My Future Career As A Cyber Security Specialist

Improved Essays
My Future Career The future career that I choose is a Cyber security expert. The interest that I developed in this career was due to a lot of what I’ve saw in the news over the years and from what I’ve personally experienced over the years. A large majority of companies and government agencies hire these experts to help strengthen networks, safeguard information, or prevent cyber-attacks. That’s the part that really interested me. Cyber-attacks. With a large amount of hacker groups out there, there needs be just as many hackers that do good rather than bad. So this what I want to do. I want to be the person to help prevent these attacks, or even stop them. Cyber Security experts as basically people that watch data logs, set up security and …show more content…
It’s as simple as that. This job may sound kind of easy but actually doing some of the things that have to be done can be quite difficult since you have to have a good understanding of the security field. This isn’t a job that you can just hop in too, there are a lot of test and certifications that you should acquire before you take a job where you could potentially cost a company millions of dollars or be the reason sensitive information is acquired. There are many requirements and qualifications for this job, but they aren’t quite what you might think. First of all. You need to acquire a degree for cyber security. This degree is a 4 year program. After you’ve acquired that you may possibly be able to get an entry level job. This would be recommended in the since that you need to acquire a few security related certifications, certifications like the CompTIA Security + even up to the gold stand ICS2 Certified Information Systems Security Professional. There are a lot of different types of security …show more content…
I’m just now scratching the surface of this great world of technology, but I am taking steps in the right direction. I am currently in college for Network Systems administration, and after I graduate from this 2 year degree I plan to get an entry level job and then go back to school for another 4 years and obtain my degree in cyber security. Now I’ve set it in my head that I’m not going to find a security job right away so I plan to start taking certification tests as soon as I possibly can, and I plan to get as many that relate to my field that I possibly can. It’s going to take a long time, but I plan to stick with it and follow it to wherever it takes

Related Documents

  • Decent Essays

    Dual Admission Essay

    • 441 Words
    • 2 Pages

    Ever since I was a little boy, I have had dreams about insane technological advancement that I never thought were possible. However, I’ve seen most of it come true and I am only 17 years old. Now as I progress my life, I would like to be a part of the community that is on the frontline of new cutting edge technology. Whether that be helping to develop it or be the one to keep it protected with the expanding field of cybersecurity. Even though my parents have not totally endorsed my love for technology, which has helped me in other areas of my life, I have always been able to influence them enough so I can learn and teach myself about the new tech that is being developed in the world and how to use it with all its implications.…

    • 441 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Cyber Ark Case

    • 725 Words
    • 3 Pages

    The critical requirement of the industry is to protect the data inside of your customer’s computer networks. With an every growing list of companies in the industry and an every present awareness of the risks as told by the news media the need is very apparent. Customers in the cyber security industry range from Colleges to medical facilities, financial companies to banks, major companies from retail to manufactures, including governments and the military. The threat is other companies looking for Intellectual property to other countries hoping to steal technology or intelligence vital to a nation’s security. Research and development are vital components of any company in the Cyber Security business.…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Triton Multi-INT

    • 505 Words
    • 3 Pages

    I am a little concern about the bidding or proposal against RMF effort. There is tremendous work need to be done for the RMF compliance that leading to an ATO. Without the ATO, even your system is built with the state-of-the-art technology, you are not allow to operate in the field. I do not see that importance reflect on the proposal. I am not sure whether Triton Multi-INT (or the Triton baseline) is a program of record that needs an ATO or it only needs to be RMF compliance.…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Rodney Brown, who have served over 14 years in information security field managing IT enterprise system on midrange and mainframe platforms. Rodney Brown currently work as Information Risk Management. At his work, he manage the security controls, vulnerability and threats scanning risk management and security awareness programs for domestic and international Mergers & Acquisitions for various companies. Upon asking why you become a CISSP, he says certification classify me as a security professional, who well grab knowledge and experience. Taking CISSP certification shows that I am one who is concerned in protecting current security technologies.…

    • 537 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Course Title: Security Guard Development Diploma By Craig E. Brown Security Officer Development Program Overview: Our comprehensive Security Officer Development program was design by experts to prepare student for entry level position in the security industry. Our program exceeds the minimum requirements by most states, although additional licensing, training, and/or other requirements may vary by states. The program covers fourteen units of instruction that will prepare student with the fundamental and foundation for a successful career in the security industry. The course will include the following: writing assignments, quizzes, and a final examination.…

    • 287 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Homeland Security Jobs

