• Skip to main content
  • Skip to primary sidebar

ConvoCourses

Cyber Security Compliance and IT Jobs

  • Cyber Security Training
  • about me.
  • Information Assurance Jobs

Convocourses Podcast: Cybersecurity Workforce Framework

September 19, 2022 by Bruce Brown Leave a Comment

https://www.podbean.com/media/share/pb-iwta5-12c68e0

 

Hey guys, this is Bruce, and welcome to combo courses, podcast. I’m doing an experiment where I’m doing daily is here. We’ll see how this goes. I don’t know if I’ll keep this or maybe I’ll do this twice a week or something like that because it hasn’t been that bad. I got so many things. I can talk about so many questions to answer, but right now I wanted to focus my time on the categories of cybersecurity.

So a lot of times. Industry people think that cyber security is all about. And I think it’s all about just hacking or something like that, something to that effect. And those are the things that are popular, just Hacking or pin testing or programming another one’s for digital forensics.

People think that’s all that there is, but in cyber security, not just I’ve been doing this for a very long time. I’ve done everything from the technical side where I’m actually configuring systems and installing systems and that kind of thing. But I’ve also done the, more of the management type side.

And I want to tell you that there’s. So many different. Parts to cyber security. And when you see somebody talking about hacking or whatever it’s very glamorous, but that’s a tiny fraction of the whole spectrum of cyber security. It goes very deep. So if you’re actually trying to get into this career path, cuz it pays very well and it does then I, what I wanna do is introduce you to some other categories of cyber security that you may.

Know about. And so one of there’s an organization out there and it’s from nonprofits and the government and a couple of private sector. They got together and they broke down the different categories of cyber security that need to be addressed. And it’s not just. Cyber security by itself. Some of it is you can have a system administrator who does cyber security, that also accounts for this one.

And I’m gonna explain that in a second. If you stick with me, you’ll understand this and you’ll understand, especially if you, this is particularly for you. If you are trying to get into cyber security, if you’re interested enough to want to be a part of cyber security in this field. And if you’ve been thinking about getting into it, I’m gonna show you the whole spectrum of cyber security.

Let me show you. A framework called it’s called the workforce framework for cyber security. And if you didn’t know about this is something the federal us federal government has been using for years now to figure out what categories to put people in and what kind of training that they need to do in order to be in these different categories.

And from a bird’s eye view. Let me. Switch my screen over here on TikTok. Feel free to ask me any kind of questions. I’ll be doing this for about 30 minutes if you’re interested in this, but let me show you what I’ve got going on here. And I’m just so you know, I’m broadcasting on a podcast, but I’m also doing so I, I will explain what we’re looking at here, but you can watch this on YouTube and Facebook eventually will put this on Facebook.

But here we have all the categories. Now there’s seven different categories at the time of this recording. There’s analyze. There’s collect and operate. There’s investigate. There is operate and maintain, overseeing, govern, protect, and defend and securely provision. And what I wanna do is give you an example of each one of these seven categories, cuz each one of these breaks out into specialty areas.

So for example, analyze breaks out into. What you call exploit analysis, language analysis, target analysis, and you’ll see that some of these don’t look like cyber security topics, but they, in fact they are now, if you happen to be dual bilingual, if you happen to know another language Very fluently.

You might actually be able to very quickly go into something called language analysis, which we’ll briefly touch on in a second. But what I wanna keep this kind of high level right now, just to show you the different specialty areas. Now there’s about, I don’t know, 30 or 40 different specialty areas.

Each one of these categories of cyber security breaks out into these special specialty areas now in collect and operate, you’ll see things like cyber, operational planning, you don’t think that would have a lot of hands-on stuff and it actually doesn’t. So let’s keep going here.

And when I say hands-on, I mean like somebody who’s actually configuring a server or setting up a network and stuff like that, cyber security is not all just about that. It’s a very broad area. It’s a very broad umbrella. So investigation is what you might expect is digital forensics, cyber investigations.

Threat hunting, things like that. And we’ll cover that in a second operate and maintain. This is what people normally think about when they think about system administrators, data, administrators, network services, that’s their network engineers, things like that. These guys are in.

Cyber security in that they have to do a lot of cyber security-type activities. They’re not typically seen as cybersecurity people, but they have to do a lot of things in cybersecurity. As you might expect when they’re installing patches or things like that. Overseeing govern. So this is what I do.

I can speak extensively on this, but this is a lot of management type stuff. Cyber security management. This is your C level execs and it even includes legal and program managers. This is something I would very much like to talk to you about because program management requires a certain level of emotional intelligence that a lot of it people do not.

Okay. And I, it’s a very important a very critical piece of any kind of system engineering, any kind of major cyber security projects, anything the organization is doing that where they’re spending a lot of time, money, and energy, and a lot of resources. They need a program manager. I’ll get off my soapbox on that one, but it also pays very.

And that’s something I talk about a lot on my site program management is a big one. Okay. Anyway, let’s keep going. Let’s keep it high level protect and defend. So protect and defend. Is dealing with a cyber defense analysis, just to name a few incident response. That’s a huge one, vulnerability assessment and management.

Huge, but that’s for protect and defend. So you see, this is not all just firewalls. This is not all hacking have I haven’t even mentioned hacking yet. That’s how big this field. And there’s some things that are not even included on here. Like cryptography, you don’t see cryptography on here, but cryptography is considered part of part of cyber security.

