1 00:00:01,470 --> 00:00:07,770 All right, the next roll in cybersecurity that is very common is the security consultant role. 2 00:00:08,550 --> 00:00:15,900 Security consultants assess all the security measures for their organization or for client organizations. 3 00:00:16,350 --> 00:00:18,540 They analyze the security systems. 4 00:00:18,540 --> 00:00:24,060 They study potential breaches and to supervise the implementation of solutions. 5 00:00:24,600 --> 00:00:31,560 They may oversee security operations for one company or consult with other clients independently or 6 00:00:31,560 --> 00:00:38,100 through a bigger firm, helping the organizations to understand where their cybersecurity measures may 7 00:00:38,100 --> 00:00:38,940 need to patching. 8 00:00:39,780 --> 00:00:47,040 So according to Pay Scale, which is a provider of the salaries and jobs security consultants on an 9 00:00:47,040 --> 00:00:54,060 average annual salary of eighty five thousand dollars in the United States, in a world that increasingly 10 00:00:54,060 --> 00:01:01,860 relies on cloud computing, organization need cybersecurity experts than ever to help protect their 11 00:01:01,860 --> 00:01:02,460 interests. 12 00:01:04,290 --> 00:01:10,590 Now, what does a security consultant do when they're working for a single company or consulting for 13 00:01:10,590 --> 00:01:11,640 multiple clients? 14 00:01:11,850 --> 00:01:19,140 Security consultants analyze the potential cybersecurity threats by running tests on the system and 15 00:01:19,140 --> 00:01:22,920 then searching for potential breaches of security. 16 00:01:22,920 --> 00:01:29,750 Consultant must understand how hackers operate to protect against security consultants. 17 00:01:29,760 --> 00:01:35,220 Ensure that the organization exceeds the minimum requirements for regulatory compliance. 18 00:01:35,970 --> 00:01:41,940 Now, companies, if you are working as a security consultant, companies will hire you to protect their 19 00:01:41,940 --> 00:01:48,690 digital assets, which may include, let's say, sensitive information, security breaches and, you 20 00:01:48,690 --> 00:01:53,260 know, confidence in building a good security development policy. 21 00:01:54,570 --> 00:02:01,260 The job typically requires zero to three years of experience and entry level jobs may include junior 22 00:02:01,260 --> 00:02:04,080 positions on a team with I.T. specialists. 23 00:02:05,040 --> 00:02:11,310 So what are the skills required by information security consultants against strong knowledge of networks? 24 00:02:11,310 --> 00:02:17,520 And security is everywhere, because if you are into security, you must have the knowledge and understanding 25 00:02:17,520 --> 00:02:24,000 of networks, excellent communication skills, because if you are dealing with Glines, you need to 26 00:02:24,000 --> 00:02:31,740 properly communicate the results of the findings to the clients and then satisfy your client by providing 27 00:02:31,740 --> 00:02:33,000 excellent service. 28 00:02:33,460 --> 00:02:41,090 The next skill that comes handy with many security consultants is cloud computing and programming skills. 29 00:02:42,330 --> 00:02:44,470 Cloud computing is very important. 30 00:02:44,490 --> 00:02:53,460 Cloud has become, you know, a great source of information for hackers because if you hack a cloud 31 00:02:53,460 --> 00:02:56,650 successfully, almost everything can get compromised. 32 00:02:56,670 --> 00:03:03,450 So security consultants who have great cloud computing skills are in a very great demand around the 33 00:03:03,450 --> 00:03:03,990 industry. 34 00:03:05,160 --> 00:03:06,510 Professional certifications? 35 00:03:06,510 --> 00:03:12,180 Yes, professional certifications are also a crucial component to a security consultancy resumé. 36 00:03:12,690 --> 00:03:20,100 A common choice among available options can be a CISSP, which validates a security experts ability 37 00:03:20,100 --> 00:03:23,070 to develop and implement a security program. 38 00:03:24,360 --> 00:03:30,270 Other popular certifications includes certified information systems, auditor and for professionals 39 00:03:30,270 --> 00:03:32,550 focused on cybersecurity analytics. 40 00:03:32,830 --> 00:03:37,230 They have this system that is certified information security manager. 41 00:03:38,190 --> 00:03:38,520 Why? 42 00:03:38,520 --> 00:03:45,600 Certifications are important because by obtaining a professional validation or certification, aspiring 43 00:03:45,600 --> 00:03:51,840 security consultants can demonstrate further expertise in the cybersecurity of their choice. 44 00:03:52,500 --> 00:04:00,450 Certifications do validate a deep knowledge and a commitment to that field that the employers price 45 00:04:01,410 --> 00:04:02,520 or other top skills. 46 00:04:02,520 --> 00:04:08,320 I have said again, the next top skill is critical thinking and logical decision making. 47 00:04:08,340 --> 00:04:09,920 Yes, that is very important. 48 00:04:09,930 --> 00:04:13,890 You need to think critically because you are the consultant here. 49 00:04:13,890 --> 00:04:17,210 You are suggesting security measures to your clients. 50 00:04:17,620 --> 00:04:23,700 That is why critical thinking and a good decision making ability is what most of the employers look 51 00:04:23,700 --> 00:04:24,060 for. 52 00:04:25,770 --> 00:04:29,440 Again, leadership and problem solving is very important. 53 00:04:30,420 --> 00:04:37,110 Security consultants need to engage in critical thinking to analyze the securities and respond quickly 54 00:04:37,440 --> 00:04:41,430 to breaches or even find the problems before they arise. 55 00:04:41,970 --> 00:04:47,970 Communication is also essential, as they must communicate with the top executives about the company's 56 00:04:48,300 --> 00:04:56,070 security operations, outlining the issues that the managers can understand and make the informed decisions. 57 00:04:57,090 --> 00:05:00,690 So this was all for the security consultant and the. 58 00:05:00,990 --> 00:05:05,640 Lecture, which is the last lecture of this section, is one of the most important sections. 59 00:05:06,280 --> 00:05:11,520 Can you guess which rule is one of the most important roles in cybersecurity? 60 00:05:12,270 --> 00:05:15,530 Keep thinking I will see you in the next lecture.