النسخة العربية

Oman National CERT Towards a safe cyber environment

Awareness lecture in Abdullah bin Sallam School

Awareness lecture in Abdullah bin Sallam School

Oman National CERT is organizing an awareness lecture on the topic of Blackmailing in Abdullah bin Sallam School in Al Amral – Muscat

View
Technical School Gathering Event in Hail Alawamer School

Technical School Gathering Event in Hail Alawamer School

Oman National CERT is participating in a technical school gathering event in Hail Alawamer school in Muscat...

View
COMEX 2017

COMEX 2017

The participation of Oman National CERT at COMEX 2017, organized by the Information Technology Authority (ITA), through a number of activities and programs, that aims to illustrate the services provided by OCERT

View
Safer Internet Day 2017

Safer Internet Day 2017

Over the years, Safer Internet Day (SID) has become a landmark event in the online safety calendar. In the Sultanate, Oman National CERT as the official SID National Committee is taking the initiative nationally...

View
ITU Arab Regional Cyber Security Center and Oman Oil Company organize a workshop on protecting O&G

ITU Arab Regional Cyber Security Center and Oman Oil Company organize a workshop on protecting O&G

ITU Arab Regional Cyber Security Center and Oman Oil Company (OOC) in collaboration with Oman National CERT...

View

Share it

Online Incidents Report
Request OCERT Services
Information Security Glossary

Information Security Positions

Information Security Positions

Information Security Positions

These are the 20 most attractive and coolest positions for Information Security graduates and professionals according to SANS institute





  • Application Penetration Tester
  • This expert contributes an integral piece to the company’s software development life cycle. He/she does everything from developing code to reverseengineering binaries to examining network traffic.

  • Qualification: GWAPT , GPEN
  • Related Courses:
    DEV422: Web Application Security Essentials
    SEC542: Web App Penetration Testing and Ethical Hacking (GWAPT)
    SEC560: Network Penetration Testing and Ethical Hacking (GPEN)

  • CISO/ISO or Director of Security
  • Today's Chief Information Security Officers are no longer defined the way they used to be. While still technologists, today's CISO/ISO's must have business acumen, communication skills, and process-oriented thinking. They need to connect legal, regulatory, and local organizational requirements with risk taking, financial constraints and technological adoption.

  • Qualification: GISP, GCIM, GSLC, GCPM
  • Related Courses:
    MGT414: SANS® +S™ Training Program for the CISSP® Certification Exam (GISP)
    MGT504: Hacking For Managers (GCIM)
    MGT512: SANS Security Leadership Essentials for Managers with Knowledge Compression™ (GSLC)
    MGT525: Project Management and Effective Communications for Security Professionals and Managers (GCPM)

  • Computer Crime Investigator
  • Computer crime investigators include both ‘sworn’ law enforcement officers and ‘un-sworn’ employees of departments who are dedicated information security investigators. Both are entrusted with the preservation, acquisition, storage, detailed analysis, and clear reporting of digital evidence from many sources: from audio to data bases, e-mail to financial data, pictures and beyond – almost every contemporary crime has some digital evidence.

  • Qualification: GLEG , GCIH , GCFA , GPEN , GAWN
  • Related Courses:
    LEG523: Legal Issues in Information Technology and Information Security (GLEG)
    SEC408: Computer Forensic and E-discovery Essentials
    SEC427: Browser Forensics
    SEC504 Hacker Techniques, Exploits & Incident Handling (GCIH)
    SEC508: Computer Forensics, Investigation & Response (GCFA)
    SEC560: Network Penetration Testing and Ethical Hacking (GPEN)
    SEC617: Wireless Ethical Hacking, Penetration Testing, and Defenses (GAWN)

  • Disaster Recovery/Business Continuity Analyst/Manager
  • These experts ensure that strategic, long-term and tactical recovery plans are identified, developed, maintained, and successfully tested for business essential systems. Some DR/BCP Professionals may be involved in reviewing and maintaining DR contracts for mission critical systems for hot, warm and cold sites. They should be very involved in planning, leading and participating in DR testing as well as reviewing and maintaining DR budget, policies, guidelines and strategies.

  • Qualification: GCIH, GCFA
  • Related Courses:
    SEC504: Hacker Techniques, Exploits, and Incident Handling (GCIH)
    SEC508: Computer Forensics, Investigation, and Response (GCFA)

  • Forensic Analyst
  • The Forensic Analyst focuses on collecting and analyzing data from computer systems to track user-based activity that could be used internally or in civil/criminal litigation. eDiscovery civil litigation, intellectual property theft, disgruntled employee causing damage, and inappropriate use of the internet are the types of cases a Forensic Analyst might encounter.

