Page 46 - Cyber Warnings
P. 46
The third branch is comprised of security engineers, technicians and administrators. Their jobs
are to:
• Build out and implement the security architecture.
• Deploy new systems using best practices and architect guidelines.
• Respond to requests from the architect and security operations, making changes to existing
security controls as needed.
Finally, the fourth branch is security operations. This is frequently the front line of information
security. The job of this security operations center is to:
• Analyze security events.
• Ensure security equipment operates effectively/properly.
• Detect security attacks and events.
• Respond to and investigate security attacks or events.
• Mitigate/clean up after security breaches.
The number of security team members needed will vary with each organization’s unique
requirements. No matter how an organization configures its team, the team members should
keep their security skills current, and understand how to work with the other teams. The
organization should have a training and development program in place so team members can
grow their skills and keep current with the latest threats and security technologies. A strong
talent development program can be an attractive asset for employees to stay onboard.
Ultimately, the right training and certifications will make a huge difference in the quality of the
team and how quickly and effectively it works together to detect and respond to both current and
future security incidents.
About the Author
Tom Gilheany is Cisco’s Product Manager for Security Training and
Certifications. He has a diverse background in startups through multinational
Fortune 100 companies. Combining over 20 years of product management and
technical marketing positions, and over a dozen years in IT and Operations, he
has conducted nearly 50 product launches in emerging technologies,
cybersecurity, and telecommunications. Tom holds a CISSP, an MBA, and is
an active board member of the Silicon Valley Product Management Association
and Product Camp Silicon Valley.
46 Cyber Warnings E-Magazine December 2016 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide