Cybersecurity engineers work in multiple capacities, similar to their IT systems engineer brethren. Within their role and function, cybersecurity engineers maintain the care and feeding of the cybersecurity tools they have deployed. Every cybersecurity tool deployed to fulfill the requirements of a cybersecurity program needs personnel to implement, maintain, manage, update, patch, upgrade, and generally manage supporting tools. This is the bulk of cybersecurity engineer roles and functions.
Solutions engineering is needed from a consulting, integrator, and value-added reseller perspective. Likewise, companies may need short- and long-term personnel to support their purchased cybersecurity tools. Staff augmentation and resident engineers will operate similarly to their corporate cybersecurity engineer brethren.
On the product side, vendors will need cybersecurity engineers with hardware and software design and development backgrounds to create the cybersecurity tools companies will purchase and deploy. There will be a heavy emphasis on software and hardware engineering, generally not present within other categories. These are far more in-depth roles and functions with breadth of knowledge and competency with specific technologies.
Additionally, ethical hacking and malware reverse engineering specialties are needed in government, corporate, commercial, and product categories. Some cybersecurity specialty roles and functions will fall under cybersecurity engineering.
The main purpose of this focus area is to develop a consistent, standardized perspective for skills relevant to cybersecurity engineers across government, corporate, commercial, and product role areas. Document core competencies and tasks common across types of cybersecurity engineers. Ensure competency areas and tasks are aligned with the NIST NICE Framework and Skills for the Information Age (SFIA). Expand on the NIST NICE Framework, where it falls short in overall competencies and relevance. Integrate the SFIA to provide a well-rounded view.
One part of conducting a capability assessment is developing the skills and capabilities of cybersecurity engineers. The contained competencies and tasks provide a consistent and standardized view of capability. The competencies provide input to cybersecurity capability assessments. A gap analysis is then generated to determine capability. The gap analysis and capability assessment inform cybersecurity strategy and the cybersecurity program’s target operating model for the training needed to mitigate gaps in capability.
Competency areas are broken down into areas of commonality that cybersecurity engineers would need to have as a standardized competency view. The common core competencies provide standardized competency areas consistent across types of cybersecurity engineer roles and functions.
Task areas are broken down into areas of commonality that cybersecurity engineers would be fulfilling as part of day-to-day work efforts. The core task areas provide standardized areas consistent with cybersecurity engineer roles and functions. Task areas may differ based on the cybersecurity engineer’s functions. Tasks are generalized to account for differences between types and allow flexibility.
Cybersecurity engineer types are divided into government, corporate, commercial, and product to differentiate core differences between those that consult and integrate with cybersecurity engineers that develop cybersecurity tools and technologies.
One of the critical elements of standardization around competencies and tasks is developing consistent job descriptions and titles. Currently, the variation and variety of job descriptions and titles in the cybersecurity engineer space are immense and inconsistent or not standardized. In addition, there are many odd variations, a lack of understanding of the roles and functions, a misunderstanding of necessary or needed skill sets, or a general misunderstanding of the differences between engineers and architects. Subsequently, this leads to confusion about what the role should be doing or encompass from a skill set perspective.
The skills, competencies, and tasks are presented in a manner that hiring managers can pull from to develop a consistent set of job descriptions. The premise presented here will help reduce job descriptions and title variations while producing more targeted and appropriate roles and functions within a cybersecurity program. As a result, companies across industry sectors can standardize their job descriptions, position titles, and position levels. Likewise, hiring managers can develop a skillset and competency view across their teams to define empirically where they have actual skillset shortages or deficiencies.
Government cybersecurity engineers work in government environments, implementing, maintaining, and managing cybersecurity technology stacks that are generally commercial (COTS) and government-off-the-shelf (GOTS) products. As a result, they span across cybersecurity domains, enterprise technologies (on-premises, cloud, hybrid), federal agencies, state agencies, county agencies, and DoD components. Government cybersecurity engineers will have a domain specialization. However, all cybersecurity engineers have core competencies, even if they specialize in a particular domain.
Niche competencies are noteworthy in identity and access management, application security, database security, and the Internet of Things (IoT), coinciding with industrial control systems (ICS), Industrial Internet of Things (IIoT), and operations technologies (OT).
The main difference here is security clearance requirements.
Roles and functions will follow the NIST NICE Framework.
Prime and subcontractors would fall more into this category.
Corporate cybersecurity engineers work in corporate environments, implementing, maintaining, and managing commercial-off-the-shelf (COTS) products. As a result, they span cybersecurity domains and enterprise technologies (on-premises, cloud, hybrid). Some cybersecurity engineers will have a domain specialization. However, all cybersecurity engineers have core competencies, even if they specialize in a particular domain.
Niche competencies are noteworthy in identity and access management, application security, database security, and the Internet of Things (IoT), coinciding with industrial control systems (ICS), Industrial Internet of Things (IIoT), and operations technologies (OT).
Commercial cybersecurity engineers can be divided into two distinct functional areas. The two functional areas consistently focus on consulting or solution engineering. Cybersecurity engineers have a similar perspective as corporate cybersecurity engineers. On the other hand, cybersecurity solution engineers, either from a pre-sales or post-sales perspective, will entirely focus on delivering a particular cybersecurity solution.
The primary takeaway for commercial cybersecurity engineers is that they tend to work for consulting companies, value-added resellers, or companies selling consulting services. Staff augmentation means operating similarly to corporate cybersecurity engineers.
Cybersecurity solutions engineers in this space are not necessarily similar to their cybersecurity engineer counterparts. Instead, they focus on specific solutions within a cybersecurity domain and the delivery of those solutions. As a result, cybersecurity solutions engineers have a narrower view and scope of their functional role. However, they must have a firm understanding of cybersecurity engineers’ conceptual areas and concerns.
Security clearance requirements may exist if working directly with government agencies or a prime or subcontractor.
Product cybersecurity engineers focus on developing the underlying engineering of a vendor’s primary and secondary products or their overall platform ecosystem. There is an emphasis on the specific product, features, and engineering, from hardware to the primary application. Cybersecurity engineers at this level are more in-depth with a vendor product or cybersecurity tool.
Product cybersecurity engineers deliver a narrow focus. The product side is not implementing, maintaining, and managing to fulfill the needs of a cybersecurity program. Instead, they are creating a product or cybersecurity tool ecosystem that will eventually be deployed in an enterprise. For this reason, there is a heavier emphasis on a skill set in the areas of:
The cybersecurity engineer skills matrix combines the Skills for the Information Age (SFIA) and the NIST NICE Framework. The spreadsheet helps align skills for roles and functions.
Currently, the skills matrix is under construction.
Cybersecurity engineering encompasses multiple roles covering on-premises, hybrid, and cloud technology deployments. Some roles will move beyond just caring for and feeding cybersecurity tooling. This can make it difficult to decide on a certification direction, as certifications to date have been somewhat scattered across various role skill sets. This is an attempt to document certifications that are more relevant and related to cybersecurity engineering. People may have acquired other certifications throughout their careers that are foundationally relevant. This is by no means an exhaustive list.
Getting certifications is a personal choice. It is generally up to the individual to decide whether they want to put the time, effort, and money into achieving them. Some hiring managers want to see them, while others do not. Additionally, please note that the mileage may vary depending on the quality of learning outcomes associated with certifications.
As a working cybersecurity professional, every attempt is made to separate professional and personal endeavors in a manner consistent with reducing conflicts of interest and maintaining ethics. Statements contained within this site are the explicit and implicit goals, objectives, endorsements, and educated opinion of the author of this site and not those of current or former employers.