    • 492 Words
    • 2 Pages

    The employment outlook for homeland security jobs is excellent because there is a growing demand for qualified professionals in this field. While job availability and career stabilities sometimes depends on federal funding and the DHS budget, security and intelligence needs are on the rise. Many homeland security jobs accept a variety of degree subjects, such as criminal justice, public administration and security and emergency management. Where Do Homeland Security Personnel Work? The majority of homeland security personnel work in the public sector for a government agency.…

    • 492 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    First, I earned my A plus certification. Then, after I got my A plus certification I got my Network plus certification. Both certifications are from CompTIA and have to be renewed every 3 years. Lastly, I attempted to get a windows 7 certification, but didn’t pass. Balancing school, working full time and trying to have a social life was extremely hard for me at the time.…

    • 739 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    When I get older I want to be a border patrol, because it looks fun and very interesting, I want to learn about U.S. Customs. What I would like to learn about it is things such as, how to check people for illegal substance like drugs, weapons, and banned items, another thing I would like to learn is how to become one, what does it take to be one? How many years? How to react when people are acting violent. A reason why I want to be a border patrol is because I live in a border town, so it's really nearby, and it's a job that's never gonna go away or shut down, what I meant by that Is if you work somewhere like a…

    • 126 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    Intelligence in Homeland Security Introduction After the attack of 9/11 on the United States the Nation learned there were many areas that needed improvement in regards to the security of the homeland. The Department of Homeland Security (DHS) had to take into account the lessons learned from 9/11, especially the shortfalls that were seen in intelligence gathering and make some major changes. The DHS is not the only agency that is responsible for gathering information for the Nation’s safety, there are many different national agencies that provide intelligence for homeland security. Some of the National agencies include offices that many have heard of like Customs and Border Patrol, the U.S. Coast Guard or the Secret Service, but there are other National agencies that contribute that most Americans may not know about.…

    • 1699 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    IT Security Career

    • 910 Words
    • 4 Pages

    An average for a Chief Security Office is $225,000 a year, a Global Information Security Director averages $200,000.00 a year, a Security Consultant can cash in…

    • 910 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Those who have an interest in the field should take classes dealing with computers, mathematics, science, and English (Computer Scientists). To obtain any position in the field, one must have, at minimum, a Bachelor’s degree in computer science or a related field (Computer Scientists). This type of degree generally takes four years to achieve (Computer Scientists). However, if a person aspires to have a higher position, he will have to acquire a master’s degree or a PhD (Computer Scientists). These degrees take an additional two years or four years, respectively, to complete (Computer Scientists).…

    • 1799 Words
    • 8 Pages
    Superior Essays
  • Improved Essays

    At my spare time, I always try to learn new things to improve my knowledge and skills. I regularly watch educational videos on YouTube or different learning platforms like Udemy, MVA to learn and improve myself. I watch penetration testing videos where I try to follow the video to ensure that I can learn and remember the steps so in the future I can use it in my career. I have purchased a course on Udemy which allowed me to understand the technical keywords in cyber security as well as have knowledge in different ways of penetration testing. I also follow channels on YouTube like “Jackk Tutorials” and watch their videos to ensure that I continue adding knowledge and skill to myself.…

    • 768 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    I am a student at Valencia Community College, completing an associate degree in computer science and planning of transferring to University of Central Florida. Since my earliest childhood, I have always been interested in computers. My first program was “Adding two numbers” using code, which make me curious to know computers in deep learning. My creative and enthusiastic methods of solving the problem lead me to select a career like computer scientist. I am always doing that which I cannot do, in order that I may learn how to do it.…

    • 793 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    I’m a small girl from a big city of where “Dreams come True”. Being an illegal immigrant in an unknown land where you’re not wanted is hard. I struggle everyday trying to make enough money for my own education since I am a first generation student in my family with not enough money in our pockets. I want to prove to my family that someday I will walk on stage with my Bachelor’s degree and thank them for all the hardships they went through for me for me to have a better life and a proper education. With my dreams set high, I have my own career and life goals in order for me to graduate with a BS in Computer Science to someday work in the IT field.…

    • 733 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    A literature review allows a researcher to present the findings and viewpoints of other researchers in order to build on existing knowledge (Onwuegbuzie, Leech, & Collins 2012). This allows the researcher to build a solid foundation in which to further sustain their work and demonstrate the credibility of sources used. By the use of Google Scholar, EBESCOhost and proQuest I reviewed the literature pertaining to cyber awareness, cyber security, cyber attacks, the economic fallout from cyber attacks and the state of businesses taking preventative measures. Furthermore, I reviewed the literature based on the need for individuals to concern themselves with cyber awareness.…

    • 2302 Words
    • 10 Pages
    Great Essays