Cybersecurity has evolved into a complex and varied set of functions. A large organization may have eight functional areas. Each area is represented by a separate team. In smaller organizations, one or two people may try to cover all the areas and outsource the rest. Each of these functional specializations represents a different role that requires different skills and knowledge.
These are the eight specializations:
Architecture and Policy
Data Loss Prevention
Governance, Risk and Compliance
Management of Access and Identity
Incident Response and Forensic Analysis
Penetration Testing
Secure DevOps
Secure Software Development
Architecture and Policy
The cybersecurity architect designs and implements secure architectures. They also translate business processes and frameworks into internal policies. This is typically an experienced engineer with many years of IT experience who can make difficult tradeoff decisions. They can think of multiple ways to solve a problem and then sort through them to find the best one. Architects are skilled in analyzing protocols and products, and can create functional diagrams that show how applications work in a data center. They are also comfortable creating secure interfaces between systems and applications. The underlying architecture that architects choose to use is the driving force behind the policies they create. Frameworks are used by architects to organize architecture into manageable structures.
Data Loss Prevention (DLP)
These engineers manage security applications, such as malware detection on servers and endpoints. Modern anti-virus systems on computers use advanced clients that connect to services on the back end to push signature updates and other such functions. These engineers ensure that the system is up-to-date and troubleshoot any negative interactions with new applications, which can sometimes interfere with virus checksers. DLP personnel manage the security of data stored on servers and databases. They often install and maintain special software to allow permissions and log. They also work on compliance with the GDPR and user privacy issues.
Governance, Risk and Compliance (GRC).
Analysts measure and quantify risk, conduct internal audits against best practices, standards, and create plans for business continuity or disaster recovery. Because it must be aligned with business risk, risk analysis is becoming increasingly important. These analysts must ensure that the risks are properly identified and managed for applications and programs that are critical to the business. The GRC team is typically the “security auditor” and reviews the work of the seven specializations against compliance frameworks like PCI-DSS or the Risk Management Framework (RMF). The GRC team tracks and verifies any non-conformance until it is resolved.
Identity and Access Management (IAM).
This team is responsible for managing authorizations, identification, and permissions across all systems. Due to the proliferation of protocols (OAuth, SAML etc. They are protocol experts across all platforms, including desktops, servers, tablets, and smartphones. They must also be able to enforce and understand identification policies throughout the organization. This includes understanding roles and role-based access management to business processes. They keep up-to-date with biometrics and multi-factor identification. This team is also directly affected by cloud architectures which makes their job more difficult. This function is typically less staffed than other specialties. However, the most common attack is user credentials compromise. Therefore, diligence is essential.
Incident Response and Forensic Analysis