Thycotic Telephone Number +1-202-802-9399 (US)
The Lockdown

Thycotic’s Cyber Security Blog

Cyber Security Awareness Month: The Internet Wants YOU! Consider a Career in Cyber Security

Written by Joseph Carson

October 19th, 2017

Cyber security is no longer just a technology challenge. It’s a challenge for everyone who uses and interacts with technology daily.  The protection and security of both your work and personal life are no longer separate—they are thoroughly intertwined thanks to the evolving trends of social networks, the internet of things, and unlimited connectivity.  Cyber security is no longer solely the responsibility of the company IT department; it is now the responsibility of every employee in the company, not just to protect your work assets but your personal data as well.

We need more people to join us in the fight against cyber-crime

An increase in cyber-crime paired with a major global shortage in cyber security professionals amounts to this: we need more people to join us in the fight against cyber-crime.

You don’t need an in-depth technical and security background. There is a clear need for the cyber security industry to bridge the gap between people and technology. Because of this we are seeing more people joining the industry with backgrounds in social services, psychology, behavior and communication experience. The time has come to take a people-centric approach to cyber security. This opens the doors to a broader spectrum of employment seekers who are now able to consider a career in cyber security. Join us in the fight against cybercrime and make the world a safer place for you, your family and your workplace.

Read more about people-centric cyber security and our experience at Black Hat 2017 >

I would like a job in cyber security. Why should I choose Thycotic?

Our Chief Security Scientist, Joseph Carson, explains why choosing Thycotic as your entry point to a career in cyber security is a very rewarding option.

Joseph Carson, ThycoticJoseph Carson is a cyber security professional and ethical hacker with more than 25 years’ experience in enterprise security specializing in blockchain, endpoint security, network security, application security & virtualization, access controls and privileged account management. Joseph is a Certified Information Systems Security Professional (CISSP), active member of the cyber security community frequently speaking at cyber security conferences globally, often being quoted and contributing to global cyber security publications. He is a cyber security advisor to several governments, critical infrastructure, financial, transportation and maritime industries. Joseph is regularly sharing his knowledge and experience giving workshops on vulnerabilities assessments, patch management best practices, the evolving cyber security perimeter and the EU General Data Protection Regulation. Joseph serves as Chief Security Scientist at Thycotic and author of Privileged Account Management for Dummies.

THYCOTIC’S CORE VALUES ALL COME BACK TO PEOPLE, AND THEIR WELL-BEING

We believe in our people. When you have passionate, intelligent thought leaders all working together, it allows for synergy and excitement. We care about solutions. As a company, our core focus is on privilege access management. All our efforts and passion are to make sure we are the most experienced and knowledgeable in what we do. As a global leader, we protect against one of the most targeted and compromised areas in the industry, and we need to be sure what we offer provides this. We ensure ease of use. There can no longer be software that takes months to install, is complicated to integrate and hard to use. Threats evolve quickly and sometimes software cannot keep up. What we do provides companies with an easy installation, ease of use, and ability to effortlessly integrate. This way, companies may advance and evolve quickly to address evolving new threats. I help with security research to ensure our knowledge and vision in the security industry is making a difference and adding value for our customers.

THYCOTIC PROTECTS 1,000s OF ORGANIZATIONS, AND WE MAKE IT SIMPLE

Today, privileged passwords and privileged accounts are the primary targets of hackers. Thycotic secures passwords, protects privileged accounts and controls access. And we make it simple and easy to manage for IT admins and security staff. Our software is highly adaptable and scalable as well as the least intrusive, and is readily accepted by all users. The way we created our solutions makes it easy for large organizations to meet compliance. Thycotic solutions assure the protection and control of organizations’ privileged accounts while being the fastest to deploy, easiest to use, and a scalable solution. We also automate security without requiring training or consulting.

RESEARCH IS VERY IMPORTANT TO THYCOTIC

We don’t just sell software; we are strategic advisors to companies through our innovation and research. We know we have great technology, but we don’t stop there. We’ve become an educator in the market. We do this through building relationships and helping guide and navigate companies in areas that are strategic to their business. I am passionate about this, and as a result our research papers address all the key concerns and challenges of security leaders.

THYCOTIC STAYS ON TOP OF INDUSTRY TRENDS

I attend many worldwide events and conferences as an industry expert. I focus on guidance and sharing knowledge with attendees because I believe educating is one of the most valuable things we can do. Combined with industry research, attending and participating in conferences allows me the opportunity to track and discuss trends with my peers.

I’ve witnessed a significant change to the traditional security perimeter. Early on, ‘castle walls’ were the main defense, and we worked increasingly harder to build them bigger, with more layers. We added moats and different types of detection. But the threat landscape has now changed and technology has advanced. The perimeter is no longer the castle walls as every employee is now a data connection with the potential to leak data, or fall victim to attackers who use them to penetrate the network. Digital transformation has made a significant impact on the way security protects an organization, and unique digital identities have now become the new security perimeter.

Video:  I travel to Abu Dhabi to speak at a cyber security conference and pick some apples along the way! That’s just life as a cyber security professional.

THYCOTIC CONTINUES TO GROW AND GROW

We have been through an amazing transition this past year. We’ve invested heavily into international business. We went from one international employee to almost forty. We also work hard to make sure we strengthen our strategic alliances with the channel. We to empower our partners so they can become voices for Thycotic. We are constantly innovating our technology, and continue to grow and add more functionality to our solution. One way we do this is through acquisitions of other companies that complement our technology. We believe it is important to continually look at high value technologies to add more value to our core mission.

Check out Joseph’s Podcast with Douglas Brush on www.cybersecurityinterviews.com

Douglas Brush Podcast with Thycotic's Joseph Carson. We need a people-centric approach to cyber securitySo, do you want a job in cyber security?

Cyber security is an exciting, fast-paced environment with continuously new challenges and opportunities.  It’s never too late to launch a career in cyber security, and Thycotic’s the place to start your journey.

Check out our open positions now. We offer positions in Washington, DC, nationally and internationally.Join Our Team - Thycotic is Hiring!

JOIN OUR MAILING LIST

Get updates, free resources and in-depth how-to's

 

Like this post?

Get our top blog posts delivered to your inbox once a month.

SHARE THIS


The following two tabs change content below.

Joseph Carson

Joseph Carson has over 25 years' experience in enterprise security, is the author of "Privileged Account Management for Dummies" and "Cybersecurity for Dummies", and is a cyber security professional and ethical hacker. Joseph is a cyber security advisor to several governments, critical infrastructure, financial and transportation industries, speaking at conferences globally. Joseph serves as the Chief Security Scientist at Thycotic.