Breaking into Information Security: Crafting a Custom Career Path to Get the Job You Really Want

  • 5h 26m
  • Anthony J. Stieber, Chris Liu, Josh More
  • Elsevier Science and Technology Books, Inc.
  • 2016

Whether you want to break into information security, move from one job to another, or transition into management, Breaking into Information Security will help. No other book surveys all the different jobs available in the industry, frankly discusses the positives and negatives of each, and what you need to learn to get into and out of each role.

Unlike books that focus on a specific skill set or on how to gain a certification or get a job, this book encompasses the "big picture," including why certifications, if any, are worthwhile for you. In a profession where new career paths aren’t always clear, Breaking into Information Security will teach you how to identify where you are in your career today, understand where you wish to go, and provide proven methods to get there.

From entry-level jobs to the extremely specific skills needed to be an InfoSec consultant, this book covers it all, including in-job skill building, working within the community, and building your skills after hours. If you are seeking to advance in the highly competitive field of information security, this book will give you the edge you need to break in.

  • The most practical guide to starting your career in information security, or advancing to the next level
  • Presented in a “level-up” gaming framework for career progression, with a “Learn, Do, Teach” approach through three tiers of InfoSec jobs
  • Provides examples of specific roles and career paths in each job tier so you can identify and max out skills for the role you want
  • Learn how to advance to management and training roles, as well as the specific skills you need to become an independent consultant
  • Find out about career "booster paths" to help you advance your career at high speed

About the Author

Josh has over fifteen years of experience in IT, and ten years working in Security. Though today, he primarily works as a security consultant, he has also worked in roles ranging from user to developer to system administrator. He holds several security and technical certifications and serves in a leadership position on several security-focused groups. He writes a blog on security at www.starmind.org and www.rjssoftware.com. As security works best from a holistic approach, he works all angles: risk assessments, posture analysis, incident response, malware analysis, infrastructure defense, system forensics, employee training and business strategy. Josh More works at RJS Software Systems, a national data management and security company.

Anthony J. Stieber has over 18 years of experience in the information technology industry working in academia, banks, retail, and insurance; designing enterprise security architectures, installing military and commercial firewalls; engineering medical diagnostic systems; reverse-engineering Internet stores; encrypting Fortune 100 enterprises; providing expertise for court cases; speaking at information security conferences; becoming an apprentice locksmith and a published writer.

Chris Liu has over 15 years of information technology experience, a CISSP, CISM, and no idea how he ended up where is. He has been a help desk technician, network administrator, quality assurance engineer, release manager, IT manager, instructor, developer, consultant, and product development manager, and is currently an information security professional. He is proof that careers sometimes only make sense in retrospect.

In this Book

  • Introduction
  • Models
  • Model Failures
  • Tier 1—Learn
  • Tier 1—Log Reviewer
  • Tier 1—Patch Management
  • Tier 1—Help Desk
  • Tier 1—Help Desk—Story
  • Tier 1—Coder/Developer
  • Tier 1—System Administrator
  • Tier 1—System Administrator Story
  • Tier 1—Network Administrator
  • Tier 1—Network Administrator
  • Tier 1—Security Coordinator
  • Tier 1—Trainer-Educator
  • Tier 1—Trainer-Educator
  • Tier 1—Quality Tester
  • Tier 1—Quality Tester Story
  • Tier 1—Subject Matter Specialist
  • Tier 2.0—Do
  • Tier 2—Pen Tester
  • Tier 2—Vulnerability Management
  • Tier 2—Security Assessor
  • Tier 2—Risk Assessor
  • Tier 2—Auditor
  • Tier 2—Incident Responder
  • Tier 2—Incident Responder—Story
  • Tier 2—Wildcard
  • Tier 2—Wildcard—Story
  • Tier 2—Advanced Help Desk—Help Desk Supervisor
  • Tier 2—Security Facilitator
  • Tier 2—Security Facilitator—Story
  • Tier 2—Policy Administrator
  • Tier 2—Trainer-Educator
  • Tier 2—Quality Assurance
  • Tier 2—Subject Matter Expert
  • Tier 2—Subject Matter Expert—Story
  • Tier 2—Lateral—Physical Security
  • Tier 2—Lateral—Military
  • Tier 2—Lateral—Law Enforcement
  • Tier 2—Lateral—Law Enforcement—Story
  • Tier 2—Lateral—Legal—Lawyers
  • Tier 2—Lateral—Sales
  • Tier 2—Lateral—Project Management
  • Tier 2—Lateral—Non-IT Engineering—Architecture—Science
  • Tier 2—Lateral—Accounting
  • Tier 2—Lateral—Business Analyst
  • Tier 3—Teach
  • Tier 3—Pen Test Lead
  • Tier 3—Security Architect
  • Tier 3—Lead Auditor
  • Tier 3—Lead Security-Risk Assessor
  • Tier 3—Tiger Team Member—Tiger Team Lead (Red Team)
  • Tier 3—Security Consultant
  • Tier 3—Security Management (CSO, CISO, CPO)
  • Tier 3—Lateral—CPA
  • Tier 3—Lateral—General Management
  • Tier 3—Lateral—Technical Architect
  • Tier 3—Lateral—Entrepreneur
  • Tier 3—Lateral—Entrepreneur—Story
  • Tier 3—Lateral—Academia
  • Boosting
  • Boosting—Author (Blogs, Magazines, Books)
  • Boosting—Developer (Open Source)
  • Boosting—Developer/Entrepreneur (Closed or Open Source)
  • Boosting—Evangelist (Security, Privacy)
  • Boosting—Researcher (Security, Vulnerability, Etc.)
  • Boosting—Speaker (Local Events, Podcasts, Webcasts, Etc.)
  • Community Support (Documentation, Bug Prioritization, Project Management)
  • Conference Support (Founding, Attending, Volunteering, Running, Leading)
  • User Group Support (Founding, Attending, Volunteering, Running, Leading)
  • Conclusion
SHOW MORE
FREE ACCESS

YOU MIGHT ALSO LIKE