0% found this document useful (0 votes)
31 views3 pages

Specilization Choice

1. The document discusses the author's choice to specialize in the blue team area of cybersecurity for their semester. Specifically, they are interested in network/system monitoring and malware detection. 2. The author enjoyed their previous work as a cybersecurity consultant conducting security assessments and advising on security solutions. For their semester, they want to focus on tools for network/system monitoring like Nagios, Elasticsearch, and Suricata. 3. The author also wants to specialize in malware detection and response using endpoint detection tools like Cisco Advanced Malware Protection, Cortex XDR, and FortiEDR. They view specialization as an opportunity to gain expertise in a focused area through continuous learning.

Uploaded by

alex.dobrev.bg
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views3 pages

Specilization Choice

1. The document discusses the author's choice to specialize in the blue team area of cybersecurity for their semester. Specifically, they are interested in network/system monitoring and malware detection. 2. The author enjoyed their previous work as a cybersecurity consultant conducting security assessments and advising on security solutions. For their semester, they want to focus on tools for network/system monitoring like Nagios, Elasticsearch, and Suricata. 3. The author also wants to specialize in malware detection and response using endpoint detection tools like Cisco Advanced Malware Protection, Cortex XDR, and FortiEDR. They view specialization as an opportunity to gain expertise in a focused area through continuous learning.

Uploaded by

alex.dobrev.bg
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Specialization choice

1. Introduction
Throughout this whole semester, l would like to specialize in the blue team side in the cyber
security. By focusing on a specific area of cybersecurity, l can develop deep expertise and
become a go-to expert in that field. Certainly, l have my reasons for that and the first of them is
that during my education l have been really focused on the blue team, which l really enjoy.
There are many different areas of specialization within the blue team, including incident
response, threat intelligence, vulnerability management, and network security.
One of the most compelling reasons to join a specialization within the blue team is the
opportunity to become an expert. By dedicating myself to a specific area of cybersecurity, l can
become highly knowledgeable and skilled in that field, and this expertise can be highly valued
by. Being recognized as an expert can provide me a sense of accomplishment and pride, and
also lead to career growth opportunities.
Another motivating factor is the continuous learning and development that comes with
specializing within the blue team. Cybersecurity is a rapidly evolving field, and by focusing on a
specific area, l will have the opportunity to stay up-to-date with the latest trends and techniques.
This means that l will be continuously learning and developing your skills, which can be highly
motivating for me because l enjoy intellectual challenges.
As l mentioned above being blue teamer is very general and unspecific thing, so this means that
it has a plenty of opportunities to choose from. During my last summer, l worked in Bulgaria as a
cyber security consultant. My tasks there were:
1. Conduct security assessments and audits to identify vulnerabilities and risks in an
organization's digital infrastructure.
2. Develop and implement security policies, procedures, and controls to protect against
cyber threats.
3. Advise on security architecture and design to ensure that digital systems are secure by
default.
4. Recommend and implement security solutions, such as firewalls, intrusion detection and
prevention systems, and encryption tools.
For this semester, l would to really dive deep into the network/system monitoring and malware
detection. For example, l would be definitely interested in career as Security analyst. l have read
a lot of things and Security analysts play a critical role in helping organizations protect
themselves against a wide range of threats, including cyber-attacks, physical security breaches,
and other forms of malicious activity. By analyzing security risks and implementing effective
countermeasures, security analysts help ensure that businesses and other organizations can
operate safely and securely.
Moreover, security analysts are in high demand in today's job market. With the increasing
frequency and sophistication of cyber-attacks, companies are investing more heavily in
cybersecurity, which has led to a growing need for skilled security analysts. Security analysts
are constantly challenged to stay ahead of the latest threats and to develop innovative solutions
to protect against them. By working in this field, l can make a real difference in the world by
helping to safeguard critical infrastructure, sensitive information, and other valuable assets.
Another career in my future that l would be interested will be as malware analysis. Malware
detection is a critical component of cybersecurity. Malware is a type of malicious software that
can be used to steal sensitive information, damage computer systems, and even disrupt critical
infrastructure. As a malware detection expert, l would play a key role in identifying and
preventing these types of attacks, helping to keep individuals and organizations safe.
Moreover, malware detection is a constantly evolving field, with new types of malware emerging
all the time. This means that there is always something new to learn and discover, making it an
intellectually stimulating and challenging career path. As a malware detection expert, l would
need to stay up-to-date on the latest threats and techniques for detecting them, which requires
ongoing education and professional development.

2. Personal wishes
Monitoring is something that l have a experience in my previous semester and l have some
knowledge some about some tools. l really would like to research, explore and test more tools
about network/system monitoring. l have already looked at possible tools that l really would like
to try:

No experience Experience
Network Performance Monitor Nagios
ipMonitor Elasticsearch
PRTG Kibana
ManageEngine OpManager Suricata
NetFlow Traffic Analyzer Zeek
CyberChef
Logstash

Moreover, l could also do monitoring in cloud for AWS or Azure. To be honest, l would prefer to
do it in AWS due to l have more experience in this cloud. That could be also my individual
project instead of doing it for my specialization.
Talking about the malware detection, l would really love to dive deep into the endpoint detection
and response edr. l have made some research about the tools and probably will find some more
in later stage. For now the tools that think of are:

 Cisco Advanced Malware Protection


 Cortex XDR
 Cynet 360
 FortiEDR
 Huntress
 SanerNow
To conclude, l really like to research and think about things that l could learn in specific
semester. The freedom to have your own goals in semester is really important for me. l think l
have some pretty decent aims for this semester and l will try my best to achieve them in any
way. Certainly, l might not be able to finish some of them, but it is really crucial to learn as much
as possible.

You might also like