Tumgik
#Cybersecurity Specialist
cypheroxide · 6 months
Text
Building Your Own Cyberdeck:
What do you do when you have extra time between a job and your next? How about building your own Cyberdeck? Check this article out for tips on building your own!
The Ultimate Hacker Project For aspiring cybersecurity professionals, cyberpunk enthusiasts, hardware hackers, and circuit benders, one of the best hands-on projects you can take on is building your own cyberdeck. Despite overwhelming schedules full of training programs, full time work weeks, sometimes limited funds, and the endless possibilities of hardware combinations, many fans of the…
Tumblr media
View On WordPress
11 notes · View notes
aminasheikh · 5 months
Text
youtube
Cybersecurity in the UAE: Understanding the Importance, Threats and Solutions
Learn about the growing threat of cybercrime in the United Arab Emirates and the solutions for protecting your data and devices in this YouTube video.
1 note · View note
blogchaindeveloper · 7 months
Text
How To Become Cybersecurity Expert: Scope, Skills, and Salary
In today's digitally interconnected world, it is of utmost importance to secure your company from online threats. Cybersecurity experts play a crucial role in achieving this goal. Their primary responsibility is to proactively identify and prevent potential attacks. They conduct scans and analyze network data to detect any weaknesses and dangers in networks, data centres, and software systems. Additionally, they ensure that hardware and software are always kept up-to-date.
In this article, we'll explore what a cybersecurity professional does, the skills they need, the career growth possibilities, and the typical salary. You can enhance your knowledge in this field by taking a cybersecurity certification online course to learn about modern information and system protection technologies.
What Does a Cybersecurity Specialist Do?
A cyber security specialist is essentially a guardian of computer networks and systems. Their primary mission is to shield these digital domains from a multitude of cyber threats while ensuring the confidentiality, integrity, and availability of critical data. Here are some key responsibilities of a cyber security specialist:
Identifying Vulnerabilities: Their first task is to hunt down and fix security weaknesses in networks, data centres, and software systems. Think of them as the digital detectives who uncover potential entry points for cybercriminals.
Implementing Security Controls: Cyber security specialists employ a variety of security measures such as firewalls, encryption, and multi-factor authentication to fortify digital assets against potential attacks. These measures act as digital barriers, thwarting unauthorized access.
Monitoring Activity: They keep a vigilant eye on network and system activity, looking for any signs of intrusion or suspicious behaviour. This proactive approach enables them to respond swiftly to potential threats.
Responding to Incidents: In the event of a cyberattack, cyber security specialists jump into action. They react swiftly, notifying law enforcement, restoring backups, and communicating with the affected parties through public statements.
Keeping Up with Trends: The ever-evolving nature of cyber threats means that cyber security specialists must stay updated on the latest trends and technologies in the field. Being one step ahead is essential in this game. 
Depending on their specialization and level of expertise, cyber security specialists may have different job titles, including:
Cybersecurity Analyst: Responsible for planning, implementing, and monitoring security strategies within an organization.
Cybersecurity Engineer: Designing and building systems to safeguard digital information.
Cybersecurity Architect: Developing and overseeing an organization's entire cyber security strategy.
Cybersecurity Manager: Formulating and implementing security policies while managing security teams.
Penetration Tester: Simulating cyberattacks to identify security weaknesses and providing recommendations.
Chief Information Security Officer: Leading an organization's cybersecurity efforts and collaborating with other executives.
Information Security Crime Investigator: Reviewing evidence to determine if cybercrimes have occurred and assisting law enforcement in apprehending suspects.
Cybersecurity Consultant: Advising organizations on how to identify and mitigate network risks.
Cybersecurity Specialist Skills
Cybersecurity specialist requirements include a blend of technical and soft skills. Here's a breakdown:
Technical Skills:
Network Security: The ability to protect networks from unauthorized access, misuse, or disruption is a foundational skill.
Cryptography: Understanding mathematical techniques to encrypt and decrypt data is essential for securing sensitive information.
Risk Management: Assessing and mitigating potential threats to an organization's information systems is crucial to avoid vulnerabilities.
Cybersecurity Tools and Technologies: Proficiency in using various software and hardware tools for tasks like scanning, testing, and auditing is vital.
Soft Skills:
Communication Skills: Effectively conveying security concepts and findings to both technical and non-technical audiences is essential for collaboration and understanding.
Problem-Solving Skills: The ability to analyze complex situations and find effective solutions is key to navigating the ever-changing cyber landscape.
Critical Thinking Skills: Evaluating information objectively and logically helps make informed decisions in high-pressure situations.
Strategic Thinking Skills: Planning and anticipating future scenarios enable proactive security measures.
How to Become a Cybersecurity Specialist?
Entering the field of cyber security can be achieved through various avenues. Here are some common paths:
Formal Education: Enroll in college or university programs that offer degrees or diplomas in cyber security or related fields. This provides a solid academic foundation.
Self-Study and Certification: Study independently using online resources and obtain relevant certifications to showcase your knowledge and skills. This self-driven approach allows flexibility.
Volunteering and Training: Seek opportunities to volunteer or join organizations offering cybersecurity training programs or internships. Practical experience is invaluable.
Entrepreneurship: Consider starting your own cybersecurity business or joining a team of experts. This path offers autonomy and the chance to work on diverse projects.
What Certifications are Needed for Cybersecurity?
Cyber security certifications are vital for validating your expertise and commitment to the field. They also provide a structured path for acquiring the necessary skills and knowledge. Here are some common certifications:
Certified Cybersecurity Expert™: Ideal for entry-level professionals, this certification covers the fundamentals of cyber security, including network security, threat management, and cryptography.
Certified Information Security Executive™: Designed for experienced professionals, it delves into advanced aspects like security architecture, risk management, and governance.
Certified White Hat Hacker™: Specializing in offensive security, this certification covers ethical hacking techniques, including penetration testing, vulnerability assessment, and malware analysis.
Salary Expectations for Cybersecurity Specialists
The salary of a cyber security specialist can vary based on factors such as location, experience, education, and certifications. However, the average salary in the United States is approximately $117,419 per year. Experienced professionals can command even higher earnings, while those with advanced degrees or certifications enjoy enhanced job prospects.
In conclusion, cyber security is a dynamic and rewarding field that offers a wide array of career opportunities. By understanding the role, acquiring the necessary skills and certifications, and exploring salary prospects, you can embark on a fulfilling journey to become a cybersecurity specialist. Online cyber security certification courses are readily available to help you gain knowledge and skills in modern information and system protection technologies. With dedication and the right tools, you can help safeguard the digital world from cyber threats and play a crucial role in our increasingly digital lives.
