Company
Confidential
Information
security Analyst
Candidate should
have deep
knowledge about
security system, how
to montor and track
problem ,provide
proper report of
montoring and
tracking solution to
compliance manager
of a company
$66,62
3 per
year
University degree in
Engineering and
Computer Science
Some
experien
ce
needed
Canadian Nuclear
Laboratories
Materials
research scientist
Candidate must
know how to
research good
material ,must have
practice to make
models of damage
material, must have
knowledge how to
prepare technical
reports and people
views.
69,800.
00 –
105,70
0.00 $
/year
Must done PhD in
Physical science and
engineering from a
university of recognized
standing
7 Years
Websdepot
technology
Partners Inc.
Helpdesk AnalystIT
support
Candidate should be
confident to accept
challenges , must
35,000.
00 –
45,000.
College diploma Experien
ced
(Non-COMP 552
Introduction to Cybersecurity
Page 1 of 4
Lab Report 2: Career Exploration
Due Date: By 11:59 p.m. the day of your lab
Submission Method: Dropbox (“Lab 2 – Career Exploration” folder)
Submitted by: Gulshanpreet kaur Pannu
Student ID: 10195786
Section: 03
Date submitted: 01/23/2018
Instructor submitted to: Robert French or Darren Gethond
Rubric
Report Format (content is well organized by section) /2
Content (relevant ideas are presented and cited accurately) /6
References (cited research sources are listed in APA format) /2
Cover Page (content is missing, inaccurate, or incomplete) /-1
Total /10
COMP 552
Introduction to Cybersecurity
Page 2 of 4
Introduction:
The purpose of this activity is to explore careers in computer security in Canada to better
understand the educational requirements and income potential for jobs in this dynamic field.
Activities:
Research online career sites in Canada (e.g., monster.ca, careerbuilder.ca, indeed.ca,
jobbank.gc.ca, etc.) for computer security positions. What training and certifications are
employers asking for? What income can you earn in these positions? Summarize your findings
in your own words using the table below. Complete at least three entries.
Wireless Technology and Computer Security Positions in Canada
Employer
(include hyperlink to job
posting)
Job Title Job Description
(in your own words)
Starting
Salary ($)
Educational Requirements Years of
Experience
Needed
Company
Confidential
Information
security Analyst
Candidate should
have deep
knowledge about
security system, how
to montor and track
problem ,provide
proper report of
montoring and
tracking solution to
compliance manager
of a company
$66,62
3 per
year
University degree in
Engineering and
Computer Science
Some
experien
ce
needed
Canadian Nuclear
Laboratories
Materials
research scientist
Candidate must
know how to
research good
material ,must have
practice to make
models of damage
material, must have
knowledge how to
prepare technical
reports and people
views.
69,800.
00 –
105,70
0.00 $
/year
Must done PhD in
Physical science and
engineering from a
university of recognized
standing
7 Years
Websdepot
technology
Partners Inc.
Helpdesk AnalystIT
support
Candidate should be
confident to accept
challenges , must
35,000.
00 –
45,000.
College diploma Experien
ced
(Non-
COMP 552
Introduction to Cybersecurity
have excellent
communication skills
and must have all
knowledge about IT
technologies and its
principles, must
know how to solve
troubleshoot
problem on internet
00 $
/year
Manage
r)
Discussion:
Answer the question below in the space provided in five to seven sentences.
Based on your research and the following online resources, what actions must you take to
prepare yourself for a career in computer security? Cite and reference your response using
American Psychological Association (APA) format (this is already done for you in this lab).
• http://www.computerworld.com/article/2603927/security0/how-to-get-a-job-in-computersecurity.html
• https://www.infosecurity-magazine.com/news/how-to-prepare-for-a-cybersecurity/
• https://www.lifewire.com/and-a-cybersecurity-job-2487279
• http://www.cyberdegrees.org/resources/transitioning-from-general-it/
Answer question here.
1. Must have skills related to security so that company give them a job training and have
certificate and show your talent.
2. Make good professional relationship with employee of the company
3. Find ways to learn more professional skills
4. Show yourself and give your best in your presentations and try to take attention of
seniors or manager of that specific company.
5. It is compulsory to take permission from senior to use restricted sites.
(Cyber Degrees, n.d.; O’Donnell, 2016; Seals, 2014; Winkler, 2014)
Conclusion:
I learnt that to start career in Computer field first take training in IT such as to learn about
operating system and so on. Gain more experience. Gain more practical skills as you can gain
Page 3 of 4
COMP 552
Introduction to Cybersecurity
Page 4 of 4
like student can do work on Programming as he or she can do.Must respect and obey the rules
of company.
In the space below, explain in two to three sentences what you have learned from this activity.
Provide conclusion here.
First know about the requirements of company before starting career in that company. It is
not possible to become perfect in each field of IT so student must have to make focus on one
particular sector.
References (list research sources cited in lab alphabetically in APA format – already completed):
Cyber Degrees. (n.d.). Transitioning from General IT to Cyber Security. Retrieved from
http://www.cyberdegrees.org/resources/transitioning-from-general-it/
O’Donnell, A. (2016). 5 Tips to Help You Land a Cybersecurity Job. Retrieved from
https://www.lifewire.com/and-a-cybersecurity-job-2487279
Seals, T. (2014). How to Prepare for a Cybersecurity Career. Retrieved from
https://www.infosecurity-magazine.com/news/how-to-prepare-for-a-cybersecurity/
Winkler, I. (2014). How to get a job in computer security. Retrieved from
http://www.computerworld.com/article/2603927/security0/how-to-get-a-job-in
computer-security.html
Please refer to the following online resources to help you with APA Citing and Referencing:
• Purdue Online Writing Lab (OWL): https://owl.english.purdue.edu/owl/resource/560/01/
• Citing and Referencing document in “Additional Resources” folder in D2L
• YouTube Videos