Sie sind auf Seite 1von 10

D’Orazio 1

Nick D’Orazio
CST 300 Writing Lab
8 September 2019

Cybersecurity

When you envision the future do you see a technological utopia or dystopia? We have all

seen movies that tell us the pitfalls when technology goes wrong. Be it authoritarian utopias or

totalitarian dystopias - you’re right to worry. Globalization is changing the rules in ways we can

not predict. Thinking about what may come is imperceivable as the world grows ever more

complex, with country borders being invisibly breached and governments expanding legislative

powers to combat the issue. So who should we turn to in order to protect our future?

All over the world cybersecurity professionals are being recognized as a necessity to

stabilize technological advancements and their misuse. Companies are expanding their security

divisions and universities are creating education programs to fill the positions. Cybersecurity is

now one of the fastest growing fields. According to the Bureau of Labor Statistics (2019),

“​Employment of information security analysts…”, one of the fastest growing cybersecurity

positions, “...is projected to grow 32 percent from 2018 to 2028, much faster than the average for

all occupations. Demand for information security analysts is expected to be very high, as these

analysts will be needed to create innovative solutions to prevent hackers from stealing critical

information or causing problems for computer networks.” Still it will not be an easy task to enter

the world of cybersecurity. The skills one needs are diverse and complex. A deep knowledge of

the industry and a personal plan to achieve entry will be required.

Those planning to enter the ranks of cybersecurity professionals should focus on

behavioral-based analytics. If trends continue in the same direction, the world will see an
D’Orazio 2
increase in the need to hire individuals to eliminate the human flaws within security systems.

Behavioral-based analysis do just that. By combing over massive amounts of data to determine

the potential security issues. ​Phoenix NAP Services asserts this trend will continue, stating

“​AI-based analysis of behavioral biometric data will be the next major trend in cybersecurity and

data protection” and “​almost half of the vacancies for ​cybersecurity professionals will go

unfilled” (Dobran, 2018). Whether or not that is the outcome, Information Analyst can be sure

there will always be a career in the next technological advancement.

If Information Analyst is not exciting enough, a trend towards securing mobile devices is

underway. According to www.bankmycell.com, “5.13 billion people have mobile devices in

2019” (“How Many”, n.d.). That’s two-thirds of the world’s population. It’s unlikely that cell

phones will ever disappear. Expect the task to only become more complex with new cell phones

connecting to the grid everyday; creating new access points vulnerable to attack.

And if you find yourself on the opposite side engaging in “Crypto-jacking”, the process

of mining virtual coins illegally, think about using your powers in a new way by helping protect

the virtual coin infrastructure against further attacks. Cryptocurrency mining detection software

is already being implemented to identify such threats.

One thing for sure, the field of cybersecurity will continue to grow and become more

complex with new technologies added and a few companies are ahead of the game. ​According to

cybersecurityventures.com, the top four major companies are Herjavec Group, KnowBe4,

CyberArk, and Raytheon Cyber (“Cybersecurity”, 2018). Understanding these companies can

help lead to a decision.


D’Orazio 3
The Herjavec Group is headquartered in Toronto, Canada; with offices in the United

States and the United Kingdom. CEO Robert Herjavec founded the company in 2003 and has

since appeared on the popular show Shark Tank and “​served as a Cybersecurity Advisor for the

Government of Canada, participated in the White House Summit on Cybersecurity and is a

member of the US Chamber of Commerce Task Force for Cybersecurity” (Herjavec Group, n.d).

Thus, Herjavec is truly a man to look up to for demonstrating his vast knowledge in the

cybersecurity field. His company was propelled to the top of cybersecurity list in 2018, after

winning multiple Cyber Defense Global Awards, being recognized as among the top innovative

leaders.

While KnowBe4 may be less known, their Chief Hacking Officer Kevin Mitnick was

once known as “The World’s Most Wanted Hacker.” ​KnowBe4 focuses on behavior-based

analytics using security awareness training, designed by Mitnick, to teach how to identify

phishing attacks. Gartner Peer Insights (2019) has recognized the company for the past three

years for being a leader in its sector of cybersecurity awareness training.

CyberArk is the company customers turn to for expert privileged access coverage​.

According to www.cyberark.com, “​Privileged access security was born from the collaborative

effort of CyberArk’s founders and customers. Since then, the same team continues to introduce

new products, define the market and lead with innovations, proven methodologies and thoughtful

customer service...” ​(CyberArk, n.d). CyberArk may have reason to boast, globally leading the

market in privileged access security with business from fifty percent of the Fortune 500 and

thirty percent of the Global 2000. The company has its hands in IT services, manufacturing,

energy, telecom, banks, and insurance.


