Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Possible career paths in the security industry?

Posted on 2004-08-15
4
Medium Priority
?
428 Views
Last Modified: 2010-04-11
I need links to good resources on possible career paths in the security industry?

By security industry I mean IT Security, and High-tech security solutions.

I'm majoring in Comp Sci and Engineering, and am interested in either IT security or development/implementation of high-tech security devices.  I need a good place to start looking for what additional education, certifications, possible future employers, and any other usefull information about the field.
0
Comment
Question by:Dynamite149
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
4 Comments
 
LVL 15

Accepted Solution

by:
Yan_west earned 400 total points
ID: 11806349
0
 
LVL 23

Expert Comment

by:Tim Holman
ID: 11809123
After 4-5 years specialising in security, I've concluded there is no such thing as a security career path, as the technology changes too quickly !
Just get on the ladder doing something you enjoy, be prepared to relocate, and get some good experience under your belt.
As always, level 1 support is a good place to start - jobs are easy to get, you don't need too much pre-experience, and they get you a good feel to what corporates are all about...
0
 
LVL 4

Assisted Solution

by:syn_ack_fin
syn_ack_fin earned 300 total points
ID: 11809293
Check out the listings here:
http://www.security-focus.com/jobs

Another good source is here:
https://www.isc2.org/cgi/jobs.cgi

Both list jobs specific to the IT Security field. By reviewing the postings you wshould get a good idea about background, experience, and requirements needed for these jobs.

Good Luck.
0
 
LVL 6

Assisted Solution

by:Dale May
Dale May earned 300 total points
ID: 11816545
www.infosecuritymag.com
www.SearchSecurity.com
Both are good links to the Web's best security-specific information resource for enterprise IT professionals

Good Luck.
0

Featured Post

Cyber Threats to Small Businesses (Part 2)

The evolving cybersecurity landscape presents SMBs with a host of new threats to their clients, their data, and their bottom line. In part 2 of this blog series, learn three quick processes Webroot’s CISO, Gary Hayslip, recommends to help small businesses beat modern threats.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Sometimes Administrators rights are not enough. These cases call for the SYSTEM account. The process in this article outlines the steps required to execute commands using the SYSTEM account.
IF you are either unfamiliar with rootkits, or want to know more about them, read on ....
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

636 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question