17Cyber Security and Digital Forensics Careers
it much. Here are some of the MANY job titles you will come across during
your search in the security eld:
• Information security job titles: information security risk specialist,
information security ofcer, information security specialist, informa-
tion security analyst, data security specialist, information security
architect, information security engineer, rewall engineer, malware
analyst, network security engineer, director of security, security
operations analyst, vulnerability researcher/exploit developer,
security auditor, disaster recovery/business continuity analysis
manager, data warehouse security architect, and penetration testing
consultant
• Digital forensic job titles: emergency response managing consultant,
computer forensics analyst, digital forensics technical lead, digital
forensics engineer, cell phone forensics analyst, IT systems foren-
sic manager, information security crime investigator/forensics
expert, incident responder, computer crime investigator, intrusion
analyst, and system, network, web, and application penetration
tester
The purpose of each career outline coming up is to give you an idea of
what that professional may be asked to do or know. There is denite over-
lap in some of the tasks for the jobs listed. For example, you will note that
the information security eld includes an understanding of computer foren-
sics knowledge. This is because the information security professional has
designed and implemented the infrastructure that the computer forensics
professional is investigating when an incident occurs. The information
security professional needs to understand that it is not only important to
implement a secure environment but also to implement effective monitor-
ing, logging, and surveillance so that when (not if) the inevitable incident
occurs, the computer forensics professional(s) will be able to analyze the sys-
tem data to determine what happened to facilitate the prevention of the next
occurrence. Thus, the computer forensics professional will have theneces-
sary skill set to determine what has been compromised and, more important,
be able to identify, recover, analyze, and preserve evidence in a forensically
sound manner so that it will be admissible in court if the incident turns out
to be a criminal offense. This may not be determined until all the data are
analyzed.
2.2.1 A Summarized List of “Information Security” Job Tasks
1. Develop and maintain the company security policy: Create an
acceptable use policy (AUP) to reduce the potential for legal action
from the users of the system. The AUP is a set of rules applied