Cyber Career Path

Download as xlsx, pdf, or txt
Download as xlsx, pdf, or txt
You are on page 1of 4

Cyber Security Recommended

Roles 2018 Valued Skills Certifications


Network Administration ECIH/GCIH
Network Security CISSP
Forensics Analysis & Reverse Engineering GIAC/GSEC
1.) Incident Responder
Independent Platform Knowledge CISA
Familiarity with Sandbox Environment CISM
Security +/CySA+/CyberOps
Information Security OSCP/OSCE
Python/Scripting CEH
2.) Penetration Tester Independent Platform Knowledge CISSP
Information Systems GIAC
Project Management CISM
Information Security CEH
Python/Scripting OSCP
Independent Platform Knowledge GREM
3.) Malware Analyst Information Systems GIAC
Project Management

Internal Auditing CISA


Information Systems CISM
Audit Planning CISSP
4.) Security Auditor Sarbanes-Oxley (SOX) CIA
Accounting GIAC

Network Security CFCE


Information Systems CISSP
Cryptography GASF
5.) Cyber Forensics Python/Scripting CEH
Independent Platform Knowledge GCFE/GCFA
Information Security GNFA
GCTI
Known As Cyber Security Roles 2018
Incident Response Analyst
Incident Response Consultant
Incident Response & Security Engineer
6.) SOC Analyst
SOC Incident Response Lead
Cyber Defense Incident Responder
Cyber Threat Hunter/Active Responder
Ethical Hacker
White Hat Hacker
Red Team 7.) Threat Hunter
Exploit Developer
Cybersecurity Test Engineer
Security Consultants
Threat Researchers
Reverse Engineers 8.) Threat Intelligence Analyst
Malware & Forensics Analyst
Cyber Malware Analyst
Malware Defense Specialist
Insider Threat Analyst
Information Security Auditor 9.) Vulnerability Management Analyst
Information Systems Auditor
IA Auditor
Cybersecurity Auditor
IT Audit Manager
Senior IT Internal Auditor 10.) Cybersecurity Architect
Senior IT Auditor
Computer Forensics Investigator
Cyber Forensics Examiner
Digital Forensics Engineer
Cyber Forensics Expert
Cyber Crime Investigator
Compliance/Forensic Engineer
Digital Forensic Specialist
Recommended
Valued Skills Certifications
Information Security GIAC
Information Systems CISA
Independent Platform Knowledge CISM
Cryptography Security +/CySA+/CyberOps
Network Security CISSP
ECIH/GCIH
Information Security CISSP
Information Systems GIAC
Independent Platform Knowledge OSCP
Cryptography CISA
Network Security CISM
Information Security CISSP
Project Management CISM
Independent DB Platform Knowledge CISA
Business Process CIPP
Budgeting GIAC
Information Security CISSP
Python/Scripting CEH
Independent Platform Knowledge OSCP
Information Systems GIAC
Project Management CISM
Information Security CISSP
Network Security CISSP-ISSAP
Cryptography CISM
Independent Platform Knowledge CEH
Project Management CISM
Known As
SOC Engineer
SOC Consultant
Threat Monitor SOC Analyst
Cybersecurity (SOC) Analyst
Insider Threat Analyst
Intelligence Analyst
Threat Hunting Engineer
Cyber Threat Analyst
Security Engineer - Threat Detection
Senior Threat Analyst
Cyber Threat Hunter/Active Responder
Security Analyst
Security Engineer
Counterintelligence Analyst
Intelligence Analyst
Cybersecurity Threat Analyst
Vulnerability Analyst
Vulnerability Assessor
Vulnerability Management Specialist
Information Management Consultant
Threat and Vulnerability Researcher
Security Architect
Information Security Architect
Information Systems Security Architect
Cybersecurity Senior Policy Expert
Trusted Advisor

You might also like