If you're interested in pursuing cyber security or blockchain security certifications with a focus on emerging technologies like blockchain, consider exploring the offerings provided by the Blockchain Council. The Blockchain Council is a respected consortium of subject matter experts and enthusiasts dedicated to advancing blockchain research and development, exploring use cases and products, and disseminating knowledge for a better world.
2 notes · View notes
forensicfield · 1 year
Text
How To Become A Cyber Forensic Expert?
How To Become A Cyber Forensic Expert? A wide range of industries, including the public and private sectors, huge multinational banks, smaller independent firms, and charities, are currently in great need of cybersecurity specialists. As a cyber-security
(more…)
Tumblr media
View On WordPress
1 note · View note
jobsbuster · 2 days
Text
0 notes
edvicons · 1 month
Text
Securing the Future: A Deep Dive into Cyber Security Course Offerings
In a time where everything is digital, there is a greater need than ever for qualified cybersecurity specialists. This is where cyber security training in the UAE comes into the picture. Visit our Blog to know more!
0 notes
sabamvm · 3 months
Text
Enhancing IT Security: Strategies and Best Practices
Tumblr media
Introduction:
In the contemporary digital landscape, where businesses and individuals heavily rely on interconnected systems, ensuring robust IT security is paramount. The exponential growth of cyber threats poses significant challenges to organizations of all sizes, requiring proactive measures to safeguard sensitive data, protect privacy, and maintain operational integrity. This article explores the importance of IT security, key challenges, and effective strategies to fortify digital defenses.
Importance of IT Security:
IT security encompasses a range of measures designed to safeguard digital assets, including hardware, software, networks, and data, against unauthorized access, breaches, and cyber attacks. The consequences of security breaches can be severe, leading to financial losses, reputational damage, legal liabilities, and compromised customer trust.
With the proliferation of connected devices, cloud services, and sophisticated attack vectors, the attack surface has expanded, making organizations more vulnerable to exploitation. Consequently, investing in robust IT security frameworks is essential to mitigate risks and ensure business continuity in an increasingly volatile threat landscape.
 Key Challenges in IT Security:
Despite advancements in security technologies, organizations face several challenges in maintaining effective IT security:
1. **Sophisticated Threat Landscape**: Cybercriminals leverage advanced techniques such as malware, ransomware, phishing, and social engineering to infiltrate networks and compromise systems.
2. **Insider Threats**: Malicious insiders or negligent employees pose significant risks to organizational security by intentionally or inadvertently disclosing sensitive information or engaging in malicious activities.
3. **Compliance Requirements**: Organizations must adhere to regulatory mandates and industry standards governing data protection and privacy, such as GDPR, HIPAA, PCI DSS, and SOX, which impose stringent requirements and penalties for non-compliance.
4. **Resource Constraints**: Limited budgets, shortage of skilled cybersecurity professionals, and competing priorities often constrain organizations' ability to implement comprehensive security measures.
Strategies for Enhancing IT Security:
To address these challenges and bolster IT security posture, organizations can adopt the following strategies and best practices:
1. **Risk Assessment and Management**: Conduct regular risk assessments to identify potential threats, vulnerabilities, and impact on critical assets. Develop risk management frameworks to prioritize mitigation efforts and allocate resources effectively.
2. **Implement Multi-Layered Defense Mechanisms**: Deploy a multi-layered approach to security, combining preventive, detective, and corrective controls at the network, host, and application layers. This includes firewalls, intrusion detection systems (IDS), antivirus software, endpoint protection, encryption, and access controls.
3. **User Education and Awareness**: Foster a culture of security awareness among employees through training programs, workshops, and simulated phishing exercises. Educate users about common threats, phishing scams, password hygiene, and best practices for safeguarding sensitive information.
4. **Regular Software Patching and Updates**: Keep software, operating systems, and firmware up-to-date with the latest security patches and fixes to address known vulnerabilities and mitigate potential exploitation by attackers.
5. **Secure Configuration Management**: Harden system configurations, disable unnecessary services, and enforce least privilege access controls to minimize the attack surface and limit the impact of security incidents.
6. **Data Encryption and Privacy Controls**: Encrypt sensitive data both in transit and at rest using robust encryption algorithms and cryptographic protocols. Implement data loss prevention (DLP) solutions and access controls to prevent unauthorized disclosure or misuse of confidential information.
7. **Incident Response and Contingency Planning**: Develop incident response plans outlining procedures for detecting, analyzing, and responding to security incidents promptly. Establish communication channels, escalation paths, and recovery strategies to minimize downtime and restore normal operations.
8. **Continuous Monitoring and Auditing**: Deploy security information and event management (SIEM) solutions to monitor network traffic, detect suspicious activities, and generate real-time alerts. Conduct regular security audits, penetration testing, and vulnerability assessments to identify weaknesses and remediate security gaps proactively.
Conclusion:
In conclusion, prioritizing IT security is imperative for organizations to mitigate cyber risks, protect critical assets, and preserve stakeholder trust in an increasingly interconnected world. By adopting proactive measures, leveraging best practices, and fostering a culture of security awareness, organizations can strengthen their resilience against evolving threats and maintain a competitive edge in today's digital landscape. Remember, in the realm of cybersecurity, vigilance and preparedness are key to staying one step ahead of adversaries and safeguarding the integrity of digital ecosystems.
Tumblr media
0 notes
absoluteitau · 1 year
Text
Five ways a Business IT Service provider can reduce costs for your company
Tumblr media
The advantages of outsourcing your IT department include increased productivity, security, and access to cutting-edge technology. However, one of the key benefits of working with a managed service provider is that you can save your business money in various ways. Instead of hiring more IT personnel, a managed service provider will handle all of your company's technical requirements for a set monthly fee. Ultimately, since you won't have to worry about any unforeseen costs, this will make it simpler to stick to a budget.
Here are a few additional ways an Absolute IT services provider can reduce costs for your company.
1. Cloud-based Computing
Since technology is ever-evolving, buying the most recent computer hardware can quickly blow through your budget. However, a managed service provider will enable your company to use cloud technology, giving it unrestricted access to the best technology currently on the market. Cloud technology allows workers to collaborate more efficiently in the same office or two different places. To maximise protection against data loss, a competent IT provider will also upload all of your information to the cloud.
2. Access to Qualified IT Specialists
The Business IT Services provider is always available to offer technical support and respond to inquiries any time of day or night. Ultimately, this allows workers to continue being productive without becoming frustrated while trying to solve technical problems independently. A variety of office tasks will be automatically handled by an IT provider, freeing up your team to concentrate on their primary job responsibilities without being overly distracted.
3. Assurance for Cybersecurity
Cyberattacks can destroy a business and cause many hours of costly downtime. However, working with an IT provider can give your business the best defence against these online threats. Any potential risks on your network will be quickly found and prevented from spreading to other areas by round-the-clock monitoring services. A managed service provider may also provide training sessions to give staff members the knowledge they need to avoid common technological blunders at work.