And I would argue that the cypherpunks, the guys who created The concept for Bitcoin and all that kind of stuff were also very good cybersecurity people anyway. So securely provision. Now this one has to do with risk management, software development, system architecture, that sort of thing. So you can see, what I wanna do is just show you.

The high level here. There’s many different categories of cyber security and it’s not all just hacking. It’s not all just programming. Yes. Those are part of what we do. But in the major scheme of things, like when you look at the big picture for all of this it’s a very big feel. And I wanna just explain to you why if you think about it, it really makes sense when you go to your bank and you are trying to send a wire transfer from one.

Using ACH to another bank, right? Or you wanna wire something overseas or whatever the case may be. The bank has a certain they have certain protocols and procedures and certain policies that they have to do in order to secure your information to make sure that the $1,000 you sent from one bank to another, or from, to your, whoever.

Wherever you’re sending it. They have to make sure that information is protected. The rules and protocols and procedures and the legal system. All of the things that come together that is known as secure security compliance. Now the financial industry has a different set of laws, as you would imagine than say the healthcare.

The healthcare industry is protecting your healthcare information, your digital, if it’s that information is digitized, they have to protect that information, right? So they have a whole different set of laws that are completely different because it has a different has a different, it has, it requires a bus different business solution than say a bank.

If you think about it like this, the government, the federal government, who’s protecting your social security number. They’re protecting your, I don’t know. They’re holding, making sure that things like the DMV, if you’re talking about the state they have to protect your personal on for information as well.

and making sure that’s, of course there’s all kinds of leaks and all kinds of hacks and all that kind of stuff going on, but they have a whole different set of procedures and rule sets and laws that apply to the federal and state government. And that’s also called security compliance.

Security compliance is in every industry. It’s in every state, it’s in every jurisdiction, it’s in every county and it’s in every country. Each country has their own set of laws that pertain to. And all of us, all of them have different solutions that they need for their particular situation. So one would imagine as you can probably imagine, there’s a lot of security that has to be done for that.

And it’s not all hacking. Like you can see how hacking is a tiny drip and a gigantic ocean that is cyber. Cybersecurity is a very huge field and that’s why you have seven different categories. Now, what I wanna do is kinda give you a practical understanding of these seven categories. Now let’s start from the top here.

I’m gonna give you a specific example of where you might have seen this on TV or in a movie, or relate it to something you can understand here on a practical way. So let’s start with analyze the first category we see on the top here is analyze. Has these specialty areas right here. Now, if you break these down and if you wanna go to the site, by the way, if you happen to be watching me on YouTube I have a link to where you can actually follow along.

The actual site. Is there in the link now analyze, let me give you a practical understanding what analyze is now. When I was in the military, we had, when I was in a combat zone and we have we had languish analyst. Whenever we and the reason why we had these language analysts was because we can’t understand, say if say a another country is attempting to hack our systems, like they’ll put some code on our systems and that code has to be in Ukrainian or in Russian or whatever other language you need a language.

To actually figure out what is being said in that in that code. And that’s why a lot of times they figure out, oh yeah this hat came from Russia. This hat came from Ukraine. This hat came from whatever country, because you have an language analyst who has they’re multidiscipline in language languages, where they can figure out and decipher and figure out like what’s going on.

They’ll have like different tools. That’ll help them to decipher what’s going on with that, with whatever hack is going on. So this is actually a part of the analyze category. Let me give you another example, threat analysis. Now this is a big one. So a cyber threat analysis is something where what you’re doing is.

You’re trying to detect and figure out where a company might get hacked from an organization might get hacked from, and it sounds impossible. Sounds crazy. How can you figure out where threats are coming from? There’s some ways to do it. So if you think about like this right now, somebody might be trying to hack, I don’t know, I’m just pick something off the top of my head.

They might be trying to hack Walmart or something. Wal, what Walmart can do is they can have somebody scour the internet. Do search conduct searches or create a tool that goes out and. Does a web crawl of the internet to figure out okay, who is mentioning Walmart who is talking about it on social media?

Who’s talking where are the communications that are in the public domain to figure out who is talking about us so we can figure out where those threats are coming from. Because a lot of times when these, before the attack even occurs, these criminal hackers are talking amongst each other on the dark web.

About how they’re gonna attack or they even already had the attack. They already pulled the information from there and they’re selling Walmart’s emails. Now this is just an example. I just, so you know, I don’t have a client with Walmart or anything like that. I don’t have not interacted with Walmart’s cyber security.

I was using them as an example and I’m unaware of any current tax or anything like that. Just, this is just an example, but that is what threat warning analysts do. And this is something I did at my last job, as a matter of fact, that was one of our jobs was to do threat analysis on companies to figure out what’s going on.

And this also pertains to doing cyber looking at terrorist threats for whole countries, by the way. So that’s analyze an analyze goes into analyzing information, analyzing targets, analyzing threats that might be coming to a cyber security through, to an organization. There is, there can be some hacking involved.

There can be times where you have to know a little code, but language analysts don’t typically know code, and then all source analysis. This goes straight into just intelligence. This is normally what you’ll see in like intelligence organizations where they’re gathering actual, actionable intelligence from other.

From multiple sources, putting that information together to figure out, okay, we have a terrorist threat here. We have a terrorist threat there. We know that we have advanced persistent threats here and there. We have some, we have reason to believe we have human intelligence people on the ground where they’ve gathered this or that information to figure.

Who’s gonna attack what, and a good example of this one would be that if you’ve ever watched a mission, impossible the ghost ghost recon, that one, they have, they talk about this type of job all the throughout that one. The as a matter of fact, they have one of the characters is an analyst, and this is the, what they’re talking about.

