Compare cert salaries and plan your next career move
UnixGuy wrote: » So my two questions are: 1) The position above doesn't mention anything related to Penetration testing or forensics or incident response or malware analysis....This leads me to believe that this organization doesn't do these sorts of tasks? 2) I understand that Firewall/Proxy/IDS/IDS/AD are considered perimeter security, is it becoming a separate discipline from things like incident response redteam/blue team? I'm ultimately interested in Red Team or Blue team sort of work, but I keep seeing positions asking for Firewall management for example without mentioning anything about incident response. I'd like to hear some opinions...
yzT wrote: » I don't see anything odd in that list. Those are typical technologies you should know about if you are planning to become Security Engineer. Maybe VMware is the only one irrelevant. About your questions: 1) Except malware analysis, you are definitively going to be exposed to everything else you mentioned. 2) Nothing special on this. It's expected you know that stuff.
UnixGuy wrote: » I gained some security experience for sure but not enough to convince someone to give me a full incident response or red team sort of role. - I get the odd role that's 80K, but the experience is even worse than what I have now...I think I need to have some serious certifications, that should help. I'm trying to narrow my focus on pentesting for now and see if this leads to a pentesting role, there seem to be a lot of demand but not enough people with real skills, so I'm aiming for that (for now).
yzT wrote: » .. 2) Nothing special on this. It's expected you know that stuff.
UnixGuy wrote: » ^^ It's really challenging to get experience in all of these areas. I guess the only way is get a job and learn on the job...along with labbing at home...
UnixGuy wrote: » This is a list of the stuff the "Security Engineer" is expected to work with:Mandatory: Firewalls, WAFs, Website security, Active directoryHighly Regarded: DLP, Mobile device management, IDS/IPS, VPNs, Certificate Management, SIEM, Nessus, VMWare, Oracle or SQL Server, Windows Server
636-555-3226 wrote: » most important - ask around at work and see if you can help with any security stuff. if you have a security dept, i can guarantee you they're overworked, so if you can convince them (and your boss) to let you help out with just the basics at first, it's a foot in the door.
Danielm7 wrote: » those people were typically systems or network engineers first and have a high level understanding of most of the stuff you listed.
636-555-3226 wrote: » Again, this is a bad position written by someone who doesn't know what they're doing. Firewall management - this is an old school infosec requirement and I'm of the belief that it's a network role and not an infosec role. if you don't already know firewall management, you can't really practice this on your own. sure, you can buy some cisco gear off of ebay and learn the ropes, but if they expect you to be a firewall manager for security purposes you're going to need years of dedicated experience that a home lab isn't going to give you. and that's just the first requirement...
636-555-3226 wrote: » .. I'm of the belief that it's a network role and not an infosec role....
636-555-3226 wrote: » i'd ignore this post and start learning the ropes on your own. Nessus and Splunk are free to download and use. Do it. Ubuntu or Mint are likewise to learn linux. you've got the (expired) ccna experience, so your networking should be OK. download and play around with kali (and get some cheap books on it on amazon) to learn the basics of how penetration testing works. most important - ask around at work and see if you can help with any security stuff. if you have a security dept, i can guarantee you they're overworked, so if you can convince them (and your boss) to let you help out with just the basics at first, it's a foot in the door.
yzT wrote: » So getting back on topic, for US people this position looks like a "what the hell, that's a pretty bad position because they are mixing lot of stuff", while for EU people it is like I said "nothing odd in that description". That's why I also stopped to be so active in this community as I was before, because often it's a "fight" between different mindsets, so job-wise if you are from EU you can't really trust what someone from US says and viceversa, because there are different systems and knowledge background.
renacido wrote: » The EU-US argument is really an argument over the value of generalists vs specialists.
UnixGuy wrote: » I don't see a big difference between US/EU/Australia to be honest, I think it depends on the size of the company and the maturity.
UnixGuy wrote: » Anyway..Update: Got approached for a job to do DLP work....plot twist#1: it pays significantly more than what I make now (30% more), with no over time no oncall. Plot twist #2: it's in a different state...so I need to relocate, make new friends, etc etc etc. (trying to make a decision soon)
Compare salaries for top cybersecurity certifications. Free download for TechExams community.