CyberSecurity: Trends, Careers, & the Next Generation



Similar documents
Information Technology 2015 Programmes

Frontiers in Cyber Security: Beyond the OS

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

Please Note: Temporary Graduate 485 skills assessments applicants should only apply for ANZSCO codes listed in the Skilled Occupation List above.

COMPUTER SCIENCE (AS) Associate Degree, Certificate of Achievement & Department Certificate Programs

Information Systems Security Certificate Program

COMPUTER SCIENCE (AS) Associate Degree, Certificate of Achievement & Department Certificate Programs

Architect, Data Warehousing and Business Intelligence. Information & Education Technology Services. Associate Director, Applications Development

Computer Scientist. Conduct research in latest computer and network security technologies for high assurance system security solutions

Security Intelligence Services. Cybersecurity training.

EMPLOYEE REFERRAL PROGRAM - US

Diploma in Business and Information Management Diploma in Computer Forensics Diploma in Information Technology Diploma in Web Technologies

Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute

Assessment for Master s Degree Program Fall Spring 2011 Computer Science Dept. Texas A&M University - Commerce

Australian Computer Society ANZSCO ICT Code descriptions v Further updates will be issued in

New-Age Master s Programme

Page 1 of 5. IS 335: Information Technology in Business Lecture Outline Computer Technology: Your Need to Know

Online Computer Science Degree Programs. Bachelor s and Associate s Degree Programs for Computer Science

COMPUTER SCIENCE & INFORMATION TECHNOLOGY

Diploma in Business and Information Management Diploma in Computer Forensics Diploma in Web Technologies

Example of Standard API

INFORMATION TECHNOLOGY & INFORMATION SECURITY CAREER PATHWAY

Manned Information Security

Center of Academic Excellence Cyber Operations Program 2013 Application

Visualization, Modeling and Predictive Analysis of Internet Attacks. Thermopylae Sciences + Technology, LLC

BHEF s National Higher Education and Workforce Initiative

How to Leverage Splunk s Security Intelligence PlaKorm for Security OperaNons Environments

Network Engineering Technology

SOFTWARE ENGINEER. For Online (front end) Java, Javascript, Flash For Online (back end) Web frameworks, relational databases, REST/SOAP, Java/Scala

High End Information Security Services

Cybersecurity AAS Program

Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus

Cybersecurity Strategic Talent Management. March, 2012

Advanced ANDROID & ios Hands-on Exploitation

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015

Information Systems and Tech (IST)

CSTA- Oracle Academy 2014 U.S. High School CS Survey: The State of Computer Science in U.S. High Schools: an Administrator s Perspective.

Core Job Descriptions

How To Become A Cybersecurity Consultant

Bachelor of Information Technology (Incorporating Diploma in Information Technology (Levels 5 and 6)

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

POSITION QUALIFICATIONS. Minimum Experience (Yrs)

Assessment Plan for CS and CIS Degree Programs Computer Science Dept. Texas A&M University - Commerce

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

ASSOCIATE IN ARTS DEGREE-60 UNITS

Course overview. CompTIA A+ Certification (Exam ) Official Study Guide (G188eng verdraft)

MAJORS: Computer Engineering, Computer Science, Electrical Engineering

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY RECOGNIZED MARKETABLE

Computer Information Systems (CIS)

New-Age Undergraduate Programme BCA Cloud Technology & Information Security (3 Year Full-Time Programme)

INFORMATION TECHNOLOGY

CYBER SECURITY TRAINING SAFE AND SECURE

Security Intelligence Services.

S/N Company. 1 Accion Labs Pte Ltd. 2 Adventus Singapore Pte Ltd. 3 Carousell. 4 Comtel Solutions

2933A: Developing Business Process and Integration Solutions Using Microsoft BizTalk Server 2006

Information Technology Cluster

Systems Engineering and Integration for the NSG (SEIN) SharePoint Developer

capabilities statement

INFORMATION SECURITY TRAINING CATALOG (2015)

SCHOOL DISTRICT OF MARION COUNTY JOB CLASSIFICATION DESCRIPTION LEVEL/POSITION: COMPUTER NETWORK SPECIALIST 4.78

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering

(Computer Science/ Information Technology )

DIABLO VALLEY COLLEGE CATALOG

Microsoft Training and Certification Guide. Current as of December 31, 2013

Telecom Testing and Security Certification. A.K.MITTAL DDG (TTSC) Department of Telecommunication Ministry of Communication & IT

PCCC PCCC Course Description

Principles of Information Assurance Syllabus

Using Monitoring, Logging, and Alerting to Improve ICS Security ICSJWG 2015 Fall Meeting October 27, 2015

Computer Science Course Descriptions Page 1

CyberSecurity Solutions. Delivering

Specialized Programme on Internetworking Design and LAN WAN Administration

Network Management and Defense Telos offers a full range of managed services for:

Bridging the Cybersecurity Talent Gap Cybersecurity Employment and Opportunities for Engagement

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

White Paper: Consensus Audit Guidelines and Symantec RAS

Connecting PTE to Careers in Idaho

THE WORLD IS MOVING FAST, SECURITY FASTER.

Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid

Transcription:

CyberSecurity: Trends, Careers, & the Next Generation Ludwig Goon March 2-4, 2016

Disclaimer: The view and opinions expressed in the presentation are that of the presenter and is not affiliated with employers. Data presented is open sourced and publicly available.

Evolution of Information Technology

cybersecurity ˌsībərsiˈkyo orədē/ noun The practice of the protection of information Systems and the services provided. Adding to that, Cybersecurity is a growing sector including many related advanced technologies, the Internet of Things, that now includes education and governance.

1. Network Attacks 2. Intellectual Property & Data 3. Financial & Identity Data 4. Social Engineering 5. ICS, SCADA, Autonomous systems What s todays #1 computer crime target?

It s ALL about that Data!

It s ALL about that Data! The Industry and Government are ALWAYS prime targets!

Types of Cyber Attacks

About: Mississippi Native Mississippi Educated 20 years in I.T. & CyberSecurity Data Visualizer Software Engineer Systems Administrator CyberSecurity Engineer

Information Technology & Cybersecurity Careers I.T. Careers Software/Hardware Engineer Web/Mobile Application Programmer Computer Programmer I.T. Analyst Business Systems Analyst Database Administrator Network Engineer Web Developer Help Desk/ Tech /Customer Support Systems Engineer or Integrator Systems Administrator Chief Information Technology Officer Cyber Security Careers Security Analyst Security Engineer or Architect Security/IT Director or Manager Systems Administrator Vulnerability/Threat Analyst Forensics Investigator Malware Analyst or Engineer Information Assurance Systems Engineer or Integrator Penetration Tester or Engineer Chief Information Security Officer Chief Security Officer

Cybersecurity Skill Sets Needed: Cyber Software Engineer 1 Experienced Location(s): United States-Maryland-Millersville US Citizenship Required for this Position: Yes Relocation Assistance: No relocation assistance available Description Northrop Grumman Mission Systems sector is seeking a Cyber Software Engineer 1 to join our team of qualified, diverse individuals. This position will be located in Millersville, MD. Roles and Responsibilities: Ensures software standards are met. Designs, develops, documents, tests and debugs software applications and systems that contain logical and mathematical solutions. Performs advance research on cutting edge technologies and programming techniques to develop unique and innovative software prototypes. Work independently and collaboratively to develop complex solutions involving advanced cyber technologies, network communications and collaborative software systems. Qualifications Basic Qualifications: To be considered for this position, you must minimally meet the knowledge, skills, and abilities listed below: 0 Years experience with a Bachelors degree in Computer Science, or related discipline from an accredited college or university. Working knowledge with C or C++ Strong background in software engineering, scientific computing, web technologies and/or embedded systems. Active Top Secret clearance, eligible for SCI. Requires 0-10% travel within the state. Preferred Qualifications: Knowledge of Malware and Operating Systems Experience with Reverse Engineering and Service Oriented Architecture (SOA) Active TS/SCI preferred