D’Orazio 4
Raytheon, the company I will be pursuing, is mainly known as a U.S.defense contractor

having operations in over 80 countries and 67,000 employees. The company has a rich history

since its founding on July, 7, 1922; four years after World War I, when Vannevar Bush,

Laurence Marshall, and Charles G. Smith, invented the S-Gas Rectifier Tube and founded the

American Appliance Company. The three founders invention reduced the cost of home radios by

reducing the number of batteries needed. The American Appliance Company was later renamed

Raytheon which went on to support Allied Forces in World War II by supplying 80% of the

Magnetron Tubes essential for Allied radars.

At the center of one of the most historical moments in recent history, the Apollo 11 moon

mission, was Raytheon’s Apollo guidance computer system and microwave tubes transmitting

images back to hopeful Americans. They’ve since supported the American government in the

Vietnam War and the Persian Gulf War with inventions such as the Lark, Sparrow, Hawk, and

Patriot Missiles. According to Raytheon (n.d.), the company is, “solving the most complex

challenges across every domain.”

Raytheon’s inventions are also in your home. Raytheon Engineer Percy Spencer is

attributed with the invention of the microwave. With no formal education beyond that of a

fifth-grader, he was self taught. It was Spencer’s expertise in radio that allowed Raytheon to

supply the Magnetron Tubes needed in World War II. But it was his mishap of having a

chocolate bar in his pocket while working on a Magnetron Tube that would lead to the

microwave. When the chocolate bar melted, he duplicated the experiment using popcorn. Seeing

the popcorn pop he knew he could cook food with microwaves. The invention did not

immediately enter American homes, due to the fact that it “...​was 5’6” tall, weighed 750 pounds
D’Orazio 5
and cost as much as $3,000. It was too big, too expensive and too scary for consumers to use, but

found its way to restaurants, railroad cars and ocean liners” (​New England Historical Society,

2019).

Today, Thomas A. Kenndy is the Chairman of Raytheon, holding the position since 2014.

He has a Bachelor’s in Electrical Engineering from Rutgers University, a Master’s in Electrical

Engineering from the Air Force Institute of Technology, and a Doctor of Engineering from

UCLA. He has previously held many positions within the company including Executive Vice

President and Chief Operating Officer where he lead “...the consolidation of Raytheon’s six

businesses to four...increasing the company’s international business” (Raytheon, n.d).

Under Thomas Kennedy’s Presidency, Raytheon offers a multitude of services as

products with missles being the top sold under government contracts making up 95% of the

companies revenue. Cyber Analytics and Intelligence Services are offered to protect against

cyber attacks and corporate espionage;​ Cyber as a Service is where clients can have a team of

cyber experts monitor and support their business around the clock; Cybersecurity Automation

and Orchestration Management addresses “​...real-time threat response and automated

orchestration of cybersecurity tool suites by evaluating all types of cyber activity and developing

models of potential attackers behavior”;​ Cyber Physical Systems Security and Cyber Resiliency

protect civil and governmental infrastructures; Cyber Systems Integration Services consolidate

all of a client's business into “​one cybersecurity framework that covers numerous cyberthreats”;

and Cyber Warfare aids in protecting national security ​(Raytheon, n.d)​.

With Raytheon being a global player aimed at delivering defensive technology their

reputation is one to consider. Financially the company had a revenue of 27.1 billion USD in
D’Orazio 6
2018, with a stock price of $180 per share, showing that their reputation with clients is well

deserved. According to Raytheon (n.d), the company practices ‘corporate responsibility’ to

protect the environment, support veterans, and to strive for STEM educational opportunities; and

to be a “champion of women” for advancing the careers of many female engineers. On Glassdoor

(“Raytheon”, 2019), the company has 3.6 stars out of 5; with 86% approving of the CEO,

Thomas A. Kenndy, and 71% willing to recommend the company to a friend. The negative

reviews reflect having to deal with procedural rules, and not having a good work/life balance.

To secure those jobs professionals should seek a college degree. According to

certification.comptia.org, “82 percent of cybersecurity job postings require a bachelor’s degree,

and 4 percent require a graduate degree” (McCraw, 2018). Many of these jobs are not listed as

cybersecurity positions.

Spreading one’s career path options across the diverse cybersecurity positions will

increase the chances of gaining employment. Keep an eye out for jobs listed as Information

Security Analyst, Software Security Engineer, Security Architect, Penetration Tester,

Information Security Crime Investigator, and Software Engineer. Many positions will not be

attainable immediately, but through dedication, hard work, and determination.

It is important to start the path today. In attending California State University Monterey

Bay I will complete CST 300: Major ProSeminar giving me the skills I need to work efficiently

with a team, improving my communication, writing, and self discipline to learn in new

environments. Following the course outline I will learn operating systems, database systems,

computer networks, internet programming, data science, and software engineering within the

next two years. Leading to a Bachelor’s Degree in Computer Science. With a degree I will have
D’Orazio 7
a strong grasp on the basic technological necessities to perform in the cybersecurity industry.

