Job placement And mentoring program
We train and bring security professionals together with a potential employer.
Why A CyberSecurity Job Placement & Mentoring Program?
The Cybersecurity Industry is constantly evolving hence the need for more cybersecurity professionals. Due to this increased demand individuals and organizations are facing competencies problems. How do interested candidates acquire and prove their competencies? How do organizations recruit and train people with the right competencies? This is made more complex due to the vast cybersecurity work domains. It can be challenging for many to find their niche in this industry.
Our Job placement & mentoring program brings potential employers and cybersecurity professionals together.
For the Employees
We help individuals to build a career in cybersecurity by providing experienced-based training and mentoring. In many ways, cybersecurity is like any other industry such as engineering or healthcare. There are many directions to choose from and many paths to specialization. To get a job and grow a career in Cybersecurity you will need to choose which of the different path you find interesting
For the Employers
We help organizations to find out the type and level of cybersecurity professionals they need and help them train candidates to fill these positions. Through our continue professional education we continue to provide these professionals the skills needed to turn their knowledge into abilities.
Who Is This Program For?
Young School Graduates
Young people just leaving school may find themselves not qualified enough to get a job with the cybersecurity industry because of lack of experience and not earning the right qualifications in school. The job placement and mentoring program help these people to increase their competencies
People Looking To Switch Career
The future is Cybersecurity, Cloud and Artificial Intelligence and Big Data. Many people in Information Technology today doing jobs as System Administrator, help desk or Database administrators might be out of job due to sophistication of AI systems in the future which could take over these types. Therefore, there a need for people to make a Switch to Cybersecurity which spans multiple sectors.
Experienced IT Specialist
If you have been in the Information Technology industry for years, and now feel you need to move higher into Information Security Management for job functions as CISO or CSO but having difficulties financing the one then this is the program for you.
Software & Database Developers
The field of cybersecurity is very wide. This is ongoing to increase in the next few years. Software are actually the best people to build security into software. However, many software developers lack security skills. This program is for you if you are such a software or database developer who would like to add security skills to software development.
How Does The Program Works?
We engage interested professionals in a one-to-one consultation, so we can create a recommendation for them based on their work experience and their choice of career they would like to pursue. During this consultation we make use of The National Initiative for Cybersecurity Education Cybersecurity Workforce Framework (NICE Framework) to help them map out their career path. Based on this a training program is created which will take the person from zero to a security professional within 6 months.
The US national Institute of Standard and Technology (NIST) published a framework called the NICE Framework which is designed to help both employers and potential employees to zoom in on the knowledge and skills that is needed in the Cybersecurity industry. Using the NICE framework, we can help train and mentor people into cybersecurity professional within their chosen path. The NICE framework divides the Cybersecurity workforce into the following speciality areas:
The NICE framework enables an organization to successful recruit and train security professionals for multiple roles in the organization. Provides information about workforce needs for a giving function.
The NICE Framework presents clear information about cybersecurity work to help people looking for a new job or to change job roles, and workers looking to demonstrate or increase their competencies.
The NICE framework provides information about what a candidate needs to know to be efficient in the Cybersecurity industry. Educators can develop better educational programs. Certificates.
Components of the NICE Framework
Concerned with conceptualizing, designing, and building secure IT systems, with responsibility for some aspect of the systems’ development.
- Risk Management
- Software Development
- System Architecture
- System Development
- Systems Requirements Planning
- Technology R&D
- Test and Evaluation
Oversee and Govern
Provides leadership, management, direction, or development and advocacy so the organization may effectively conduct cybersecurity work.
- Cybersecurity Management
- Executive Cyber Leadership
- Legal Advice and Advocacy
- Program /Project Management and Acquisition
- Strategic Planning and Policy
- Training, Education and Awareness
Operate and Maintain
Responsible for providing the support, administration, and maintenance necessary to ensure effective and efficient IT system performance and security.
- Customer Service and Technical Support
- Data Administration
- Knowledge Management
- Network Service
- Systems Administration
- System Analysis
Specialty areas responsible for highly specialized review and evaluation of incoming cybersecurity information to determine its usefulness for intelligence.
- All Source Analysis
- Exploitation Analysis
- Language Analysis
- Threat Analysis
Protect And Defend
Identification, analysis, and mitigation of threats to internal IT systems or networks. Uses defensive measures and information collected from a variety of sources to identify, analyse, and report events that occur or might occur within the network to protect information, information systems, and networks from threats.
- Cyber Defence Analysis
- Cyber Defence Infrastructure Support
- Incident Response
- Vulnerability Assessment and Management
Collect And Operate
Responsible for specialized denial and deception operations and collection of cybersecurity information that may be used to develop intelligence.
- Collection Operation
- Cyber Operational Planning
- Cyber Operations
Responsible for detecting and analyzing cyber events and/or crimes of IT systems, networks, and digital evidence.
- Cyber Investigation
- Digital Forensics
Security Management Professional Example
Using the NICE Framework we are able to map out the career path and train people with the right competencies as to effectively manage information security programs in an organization. This program provide Job competencies such for Chief Information Security Officer (CISO), Chief Security Officer (CSO), Security or Compliance Manager.
Oversee & Govern
Chief Information Security Officer (CISO)
Security Security Officer (CSO)
IT Program Manager
Product Support Manager
IT Investment/Portfolio Manager
IT Program Auditor
ISC2 Certified Information Systems Security Professional (CISSP)
ISC2 Certified Cloud Security Professional (CCSP)
ISACA Certified Information Security Management (CISM)
EC Council Certified Chief Information Security Officer (CCISO)
ISACA Certified in Risk and Information Security Control (CRISC)
CompTIA Advanced Security Practitioner (CASP+)
To Protect & Defend Function
Protect & Defend
Information Systems Security Engineer
Network Security Engineer
Network Security Specialist
Systems Security Engineer