Articles News Reviews Releases Downloads Contact Us White Papers

TCP/IP Skills Required for Security Analysts


Breaking into the network security industry, and finding a job as a computer security analyst can often be a daunting task. A great deal of us who work in the industry started down this path with nothing but an interest in computer security to begin with, and a desire to work in a field that we love. The question of how does one seek employment in this job sector, and more importantly what skills does one really need to have is a question I have been asked many, many times. One of the wonderful parts about the online community is the spirit of sharing and helping one another. Bearing this is mind I will now attempt to give a far fuller explanation of what I believe to be core skills required in today's security professional. Within the confines of this article the skills that I personally believe one should have at a minimum will be listed, and reviewed briefly to give you an idea of what those skills are.

In this tightening labor market it is also beneficial to have some certifications as well. Quite often the certification process also helps to cement one's knowledge in a particular area. For example getting a CCNA will certainly help you solidify your skills in the setting up of and daily maintenance of a router. This is just one example, and there are many others. A great number of people question the value of certifications, and their actual impact on the hiring process. Answering this question is beyond the scope of this article, and would be highly subjective at best anyhow. What is difficult to argue though is the fact that many company's are now openly advertising their jobs with a demand for some certification or other now. Knowing this it would seem apparent that getting one would certainly help in getting hired by a company. However, having the skills required to actually do the job, certification or now, may be another question altogether.

Read Full Story


News
Firefox AJAX Security Risk
Jun 28, 2006, 06:34 EST
Data Security Grabs Attention of Lawmakers
Jun 28, 2006, 06:33 EST
Identity Theft at Work
Jun 28, 2006, 06:31 EST
Security software slaps IE in Sandbox
Jun 28, 2006, 06:26 EST
SPI simulates hackers' brains
Jun 27, 2006, 13:36 EST
UK Firms Face Threat From Self-Activating USB Data Drain
Jun 27, 2006, 13:31 EST




Site Meter