This is somebody who. Who pulls information from different sources, different intelligence sources puts it together and figures out. Okay. We know that there’s a credible, there’s a probable attack. That’s gonna happen over here, over there, based off of all the Intel that they’ve gathered in the field.

Okay. So we beat that one to death. Let’s keep going here. So that is analyzed and that’s in cybersecurity. Then we’ve. Collect and operate. Let’s look at this one. So here’s the specialty areas with collect and operate. Now, what are we talking about here? This is also dealing with a lot of intelligence, this, a lot of govern department of defense and some of the other three level organizations will have something like this cyber operations, where they’re also looking at real time threats.

They’re looking at foreign intelligence entities. So this one’s very much related. To what we were talking about here analyze a lot of times we’ll see these in security operation centers, a security operation center, especially the ones for that work for different governments.

They’re very large, they have a large. Office where you have all these giant screens going on, you see these in movies, like when they were walking in and it’s like, what’s the threat and there’s a, there’s supposed to be a bomb here and they’re trying to figure out like, what’s going on.  so a lot of times they’re talking about a cyber.

Intel planner. These are the guys who put everything together. And if I could just read through some of this details here, it says, develops detailed intelligence plans to satisfy cyber operations requirements. So these are the guys that are managing all the information that’s coming in and how we’re gonna, what we’re gonna do once we gather that information.

So that is collect and operates, dealing with a lot of Intel type stuff. And You see it in movies and stuff like that. That’s, it’s not like the movies to be honest with. It’s pretty boring. But okay. Investigation. Now, this one, if you ever seen the show CSI, this is. It, the digital forensics, not necessarily the scientists scientific forensics where they’re trying to figure out when a person was murdered, based off of the insects that are consuming the corpse or whatever, sorry to be so crude, but that’s forensics, digital forensics is a little bit different.

This is the people who will take a computer. A lot of times they’ll work with law enforcement and stuff because they’re dealing with very heavy issues. I don’t wanna get flagged for talking about some of the stuff that they find. But if you’re talking about digital forensics, you’re only talking about a few crimes major crimes that are gonna have to necessitate a digital forensics guy, major crime murders, and assaults that were caught on fi on, on digital media.

And somebody try to hide some. Illegal contraband on their computer and try to do some illegal transactions using cryptocurrency or something like that, and they have to trace back. Where the cryptocurrency wallet it’s went to, or they have to figure out see if somebody was using some illegal pictures or images on their computer, but they try to erase it.

But with digital forensics, you can actually extract that from the ones and zeros on the hard drive. That is what we’re talking about when we’re talking about investigations. So they work a lot with the law, with law enforcement, they work a lot with with The with law they might have to do things like what you call it.

Chain of custody, where they have to make sure that the hard drive that they’re investigating can get to trial and not be tampered with and things like that. So that’s investigations then you have maintain and operate. So what is this one maintain and operate is this one’s pretty self explanatory.

Once, once you see some of the job titles and stuff in here network services, that’s like the people who install, configure, test operate, maintain the network, the firewalls. The switches, the hubs, they, they say hubs here, but not many people use hubs that much anymore. So that’s funny, but system administrators, these are people who install, troubleshoot, maintain the servers and the configuration files and make sure that the config, the confidentiality, the integrity and the availability of the system is protected.

So yeah, that’s that is maintain and operate. Then you’ve got overseeing governor. I could talk. My entire site is about this one specifically about cyber security management. Cause this is what I do. And this is when I, when we were talking about this in the beginning, we were talking about what exactly what I’m doing, which is.

This right here, information system, security manager, actually, I’m a my specialty is information system security operate officer, but management’s something I do as well. So it’s security. Doing cyber security for the whole organization, making sure that the cyber security of the organization is sound making sure the documentation is good, making sure that you’ve got all the system security controls are in place, things like that.

And you have to work a lot with the C level execs, high level security people within the organization. Doing a lot of coordination talking with the program managers, talking with the subject matter experts on the firewalls, on the networks, on all that kind of stuff, to make sure that we, as a team in the organization are doing what we’re supposed to do, whether that’s doing PCI compliance or HIPAA compliance or whatever industry standard we need to meet, that’s what cyber security managers are doing.

And. COMSEC manager. These guys manage the cryptography, the crypto keys within an organization. So that is one, that’s just one of the specialty areas that we’re talking about for overseeing govern. This also goes into C level execs, your CIOs, your CIS OS with chief system security officers, or your chief information security officers, your C level execs, you’re legal people.

You don’t know often see legal people. Lumped into cyber security, but here it is right before your eyes. I’m telling you, the point I’m trying to make is that cyber security is not just programming. It’s not just hacking stuff. It’s also, it includes legal advocacy. Because the organization has to protect its reputation.

If somebody’s defaming the organization, right? Their reputation is at stake. Who do they go to? You go to your legal team. Your legal team is, has to determine, okay, did these people defam? The, our organization are these, do we need to do a cease and desist order on this website? That’s trying to. Do what’s called typo squatting.

That’s where you let’s say google.com, but some somebody creates a site called Google, whether E and the L are transposed so that people, whenever they miss type Google, it goes to their site. And then they take you to a, some malware or something. Some other site. So are, do we have a legal case?

For the protection of our reputation or not, so legal is also where you would talk about, okay, we need to develop a privacy notification. We need to develop a a, something so that some, a non-disclosure agreement for all of our users who come in that’s legal department. They, so they’re very much involved with things like.

