Solved

Possible career paths in the security industry?

Posted on 2004-08-15
4
414 Views
Last Modified: 2010-04-11
I need links to good resources on possible career paths in the security industry?

By security industry I mean IT Security, and High-tech security solutions.

I'm majoring in Comp Sci and Engineering, and am interested in either IT security or development/implementation of high-tech security devices.  I need a good place to start looking for what additional education, certifications, possible future employers, and any other usefull information about the field.
0
Comment
Question by:Dynamite149
4 Comments
 
LVL 15

Accepted Solution

by:
Yan_west earned 100 total points
ID: 11806349
0
 
LVL 23

Expert Comment

by:Tim Holman
ID: 11809123
After 4-5 years specialising in security, I've concluded there is no such thing as a security career path, as the technology changes too quickly !
Just get on the ladder doing something you enjoy, be prepared to relocate, and get some good experience under your belt.
As always, level 1 support is a good place to start - jobs are easy to get, you don't need too much pre-experience, and they get you a good feel to what corporates are all about...
0
 
LVL 4

Assisted Solution

by:syn_ack_fin
syn_ack_fin earned 75 total points
ID: 11809293
Check out the listings here:
http://www.security-focus.com/jobs

Another good source is here:
https://www.isc2.org/cgi/jobs.cgi

Both list jobs specific to the IT Security field. By reviewing the postings you wshould get a good idea about background, experience, and requirements needed for these jobs.

Good Luck.
0
 
LVL 6

Assisted Solution

by:d_may
d_may earned 75 total points
ID: 11816545
www.infosecuritymag.com
www.SearchSecurity.com
Both are good links to the Web's best security-specific information resource for enterprise IT professionals

Good Luck.
0

Featured Post

U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Last week, our Skyport webinar on “How to secure your Active Directory” (https://www.experts-exchange.com/videos/5810/Webinar-Is-Your-Active-Directory-as-Secure-as-You-Think.html?cid=Gene_Skyport) provided 218 attendees with a step-by-step guide for…
Worried about if Apple can protect your documents, photos, and everything else that gets stored in iCloud? Read on to find out what Apple really uses to make things secure.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

773 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question