Cybersecurity career options & Getting started

B
Balaji RajasekaranCyber Security Solution Architect at BT
Cybersecurity Career
Options & Getting Started
Balaji Rajasekaran
Cyber Security Solutions Architect
Personal
Personal
About me
 12+ years of experience in IT.
 Worked in Zoho, Netsurion, Trustwave and BT
 Experience in following areas of Cybersecurity
 Security Operations
 Threat hunting
 Product/Solution Designing & Implementing
 Consultant/Presales & Support
 Vulnerability Assessment
 Risk Analysis
Personal
Personal
What’s ahead?
 Why cybersecurity?
 What’s missing?
 CyberSec Roles
 Breaking down the roles
 Getting started
 Preparing yourself
 Further reading
Personal
Personal
Why Cybersecurity?
Source: Cybersecurityventures.com
Personal
Personal
Why Cybersecurity? (contd.)
Source: Cybersecurityventures.com
Personal
Personal
What’s missing?
 Skills gap - Less skilled people for more jobs
 Retaining people is hard
 Less CyberSec specific curriculum
 Less awareness
Personal
Personal
CyberSec Roles
Security
Analyst
Penetration
Tester
Security
Architect
Forensics
Analyst
Security
Auditor
CISO
Personal
Personal
CyberSec Roles – Security Analyst
 Incident analysis
 Threat hunting
 Vulnerability Analysis
 Compliance reporting
 Incident response
Personal
Personal
CyberSec Roles – Penetration Tester
 White hat hacking
 Finding gaps
 Break into network
 Analyze security measures and report
 Can work independently - Bug Bounty $$$$
Personal
Personal
CyberSec Roles – Penetration Tester
Social Engineering
Personal
Personal
CyberSec Roles – Security Architect
 Designing security solutions and framework
 Identify new security requirements
 Tune existing security controls
 Closing the gaps
Personal
Personal
CyberSec Roles – Forensics Analyst
 Recover and examine evidence
 Prepare reports based on evidence
 Work with law enforcement
 Maintain chain of custody
Personal
Personal
CyberSec Roles – Security Auditor
 Ensuring organization are adhering rules.
 Assess the security risks and report it.
 Recommends standards and practices.
 Work with top management for remediation measures.
Personal
Personal
CyberSec Roles – CISO
 Top management role in cyber security.
 Heads all department in security and decision maker.
 Identifies security objectives and metrics.
 Managing Incident Response plan.
Personal
Personal
Getting started
 Strong Basics
 Networking, OS, Cryptography
 Decide between security analyst/ penetration tester.
Security
Analyst
Penetration
Tester
• Big data analysis
• SIEM - Splunk, Qradar, ArcSight
• Scripting (Python, JavaScript, SQL)
• Know the tools
Personal
Personal
Getting started (contd.)
 Free resources
 TryHackMe
 Hackthebox
 Cyberdefenders
 Cybrary
 US Department of Homeland Security
 Open Security Training
 Heimdal Security
 Sans Cyber Aces Online
 Paid resources
 Udemy
 Future Learn
 Coursera
 Pluralsight
Personal
Personal
Preparing yourself
 Make a plan.
 Strong Basics.
 Set up a lab and start experimenting.
 Effective use of LinkedIn, Twitter, Blog.
 Start planning a cyber sec final year project.
 Stay updated.
One more thing
Personal
Personal
One more thing
Password hygiene
 Stop using one password for multiple accounts.
 Start using a password manager. (Bitwarden, Keepass)
 Enable 2FA wherever available.
 Subscribe to data breach notifications from https://haveibeenpwned.com
Personal
Personal
Further reading
 https://securityintelligence.com
 https://thehackernews.com
 https://security.stackexchange.com
 https://osintframework.com
 https://github.com/onlurking/awesome-infosec
 https://github.com/showcases/security
Personal
Personal
Questions?
1 of 21

Recommended

Spy vs Spy: Protecting Secrets by
Spy vs Spy: Protecting SecretsSpy vs Spy: Protecting Secrets
Spy vs Spy: Protecting SecretsMichael Scheidell
1.1K views20 slides
Malware: To The Realm of Malicious Code (Training) by
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Satria Ady Pradana
162 views45 slides
Security Testing for Test Professionals by
Security Testing for Test ProfessionalsSecurity Testing for Test Professionals
Security Testing for Test ProfessionalsTechWell
535 views58 slides
Webinar | Cybersecurity vulnerabilities of your business - Berezha Security G... by
Webinar | Cybersecurity vulnerabilities of your business - Berezha Security G...Webinar | Cybersecurity vulnerabilities of your business - Berezha Security G...
Webinar | Cybersecurity vulnerabilities of your business - Berezha Security G...Berezha Security Group
29 views22 slides
Webinar: "How to invest efficiently in cybersecurity (Return on Security Inv... by
Webinar: "How to invest efficiently in cybersecurity  (Return on Security Inv...Webinar: "How to invest efficiently in cybersecurity  (Return on Security Inv...
Webinar: "How to invest efficiently in cybersecurity (Return on Security Inv...Berezha Security Group
137 views35 slides
Developing a Threat Modeling Mindset by
Developing a Threat Modeling MindsetDeveloping a Threat Modeling Mindset
Developing a Threat Modeling MindsetRobert Hurlbut
358 views69 slides

