities, it is possible&lt;br /&gt;
to obtain a specialist job after completing many levels of different&lt;br /&gt;
computer related education.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;If one is looking for a cybersecurity related education, for example&lt;br /&gt;
in EU, 137 courses/programs could be found that relate to keyword IT or&lt;br /&gt;
cybersecurity.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.enisa.europa.eu/topics/cybersecurity-education/education-map/education-courses&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Also, there is a great amount of discussion, if cuber security&lt;br /&gt;
professional should have a degree or would be certification just enough.&lt;br /&gt;
One interesting table is produces by Franklin University that compares&lt;br /&gt;
benefits and/or drawbacks of each type of credential.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image11.png&amp;quot; alt=&amp;quot;Comparison MSc vs certificate&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;Comparison MSc vs&lt;br /&gt;
certificate&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Certifications are generally good for people with little practical&lt;br /&gt;
experience because they are known quantities in the industry and can&lt;br /&gt;
help you get your foot in the door. They set a minimum knowledge bar.&lt;br /&gt;
But some certifications are viewed more favorably than others.&lt;br /&gt;
Certifications with renewal requirements are viewed better by hiring&lt;br /&gt;
managers, but they also more costly in the long run because of the need&lt;br /&gt;
for continuing education. Certifications are also good for showing&lt;br /&gt;
in-depth expertise in a specialization within cybersecurity. Depending&lt;br /&gt;
on your career goals, it may be advantageous to have a master’s&lt;br /&gt;
degree—which shows your breadth of knowledge, critical thinking and&lt;br /&gt;
leadership skills—and a certificate—which shows specific skill&lt;br /&gt;
competency.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;As IT (Cyber) Security is still a relatively young discipline,&lt;br /&gt;
universities and colleges are still figuring out which is the best&lt;br /&gt;
approach for their degrees. Study programmes and curricula in Cyber&lt;br /&gt;
Security are different. In general, here are the duration of Cyber&lt;br /&gt;
Security degrees:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Bachelor’s degrees in Cyber Security take 3 or 4 years in most&lt;br /&gt;
countries.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Master’s courses in Cyber Security take between 1-2 years to&lt;br /&gt;
complete.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;PhD programmes in Cyber Security last 3-5 years. Some only take 1&lt;br /&gt;
or 2 years, but they are less common.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Generalization could me made that on bachelor level the general&lt;br /&gt;
knowledge about the cyber issues are obtained. On master level the&lt;br /&gt;
specialization courses are taken and the person can choose more specific&lt;br /&gt;
topics to study. It is on master level where strengths of the cyber&lt;br /&gt;
specialist can be developed further and up-do date knowledge obtained in&lt;br /&gt;
specifics. PhD is serious science and involves teaching, lot of&lt;br /&gt;
scientific work and writing for publications.&amp;lt;/p&amp;gt;&lt;br /&gt;
==Salary==&lt;br /&gt;
&amp;lt;p&amp;gt;Even if the salary can be very different, compared to the skills and&lt;br /&gt;
experience, an generalization can be made. Cyber Security professionals&lt;br /&gt;
in CSIRT, and in other entities earn quite well, from the start. First,&lt;br /&gt;
some comparison from the United States. The average CSIRT analyst salary&lt;br /&gt;
in the USA is $97,500 per year or $50 per hour. Entry level positions&lt;br /&gt;
start at $48,875 per year while most experienced workers make up to&lt;br /&gt;
$135,373 per year.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.talent.com/salary?job=csirt+analyst&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;There are multiple positions you can occupy in this field. They have&lt;br /&gt;
in common great salaries and high demand for technical skills, attention&lt;br /&gt;
to details, problem-solving mentality, and the ability to analyze risks.&lt;br /&gt;
Here are the average annual salaries in the United States, according to&lt;br /&gt;
Payscale:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.payscale.com/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Cryptographer – 100,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Information Security Officer – 91,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Assessor – 90,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Engineer – 88,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Penetration Tester – 81,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Forensics Expert – 71,000 USD&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;p&amp;gt;Security Administrator – 65,000 USD&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.mastersportal.com/articles/2722/why-you-should-study-a-cyber-security-degree-in-2022.html&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When looking into salaries in Estonia, one can find that there is a&lt;br /&gt;
