Cyber Careers #4 - Network Analyst

Cyber Careers #4 - Network Analyst


Continuing our series exploring various cybersecurity careers. This is a project I have recently started in hopes that it will help those who want to enter the #cyber field, or grow in their current cyber careers. It's interesting to see what other people do, what path they've taken to get there, and where they want to go next.

Name? Hoyt Page, Colorado Springs, Colorado

JOB

Who do you work for? The Broadmoor Hotel

Your job title? Network Analyst

How many years have you worked in cybersecurity? 5 years

The Broadmoor Hotel

What do you do in your job? Monitor and analyze network traffic. Monitor firewall logs and traffic flows. Investigate machines that are speaking louder than they should. Configure and deploy new networking equipment. Configure and analyze Access Control Lists (ACLs). Look at new vulnerabilities and determine if any apply to us. Mitigate risk as best we can.

Update, in response to questions received: I can't speak for all NOCs, aside from the ones where I've worked. including The Broadmoor. We have our main team there between 7-6pm Monday through Friday, and then we have our on-call personnel, but all Engineers are required to be available 24/7 by phone. I always have my laptop with me and a hotspot. We stay pretty diversified as a hotel, but our IT team is 80% Male 20% female. I work with network access control lists because I'm the network guy, but any large environment should have ADDS implemented for best practice. Yes, I've been introduced to SIEMS. The Broadmoor handles everyday guests, to presidents and high officials, as well as celebrities to overseas princes and princesses. Our security is more than you could ever imagine. As for training, what our department heads determine will be beneficial to us. we go to; otherwise, they'll send me anywhere I want to go for training.

What do you like most about your job? My team! I work with incredible talent and everyone strives to make everyone else better along the way.

Least? Not enough time in the day.

What work did you do prior to this position? Network Engineering for Colorado Springs City Government.

What do you see as your next step? Continue my education and hone in my skills.

Salary range for your position? Varies on experience like everything, but I see positions as Network Analyst go from 40K-90K.

EDUCATION & GROWTH

Degree? Yes, AS in Programming and Mathematics & working on BS in Cybersecurity.

Certifications? A+, Net+, CCENT, Sec+, CEH, ITILv3, CIW Web Security Associate

What do you do to stay up-to-date or grow in cyber? Follow multiple websites. Follow other cybersecurity personnel on LinkedIn. Study and research.

Favorite cyber news source and/or podcast? Hacker News

ANYTHING ELSE/OTHER COMMENTS

No alt text provided for this image

 I cannot emphasize how important my team is. We all come from different backgrounds, but we all have an expertise in a following area and not only rely on one another, but we challenge each other and constantly scrutinize our work for the better.

Pushkar Sane

Sr. Security Engineer | CCSP @Bloomberg

5 年

Karen Tulloh PMP, CISSP, CISM Just came across this brilliant series. Please keep up the great work. The day-to-day work and salary range are great additions since it's difficult to find these at other places.

回复
Joseph Khan

Student at Massachusetts Institute of Technology

5 年

Cybers have been following me as I travel aboard rail outside of Pismo Beach CA using. Software modified through the window of the Amtrak Railcar June 6 ,2019. Been after my Pin number for days ,, using google tracking api and GPS Bluetooth low level bi-directional communication!!! J.Khan.....

回复
Joseph Khan

Student at Massachusetts Institute of Technology

5 年

Discovered cybersecurity , breech contact me only by paper pen and United States Postal Service !!!!!!

J. R. Rossman

Unstoppable Learner, Manager, Resilient, Calm Under Pressure, Solution Goalie, ,U S Veteran,

5 年

I have questions - does the NOCs - Network Operations Centers which he has worked in: are there three eight- hour shifts or two twelve-hour shifts? How diversified is his area: males to females? Access Control Lists - would that be for network access only? Would Active Directory be used? Has he been introduced to any SIEMS equipment/training? "Mitigate risk as best we can." - What kind of training does he get or what incident response training to be exact?

回复

Karen Tulloh PMP, CISSP, CISM Thank you for sharing these Cyber Career profiles! They’re a great help to those who want to learn more about cyber career paths.

要查看或添加评论,请登录

社区洞察

其他会员也浏览了