More Related Content

What's hot

Ethical Hacking by
Ethical HackingEthical Hacking
Ethical HackingMazenetsolution
1.1K views17 slides
Security by Collaboration: Rethinking Red Teams versus Blue Teams by
Security by Collaboration: Rethinking Red Teams versus Blue TeamsSecurity by Collaboration: Rethinking Red Teams versus Blue Teams
Security by Collaboration: Rethinking Red Teams versus Blue TeamsAlienVault
4.2K views23 slides
Application Threat Modeling In Risk Management by
Application Threat Modeling In Risk ManagementApplication Threat Modeling In Risk Management
Application Threat Modeling In Risk ManagementMel Drews
1.9K views41 slides
Threat Modeling workshop by Robert Hurlbut by
Threat Modeling workshop by Robert HurlbutThreat Modeling workshop by Robert Hurlbut
Threat Modeling workshop by Robert HurlbutDevSecCon
2.4K views80 slides
Assess all the things by
Assess all the thingsAssess all the things
Assess all the thingsJerod Brennen
362 views8 slides
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx by
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptxNtxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptxNorth Texas Chapter of the ISSA
331 views20 slides

What's hot(20)

Security by Collaboration: Rethinking Red Teams versus Blue Teams by AlienVault
Security by Collaboration: Rethinking Red Teams versus Blue TeamsSecurity by Collaboration: Rethinking Red Teams versus Blue Teams
Security by Collaboration: Rethinking Red Teams versus Blue Teams
AlienVault4.2K views
Application Threat Modeling In Risk Management by Mel Drews
Application Threat Modeling In Risk ManagementApplication Threat Modeling In Risk Management
Application Threat Modeling In Risk Management
Mel Drews1.9K views
Threat Modeling workshop by Robert Hurlbut by DevSecCon
Threat Modeling workshop by Robert HurlbutThreat Modeling workshop by Robert Hurlbut
Threat Modeling workshop by Robert Hurlbut
DevSecCon2.4K views
Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ... by Core Security
Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...
Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...
Core Security137 views
Petya Ransomware by Siemplify
Petya RansomwarePetya Ransomware
Petya Ransomware
Siemplify248 views
Threat hunting 101 by Sandeep Singh by OWASP Delhi
Threat hunting 101 by Sandeep SinghThreat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep Singh
OWASP Delhi1.3K views
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar] by Stanton Viaduc
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]
Stanton Viaduc313 views
Cybersecurity Fundamentals for Legal Professionals (and every other business) by Shawn Tuma
Cybersecurity Fundamentals for Legal Professionals (and every other business)Cybersecurity Fundamentals for Legal Professionals (and every other business)
Cybersecurity Fundamentals for Legal Professionals (and every other business)
Shawn Tuma347 views
OWASP Québec: Threat Modeling Toolkit - Jonathan Marcil by Jonathan Marcil
OWASP Québec: Threat Modeling Toolkit - Jonathan MarcilOWASP Québec: Threat Modeling Toolkit - Jonathan Marcil
OWASP Québec: Threat Modeling Toolkit - Jonathan Marcil
Jonathan Marcil733 views
Anton Chuvakin on What is NOT Working in Security 2004 by Anton Chuvakin
Anton Chuvakin on What is NOT Working in Security 2004Anton Chuvakin on What is NOT Working in Security 2004
Anton Chuvakin on What is NOT Working in Security 2004
Anton Chuvakin699 views
Cybersecurity Fundamentals by Shaw E. Tuma by Klemchuk LLP
Cybersecurity Fundamentals by Shaw E. TumaCybersecurity Fundamentals by Shaw E. Tuma
Cybersecurity Fundamentals by Shaw E. Tuma
Klemchuk LLP265 views
Ransomware Detection: Don’t Pay Up. Backup. by marketingunitrends
Ransomware Detection:  Don’t Pay Up. Backup.Ransomware Detection:  Don’t Pay Up. Backup.
Ransomware Detection: Don’t Pay Up. Backup.
marketingunitrends195 views
Threat Hunting by Splunk
Threat HuntingThreat Hunting
Threat Hunting
Splunk4.3K views
Threat Hunting 102: Beyond the Basics by Cybereason
Threat Hunting 102: Beyond the BasicsThreat Hunting 102: Beyond the Basics
Threat Hunting 102: Beyond the Basics
Cybereason833 views
Ensuring Full Proof Security At Xero by Craig Walker
Ensuring Full Proof Security At XeroEnsuring Full Proof Security At Xero
Ensuring Full Proof Security At Xero
Craig Walker1.1K views
Webinar: Backup vs. Ransomware - 5 Requirements for Backup Success by Storage Switzerland
Webinar: Backup vs. Ransomware - 5 Requirements for Backup SuccessWebinar: Backup vs. Ransomware - 5 Requirements for Backup Success
Webinar: Backup vs. Ransomware - 5 Requirements for Backup Success