discussion that private sector is taking a toll from the public sector,&lt;br /&gt;
and that the salaries in important agencies, as Information System&lt;br /&gt;
Authority loose their employees to the better paid positions in private&lt;br /&gt;
sector.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://digi.geenius.ee/rubriik/uudis/kui-palju-riigi-jaoks-olulised-it-tootajad-tegelikult-palka-saavad/&lt;br /&gt;
https://tehnika.postimees.ee/6887428/riigi-it-tootajate-palgamaarad-kasvasid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;But there is also a different view that average private sector worker&lt;br /&gt;
could be hired as a top specialist in public sector and then the payment&lt;br /&gt;
is higher. Nevertheless, it seems that the average payment in cyber&lt;br /&gt;
security sector is any way higher that in other parts of the&lt;br /&gt;
e-services.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://digi.geenius.ee/rubriik/uudis/5000-eurostest-palkadest-it-tootajad-saavadki-palju-palka/&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
==SOC==&lt;br /&gt;
&amp;lt;p&amp;gt;A SOC is a facility where an organization’s network, applications,&lt;br /&gt;
and endpoints are monitored and defended. The term was adapted from&lt;br /&gt;
network operations centers (NOCs), where large telecommunication or&lt;br /&gt;
corporate networks are monitored. When network security became more of a&lt;br /&gt;
concern, security teams were formed within the NOCs, and eventually spun&lt;br /&gt;
off into larger organizations of their own as the responsibilities of&lt;br /&gt;
security teams grew increasingly complex and specialized. The security&lt;br /&gt;
staff working in a security operations center are often called the SOC&lt;br /&gt;
team.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Functions of the SOC team include, but are not limited to:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ol type=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Taking inventory of resources, to get a better understanding of the&lt;br /&gt;
structure they are protecting.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Maintanence of the system, by constantly making updates and adding&lt;br /&gt;
safeguards.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Monitoring the network for abnormalities with special tools.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Threat analysis of new attacks and vulnerabilities.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Responding to attacks, by acting as “first responders”. The SOC team&lt;br /&gt;
will shut down and/or isolate endpoints, deleting files and lowering the&lt;br /&gt;
impact as fast as possible.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Recovery of system stability and lost data. This may be done using&lt;br /&gt;
backups, restarting endpoints or reconfiguring systems.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Logging all actions on the system, to be later used for analysis or&lt;br /&gt;
forensics after an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigating the root cause of an attack.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Auditing their own actions, to be in line with regulations of the&lt;br /&gt;
organization, industry or governing body.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.trellix.com/en-us/security-awareness/operations/what-is-soc.html&amp;lt;/p&amp;gt;&lt;br /&gt;
==CSIRT==&lt;br /&gt;
&amp;lt;p&amp;gt;A CSIRT is a group that responds to security incidents when they&lt;br /&gt;
occur. Key responsibilities of a CSIRT include:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
===Creating and maintaining an incident response plan (IRP)===&lt;br /&gt;
An incident response plan (IRP) is a set of written instructions for&lt;br /&gt;
detecting, responding to and limiting the effects of an information&lt;br /&gt;
security event. Incident response plans provide instructions for&lt;br /&gt;
responding to many potential scenarios, including data breaches, denial&lt;br /&gt;
of service/distributed denial of service attacks, firewall breaches,&lt;br /&gt;
virus or malware outbreaks or insider threats. Without an incident&lt;br /&gt;
response plan in place, organizations may either not detect the attack&lt;br /&gt;
in the first place, or not follow proper protocol to contain the threat&lt;br /&gt;
and recover from it when a breach is detected.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.stratacore.com/incidentresponseplan&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
===Investigating and analyzing incidents===&lt;br /&gt;
CSIRTs are also involved in improvement activities. After major&lt;br /&gt;
computer security incidents occur, or when incidents are not handled in&lt;br /&gt;
a timely or effective manner, a CSIRT will generally perform a&lt;br /&gt;
postmortem of the incident and its response. This postmortem will&lt;br /&gt;
identify the strengths and weakness of the response effort. Such reviews&lt;br /&gt;
can identify weaknesses and holes in systems, infrastructure defenses,&lt;br /&gt;
or policies that allowed the incident to take place. It can also&lt;br /&gt;
