Intelligence (AI) is the talk of the world and it features prominently in
predictions for 2019 (see here and here) and recent surveys by consulting firms
and other observers of the tech scene. Here are the key findings:
Consumer adoption: “Smart speakers” lead the way to the AI-infused home of the future
speakers (e.g., Amazon Echo and Google Home) will become the fastest-growing
connected device category in history, with an installed base projected to
surpass 250 million units by the end of 2019. With sales of 164 million units
at an average selling price of $43 per unit, total smart speakers’ revenues
will reach $7 billion, up 63% from 2018. (Deloitte)
Enterprise adoption: Timid first steps
business executives say their companies have embedded at least one AI
capability in their business processes and just 21% say their organizations
have embedded AI in several parts of the business. 30% say they are piloting
20% of business executives say their companies will deploy AI across the business in 2019. (PwC)
Our client is looking for a self-motivated Security Analyst-
Tier 2 who will perform information security event analysis and utilize
vulnerability assessment software to support our clients. If you have
experience working with TCP/IP networking, network attacks, attack signatures, defense
countermeasures, vulnerability management, and log analysis than we want to
hear from you!
* In-depth investigations and analyze of traffic and alerts
* Investigate and perform in-depth analysis of exploits
* Provide network expertise to support timely and effective
decision making of when to declare an incident
* Conduct proactive threat research
* Review security events that are populated in a Security
Information and Event Management (SIEM) system
* Analyze a variety of network and host-based security
appliance logs (Firewalls, NIDS, HIDS, Sys Logs, etc.) to determine the correct
remediation actions and escalation paths for each incident
* Independently follow procedures to contain analyze and
eradicate malicious activity
* Document all activities during an incident and provide
leadership with status updates during the life cycle of the incident
* Incident management, response, and reporting
* Provide information regarding intrusion events, security
incidents, and other threat indications and warning information to the client
* Track trends, statistics, and key figured for each
* Assist with the development of processes and procedures to
improve incident response times, analysis of incident, and overall SOC
* Support reporting required on an as needed basis
* Manage Bi-weekly client support calls
* Modify Use cases and manage trends
* Daily Shift change report
* Incident reports
* Security status reports
Skills, Experience & Qualifications:
* Customer-oriented, flexible and demonstrated tendency to
go above and beyond
* Ability to communicate efficiently with clients and
internal team members at all levels and across functional and organizational
* Organizational skills and time management/ prioritization.
* Comfortable working against deadlines in a fast-paced
* 5 years of job-related experience
* SIEM Experience
* One or more of the following certifications: CISSP, GCIA,
* Security Operations Center knowledge
* TCP/IP Networking
* Familiarity with common IDS/IPS and Firewalls (Snort,
Cisco, Fortigate, Sourcefire)
* Experience with Malware Analysis and Reverse Engineering
* Prior SOC experience (can include internships)
* Experience with packet analysis and packet capture tools
Just a little light reading in case you wanted a DevOps refresh – “DefOps defined.
“DevOps is the combination of cultural philosophies, practices, and tools that increases an organization’s ability to deliver applications and services at high velocity: evolving and improving products at a faster pace than organizations using traditional software development and infrastructure management processes. This speed enables organizations to better serve their customers and compete more effectively in the market.
How DevOps Works
Under a DevOps model, development and operations teams are no longer “siloed.” Sometimes, these two teams are merged into a single team where the engineers work across the entire application lifecycle, from development and test to deployment to operations, and develop a range of skills not limited to a single function.
In some DevOps models, quality assurance and security teams may also become more tightly integrated with development and operations and throughout the application lifecycle. When security is the focus of everyone on a DevOps team, this is sometimes referred to as DevSecOps.
These teams use practices to automate processes that historically have been manual and slow. They use a technology stack and tooling which help them operate and evolve applications quickly and reliably. These tools also help engineers independently accomplish tasks (for example, deploying code or provisioning infrastructure) that normally would have required help from other teams, and this further increases a team’s velocity.
“As we move further into the new year, companies may need to harness greater amounts of their data for competition and innovation. This will not only help to solve the challenges surrounding dark data and upcoming data regulations but will also open the door to uncovering new ways to innovate with data and AI.
Data Preparation Will Shift To Support Data Science And Fuel AI
Previously, data scientists worked by the 80/20 rule, with 80% of their days spent finding and preparing data and just 20% on actual data analysis. Thanks to advancements over the last year in cloud-powered data cataloging and data refining, this equation has been flipped. By using technologies that can automatically ingest, classify and organize all of a company’s data sources, data scientists can now spend more time creating and exploring new models and projects with ready-to-go data sets instead of spending long hours priming them manually first.”
Ok – so for all of “us” who love reading but keep saying we just can’t find the time… ”
“Do you know how many books the average person reads per year?” he said. “Literally two or three, for the entire year. And yet, the average CEO is reading four or five books per month. That’s a drastic difference.”
He went on to explain how he breaks down the habit of reading for people, so that it can be a more actionable process.
I went to Amazon and looked at the medium average number of words per book, and it came out to about 64,000 words. So let’s say the average person reads 200 words per minute. We’re talking about 320 minutes to get through a book, which is about 45 minutes a day, to read a book per week. That makes it a little more realistic,” he said.
He added that 45 minutes spent reading in a day is practically nothing. That’s a lunch break, a little bit at night, maybe reading a bit on the train on the way to work, etc. And that’s without any speed-reading techniques.”
“On Tuesday, May 15, Facebook published its first ever Community Standards Enforcement Report in a continuing effort to restore public faith in the social network as it continues to combat fake news and privacy scandals.
It’s not just third-party apps getting the ax from Facebook — it’s fake accounts, too. On Tuesday, May 15, Facebook published its first ever Community Standards Enforcement Report in a continuing effort to restore public faith in the social network as it continues to combat fake news and privacy scandals.”
“For more than 250 years the fundamental drivers of economic growth have been technological innovations. The most important of these are what economists call general-purpose technologies — a category that includes the steam engine, electricity, and the internal combustion engine. Each one catalyzed waves of complementary innovations and opportunities. The internal combustion engine, for example, gave rise to cars, trucks, airplanes, chain saws, and lawnmowers, along with big-box retailers, shopping centers, cross-docking warehouses, new supply chains, and, when you think about it, suburbs. Companies as diverse as Walmart, UPS, and Uber found ways to leverage the technology to create profitable new business models.
The most important general-purpose technology of our era is artificial intelligence, particularly machine learning (ML) — that is, the machine’s ability to keep improving its performance without humans having to explain exactly how to accomplish all the tasks it’s given. Within just the past few years machine learning has become far more effective and widely available. We can now build systems that learn how to perform tasks on their own.”