{"id":15851,"date":"2023-02-14T11:03:59","date_gmt":"2023-02-14T16:03:59","guid":{"rendered":"https:\/\/marymount.edu\/?p=15851"},"modified":"2023-02-17T10:07:44","modified_gmt":"2023-02-17T15:07:44","slug":"what-you-need-to-know-to-enter-advance-in-the-cybersecurity-field","status":"publish","type":"post","link":"https:\/\/marymount.edu\/blog\/what-you-need-to-know-to-enter-advance-in-the-cybersecurity-field\/","title":{"rendered":"What you need to know to enter, advance in the cybersecurity field"},"content":{"rendered":"

 <\/p>\n

The demand for cybersecurity jobs continues to rise. Information security analyst is one of the top 20 fastest growing professions<\/a>, according to The Bureau of Labor Statistics, expected to grow 35 percent by 2031 with a 2021 median pay of $102,600.<\/p>\n

Whether you want to launch yourself into this cutting-edge field or advance further into a senior management-level position in the cybersecurity industry, schools like Marymount University offer innovative programs<\/a> to make your dream possible. Dr. Diane Murphy<\/a>, Director of Marymount’s School of Technology and Innovation<\/a>, shares her expertise about what students of all stages need to know about this surging career field.<\/p>\n

Why is the demand for cybersecurity jobs growing so fast?<\/strong><\/h2>\n

The Cyberseek Heat Map<\/a> shows over 750,000 online job listings for cybersecurity-related positions from January-December 2022, with around 70,000 of those in the DMV area. The number of these positions continue to grow because of a number of factors:<\/p>\n

    \n
  1. The number of attack surfaces has increased. No longer are people just employed inside of a secured building \u2013 they are now working remotely, many in their homes. This trend to remote or hybrid working results in more vulnerabilities. An example of this is the increase in telehealth and private information being transmitted over insecure communications.<\/li>\n
  2. Many businesses and government services are now available over the internet, whether it is the grocery store, the DMV or the IRS \u2013 also increasing the number of places that cybercriminals can find personally identifiable information (PII), including credit card numbers.<\/li>\n
  3. The linkage between information technology and operational technology, which links physical plant \u2013 such as the electrical grid, water supply and oil and gas pipelines, to name a few \u2013 to the internet, making it possible for an attacker to disrupt the electrical supply, contaminate the water supply or close a pipeline, as recently happened with the Colonial Pipeline.<\/li>\n
  4. The number of cybercriminals is getting larger and they are getting more sophisticated as attack tools, and even hackers themselves, can be bought over the dark web. The latter is also the place where the results of data breaches can be sold for cash.<\/li>\n
  5. Malware, particularly ransomware, is now widespread and attacks are being made on a wide variety of vulnerable institutions, from local authorities to school systems to many small businesses. Often, they are not the ultimate target but they may have readily available credentials to allow the attackers to link to larger businesses or government agencies.<\/li>\n
  6. There are not enough individuals obtaining the necessary credentials to be hired into the cybersecurity field. Employers are looking for individuals who have \u201cexperience,\u201d so it is difficult for recent graduates or certification holders to enter the field. Community colleges and four-year universities in the region are working hard to create experiential learning opportunities for their students outside traditional internships, as there are not enough good internships to meet student demand \u2013 in part because of the requirement for security clearances for many positions in this area.<\/li>\n
  7. This is a classic supply and demand issue, which means cybersecurity professionals are demanding high salaries, often making hiring an experienced cybersecurity professional out of reach for many small businesses or not-for-profits.<\/li>\n<\/ol>\n

    What do organizations need from their cybersecurity staff and leaders?<\/strong><\/strong> <\/h2>\n

    Most of the need is to ensure the security of the enterprise and its compliance with regulatory requirements, which depend largely on the nature of the business and the type of organization. Typical activities include cybersecurity risk reviews, cyber awareness training, vulnerability assessments, penetration testing and the design and implementation of security controls. Cybersecurity professionals may work in the Security Operations Center (SOC) and monitor traffic in and out of the network. If they notice something unusual, it is analyzed to determine if it is a cyberattack from inside or outside their network. Cybersecurity professionals may also work in the Incident Response Center, where they respond to the cyberattack to minimize its impact on the enterprise. Another part of the cybersecurity team may work on cyber threat intelligence, keeping track of the cybersecurity threats and vulnerabilities that constantly appear as bugs are found in various software packages. Based on this intelligence, they may require the IT team to install patches developed by the software vendor to fix the vulnerability.<\/p>\n

    The Chief Information Security Officer (CISO) is generally the leader of the cybersecurity team and works with other parts of the enterprise to balance their business and security needs. He or she must be situationally aware of threats and incidents that have happened in the industry and advise accordingly. They are also responsible for obtaining the budget for the security operations.<\/p>\n