identify problems with communication channels, interfaces, and&lt;br /&gt;
procedures that inhibited the efficient resolution of the reported&lt;br /&gt;
problem.&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.cisa.gov/uscert/bsi/articles/best-practices/incident-management/defining-computer-security-incident-response-teams&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Managing internal communications and updates during or immediately after incidents occur===&lt;br /&gt;
===Communicating with employees, shareholders, customers, and the press about incidents as needed===&lt;br /&gt;
&amp;lt;p&amp;gt;There are various services within the CSIRT Services Framework that&lt;br /&gt;
address communications, as they relate to security operations and&lt;br /&gt;
incident response services. Some of these include Information Security&lt;br /&gt;
Incident Coordination, Crisis Management Support, Vulnerability&lt;br /&gt;
Disclosure, Situational Awareness Communication, and Awareness Building,&lt;br /&gt;
to name a few. Sharing information and communicating with the general&lt;br /&gt;
public and/or your constituency is appropriate in many different&lt;br /&gt;
scenarios. These can range from proactive communications to reactive&lt;br /&gt;
communications. Each scenario may be unique, and careful consideration&lt;br /&gt;
should be given to when to release information to the public and what&lt;br /&gt;
information should be released.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;https://resources.sei.cmu.edu/asset_files/Handbook/2021_002_001_651819.pdf&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Remediating incidents===&lt;br /&gt;
&amp;lt;p&amp;gt;Threat remediation is a strong and capable tool for fighting the&lt;br /&gt;
cyber security compromises. As the word ‘remedy’ suggests, remediation&lt;br /&gt;
process involves the treatment of a security breach. With the&lt;br /&gt;
remediation practices, your cyber security team is able to eliminate&lt;br /&gt;
suspicious activities and malicious attacks in the form of malware,&lt;br /&gt;
ransomware, phishing and such. Even if you ‘kill’ the suspicious&lt;br /&gt;
activity, the attackers can remain in your systems. If you want to&lt;br /&gt;
contaminate and end the problem for good, your remediation processes&lt;br /&gt;
must involve the detection of the cause.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.logsign.com/blog/what-is-remediation-in-cyber-security/&amp;lt;/p&amp;gt;&lt;br /&gt;
=== Recommending technology, policy, governance, and training changes after security&lt;br /&gt;
incidents===&lt;br /&gt;
&amp;lt;p&amp;gt;After all these actions, the SCIRT must contribute to the development&lt;br /&gt;
of better policies, practices and has to recommend improvements. They&lt;br /&gt;
are not working in the vacuum and their work has to create new and&lt;br /&gt;
better standards for cyber security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
==CERT==&lt;br /&gt;
&amp;lt;p&amp;gt;The term “computer emergency response team” was coined in 1988. In&lt;br /&gt;
response to the Morris worm attack that impacted thousands of servers on&lt;br /&gt;
the Internet, DARPA funded the formation of the Computer Emergency&lt;br /&gt;
Response Team Coordination Center (CERT-CC) at Carnegie Mellon&lt;br /&gt;
University. The goal of CERT-CC was to help protect the internet by&lt;br /&gt;
collecting and disseminating information on critical security&lt;br /&gt;
vulnerabilities. Several other countries formed similar centers using&lt;br /&gt;
the same acronym (despite threats of legal action by Carnegie Mellon for&lt;br /&gt;
trademark infringement). Now the term CERT refers to any emergency&lt;br /&gt;
response team that deals with cyber threats. Many people use CERT-CC&lt;br /&gt;
interchangeably with CSIRT, though the charter of a CERT is information&lt;br /&gt;
sharing in order to help other response teams respond to threats against&lt;br /&gt;
their own infrastructure.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In general, the designation of CERT is helpful in applying real-world&lt;br /&gt;
solutions to various cybersecurity problems. They may be government&lt;br /&gt;
contractors or employees of a major corporation. For example, the U.S.&lt;br /&gt;
Computer Emergency Readiness Team (US-CERT) operates under the U.S.&lt;br /&gt;
Department of Homeland Security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.techopedia.com/definition/31003/computer-emergency-response-team-cert&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In Estonia CERT is designated as CERT-EE. It was established in 2006,&lt;br /&gt;
as an organization responsible for the management of security incidents&lt;br /&gt;
in .ee computer networks. It is also a national contact point for&lt;br /&gt;
international co-operation in the field of IT security.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ria.ee/en/cyber-security/cert-ee.html&amp;lt;/p&amp;gt;&lt;br /&gt;
===Difference between SOC/CSIRT/CERT===&lt;br /&gt;
&amp;lt;p&amp;gt;How CSIRTs differ from CERTs and SOCs There are overlapping&lt;br /&gt;
responsibilities between a community emergency response team (CERT),&lt;br /&gt;
computer security incident response team (CSIRT), and security&lt;br /&gt;