4. Security patches updates
The technological landscape constantly evolves, making it challenging to stay current with the most recent software patches. For any company, outdated software is a liability. In contrast, a managed service provider will automatically download these patches to guarantee that your business has access to the most recent software. Through the use of dependable tools, these software updates will also increase system performance and make it simpler for staff members to stay productive.
5. Options for Scalability
The requirements of a business change constantly, whether you are in a period of expansion or are thinking about making cost reductions. By connecting with an IT provider, your business can scale up or down as necessary to satisfy your specific requirements. Thanks to an IT service provider, your network and computer hardware will easily handle current usage while being adaptable enough to accommodate plans.
One of the best ways for any organisation to cut costs while still meeting its technological needs is to work with a Managed IT service provider. A company can gain access to cloud technology, IT support, cybersecurity, software updates, and scalability options, among other advantages, from an IT provider. An IT service provider is a good investment that can help any company realise its full potential because technology is crucial in the business world.
1 note · View note
medxsolutions · 1 year
Text
MedX IT Solutions
Tumblr media
We are an IT Managed Service Provider (MSP) and Managed Security Service Provider (MSSP) providing IT and cyber-security as well as Voice services to clients.
MedX IT Solutions is a leading provider of IT services. We offer complete managed IT Support me for a single all-in price, so you can focus on your business and not your technology. Our experienced technicians are available 24/7 to help you with any IT needs you may have.
We understand that every business is different and has different IT needs. That’s why we offer a variety of services that can be customized to fit your specific needs. From managed security and data backup to cloud computing and VoIP, we have the experience and expertise to help you with all of your IT needs.
MedX IT Solutions 13528 Prestige Place Suite 105, Tampa, FL 33635 813-544-4570 [email protected] https://www.medxsolutions.com/ https://www.facebook.com/medxsolutions https://www.linkedin.com/company/585008/admin/ https://twitter.com/SolutionsMedx https://www.google.com/maps?cid=8325884336163965049
0 notes
1donoow · 10 months
Text
VIDEO GAME REC
PT.1
......
♡ - smut
Most of them are fluff
......
<a/n>i somewhat explain why there's alot in my pin post
poppy playtime
security breach [montgomery gator][sunnydrop/moondrop]
the last of us [ellie williams][joel miller]
call of duty[task force 141][alejandro vargas][simon 'ghost' riley]
Tumblr media
———POPPY PLAYTIME———
@clanwarrior-tumbly - reader being a same model as huggy
- Reader being an older janitor who never left
- bunzo learning that it's reader birthday
- the toys reacting to the reader carrying a kick-me-paul
- reader being the creator of huggy wuggy pt.1 pt.2
———SECURITY BREACH———
@clanwarrior-tumbly - security breach with a facepainter reader
- gregory and freddy finding the technician's secret office
- security breach with a mouse animatronic
- Canon animatronic meets y/n a kangaroo
- the animatronic receiving a tiny version of them self
@rainbowapocolypse - first encounter pt.1 pt.2 (animatronic! maintenance! reader)
@blueberrys-writings - scary dog privileges
———————————————————————
montgomery gator
@clanwarrior-tumbly - monty with a small moth animatronic
———————————————————————
sunnydrop/moondrop
@srslysierraa - hand in hand
@g00mb13 - headcannon
@clanwarrior-tumbly - sun and moon with a swordfighting fox animatronic
- Reader apologizing after getting banned
- sun helping overnight worker!reader clean
- reader calming moon when the light go out
- separate bodies
————THE LAST OF US————
ellie williams
@gonzo-rella - helping out ellie when she gets her period (platonic)
@elliesmainhoe - headcannon with a feminine s/o
@bubbles-for-all-of-us - that's my mom (platonic)
———————————————————————
joel miller
@forever-rogue - before
- hey kid
- bookish
@multific - a little friendlier
@luveline - grumpy x sunshine
@yelena-bellova - twenty years later masterlist
@peterparkersnose - christmas vibes
@nexusnyx - miss sunshine ♡
- my fellow, my guy ♡
- imagine being loved by me
@joels6string - cup o'joel
- haircut
@joelsgeetar - ___
@baevillier - regulars
@adora-but-ginger - sparks fly
@nanatargaryen - beach day
- grumpy x sunshine (platonic! immune!reader)
- joel and sarah miller x daughter!sister!reader
@wardenparker - for her
@from-the-clouds - savior complex
@orangevtae - I'm right here
- walking sins, lost tragedys
@talaok - incentive
- hunting lesson
- interrupted
- stay
@ourautumn86 - stray pt.3
@heartpascal - I am good (platonic)
- the crooked kind (platonic)
@angelltheninth - rescued by joel miller
@joshuagrayboy - jealous joel miller hc
- more than friends
———— CALL OF DUTY ————
task force 141
@sant-riley - random task force 141 x gen z member headcannon pt.3
- headcannon pt.2
@meatonfork - grim x platonic 141 hc
@itzclouding - becoming a shadow
@venomous-ragno - ghost and könig wirh a reader who has a big dog
@gatorbites-imagines - ___
@imaginesheaven - medic reader x tf 141 hc
@starstruckmiraclekitty - with a reader who sneeze like a kitten
@mangowafflesss - s/o who plays the sims
- Cod Boys Noticing their S/O Phone Screen is of Them
@a-small-writer-in-a-big-world - The 141 with a reader who's a cybersecurity specialist
@thesharktanksdriver - being the youngest member of 141 pt.1 (platonic)
@personwhowrites - putting stickers on them
@ghosts-bandwagon - ___
@mockerycrow - reader catching them looking at her ass
@gomzwrites - finding out about your soft spots
———————————————————————
alejandro vargas
@ragingbookdragon - ___
———————————————————————
simon 'ghost' riley
@sm8th0p - date (medic!reader)
@ragingbookdragon - babysitting
- ___
- ___
@halfmoth-halfman - the little things
-little treasures, life's pleasures
- our little secret
@clairdelunelove - things simon 'ghost' riley finds attractive about you pt.1
@euovennia - simon being a mom/dad friend to reader
Tumblr media
196 notes · View notes
Hey ❤️
Could you write some 141 headcanons with reader who is cybersecurity specialist just like that one operator Hutch? And is also very into video games and makes references. Who would understand some of them and who would just give the reader "wtf stare"?