Privacy notifications that pop up on a website whenever you’ve gone to a website that privacy notification pops up, that’s serious because the organization doesn’t wanna be liable to, they don’t wanna get sued because they released your information without you knowing about it without you, knowing what you were clicking on.

So they have to go to the legal department for that kind of stuff. Cyber security includes that kind of. So let’s keep going here. I wanna show you a few more things and I’ll keep it a little bit briefer on the next ones, what we do. So that’s overseeing, govern. Let’s go to the next one, which is protect and defend.

This is one of my favorite ones, cuz this one, excuse me. This one includes cyber defense analysis. In a past life. This is what I did. And this is, this one is really fun. I really love doing this one. This is people looking at logs. It looks like the matrix. Like they’ll sit there and they’re watching a screen full of logs go by and they’re trying to figure out what is, if there’s any kind of attacks going on in, on their, in their environment.

If there’s some, if. Malware happening in the environment. Like it, it actual infiltrated the environment, or if there’s somebody doing something they’re not supposed to do, you could pick that stuff up in the logs. If you know what to look for. And they’re looking for certain patterns of behavior inside the logs, that’s reflected in what’s going on.

Cyber defense analysis is where you would do that. It’s picking up the IDs, intrusion detection, intrusion prevention, the firewall logs, the network, traffic logs, all that stuff. And it’s making a determination. And these days you can do it a little bit with artificial intelligence to help you out, to help out the actual cyber defense analysts.

So that. What we’re talking about with that’s one of the things that we’re talking about with protect and defend another huge one is incident response. That’s a big one. And then vulnerability. These are like whole. Industries, by the way. This I’m briefly mentioning the names, but this is an entire industry in and of itself.

This one incident responses is own thing. And so it’s vulnerability management. Okay. Let’s go to securely provision. And this is the last one last, but not least this one’s getting into risk management. This is something I do a lot. This is my whole job right here. Risk management. This is making sure that the organization is within a acceptable level of risk because every system that’s out there, every single system, no matter what system it is, has some certain level of risk that they have to operate with.

And so risk management is just simply making sure that the risk is not too great for them to operate and not the risk. If a system has too much risk. It’s too much exposure to their critical systems, then they can get, they’re gonna get hacked at some point, they’re gonna have a breach at some point, if your risk is too high.

So you need risk management as a specialty area, software development, whenever you develop software, you gotta make sure that software is developed securely so that you don’t have any major breaches. A lot of the breaches that happen especially with zero. It’s because of software issues, that software that wasn’t secure and that’s all in securely division securely provisioned rather.

So there’s other things in here and the whole point I’m trying to make before I close this thing out and I’m almost done here is that cyber security is a huge, it’s a huge field. It includes everything from manage. Program managers are very integral part to cybersecurity. It’s a whole different discipline.

They do not have to have hands on stuff. They do need to, at some point, understand the organization’s process on how software is developed, but not necessarily no Java or no C plus, or how to actually code or how to use the coding libraries and all that kind of stuff. They don’t need to. They need to know the organization’s process.

They need to know things like agile. They need to know things like what’s the other one, scrum. And and things like that, processes that allow an organization to get to securely build the system securely build the software, develop the software, things like that. They need to know. So it, this includes C level executives.

This includes like we said, manage. It includes risk risk management, managing the risk effectively for an organization. It includes an, a lot of analysis. It includes all of these aspects. So whenever you think, whenever somebody says cyber security, just know it’s a huge field, and it’s not just one thing.

It’s many different things. Okay. That’s it for this one, guys. Thank you for watching me. I really appreciate it. I’m trying to do these lives. Daily. I’m I’ve got one on YouTube coming tomorrow. I’ll try to put this on TikTok as well. I try to put on as many platforms as I can tomorrow. I do these at least once a week on Saturdays, one o’clock mountain standard time on YouTube.

I’ve got a podcast it’s called pod combo courses dot pod, bean.com. And if you go to combo courses.com, there’s tons of downloadables tons of free stuff. It’s free to actually sign up there and I’m always giving out stuff like this where I don’t expect you to pay me anything. I’m just giving you out information so we can get.

More people where they can take care of their family. To me, that’s the name of the game you taking, being able to take care of yourself and being unable to take care of your family. That’s the name of the game? That’s why I teach people how to get into this field, how to make more money in this field and how to have security in this field.

Financial security. A career security so that they could take care of themselves and their family. All right, guys, that’s it for this one. Thank you so much for watching. I really appreciate everybody. Who watched and I’m sorry, I couldn’t get to your questions this time. Maybe next time.

We’ll attack those questions. Peace.

Filed Under: podcast

Reader Interactions

Leave a Reply Cancel reply

You must be logged in to post a comment.

Social connect:

Primary Sidebar

search


This book is an overview of how the NIST SP 800-37 risk management framework works from the perspective of an information system security officer (ISSO).

also available on Amazon!

View Book

NIST RMF 800-37 templates
Free 800-37 templates

The NIST 800 Template download contains a .doc file template and xls templates for POAMs, Federal, State, cloud based and a legacy template as well as resources where you can find more on NIST 800-37 documents for your use.

View Book

Learn to Make 6 Figures in CyberSecurity

Cyber Security How to make up to 6 Figures
6 figures in Cyber Security

This course explains how I have been able to consistently make 6 figures doing cyber security. There is a method that I have used during my development in cyber security. I am presenting that method to you.

View Course

Teleworking - IT Remote Work
Teleworking – IT Remote Work

Teleworking is something I have been doing for the last 5 years. This is how I did it.