Cyber Intel Analyst Associate Job Code/Title: Cyber Intel Analyst Associate Job Description Cybersecurity Skill Sets Needed: Key aspects of this dynamic position include the following: Development on automated software testing frameworks for large scale security-critical software testing Low-level firmware/software development pushing the bounds of the originally specified intent of the hardware/software OS/Network/Application security and evaluation improvements OS/Network/Application secure design principles and development techniques OS/Network/Application vulnerability assessments Information operations - Tactics and Technologies Reverse engineering techniques and tools. Basic Qualifications Platforms: Windows, Linux, Mac, Mobile (ios, Android) Programming languages: Python, C, C++, or Assembly Desired skills Experience with the kernel debugger and internal data structures. Reverse engineering of operating system components Knowledge of and ability to navigate and manipulate the Windows registry Ability to navigate and control networking stack Knowledge of the operating system security protections Understanding how operating systems manage physical and virtual memory Familiarization with troubleshooting file-system access problems Understanding of encryption methods Job Location(s): Herndon Virginia Security Clearance: TS/SCI Program: NVA Cyber Research Job Class: Software Engineering Job Category: 4 yr and up College City: Herndon State :VA

Cybersecurity Skill Sets Needed: Cyber Analyst Location: Charlotte, NC 28277-3439 US Citizenship Required: Yes Shift: 1st Shift Required Security Clearance: Eligible - Secret Job Description: BAE Systems has a job opening for a Cyber Security Analyst in Charlotte, NC. Function as a Cyber SecurityDevOps professional for the BAE Global Security Operations Center. Work with Security Analysts and Engineers to develop and enhance cyber security solutions to support a global security operations capability. Technical Functions: Developing or enhancing existing full suites of custom cyber security toolsets. Setting up and deploying servers and operating systems to host critical cyber security tools. Developing tools to integrate open source applications with widely used commercial security tools. Monitor SIEM (ArcSight and Splunk) and other network security devices for alerts Investigating alerts using any and all available tools and data resources. Required Skills and Education: Required education: Associates. Basic Requirements: 2+ yrs programming experience to include scripting languages such as Python, Perl, and bash. 2+ yrs experience and knowledge of Linux operating systems. 2+ yrs experience with system administration at hardware, software, as well as OS levels. 2+ yrs experience and knowledge of high and low level network protocols such as TCP, UDP, HTTP, SMTP,etc. 2+ yrs experience administering databases and developing database applications in traditional relational databases as well as NoSQL ones. Preferred Skills and Education: Other Requirements: Eligibility to obtain a security clearance Shift flexibility, including the ability to provide on call support when needed Ability to work greater than 40 hours per week as needed

Cybersecurity by the Numbers! 49% increase in IT jobs to 2020 - USDL 37% increase for Security Analysts to 2022 - USDL 74% increase in Cyber jobs since 2013 - glassdoor.com 2 Million Cyber jobs available in 2017 - UK Source $88,000 - Average Salary for Analysts - USDL 64% High Schools DO NOT have access to Computer Science classes or related resources - Raytheon & National Cyber Security Alliance

STEM Pipeline? Graduates Yes - Diversity NO - Hadi Partovi Mississippi Graduated 145 graduates in 2013 1185 IT jobs in Mississippi available in 2013 - code.org

TP: Technical Education in 71,000+ Students enrolled at MSCC 2014 >1000 Students in technical programs MSCCs have Computer Programing/Networking studies Some MSCCs have Information Technology Programs

Cybersecurity Education in NOVA http://www.nvcc.edu/cybersecurity/index.html

Talking Points Is Mississippi Interested in the CyberSecurity sector? What role should MSCC play in preparing Students? What Resources are needed at MSCC schools for Cybersecurity?

Closing Remarks Next Steps Cybersecurity is important, needed, & valued! Cybersecurity needs the next generation! I. T. & Cybersecurity will drive innovation! Next Generation Technologies will be based on I.T. and Cybersecurity!

Thank You!! Please keep in contact! https://github.com/lagoon7/presentations.git ludwig.goon@gmail.com @nfltr8 facebook.com/lu.goon