Professional Documents
Culture Documents
JOB KIT
withSTEM
™
• x + • • + x • • x + • • x
INFORMATION
SECURITY
ANALYST
Discover fast-growing jobs and paths
into information security careers
Think STEM.
Think QUT.
Studying STEM at QUT opens a world of We all know that careers in STEM provide the
opportunities to achieve your full potential greatest opportunities to succeed in the future.
and forge a rewarding career.
No university is better placed to help you
Discovering how to improve lives by solving a launch your STEM career than Queensland’s
range of real-world problems will be crucial only university of technology.
in the future. Many of the jobs of today were
Search QUT STEM to learn more about your
unheard of a decade ago: app developers,
study options, scholarship opportunities,
big data analysts, nanotechnologists and
and life as a QUT STEM scholar.
sustainability engineers.
Could you be a
data detective?
Data drives our online world, and often our physical
world too. But where is this data held, and who is accessing it?
Have you got what it takes to protect it — and us —
from spies and scammers?
Dr Leonie Simpson
Senior Lecturer
I
about data — whether
nformation security is all
ancial or health data.
it’s personal, business, fin achieve the best possible
sec uri ty analyst means
Being an information outcome.
on how information is used, Information security is als
you’ll be an expert o hugely in-demand.
IMAGE: QUT
d or misused. There are not enough peo
and how it can be harme ple in Australia with the
There are inf orm atio n security roles in every skills to fill existing cyber
security jobs and employer
ort s
finance, education, transp will be looking to hire 17,0
industry sector: health, ked int o a cybersecurity by 2026.
00 additional workers in
if someone hac
and much more (imagine Not having enough people
driverless car!). employed in
l roles — there are plenty information security wil
These aren’t just technica cyber
l have a real impact on
e es also. Working in
rol people’s lives. Just one we
of policy and governanc ld wo rk for activity would cost the Au
ek of disrupted digital
career. You cou
security is a very flexible stralian economy
SOURCE: AUSTCYBER
false
CAREERSwithSTEM.com 4
I’VE BEEN SCAMMED
S cams as simple as a phishing
hedge fund (a type of investm
was fooled into clicking a fake
can have huge consequences
ent fund) folded after one of
. One Australian
the directors
Zoom link. The link allowed
soft ware that enabled them hackers to install
to take control of the compan
biggest client pulled out of y’s email, their
the business and they lost a
A ransomware attack on the $16 mill ion investment.
Lion dair y and drinks busines
production at Lion’s brewer s shu t down
ies and milk production plan
Australia’s largest beer bre ts. The com pany is
wer and one of the top five dair
In 2015, Fiat Chr ysler recalle y pro ces sor s.
d 1.4 million cars after securit
revealed a flaw in the interne y researchers
t-connected entertainment
hackers to control the brakes system allowed
, speed, steering, seatbelts,
The Australian government’s air con and radio.
ScamWatch website logged
$176 million lost as a result more than
of scams in 2020. The top thre
lost were investment scams, e sca ms by amount
dating and romance, and fals
frequently reported scams e billi ng. The most
were phishing, threats to life,
identity theft. arrest or other and
gree
✔ Option #2: Do any de Network security: Rules and
set-ups designed to protect
and then do a postgraduate from hacks. Networked dev
ices can include drones, frid
networked devices
✔ Option #4:
Do a cyber security About YOU! and
boot camp course. coding
✔ Interest in og y
tech nol
er
✔ Team play
m m u n icator
✔ Good co ving
r problem-sol
✔ Passion fo
l thinker
✔ Analytica
ntion
✔ Good atte
In the bank
at a job as an INFORMA
TION
to detail
wh
If you are budgeting ying, take a look at these numbers
SECURITY AN ALYST is pa
Keeping the
hackers out Ray Ang designs sm
businesses keep their art solutions that help
information safe on th
e web
ray ang
senior consultant
W
acy is a dream job for
orking in data trust and priv
Ang takes a human
computer wizards, but Ray
peo ple’s information online.
approach to protecting
vy online is my ultimate
“Helping people to stay sav e
to get everyone on the same pag
motivation,” says Ray. “I aim
tion.”