Find Teleworking IT Jobs

View Course

RMF ISSO Foundations Training
RMF ISSO Foundations Training

RMF ISSO Foundations

I was an Information System Security Officer (ISSO) doing Risk Management Framework (NIST SP 800-37) for over a decade. I am a Cybersecurity veteran and I can explain (in plain English) what you DO in the Risk Management Framework process as an ISSO.

View Course

NIST SP 800-37 Presentation
NIST SP 800-37 Presentation

View Course

login

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Recent Posts

  • Convocourses Podcast: GRC analyst, Assessor, ISSO, or Cybersecurity
  • Convovourses Podcast: Certification and Paths
  • cybersecurity is not always fun.
  • starting as a system admin before #grc
  • The ever-green field of security compliance

Meta

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Recent Comments

http://Www.Finance.I… on SRG/STIG Applicability Guide a…
Elsa7 on ConvoCourses podcast: Cyber Se…
Tony on STIG Update – DISA has r…
horloge on SCAP Compliance Checker SCC)
218 Information assu… on Information Assurance Vulnerab…

Tags

#rockwellcollins #securitycompliance in 60 seconds IT to Compliance 4th industrial revolution 6 figures 9to9 Software Solutions 20th century fox linux admin 22nd Century Technologies Inc 800-37 800-39 800-53 800-137 2008 2012 3750 StackWise 3850 8140 8500 8500.01 8500.1 8510 8570 31000 @riskmanagement A&A ACAS ACASS access Account Security Manager accreditation acrobat act Active Directory activity Adam Sedgewick Adapter development tool etc ADC Administrative assistant Administrative Job Administrative Job to Cybersecurity and IT job adobe Adobe Acrobat Pro DC Classic advanced persistent threats Advice for a Security Control Assessor SCA AECOM AF afb AFI33-2 AIAP Air Force airforce information assuarance airforce information assurance AISO Akamai Kona Site Defender (KSD) analyst and administering Cisco ASR routers and resolution of Security Incidents andrew yang Android Android.Trojan.Uupay.D trojan and the Peace Corps and the Risk Management Framework (RMF) anti-virus AntiVirus apple appliances application delivery controller apply april 2019 APT ArcSight Arc Sight arizona Army Army and Air Force army information assurance Army National Guard (ARNG) ARNG asking ASP assess assessment Assessment Authorization assessments assessor documents 53a association of risk management assurance technology AT atlanta ATO at risk management ATS authorization authorization package authorize automotive Avamar Awareness Program awareness training backbone bad grammar bcp Become a better ISSO and cybersecurity analyst Q&A BEMS benchmark BIA BIND Blackberry Blackberry BES BlackBerry Enterprise Mobility Server (BEMS) blackberry uem black man in IT BMC border Router/Switches Bored in Compliance Changing Career Paths Boston Area boulder brocade brooklyn bts bug building of ADT buisiness continuity business impact assessment business risk bwi C# c&a california Can a teacher or Nurse get into IT c and a CAP CAP certification career career fair careerjet cary casp categorization cc CCDP ccent cci ccie CCM ccna CCNA-Security CCNE ccnp CCNP Security CCSP CDC Cedar Rapids CEH center Center for Information Technology Center for Internet Security (CIS) centos certi certifcation and accreditation certification Certification & Accreditation Certification and Accreditation Certification for Security Control Assessor Q&A Certified Ethical Hacker Certs and Skills and Make More Money in IT chatanooga CHATTANOOGA checkpoint check point checkpoint firewall chinese chrome CISA Cisco Cisco ASA Cisco ASA VPNs Cisco Nexus products Cisco switches CISM cism certification CISSP CISSP-ISSEP CIT citrix Civil Servant GS Civil Servant GS vs Contracting Civilian in IT CJCSI 6510.01 clearance Clearance Career ClearCase Cleared Jobs cloud cloud computing Cloud Security for IaaS/PaaS/SaaS cloud vs cybersecurity clustering CMaaS CMD cmdb CMRS cnd CNOSS CNSS CO COBITS coldfusion cold site collection college college student colorado colorado springs Columbia Common Criteria Community College compliance comptia computer fix computer network defense computer science configuration configuration manager configuring contingency plan continuity plan Continuous Diagnostics and Mitigation Continuous Monitoring Continuous Monitoring as a Service Continuous Monitoring in the Course continuous monitoring risk scoring Contracting Civilian in IT control families and implementing controls controls convocoures ConvoCourse Community convocourses Convocourses contacts CISSP study Q&A Convocourses ISSO testimonial ConvoCourses podcast convocoursespodcast ConvoCourses podcast: control families and implementing controls ConvoCourses podcast: ConvoCourse Community ConvoCourses podcast: Cyber Security day to day activity ConvoCourses podcast: Cyber Security Therapy Sessions ConvoCourses Podcast: POA&M Risk responses Resumes ConvoCourses podcast: privacy protection overview resume review Convocourses podcast: RMF Course Updates New NIST 53 Convocourses pofcast convocourses update COOP core data center coronavirus corporate risk COTS covid-19 CPE CPEs on ConvoCourses csc CSIH CSO Online CSP CSRA CVE cyber cyber engineer cybersecurity cyber security cybersecurity analysis cybersecurity analyst CYBER SECURITY ANALYST Job Listing at Kelly Services Cybersecurity Analyst vs Engineering Daily Tasks Cybersecurity Analyst vs Engineering Daily Tasks q&a Cybersecurity and IT job Cybersecurity and IT Resume Marketing (Part 1) cybersecurity compliance cyber security day cybersecurity degree cyber security engineer Cybersecurity Engineer IDS/IPS Specialist Cybersecurity engineer job cyber security experience cybersecurity framework cybersecurity interview Cybersecurity Job Cybersecurity Public