
- 68 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
eBook - ePub
Introduction to US Cybersecurity Careers
About this book
Introduction to US Cybersecurity Careers is a concise introduction to the world of cybersecurity and the career opportunities therein. This book provides a basic rundown of industry sectors, roles, and places to search for job opportunities within the US cybersecurity industry. Within this book is vital information for anyone trying to get into the industry - basic knowledge for those looking to start training for a career, tips on networking and resume-building in a fast-evolving and nontraditional sector, and advice on how to get your foot in the door and become recognized in your field.
This book is designed to help those who are just starting out in cybersecurity and those who have training and knowledge and want to get into the industry. Introduction to US Cybersecurity Careers is your first-stop reference for everything you need to know to start your journey.
- Learn the basics of the digital security industry
- Get tips on creating an effective resume and making contacts within the industry
- Figure out the best certifications to pursue and what qualifications will get you your ideal career
Frequently asked questions
Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
No, books cannot be downloaded as external files, such as PDFs, for use outside of Perlego. However, you can download books within the Perlego app for offline reading on mobile or tablet. Learn more here.
Perlego offers two plans: Essential and Complete
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, weāve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere ā even offline. Perfect for commutes or when youāre on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Introduction to US Cybersecurity Careers by Henry Dalziel in PDF and/or ePUB format, as well as other popular books in Business & Management. We have over one million books available in our catalogue for you to explore.
Information
Chapter 1
US Cybersecurity Jobs
Abstract
We start by reviewing the different āhackerā classifications, and then review the key knowledge, skills, and abilities (as determined by National Cybersecurity Workforce Framework) that specifically relate to penetration testers or ethical hackers.
Keywords
penetration tester
ethical hacker
white hat hacker
black hat hacker
gray hat hacker
blue hat hacker
blue team
red team
National Initiative for Cybersecurity Education (NICE)
National Cybersecurity Workforce Framework
NICCS
National Initiative For Cybersecurity Careers And Studies
Information security, or cybersecurity as it is often referred to, is a growing and exciting global industry. Our adversaries (which include state-sponsored āhackersā) are determined, intelligent, and increasingly resourceful at being able to disrupt our computer systems and networks. Combating the relentless cyber threat represents an enormous challenge for the US Government and private sector enterprises since the ramifications of inaction or incompetence are devastating. Consider this: 552 million identities were stolen in 2013 due to cyber breaches!1
US cybersecurity jobs are well paid, and as we will shortly discover, they are in high demand. Central to this book is an unequivocal fact: The demand for cybersecurity professionals is outpacing supply in both the public and private sectors.
This book works on the assumption that you are, or have recently completed some form of formal further education in an IT-related subject and are keen to work in the field, that is, you want to be an active cybersecurity professional testing and patching networks and computer systems. We also assume that you are now looking to take the next step and start building your cybersecurity career. (Although we assume that you have some prior knowledge or training, we do cover further education opportunities in Chapter 8).
1.1. US cybersecurity job titles
We also assume that your first cybersecurity-related employment milestone will be to become a penetration tester or ethical hacker. Although these two job titles are probably the most popular, we should take a step back and appreciate that when you hear the term ācybersecurity professionalā we could be referring to any one of the following job titles:
Cryptographer
⢠Source Code Auditor
⢠Digital Forensics Expert
⢠Forensic Analyst
⢠Incident Responder
⢠Security Architect
⢠Malware Analyst
⢠Network Security Engineer
⢠Security Analyst
⢠Computer Crime Investigator
⢠Chief Information Security Officer (CISO)
⢠Information Security Officer (ISO) or Director of Security
⢠Security Operations Center Analyst
⢠Prosecutor Specializing in Information Security Crime
⢠Technical Director and Deputy CISO
⢠Intrusion Analyst
⢠Vulnerability Researcher/Exploit Developer
⢠Security Auditor
⢠Disaster Recovery/Business Continuity Analyst/Manager
1.2. General āhackerā classifications
Let us define the main categories of security professionals that will be referred to in this book. Professional hackers (or ācrackersā) will fit into one or several of the following categories:
1.2.1. White Hat Hacker

A āwhite hat hacker,ā (that is the category that we belong to if we aim to initially become a āpenetration testerā) will have permission to break security for nonmalicious reasons with the objective of patching or fixing-identified vulnerabilities.
1.2.2. Black Hat Hacker

On the complete opposite end of the scale is the āblack hat cracker.ā Typically, a black hat hacker will try to break into a secure network to destroy data or make the network unusable.
1.2.3. Gray Hat Hacker

A āgray hat hackerā is a combination of a black and white hat. A gray hat hacker may surf the internet and hack into a computer system for the sole purpose of notifying the administrator that their system has a security defect. They may then offer to correct the defect for a fee. Many websites such as Facebook and Ebay offer bug bounties (please refer to Chapter 3 for more information), which means that anyone who finds a vulnerability or weakness can disclose the hole and receive a reward.
1.2.4. Blue Hat Hacker

A āblue hat hackerā (similar to gray hat) is someone who bug-tests a system or application prior to its launch, looking for exploits to be closed. It is worth mentioning that Microsoft uses the term āblue hatā to represent a series of security briefing events.
Table of contents
- Cover
- Title page
- Table of Contents
- Copyright
- Author Biography
- Introduction
- Chapter 1: US Cybersecurity Jobs
- Chapter 2: The US Cybersecurity Industry
- Chapter 3: 17 Tips on How to Land Your First Cybersecurity Job
- Chapter 4: Networking Advice for Cybersecurity Job Seekers
- Chapter 5: How to Create a Cybersecurity Resume
- Chapter 6: Cybersecurity Job Resources
- Chapter 7: Interview Hacks and Tips
- Chapter 8: Suggested Beginner and Intermediate Cybersecurity Training and Certifications
- Chapter 9: Summary