Information Security Processes
With an increasing number of talented technologists, organizations require effective leaders to manage their teams and processes. Those managers will not necessarily perform hands-on work, but they must know enough about the underlying technologies and frameworks to help set strategy, develop appropriate policies, interact with skilled practitioners, and measure outcomes
Whether you're seeking to maintain a trail of evidence on host or network systems, or hunting for threats using similar techniques, larger organizations need specialized professionals who can move beyond first-response incident handling in order to analyse an attack and develop an appropriate remediation and recovery plan
The professional who can find weakness is often a different breed than one focused exclusively on building defences. A basic tenet of red team/blue team deployments is that finding vulnerabilities requires different ways of thinking and different tools. Penetration testing skills are essential for defense specialists to improve their defences
Threat analysis and Incident Response
The detection of what is happening in your environment requires an increasingly sophisticated set of skills and capabilities Identifying security anomalies requires increased depth of understanding to deploy detection and monitoring tools and to interpret their output