Hii ❤️ I don't know who Hutch is but I will try my best lol
The 141 with a reader who's a cybersecurity specialist
Having someone who's in cybersecurity on the team is actually helpful
They always come to you if they have issues with things like the wifi not working or they need to get past a paywall (let's be honest they'd do that bc fuck paywalls)
You forced them to get VPN's and all other kinds of protections for their electronics because you didn't want to deal with them fucking up and because you didn't want their information to get stolen
You hack things for them and they give you payment by getting you food or drinks
Your room is covered in posters from video games and you fixed up a TV to let you play games when you get the time to
You make references all of the time and for the most part it's Soap or Gaz who knows what you're talking about
Sometimes Ghost will get a reference but most of the time he doesn't think about it or he's confused but won't question it
Price doesn't understand a thing you say. If you make an older game reference he might but he doesn't strike me as a man who knows much about video games
When all of you are on leave and there's no work to be done, they usually join you in your room to watch you play for a few hours
Gaz and Soap force you to get fighting games so all can play together (you beat them almost all the time)
Despite the fact that it seems like you are a gamer ™ you're actually really good at your job and due to military requirements you are pretty fit
They may not get the references or other things but you're just as important and they are
A/N: I'll have to read into Hutch if he's a cool guy
317 notes · View notes
blogchaindeveloper · 1 month
Text
Cyber Security Specialists: Skills, Roles & How to Become One
Tumblr media
There has never been a more significant need for cybersecurity experts than there is now. Protecting sensitive data and systems against cyberattacks is essential due to the increasing reliance on technology. Experts in cyber security are the first line of defense against a constantly evolving array of assaults, and they are essential in protecting companies from possible weaknesses. This article looks at cybersecurity specialists' requirements, responsibilities, career paths, and the value of online cybersecurity certification. 
What is the job of a cyber security specialist?
Cybersecurity professionals are adept at spotting, reducing, and averting online threats. They labor to safeguard system and data accessibility, authenticity, and privacy. Depending on the organization, their roles may differ. However, the following are some common ones.
Cybersecurity experts examine the security architecture inside a business to find weaknesses, assess the effectiveness of security controls, and recommend improvements. These experts are responsible for looking into security incidents, containing them, and getting things back to normal after they happen. They might also try to stop such incidents from happening again. They plan, carry out, and oversee network security procedures for a business. Configuring intrusion detection systems, firewalls, and other network security measures is necessary.
Cybersecurity specialists create and implement security policies and processes to ensure a company complies with industry norms and laws. They might also train staff members on security best practices. Experts can conduct ethical hacking tasks, such as penetration testing, to find weaknesses in a company's systems before malevolent hackers take advantage of them. It is imperative for the role that staff receive training on cyber dangers and security best practices. Cybersecurity experts create instructional materials and provide training sessions frequently.
Skills Necessary for a Cybersecurity Professional 
The ability to perform the following key competencies is necessary for success in the role of cybersecurity specialist: 
Technical expertise: Cybersecurity experts must understand operating systems, computer networks, and different security tools and technologies. 
Analytical Skills: They need to be able to see trends, analyze complicated data, and foresee any dangers. 
Problem-Solving Skills: Addressing security issues calls for critical thinking and effective problem-solving. 
Communication Skills: Cybersecurity experts frequently have to clearly and understandably explain complex technical material to stakeholders who need to be more technical. 
Please pay attention to details: Small mistakes can significantly affect cybersecurity. 
Adaptability: Since cyber dangers constantly change, experts must stay current on the newest attack methods and security patches. 
Ethical Hacking Skills: Identifying weaknesses and protecting systems requires familiarity with ethical hacking methods and resources. 
Credentials in Cybersecurity 
Obtaining pertinent credentials is highly recommended for working as a cybersecurity professional. Certifications authenticate your competence and show potential employers you possess the necessary abilities. In cybersecurity, popular certifications include:
The Professional Certified in Information Systems Security (CISSP) is a recognized credential emphasizing many aspects of information security, including risk management, cryptography, and access control.
The best credential for those interested in ethical hacking and penetration testing is the Certified Ethical Hacker (CEH) designation. It talks about the newest devices and techniques used by evil hackers. 
Certified Information Security Manager (CISM): Those who want to manage security projects or lead security teams should pursue the CISM certification since it focuses on information risk management and governance.
CompTIA Security+ certification: The Security+ certification is a great place to start, as it covers core security topics for individuals new to cybersecurity. 
How to Become a Cybersecurity Expert 
Having a clear route and dedication are essential for becoming a cybersecurity specialist. The following actions will help you launch your cybersecurity career:
Foundation for Education: Start with a solid intellectual foundation. Usually, one wants a bachelor's degree in computer science, information technology, or a closely connected field. On the other hand, a lot of experts in this subject have a variety of educational backgrounds. 
Acquire Experience: Entry-level jobs like network administrator or IT support allow you to acquire experience. Practical IT experience will enable you to understand better how internal systems and networks operate. 
Accreditations: Your interests and career goals should be reflected in your chosen credentials. Exam preparation for AI certification is made simple by the abundance of online materials available. 
Networking: Creating a professional network might open doors to employment referrals and mentoring. Participate in online forums, attend industry conventions, and connect with seasoned professionals. 
Keep Up to Date: Since the world of cybersecurity is constantly evolving, it is imperative to stay current. Read books and blogs, and attend webinars and training sessions to keep current on the latest technology, trends, and dangers. 
Apply for Jobs: As soon as you have the required training and credentials, you should start looking for cybersecurity jobs. Entry-level courses could cover security analysts, security consultants, and novice penetration testers. 
Consider getting more advanced degrees and certifications to progress in your career and stay relevant. The field of cybersecurity is dynamic and calls for ongoing education. 
In summary 
In the modern digital world, a cybersecurity specialist's role is essential. Given the growing threat of cyberattacks, these experts are crucial to preventing security lapses in businesses—a cybersecurity professional must have the requisite knowledge, expertise, and certifications. Obtaining the education necessary to succeed in this sector is now easier than ever, thanks to online cybersecurity certification programs. There is no denying the direction of cybersecurity and a growing need for qualified workers.
0 notes
cybxr-nem3sis · 6 months
Text
Tumblr media
[UPDATE]
CALL OF DUTY: MW OC: Azura "Doberman" Lee
Former Navy Seals and also, trained to became CIA Agent by his adoptive parents, Doberman was one of the agents that CIA has ever had, He was highly effective agent with every mastery in every aspects. Until he graduated from Navy Seals and join CIA with his adoptive parents and take a second job as Cybersecurity specialist. For five years, Kate Laswell recruited Doberman to Task Force 141, to join them for another assignments.
Tumblr media
GENERAL
Name | Adriansyah Saputra Nadhirizzky I Gusti Agung Putra Aditya Adhiarja Redjosentono
Alias(es) | Azura(nickname given by his adpotive parents), Ardi or Mas Ardi( by his neighbours and friends)
Callsign | Doberman
Occupation | CIA, Navy Seals(formerly, discharged) Task Force 141, Matrial arts instructor, Cybersecurity Specialist/hacker.
Gender | Male
Birthday | February 14th
Nationality | American
Race | Mixed races, half Indonesian-American, half korean-japanese
Rank | Lieutenant(TF141), Operations Officer(CIA)
Place of Birth | New York, USA
Spoken Languanges | English is his second languange, He is mr. worldwide himself because he's a polyglot.