Cybersecurity Public or Private Sector cybersecurityresume Cybersecurity Resume Cybersecurity Resume Tips for Security jobs (part 3) Cybersecurity Risk Management Cybersecurity Risk Management Best Practice Working Group cybersecurity risk management job cybersecurity salary Cybersecurity specialist Patuxent Cybersecurity Study in 2021 blockchain and threat intel Cybersecurity with little or no Experience Cybersecurity with ZERO experience Cybersecurity workforce Cybersecurity Workforce Framework cyberspace workforce cyber threat Cyber Threat Analyst in NEWARK cyberwork cyber workforce cyberworkforce Dahlgren DameWare DATA DATA/INFORMATION ARCHITECT in COLUMBIA database databse Data Domain Data Loss Prevention and premise-based SMTP relays datapower data protection Data Protection Advisor data security dayton DB2 DC3 DCO DCP dcs-7000 Defense defense information systems agency Defense Languages Institute Defense Logistics Agency (DLA) Delaware denver Denver Colorado denver security Department of Aging & Disability Services Department of the Navy Depend on Stakeholders during Risk Management Framework Design DHCP DHS DIACAP DIACAP compliance engineer DIACAP transition to RMF diacap vs rmf DIARMF DIARMF - Continuous Monitoring diarmf - implement diarmf-select DIARMF A&A DIARMF A&A - Assessment Authorization diarmf assess diarmf assess and authorizaiton diarmf authorization diarmf diacap DIARMF Documentation & Implementation diarmf implentation diarmf news DIARMF Process diarmfs diarmf select disa disaster recovery DISA STIG disa stigs discord ditcap DITSCAP ditscap supersedes diacap DLA DLI DMZ dns dod dod 8140 dod 8530 dod 8570 dod 8570 chart DoD Annex for NIAP Protection Profiles DoD Annex for NIAP Protection Profiles For Mobile Devices dodd 8140 dodd 8140 cyberspace workforce DoDI 8140-01 DoDI 8500 and 8510 DIARMF signed DoDI 8510.01 Risk Management Framework (RMF) for DoD Information Technology (IT) DoDI 8530.01 dod information assurance awareness dod information assurance awareness training DOD RHEL dod risk management DoD RMF for IT dod security clearance Does Cybersecurity Job require a Security Clearance DOI Do I teach Security Control Assessor (SCA) activity? domain name system DoS do you need to do the polygraph test for and sci #securityclearance dr Draft Backbone Transport Services (BTS) DSS DTC during staycation EAL Earn CEUs Earn CEUs & CPEs on ConvoCourses EDB Postgres Advanced Server 9 On Red Hat Enterprise Linux STIG Version Education EEM Elasticsearch el capitan Electrical emass emass training EMC VNX employer Employer Asking for Too Much Experience encryption Endpoint endpoints engineer Engineering Daily Tasks engineer job ENS Enterprise Mission Assurance Support Service Enterprise Mission Assurance Support Service (eMASS) enterprise risk enterprise risk management (ERM) enterprise security risk manager entry level information assurance jobs EOS/EOL EPA EPMO EPMO Project Analyst epo EPSD ESM Essential Security est ESX ESXi ETS ETS csc cyber engineer NJ evaluate risk evaluation of risk event Excel exchange Executive Summaries Executive Summary experience expo expos f5 facebook failed the ISC2 CAP false negative False positive False positive versus false negative family Interpretation farmington hills FBI FCC federal fedramp fedramp 3pao finding out Finding Out Cybersecurity Salary Finite Element Modeling fips 199 firewall firewall and proxy rules firewalls FISMA fisma 2012 fisma 2014 fisma requirements fix the fan of toshiba Satellite P755 S5380 FMC fmr forescout forescout-counteract format cybersecurity FOSS foster framework Ft. Belvoir ga GaDHS - Information Security GC GC-EAD GCIA GCIH G Data gilead sciences got a job GOTS Governor’s Office of Information Technology GPO GPOs grc Greenwood Village group policy management. Group Policy Objects Group Policy Objects (GPOs) GSEC gslc gslc certification guardium GXP hacker methods Hardware HBSS HBSS (Host Based Security System) help desk helpdesk helpdesk specialist help desk support Help Desk Support I Herndon HHS HIAM HIAR highland ranch HIPAA hippa HIPS HIPSDetection History of C&A honda HOR hot site How do I get a security clearance if I am eligible How long does it take to get to 6 figures how to find a job How to study for IT certifications HQ Hyena IA IA controls IACP ia jobs IAM IAO iase IASO IASO and ISSM IAT IAT Level IA training IAVA IAVM ibm IBS ICS ICS security idam identification of risk Identity and Access Management IDS I Failed the ISC2 CAP certification IISO NIST Immediate Hire Position as Security Analyst in Columbia SC with State of SC implemenation implement implementation Implementation of security controls resources part 1 Implementation of security controls resources part 2 implimentation Industrial Control Systems Industrial Control Systems Security info assurance info assure infoblox informaiton assurance information INFORMATION ARCHITECT information assurance information assurance air force information assurance analyst information assurance army Information Assurance Awareness information assurance awareness certificate information assurance controls information assurance degree information assurance degree online information assurance degree program information assurance engineer information assurance jobs Information Assurance Lead information assurance manager information assurance officer information assurance service information assurance services information assurance technology information assurance training Information Assurance Vulnerability Alert Information Assurance Vulnerability Management information awareness training army information protection information security Information Security Certification and Accreditation (C&A) specialist Information security continuous monitoring