Beruflich Dokumente
Kultur Dokumente
Nick D’Orazio
CST 300 Writing Lab
8 September 2019
Cybersecurity
When you envision the future do you see a technological utopia or dystopia? We have all
seen movies that tell us the pitfalls when technology goes wrong. Be it authoritarian utopias or
totalitarian dystopias - you’re right to worry. Globalization is changing the rules in ways we can
not predict. Thinking about what may come is imperceivable as the world grows ever more
complex, with country borders being invisibly breached and governments expanding legislative
powers to combat the issue. So who should we turn to in order to protect our future?
All over the world cybersecurity professionals are being recognized as a necessity to
stabilize technological advancements and their misuse. Companies are expanding their security
divisions and universities are creating education programs to fill the positions. Cybersecurity is
now one of the fastest growing fields. According to the Bureau of Labor Statistics (2019),
positions, “...is projected to grow 32 percent from 2018 to 2028, much faster than the average for
all occupations. Demand for information security analysts is expected to be very high, as these
analysts will be needed to create innovative solutions to prevent hackers from stealing critical
information or causing problems for computer networks.” Still it will not be an easy task to enter
the world of cybersecurity. The skills one needs are diverse and complex. A deep knowledge of
behavioral-based analytics. If trends continue in the same direction, the world will see an
D’Orazio 2
increase in the need to hire individuals to eliminate the human flaws within security systems.
Behavioral-based analysis do just that. By combing over massive amounts of data to determine
the potential security issues. Phoenix NAP Services asserts this trend will continue, stating
“AI-based analysis of behavioral biometric data will be the next major trend in cybersecurity and
data protection” and “almost half of the vacancies for cybersecurity professionals will go
unfilled” (Dobran, 2018). Whether or not that is the outcome, Information Analyst can be sure
If Information Analyst is not exciting enough, a trend towards securing mobile devices is
2019” (“How Many”, n.d.). That’s two-thirds of the world’s population. It’s unlikely that cell
phones will ever disappear. Expect the task to only become more complex with new cell phones
connecting to the grid everyday; creating new access points vulnerable to attack.
And if you find yourself on the opposite side engaging in “Crypto-jacking”, the process
of mining virtual coins illegally, think about using your powers in a new way by helping protect
the virtual coin infrastructure against further attacks. Cryptocurrency mining detection software
One thing for sure, the field of cybersecurity will continue to grow and become more
complex with new technologies added and a few companies are ahead of the game. According to
cybersecurityventures.com, the top four major companies are Herjavec Group, KnowBe4,
CyberArk, and Raytheon Cyber (“Cybersecurity”, 2018). Understanding these companies can
States and the United Kingdom. CEO Robert Herjavec founded the company in 2003 and has
since appeared on the popular show Shark Tank and “served as a Cybersecurity Advisor for the
member of the US Chamber of Commerce Task Force for Cybersecurity” (Herjavec Group, n.d).
Thus, Herjavec is truly a man to look up to for demonstrating his vast knowledge in the
cybersecurity field. His company was propelled to the top of cybersecurity list in 2018, after
winning multiple Cyber Defense Global Awards, being recognized as among the top innovative
leaders.
While KnowBe4 may be less known, their Chief Hacking Officer Kevin Mitnick was
once known as “The World’s Most Wanted Hacker.” KnowBe4 focuses on behavior-based
analytics using security awareness training, designed by Mitnick, to teach how to identify
phishing attacks. Gartner Peer Insights (2019) has recognized the company for the past three
CyberArk is the company customers turn to for expert privileged access coverage.