operations center (SOC). To add to this confusion, frequently, the terms&lt;br /&gt;
CERT and CSIRT are used interchangeably, despite the important&lt;br /&gt;
differences.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image3.png&amp;quot; alt=&amp;quot;Overlapping in images/image3.png&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;Overlapping in&lt;br /&gt;
images/image3.png&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
==Understand the primary roles and characteristics of a CERT, CSIRT, and SOC.==&lt;br /&gt;
&amp;lt;p&amp;gt;So, using strict definitions, a CERT collects and disseminates&lt;br /&gt;
security information, typically for the benefit of a country or an&lt;br /&gt;
industry. A CSIRT is a cross-functional team that responds to incidents&lt;br /&gt;
on behalf of a country or an organization. A SOC is where a country or&lt;br /&gt;
organization monitors and defends its network, servers, applications,&lt;br /&gt;
and endpoints.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;figure&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;images/image4.png&amp;quot; alt=&amp;quot;table of explanation images/image4&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;figcaption aria-hidden=&amp;quot;true&amp;quot;&amp;gt;table of explanation&lt;br /&gt;
images/image4&amp;lt;/figcaption&amp;gt;&lt;br /&gt;
&amp;lt;/figure&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.exabeam.com/incident-response/csirt/&amp;lt;/p&amp;gt;&lt;br /&gt;
==Future==&lt;br /&gt;
&amp;lt;p&amp;gt;And the Cyber security problem is only getting bigger. According to a&lt;br /&gt;
report published by Accenture, the number of cyber security breaches&lt;br /&gt;
increased by 11 percent from 2017 to 2018. The cost of such breaches is&lt;br /&gt;
astronomical–about $600 billion worldwide, according to the Economic&lt;br /&gt;
Impact of Cybercrime report.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.ecpi.edu/blog/what-is-digital-forensics-in-cybersecurity-is-this-a-good-career-for-me&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Job projections for cybersecurity are staggering. The Bureau of Labor&lt;br /&gt;
Statistics in US predicts that careers in the cybersecurity field will&lt;br /&gt;
grow by 32% by 2028. That makes cybersecurity one of the top 10&lt;br /&gt;
fastest-growing jobs in the country. In the United States alone, jobs&lt;br /&gt;
for Information Security Analysts are expected to grow by 15% by&lt;br /&gt;
2024.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.franklin.edu/blog/is-a-masters-degree-in-cyber-security-worth-it&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Most likely this trend is also similar in other countries.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When checking Estonian job portals, there is a constant need for&lt;br /&gt;
people for cyber security related positions. Also, linkedin search gives&lt;br /&gt;
approximately 30 vacancies immediately. There are banks, logistics&lt;br /&gt;
companies, e-shops, and software producers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://ee.linkedin.com/jobs/cyber-security-jobs?countryRedirected=1&amp;amp;amp;position=1&amp;amp;amp;pageNum=0&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Trends that affect companies create need for constant cyber security&lt;br /&gt;
services. Increasing number of home/remote offices require secure&lt;br /&gt;
corporate networks and security of remote devices. One example is from&lt;br /&gt;
this year, when sloppy remote desktop set-up paralyzed systems of 17&lt;br /&gt;
companies.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;https://www.aripaev.ee/uudised/2022/04/20/ria-lohakas-kaugtoolaua-seadistus-halvas-martsis-vahemalt-17-juhul-ettevotete-it-susteemid&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Also, no service can exists without robust infrastructure - servers,&lt;br /&gt;
databases, applications. As all previously mentioned devices and&lt;br /&gt;
services are at constant scanning and surveillance. So, the breach&lt;br /&gt;
detection and immediate action demands 24/7 services. Even if lot of&lt;br /&gt;
things could be automated, there is a need for human specialists (at&lt;br /&gt;
least, at the moment). Third growing field is also a forensic&lt;br /&gt;
investigation, as every attack must be investigated in order to be ready&lt;br /&gt;
to repel next attacks. So data recovery and evidence collection is&lt;br /&gt;
another important field of work that need skilled and professional&lt;br /&gt;
workers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Even, if the specifics of the entity, be it CSIRT, CERT or SOC, are&lt;br /&gt;
different, the fundamentals of the work are the same. Professional&lt;br /&gt;
knowledge of the networks, operational systems, hardware, scripting, and&lt;br /&gt;
several other wider IT related knowledge is needed. As there is no&lt;br /&gt;
single way to reach to it, every single person can find one’s strongest&lt;br /&gt;
sides and develop them with knowledge of weaker side, in order to know,&lt;br /&gt;
when to as for help.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/body&amp;gt;&lt;br /&gt;
&amp;lt;/html&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mavald</name></author>
	</entry>
</feed>