Once completed it will be beneficial to stay in contact with professors and classmates through

LinkedIn and other recruitment platforms. The next step will be to continue a path of life long

learning and obtain a Master’s Degree from a notable school with a strong reputation.

Finding the first job in the field will be critical. In the next year I will apply for many

entry level positions within the computer science field to gain entry with an associate's degree in

computer science and mathematics received from Cuesta College. Currently I am looking at a

local Secure Everything store with services in physical and digital security. With backing from a

security related store, obtaining a Certified Information Systems Security Professional

certification will be possible. The certification preparation can take up to a year, so an early start

will be required. Other certification to prepare for include CompTIA Security+, Cybersecurity

Analyst (CySA+), and PenTest+.

To gain employment at Raytheon student and recent grad positions are offered that allow

for working with experienced professions on high-level projects. According to Raytheon (n.d),

working in one of these positions will allow you to “enjoy all kinds of opportunities to grow to

your full potential, with the advantages of world-class career development programs and

outstanding real-life rewards.” If gaining employment through the student and recent grad

program is not possible, the company also offers full-time and part-time internships along with

co-op programs to fall back on.

Another way I will continue to improve is by reading books such as “Cracking the

Coding Interview” by McDowell to improve chances during company coding interviews; “Soft

Skills: The Software Developers Life Manual” by Sonmez to teach communication, negotiation,
D’Orazio 8
and balancing a work schedule; and “Tribe of Hackers” by Carey and Jin to gain advice from

current cybersecurity professionals on the best ways to obtain employment. But, these are not the

only skills I will continue to develop. Skills in mathematics, chemistry, biology, physics, AI,

machine learning, foreign languages, robotics, engineering, and rocketry can also improve my

chances of employment at Raytheon. While many of them are not in my chosen field, they are

apart of Raytheon's corporate empire allowing the possibility for transitional employment.

So, if you’re looking to fill the need for cybersecurity professionals, it is necessary to

leave as many options as possible available. By having a deep understanding of the corporation

you wish to join and a plan for achieving your goal. Companies come and go but cybersecurity is

here to stay.
D’Orazio 9
References

Cybersecurity 500 List, 2018 Edition (2018). ​Cybersecurity Ventures.​ Retrieved September 9,

2019, from https://cybersecurityventures.com/cybersecurity-500-list/

Herjavec Group-Home page (n.d.). ​Herjavec Group​. Retrieved September 9, 2019, from

https://www.herjavecgroup.com/

HOW MANY PHONES ARE IN THE WORLD? (n.d.). ​bankmycell​. Retrieved September 17,

2019, from https://www.bankmycell.com/blog/how-many-phones-are-in-the-world

KnowBe4-Home page (n.d.). ​KnowBe4​. Retrieved September 9, 2019, from

https://www.knowbe4.com/

McCraw, D. B. (2018, October 19). Cybersecurity Certificates, Certifications and Degrees: How

to Choose. ​CompTIA.​ Retrieved September 9, 2019, from

https://certification.comptia.org/it-career-news/post/view/2018/10/19/cybersecurity-certif

icates-certifications-and-degrees-how-to-choose

New England Historical Society. (2019). ​Percy Spencer Melts a Chocolate Bar, Invents the

Microwave Oven - New England Historical Society​. Retrieved September 4, 2019, from

http://www.newenglandhistoricalsociety.com/percy-spencer-melts-chocolate-bar-invents-

microwave-oven/

Occupational Outlook Handbook (2019, September 4). ​Bureau of Labor Statistics.​ Retrieved

September 9, 2019, from

https://www.bls.gov/ooh/computer-and-information-technology/information-security-ana

lysts.htm
D’Orazio 10
Phoenix NAP; 2019 Cybersecurity Trends: 31 Experts on Current Issues. (n.d.). ​Phoenix NAP

Global Services​. Retrieved September 3, 2019, from

https://phoenixnap.com/blog/cybersecurity-experts-threats-trends

Raytheon (2019, September 5). ​glassdoor​. Retrieved September 9, 2019, from

https://www.glassdoor.com/Reviews/Raytheon-Reviews-E561.htm

Raytheon-Home page. (n.d.). ​Raytheon Company.​ Retrieved September 3, 2019, from

https://www.raytheon.com/

Reviews Security Awareness Computer-Based Training (n.d.). ​Gartner Peer Insights.​ Retrieved

September 9, 2019, from

https://www.gartner.com/reviews/market/security-awareness-computer-based-training

Why CyberArk? (n.d.). ​CyberArk.​ Retrieved September 9, 2019, from

https://www.cyberark.com/why-cyberark/

Das könnte Ihnen auch gefallen