It takes a certain combination of skills, tact, and smarts to get a job doing security work for the United States government. Keeping the nation’s information secure is monumentally important, but with this being said, getting certified to hold one of these top-tier jobs is rather doable.
This week on the CBT Nuggets blog, we connected with our government contacts to give you the inside scoop on the new and improved DoD 8140, found out how you can get top secret clearance, and pondered the best parts about working for the NSA.
How You Can Get Top Secret Clearance
A security clearance is essential to landing a tech job with a government contractor or federal agency handling sensitive information. We’ve gathered four ways that you can earn the clearance you need to succeed.
How Dotgov Infosec Could be Better
A plethora of new security requirements has strengthened the act of keeping information on the .gov domain secure, including revisions to the National Institute’s Standards and Technology’s security and privacy rules for federal computer systems. But there’s always room for improvement. Here’s what we think could be done.
Why Working for the NSA Sounds Like Fun
Between the Snowden affairs, a tumultuous government landscape, and more stable jobs in the private sector, the idea of working for the NSA might give you a headache. But you know what they say about government jobs — they’re the gold standard. Here’s our reasoning why working for the NSA, or any other public sector security organization, might be the right move for you to make.
8570 and 8140 DoD Directives: What’s the Difference?
The Department of Defense Directive (DoDD) 8140 has replaced Directive 8570, creating a larger initiative and framework that effects every DoD IT professional. Here’s what you should know about the change in directives and the difference between the two documents.
How Your IT Team Can Stay DoD 8140-Compliant
When the Department of Defense passed down the new Directive 8140 in 2015, the IT training world took note. (We certainly did.) It signaled a major change in how cybersecurity training would be stratified and administered. Here’s how you can remain compliant.