SlideShare a Scribd company logo
What is [Cyber]Security
Engineering?
Harry McLaren – Managing Consultant at ECS
Harry McLaren
•Alumnus of Napier University
• Active Student Mentor
•Managing Consultant at ECS [Security]
• Splunk Enablement Lead, Engineer & Architect
• Previous Roles:
• Security Engineer, SOC Analyst, IT Technician
Coming Up:
•Definition of [Cyber]Security Engineering
•NIST Security Framework
•It’s All About the PPTs!
•Scenario Based Walkthrough
•Best Practices for Engineers in 2018
•Resources
~25mins
Building things to
protect, detect,
and respond
to threats.
[Risk Management Control]
Image Source: Fuze
Types of Engineering (Not Exhaustive!)
Systems
Deployment &
Configuration
Systems
Integration
Setup of
Automation &
Orchestration
Solution
Development
It’s All About the PPTs!
Successful
Projects
People
Process
Technology
People & Process
• Who’s the end user?
• Who’s going to
support it?
• How extensible is it?
• What are the training
requirements?
• How do people feel?
• Building champions!
• How does it fit within
the businesses IT?
• How does it align to
the company strategy?
• Does it leverage best
practices for
design/build/deploy?
• How resilient to
change is the solution?
Scenario Walkthrough
1. Business Has Problem: Security Monitoring
Desperate Data Sources, Data Siloed,
Cross-Functional Use Cases, Legacy “Big Data”
Choose a Technology:
2. Magic???
3. 1-12 Months Later…
Success!
Systems Deployment & Configuration
• High/Low-Level
Designs
• Technical Architecture
• Infrastructure Build
• Software Deployment
• Software
Configuration
Integration into Other Systems
• Data Collection
• Data On-boarding
• RESTful API
• CMDB
(Identities & Assets)
• Workflow / Ticketing
• Contextual Analysis
Setup of Automation & Orchestration
• Automated Build
• Auto-scaling
• Responsive Actions
• Version Control
• Configuration
Management
Solution Development
• Data Analytics as a Service
(DAaaS)
• Self Service
• End-to-End Business
Support & Development
• Centres of Excellence
• Solution Champions
Best Practices for Engineers in 2018
• Outcome based
Development
(Lean/Scrum/Agile)
• Version Control (VCS)
• Configuration
Management (CMS)
• Development &
Release Frameworks
(Route-to-Live)
• Capture Knowledge
• Build Lab Environments
• Containerisation for
Rapid & Mobile
Development
• Leverage Cloud Agility
• Consider Multi-Cloud
• Facilitate the Business,
Don’t be a Blocker
Resources
• Splunk/ Data Analytics
• Intro to Splunk
• Free 2-day Course
• Threat Hunting
• Agile based
Development
• Version Control 101
• Configuration
Management 101
• Getting Things Done
Methodology
• Cloud
• Free AWS Tier / Training
• Free Azure Tier / Training
• Starting with Docker
• Starting with Python
• Starting with Go
Say Hello!
@cyberharibu
linkedin.com/in/harrymclaren
harrymclaren.co.uk
Cyber Scotland Connect
•Community Directed Group (What Do You Want?)
Shape Us
•Slack! (Website Coming Soon!)
Connect with Us
•Seeking Contributions (Speaking, Practical Labs, Etc)
Share with Us
Cyber Scotland Connect: What is Security Engineering?

More Related Content

PPTX
Big Data For Threat Detection & Response
PPTX
SIEM Primer:
PPTX
EDR vs SIEM - The fight is on
PDF
INFOGRAPHIC▶ Protecting Corporate Information In the Cloud
PPSX
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
PPTX
IBM - Security Intelligence para PYMES
PPTX
Modern Security Operations & Common Roles/Competencies
PPTX
Perforce on Tour 2015 - How are You Protecting Your Source Code?
Big Data For Threat Detection & Response
SIEM Primer:
EDR vs SIEM - The fight is on
INFOGRAPHIC▶ Protecting Corporate Information In the Cloud
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
IBM - Security Intelligence para PYMES
Modern Security Operations & Common Roles/Competencies
Perforce on Tour 2015 - How are You Protecting Your Source Code?

