The word Digitalization is enhancing in 21 century. We can see may gadgets been created or being upgraded which contains some information relating to us, it may be in form of phones, computers, Organization database etc. These Information stored are so sensitive that it may even cause a huge effect if it is exposed to an unknown person thus Information security plays a vital role in safe guarding to details of an individuals, organizations and government bodies
Now a day every organization, sectors and companies are looking for securing their information or products thus they have created a department named Information Security for every work they involve in. Information Security is the vast field similar to development thus this field involves different roles a professional need to carry on the different scenarios and work nature i.e Offensive and Defensive
The major Jobs profile that an individual can be designated in security field are
- Information Security Architect
- Privacy Officer
- Information Systems Auditor
- Systems/ Application/Information Security Manager
- Disaster Recovery Specialist
- Security Architect
- Penetration Tester /Ethical Hacker
- Security Engineer/Administrator
- Security Researcher
- Forensics Engineer
- Computer Security Incident Response Team Member
- Patch Management
- Malware Analyst
- Virus Technician
- Security Sales
- Security Software Developer
- Intrusion Detection Specialist
1 Chief Information Security Officer (CISO)
The Chief Information Security Officer is a high-level management position responsible for the entire computer security department and staff. Traditionally this position generally exists in large organizations, like Fortune 500 companies or key government agencies, that have large computer security staffs and systems. However, as the requirement for information security is becoming more widely recognized the role is appearing in smaller organizations, though often the role will include hands on technical work. Extending titles with Chief and Global Head may be barred for political reasons.
1.1 Global Head of IT/Information Security
He is the senior-level executive within an organization responsible for establishing and maintaining the enterprise vision, strategy, and program to ensure information assets and technologies are adequately protected. The CISO directs staff in identifying, developing, implementing, and maintaining processes across the enterprise to reduce information and information technology risks. They respond to incidents, establish appropriate standards and controls, manage security technologies, and direct the establishment and implementation of policies and procedures. The CISO is also usually responsible for information-related compliance which includes PCI DSS, ISO 27001, HIPAA; BCP DR etc.
2 Information Security Architect
We have seen the Information Security Architect title used for very different roles, the first for the individual who heads up a security design team building a new enterprise network or taking one through a tech refresh.
2.1 Information Security Director
An Information Security Architect or Information Security Director is also used as follows: directs organization-wide security technology. This role is responsible for the integration of IT systems development with security policies and information protection strategies. It also has responsibility for developing, maintaining, and publishing corporate information security standards, procedures, and guidelines. Provides technical guidance and training to information “owners,” corporate security officers, and IT associates, and designs and implements programs for user awareness, compliance monitoring, and security compliance.
Typically the word “Information” shows this is a more managerial position than a “Security Architect”, which is generally a much more technical position.
2.2 Cross-Platform Security Architect
This role develops and ensures policies for the secure management of security systems across platforms, including development and maintenance of encryption policies, intrusion detection, and network authentication. The success of this position is greatly dependent on the individual’s ability to create and maintain relationships with programmers, risk assessment staff, auditors, security department, and installation personnel.
3 Privacy Officer
The Privacy Officer develops and implements policies and procedures to guarantee that only those with the right to access confidential information can do so. This is particularly important in education and health-care organizations where privacy is regulated by law.
3.1 Data Protection Officer
Data protection officer main role is to ensure that the data is protected from getting breach, they follow different compliance relating to the data management. They are skillful in database handling and programming. They monitor the data center and ensure the data are well secured
3.2 Information Security Analyst
This position conducts information security assessments for organizations. They interview employees to learn about current information security policies, then evaluate them, write reports on their findings, present their reports to management, and recommend strategies for improvement. Again, the use of “Information” in the title normally implies a more managerial, less technical role.
4 Information Systems Auditor
An Information Systems Auditor tests the effectiveness of computer information systems, including the security of the systems and reports their findings. They determine whether a computer system safeguards assets, maintains data integrity, allows organizational goals to be achieved effectively and uses resources efficiently. They usually work with others in the business and IT departments in a cooperative effort to ensure the security of the systems.
4.1 Information Security Auditor
Responsible for auditing a network against a given policy or standard such as a System Security Policy, ISO 17799, ISO 27001, NSA Clamp Down etc. Depending on the scope the audit might cover Operating System settings such as within the registry, firewall configuration, IDS Policy and tuning, Business Continuity Plans, Processes, Training and Personnel. The role is usually well paid due to the diverse skill set required and the ability to instil trust and impart advice. This is often a role performed by an outside consultant.
4.2 Security Analyst
Responsible for assisting in the coordination effort to remediate security alerts and respond to information security related incidents. They analyze the security in an organizations networks or an application. They may be classified as senior or Junior level on basis of their nature of role and experience
4.3 Security Auditor
A security auditor analyses operating system and file access logs to detect inappropriate access or nefarious activity. The role is usually found in the financial or public sectors such as Government and Defense
5 Systems/Application/Information Security Manager
The Security Manager creates and develops security measures to safeguard information against accidental or unauthorized modification, destruction, or disclosure. Security Manager Coordinates with management, programmers, risk assessment staff, auditors, and other security departments to identify and plan for security in all aspects of data, applications, hardware, telecommunications, and computer installations. The role for this designation varies according to the application structured and compliance used
6 Disaster recovery Specialist
They work on Business continuity panning and Disaster Recovery (BCP DR) design and implement programs to recover processes and data lost in a disaster. They use Disaster Recovery Planning (DRP) software to identify data and computer systems that may need to be recovered, plan off site data storage and computing facilities, and test data recovery procedures. Although it is not considered a “computer security” position, but it actually is the most basic type of computer and information security.
