In a world where a Security Guard protects assets and a
Bodyguardprotects people, a Cyber Security Specialist protects
information from theft, illegal duplication, and unauthorized
access. The work of a Cyber Security Specialist focuses on finding
risks and possible leaks. Cyber Security Specialists deal with
protecting information on computer networks, cloud servers, mobile
devices, and payment software, to name a few. They analyze where
these risks are and develop strategies to prevent breaches. Cyber
Security Specialists fight against cyber criminals, people who use
the internet and various hacking methods to steal sensitive or
private information from computers.
Many of the job aspects of a Cyber Security Specialist overlap
with those of someone working in the field of Information
Technology due to the nature of their work being closely tied to
computers and technology. Like most positions related to Security,
Cyber Security Specialists rely heavily on teamwork due to the
broad scope of the Computer Science field and the security measures
that need to be applied to it.
Here’s a non-exhaustive list of common tasks Cyber Security
Specialists are required to complete.
- Understanding the information that needs to be protected:
- Determining security measures best suited for the type of
information; and
- explaining the security measures taken to employers using
non-technical language.
- Protecting sensitive or personal information from unauthorized
access or use:
- Identifying potential security risks;
- designing strategies and defensive systems against
intruders;
- monitoring systems for unusual activities (e.g. unauthorized
access, modification, duplication, or destruction of
information);
- running counteractive protocols; and
- reporting incidents.
- Testing security strategies and defenses:
- Attempting to break in to uncover potential weaknesses;
- acting like a hacker to test defensive systems;
- trying to access information without proper credentials;
- trying to breakthrough firewalls and other security
applications; and
- writing reports based on test results.
- Developing new defensive systems and protocols:
- Creating new layers of protection;
- updating security systems; and
- developing new counteractive protocols.
- Granting permission and privileges to authorized users.
- Running diagnostics on information changes to check for
undetected breaches that may have occurred.
- Analyzing new methods of intrusion by cyber criminals:
- Keeping up-to-date on trends and new procedures in the
industry; and
- taking the necessary precautions, updating and fortifying
defenses accordingly.
- Protecting information from unauthorized access, duplication,
modification, or destruction.
- Analyzing security measures taken to protect information.
- Testing for and correcting possible weaknesses or
openings.
- Configuring security programs and tools.
- Running vulnerability tests and updating defensive protocols
and systems accordingly.
- Granting access and credentials to authorized users.
- Monitoring all access to the information.
- Checking for unregistered changes of information.
- Running defensive protocols and programs when breaches
occur.
- Writing regular reports on systems status.