Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
0
1
00:00:01,220 --> 00:00:07,910
Jobs in cybersecurity! As a starting point will begin with a list of pros and cons that you will have
1
2
00:00:07,910 --> 00:00:08,910
in cybersecurity.
2
3
00:00:09,290 --> 00:00:13,970
There are some strong pros since there is a huge market demand and a shortage of specialized staff.
3
4
00:00:14,690 --> 00:00:17,350
This is also the driver of the high salaries within this area.
4
5
00:00:17,720 --> 00:00:23,180
A cybersecurity job will also keep you up to date and in a continuous learning environment that will
5
6
00:00:23,180 --> 00:00:25,940
not let you get bored. On the cons side,
6
7
00:00:25,980 --> 00:00:30,680
The main point is that an IT background is preferred and in some cases this is mixed with possible
7
8
00:00:30,680 --> 00:00:33,500
transversal IT knowledge and/or certifications.
8
9
00:00:34,100 --> 00:00:38,780
Another point here is that depending on the cybersecurity job, you might find yourself in a stressful
9
10
00:00:38,780 --> 00:00:43,460
situations with high responsibility and pressure, like, for example, during an actual attack trying
10
11
00:00:43,460 --> 00:00:44,340
to stop the bleeding.
11
12
00:00:45,050 --> 00:00:49,160
There are probably some other ones that can be mentioned here, but we will try to give you more insights
12
13
00:00:49,160 --> 00:00:50,210
in the upcoming slides.
13
14
00:00:50,660 --> 00:00:52,510
And now let's see some interesting figures.
14
15
00:00:53,390 --> 00:00:58,370
What I personally find quite motivating for people to consider this field is that, according to CSO
15
16
00:00:58,370 --> 00:01:04,250
online, 40% of IT leaders say cybersecurity jobs are the most difficult to fill.
16
17
00:01:04,910 --> 00:01:07,700
And we're going to continue now with a few interesting figures.
17
18
00:01:07,760 --> 00:01:13,550
As Steve Morgan, CEO of Cybersecurity Ventures, said, the number of unfilled jobs in this field are
18
19
00:01:13,550 --> 00:01:18,920
constantly growing from around 1 million in 2013 to 3.5 in 2021.
19
20
00:01:19,250 --> 00:01:25,910
Also, cybersecurity engineers are some of the highest-paid positions started at around 140K $ annually
20
21
00:01:25,910 --> 00:01:33,920
on average. 70% of cybersecurity professionals claim their organization is impacted by the cybersecurity
21
22
00:01:33,920 --> 00:01:34,830
skills shortage.
22
23
00:01:35,540 --> 00:01:40,550
Some very interesting figures come from the U.S. Bureau of Labor Statistics, which states that from
23
24
00:01:40,550 --> 00:01:46,400
2019 to 2029, the job outlook is to increase with 31%.
24
25
00:01:46,730 --> 00:01:56,120
Number of jobs in 2019 was around 131.000 and until 2029 it's expected to grow with around 40900
25
26
00:01:56,120 --> 00:01:57,920
in the U.S. alone.
26
27
00:01:58,860 --> 00:02:05,640
The salaries in 2019, average pay of around 99730$ per year,
27
28
00:02:06,120 --> 00:02:14,760
which translates into around 48$ per hour. Work experience wise, in average, there were people
28
29
00:02:14,760 --> 00:02:20,090
with less than five years experience and with a bachelor's degree as minimum.
29
30
00:02:20,370 --> 00:02:25,020
We will leave in the resource section, a file with all the relevant links. And now let's see the career
30
31
00:02:25,020 --> 00:02:25,470
paths.
31
32
00:02:25,470 --> 00:02:31,170
and what is required. In this part we will first explain the prerequisite for the cybersecurity jobs.
32
33
00:02:31,590 --> 00:02:34,040
If you don't have any IT experience, don't panic.
33
34
00:02:34,440 --> 00:02:37,100
We will explain you right now how to get started.
