Job | Networking | Software Development | Systems Engineering | Financial & Risk Analysis | Security Intelligence | IT Support |
---|---|---|---|---|---|---|
Incident & Intrusion Analyst | ✅ | ❌ | ✅ | ✅ | ✅ | ✅ |
Cyber Crime Analyst | ✅ | ❌ | ✅ | ✅ | ✅ | ✅ |
IT Auditor | ✅ | ❌ | ✅ | ✅ | ❌ | ❌ |
Cybersecurity Specialist | ✅ | ❌ | ✅ | ✅ | ✅ | ✅ |
Security Operations Center (SOC) Analyst | ✅ | ❌ | ✅ | ❌ | ✅ | ✅ |
Junior Security Analyst | ✅ | ❌ | ✅ | ❌ | ✅ | ✅ |
Vulnerability Assessor | ✅ | ❌ | ✅ | ❌ | ✅ | ❌ |
Security Administrator | ✅ | ❌ | ✅ | ❌ | ✅ | ✅ |
Threat Intelligence Analyst | ✅ | ❌ | ❌ | ✅ | ✅ | ❌ |
Compliance Analyst | ❌ | ❌ | ✅ | ✅ | ❌ | ✅ |
Network Security Technician | ✅ | ❌ | ✅ | ❌ | ❌ | ✅ |
Forensic Analyst | ✅ | ❌ | ✅ | ✅ | ✅ | ❌ |
Security Researcher | ✅ | ✅ | ❌ | ❌ | ✅ | ❌ |
Risk Analyst | ❌ | ❌ | ✅ | ✅ | ❌ | ✅ |
IT Security Specialist | ✅ | ❌ | ✅ | ❌ | ✅ | ✅ |
Technical Support Engineer | ✅ | ❌ | ✅ | ❌ | ❌ | ✅ |
Job | InfoSec / Assurance | Security Operations | Crypto. | Risk Assess. & Mgmt. | Threat Analysis | Auth. | NetSec | NIST Framework | Internal Auditing |
---|---|---|---|---|---|---|---|---|---|
Incident & Intrusion Analyst | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ❌ | ❌ |
Cyber Crime Analyst | ✅ | ✅ | ✅ | ❌ | ❌ | ❌ | ❌ | ❌ | ❌ |
IT Auditor | ✅ | ✅ | ❌ | ✅ | ✅ | ✅ | ❌ | ✅ | ✅ |
Cybersecurity Specialist | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ❌ | ✅ |
Security Operations Center (SOC) Analyst | ✅ | ✅ | ❌ | ❌ | ✅ | ❌ | ✅ | ✅ | ❌ |
Junior Security Analyst | ✅ | ✅ | ❌ | ❌ | ✅ | ❌ | ✅ | ❌ | ❌ |
Vulnerability Assessor | ✅ | ✅ | ❌ | ✅ | ✅ | ❌ | ✅ | ❌ | ❌ |
Security Administrator | ✅ | ✅ | ❌ | ❌ | ✅ | ✅ | ✅ | ✅ | ❌ |
Threat Intelligence Analyst | ✅ | ✅ | ❌ | ✅ | ✅ | ❌ | ❌ | ❌ | ❌ |
Compliance Analyst | ✅ | ❌ | ❌ | ✅ | ❌ | ✅ | ❌ | ✅ | ✅ |
Network Security Technician | ✅ | ✅ | ❌ | ❌ | ❌ | ❌ | ✅ | ✅ | ❌ |
Forensic Analyst | ✅ | ✅ | ✅ | ✅ | ✅ | ❌ | ❌ | ❌ | ❌ |
Security Researcher | ✅ | ✅ | ✅ | ❌ | ✅ | ❌ | ❌ | ❌ | ❌ |
Risk Analyst | ✅ | ❌ | ❌ | ✅ | ❌ | ❌ | ❌ | ✅ | ✅ |
IT Security Specialist | ✅ | ✅ | ❌ | ✅ | ✅ | ✅ | ✅ | ❌ | ❌ |
Technical Support Engineer | ❌ | ✅ | ❌ | ❌ | ❌ | ❌ | ✅ | ❌ | ❌ |
Implications:
<aside> 💡
The CodePath CyberSecurity 102 (CYB102) course teaches you the skills needed for a Security Operations role.
</aside>
Job | CISSP | CISA | CIPP | CISM | GIAC | Security+ |
---|---|---|---|---|---|---|
Incident & Intrusion Analyst | ❌ | ❌ | ❌ | ❌ | ✅ | ✅ |
Cyber Crime Analyst | ❌ | ❌ | ✅ | ❌ | ✅ | ✅ |
IT Auditor | ❌ | ✅ | ✅ | ✅ | ✅ | ✅ |
Cybersecurity Specialist | ❌ | ❌ | ❌ | ❌ | ✅ | ✅ |
<aside> 💡
Based on data from cyberseek.org, all of the top 4 entry-level cybersecurity jobs require skills in InfoSec / Assurance and Security Operations.
</aside>