What's hot (20)

PDF
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
PPT
Top 10 SIEM Best Practices, SANS Ask the Expert
PPTX
PaaS security challenges and solutions (salesforce vision)
PDF
Improving IR Workflow - Using Risk-Based Escalation in HP ArcSight ESM
PDF
Outpost24 webinar: Security Analytics: what's in a risk score
PPTX
Tictaclabs Managed Cyber Security Services
PDF
Outpost24 webinar - Implications when migrating to a Zero Trust model
PPTX
Best Practices for Scoping Infections and Disrupting Breaches
PPTX
Shared Security Responsibility in the AWS Public Cloud
PDF
Issa symc la 5min mr
PDF
LogSentinel Next-Gen SIEM
PDF
Top 5 Cloud Security Predictions for 2016
PDF
RSA: Security Analytics Architecture for APT
PPTX
How to Secure Your IaaS and PaaS Environments
PDF
DTS Solution - Building a SOC (Security Operations Center)
PDF
From SIEM to SOC: Crossing the Cybersecurity Chasm
PPTX
Outpost24 webinar: Risk-based approach to security assessments
PPTX
Information Security: Advanced SIEM Techniques
PDF
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
PPTX
Vulnerability Testing Services Case Study
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
Top 10 SIEM Best Practices, SANS Ask the Expert
PaaS security challenges and solutions (salesforce vision)
Improving IR Workflow - Using Risk-Based Escalation in HP ArcSight ESM
Outpost24 webinar: Security Analytics: what's in a risk score
Tictaclabs Managed Cyber Security Services
Outpost24 webinar - Implications when migrating to a Zero Trust model
Best Practices for Scoping Infections and Disrupting Breaches
Shared Security Responsibility in the AWS Public Cloud
Issa symc la 5min mr
LogSentinel Next-Gen SIEM
Top 5 Cloud Security Predictions for 2016
RSA: Security Analytics Architecture for APT
How to Secure Your IaaS and PaaS Environments
DTS Solution - Building a SOC (Security Operations Center)
From SIEM to SOC: Crossing the Cybersecurity Chasm
Outpost24 webinar: Risk-based approach to security assessments
Information Security: Advanced SIEM Techniques
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
Vulnerability Testing Services Case Study
Ad

Similar to Cyber Scotland Connect: What is Security Engineering? (20)

PDF
The What, Why, and How of DevSecOps
PDF
Road to rockstar system analyst
PDF
Ahmed Yaser CV 10-2015
PPTX
NIST Cybersecurity Framework (CSF) on the Public Cloud
PPTX
System Design introduction main content .pptx
PDF
Applying DevOps from the Mobile to the Mainframe
PDF
AppSec in an Agile World
PDF
Lynx Overview
PDF
CNIT 160 Ch 4a: Information Security Programs
PPTX
Cloud Enablement Engine Role Definition and Mapping
PDF
Machine Learning Operations Cababilities
PDF
ITAM AUS 2017 How to get SAM happily frolicking on the Cloud
PDF
CNIT 160 Ch 4a: Information Security Programs
PPTX
Security on AWS, 2021 Edition Meetup
PPTX
Security on AWS, 2021 Edition Meetup
PPTX
LSG Intro
PDF
Professional and Technology Services
PDF
ADDO_2020-Driving-Digital-Transformation-through-CloudOps-and-SRE.pdf
PPTX
Why We Need Architects (and Architecture) on Agile Projects
The What, Why, and How of DevSecOps
Road to rockstar system analyst
Ahmed Yaser CV 10-2015
NIST Cybersecurity Framework (CSF) on the Public Cloud
System Design introduction main content .pptx
Applying DevOps from the Mobile to the Mainframe
AppSec in an Agile World
Lynx Overview
CNIT 160 Ch 4a: Information Security Programs
Cloud Enablement Engine Role Definition and Mapping
Machine Learning Operations Cababilities
ITAM AUS 2017 How to get SAM happily frolicking on the Cloud
CNIT 160 Ch 4a: Information Security Programs
Security on AWS, 2021 Edition Meetup
Security on AWS, 2021 Edition Meetup
LSG Intro
Professional and Technology Services
ADDO_2020-Driving-Digital-Transformation-through-CloudOps-and-SRE.pdf
Why We Need Architects (and Architecture) on Agile Projects
Ad

