Cybersecurity is a growing issue. The greater frequency of attacks and their higher sophistication require companies to utilize the services of true subject matter experts readily available to apply best practices for securing business assets. Many are the professional figures sought nowadays to help secure networks, but lately, Cybersecurity Analysts are in high demand.
The role of Cybersecurity Analyst (CSA) is similar to other jobs in the profession, positions like Information Security Analyst, Computer Systems Analyst, Malware Analyst and Information Assurance Analyst, whose duties, in general, also comprise of studying the best ways to safeguard data in systems or files using analysis programs to identify threats, but a CSA “specializes in issues related to vulnerability discovery, exploitation techniques, and reverse-engineering attacks,” says Paul Mehta, a Senior Research Scientist in an interview for Wired magazine; the analyst can take on different roles to ensure appropriate security controls are in place for the protection of computer networks and information.
Often cybersecurity analysts are assimilated to information security analysts, and, in effect, the two positions titles are often interchangeably used. Differences are subtle but can be identified thanks to standard definitions: according to NISTIR 7298 Revision 2, in fact, cybersecurity is “the ability to protect or defend the use of cyberspace from cyber-attacks.” The cyberspace is defined as “a global domain within the information environment consisting of the interdependent network of information systems infrastructures including the Internet, telecommunications networks, computer systems, and embedded processors and controllers.” This is a more focused domain if compared to Information Security defined as “protection of information systems against unauthorized access to or modification of information, whether in storage, processing, or transit, and against the denial of service to authorized users, including those measures necessary to detect, document, and counter such threats. (Read more...)
*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Daniel Brecht. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/R7YiRveeFkM/