Cyber Security Policy Analysts

Slides:



Advertisements
Similar presentations
Cyber Crime Game Players By Marharyta Abreu & Iwona Sornat.
Advertisements

Hands-On Ethical Hacking and Network Defense
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
IT Security Requirements
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Careers in Mathematics 24 March Careers In Mathematics What can you do with a B.Sc. degree in Mathematics ? Where do you want to work ?
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
Providing Practical Solutions Winning the Talent Wars for Recruiting and Retaining 21 st Century Cyber Engineers Jeff Kubik, PMP, CISSP Sr PM, Praxis Engineering.
Introduction to BC Management, Inc. Founded in March Headquartered in Irvine, CA. An executive search firm exclusively placing business continuity,
Computer Careers Dr. Kip Irvine School of Computing and Information Sciences, Florida International University.
Introduction to BC Management, Inc. Founded in March Headquartered in Irvine, CA. An executive search firm exclusively placing business continuity,
Norman SecureSurf Protect your users when surfing the Internet.
Presentation by: Scott Geiger
Introduction to BC Management, Inc. Founded in March Headquartered in Irvine, CA. An executive search firm exclusively placing business continuity,
Future Jobs Denton MacDonald. Possible careers Architect Plan and design buildings and other structures Information Security Analyst Help ensure the security.
Computer Science Department Sonoma State University.
Computer Jobs 2013 Bob Nielson. Average Wage The average wages of all jobs in America >>>> $45,790 > $80,180.
Computer Science and Engineering 1 Csilla Farkas Associate Professor Center for Information Assurance Engineering Dept. of Computer Science and Engineering.
Computer Jobs 2014 Bob Nielson. Average Wage The average wages of all jobs in America >>>> $45,790 > $80,180.
Objectives Overview Identify the qualities of valuable information Describe various information systems used in an enterprise Identify the components of.
Can your team outwit, outplay and outlast your opponents to be the ultimate CyberSurvivor?
Computer Science and Engineering 1 Cyber Security University of South Carolina Columbia Center for Information Assurance Engineering (CIAE)
Accountant by Monica Eleine Brenda Silvia Grace Rina.
Computer Science Department Sonoma State University.
Intro to MIS – MGS351 The Information Age in Which You Live Chapter 1.
Step Three Search: Labor Market Realities Lifelong Employability Diversity Computer Skills English, Math & Science Customer Service Economy Awareness Post.
Understanding the Threats of and Defenses Against Cyber Warfare.
Financial Managers Gio Perazo. Job Description The duties of financial managers vary with their specific titles, which include controller controller treasurer.
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
E NGINEERING STUDIES IN T ELECOMMUNICATIONS S ECURITY School of Communication Engineering.
The Opportunity The IT Audit Senior is responsible for conducting independent audits of the company’s information technology infrastructure and business.
Top Tech Jobs 2014 Mrs. Burks October 14, Software Developer  Median Salary: $90,060 Unemployment Rate: 2.8 percent Expected Job Openings: 139,900.
By: Matthew Newsome.  The Internet was created so the US Department of Defense can share information between each other, which took place in the 1960’s.
IT Jobs Positions available in the field of Information Technology.
Major: Accounting OSCAR AYALA. General Overview/ Description ACCOUNTANTS MANAGE AND KEEP TRACK OF A COMPANY'S FINANCES PROVIDE COMPANY FINANCIAL REPORTS.
Job offer IT Infrastructure Specialist We are currently looking for an IT infrastructure specialist in order to respond to one key-account customer demand.
CITA 352 Chapter 1 Ethical Hacking Overview. Introduction to Ethical Hacking Ethical hackers –Hired by companies to perform penetration tests Penetration.
PRESENTED BY : Bhupendra Singh
By: Taysha Johnson. What is an insider threat? 1.A current or former employee, contractor, or other business partner who has or had authorized access.
Computer Science and Engineering 1 Cyber Security University of South Carolina Columbia Center for Information Assurance Engineering (CIAE)
Onsite CRM Security
Computers Are Your Future
Security Issues in Information Technology
Brittany Brown Keith Jones James Peterson Arsenio Taylor
Computers Are Your Future
Mirjana Boshnjak Skopje, 20 to 22 September 2017
Seminar On Ethical Hacking Submitted To: Submitted By:
Ethical Hacking By: Erin Noonan.
CEH vs CISSP Course, Advantage, Career, Salary, Demand!
COMPUTER ENGINEERING.
Understanding the Threats of and Defenses Against Cyber Warfare
UNIT I INTRODUCTION Growing IT Security Importance and New Career Opportunities – Becoming an Information Security Specialist – Conceptualizing.
Career JEOPARDY! Cluster: Information Technology
Year 10 ICT ECDL/ICDL IT Security.
Careers in IT.
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Call AVG Antivirus Support | Fix Your PC
IT Technician Pathway - Cybersecurity
Risk of the Internet At Home
Cyber Security Experts
Advanced Services Cyber Security 101 © ABB February, | Slide 1.
Government & Public Administration
Faculty of Science IT Department By Raz Dara MA.
Unit 4 IT Security Kerris Davies.
Mr. Gerken’s Career Presentation
Security week 1 Introductions Class website Syllabus review
Computer Security By: Muhammed Anwar.
Software Engineering By: Kenneth Byun.
Careers week ICT/Computing.
Presentation transcript:

Cyber Security Policy Analysts Kiera Drew, Ava Valentine, & Evan Valentine

Introduction During our meeting, we learned many things like how to make a Local Area Network (LAN). We also learned how to build a firewall, which is a barrier that prevents hackers from getting into your network and stealing personal information such as passwords that could give hackers access to your bank account.

Short narrative We chose Cyberspace Policy Analysts as a career field topic because, we love technology, it sounded interesting and we wanted to learn more! Companies like Target, JPMorgan Chase, Sony, as well as small businesses have all been the target of hackers. This makes Cyberspace Policy Analysts a desirable field of work.

Day to day responsibilities Microsoft and Google, and search engines like Chrome, Firefox and Internet Explorer use Cyber Security Policy Analysts to protect their websites from bad hackers so that they can execute transactions safely and without errors. On a daily basis, Cyber Security Policy Analysts, could be involved in policy and configuration decisions, virus scanning, monitoring strategies, detection and reaction.

Salaries Independent consultants make about $114,452; government contractors make about $99,339; government employees make about $86,218; military (Active Duty or Reservist) make about $69,508; and private business owners make about $78,476 according to clearancejobs.com.

Necessary training Bachelor of Science degree & 5 years of Cyber Security experience or 7 years if no BS degree. Technical auditing and cyber systems security engineering work. Ability to obtain and maintain a “Secret” or “Top Secret” clearance. ISC2 Certified Information System Security Professional (CISSP) or ISACA Certified Information Systems Auditor (CISA).

Why it is important Hacking is a serious problem and Analysts keep the public safe. Cybercrime and cyber espionage cost the US economy $100bn a year. Cyber-attacks cost the global economy about $300bn annually 1. 1. .

Other important information Some aspects of this project we really enjoyed were learning how to code! Coding teaches you how to program—and programing teaches you how to hack. As Good hackers, we learned how to defend against viruses in funs ways using video games and apps. We also LOVE Math!

References [A. D’Amico, K. Whitley]. [2008]. [The Real Work of Computer Network Defense Analysts]. [https://link.springer.com/chapter/10.1007/978-3-540-78243-8_2#page-1]. [4/14/2017] [Knapp, Kenneth; Boulton, William]. [2006]. [Cyber-warfare Threatens Corporations: Expansion into Commercial Environments]. [http://www.infosectoday.com/Articles/cyberwarfare.pdf]. [4/14/2017] [Department of Labor, Licensing and Regulation]. [2017]. [Local Area Unemployment Statistics (LAUS) - Workforce Information & Performance]. [https://www.dllr.state.md.us/lmi/laus/]. [4/14/2017] [Glassdoor]. [2017]. [Cyber Security Program and Policy Analyst]. [https://www.glassdoor.com/Job/cyber- policy-analyst-jobs-SRCH_KO0,20.htm]. [4/14/2017] [Clearancejobs.com]. [2017]. [Security Clearance Compensation Survey]. [https://about.clearancejobs.com/salary/security-clearance-compensation-survey]. [4/14/2017]

References [A. D’Amico, K. Whitley]. [2008]. [The Real Work of Computer Network Defense Analysts]. [https://link.springer.com/chapter/10.1007/978-3-540-78243-8_2#page-1]. [4/14/2017] [Knapp, Kenneth; Boulton, William]. [2006]. [Cyber-warfare Threatens Corporations: Expansion into Commercial Environments]. [http://www.infosectoday.com/Articles/cyberwarfare.pdf]. [4/14/2017] [Department of Labor, Licensing and Regulation]. [2017]. [Local Area Unemployment Statistics (LAUS) - Workforce Information & Performance]. [https://www.dllr.state.md.us/lmi/laus/]. [4/14/2017] [Glassdoor]. [2017]. [Cyber Security Program and Policy Analyst]. [https://www.glassdoor.com/Job/cyber- policy-analyst-jobs-SRCH_KO0,20.htm]. [4/14/2017] [Clearancejobs.com]. [2017]. [Security Clearance Compensation Survey]. [https://about.clearancejobs.com/salary/security-clearance-compensation-survey]. [4/14/2017]