It’s a diverse and fascinating field that’s fun, rewarding and future-focused. Check out our pick of the coolest jobs in cybersecurity...
Aim high, ethical hackers. We’ve interviewed a number of influential industry professionals so you can get the inside scoop and explore what it’s really like to work as a cybersecurity agent.
With the foundations of cybersecurity in your skill set, there is a wide range of options available to you when entering the profession.
"The thrill of the hunt! It’s CSI for cyber geeks! You never encounter the same crime twice."
You are the detective in the world of cybersecurity - searching computers and networks for evidence in the wake of an incident.
"Be a hacker, but do it legally and get paid a lot of money!"
You look for security vulnerabilities in target systems and networks to help enterprises improve their security.
"We desperately need more of this, application security has been such a black hole for so long"
You're a programming/security wizard; test applications before deployment so they don’t present opportunities for intruders.
"The fire ranger. Catch the initial blaze, or there goes the forest."
With an eye for detail and anomalies, you see things most others miss. Active prevention, active detection, active monitoring, active response.
"A leg up on your IT and engineering buddies; talk shop with them but you are saving the world from the bad guys, too."
Implement/tune firewalls, IPS/IDS, patching, admin, rights, monitoring, application white listing, more.
"The secret agent of geekdom. You walk in and say ‘Ok I’ll take it from here."
While everyone else is running around shouting “the system’s dead,” you have the sense and skills to rationally figure out why.
"You get to design the solution, and not just for the perimeter."
You are very creative, on top of the game technically and the business; you design and build defensible systems and are part of a team of very adept people.
"Coolest software developers."
You protect the whole development team from making errors that will allow hackers to penetrate your organization and steal data. You are a programmer, but a programmer with special powers.
"The technical elite! Only go here if you have been called. You know who you are."
Look deep inside malicious software to understand the nature of the threat - how it got in, what flaw it exploited, what it is trying to do or has done.
"Making decisions making things happen. That’s coolness."
Top of the tech ladder. Strategic thinking; hands-on involvement in solution design/deployment; you hold the keys to tech infrastructure and have the ability to contribute and in"uence.
If you require any help or further information email firstname.lastname@example.org and we'll be happy to help.