More from Harry McLaren (20)

PPTX
Security Operations, MITRE ATT&CK, SOC Roles / Competencies
PPTX
Becoming a Defender (Blue Teams FTW!)
PPTX
Virtual Splunk User Group - Phantom Workbook Automation & Threat Hunting with...
PPTX
SOC Fundamental Roles & Skills
PPTX
Hunting Hard & Failing Fast (ScotSoft 2019)
PPTX
Splunk Phantom, the Endpoint Data Model & Splunk Security Essentials App!
PPTX
Collecting AWS Logs & Introducing Splunk New S3 Compatible Storage (SmartStore)
PPTX
Using Metrics for Fun, Developing with the KV Store + Javascript & News from ...
PPTX
Splunk .conf18 Updates, Config Add-on, SplDevOps
PPTX
SplDevOps: Making Splunk Development a Breeze With a Deep Dive on DevOps' Con...
PPTX
Lessons on Human Vulnerability within InfoSec/Cyber
PPTX
OWASP - Analyst, Engineer or Consultant?
PPTX
TSTAS, the Life of a Splunk Trainer and using DevOps in Splunk Development
PPTX
Cyber Scotland Connect: Getting into Cybersecurity (Deck 2)
PPTX
Cyber Scotland Connect: Getting into Cybersecurity (Deck 1)
PPTX
Cyber Scotland Connect: Welcome & Purpose Statement
PPTX
Latest Updates to Splunk from .conf 2017 Announcements
PPTX
Securing the Enterprise/Cloud with Splunk at the Centre
PPTX
Security Meetup Scotland - August 2017 (Deconstructing SIEM)
PPTX
Deconstructing SIEM
Security Operations, MITRE ATT&CK, SOC Roles / Competencies
Becoming a Defender (Blue Teams FTW!)
Virtual Splunk User Group - Phantom Workbook Automation & Threat Hunting with...
SOC Fundamental Roles & Skills
Hunting Hard & Failing Fast (ScotSoft 2019)
Splunk Phantom, the Endpoint Data Model & Splunk Security Essentials App!
Collecting AWS Logs & Introducing Splunk New S3 Compatible Storage (SmartStore)
Using Metrics for Fun, Developing with the KV Store + Javascript & News from ...
Splunk .conf18 Updates, Config Add-on, SplDevOps
SplDevOps: Making Splunk Development a Breeze With a Deep Dive on DevOps' Con...
Lessons on Human Vulnerability within InfoSec/Cyber
OWASP - Analyst, Engineer or Consultant?
TSTAS, the Life of a Splunk Trainer and using DevOps in Splunk Development
Cyber Scotland Connect: Getting into Cybersecurity (Deck 2)
Cyber Scotland Connect: Getting into Cybersecurity (Deck 1)
Cyber Scotland Connect: Welcome & Purpose Statement
Latest Updates to Splunk from .conf 2017 Announcements
Securing the Enterprise/Cloud with Splunk at the Centre
Security Meetup Scotland - August 2017 (Deconstructing SIEM)
Deconstructing SIEM

Recently uploaded (20)

PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPT
Teaching material agriculture food technology
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Cloud computing and distributed systems.
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
sap open course for s4hana steps from ECC to s4
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Spectroscopy.pptx food analysis technology
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Unlocking AI with Model Context Protocol (MCP)
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Teaching material agriculture food technology
The Rise and Fall of 3GPP – Time for a Sabbatical?
Cloud computing and distributed systems.
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
The AUB Centre for AI in Media Proposal.docx
20250228 LYD VKU AI Blended-Learning.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Chapter 3 Spatial Domain Image Processing.pdf
Network Security Unit 5.pdf for BCA BBA.
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
sap open course for s4hana steps from ECC to s4
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Spectroscopy.pptx food analysis technology
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...