According to www.cyberark.com, “Privileged access security was born from the collaborative
effort of CyberArk’s founders and customers. Since then, the same team continues to introduce
new products, define the market and lead with innovations, proven methodologies and thoughtful
customer service...” (CyberArk, n.d). CyberArk may have reason to boast, globally leading the
market in privileged access security with business from fifty percent of the Fortune 500 and
thirty percent of the Global 2000. The company has its hands in IT services, manufacturing,
having operations in over 80 countries and 67,000 employees. The company has a rich history
since its founding on July, 7, 1922; four years after World War I, when Vannevar Bush,
Laurence Marshall, and Charles G. Smith, invented the S-Gas Rectifier Tube and founded the
American Appliance Company. The three founders invention reduced the cost of home radios by
reducing the number of batteries needed. The American Appliance Company was later renamed
Raytheon which went on to support Allied Forces in World War II by supplying 80% of the
At the center of one of the most historical moments in recent history, the Apollo 11 moon
mission, was Raytheon’s Apollo guidance computer system and microwave tubes transmitting
images back to hopeful Americans. They’ve since supported the American government in the
Vietnam War and the Persian Gulf War with inventions such as the Lark, Sparrow, Hawk, and
Patriot Missiles. According to Raytheon (n.d.), the company is, “solving the most complex
Raytheon’s inventions are also in your home. Raytheon Engineer Percy Spencer is
attributed with the invention of the microwave. With no formal education beyond that of a
fifth-grader, he was self taught. It was Spencer’s expertise in radio that allowed Raytheon to
supply the Magnetron Tubes needed in World War II. But it was his mishap of having a
chocolate bar in his pocket while working on a Magnetron Tube that would lead to the
microwave. When the chocolate bar melted, he duplicated the experiment using popcorn. Seeing
the popcorn pop he knew he could cook food with microwaves. The invention did not
immediately enter American homes, due to the fact that it “...was 5’6” tall, weighed 750 pounds
D’Orazio 5
and cost as much as $3,000. It was too big, too expensive and too scary for consumers to use, but
found its way to restaurants, railroad cars and ocean liners” (New England Historical Society,
2019).
Today, Thomas A. Kenndy is the Chairman of Raytheon, holding the position since 2014.
Engineering from the Air Force Institute of Technology, and a Doctor of Engineering from
UCLA. He has previously held many positions within the company including Executive Vice
President and Chief Operating Officer where he lead “...the consolidation of Raytheon’s six
products with missles being the top sold under government contracts making up 95% of the
companies revenue. Cyber Analytics and Intelligence Services are offered to protect against
cyber attacks and corporate espionage; Cyber as a Service is where clients can have a team of
cyber experts monitor and support their business around the clock; Cybersecurity Automation
orchestration of cybersecurity tool suites by evaluating all types of cyber activity and developing
models of potential attackers behavior”; Cyber Physical Systems Security and Cyber Resiliency
protect civil and governmental infrastructures; Cyber Systems Integration Services consolidate
all of a client's business into “one cybersecurity framework that covers numerous cyberthreats”;
With Raytheon being a global player aimed at delivering defensive technology their
reputation is one to consider. Financially the company had a revenue of 27.1 billion USD in
D’Orazio 6
2018, with a stock price of $180 per share, showing that their reputation with clients is well
protect the environment, support veterans, and to strive for STEM educational opportunities; and
to be a “champion of women” for advancing the careers of many female engineers. On Glassdoor
(“Raytheon”, 2019), the company has 3.6 stars out of 5; with 86% approving of the CEO,
Thomas A. Kenndy, and 71% willing to recommend the company to a friend. The negative
reviews reflect having to deal with procedural rules, and not having a good work/life balance.
and 4 percent require a graduate degree” (McCraw, 2018). Many of these jobs are not listed as
cybersecurity positions.
Spreading one’s career path options across the diverse cybersecurity positions will
increase the chances of gaining employment. Keep an eye out for jobs listed as Information
Information Security Crime Investigator, and Software Engineer. Many positions will not be
It is important to start the path today. In attending California State University Monterey
Bay I will complete CST 300: Major ProSeminar giving me the skills I need to work efficiently
with a team, improving my communication, writing, and self discipline to learn in new
environments. Following the course outline I will learn operating systems, database systems,
computer networks, internet programming, data science, and software engineering within the
next two years. Leading to a Bachelor’s Degree in Computer Science. With a degree I will have
D’Orazio 7
a strong grasp on the basic technological necessities to perform in the cybersecurity industry.
Once completed it will be beneficial to stay in contact with professors and classmates through
LinkedIn and other recruitment platforms. The next step will be to continue a path of life long
learning and obtain a Master’s Degree from a notable school with a strong reputation.
Finding the first job in the field will be critical. In the next year I will apply for many
entry level positions within the computer science field to gain entry with an associate's degree in
computer science and mathematics received from Cuesta College. Currently I am looking at a
local Secure Everything store with services in physical and digital security. With backing from a
certification will be possible. The certification preparation can take up to a year, so an early start
will be required. Other certification to prepare for include CompTIA Security+, Cybersecurity
To gain employment at Raytheon student and recent grad positions are offered that allow
for working with experienced professions on high-level projects. According to Raytheon (n.d),
working in one of these positions will allow you to “enjoy all kinds of opportunities to grow to
your full potential, with the advantages of world-class career development programs and
outstanding real-life rewards.” If gaining employment through the student and recent grad
program is not possible, the company also offers full-time and part-time internships along with
Another way I will continue to improve is by reading books such as “Cracking the
Coding Interview” by McDowell to improve chances during company coding interviews; “Soft
Skills: The Software Developers Life Manual” by Sonmez to teach communication, negotiation,
D’Orazio 8
and balancing a work schedule; and “Tribe of Hackers” by Carey and Jin to gain advice from
current cybersecurity professionals on the best ways to obtain employment. But, these are not the
only skills I will continue to develop. Skills in mathematics, chemistry, biology, physics, AI,
machine learning, foreign languages, robotics, engineering, and rocketry can also improve my
chances of employment at Raytheon. While many of them are not in my chosen field, they are
apart of Raytheon's corporate empire allowing the possibility for transitional employment.
So, if you’re looking to fill the need for cybersecurity professionals, it is necessary to
leave as many options as possible available. By having a deep understanding of the corporation
you wish to join and a plan for achieving your goal. Companies come and go but cybersecurity is
here to stay.
D’Orazio 9
References
Cybersecurity 500 List, 2018 Edition (2018). Cybersecurity Ventures. Retrieved September 9,
Herjavec Group-Home page (n.d.). Herjavec Group. Retrieved September 9, 2019, from
https://www.herjavecgroup.com/
HOW MANY PHONES ARE IN THE WORLD? (n.d.). bankmycell. Retrieved September 17,
https://www.knowbe4.com/
McCraw, D. B. (2018, October 19). Cybersecurity Certificates, Certifications and Degrees: How
https://certification.comptia.org/it-career-news/post/view/2018/10/19/cybersecurity-certif
icates-certifications-and-degrees-how-to-choose
New England Historical Society. (2019). Percy Spencer Melts a Chocolate Bar, Invents the
Microwave Oven - New England Historical Society. Retrieved September 4, 2019, from
http://www.newenglandhistoricalsociety.com/percy-spencer-melts-chocolate-bar-invents-
microwave-oven/
Occupational Outlook Handbook (2019, September 4). Bureau of Labor Statistics. Retrieved
https://www.bls.gov/ooh/computer-and-information-technology/information-security-ana
lysts.htm
D’Orazio 10
Phoenix NAP; 2019 Cybersecurity Trends: 31 Experts on Current Issues. (n.d.). Phoenix NAP
https://phoenixnap.com/blog/cybersecurity-experts-threats-trends
https://www.glassdoor.com/Reviews/Raytheon-Reviews-E561.htm
https://www.raytheon.com/
Reviews Security Awareness Computer-Based Training (n.d.). Gartner Peer Insights. Retrieved
https://www.gartner.com/reviews/market/security-awareness-computer-based-training
https://www.cyberark.com/why-cyberark/