  • Qualification: GCFA , GREM
  • Related Courses:
    SEC408: Computer Forensic and E-discovery Essentials
    SEC508: Computer Forensics, Investigation & Response (GCFA)
    SEC610: Reverse-Engineering Malware – Malware Analysis Tools and Techniques (GREM)

  • Incident Responder
  • When the security of a system or a network has been compromised, the incident responder is the first-line defense during the breach. The responder not only has to be technically astute, he/she must be able to handle stress under fire while navigating people, processes, and technology to help respond and mitigate a security incident.

  • Qualification: GCIH , GCFA , GREM
  • Related Courses:
    SEC408: Computer Forensic and E-discovery Essentials SEC504: Hacker Techniques, Exploits & Incident Handling (GCIH)
    SEC508: Computer Forensics, Investigation & Response (GCFA)
    SEC558: Network Forensics
    SEC610: REM – Malware Analysis Tools and Techniques (GREM)

  • Information Security Crime Investigator/Forensics Expert
  • This expert analyzes how intruders breached the infrastructure in order to identify additional systems/networks that have been compromised. Investigating traces left by complex attacks requires a forensic expert who is not only proficient in the latest forensic, response, and reverse engineering skills, but is astute in the latest exploit methodologies.

  • Qualification: GCFA
  • Related Courses:
    SEC408: Computer Forensic and E-discovery Essentials
    SEC508: Computer Forensics, Investigation & Response (GCFA)
    SEC558: Network Forensics
    SEC610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques

  • Intrusion Analyst
  • This analyst is responsible for monitoring traffic, blocking unwanted traffic from and to the Internet, and dealing with attackers. Firewalls and IPS technology are the starting point for hardening the network against possible intrusion attempts. Knowledge in firewall policies and functionality is crucial in network security.

  • Qualification: GSEC , GCFW , GCIA
  • Related Courses:
    SEC401: SANS Security Essentials Bootcamp Style (GSEC)
    SEC502: Perimeter Protection In-Depth (GCFW)
    SEC503: Intrusion Detection In-Depth (GCIA)

  • Malware Analyst
  • A malware analyst examines malicious software to understand the nature of the threat. This usually involves reverse-engineering the compiled executable to figure out how the program interacts with its environment. The analyst may be asked to document the specimen’s attack capabilities, understand its propagation characteristics, and define signatures for detecting its presence.

  • Qualification: GREM
  • Related Courses:
    SEC610: Reverse-Engineering Malware – Malware Analysis Tools and Techniques (GREM)
    SEC709: Developing Exploits for Pen Testers & Security Researcher

  • Network Security Engineer
  • Responsible for designing, implementing and managing a network so that proper security is built into the overall infrastructure. This expert not only understands routers and switches, but has a detailed knowledge of firewalls, IDS, IPS, VPN and other critical security components. Understanding both network principles and security allows the network security engineer to build a robust network that provides proper functionality and the correct level of security.

  • Qualification: GSEC , GCED , GCFW
  • Related Courses:
    SEC401: SANS Security Essentials Bootcamp Style (GSEC)
    SEC501: Advanced Security Essentials – Enterprise Defender (GCED)
    SEC502: Perimeter Protection In-Depth (GCFW)

  • Prosecutor Specializing in InfoSec Crime
  • Government attorney who guides law enforcement investigations into computer crimes and represents the State in lawsuits against defendants accused of technology crime.

  • Qualification: GLEG , GSEC
  • Related Courses:
    LEG523: Legal Issues in Information Technology and Information Security (GLEG)
    SEC401: SANS Security Essentials Bootcamp Style (GSEC)

  • Security Analyst
  • Responsible for research and analysis of security threats that may affect a company’s assets, products or technical specifications. This analyst will dig into technical protocols and specifications for a greater understanding of security threats than most of his/her peers, identifying strategies to defend against attacks through intimate knowledge of the threats.

  • Qualification: GCED , GCIA , GPEN
  • Related Courses:
    SEC501: Advanced Security Essentials – Enterprise Defender (GCED)
    SEC503: Intrusion Detection In-Depth (GCIA)
    SEC560: Network Penetration Testing and Ethical Hacking (GPEN)

  • Security Architect
  • This expert understands business needs as well as technology and environmental conditions (e.g., law and regulations), and can translate them into a security design that allows the organization to efficiently carry out its activities while minimizing risk.

  • Qualification: GCED
  • Related Courses:
    SEC501: Advanced Security Essentials – Enterprise Defender (GCED)

  • Security Auditor
  • Management depends on this expert to measure and report on risk to the organization by measuring compliance with policies, procedures and standards. These experts are among the few in the organization, who are actually asked for their honest opinion on what could be improved or done better to make the organization more efficient and profitable through risk management.

  • Qualification: GSAE , GSNA , GSEC
  • Related Courses:
    AUD410: IT Security Audit and Control Essentials (GSAE)
    AUD507: Auditing Networks, Perimeters, and Systems (GSNA)
    SEC401: SANS Security Essentials Bootcamp Style (GSEC)

  • Security Maven in an Application Developer Organization
  • Development expert and security activist, the main function of this expert is to proactively and continuously improve security within the development lifecycle. An important part of that is persuading your colleagues to exercise best practices and avoid the security pitfalls in software development.

  • Qualification: GSSP-JAVA , GSSP-.NET , GSEC , GWAPT
  • Related Courses:
    DEV422: Web Application Security Essentials
    DEV541: Secure Coding in Java/JEE: Developing Defensible Apps (GSSP-JAVA)
    DEV544: Secure Coding in .NET: Developing Defensible Apps (GSSP-.NET)
    SEC401: SANS Security Essentials Bootcamp Style (GSEC)
    SEC542: Web App Penetration Testing and Ethical Hacking (GWAPT)

  • Security Operations Center Analyst
  • This analyst is entrusted with configuration, customization, and examination of output from security tools and software installed on the network. The job requires an understanding of network traffic in general, insight into site-specific traffic and protocols, and an awareness of Internet threats.

  • Qualification: GCFW, GCIA , GCIH , GPEN
  • Related Courses:
    SEC502: Perimeter Protection In-Depth (GCFW)
    SEC503: Intrusion Detection In-Depth (GCIA)
    SEC504: Hacker Techniques, Exploits and Incident Handling (GCIH)
    SEC560: Network Penetration Testing and Ethical Hacking (GPEN)

  • Security-savvy Software Developer
  • The security-savvy software developer leads all developers in the creation of secure software, implementing secure programming techniques that are free from logical design and technical implementation flaws. This expert is ultimately responsible for ensuring customer software is free from vulnerabilities that can be exploited by an attacker.

  • Qualification: GSSP-JAVA , GSSP-.NET
  • Related Courses:
    DEV541: Secure coding in Java/JEE: Developing Defensible Apps (GSSP-JAVA)
    DEV544: Secure Coding in.NET: Developing Defensible Apps (GSSP-.NET)

  • System, Network, and/or Web Penetration Tester
  • This expert finds security vulnerabilities in target systems, networks, and applications in order to help enterprises improve their security. By identifying which flaws can be exploited to cause business risk, the pen tester provides crucial insights into the most pressing issues and suggests how to prioritize security resources.

  • Qualification: GWAPT, GPEN , GAWN
  • Related Courses:
    SEC542: Web Application Penetration Testing In-Depth (GWAPT)
    SEC560: Network Penetration Testing and Ethical Hacking (GPEN)
    SEC617: Wireless Ethical Hacking, Penetration Testing, and Defenses (GAWN)

  • Technical Director and Deputy CISO
  • This expert has to be a strong support for the CISO, you have to succeed at the famous People-Processand-Technology triangle. You have the enviable role of technology focus, but never forget people and process.

  • Qualification: GISP, GCIM, GSLC, GCPM
  • Related Courses:
    MGT404: Fundamentals of Information Security Policy
    MGT414: SANS® +S™ Training Program for the CISSP® Certification Exam (GISP)
    MGT504: Hacking For Managers (GCIM)
    MGT512: SANS Security Leadership Essentials for Managers with Knowledge Compression™ (GSLC)
    MGT525: Project Management and Effective Communications for Security Professionals and Managers (GCPM)

  • Vulnerability Researcher/Exploit Developer
  • This expert is responsible for making the absolute declaration that an application or the OS the organization is using or considering, is safe or unsafe. (S)he identifies weaknesses in both public and home-grown applications, and develops Proof of Concept (PoC) code to validate the findings.

  • Qualification: GCIA, GWAPT, GPEN, GAWN
  • Related Courses:
    SEC503: Intrusion Detection In-Depth (GCIA)
    SEC542: Web App Penetration Testing and Ethical Hacking (GWAPT)
    SEC560: Network Penetration Testing and Ethical Hacking (GPEN)
    SEC617: Wireless Ethical Hacking, Penetration Testing, and Defenses (GAWN)
    SEC709: Developing Exploits for Pen Testers & Security Researchers

  • Scroll Up