    Is this growth across all sectors, or just in tech, finance, medical and manufacturing?<\/strong><\/h2>\n

    The growth is across all sectors, wherever technology is used and linked to the internet, allowing for access by anyone.<\/p>\n

    The technology sector is a major target mainly because of its reach \u2013 attacks on the software supply chain surge as attackers may attack one company and use it to reach a variety of companies. A recent example was the Solarwinds attacks.<\/p>\n

    The financial sector is another target for cyberattacks as much of the cyber activity is by financially motivated organized crime. Credit cards and other financial data is sold on the dark web. In addition, there have been many cyberattacks on the fast-growing cryptocurrency ecosystem, which was originally thought to be secure.<\/p>\n

    The health care sector is of real concern because of the increased number of cybersecurity incidents focused on hospitals and other medical facilities, and the increased number of Medicare\/Medicaid fraud incidents resulting from these data breaches. Ransomware has been increasingly used against health care facilities.<\/p>\n

    Another big growth area is local utilities, which are now linked to the internet for remote monitoring and other business transactions. The operational technology in many utilities (electricity, water, etc.) is often old and incapable of being secured. A recent example of this was the Colonial Pipeline attack, which closed the main gas pipeline on the East Coast, causing panic buying of gasoline.<\/p>\n

    What skills do people need for these cybersecurity jobs?<\/strong><\/h2>\n

    Cybersecurity professionals use a combination of technical and soft skills to assess vulnerabilities and respond to security incidents.<\/p>\n

    Technical skills include classical cybersecurity knowledge such as security controls, firewalls and intrusion detection devices, networking, operating systems, etc. Today, however, cybersecurity professionals must also be familiar with cloud infrastructure and be able to automate cybersecurity processes. So, they should be able to code in languages such as Python and be able to use today\u2019s data analysis techniques.<\/p>\n

    Soft skills include problem solving, oral and written communication and the ability to work in teams.<\/p>\n

    What skills do people need to work in management of cybersecurity?<\/strong><\/h2>\n

    Management skills are necessary for the CISO, in addition to technical skills. He or she must be able to communicate well with the rest of the organization, as cybersecurity is now a board-level consideration in many enterprises. Budgeting is a key function as cybersecurity departments are often under-resourced for the increasing threats that they face.<\/p>\n

    What programs\/classes does Marymount offer to prepare students?<\/strong><\/h2>\n

    Marymount\u2019s Master of Science in Cybersecurity<\/a> is designed for career changers who have a good knowledge of cybersecurity. Students take a series of technical classes which cover the field of cybersecurity, cryptography and computer network defense. Students are also required to take computer scripting, law and policy and a course on information technology management, as well as a research project. In addition to these foundational technical and management courses, students can take another four courses in specific interest areas, e.g., risk management or digital forensics, or they can take a specialty in one of the application areas, including data science, digital health, privacy, data security or business management. The program is designed to allow students to follow a technical or a management track.<\/p>\n

    Marymount also offers a Doctor of Science in Cybersecurity<\/a>, which is designed to develop cybersecurity professionals to become leaders in the field.   <\/p>\n

    Are the programs online, in person or hybrid?<\/strong><\/h2>\n

    The programs can be taken online or face to face, catering to both type of learners. Students can also mix and match to suit their schedules and other commitments. International students are required to take face-to-face courses if they are on a F1 or equivalent visa.<\/p>\n

    What kinds of hands-on experience do students get?<\/strong><\/h2>\n

    Marymount has a variety of hands-on learning options. The network defense class allows students to learn and practice with all of the tools and skills required for the field. For students without experience, an optional course is the practicum, which provides an internship experience. Marymount also conducts research projects for clients and students are engaged in these projects, often using the same tools they would use in the industry.<\/p>\n

    What types of jobs do graduates get?<\/strong><\/h2>\n

    Graduate students get a variety of government jobs as cyber professionals with the NSA, Department of Defense and civilian agencies. They also obtain positions at companies such as Ernst & Young, Deloitte and Booz Allen Hamilton in the professional services sector, with Visa and Capitol One in the private sector and with Amazon Web Services and Recorded Future among leading vendors in the area.<\/p>\n

    How long does the program take?<\/strong><\/h2>\n

    Two years usually, but 18 months is possible.<\/p>\n

    Is there anything else interested individuals should know?<\/strong><\/h2>\n

    Marymount holds two important credentials for the cybersecurity industry:<\/p>\n

      \n
    1. Approved curriculum to meet the standards for NSA\/DHS Center of Academic Excellence in Cyber Defense (CAE-CD)<\/a><\/li>\n
    2. Part of NSFS\/OPM\u2019s CyberCorps Scholarship for Service (SFS) program<\/a><\/li>\n<\/ol>\n