Sexuality | Bisexual
APPERANCE
Eye color | Ruby red
Hair color | Natural black
Height | 7'0/213cm
Build | kinda-bulky muscular
Blood type | A
Scars | on right eyes, left cheek, and side of his lips
Tattoos | Full on both arms and hands, 4 on the waist, 1 on the chest, and full back tattoo on his back
Fancast | Hiroyuki Sanada
Tumblr media
FAVORITES
Color | Red
Food(s) | Jjangmyeon and katsudon
Drink | Rosemary tea
Song | Doin' time by Lana Del Ray
Flower | Rose
Hairstyle(s) | Manbun for casual days, ponytails for missions, and untied for works.
PERSONALITY
Tumblr media
James bond like Personality, ISTJ | Doberman is highly intelligent, exceedingly cunning and diabolically independent. He also sensiable, calm, mature and sly. Although everyone always saw him as stoic and intimidating indivisual.
Loyal and Strong | Doberman is someone who consistently demonstrates honesty, reliability, and integrity. By keeping promises, maintaining confidentiality and acting ethically.
Intelligent | He is a man who is flexible in his thinking and can adapt to changes, he think before they speak or act, snd able to effectively manage his emotions.
Intimidating | Doberman always described as intimidating figure often overly domineering and cause others to feel threatened, overwhelmef or even scared.
SKILLS AND ABILITIES
Tumblr media Tumblr media Tumblr media
Fighting style | Taekwondo, Karate, Commando Sambo, Capoeira, Brazillian jiu-jutsu, Pencak silat, Krav Maga, Judo
Weapon | Glock and Beretta gun
Distinct weapon | M-9 Bayonet for a fast movement and agility
Special Skills | Flexibility, communication, Espionage, exploiting computer hacker, Translator.
FAMILY
Status in family | Second oldest
Adoptive siblings | Jessica Smith Anderson, Liam Smith Anderson, Lucas Smith Anderson, Oscar Smith Anderson
Father | Evander Smith Anderson, retired CIA Agent, and iscurrently working as bartender
Mother | Ava Smith Anderson, retired CIA Agent, and is currently working as Doctor
Relationship | Being second oldest after Lucas, Doberman truly loves his family so much, he always understanding and protective indivisual to them. as become CIA Agent to grant Evander, his freedom.
Pet | Has a Doberdane (Doberman-Great dane mix dog) named Bolt.
CHARACTERS THAT BASED TO;
Tumblr media
James Bond from James Bond series
Balalaika[Sofiya Pavlovna] from Black Lagoon
Jotaro Kujo fron Jojo Bizarre Adventures
Yor Forger from Spy x Family
Caveira[Taina Pereira] from Rainbow Six Siege/R6S
Black Widow from Avengers
Jessica Rabbit from Who Censored Roger Rabbit
John Mclane from Die Hard
John Rambo from Rambo series
Kiryu Kazuma from Yakuza series/Ryo ga Gotoku
TRIVIA
Doberman is a man, who has big and unbelieveable appetite, he sure eats alot of foods, buy he also aware to keep his body stay healthy
Despite his intimidating and stoic exterior, Doberman is good with kids! They're always see him as father/brother figure
a big an of metal bands and kpops
He likes to cooks! he can LITERALLY cook anything, Doberman wouldn't mind to cook you a meal
Sly as a fox and smart as a snake, that is everyone say to Doberman's personality. He always cunning man, who always clever at planning what he wants
After graduated middle school, Doberman and his adoptive parents decide to moved to Indonesia, Jakarta. Where Doberman continue his Junior ighschool to University.
Join a Paskibraka in Indonesian when he was 15 years old.
While staying in Jakarta, when he was a little boy, Doberman always like to plays in the middle of the rains with his childhood friends, until he get sick.
Spicy foods lover, especially Seblak.
When Doberman accidently hurt or suprised, he always let out a cursed in each languages, mainly Indonesian or Japanese.
Doberman likes to tied his hair than let it rest on his shoulder.
Background Story
Born and abandonned in the Street of New york, Azura had always felt like an orphan, left in the street of New York City since he was a newborn. Growing up on the streets, he was no stranger to a life of hard knocks and never knowing where he would find his next meal or a safe place to rest.
He eventually joined the Navy Seals when he came of such young age. His skills and determination earned him a reputation of excellence, and a discharge with honors. He settled in America and soon enough his dedicated attitude was noticed by an unlikely source - ex-CIA agents.
The agents, impressed with his military background, saw the potential in him and decided to do something extraordinary. They adopted him. This was the start of a new, more secure life for Azura and a chance at a better future.
The missions he undertook were never easy, and his courage and skill saved thousands of lives. Thanks to Azura's converted status and adopted family, his life had come full circle.
Trained in the ways of espionage, Azura quickly rose through the ranks to become a full-fledged CIA agent. His ability to crack codes and negotiate peace was second to none. Yet, he felt something was missing. He decided to take a second job as a cybersecurity specialist. His work brought him into the public eye, and soon enough he caught the attention of Kate Laswell, the leader of Task Force 141.
Laswell begged him to join the elite unit and promised that his skills would be put to good use. Azura agreed and for the first time, he felt a real sense of belonging. Sworn to secrecy and honor, he worked alongside the greatest minds in the world, protecting the freedom of the people of the United States of America.
Tumblr media
--------------------------------------------------
37 notes · View notes
vivaislenska · 7 months
Text
Tech DOES NOT Mess Around with Cybersecurity [excerpt from a longer, TBB mission fic]
Republic specialists at Cyber Ops Squad try to spy on the Boys of the Havoc Marauder. They get their asses handed to them (in a sparkly gift bag).
Basis: A snippet from Chap. 15 of long-form TBB fic called ‘Success Rate’ that can be found here. These two regs just helped Hunter, Crosshair, and Wrecker rescue Tech and Echo from a brutal ordeal in captivity. How'd these mysterious regs meet Tech before all of it went down? Hunter and Crosshair find out… and sympathize.
Length: 3,100 words
CW: swearing and mentions of adult themes
Tumblr media
An hour or so goes by, and Hunter and Crosshair are still up in Serpent Squad's shop, swapping stories with Easy and Slowpoke. By now, several more of Easy's guys have wandered over to meet the two Bad Batch commandos and revisit some of the epic tales that are being told. There are still a few guys at their various watch stations, but the ones who’ve been relieved seem to be forgoing their racks and personal time to join in on the fun.
"So lemme get this straight," Hunter says to his and Crosshair's new mates: the OIC and AOIC of a highly secretive, highly reserved, gang of radar operators and crypto specialists. "You two were both ARC Troopers when you deployed to Geonosis, but you got hurt and now you're both cryptos. And you met Tech... when you were doing deep dives into encrypted networks?"