34
35
00:02:38,040 --> 00:02:44,580
First, we highly recommend you to start working towards getting a junior position as a network/system
35
36
00:02:44,580 --> 00:02:50,700
cloud or software engineer, or if you can invest more time, try to get a bachelor's degree or a master
36
37
00:02:50,700 --> 00:02:54,360
of science in the IT related fields. For the junior paths
37
38
00:02:54,360 --> 00:02:59,160
you can also start with some introduction courses from Udemy or similar platforms,
38
39
00:02:59,670 --> 00:03:06,930
to see what position fits you better. We recommend you to try a few like network/system/cloud engineering
39
40
00:03:07,290 --> 00:03:09,540
in order to get the helicopter view of its role.
40
41
00:03:10,110 --> 00:03:14,670
Since cybersecurity is a quite complex domain, it helps to already have an understanding of networking
41
42
00:03:14,670 --> 00:03:21,030
components like firewalls and proxies, but also other areas such as APIs and web technologies.
42
43
00:03:21,630 --> 00:03:26,400
For the people that want more details, you can always drop us a message in the questions section and
43
44
00:03:26,400 --> 00:03:28,890
we will try to give you a detailed answer as soon as possible.
44
45
00:03:29,610 --> 00:03:35,970
Some of the most well-paid jobs require, however, a background in I.T. and that's why it would help
45
46
00:03:35,970 --> 00:03:42,630
if we have one or more of the following, a bachelor's degree or above in computer science, systems
46
47
00:03:42,630 --> 00:03:50,160
engineering, I.T. or related majors. Sufficient work experience in cybersecurity with incident detection
47
48
00:03:50,160 --> 00:03:55,610
and response, experience with common cybersecurity solutions like firewalls, antivirus and others.
48
49
00:03:56,160 --> 00:04:01,410
Basic programming proficiency in languages like Python, C++, Java, Ruby and so on.
49
50
00:04:01,860 --> 00:04:06,000
And the ability to work under pressure during the unfortunate event of an attack.
50
51
00:04:06,540 --> 00:04:13,980
Or if you have prior work experience as a system administrator, DB administrator, web admin, web
51
52
00:04:13,980 --> 00:04:20,340
developer, network admin, I.T. technicians, security administrator, network engineer or computer
52
53
00:04:20,340 --> 00:04:21,150
software engineer.
53
54
00:04:21,930 --> 00:04:24,750
Now let's see what other different career paths that you can take.
54
55
00:04:25,680 --> 00:04:32,670
First one is the ethical hacker. The Ethical Hacker is a cybersecurity expert who is employed to verify
55
56
00:04:32,670 --> 00:04:35,230
and improve the security of a company's computer system.
56
57
00:04:35,820 --> 00:04:42,600
The job is to conduct advanced penetration tests on a computer system and identify any breaches or weaknesses
57
58
00:04:42,600 --> 00:04:43,740
in the security setup.
58
59
00:04:44,310 --> 00:04:48,300
The average annual salary in the US is around 82000 dollars.
59
60
00:04:49,240 --> 00:04:56,410
Second, the IT auditor, the role of an IT auditor involves developing, implementing, testing, and evaluating
60
61
00:04:56,410 --> 00:04:57,660
audit review procedures.
61
62
00:04:58,180 --> 00:05:03,730
The audit process can be extended to networks, software programs, communication systems, security
62
63
00:05:03,730 --> 00:05:08,320
systems and any other services that rely on the company's infrastructure.
63
64
00:05:08,800 --> 00:05:15,310
I.T. audits are important for evaluating internal control and processes in an effort to keep the organization
64
65
00:05:15,310 --> 00:05:18,610
and its data secure from external or internal threats.
65
66
00:05:19,600 --> 00:05:25,930
Cybercrime analysts, also known as cybercrime investigator or forensics analyst, is an information
66
67
00:05:25,930 --> 00:05:32,050
security professional who used his skills and background knowledge in areas like network administration
67
68
00:05:32,380 --> 00:05:36,710
or network engineering to help counter the activities of cyber criminals.