7 Security Architect
A security architect role is to either designs a network and securing it or designs a particular security element such as the PKI infrastructure or IDS/IPS and securing it. Security skills vary considerably, a thorough understanding of security threats is desirable though many become Security Architects from OS, networks, or database backgrounds
8 Security Penetration Tester – (Pentester)
A penetration tester is an extremely specialized role. A pentester test all the network and application of an organization by finding out the vulnerability from the organizations systems, network device, Application or any other mode. Pentester roles varies according to the area of specialization i.e Network, Web applications, Mobile Application, internet of things etc. A pentester need to thoroughly understand the scenario of each and every system and its exploits
There is a specialization of Penetration Tester known as a “Red Team” Tester. This is a member of a group put together to perform penetration tests on the most critical infrastructure components of countries: utility companies, nuclear installations, atomic research facilities, military computer systems, etc.
8.1 Vulnerability Accessor
Vulnerability assessors will scan a network and identify vulnerabilities producing a report prioritizing the vulnerability risk and impacts so that it can be patched up by patch Management team
9 Security Engineer / Administrator
Their Role is to install and manage the security systems across the entire organization’s network, including IDS, firewalls, log capture, etc, and also have a responsibility for monitoring and reacting to their output, though this would ordinarily fall to Security Analysts.
10 Security Researcher
These used to be independent individuals who looked for new vulnerabilities in products. The notoriety and marketing potential their findings received drew the attention of a number of companies who employ them either full-time or purchase their research.
11 Forensics Engineer
A Forensic Engineer preserves, identifies, extracts, and documents evidence stored in computers. They search through the computer for information that will help identify and prove the crime that was committed. They also compile computer evidence for legal cases and work on programs that help recover computer evidence. They often give expert testimony at trials.
Alternative name for this job profile: Computer Crime Specialist, Computer Forensic Investigator
12 Computer Security Incident Response Team Member
The Security incident response Team job role is to prepare for and provide rapid response to security threats such as virus attacks. They develop a procedural set of responses to security problems, including protocols for communication within the organization as well as any interaction with law enforcement agencies during computer security incidents.
A Cryptographer is responsible for the security of electronic information, using encryption. Encryption is the transformation of data into some unreadable form to keep it private and hidden from anyone for whom it is not intended. Decryption is the transformation of encrypted information back into a comprehensible form.
These positions are normally research related, or working with security software companies to build cryptography into their products.
This job analyzes hidden information, like an encoded message or encoded computer code, to figure out what the code means. The skill set is a mix of mathematics and computer cryptography.
15 Patch Management
The job role of patch management team is to patch up the vulnerability that has been issued by Vulnerability Advisors or Pentester after testing the organization network or Application
16 Malware Analyst
Malware analyst mainly work on analysis of different type of malware and their behavior, and providing the methods to prevent them before it is occurred
17 Virus Technicians
This job analyzes newly discovered computer viruses and devises ways to defend against them
18 Security Sales Team
Information Security also has various products like Anti Virus, Scanning tools, Intercepting tools, Disaster management tools, Network and web security tools which can be valuable for various organization thus Security sales team meet the demands of the required customer by selling the required products
18.1 Security Sales Account Manager
This is a typical sales position, where the product being sold is security solutions of some type. The product could be security applications, security appliances, services, auditing, managed monitoring services, etc. This would require a fairly in-depth knowledge of security issues and products to be successful.
18.2 Security Pre-Sales Engineer
A typical sales position where the product being sold is security related. This job role is Responsible for providing presentations on the products offered before getting sold, demonstrations of those products, configuration and sizing recommendations.
18.3 Security Post-Sales Engineer
This is a technical position responsible for assisting a customer with design and implementation of a security product into the organization, networks, and systems. Often Training of customers on the particular product and skillsets is involved.
19 Security Software Developer
19.1 Security Software developer
A Security Software Developer which actually develops security software. This person would participate in efforts to develop new software tools for monitoring computer networks and analyzing traffic on those networks. They would participate in software design, implementation and testing, and could also support customer deployments of software developed.
19.2 Security Software Engineer
A Security Software Engineer responsible for ensuring security is implemented in applications developed through the standard software development life cycle within an organization. In this definition, the software developed is not security specific.
20 Intrusion Detection Specialist
An Intrusion Detection Specialist has skills in:
- Monitoring networks using a variety of tools to identify potential intrusions
- Penetration testing
- Software development and coding
This role will typically be in a large company or the government, as most smaller companies couldn’t afford a dedicated staff member to perform this function. An Intrusion Detection Specialist will monitor the network/computers/applications, looking for traffic or events that could indicate an intrusion. performing the research to determine if an intrusion occurred, how it occurred, and what information was obtained or damage was inflicted.