1 00:00:02,140 --> 00:00:08,950 Cybersecurity expert work in every size company and industry to protect organization from data breaches 2 00:00:08,950 --> 00:00:09,550 attacks. 3 00:00:09,880 --> 00:00:16,150 Moreover, the demand for cybersecurity professionals is growing at a neck breaking speed job posting 4 00:00:16,150 --> 00:00:21,950 for cybersecurity positions have grown three times faster than opportunities for I.T. jobs overall. 5 00:00:22,390 --> 00:00:27,210 Here are the 10 career pathways you can pursue as cybersecurity, by the way. 6 00:00:27,250 --> 00:00:29,030 Actually, I got this from article. 7 00:00:29,140 --> 00:00:31,270 I found it online and it is very useful. 8 00:00:31,780 --> 00:00:37,600 The first thing, security software developer, security software developer, build security software 9 00:00:37,600 --> 00:00:43,720 and integrate security into application software during the design and development process, depending 10 00:00:43,720 --> 00:00:45,010 on the specific position. 11 00:00:45,010 --> 00:00:52,210 And company and security software developer might oversee a team of developers in the creation of secure 12 00:00:52,210 --> 00:00:58,480 software to develop a company wide software security strategy, participate in the lifecycle development 13 00:00:58,480 --> 00:01:04,870 of software systems, support software deployment to customize and test their work for vulnerabilities. 14 00:01:05,590 --> 00:01:07,570 Security Architect Carry that. 15 00:01:08,140 --> 00:01:15,420 If you are an enthusiastic about problem solving and formulating strategies, the security architecture 16 00:01:15,460 --> 00:01:22,120 you bet is for you as security architect is meant to create, build and execute network and computer 17 00:01:22,120 --> 00:01:24,190 security for an organization. 18 00:01:24,520 --> 00:01:31,240 Security architects are responsible for developing complex security framework and ensuring that they 19 00:01:31,240 --> 00:01:32,350 function effectively. 20 00:01:32,500 --> 00:01:37,690 Their design security systems to counter malware, hacking and attacks. 21 00:01:38,200 --> 00:01:43,150 Security consultant, a security consultant, is a catch all cyber security expert. 22 00:01:43,540 --> 00:01:50,230 They evaluate cybersecurity threats, risk problems and give possible solutions for different organizations 23 00:01:50,350 --> 00:01:55,630 and guide them in protecting and securing their physical capital and data. 24 00:01:56,110 --> 00:02:01,840 Security consultant must not be too rigid and must be a tech savvy. 25 00:02:02,680 --> 00:02:09,310 They deal with a wide range of variables when assessing security systems across diverse companies and 26 00:02:09,310 --> 00:02:09,910 industries. 27 00:02:10,920 --> 00:02:16,710 Information security analysts are the front line defense of networks, information security analyst, 28 00:02:16,710 --> 00:02:23,880 both firewalls and encryption in order to protect breaches, constantly monitoring and outdated systems 29 00:02:23,880 --> 00:02:26,070 for unusual activities. 30 00:02:26,220 --> 00:02:32,820 Ethical hackers normally hold a CEO certificate and are given license by their employers to try and 31 00:02:32,820 --> 00:02:36,030 infiltrate the security of their system. 32 00:02:36,450 --> 00:02:42,990 The idea is that they use the same techniques as malicious black hat hackers to test existing security 33 00:02:42,990 --> 00:02:43,530 protocols. 34 00:02:43,710 --> 00:02:48,060 If they are successful, upgrades can then be developed and implemented. 35 00:02:48,980 --> 00:02:55,500 Computer forensics analysts focus on cybercrime, an ever growing phenomenon. 36 00:02:56,090 --> 00:03:01,940 They work with law enforcement agencies in both public and private sector organization and are asked 37 00:03:01,940 --> 00:03:09,290 to undertake and a wide variety of tasks, including recovering the deleted files, interpreting data 38 00:03:09,290 --> 00:03:15,680 linked to crime, analyzing mobile phone records, pursuing data through their computer forensics. 39 00:03:15,680 --> 00:03:21,840 And it must keep a well detailed records of their investigation and often provide evidence in court. 40 00:03:22,550 --> 00:03:25,160 Chief Information Security Officer. 41 00:03:26,090 --> 00:03:33,470 Is normally a amid executive level position whose job is to manage the affairs operation of a company 42 00:03:33,470 --> 00:03:40,550 organizing its security division systems are usually responsible for planning, coordinating and directing 43 00:03:40,550 --> 00:03:45,480 all computer, network and data security needs of their employers. 44 00:03:46,430 --> 00:03:52,990 The systems work directly with the management to determine an organization custom cybersecurity demands. 45 00:03:53,360 --> 00:03:59,990 The systems are usually saddled with the responsibility of assembling an effective staff of security 46 00:03:59,990 --> 00:04:06,230 professionals, which means that the position require an individual with strong background in its security, 47 00:04:06,230 --> 00:04:12,380 architecture and strategy, as well as effective communication and human resource skills. 48 00:04:13,480 --> 00:04:20,800 Ventilation system is the proactive authorized employment of testing producers on the I.T. system to 49 00:04:20,800 --> 00:04:28,330 identify system flaws and interaction, Dyster usually attempts to, with the permission hack to preemptively 50 00:04:28,570 --> 00:04:35,290 discover operating system vulnerabilities, services and application problems, improper configuration 51 00:04:35,290 --> 00:04:38,830 and more before an intruder caused real damage. 52 00:04:38,990 --> 00:04:45,310 Ventilation systems or testers must be highly skilled, often using testing tools of their own design 53 00:04:45,550 --> 00:04:52,420 to break into the systems under watch and the ventilation system actually required to keep accurate 54 00:04:52,420 --> 00:04:55,570 records of their activities and discovered vulnerabilities. 55 00:04:56,590 --> 00:05:03,160 I.T. security consultant meet with clients to advise them on how to protect their organization, cybersecurity 56 00:05:03,160 --> 00:05:08,530 objective effectively and cost effectively, I.T. security consultants are often employed by smaller 57 00:05:08,530 --> 00:05:14,830 firms and agencies that cannot afford to handle their security issues in-house, but are also employed 58 00:05:14,830 --> 00:05:21,580 by big corporation to supplement their security teams and provide impartial outside perspective to current 59 00:05:21,580 --> 00:05:22,450 system challenges. 60 00:05:22,720 --> 00:05:29,530 The security systems administrator responsibility is a bit similar to many cybersecurity jobs installing, 61 00:05:29,530 --> 00:05:35,380 administrating, maintaining and troubleshooting computer network and data security systems. 62 00:05:35,680 --> 00:05:41,650 The main distinction between the security systems administrator and other cybersecurity professionals 63 00:05:41,650 --> 00:05:46,920 is that the security system administrator is normally the person in charge of daily operation of those 64 00:05:46,960 --> 00:05:47,770 security system. 65 00:05:47,920 --> 00:05:54,820 The regulators include system monitoring and then regular backup and setting up deleting and maintaining 66 00:05:54,820 --> 00:05:56,290 individual user accounts. 67 00:05:56,530 --> 00:06:03,510 Security systems administrators are usually often involved in developing organizational security procedures.