Compare cert salaries and plan your next career move
gespenstern wrote: » And it is more or less so in a real world, security folks rarely DO something compared to an infrastructure or development or network team, who do stuff all the day long. Security folks watch, analyze and advise.
goatama wrote: » I'm not sure if you read my original responses before you went about telling me I was "doing it wrong", but maybe you should before responding? At no time did I say we were hiring "CISSPs". I said we were hiring for a security engineer. Someone with hands on experience. I didn't list here all of the requirements in the job posting, more a general idea. My point was also that someone with five years of *actual* security experience in two or more of the domains should be able to do all of those things. Or at least provide an educated response. Again, they didn't have to get all of the questions right, but more often than not they couldn't get ANY of them right. None. I also didn't list all of the questions (since, you know, Idk if any of you guys are ever going to apply for the next one that opens up). So no, I'm not "doing it wrong", my point is that the CISSP is not the end-all-be-all cert that a lot of people seem to think it is.
billDFW wrote: » Isn't the CISSP geared more towards managers anyway, and less in-the-weeds ? The Secretary of the DOD is a manager, he does not need to know how to drive a tank or land on an aircraft carrier. He does however have people under him, who are Subject Matter Experts (SMEs) and have specific knowledge and talent on their specific tools.
TheFORCE wrote: » I'd agree with gespenstern. You say you are not hiring CISSP's but you used the cert as probably something nice to have, preferred or required, in addition you compared the person with CISSP vs the one without and at the end you hired the one without because of the technical knowledge. Then again you compare the many CISSP and none of them seemed to know the answers, based on that you are assuming that the CISSP is not deemed worthy or it does not provide any real technical knowledge, the fact is CISSP does not provide technical knowledge and you should write your job descriptions aimed towards more technical people.
goatama wrote: » I'm not sure if you read my original responses before you went about telling me I was "doing it wrong", but maybe you should before responding? At no time did I say we were hiring "CISSPs". I said we were hiring for a security engineer.
goatama wrote: » My point was also that someone with five years of *actual* security experience in two or more of the domains should be able to do all of those things.
goatama wrote: » So no, I'm not "doing it wrong", my point is that the CISSP is not the end-all-be-all cert that a lot of people seem to think it is.
ITHokie wrote: » This is in incredible statement and very revealing. I suppose if I believed security people don't actually do anything I wouldn't have any issues with perception of CISSP. In the world I live in, security requires DOers.
gespenstern wrote: » And what are these DOers do exactly in your world? Let's say, compared to folks working in development or infrastructure.
ITHokie wrote: » It's debatable whether the ratio of DOers to non-DOers is the right one in any given organization; that infosec requires DOers and that they exist is not debatable. I think you know that, which is why you have already shifted the goal posts by insinuating that they don't do as much as development and infrastructure types. On the other hand, if you actually believe security operations does not include DOers, your career (world) just hasn't intersected with them yet. It will eventually.
ITHokie wrote: » ...which is why you have already shifted the goal posts by insinuating that they don't do as much as development and infrastructure types.
ITHokie wrote: » On the other hand, if you actually believe security operations does not include DOers, your career (world) just hasn't intersected with them yet. It will eventually.
gespenstern wrote: » They are like spiders sitting in the center of the web, seemingly doing nothing, but having their many limbs connected to many silk lines of the web listening to things happening and making sure that they are happening right, not by changing the processes themselves, but influencing other people in the organization to change their practices to more secure ones. They can do stuff occasionally, but if it is a habit and common practice then it is most likely a more or less immature organization of security.
gespenstern wrote: » It's actually quite opposite to what you are saying. Every word is recorded, fortunately. I stated from the beginning of this conversation that security folks RARELY do things COMPARED to other teams, such as infrastructure, development or network. And it was you who shifted this for the sake of strawman arguing from rarely to never and omitted the comparison with other folks in IT.
gespenstern wrote: Security folks watch, analyze and advise. Your questions are more for doers...
gespenstern wrote: They can do stuff occasionally, but if it is a habit and common practice then it is most likely a more or less immature organization of security.
ITHokie wrote: » Saying that security folks "RARELY" do things "COMPARED" to other teams (DOers) clearly implies that they aren't DOers. Which is why you followed this statement with
goatama wrote: » I see what's wrong. You've seen some stuff so you think everyone else that doesn't do it specifically the way you think it should be done is doing it wrong. I guess that explains these responses.
goatama wrote: » So let me add a little bit more clarity: I need the engineers I work with to *know* these things. I need them to know Wireshark, what security events to look at and derive meaning from. I need them to know how to write SQL injection and how to detect a possible buffer overflow issue in code so they can ensure that the developers are coding things properly. I need them to be able to understand security architecture from the ground up, this includes networking and infrastructure. I also need them to know policy and compliance. They don't have to *do* all of these things. They need to be able to understand that information and then leverage it appropriately to advise and secure the organization.
gespenstern wrote: » Implies? Retreats? You clearly posing yourself outside of the boundaries of intellectually honest discussion. Cheers!
Compare salaries for top cybersecurity certifications. Free download for TechExams community.