CompanyConfidentialInformationsecurity AnalystCandidate shouldhave deepknowledge aboutsecurity system, howto montor and trackproblem ,provideproper report ofmontoring andtracking solution tocompliance managerof a company$66,623 peryearUniversity degree inEngineering andComputer ScienceSomeexperienceneededCanadian NuclearLaboratoriesMaterialsresearch scientistCandidate mustknow how toresearch goodmaterial ,must havepractice to makemodels of damagematerial, must haveknowledge how toprepare technicalreports and peopleviews.69,800.00 -105,700.00 $/yearMust done PhD inPhysical science andengineering from auniversity of recognizedstanding7 YearsWebsdepottechnologyPartners Inc.Helpdesk AnalystITsupportCandidate should beconfident to acceptchallenges , must35,000.00 -45,000.

College diploma Experienced(Non-COMP 552Introduction to CybersecurityPage 1 of 4Lab Report 2: Career ExplorationDue Date: By 11:59 p.m. the day of your labSubmission Method: Dropbox (“Lab 2 – Career Exploration” folder)Submitted by: Gulshanpreet kaur PannuStudent ID: 10195786Section: 03Date submitted: 01/23/2018Instructor submitted to: Robert French or Darren GethondRubricReport Format (content is well organized by section) /2Content (relevant ideas are presented and cited accurately) /6References (cited research sources are listed in APA format) /2Cover Page (content is missing, inaccurate, or incomplete) /-1Total /10COMP 552Introduction to CybersecurityPage 2 of 4Introduction:The purpose of this activity is to explore careers in computer security in Canada to betterunderstand the educational requirements and income potential for jobs in this dynamic field.Activities:Research online career sites in Canada (e.g., monster.ca, careerbuilder.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

ca, indeed.ca,jobbank.gc.ca, etc.) for computer security positions. What training and certifications areemployers asking for? What income can you earn in these positions? Summarize your findingsin your own words using the table below. Complete at least three entries.

Wireless Technology and Computer Security Positions in CanadaEmployer(include hyperlink to jobposting)Job Title Job Description(in your own words)StartingSalary ($)Educational Requirements Years ofExperienceNeededCompanyConfidentialInformationsecurity AnalystCandidate shouldhave deepknowledge aboutsecurity system, howto montor and trackproblem ,provideproper report ofmontoring andtracking solution tocompliance managerof a company$66,623 peryearUniversity degree inEngineering andComputer ScienceSomeexperienceneededCanadian NuclearLaboratoriesMaterialsresearch scientistCandidate mustknow how toresearch goodmaterial ,must havepractice to makemodels of damagematerial, must haveknowledge how toprepare technicalreports and peopleviews.69,800.00 -105,700.00 $/yearMust done PhD inPhysical science andengineering from auniversity of recognizedstanding7 YearsWebsdepottechnologyPartners Inc.Helpdesk AnalystITsupportCandidate should beconfident to acceptchallenges , must35,000.00 -45,000.

College diploma Experienced(Non-COMP 552Introduction to Cybersecurityhave excellentcommunication skillsand must have allknowledge about ITtechnologies and itsprinciples, mustknow how to solvetroubleshootproblem on internet00 $/yearManager)Discussion:Answer the question below in the space provided in five to seven sentences.Based on your research and the following online resources, what actions must you take toprepare yourself for a career in computer security? Cite and reference your response usingAmerican Psychological Association (APA) format (this is already done for you in this lab).• http://www.computerworld.com/article/2603927/security0/how-to-get-a-job-in-computersecurity.

html• https://www.infosecurity-magazine.com/news/how-to-prepare-for-a-cybersecurity/• https://www.lifewire.com/and-a-cybersecurity-job-2487279• http://www.

cyberdegrees.org/resources/transitioning-from-general-it/Answer question here.1.

Must have skills related to security so that company give them a job training and havecertificate and show your talent.2. Make good professional relationship with employee of the company3. Find ways to learn more professional skills4. Show yourself and give your best in your presentations and try to take attention ofseniors or manager of that specific company.

5. It is compulsory to take permission from senior to use restricted sites.(Cyber Degrees, n.d.; O’Donnell, 2016; Seals, 2014; Winkler, 2014)Conclusion:I learnt that to start career in Computer field first take training in IT such as to learn aboutoperating system and so on. Gain more experience. Gain more practical skills as you can gainPage 3 of 4COMP 552Introduction to CybersecurityPage 4 of 4like student can do work on Programming as he or she can do.

Must respect and obey the rulesof company.In the space below, explain in two to three sentences what you have learned from this activity.Provide conclusion here.First know about the requirements of company before starting career in that company. It isnot possible to become perfect in each field of IT so student must have to make focus on oneparticular sector.

References (list research sources cited in lab alphabetically in APA format – already completed):Cyber Degrees. (n.d.).

Transitioning from General IT to Cyber Security. Retrieved fromhttp://www.cyberdegrees.

org/resources/transitioning-from-general-it/O’Donnell, A. (2016). 5 Tips to Help You Land a Cybersecurity Job. Retrieved fromhttps://www.lifewire.com/and-a-cybersecurity-job-2487279Seals, T. (2014).

How to Prepare for a Cybersecurity Career. Retrieved fromhttps://www.infosecurity-magazine.com/news/how-to-prepare-for-a-cybersecurity/Winkler, I. (2014).

How to get a job in computer security. Retrieved from http://www.computerworld.com/article/2603927/security0/how-to-get-a-job-incomputer-security.htmlPlease refer to the following online resources to help you with APA Citing and Referencing:• Purdue Online Writing Lab (OWL): https://owl.english.purdue.edu/owl/resource/560/01/• Citing and Referencing document in “Additional Resources” folder in D2L• YouTube Videos