Information security officer information security specialist INFORMATION SECURITY SR - LEVEL SR information system information system security architectural information system security engineer information system security officer Information Systems Security Managers (ISSMs) information technology information technology risk management information technology risk management certifications infosec Internet domain records interpret security control Intrusion Prevention ios ios9 ios11 IOS XE IPS I recommend Program Management IRS ISACA isaca risk it framework ISC2 ISC2 CAP ISC2 CAP Recommended Resources ISCM ISCP isdi isds isim ISO ISO 27001 ISO 27002 ISO 31000 2009 Risk Management iss8.5 ISSA ISSE ISSEP ISSM ISSO ISSO and cybersecurity analyst isso jobs ISSO must Support the Team ISSO NIST Security Control Family Interpretation ISSO RMF Foundations course overview ISSOs Cybersecurity Certifications ISSOs Cybersecurity Certifications and DoD 8140 ISSO vs ISSE ISSO vs ISSE Differences Q&A Is there racism for black men in information technology IT IT/ITES IT Admin IT career IT Certifications IT degree IT Experience by Asking and Volunteering ITIL IT Infrastructure Library IT job it jobs itjobs IT jobs for beginners it jobs in the usa it jobs in usa IT market IT Marketing IT Office IT OPERATIONS ENGR - COMPUTE IT program manager resume + executive summary IT programs IT Q and A IT related business risk It resume IT Resume Marketing IT Risk Analyst IT Risk Management it security IT Security Jobs IT Services Organization and Offering ITSG ITSG-33 IT six figures IT study IT volunteering IT work J-messages J2EE java JIE jncia job job fair job in usa job option jobs jobs in america jobs in the usa jobs in usa Joint Information Environment jre JREAP Juniper JVAP JWAC K-messages kelly services knowledge service knox labwork LAN Layer 3/ Application/Micro-Segmentation Firewall Policy/Administration LDAP LDAP (Active Directory) LG Android Link-16 linkedin Linux Linux or VxWorks listing Listing Lab work on Cybersecurity Resume littleton Load Balancer load balancers Load balancing location online Log/Monitoring correlation and/or Data Packet Inspection Loggers logrhythm logs MA MAC Mac/OS MacAfee macintosh mainframe maintenance major dns severe google redhat malware management risk wiki Managing stress in Cybersecurity Marine Corps maryland masters degree Masters Degree in a Cybersecurity Role matrix Maverick Mavericks mcafee McAfee Endpoint Security McAfee ePO MCSE MCTP md Mechanical Message Queues microsoft Microsoft SMS/ SCCM microsoft sql middle class military miller jones Milwaukee Minnesota Department of Health mission system engineer mitigation MN mobile devices mobility modernization monitoring Monterey MPLS ms MS-Windows MS Excel MS Power Point MS SQL MS SQL databases MS Visio My experience going through TS clearance my opinion about masters degree in IT NAS National Initiative for Cybersecurity Education National Initiative for Cyberspace Education national security national security agency Naval Hospital Jacksonville Naval Research Laboratory Navy NC Nederland Need Information Security Admin in Cedar rapids IA nessus Nessus Scan netapp Netapps NETCOM netscreen network Network access control network administration Network Administrator Network Administrator in Oak ridge TN Network Area Storage Network attached storage network engineer Network Engineer II Network Engineer In Monterey CA Network Engineer to Risk Management Framework Networker network job Network Operations and Security Center (INOSC) network security network security engineer Network Security Engineer Woodbridge network technician new hampshire new jersey nexpose Nexus 7000 nh NIAP CCEV NICCS NICE niehs NIH nipernet NIPR NIPRENET niprnet nist nist 800 NIST 800 37 Revision 2 NIST 800 and Privacy nist 800-18 NIST 800-30 NIST 800-37 NIST 800-53 NIST 800-115 NIST80037 NIST Cybersecurity Framework nist risk nist risk management framework nist risk management framework 800-37 nist risk management framework 800-37 rev1 NIST Risk Management Framework 800-39 NIST RMF NIST RMF 800 NIST RMF Security Control Interpretation NIST security awareness training NIST Security Framework NIST SP 800-30 nist sp 800-37 nist sp 800-53 nist sp 800-60 NIST SP 800-115 nist sp 800-137 nist stigs NJ noc north carolina Northrop Grumman NSA NVD NXOS NYC Office of Information Technology oftware-Defined Networking (SDN) ohio OIT oobm operational risk operational security operation risk operation technician Oracle Oracle Linux Oracle Linux 5 Oracle Linux 5 STIG V1R1 orange book Oregon or GCFA or Red Hat Enterprise Linux Server 6 os 8 osi osx Outlook OVPI Pa page Palo-Alto palo alto palo alto network patch PCB PCI PCI DSS personnel security php Physical and Environmental Protection physical risk physical security PKI plan of action and milestone PMI Risk Management Professional PMO pmp POA&M or CAP POA&M Risk POAM POAM dates POAM vs Implementation Statement podcast Politics Politics in the IT Office PowerPoint PowerShell pp princeton privacy Privacy do not put real name and location online privacy protection overview private sector privilege access program management Program Manager Project Manager protection of information in IT protection profile python q&a Qos QRadar ArcSight rainbow series Raleigh Raytheon Software Engineer Tucson AZ RDIT recommend RecoverPoint redhat red hat Regional Transportation District (RTD) relocate Remedy remote remote jobs Remote Jobs without a clearance Remote Work Remote Work Cyber security Architect require Research Triangle Park responsibility resume Resume bad grammar and format cybersecurity resume cyber security Resume Cybersecurity Specialist Review Resume ISSO review resume review Retina review Revision 5 Security Controls