"I know it sounds mental," Easy affirms. "But it's the damn truth. Cadet's honor."
"Well,” Hunter says, first and foremost, “I’m sorry you boys got hurt.”
"Thanks, vod. Yeah, we were sorry too when they yanked our ARC designations," Easy says. "Not sorry right away, though. What happened was me and Slopes were caught in a bad blast during the final push. But it was all the typical injuries you know? We still finished the job and all."
"It was only later we learned we'd both sustained some pretty serious TBIs," Slowpoke adds. "When we tried to go back to duty after everything on the outside had healed, we were having a lot of trouble."
"Still do," Easy continues. "Slopes has these violent seizures now and then. It's really hard on him. And me, I get some nasty vertigo pretty often. Can't tell which way's up or down... it's madness! Also—not that my mind was a durasteel trap before—but my short-term memory’s just garbage now."
"The first time vertigo happened to him, we were in formation," shares Slowpoke as he takes a careful sip from his beer. "All of a sudden, he keels over and starts hugging the deck like the ship was going belly-up. Our CO was furious because he thought Easy was takin' the piss. I mean... we all did. But when he looked up at me, green as Endor moss, I knew something was horribly wrong."
"Yup. Then, not long after, Slopes kept getting 'the shakes' more often, and it became clear that both of us were still affected by whatever that blast did to our brains,” Easy adds, amiably. “Our CO transferred us to medical for eval and treatment, but the long-necks never could cure us. They put us on meds, and the meds do help, but we'll always have symptoms. They wanted to decommission us."
"How'd you dodge it?" asks Crosshair.
"Yeah," Hunter says, also craving to know how a medical decision made by one or more Kaminoans was thwarted. "The long-necks are heartless and stubborn when they deem a vod can't perform as promised."
"Kenobi," Easy says simply. "He heard we were being decommed, then he made other plans for us before the Kaminoans followed through."
"He said he 'negotiated' our 'lateral transfer,'" Slowpoke adds. "But really, we think he pulled us out of there and somehow hid us in Skywalker's inventory. We think he assigned us to crypto because there's not a whole lot of people who even have the clearance to look at our muster sheet."
"That and crypto at a top-tier command is probably the last place the Kaminoans would expect two infirm, unsound, adrenaline-addicted ex-ARCs to wind up," says Easy, grinning around the growing circle of brothers. "But here we are!"
"Here we are," Slowpoke agrees.
"And it’s a pretty good gig too, eh, fellas?" Easy says, turning his head to include everyone within earshot.
There's an excited murmur of assent from around the room.
"We do miss working directly for Kenobi, though," says Easy, sounding a little forlorn. "But he kept us close enough by stashing us with Skywalker's crew. We still see him every now and then. Plus, they're so close that if you're working with one, you're pretty much directly working with the other too."
"I can see that," Hunter tells the group, thinking about all the times he's seen the two men joined at the hip both in battle and in banter.
"Works for us," says Slowpoke. "Plus, we figure the best way to show Kenobi our gratitude is to look after Skywalker."
"Yeah. Just not in the same way we used to on the ground," says Easy. "But with crypto and espionage and slicing instead. Digging up intel and cyber-sneaking around enemy databases and frequencies."
"You're good at what you do," Hunter reminds them, thinking about how instrumental Serpent squad was in helping the Batch retrieve Tech and Echo. "Can't see how anyone could stay off your radar. Or how they could keep intel hidden from you if it's something you guys really want."
Easy and Slowpoke share a wry grin and a few mutters and sniggers break out around the room. Vexed by Serpent squad's communal reaction, Hunter and Crosshair glance around curiously, feeling very much on the outside of an inside joke.
"We're not laughing at you," Easy tells them sincerely. "Promise. We're laughing because it's so damn ironic you would say that."
"Oh... yeah?" Hunter says, still unsure. "Why's that?"
"Bet I know why," drawls Crosshair, revelation dawning on his sharp features.
"Why then?" Hunter asks him.
"They tried their little tricks on Tech," mutters Crosshair pensively. Then turning to Easy and Slowpoke. "Didn't you? And he knew it."
"At the heart of it," Slowpoke says, "that's exactly why.
"We weren't 'trying our tricks' on Tech, specifically," Easy clarifies. "We were doing a routine breaching exercise and Havoc Marauder was just one of the ships on our scopes. We didn't know anything about her but her name and designation, so we wanted to give it a go. Plus, Slopes and I were still relatively new here at the time, and our brass was adamant that we prove our worth."
"Yeah, we were new, but we'd already done a hundred tests on a hundred different ships,” says Slowpoke.
”And we'd cracked all of them without breaking a sweat. So there we were, dumb and cocky enough to think that spying on Havoc Marauder would be like spying on all the others," Easy adds frankly. "We soon learned the hard way that we were wrong."
"Oh man," Hunter says, feeling like he finally knows where this story's headed. "Wha'd he do when he detected you guys?"
"He identified himself as Marauder to confirm your vessel. And then he warned us fair and square," Easy says. "Said he'd recognized our efforts to slice into Marauder's mainframe and that they'd just be futile. Told us to turn back, or he'd be compelled to retaliate."
"And, what?" Crosshair asks. "You thought the arrogant nerd was bluffing?"
"Of course, we thought he was bluffing," Slowpoke tells him.
"Yeah, by then, we'd looked on the GAR universal database and saw who you guys were, and we figured the one called 'Tech' was on the comms,” Easy adds. “We thought you guys were too specialized to bother with crypto know-how, and we thought our advanced training and equipment platforms would give us the upper hand in this challenge. So we went right ahead with it, trying to show Marauder who was boss."
"He warned us one more time before he counterattacked. And then..." adds Slowpoke. "And then he made us learn just who the kriff we were dealing with."
"How?" drawls Crosshair.
"Then all of our display screens went dark for a few seconds," Easy says. "And when they recovered, a little feature film was playing for our enjoyment. On all of them."
"Oh no..." Hunter says, only daring to imagine what Tech had in store for them at that moment.
"An adult feature film," Slowpoke supplies.
"No way!" Hunter says, hooting in unison with Crosshair.
"And I know what you're thinking," Easy says, cracking up at the memory. "You're thinking, 'oh yeah, like you've never had one of those tacky vids passed around the barracks,' right? Well, it wasn't just any smut film, fellas. It was all Hutts."
The collective groan that sounds out through the rollicking atmosphere of the room only makes everyone laugh even harder.
"But-but! Not just Hutts!" Easy chokes, fighting back tears of mirth. "They were fucking ancient, elderly, old Hutts."
"Probably the sickest shit I've ever beheld," says Slowpoke, collecting himself just enough to put some sincerity behind the remark.