when it comes to data protec at I aim to get everyone on
ior con sult ant in data trust and privacy
Ray works as a sen sec urit y
PwC Australia, a role which
involves designi ng cyb er
put
the same page when it comes
t bus ines ses and government organisations can to data protection.”
solutions tha
of a mou se.
into action with a few clicks en,
Rat her tha n spe ndin g her day glued to a computer scre
nts and brainstorming sma rt “Design thinking ensures tha
Ray is busy meeting with clie and fit for the client,” says Ray
t solutions are human-centred
ues . . “That has followed me eve
solutions with her colleag s r since
see our clients happy with the solution I did that subject at uni.”
“It’s so rewarding to ere nce to A key to Ray’s success was
“It can make a big diff
that we provide,” says Ray. uni as a digital intern at Aus
gaining work experience dur
ing
society.” tralian petcare company Pet
and at Accenture in her hom Clo ud
e country, Malaysia. These
cyber security
Moving from technology totems for her Information
internships not only helped
Ray build her resume while
but also gave her experience studying,
tion sys working in different countri
When Ray majored in informa in es.
she hadn’t considered working Ray’s advice to budding dat
Technology degree at QUT, thin king , step outside your comfort zon
a trust and privacy experts
is to
during a unit about design e and try new things, even if
data trust and privacy. But ch to don’t think you’re capable. you
one-size-fits-all approa
Ray learned that there is no that “Be open minded,” she say
tion s for different users, a lesson s. “Do what you cannot do,
developing digital solu you know what you can do.” so that
. – Gemma Conroy
is central in her current role
CAREERSwithSTEM.com 6
A day in the life of a…
Business Analyst,
TechnologyOne
BUSINESS ANALYST
A double degree in business and Information Technology
landed Emily Entwistle a sweet gig as an analyst
Analyst, TechnologyOne
is one of the best
aking people’s lives easier
siness analyst, says
Graduate Business
things about being a bu
Emily Entwist le.
can be a real point of
“Small software problems how
“Being able to understand
frustration,” says Emily. ing.”
customers is really fulfill
we can improve things for
ne, Emily makes
In her role at TechnologyO
ls eas ier for customers to
management software too ys
urity analysts develop wa
use. While information sec ess an aly sts
t hackers, busin
to protect systems agains ess
findin g solutions to meet busin
like Emily focus on sim ila r ski ll set and
draw on a
requirements. Both roles as po ssi ble .
as secure
involve making software
2:00pm
is with some QUT
Join another meeting! This one
abo ut the projects
capstone students to talk
they’re working on with us.
3:45pm
logyOne’s User
I record a webinar for Techno
is a series of seminars where
Connect, which
latest features
customers can learn about the
and updates.
5:30pm
is a pretty common
I like to go bouldering, which
t be all of the
hobby for tech people. It mus
! – Gemma Conroy
problem solving and planning
#2
Take the Schools Cyber Securit work problem-solvi ng
coding, cyber security and team
modules that up your skills in alle nges > An analy tical th
.edu.au/projects/cyber-ch inker
in a series of fun challenges. aca > Great with small
zle, part details
Flag (CTF) challenges. Part puz
#3
Test your skills in Capture the r wits against each
s see teams pit thei
pizza party, these competition
ertake fun ethical
other to decipher clues and und
hac king activities.
hacking and counter
: capture.tf SOCIAL STUFF
• Western Australia’s WACTF
er-challenges
• AustCyber: bit.ly/austcyb ipan
italcareers.csiro.au/en/CTa • Join the nearly 4M people
• CSIRO’s CyberTaipan: dig com
on
regionalcyberchallen ge. YouTube who watched BBC’s
• Regional Cyber Challenge: on the Scammers bit.ly/3oGH
Spying
IMAGE: SHUTTERSTOCK
XhO
• Read ALL about cyber sec
urity
careers in Careers with STEM:
Cyber
Security mag bit.ly/CyberMa
g
• Check out these 20+ cyber
security
career profiles bit.ly/CwSTEM
cyber
• Follow @auscompacadem
y
and get great coding tips