Testimonies from the Leahy Center Security Analysts Part Three

Cybersecurity, like any security, is an arms-race of constant improvement and evolution. Every day, malicious entities and bad actors find new and more inventive ways to infiltrate private networks and steal precious information; and every day, cybersecurity specialists have to improve their systems and techniques for preventing, shutting down, and revealing such intrusions. A vital part of this (and any security endeavor) is for the “defense team” to assess their own weaknesses, strengths, and resources, so as to get the job done, efficiently.

Security Analysts (SA) are the chosen specialists for the task of assessing the digital defenses of a given network. They do this by running Penetration Testing and Vulnerability Assessments, which help to simulate various methods of infiltration, safely and productively. Like running dyed water through a system of pipes to determine where a leak is coming from, and then finding ways to “plug the holes”. The tools that they use to do this job are varied, and often are unique to a given team of Analysts. Such as the Leahy Center’s own Security Analysis team. Let’s hear from one of them, now…

Testimony

From Nicholas Jones:

I am a Security Operations Center (SOC) Analyst for the Leahy Center of Digital Forensics & Cybersecurity. We focus on security information aspects of the Leahy Center, and we monitor online security for a few small clients. In terms of equipment, computers are our best friends. There aren’t  any distinct pieces of equipment that I am allowed to talk about, however, I can say that we use a System Information & Event Management (SIEM) structure to monitor and investigate online activity in the Leahy Center, and in clients’ networks.

I became a security analyst at the Leahy Center to gain real world experience, and learn from analysts with much more experience and knowledge than myself. I entered the field of cyber security because I think it is one of the coolest niches you can go into. The cyber world is constantly evolving, and thus there is always something new to learn, every day, even for the most experienced cyber defenders out there. I knew coming into this field that I was setting myself up with future job security, and (hopefully) financial freedom, because when you work in cybersecurity: there is always something new to work on.

.

The job of a Security Analyst (and any cybersecurity specialist) is never done and never in low demand. As with all times and places: when an object is possessed by someone, there’s always someone else aiming to take it from them. In this modern age, the only novelty is that the “object” is information, that the vaults and safes are found on digital networks, and that the consequences of a security-breach are more dire than ever. So, take care to invest in a good Security Analysis team, if you need one, or better yet: hire ours. We’re always ready to help.

Stay up to date with Twitter, Instagram, Facebook, and LinkedIn so you always know what we’re up to!

Written by James Kallenbrum ‘23  // Professional Writing

More Student Experience
Testimonies from the IT Engineers Part Five
Testimonies from the IT Engineers Part Four
Testimonies from the Leahy Center Security Analysts Part Four