Similar to Cybersecurity career options & Getting started

2021 BSides Tampa Cyber Security Careers by
2021 BSides Tampa Cyber Security Careers2021 BSides Tampa Cyber Security Careers
2021 BSides Tampa Cyber Security CareersScott Stanton
103 views28 slides
How To Become An IT Security Risk Analyst by
How To Become An IT Security Risk AnalystHow To Become An IT Security Risk Analyst
How To Become An IT Security Risk AnalystNiloufer Tamboly CISSP, CPA, CIA, CISA, CFE
85 views17 slides
wannabe Cyberpunk; “I don’t know what I’m supposed to do.” by
wannabe Cyberpunk; “I don’t know what I’m supposed to do.”wannabe Cyberpunk; “I don’t know what I’m supposed to do.”
wannabe Cyberpunk; “I don’t know what I’m supposed to do.”Moshiul Islam, CISSP, CISA, CFE
760 views27 slides
knowthyself : Internal IT Security in SA by
knowthyself : Internal IT Security in SA knowthyself : Internal IT Security in SA
knowthyself : Internal IT Security in SA SensePost
510 views31 slides
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC by
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SCCyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SCAT-NET Services, Inc. - Charleston Division
353 views65 slides
What Every Developer And Tester Should Know About Software Security by
What Every Developer And Tester Should Know About Software SecurityWhat Every Developer And Tester Should Know About Software Security
What Every Developer And Tester Should Know About Software SecurityAnne Oikarinen
793 views38 slides

Similar to Cybersecurity career options & Getting started (20)

2021 BSides Tampa Cyber Security Careers by Scott Stanton
2021 BSides Tampa Cyber Security Careers2021 BSides Tampa Cyber Security Careers
2021 BSides Tampa Cyber Security Careers
Scott Stanton103 views
knowthyself : Internal IT Security in SA by SensePost
knowthyself : Internal IT Security in SA knowthyself : Internal IT Security in SA
knowthyself : Internal IT Security in SA
SensePost510 views
What Every Developer And Tester Should Know About Software Security by Anne Oikarinen
What Every Developer And Tester Should Know About Software SecurityWhat Every Developer And Tester Should Know About Software Security
What Every Developer And Tester Should Know About Software Security
Anne Oikarinen793 views
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors by mdagrossa
ION-E Defense In Depth Presentation for The Institiute of Internal AuditorsION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
mdagrossa1.4K views
Threat Modeling Web Applications by Nadia BENCHIKHA
Threat Modeling Web ApplicationsThreat Modeling Web Applications
Threat Modeling Web Applications
Nadia BENCHIKHA169 views
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina... by Emrah Alpa, CISSP CEH CCSK
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
BSIMM: Bringing Science to Software Security by Cigital
BSIMM: Bringing Science to Software SecurityBSIMM: Bringing Science to Software Security
BSIMM: Bringing Science to Software Security
Cigital1.2K views
Preparing for a New Career in Cyber - Pulsedive by Grace Chi
Preparing for a New Career in Cyber - PulsedivePreparing for a New Career in Cyber - Pulsedive
Preparing for a New Career in Cyber - Pulsedive
Grace Chi69 views
The Business Benefits of Threat Intelligence Webinar by ThreatConnect
The Business Benefits of Threat Intelligence WebinarThe Business Benefits of Threat Intelligence Webinar
The Business Benefits of Threat Intelligence Webinar
ThreatConnect1.4K views
Security architecture frameworks by John Arnold
Security architecture frameworksSecurity architecture frameworks
Security architecture frameworks
John Arnold8.7K views
Cloud, DevOps and the New Security Practitioner by Adrian Sanabria
Cloud, DevOps and the New Security PractitionerCloud, DevOps and the New Security Practitioner
Cloud, DevOps and the New Security Practitioner
Adrian Sanabria1.2K views
Integrated Security for Software Development and Advanced Penetration Testing... by Symptai Consulting Limited
Integrated Security for Software Development and Advanced Penetration Testing...Integrated Security for Software Development and Advanced Penetration Testing...
Integrated Security for Software Development and Advanced Penetration Testing...
Enterprise incident response 2017 by zapp0
Enterprise incident response   2017Enterprise incident response   2017
Enterprise incident response 2017
zapp0702 views
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf by JustinBrown267905
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfFor Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf

Recently uploaded

TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors by
TouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective SensorsTouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensorssugiuralab
15 views15 slides
SAP Automation Using Bar Code and FIORI.pdf by
SAP Automation Using Bar Code and FIORI.pdfSAP Automation Using Bar Code and FIORI.pdf
SAP Automation Using Bar Code and FIORI.pdfVirendra Rai, PMP
19 views38 slides
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... by
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...James Anderson
33 views32 slides
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... by
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...Bernd Ruecker
26 views69 slides
6g - REPORT.pdf by
6g - REPORT.pdf6g - REPORT.pdf
6g - REPORT.pdfLiveplex
9 views23 slides
Vertical User Stories by
Vertical User StoriesVertical User Stories
Vertical User StoriesMoisés Armani Ramírez
11 views16 slides

Recently uploaded(20)

TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors by sugiuralab
TouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective SensorsTouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors
sugiuralab15 views
SAP Automation Using Bar Code and FIORI.pdf by Virendra Rai, PMP
SAP Automation Using Bar Code and FIORI.pdfSAP Automation Using Bar Code and FIORI.pdf
SAP Automation Using Bar Code and FIORI.pdf
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... by James Anderson
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
James Anderson33 views
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... by Bernd Ruecker
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
Bernd Ruecker26 views
6g - REPORT.pdf by Liveplex
6g - REPORT.pdf6g - REPORT.pdf
6g - REPORT.pdf
Liveplex9 views
Lilypad @ Labweek, Istanbul, 2023.pdf by Ally339821
Lilypad @ Labweek, Istanbul, 2023.pdfLilypad @ Labweek, Istanbul, 2023.pdf
Lilypad @ Labweek, Istanbul, 2023.pdf
Ally3398219 views
AMAZON PRODUCT RESEARCH.pdf by JerikkLaureta
AMAZON PRODUCT RESEARCH.pdfAMAZON PRODUCT RESEARCH.pdf
AMAZON PRODUCT RESEARCH.pdf
JerikkLaureta15 views
Attacking IoT Devices from a Web Perspective - Linux Day by Simone Onofri
Attacking IoT Devices from a Web Perspective - Linux Day Attacking IoT Devices from a Web Perspective - Linux Day
Attacking IoT Devices from a Web Perspective - Linux Day
Simone Onofri15 views
Business Analyst Series 2023 - Week 3 Session 5 by DianaGray10
Business Analyst Series 2023 -  Week 3 Session 5Business Analyst Series 2023 -  Week 3 Session 5
Business Analyst Series 2023 - Week 3 Session 5
DianaGray10209 views
From chaos to control: Managing migrations and Microsoft 365 with ShareGate! by sammart93
From chaos to control: Managing migrations and Microsoft 365 with ShareGate!From chaos to control: Managing migrations and Microsoft 365 with ShareGate!
From chaos to control: Managing migrations and Microsoft 365 with ShareGate!
sammart939 views
1st parposal presentation.pptx by i238212
1st parposal presentation.pptx1st parposal presentation.pptx
1st parposal presentation.pptx
i2382129 views
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院 by IttrainingIttraining
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive by Network Automation Forum
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Five Things You SHOULD Know About Postman by Postman
Five Things You SHOULD Know About PostmanFive Things You SHOULD Know About Postman
Five Things You SHOULD Know About Postman
Postman27 views
Spesifikasi Lengkap ASUS Vivobook Go 14 by Dot Semarang
Spesifikasi Lengkap ASUS Vivobook Go 14Spesifikasi Lengkap ASUS Vivobook Go 14
Spesifikasi Lengkap ASUS Vivobook Go 14
Dot Semarang35 views
Case Study Copenhagen Energy and Business Central.pdf by Aitana
Case Study Copenhagen Energy and Business Central.pdfCase Study Copenhagen Energy and Business Central.pdf
Case Study Copenhagen Energy and Business Central.pdf
Aitana12 views

Cybersecurity career options & Getting started