Cyber Security training from QA

Nine traits of a great Cyber Analyst

Do you have what it takes to protect your business from hackers, prevent cyber disasters or outwit cyber criminals?


Scott Isaac | 31 May 2017

Read the top traits you need to become a great Cyber Analyst.

  1. A love of technology and gadgets: Having a love of current technology but also keeping an eye out for future developments. Keeping pace with technology out of personal interest means you'll have a higher awareness of the current threats and defences.

  2. A dislike of software and hardware limitations: Have you ever used a gadget or used some software for a purpose other than for which it was intended? The practice of pushing a device outside of its intended purpose is at the root of ethical hacking and is an important mind set to have. Both when looking for a flaw in someone’s system and in the inventive way we can defend our assets.

  3. A naturally curious nature: Have you ever asked how something worked only to be told "It just does"? For some people this isn't good enough. Using your own time to answer your own questions about the world is a key quality for researching technologies and uncovering and solving vulnerability challenges.

  4. Apply yourself to continuous learning: Being able to teach yourself about new technologies, protocols or coding languages as you discover them will allow you to overcome your own limitations and create something new. This could be a new way to enhance a system or a new way to defend a service.

  5. Enjoy collaboration: Cyber security is a very broad field that is growing and branching out all the time. It would be impossible for any one person to become an expert in every field. So collaboration is not only necessary but a strength that allows us to achieve more together than we can alone.

  6. Strong researching skills: There are so many small facts, figures, numbers, codes and commands when working in cyber security that sometimes we run out of space to remember it all! So being able to find small pieces of information using search engines and open source tools effectively can be a real time saver.

  7. The need to work in a changing environment: For some people working in a predictable environment and solving problems in the same way everyday gets boring. No two challenges are the same in cyber security and there are almost unlimited ways to solve the same problem with new tools and techniques being developed every day.

  8. Having an investigative mind set: An investigative mind set is invaluable when piecing together digital clues left behind by an attacker. Having an innate instinct to know when some information is valuable and being able to record and correlate those pieces of information to build a case could mean the difference between stopping an adversary and patching holes in our defences.

  9. Do you think that cyber is cool!: When you enjoy what you do, getting better at your job isn't a chore, it really is fun. It's awesome discovering how to get into systems so you can keep the bad guys out. You'll apply your wit to either bend, break or go around the rules that make up a system in order to learn how to defend it. As one of the good guys you'll then help the owners of that system secure the vulnerabilities you exploited to gain access. As a cyber security professional you will be highly sought after by big business as they seek to do business in today's interconnected world. But most of all cyber is fun and is offers its own reward.

WannaCry Ransomware- What should you be doing?

To catch a phish

10 practical cyber security tips

How secure is your password?

Protecting your online footprint

Who is responsible for Information Security?

 

Scott Isaac

Scott Isaac

Cyber Technical Trainer

Prior to joining QA Scott spent 9 years working with all three of the armed forces providing intelligence derived from a wide range of communication systems. Scott's role was to research various communications systems and exploit them to provide actionable intelligence in a range of environments from Afghanistan to the Falkland islands. Scott currently brings his experience to our range of offensive security courses training security professionals how to think like the adversary and mitigate contemporary cyber security threats.
Talk to our learning experts

Talk to our team of learning experts

Every business has different learning needs. QA has over 30 years of experience in combining the highest quality training with the most comprehensive range of learning services, ensuring the very best fit for your organisation.

Get in touch with our learning experts to talk about how we can help.