Careers rarely develop the way we plan them. Our career path often takes many twists and turns, with particular events, choices and people influencing our direction.

We asked Keith Lynch from Defence Forces to give some advice for people considering this job:

Keith Lynch

Private (Line)

Defence Forces

Read more

Keith Lynch
Only enter the Defence Forces if you are willing to commit to it 100% as it is a long tough road which can be extremely rewarding if you fully engage it. Like everything in this life, you get out what you put in.

Not surprisingly, some aspect of the natural sciences will run through the Naturalists interests - from ecological awareness to nutrition and health. People with an interest in horticulture, land usage and farming (including fish) are Naturalists.

Some Naturalists focus on animals rather than plants, and may enjoy working with, training, caring for, or simply herding them. Other Naturalists will prefer working with the end result of nature's produce - the food produced from plants and animals. Naturalists like solving problems with solutions that show some sensitivity to the environmental impact of what they do. They like to see practical results, and prefer action to talking and discussing.
All Courses
PLC Progression Routes
PLC Points Calculator
CAO Points Calculator
CAO Video Guide

Whitehall College of Further Education
Dunboyne College of Further Education
Crumlin College of Further Education
Career Interviews
Sector Profiles
School Subjects (LC)
College Courses
Study Skills
Work Experience (School)
CV & Interview Preparation

Featured Article

logo imagelogo image

Return to List

Cybersecurity and Computer Forensics

Cybersecurity is a generic term given to the practice and knowledge of protecting computer systems.

There are a large number of more specific practices within cybersecurity industry such as computer forensics, anti-malware, penetration testing, systems auditing, data protection, disaster recovery, etc. Malware is the umbrella term for malicious computer applications such as viruses, trojans, network worms, etc.

What is involved in the life of working with cybersecurity on a daily basis?
The biggest part of working in cybersecurity is dealing with my customers and listening to their concerns and requirements and trying to analyse what the biggest risks for them are and how to mitigate them.

The most challenging is also the most rewarding which is the fast pace of change within this field and trying to keep up with it.

The cybersecurity industry is ever evolving to counter the ever evolving threats that are posed to modern computing. From time to time this requires international travel, conferences and training.

What to study at school?
Here are the questions you asked our panel of people who work in cybersecurity and computer forensics in Ireland.

What subjects do you think would stand you well in second level and third level to go on into cybersecurity?

James O’Gorman (Microsoft): I can’t stress highly enough how important Mathematics is for potential students, students with strong Mathematics skills will likely find some of the more challenging course material easier to comprehend.

For those that are fortunate enough to be offered courses such as “Computing” or “Computer Science” at second level will also find that there is a smoother transition to a related third-level degree.

For those who are not fortunate enough to be studying at establishments offering computing or computer science, look for third level courses that have introductory modules or offer a “foundation year”.

In terms of third-level qualifications, look for courses that offer a placement in industry and have strong ties with industry; these will help mitigate the chicken-and-egg scenario where you can’t get a job because you don’t have experience and you can’t get experience because you don’t have a job.

Could you tell me a bit more about how your career in cybersecurity started at school when your teacher challenged you to set your own grade on the school network?

James O’Gorman: I studied Computer Science at the equivalent of Leaving Certificate level. As part of the course our teacher set a practical challenge to set our own grades on the school network.

The real challenge here was to circumvent security measures to gain access to our academic records and change them. The practical was designed to get us thinking about the various types of security measures and the consequences of insufficiently protecting data.

In addition this type of practical made us realise that there are often many ways in which a “hacker” can attack a system and how a security professional must sufficiently plan to mitigate all threats.

A variety of different techniques were used by the students and after the challenge was complete we had fun discussing the various techniques and the challenges each person faced.

For those students who are interested in more generic cybersecurity roles or have not settled on a specific path I would recommend an undergraduate course in a strong science based undergraduate degree such as Computer Science, Mathematics, Electronic Engineering, etc.

Science and engineering based degrees such as these are highly sought after by employers and are also a good discipline for postgraduate degrees in reverse engineering, forensics etc when you are clearer about your chosen career path.
As a general rule of thumb, courses that have titles containing “software”, “application” and “development” will tend to focus on software whereas courses that have titles containing “electronic” or “engineering” tend to be focussed more on hardware. Computer Science or Mathematics will be more generic and will act as a good foundation for postgraduate courses.

Article by: