You are on page 1of 29

BRIGHTFUTURE

FORCYBERSEC
URITYTALENT

Obrina Candra, CISA, CSXF, ECSP,


ISO27001LA
Head of CyberSecurity Dept., Poltek
SSN, BSSN
CyberSecurity Director, ISACA ID
1. Why cybersecurity?
2. How?
TECHNOLOGY THAT DRIVES THE FUTURE
KONDISI SAAT INI
Sistem Pemerintahan Berbasis Elektronik
KONDISI SAAT INI
415 kabupaten, 98 kota, dan 34 provinsi di Indonesia
Indonesia
Go Digital
Pertumbuhan Digitalisasi
Indonesia Tercepat di
Dunia
Talenta Digital
2030: India
Surplus
Indonesia
Defisit
Diperkirakan pada tahun
2030, India surplus tenaga
kerja
ahli digital sebanyak 245,3
juta orang dan Indonesia
diproyeksi kekurangan
sekitar 18 juta tenaga ahli
digital

Sources: Korn Ferry, Global


Talent Crunch (2018)
MEMBANGUN KEKUATAN SDM
INDONESIA DI BIDANG KEAMANAN
SIBER DAN SANDI

Berdasarkan rancangan Peta Okupasi Keamanan Siber yang telah disusun


bersama dengan pakar dan ahli dari berbagai sektor, maka okupasi pada Level 6
yang dapat menjadi rujukan sebagai profil lulusan STSN adalah:
• Vulnerability assessment analyst
• Network security administrator
• Cyber security analyst (100601)
• Cyber security administrator
• Cyber Security Incident Analyst/ SOC Analyst (SOC Tier 2)
PETA OKUPASI • Digital Evidence First Responder
• Cyber security awareness officer
NASIONAL • Cryptographic analyst
• Cryptographic module analyst
KEAMANAN • ICT security product evaluator

SIBER DIREKTORAT PENGENDALIAN SDM || DEPUTI BIDANG PEMANTAUAN DAN PENGENDALIAN || B S S N


1. Why cybersecurity?
2. How?
HOW TO BUILD A CYBERSECURITY CAREER

• Education • On Certifications
• Building Your Lab • Network with Others
• You Are Your Projects • Conferences
• Practicing with Bounties • Landing a Job
• Market Yourself • Having Passion
EDUCATION

• Networking (TCP/IP/switching/routing/protocols,etc.)
• System Administration (Windows/Linux/Active
Directory/hardening,etc.)
Computer Science or Computer Information • Programming (programming concepts/scripting/object
Systems or Information Technology orientation basics)
PROGRAMMING

If you can’t code, you’ll


always be dependent
on those who can
INPUT SOURCES

Twitter is replacing
the following of
websites. The
primary reason for
this is the freshness
of data. Twitter is
real-time, which
gives it and
advantage over
traditional sources.
BUILDING YOUR
LAB
• Having a lab is essential.
• The lab is where you learn. The
lab is where you run your
projects. The lab is where you
grow.
LAB’S TO DO LIST
1. Build an Active Directory
2. Run your own DNS from Active Directory
SETUP OPTIONS : 3. Run your own DHCP server from Active Directory
1. VM on a laptop or desktop 4. Have multiple zones in your network, including a
DMZ
2. VM on a laptop or desktop 5. Graduate up to a real firewall as soon as
that’s now a server possible. Also iptables and pf options.
6. Stand up a website on Windows/IIS
3. A real server with VM on it 7. Stand up a website on Linux/PHP
8. Have a Kali Linux installation always ready to
4. VPS system online (Digital go
Ocean, LightSail, etc.) 9. Set up a proxy server
10. Build and run your own VPN Gateway on a VPS
11. Build and configure an email server that can
send email to the Internet (Postfix, Qmail, or
Sendmail)
ACADEMY
YOU ARE
YOUR
PROJECTS
this is where the book of
knowledge stops and
creativity begins

Projects show that you can


actually apply knowledge,
not just collecting it
PRACTICING
WITH
BOUNTIES
Now that you have a lab, have
some solid skills, and some
projects you’ve been hacking
on, you may want to work on
some bug bounties.

It is the way to show rather


than tell.
MARKET YOURSELF
• If you’re an introvert and/or you feel
like it’s boastful to talk about anything
you’ve done, stop it. troyhunt.com @troyhunt
• To get to the mid to high tiers you
need to learn how to market yourself
and your work.
• Do good work and be willing to talk
about it. But do so from a sharing and
collaboration angle, not from a
position of arrogance. 23

haveibeenpwned.com
ON CERTIFICATIONS

24
NETWORK WITH OTHERS
LANDING A JOB
The Problem With
Cybersecurity Hiring

26

Entry-level positions don’t really exist in cybersecurity. – Daniel Miessler


KNOW THE JOB

Doing Product Evaluations


Managing Security Appliances / Services Responding to Security
Questionnaires

Write a Quick Script Performing Security Reviews


HAVING PASSION
THANK YOU
obrina@poltekssn.ac.id

You might also like