68
69
00:05:37,030 --> 00:05:40,040
Another job that falls under this category is the fraud analyst.
69
70
00:05:40,510 --> 00:05:44,570
They are usually employed in the financial sector to investigate fraudulent activity.
70
71
00:05:44,980 --> 00:05:49,180
They monitor things like financial transactions to trace theft or scams.
71
72
00:05:49,390 --> 00:05:55,170
The responsibility is to minimize potential risks of the institution and its clients. As a fraud analyst
72
73
00:05:55,190 --> 00:06:01,030
you will be using different tools to investigate and flag suspicious activity that do not fit in the
73
74
00:06:01,030 --> 00:06:02,080
expected patterns.
74
75
00:06:02,860 --> 00:06:08,800
The average annual salary for this type of positions is around 70000 dollars per year.
75
76
00:06:09,340 --> 00:06:16,120
Next, security engineer, a security engineer, is a quite generic position on which people can wear
76
77
00:06:16,120 --> 00:06:18,440
different hats. In a normal scenario,
77
78
00:06:18,460 --> 00:06:24,160
it should include the responsibility of completing a thorough risk assessment, identifying vulnerabilities
78
79
00:06:24,160 --> 00:06:30,670
within our network and creating firewalls, configuring systems or enhancing the existing security features.
79
80
00:06:31,270 --> 00:06:37,840
The average annual salary for this type of position is around 92000 dollars in the US.
80
81
00:06:38,820 --> 00:06:45,330
Security architect. This is probably the toughest position to take because it usually requires some years
81
82
00:06:45,330 --> 00:06:52,820
of experience in transversal areas, including some extended years within the cybersecurity domain.
82
83
00:06:53,670 --> 00:07:00,780
A security architect usually manages things like reviewing current systems, security measures and recommending
83
84
00:07:00,780 --> 00:07:05,640
and implementing enhancements, conducting the regular system tests and ensuring continuous monitoring
84
85
00:07:05,640 --> 00:07:12,060
of network security, developing project timelines for ongoing system upgrades, ensuring all personnel
85
86
00:07:12,060 --> 00:07:15,540
have access to the IT system, limited by need and role.
86
87
00:07:16,020 --> 00:07:22,230
Establishing disaster recovery procedures and conducting breach of security drills. Promptly responding
87
88
00:07:22,230 --> 00:07:26,020
to all security incidents and providing thorough positive analysis.
88
89
00:07:26,730 --> 00:07:29,550
And now let's do a recap. First,
89
90
00:07:29,880 --> 00:07:33,120
we have five main possible options that you may take.
90
91
00:07:33,540 --> 00:07:36,870
The first one is the penetration testing and ethical hacking path.
91
92
00:07:37,310 --> 00:07:39,130
The second one is the IT auditor.
92
93
00:07:39,210 --> 00:07:45,330
The third one is a cybercrime analyst, which basically includes the forensics analyst, fraud analyst
93
94
00:07:45,330 --> 00:07:51,250
and security analyst. Fourth, security engineer, and fifth is the security architect.
94
95
00:07:51,630 --> 00:07:56,610
We will leave in the resource section a file with all the relevant links. With this, would like to conclude
95
96
00:07:56,610 --> 00:07:57,550
our bonus lecture.
96
97
00:07:57,870 --> 00:08:02,640
We hope that we provided some interesting information that can further take with you in your next,
97
98
00:08:02,640 --> 00:08:04,750
hopefully, cybersecurity adventure.
98
99
00:08:05,040 --> 00:08:06,890
Your feedback is very important to us,
99
100
00:08:06,900 --> 00:08:12,870
and in order to improve our content, please feel free to leave us comments with any improvement points
100
101
00:08:12,870 --> 00:08:16,020
or any extra content that you might like to see in our next version.
101
102
00:08:16,470 --> 00:08:16,890
Thank you.
12088
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.