Those looking to combine top-flight cybersecurity skills and knowledge with information security design and building principles should consider becoming a cybersecurity architect. This role within an organization demands a coordination of high-level information security skills that include everything from penetration testing to management.
There are two general paths to earning this mid-level role — the degree path and the certification path. This article will detail both paths by exploring what you can expect going down each path and will conclude with a well-founded recommendation for which path you should choose.
A little about the role
The role of cybersecurity architect is a pivotal role within an organization. It is responsible for building, designing, testing and implementing information security systems. Being one of the “wearing more than one hat” roles in cybersecurity, this is just the start of typical responsibilities. Cybersecurity architects also supervise security teams, create security procedure and policy for the organization and even use pentesting and ethical hacking skills when needed to help shore up the organization’s information security environment.
This role has been previously described as being advanced-level in terms of career progression by some career authorities, but this classification is inappropriate. Most job descriptions require anywhere from three to 10 years of experience (with at least three to five years being in security), which is not technically an advanced level role. According to the United States Department of Personnel Management, a mid-level or mid-career role is one with 10 or more years of professional experience, making the cybersecurity architect role mid-level. With this minor argument quelled, let’s dive into the real argument — degree or certification.
Earning a degree is the first path that may land you on the doorstep of your first mid-level cybersecurity architect role. Four-year college degrees (Read more...)
*** This is a Security Bloggers Network syndicated blog from Infosec Resources authored by Greg Belding. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/G9dBtqfWF-E/