A day in the life of a cybersecurity expert
In part two of our three-part Stay Smart Online blog series, we meet Alexis Coupe, a cybersecurity analyst at nbn. Alexis talks to us about the importance of cyber security and shares his top security tip.
This week is Stay Smart Online Week, a government initiative to raise awareness amongst Australians about how they can help protect themselves and their businesses online.
To mark this, we are publishing a three-part blog series about cyber security.
In this post, we meet Alexis Coupe, a cybersecurity analyst at nbn, who talks to us about the importance of cyber security and shares his top security tip.
So Alexis, you're an nbn Cyber Analyst, what does that actually mean?
A Cyber Security Analyst, to some extent, is like the cyber police.
They help prevent cyber-attacks, primarily through their expertise in identifying a security event as an intrusion attempt or just common network traffic.
It’s the role of a cyber-analyst to understand the links between security and business threats (such as networks, databases, firewalls, web applications, etc) and offer proactive and dynamic solutions to identify threats and incidents.
Through constant monitoring and analysis of the network, we seek to detect the theft of sensitive information, spreading of malware, phishing campaigns, and the occasional network intrusion.
That being said, it’s not like CSI (Crime Scene Investigation): it’s 80 per cent cyber analysis and 20 per cent excitement!
What does a typical day look like for you?
Each day is different and that’s the amazing part of my work.
In theory, we typically cut a day into different sections:
I spend about 10 per cent of my time following the international security news and social networks in order to identify new threats as current phishing campaigns, or zero days which might be exploited on the internet.
Alexis Coupe, nbn's Cybersecurity Analyst
It is critical that our security systems are updated to help protect against hackers, and we have access to the latest security toolkits. This is to make sure we know what the bad guys are doing and occasionally, use the tools in our lab to see how they work.
Fifty per cent of my time is spent dealing with current detections and incidents.
We interpret a security event and identify it as either a real attack or normal traffic. Approximately 40 per cent of my time is spent on the detection of new threats and R&D, which I enjoy the most about my job!
We do a lot of internal development and it gives me the opportunity to help build the security operations centre.
If you could give everyone reading this article one cyber security tip, what would it be?
Get a good practice for password management! Passwords with at least eight characters containing a mix of lower-case, upper-case characters, numbers, and punctuation marks are ideal.
Most people register on numerous websites with the same credentials and – believe it or not - even share their passwords with others – a security no-no.
Usually, the same password or a derivative of it is used for online banking access, email address, or other sensitive data.
With multiple websites requiring sign-ons, similar or same passwords, it can make it pretty easy for a malicious person to steal data, sensitive information and even money.
Using different passwords for different websites ensures that even if a website is hacked and your credentials are disclosed on the Internet, there will be no impact to your other accounts.
What’s the coolest part of your job?
The coolest part of my job is certainly the detection of new threats!. To be able to do that effectively, we often need to think as an attacker and get creative.
When hackers decide to steal confidential documents, they try to make sure that they are not detected by the security team so they can come back in the future.
If that looks like your password, it's time to change it.
We try and get ahead in the game by simulating those activities and then trying to detect it ourselves.
We have the chance to play two different roles in one job (attack and defence) which allow the cyber security analysts to enhance their skills.
New security toolkits and techniques are released into market every day. It's a great job where the term "boring" doesn't exist!
What’s your cyber security tip for businesses?
A good practice is to understand the threat relative to the business, have the ability to detect a theft or a breach when it happens, and establish an immediate response plan when an incident occurs to minimise the potential loss.
Once an organisation understands this challenge about security, it will be able to invest time and money on an adequate detection and response.
What’s your favourite piece of technology and why?
It's difficult to answer this question as I'm very addicted to technology! I could say laptop, Raspberry pi, mobile phone, DSLR, Chromecast, but I’ll simply say: The internet!
I couldn't live without Internet, just like many others. With this technology, we’re able to do anything from connecting with people, researching references in the biggest library in the world, booking a restaurant or a holiday.
It also gave me my job and my hobbies!
In Part Three of this series, we offer tips for small businesses to stay smart online and keep their businesses secure. Part three will be published on Friday, October 16.