Page 60 - Cyber Defense eMagazine - October 2017
P. 60

Note to HR: InfoSec Applicants are not Necessarily Mainstream
               Ode to the InfoSec Personnel Paradigm Shift

               by DRP; Cybersecurity Lab Engineer


               They say the only constant is change. This is exceptionally applicable to the IT area and
               personnel at this junction. This is representative of the new workforce as they change
               with the times. The implementation of technology at early ages has had a distinct force
               on the latest group of employees and potential employees. The new workforce has new
               motivations, focus, and level of documentation sophistication. This new set of workforce
               is clearly not the same as prior generations.

               With  this  change  has  also  brought  challenges  to  the  Human  Resources  area  of
               business  operations.  There  is  a  distinct  lack  of  personnel  in  InfoSec.  The  HR
               Department is tasked with adding persons to the IT and InfoSec Departments, yet there
               is  a  limited  number  of  personnel.  This  is  due  to  a  number  of  drivers  at  this  time,
               including  the  number  of  University  and  College  programs,  availability  of  training
               programs, etc. The personnel moving into these positions, backfilling others who have
               left due to retirement or lateral movements, are from a new generation which are vastly
               different than the prior ones.

               Next Generation for InfoSec Staffing

               The new source for staffing IT have their own manner of carrying themselves. With this
               change  of  focus  and  other  attributes,  there  are  new  behaviors  which  naturally  follow
               this.

               InfoSec adds an entirely new layer of complexity to the vetting and hiring process. The
               HR  staff  have  not  yet  gained  an  appreciation  for  this  new  focus.  To  further  the
               complexity, the average InfoSec member is not like the mainstream IT person.

               We  tend  to  be  a  bit  more  curious  than  the  other  mainstream  IT  personnel.  We  are
               always looking at the environment and thinking about this, connections within this, and
               other attributes. This is not simply taken for granted. We look at a process, dissecting it
               and analyzing how the pieces work together. We don’t think the app or process is fine.
               There certainly may be better ways for this to process the material or data, and we think
               about how this is so. The InfoSec person may look at what it is also connected and look
               for a data flow process diagrams.

               The InfoSec staff member tends to be suspicious. The person may look for the loose
               string to pull, waiting for the remainder of the garment to unravel. Seemingly this is not
               applicable or a benefit to InfoSec. This actually is beneficial in that the InfoSec person
               does not simply look at the entirety of a project, app, or module to review or test and
               state this is fine. The qualified, motivated person will look for a vulnerability. Once this is
               found, by extension the person will continue to look for further issues associated with
               this, until the issue is tracked all the way until there is not an issue noted. Once there
               are no further areas to review, the effort will slow down.
                    60   Cyber Defense eMagazine – October 2017 Edition
                         Copyright © Cyber Defense Magazine,  All rights reserved worldwide.
   55   56   57   58   59   60   61   62   63   64   65