cybersecurity career lifecycle™ - issa-coscscl descriptions 5 •pre‐professional—has not yet...
TRANSCRIPT
![Page 1: Cybersecurity Career Lifecycle™ - ISSA-COSCSCL Descriptions 5 •Pre‐Professional—has not yet (and never has) obtained a position working in the cybersecurity field. •Entry—yet](https://reader033.vdocument.in/reader033/viewer/2022060906/60a0eff887cf783264595617/html5/thumbnails/1.jpg)
Cybersecurity Career Lifecycle™
![Page 2: Cybersecurity Career Lifecycle™ - ISSA-COSCSCL Descriptions 5 •Pre‐Professional—has not yet (and never has) obtained a position working in the cybersecurity field. •Entry—yet](https://reader033.vdocument.in/reader033/viewer/2022060906/60a0eff887cf783264595617/html5/thumbnails/2.jpg)
2
Program Overview
KSA Review
ISSA Program Offerings
What can ISSA do for you?
Agenda
![Page 3: Cybersecurity Career Lifecycle™ - ISSA-COSCSCL Descriptions 5 •Pre‐Professional—has not yet (and never has) obtained a position working in the cybersecurity field. •Entry—yet](https://reader033.vdocument.in/reader033/viewer/2022060906/60a0eff887cf783264595617/html5/thumbnails/3.jpg)
Cybersecurity Career Lifecycle™
3
The CSCL is a systematic approach that: Enables professionals to discover the areas of
weakness in their skill sets and aptitudes Defines personalized career map according to the
individuals knowledge, skills, aptitudes and interest Provides guidance, resources, and a support system
to achieve skills and career goals
![Page 4: Cybersecurity Career Lifecycle™ - ISSA-COSCSCL Descriptions 5 •Pre‐Professional—has not yet (and never has) obtained a position working in the cybersecurity field. •Entry—yet](https://reader033.vdocument.in/reader033/viewer/2022060906/60a0eff887cf783264595617/html5/thumbnails/4.jpg)
The Five Lifecycle Stages
4
![Page 5: Cybersecurity Career Lifecycle™ - ISSA-COSCSCL Descriptions 5 •Pre‐Professional—has not yet (and never has) obtained a position working in the cybersecurity field. •Entry—yet](https://reader033.vdocument.in/reader033/viewer/2022060906/60a0eff887cf783264595617/html5/thumbnails/5.jpg)
CSCL Descriptions
5
•Pre‐Professional—has not yet (and never has) obtained a position working in the cybersecurity field. •Entry—yet to master general cybersecurity methodologies & principles•Mid‐Career—mastered general of security methodologies & principles and have determined their area of focus or specialty•Senior—extensive experience in cybersecurity and has been in the profession for 10+ years•Security Leader—extensive security experience, ability to direct and integrate security into an organization
![Page 6: Cybersecurity Career Lifecycle™ - ISSA-COSCSCL Descriptions 5 •Pre‐Professional—has not yet (and never has) obtained a position working in the cybersecurity field. •Entry—yet](https://reader033.vdocument.in/reader033/viewer/2022060906/60a0eff887cf783264595617/html5/thumbnails/6.jpg)
Cybersecurity Career Lifecycle™Components
6
![Page 7: Cybersecurity Career Lifecycle™ - ISSA-COSCSCL Descriptions 5 •Pre‐Professional—has not yet (and never has) obtained a position working in the cybersecurity field. •Entry—yet](https://reader033.vdocument.in/reader033/viewer/2022060906/60a0eff887cf783264595617/html5/thumbnails/7.jpg)
Pre-Professional KSAs
7
Asks ? & ListenAsks ? & Listen AptitudeDesire to
learnDesire to learn
Basic Computer Knowledge
Basic Computer Knowledge
KnowledgeBasic
search & research
Basic search & research
Volunteer or
Internship
Volunteer or
InternshipSkillsDisciplined
or focusedDisciplined or focused
![Page 8: Cybersecurity Career Lifecycle™ - ISSA-COSCSCL Descriptions 5 •Pre‐Professional—has not yet (and never has) obtained a position working in the cybersecurity field. •Entry—yet](https://reader033.vdocument.in/reader033/viewer/2022060906/60a0eff887cf783264595617/html5/thumbnails/8.jpg)
Entry Level KSAs
8
Detail orientedDetail
oriented AptitudeDesire to learn
Desire to learn
Basic networking
and programming
Basic networking
and programming
Knowledge Fundamentals of Security
Fundamentals of Security
Problem solvingProblem solving Skills
People skillsPeople skills
![Page 9: Cybersecurity Career Lifecycle™ - ISSA-COSCSCL Descriptions 5 •Pre‐Professional—has not yet (and never has) obtained a position working in the cybersecurity field. •Entry—yet](https://reader033.vdocument.in/reader033/viewer/2022060906/60a0eff887cf783264595617/html5/thumbnails/9.jpg)
Mid-Career KSAs
9
ObjectivityObjectivity AptitudeDesire to learn
Desire to learn
Strong Security MethodologiesStrong Security MethodologiesKnowledge Business
BasicsBusiness Basics
Problem solvingProblem solving SkillsTeam
BuildingTeam
Building
![Page 10: Cybersecurity Career Lifecycle™ - ISSA-COSCSCL Descriptions 5 •Pre‐Professional—has not yet (and never has) obtained a position working in the cybersecurity field. •Entry—yet](https://reader033.vdocument.in/reader033/viewer/2022060906/60a0eff887cf783264595617/html5/thumbnails/10.jpg)
Senior Level KSAs
10
ProfessionalismProfessionalism AptitudeDesire to learn
Desire to learn
Master Security MethodologiesMaster Security MethodologiesKnowledge Business
PracticesBusiness Practices
Team Leadership
Team Leadership SkillsCommunicationCommunication
![Page 11: Cybersecurity Career Lifecycle™ - ISSA-COSCSCL Descriptions 5 •Pre‐Professional—has not yet (and never has) obtained a position working in the cybersecurity field. •Entry—yet](https://reader033.vdocument.in/reader033/viewer/2022060906/60a0eff887cf783264595617/html5/thumbnails/11.jpg)
Security Leader KSAs
11
InnovatorInnovator AptitudeDriverDriver
Master Security & Business Practices
Master Security & Business Practices
KnowledgeMultiple security disciplines
Multiple security disciplines
LeadershipLeadership Skills
Translation of
technology & business
Translation of
technology & business
![Page 12: Cybersecurity Career Lifecycle™ - ISSA-COSCSCL Descriptions 5 •Pre‐Professional—has not yet (and never has) obtained a position working in the cybersecurity field. •Entry—yet](https://reader033.vdocument.in/reader033/viewer/2022060906/60a0eff887cf783264595617/html5/thumbnails/12.jpg)
Get Involved!
12
ISSA-COS—Tim Hoffman
For more information on the Cybersecurity Career Lifecycle, visit https://www.issa.org/?page=CSCL
Send suggestions for new services and offerings to support the your phase of the lifecycle to [email protected]
Contact Leah Lewis at [email protected] with any questions regarding services offered to our members