for Information Systems and Organizations rims risk risk analyst risk assessment risk assessment methods risk assessment model risk assessment reports risk assessment table risk assessment worksheet Risk certification risk determination risk evaluation risk id risk identification risk impact risk it analyst risk it framework risk management risk management analyst risk management association risk management chart risk management definition Risk Management For DoD IT risk management framework Risk Management Framework (RMF) Risk Management Framework (RMF) for DoD Information Technology (IT) risk management frameworkd Risk Management Framework For DoD IT Risk Management Framework for Information Systems and Organizations A System risk management framework ppt risk management framework steps risk management guide risk management magazine risk management principles risk management register risk management techniques risk management wiki risk management worksheet risk managemnet framework risk managemnt risk manager risk manager job description risk managment risk managment frame risk managment framework risk managment frame work risk mangement risk mangement framework risk mitigation risk operational risk register template risk types rismangement framework riverbed Riverbed SteelHead CX rmf rmf assessment RMF course rmf for dod it rmf implementation RMF ISSO Foundation course RMF ISSO Security Controls Docs Updates rmf job rmf jobs RMF Knowledge Service RMFKS RMF Lesson Learned rmf security controls RMF Training Paths RMF Training Video Presentation roles router RPM YUM RSA NetWitness SA&A Saint Paul Salem SAM samsung samsung 9 San Antonio SANS GSLC sar sarbanes oxley SARMA SC SCA SCAP SCAP Compliance Checker scap compliance tool scap tool scc SCCB SCCM SCCM/SME in Dahlgren VA schriever Scientific Scientists SCOM SDN SEC DOT securdever security Security+ Certification Security Access Management Security Administrator security agency security analysis security analyst Security Analyst Opportunity security and risk analyst security assessment re security assessment report security assessment reports security assurance security authorization package security clearance securityclearance Security Clearance Career Expos securityclearance jobs Security Clearances in IT security compliance security compliance engineer Security control security control assessor Security Control Assessor Documents 53a Security control interpretation security controls security controls resources part security engineer Security Engineer in Montpelier Security Engineer Location Wayne security guidance Security Identity Management security intelligence security job Security Manager Security Manager at Boston Area security operations center security plan security plus security requirement guide security risk security specialist Security Technical Implementation Guide Security Technical Implementation Guidelines Security Technical Implementation Guides SEIM select Senior .Net Developer Senior Advanced Splunk IT Specialist senior network security engineer separation of duties Separation of Duties with one person ISSO sepm server sgr SharePoint Should I get security plus or experience first Q&A SIEM SIM SIPRNET six fig Six Figures SmartConnectors / FlexConnectors smarts/ionix SME SMTP SOC sod Software Defined Networking Software Developers Software Engineer solarwind Solution Integrator and Architect Source code management (SCM) south carolina SOX SPECIALIST specialist review splunk sql sql server srg SRM sr network engineer Sr Systems Administrator ssaa SSCP SSL ssp Stakeholders Star N9500 Starting IT Starting IT in Community College state stealhead STEM sterling STIG stig library stigs STIGS for Security Control Assessments STIG Update STIG Update - Microsoft Windows 10 STIG STIG V1R1 stig viewer St Paul stress in Cybersecurity strivector sunnyvale support SuSe Switching Jobs to IT Symantac Ghost symantec system System admin System Administrator System Analyst 3 system compliance system engineer System Engineer IV systems administrator system security plan systems engineer t&e Tanium Tanium Software tcp/ip tech Technical Guide to Information Security Testing and Assessment telework test engineer testimonial testing expert texas therapysessions the rmf road The Value of Security Clearances in IT Things to read for Risk Management Framework threats Tivoli Directory Integrator Tivoli Directory Server TN tool too much experience torrance Training Transparent triage triangle park TS clearance types of risk ubuntu UEM Unified Endpoint Management unix usaf USCYBERCOM USDA USMS USPS VA VBScript vcenter virginia virtual virusscan visualization engineer VM VMWare VMWare AirWatch Mobile Device VMware ESX voice VPLEX VPN vse vsel vsphere VT vulnerabilities Vulnerability and Incident Duties Vulnerability Management and Security Patching WAN warm site Web Application firewall (WAF) web gateways webinspect WebSEAL websense Web Sphere Application Server We happened to see the building of ADT during staycation wfh What if we cannot meet the POAM dates (Part 1) what is a risk assessment what is IA what is information assurance What is payment card industry PCI data security standard DSS what is risk what is the national security agency What you Get in the RMF ISSO Foundations Course What’s Up Gold Which course teaches Risk Management Framework window 10 windows Windows 7 windows 10 Windows 2003 windows iss Windows Professional windows server 12 Windows Server 2008 R2 windows server 2012 domain name system Windows Server Update Service (WSUS) Windows Services Wireshark without a clearance Word work workforce writing XP XtremIO ystems Security ZERO

Copyright © 2023 · Author Pro on Genesis Framework · Powered by WordPress.com. · Log in