       <\/p>\n","protected":false},"excerpt":{"rendered":"

        The demand for cybersecurity jobs continues to rise. Information security analyst is one of the top 20 fastest growing professions, according to The Bureau of Labor Statistics, expected to grow 35 percent by 2031 with a 2021 median pay of $102,600. Whether you want to launch yourself into this cutting-edge field or advance further […]<\/p>\n

      Read More…<\/a><\/p>\n","protected":false},"author":6,"featured_media":15855,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_lmt_disableupdate":"no","_lmt_disable":"no","ngg_post_thumbnail":0,"footnotes":""},"categories":[766],"tags":[613,1709,253,1710,1711,615,14,15,1211,702],"acf":[],"yoast_head":"\nWhat you need to know to enter, advance in the cybersecurity field - Marymount University<\/title>\n<meta name=\"description\" content=\"Marymount's Dr. Diane Murphy shares her expertise about what students of all stages need to know about the surging cybersecurity field.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/marymount.edu\/blog\/what-you-need-to-know-to-enter-advance-in-the-cybersecurity-field\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What you need to know to enter, advance in the cybersecurity field\" \/>\n<meta property=\"og:description\" content=\"Marymount's Dr. Diane Murphy shares her expertise about what students of all stages need to know about the surging cybersecurity field.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/marymount.edu\/blog\/what-you-need-to-know-to-enter-advance-in-the-cybersecurity-field\/\" \/>\n<meta property=\"og:site_name\" content=\"Marymount University\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-14T16:03:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-02-17T15:07:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/marymount.edu\/wp-content\/uploads\/2023\/02\/700-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"700\" \/>\n\t<meta property=\"og:image:height\" content=\"420\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"nmunson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"nmunson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/marymount.edu\/blog\/what-you-need-to-know-to-enter-advance-in-the-cybersecurity-field\/\",\"url\":\"https:\/\/marymount.edu\/blog\/what-you-need-to-know-to-enter-advance-in-the-cybersecurity-field\/\",\"name\":\"What you need to know to enter, advance in the cybersecurity field - Marymount University\",\"isPartOf\":{\"@id\":\"https:\/\/marymount.edu\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/marymount.edu\/blog\/what-you-need-to-know-to-enter-advance-in-the-cybersecurity-field\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/marymount.edu\/blog\/what-you-need-to-know-to-enter-advance-in-the-cybersecurity-field\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/marymount.edu\/wp-content\/uploads\/2023\/02\/700-1.jpg\",\"datePublished\":\"2023-02-14T16:03:59+00:00\",\"dateModified\":\"2023-02-17T15:07:44+00:00\",\"author\":{\"@id\":\"https:\/\/marymount.edu\/#\/schema\/person\/2266f7e97a39aa87b435294a30d03814\"},\"description\":\"Marymount's Dr. Diane Murphy shares her expertise about what students of all stages need to know about the surging cybersecurity field.\",\"breadcrumb\":{\"@id\":\"https:\/\/marymount.edu\/blog\/what-you-need-to-know-to-enter-advance-in-the-cybersecurity-field\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/marymount.edu\/blog\/what-you-need-to-know-to-enter-advance-in-the-cybersecurity-field\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/marymount.edu\/blog\/what-you-need-to-know-to-enter-advance-in-the-cybersecurity-field\/#primaryimage\",\"url\":\"https:\/\/marymount.edu\/wp-content\/uploads\/2023\/02\/700-1.jpg\",\"contentUrl\":\"https:\/\/marymount.edu\/wp-content\/uploads\/2023\/02\/700-1.jpg\",\"width\":700,\"height\":420,\"caption\":\"What you need to know to enter, advance in the cybersecurity field\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/marymount.edu\/blog\/what-you-need-to-know-to-enter-advance-in-the-cybersecurity-field\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/marymount.edu\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What you need to know to enter, advance in the cybersecurity field\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/marymount.edu\/#website\",\"url\":\"https:\/\/marymount.edu\/\",\"name\":\"Marymount University\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/marymount.edu\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/marymount.edu\/#\/schema\/person\/2266f7e97a39aa87b435294a30d03814\",\"name\":\"nmunson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/marymount.edu\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/38df618b1f7e8b4885474e1b4e965541?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/38df618b1f7e8b4885474e1b4e965541?s=96&d=mm&r=g\",\"caption\":\"nmunson\"},\"url\":\"https:\/\/marymount.edu\/blog\/author\/nmunson\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What you need to know to enter, advance in the cybersecurity field - Marymount University","description":"Marymount's Dr. Diane Murphy shares her expertise about what students of all stages need to know about the surging cybersecurity field.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/marymount.edu\/blog\/what-you-need-to-know-to-enter-advance-in-the-cybersecurity-field\/","og_locale":"en_US","og_type":"article","og_title":"What you need to know to enter, advance in the cybersecurity field","og_description":"Marymount's Dr. Diane Murphy shares her expertise about what students of all stages need to know about the surging cybersecurity field.","og_url":"https:\/\/marymount.edu\/blog\/what-you-need-to-know-to-enter-advance-in-the-cybersecurity-field\/","og_site_name":"Marymount University","article_published_time":"2023-02-14T16:03:59+00:00","article_modified_time":"2023-02-17T15:07:44+00:00","og_image":[{"width":700,"height":420,"url":"https:\/\/marymount.edu\/wp-content\/uploads\/2023\/02\/700-1.jpg","type":"image\/jpeg"}],"author":"nmunson","twitter_card":"summary_large_image","twitter_misc":{"Written by":"nmunson","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/marymount.edu\/blog\/what-you-need-to-know-to-enter-advance-in-the-cybersecurity-field\/","url":"https:\/\/marymount.edu\/blog\/what-you-need-to-know-to-enter-advance-in-the-cybersecurity-field\/","name":"What you need to know to enter, advance in the cybersecurity field - Marymount University","isPartOf":{"@id":"https:\/\/marymount.edu\/#website"},"primaryImageOfPage":{"@id":"https:\/\/marymount.edu\/blog\/what-you-need-to-know-to-enter-advance-in-the-cybersecurity-field\/#primaryimage"},"image":{"@id":"https:\/\/marymount.edu\/blog\/what-you-need-to-know-to-enter-advance-in-the-cybersecurity-field\/#primaryimage"},"thumbnailUrl":"https:\/\/marymount.edu\/wp-content\/uploads\/2023\/02\/700-1.jpg","datePublished":"2023-02-14T16:03:59+00:00","dateModified":"2023-02-17T15:07:44+00:00","author":{"@id":"https:\/\/marymount.edu\/#\/schema\/person\/2266f7e97a39aa87b435294a30d03814"},"description":"Marymount's Dr. Diane Murphy shares her expertise about what students of all stages need to know about the surging cybersecurity field.","breadcrumb":{"@id":"https:\/\/marymount.edu\/blog\/what-you-need-to-know-to-enter-advance-in-the-cybersecurity-field\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/marymount.edu\/blog\/what-you-need-to-know-to-enter-advance-in-the-cybersecurity-field\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/marymount.edu\/blog\/what-you-need-to-know-to-enter-advance-in-the-cybersecurity-field\/#primaryimage","url":"https:\/\/marymount.edu\/wp-content\/uploads\/2023\/02\/700-1.jpg","contentUrl":"https:\/\/marymount.edu\/wp-content\/uploads\/2023\/02\/700-1.jpg","width":700,"height":420,"caption":"What you need to know to enter, advance in the cybersecurity field"},{"@type":"BreadcrumbList","@id":"https:\/\/marymount.edu\/blog\/what-you-need-to-know-to-enter-advance-in-the-cybersecurity-field\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/marymount.edu\/"},{"@type":"ListItem","position":2,"name":"What you need to know to enter, advance in the cybersecurity field"}]},{"@type":"WebSite","@id":"https:\/\/marymount.edu\/#website","url":"https:\/\/marymount.edu\/","name":"Marymount University","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/marymount.edu\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/marymount.edu\/#\/schema\/person\/2266f7e97a39aa87b435294a30d03814","name":"nmunson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/marymount.edu\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/38df618b1f7e8b4885474e1b4e965541?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/38df618b1f7e8b4885474e1b4e965541?s=96&d=mm&r=g","caption":"nmunson"},"url":"https:\/\/marymount.edu\/blog\/author\/nmunson\/"}]}},"modified_by":"nmunson","_links":{"self":[{"href":"https:\/\/marymount.edu\/wp-json\/wp\/v2\/posts\/15851"}],"collection":[{"href":"https:\/\/marymount.edu\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/marymount.edu\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/marymount.edu\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/marymount.edu\/wp-json\/wp\/v2\/comments?post=15851"}],"version-history":[{"count":5,"href":"https:\/\/marymount.edu\/wp-json\/wp\/v2\/posts\/15851\/revisions"}],"predecessor-version":[{"id":15857,"href":"https:\/\/marymount.edu\/wp-json\/wp\/v2\/posts\/15851\/revisions\/15857"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/marymount.edu\/wp-json\/wp\/v2\/media\/15855"}],"wp:attachment":[{"href":"https:\/\/marymount.edu\/wp-json\/wp\/v2\/media?parent=15851"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/marymount.edu\/wp-json\/wp\/v2\/categories?post=15851"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/marymount.edu\/wp-json\/wp\/v2\/tags?post=15851"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}