Home > Uncategorized > How to Build a Successful IT Security Career

How to Build a Successful IT Security Career


Janet Pinkerton

Wednesday, April 18, 2012

IT security pros can never stop learning about cyber threats and best security practices. Industry professionals recommend a mix of activities to continually prep for a successful IT security career.

Network Connections Network and build knowledge by joining local chapters of IT security trade associations or online communities, suggests Amy Hagerman, assistant vice president/IT security manager at Independent Bank in Ionia, Michigan. “It’s very cost effective.”

Such groups could include:

A working friendship with a group of respected, trusted peers can be a huge resource to everyone in the group. It provides a chance to learn about new challenges or technologies, and discuss problems. “Once you get plugged into some of these groups, you build up a rapport over time, so you know who really knows what they are talking about, and whom you are able to trust,” says Hagerman.

Get Educated All three IT security professionals interviewed for this blog earned IT-related bachelor’s degrees; two invested in graduate level study. “I had to take the time to get in and learn how things worked, why things like firewalls for example, worked,” says Justin Opatrny, network planner for General Mills, who holds a bachelor’s degree in management information systems from Iowa State and a Master’s in Information Assurance from Norwich University.

Understanding the fundamentals of networking, operating systems, security threats and risk is key to professional success.  “Anybody can learn to use an IT security tool like a firewall or an IPS (intrusion prevention system),” says Opatrny. “You need to know why you are using that tool, what advantages does it have, what disadvantages does it have—so you understand the full picture. Without those foundations, you’re likely to have less success running and securing your systems properly.”

Get Certified “Certification can be a great career builder,” contends Opatrny, who holds not only the CompTIA Security+ credential, but also the CISSP from ISC2 and forensic analyst and systems/network auditing credentials from GIAC. “It gives you some level of validation that you have a base knowledge of skill.” That can be a differentiator to an entry-level IT security employee. But he adds, “You’d better be able to prove on the job that you can apply these skills and knowledge—not just that you are good at taking tests.”

Get Involved Becoming involved with trade industry groups, such as CompTIA or ISSA, is good for the industry, and it’s good for you. Opatrny teaches, writes industry articles and volunteers as a subject matter expert; both Hagerman and Lee Myers, chief technology officer for the Archdiocese of Philadelphia, helped write CompTIA’s CASP exam.  The “Share the Wealth” mentality is pretty prevalent in IT security, says Opatrny. “We are already at a disadvantage against these malicious agents. We have to take every chance we have to work with our peers, share what we’ve learned or experienced, so we don’t have to figure it all out ourselves.”

Keep Reading & Researching Beyond setting RSS feeds or Google News Reader, popular online resources for IT security professionals include:

  • BugTraq — Security Focus mailing list for the “detailed” discussion and announcement of computer security vulnerabilities: what they are, how to exploit them, and how to fix them. “There’s more information on there than any one person could absorb,” says Opatrny.
  • Center for Internet Security (daily cyber security tips, white papers, guides, videos and podcasts)
  • Experts Exchange (online forum where IT professionals provide answers on tech topics)
  • ISC2 (blog, journal, magazine)
  • ISSA (journal, executive forum, webcasts, whitepapers, e-news)
  • NIST’s Special Publications (800) series, and FIPS publications. The SP800 series are documents from NIST’s Information Technology Laboratory, featuring titles such as “Guidelines for Securing Wireless Local Area Networks” (published February 2012). “The SP800 Series is a great reference for learning different aspects of security,” says Opatrny. Myers adds that NIST FIPS (Federal Information Processing Standards) “give you a great framework.”
  • SANS Institute (research, whitepapers, newsletters, webinars)
  • Secure Computing (monthly magazine and online news)
  • U.S. Computer Emergency Readiness Team— The Home and Business section offers basic tutorials (e.g., “Understanding Denial of Service Attacks”), as well as alerts current security issues, vulnerabilities, and exploits and weekly summaries of new vulnerabilities (and patch information when available).
  • Verizon 2011 Investigative  Response (IR) Caseload Review and its Data Breach Investigations Report (DBIR) — The DBIR is a “very thorough evaluation of all of the incidents Verizon has responded to over the last year—where the attacks are coming from, how effective they’ve been, areas getting attacked,” says Hagerman. “I find that very helpful in identifying what we should be protecting against.”

Via: Comptia Certifications Blog

Advertisements
  1. No comments yet.
  1. No trackbacks yet.

Leave a Comment

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: