Running Head: IDS DESKTOP SOLUTION
1
Signature Assignment: Intrusion Detection
University of Phoenix
IDS DESKTOP SOLUTION
2
PART A
In order to successfully rollout as well as support the IDS desktop solution, the
organization will require four additional employees.
The additional employees will work with the existing desktop support as well as
malware teams to access and analyze the potential vulnerabilities for the systems of the
organization. By detecting the vulnerabilities, they can collaborate with the existing team in
order to recommend appropriate practices as well as solutions. This can help in preventing
the data and infrastructure of the organizations. The professionals can also assist the
existing cybersecurity team in ensuring compliance with the various security policies and
finally implement the IDS desktop solution (Cybersecurity Roles and Job Titles, 2019).
The job titles of the professionals who will perform the rollout as well as support
functions of the IDS desktop solutions are Security Administrator, IDS Specialist, IT
Security Specialist, and Intrusion Detection Analyst.
Security Administrator – The Security Administrator will install, administer, as well, as
troubleshoot the IDS desktop solution of the organization. The professional is also
responsible for analyzing the security systems, configuring them, and according to the
findings, recommend the best improvement to the organization. The security administrator
will perform penetration and vulnerability tests in order to identify as well as defend the
threats and develop optimum plans for disaster recovery (Security Administrator Job
Description, 2019).
IDS Specialist – The IDS Specialist will use the IDS system of the organization to identify
as well as triage the anomalies. The specialist will inspect the network packets and compare
the network traffic with the predefined signatures (Cisco IDS Specialist, 2019). The
professional is responsible for providing initial categorization of the different events and
assigning them to the incident handlers. IDS Specialist will monitor the security and
IDS DESKTOP SOLUTION
3
intrusion and accordingly report the suspicious events. The specialist will also create
customized IDS signatures on the basis of new threats. The professional will assist the
cybersecurity management team of the organization in maintaining the IDS systems
effectively (Intrusion Detection Specialist (IDS), 2019).
IT Security Specialist – IDS Security Specialist is the senior level engineer with working
experience in commercial IDS systems. The professional will be responsible for recognizing
the successful, potential, as well as unsuccessful intrusion attempts. The IDS expert will
conduct the analysis or monitoring of the IDS solution regularly to identify the deficiency,
intrusion, or other significant events that can pose a threat to the security of the
organization. The expert will offer valuable suggestions to the high level technicians and
other team members in the cybersecurity team of the organization for enhanced security
(IDS Expert (NIDS, HIDS)/IT Security Specialist (Senior), 2019).
Intrusion Detection Analyst – The intrusion detection analyst will be responsible for
monitoring the dashboard on a regular basis and detecting as well as preventing the IDS
systems of the organization. The professional will perform the initial analysis and create
essential alerts. The analyst will support the cyber defense functions and ensure optimum
protection of the IT infrastructure from potential cyber attacks.
PART B
Cybersecurity Team
IT Security Specialist
IDS Specialist
Security Administrator
IDS DESKTOP SOLUTION
4
Intrusion Detection Analyst
The infographic above shows how the different additional employees will fit within
the cybersecurity team of the organization.
Certifications
The various certifications that the additional employees need to have are listed
below.
Security Administrator
The Security Administrator must have advanced training certifications in
Cybersecurity, Computer Science, and other related fields.
IT Security Specialist
The IT Security Specialist must have certifications in CCSP/ CCNP, CISSP, and
CEH. Other certifications in network security, as well as digital forensics, will be even
more advantageous (Intrusion Detection Specialist (IDS), 2019).
IDS Specialist
The certifications essential for IDS Specialist include Certified Ethical Hacker
(CEH) certification, IDS technology certifications, network intrusion certifications, and
more (Security Administrator Job Description, 2019).
Intrusion Detection Analyst
The Intrusion Detection Analyst must have certifications such as IT Work
Certification, Cybersecurity certifications, and others.
IDS DESKTOP SOLUTION
5
References
Cybersecurity Roles and Job Titles. (2019). Retrieved November 20, 2020, from
https://www.cs.seas.gwu.edu/cybersecurity-roles-and-job-titles
Cisco IDS Specialist. (2019). Retrieved November 20, 2020, from
https://www.fieldengineer.com/skills/cisco-ids-specialist
Intrusion Detection Specialist (IDS). (2019). Retrieved November 20, 2020, from
https://www.smartrecruiters.com/AthenaTechnologyGroup/94586912-intrusion-
detection-specialist-ids-
IDS Expert (NIDS, HIDS)/IT Security Specialist (Senior). (2019). Retrieved November 20,
2020, from https://ccintercomputers.com/jobs/view/ids-expert-nids-hidsit-security-
specialist-senior/
Security Administrator Job Description. (2019). Retrieved November 20, 2020, from
https://www.betterteam.com/security-administrator-job-description