"And that's saying something!" comments one of the boys Hunter hasn't met yet, and Slowpoke looks on, playfully peeved and casually brandishing his middle finger.
"How long did he let it go on?" asks Hunter, almost afraid to find out.
"A good hour," Easy tells him. "And by then, we were on our humble knees, begging him to relinquish control before any of the brass caught on, or we'd all be sent up! And he did, just in the knick of time. So, that's the story of how we met Tech.”
"And," Slowpoke adds, "we've been friends ever since."
"Friends?" Crosshair grumbles. "You all then just decided you wanted some dangerous slicing maniac as your friend?"
"Yeah, why not?" Easy says. "He was perfectly civil about warning us, and we were the ones who bit off more than we could chew. I would have done the same thing he did if someone was trying to mess with my guys' info, and I had to teach them a lesson they'd never forget."
"True," Crosshair agrees. "He was protecting us. Sounds like it did the trick."
"Sure did," says Slowpoke. "But we couldn't help but like him.”
”Yeah so we stayed in touch. We see him logged in as "Marauder" at some of the virtual Crypto conferences that we attend for training,” says Easy. “We always say hey, and he does too. But, collectively, we never messed with Marauder again after that."
"Collectively," Slowpoke reiterates. "Doesn't mean we're above having some of the shinies give it a go on their own when they're getting too big for their britches."
"Yeah, whenever we get students or rookies who come through thinking they're real hot shit," Easy says. "We send them right to Tech. We have them do a test in which they target Marauder, and Tech takes care of them for us. You know, knocks them down a peg or two."
"How does Tech only target one guy at a time if they're working out of your shop?" Hunter asks.
"Well, we can't tell you how he does it because we have no karking idea," says Easy.
"None whatsoever," Slowpoke adds.
"But, we can gladly tell you what he does. It's different every time, but he'll usually send out a mass message from their personal account with something ridiculous typed in the body of it. We've actually got them all saved somewhere..."
Easy then swivels around in his chair to address the gathered members of Serpent squad.
"Oi, Serpent," he says to them. "Whose got that list of messages that were sent whenever we've had shinies try to spy on Marauder?
"Got it right here, boss," says a clone from Easy's squad, tapping and scrolling on the datapad at his console.
"Yes, Timbre, well done!" Easy then swivels back to Hunter and Crosshair. "Hunter, Crosshair, meet Timbre. He's gonna do a dramatic reading of some of the good ones. Aren't you, vod?"
"Can do Sarge," the reg says readily, clearing his throat. "Let's see... oh here's a good one. This one was from a rookie whose unit was here for training before they went on to check in aboard Tranquility."
To everyone's delight, the reg called Timbre stands up out of his seat to make sure everyone can hear, then takes on a serious tone of voice to read out the messages.
"Good morning, brothers. Sorry to bother, but does anyone have a spare set of sheets I could borrow for my rack? I pissed in mine again last night and they're absolutely ruined. Thanks in advance."  
"Damn, Tech," Hunter hears Crosshair whisper fondly as the room erupts into more laughter.
"That one got sent to our whole battalion and the battalion he was due to check in with a few days later," Slowpoke adds happily.
"That one's one of my favorites," Easy says admiringly. "Timbre, give us another."
"Sure thing, boss," says Timbre.
Hunter finds himself wondering if Timbre is Serpent squad's designated orator when it comes to recitation of the absolutely absurd.
"Any requests?" asks the reg before sharing another.
"Do the aftershave one!" shouts somebody on watch at a comms console.
"You got it," Timbre says readily, as he repeats the same process but with a slightly different voice this time so that the audience knows a different rookie is now speaking.
"Hey Fellas!!!! Does anyone know what that alluring aftershave is that Commander Cody uses? I just passed him in the p-way and it made my mouth water. Can't get it off my mind and thinking of trying it out for myself. Cheers!"  
"Hells! Tell me Cody didn't see that one," says Hunter, eyes going wide but with a guilty grin.
"He did," Slowpoke reports mildly. "From some ass-licker down in Air Frames who was trying to make chief at the time. And the Commander was fuming.”
"Ahhh, he sure was!" Easy agrees wistfully. "We actually caught flak for that one too, because it's literally our job to stop external tampering of any kind. And I just had tuck tail and say 'sir, look, if we knew how this guy was doing it, we'd put an end to it.' But, as you guess, that didn't really cut it for ole Code-y."
"'This guy',"  Crosshair repeats curiously. "You didn't rat on Tech?"
"'Course not, Crosshair, you sullen prick!" says Easy, playfully cuffing the sniper on the chest. "Kriff, you're pessimistic! We were the ones who set that loud-mouth, blowhard shiny into Tech's lair to begin with. And it's well-known Bad Batch gets far less free time than most."
"Yeah," Slowpoke agrees. "He's doing us a huge favor every time he gives arrogant new guys like that a good lick because it's arrogance that could cost our operations everything. Plus we bounce ideas off him all the time. We kinda lean on him here and there."
"Also, it was a nice reality check for those of us who were thinking we'd take another swing at Marauder's database," Easy admits. "Some of us thought we could find a way past Tech's defenses. But the truth was, we'd just forgotten that if we tried to mess with the wampa, we were gonna wake up, swinging by our ankles, in his cave."
"He did feel bad though when we told him Cody had us on scullery duty for a week after the incident," says Slowpoke. "After that, he stopped including anyone else in the narratives by name."
"Let's hear another message, Sarge," someone requests.
"Alright one more," Easy allows after consulting with and sharing a knowing look with his number two. "But just the one or we could be doin' this all night. Pick another good one for our honored guests, lads."
"The one about the butterfly!" shouts a Serpent reg, to an outpour of general agreement.
"No, do the one about the dance recital!" cries another to a similar level of assent.
"Both are fantastic, but let's have the butterfly," says Easy, swiftly and expertly breaking the tie. "Go for it, Timbre."
"Butterfly it is," says Timbre, preparing for one last little speech.
Hey comrades! I'm looking for a tattoo artist onboard... anyone have any good recs? Preferably someone good with colors because I'd like a maridun butterly on my lower back. And also, someone with a tender touch. I've extra sensitive skin and I cried a lot last time because it really, really hurt. Best regards.  
"Oh shit!" Easy exclaims. "He straight castrated that bloke!"
"He kriffing deserved it, if my memory serves," reasons Slowpoke, casually sipping his drink. "And it does."
...
Hunter and Crosshair laugh heartily together as Easy moves to finally break up the fun. The reg sergeant sends those on watch back to their stations, while Slowpoke sends those who aren't down to their barracks to get some rest. After the shop returns to a general state of order, the four clones sit together peacefully once again.
"And thus concludes the adventure of how we met your Tech long before the mishap with the Bounty Hunters," Easy declares as he pours another round for each of them.
"Well, the story officially did not disappoint," Hunter says, clinking his glass on Slowpoke's. "And to be honest, it's probably the least controversial thing Tech's accomplished with his… skills."
"Where does he even come up with that stuff? I mean, he really doesn't mess around," says Easy, still laughing. "And worse, he looks a bit funny ya know? Like someone you could mess with at the cantina. But he's a kriffing savage, he is."
"He is on another level," Hunter agrees fondly.
"He's on his own level," Slowpoke says in a sudden moment of mindfulness. "Bet it gets lonely."
"It did," Crosshair tells the reg flatly. "But that was before Echo. Now, Tech has a partner when it comes to perpetrating cyber crimes."
"That's trouble," says Easy, sounding blissfully intrigued. "Oh right, Echo! I keep forgetting that Echo's got a whole new skillset these days. Hey, do you think Echo would know how to get past Tech's security and then help us finally retaliate? Maybe he'd sympathize as one former ARC to another."
"Fuck no," says Crosshair with a dry bark of cruel laughter. "Fuck. No. And he's still an ARC."
By now, Easy and Slowpoke both understand Crosshair's aversion to sugarcoating anything. But Hunter senses that they're still startled at the rigidly abrupt change in the sharpshooter's tone. As his brother and batchmate, Hunter knows Crosshair meant nothing more than emphasis by it, so he readily smooths over any ambiguity felt by the regs.
"What my charming scout sniper means," Hunter says with a laugh and a relaxed smile. "Is sorry, that's not happening, fellas. Our ARC’s all business. He doesn’t trouble himself with devious pranks and scruples when there's work to be done.”
"Well, that and he'd never tell you," Crosshair mutters, taking a sip from his beer. "Those two have been inseparable since within hours of knowing each other. It's revolting."
"That’s true," Hunter adds. "They kinda just meshed from the start. I don't think you could even drive a lightsaber between them at this point."
"Fuck," says Easy, cautiously admiring them. "Well, cheers to them being on our side, eh boys?"
"Cheers," Hunter says in unison with Crosshair and Slowpoke as they bang their glasses together and take a long draught.
Tumblr media
Thank you so much for reading. I hope it made you smile! Reblogs, critiques, corrections, comments, and new ideas are welcome. Have a great day : ]
Easy and Slowpoke ("Slopes") are two OCs that roll over from another fic hehe! Easy is sort of a cross between Hunter and Wrecker and Slopes is almost a cross between Crosshair and Tech, and I've grown rather fond of these two helpful boys.
@amorfista @anxiouspineapple99 @wolffegirlsunite @freesia-writes @523rdrebel @sinfulsalutations @destril @zaana @queenjiru @oceanamber24 @raevulsix @enigmatist17
44 notes · View notes
feelinghaunted · 2 years
Text
jobs masterlist.
because there can never really be enough masterlists regarding jobs for muses as far as i’m concerned. jobs on here will be separated by university / town / city / cruise / entertainment, as those tend to be the main roleplay settings i see. i’m gonna try to keep these more unique as opposed to popular ones like professor, barista and bartender - just because i feel like having unique jobs would be more useful. if you found this at all helpful, please reblog / like.
Tumblr media
university.
academic advisor. 
sponsored research development manager. 
security dispatcher. 
student services evaluator. 
vocational nurse. 
university outreach specialist. 
computational scientist. 
application developer. 
maintenance specialist. 
travel and expense associate. 
project management associate. 
marketing content writer. 
graduate assistant. 
security investigator. 
administrative assistant. 
research technician. 
information technology support specialist. 
lecturer. 
coach. 
undergraduate program administrator. 
nurse coordinator. 
bookstore clerk. 
convenience store clerk.
 data visualization analyst.
town.
child and youth program lead.
veterinarian technician.
construction quality assurance analyst.
loan analyst.
art therapist.
distiller / brewmaster / winemaker.
acupuncturist. 
fashion designer.
hotel manager.
apartment front-desk staff.
barber.
banker.
babysitter.
physical therapist.
dental assistant.
handyman.
home health aid.
pet groomer.
pharmacist.
remote worker (telemarketer).
tax consultant.
city.
cybersecurity analyst.
patient service representative.
beach crew attendant.
leasing agent.
production associate.
facility maintenance technician.
rental sales agent.
flight attendant.
software engineer.
game developer.
concierge.
delivery driver.
online dating ghostwriter.
doula. 
headhunter.
bike courier.
meteorologist.
nurse-midwife.
ethical hacker.
robotics engineer.
mobile app developer.
cruise.
steward.
catering attendant. 
prep cook.
banquet server.
marketing specialist.
daycare staff.
recreation manager.
brand manager.
bellman.
deckhand.
casino dealer.
activity coordinator.
fitness instructor.
bursar. 
hr manager.
dive instructor.
electrical technician.
environmental officer.
entertainment.
videographer.
make up artist.
animator.
a&r administrator.
cinematographer.
fake food artist.
intimacy coordinator.
pyrotechnician.
breakdown artist.
animal trainer.
pr manager.
booking agent.
video editor.
publicist.
choreographer.
light technician.
audio engineer.
entertainment writer.
voice-over artist.
305 notes · View notes
loser-female · 2 months
Text
Since we're talking about the guy that got involved with a russian spy and gave away Ukrainian secrets let me tell you how these things works.
Humant Intelligence or HUMINT (we intelligence people LOVE calling things with INT at the end btw - I work for a private company doing cybersecurity not for the government and I also I'm a OSINT specialist) indicates the speciality of getting information from people. Usually these information are not considered necessarily high quality (because sources are important and "someone telling you something" is considered a secondary source), but boy. if they are not precious.
How it works?.
Well, someone gets close to you. Either by meeting you online or IRL. You will meet them in a bar or something, and these people are really able to be on your good sides.
But how to get to someone's good side? I present you MICE and RASCLS
MICE stands for: money, ideology coercion/compromise and ego.
RASCLS stands for Reciprocation, authority, scarcity, commitment and consistency, liking and social proof. It was invented to kind of surpass MICE.
If you Google RASCLS intelligence you will find a very interesting paper detailing the process of recruitment but the point is: if you stroke someone's ego enough they will give you what you want. Even state secrets. This relationship is built with time and effort from both parties like a "normal" relationship would. Except that at some point there will be an awkward conversation about what you know or what you could do for them.
But you already trust this person, so it's likely you're going to accept. You have an established relationship after all, that has been reciprocated and mutually beneficial. And people are going to accept at that point. No coercion was used, you just developed a relationship with someone that can help you and that you can help.
(you know who also is good at humint - or should be? Investigative journalists and private investigators. Intelligence techniques have applications in the civilian world too.)
Now imagine the averages user of this site how vulnerable would be at this considering the lack of social skills, the lack of a solid ideology and the lack of spending time with other humans.
8 notes · View notes