Based on the network security control, operating systems, threat knowledge, and the internet of vulnerable things, my goal is to advance my career with National Security Agency, specifically in Preventing and Eradicating Cyber Threats. My skills, accomplishments, knowledge, and experience are leading toward my ideal role of a white hat ethical hacker. Which they are detailing the skills, knowledge, and experience required to get hired for the goal.
Must have qualifications
Nice to have qualifications.
Skills |
Knowledge |
Experience |
Computer networking |
Understand the basics such as DHCP, NAT, subnetting, IPv4, IPv6, DNS, routers and switches, VLANs, OSI model, MAC addressing, and ARP. |
5 years |
Linux |
Know how to scan network connections, connect and listen to wireless networks, adopting black and white hat techniques, command line, bash scripting, file permissions, creating tools, and covering tracks. |
3 years |
Programming |
Languages to know are Python, JacaScript, PHP, SQL, C Programming, Ruby, Pearl, HTML, and Assembly. |
2.3 years |
Hardware knowledge |
Alter technology bahaviors and capabilities, evaluate security and technology. |
1 year |
Reverse Engineering |
Find faults of an object, in-depth understanding, run tolerance simulations of completed objects, run analysis of the completed objects, and reproduce discontinued objects. |
2 years |
Cryptography |
Know symmetric and asymmetric, block and stream, hash, and wireless. |
4 years |
Database |
Know how to use brute force to crack weak security, exploitation, targetting on network with permission, sql injections, etc. |
3 years |
Problem solving |
Open analytical and flexible critical thinking inside and outside the box with level headedness and resiliences. |
Demonstrate comprehension |
Virtualization |
Create hardware platforms, desktops, softwares. memory, storage, data, and networking. |
2 years |
Social engineering |
Active and analytical, and creative thinking using empathy. |
Demonstrate experience |
Ten skills needed for ethical hacking are computer networking, Linux, programming, hardware knowlegde, reverse engineering, cryptograhy, database, problem solving, virtualization, and social engineering to enter NSAs deparment of Cybersecurity.
Computer networking is needed to comprehend code and intercept or contact other computers in or out of the network. This can usually be done on the command lines addressing different address systems in order to contact another server/network/device.
Linux is an open source operating system that allows to function multiple tools. Such as scanning networking to analyze data, and ability to use different techniques using different scripting and sources.
Programming will help script and be literate in code to know different computer languages in order to why and how it functions on a system or application. Such as extracting data in sql, because extraction was made possible from being literate in the programming language of sql.
Hardware knowledge helps with coding the capabilities and to understant the security on the technology. Which develops default softwares on the device that are difficult to override and hack.
Cryptography are computer languages with different encryptions/decryptions used to keep raw data and information secure mainly through hashes.
Creating and understanding databases help with recording data, improving programming literacy and analyzing, which provides support for evidence if needed for forensics. Such data extracted or reviewed will expose vulnerabilities to cover when improving securities.
Problem solving will bring in priority to time-management and critical thinking combined. Deeply needed in the field of cybersecurity that is constantly growing, so will the mindset of the hacker.
Virtualization creates minitature and optimized applications or softwares meant to operate even in the background. Helps with containing and creating more information.
Social engineering evokes critical thinking with a sort relating to the target or a way to the reach the target usually when phishing. Needed to perform, analyze, and test environments, singling out suspects.