Cyber Scotland Connect: What is Security Engineering?

  • 1. What is [Cyber]Security Engineering? Harry McLaren – Managing Consultant at ECS
  • 2. Harry McLaren •Alumnus of Napier University • Active Student Mentor •Managing Consultant at ECS [Security] • Splunk Enablement Lead, Engineer & Architect • Previous Roles: • Security Engineer, SOC Analyst, IT Technician
  • 3. Coming Up: •Definition of [Cyber]Security Engineering •NIST Security Framework •It’s All About the PPTs! •Scenario Based Walkthrough •Best Practices for Engineers in 2018 •Resources ~25mins
  • 4. Building things to protect, detect, and respond to threats. [Risk Management Control]
  • 6. Types of Engineering (Not Exhaustive!) Systems Deployment & Configuration Systems Integration Setup of Automation & Orchestration Solution Development
  • 7. It’s All About the PPTs! Successful Projects People Process Technology
  • 8. People & Process • Who’s the end user? • Who’s going to support it? • How extensible is it? • What are the training requirements? • How do people feel? • Building champions! • How does it fit within the businesses IT? • How does it align to the company strategy? • Does it leverage best practices for design/build/deploy? • How resilient to change is the solution?
  • 9. Scenario Walkthrough 1. Business Has Problem: Security Monitoring Desperate Data Sources, Data Siloed, Cross-Functional Use Cases, Legacy “Big Data” Choose a Technology: 2. Magic??? 3. 1-12 Months Later… Success!
  • 10. Systems Deployment & Configuration • High/Low-Level Designs • Technical Architecture • Infrastructure Build • Software Deployment • Software Configuration
  • 11. Integration into Other Systems • Data Collection • Data On-boarding • RESTful API • CMDB (Identities & Assets) • Workflow / Ticketing • Contextual Analysis
  • 12. Setup of Automation & Orchestration • Automated Build • Auto-scaling • Responsive Actions • Version Control • Configuration Management
  • 13. Solution Development • Data Analytics as a Service (DAaaS) • Self Service • End-to-End Business Support & Development • Centres of Excellence • Solution Champions
  • 14. Best Practices for Engineers in 2018 • Outcome based Development (Lean/Scrum/Agile) • Version Control (VCS) • Configuration Management (CMS) • Development & Release Frameworks (Route-to-Live) • Capture Knowledge • Build Lab Environments • Containerisation for Rapid & Mobile Development • Leverage Cloud Agility • Consider Multi-Cloud • Facilitate the Business, Don’t be a Blocker
  • 15. Resources • Splunk/ Data Analytics • Intro to Splunk • Free 2-day Course • Threat Hunting • Agile based Development • Version Control 101 • Configuration Management 101 • Getting Things Done Methodology • Cloud • Free AWS Tier / Training • Free Azure Tier / Training • Starting with Docker • Starting with Python • Starting with Go
  • 17. Cyber Scotland Connect •Community Directed Group (What Do You Want?) Shape Us •Slack! (Website Coming Soon!) Connect with Us •Seeking Contributions (Speaking, Practical Labs, Etc) Share with Us

Editor's Notes

  • #6: Image Source: https://www.fuze.com/blog/on-the-Evolving-Cybersecurity-Landscape
  • #10: Image Source: https://southpark.cc.com
  • #11: Image Source: https://aws.amazon.com/quickstart/architecture/splunk-enterprise/