Job Research

The disciplines I see represented in these 50 jobs are based on the CIA triad. Each job requires the practice of confidentiality, integrity, and availability. A job may focus on one principle more than another. But every job impacts the confidentiality, integrity, and availability of an organization. The two jobs I found an interest in are IoT (Internet of Things) Security Specialist and Bug Bounty Hunter. A IoT Security Specialist protects network connected devices. An example of a IoT device is the voice assistant Alexa. According to IoT analytics IoT devices grew from 4.7 billion in 2016 to 11.6 billion in 2021. The amount of cybercrime increases exponentially with the growth of the IoT. A IoT Security Specialist is required to secure IoT devices, analyze vulnerabilities, determine controls against threats, monitor IoT devices, and effectively respond to incidents. A Bug Bounty Hunter finds defects and exploits in code. The skills required to be a Bug Bounty Hunter include information gathering, SQL injection, cross-site scripting, server-side request forgery, local and remote file inclusion, information disclosure, and remote code execution. Companies offer rewards for the uncovering of vulnerabilities in their websites. I found the increase in the IoT devices very surprising. I did not note the emergence of all the new IoT devices within the past 5 years

Leave a Reply

Your email address will not be published. Required fields are marked *