What is [Cyber]Security
Engineering?
Harry McLaren – Managing Consultant at ECS
Harry McLaren
•Alumnus of Napier University
• Active Student Mentor
•Managing Consultant at ECS [Security]
• Splunk Enablement Lead, Engineer & Architect
• Previous Roles:
• Security Engineer, SOC Analyst, IT Technician
Coming Up:
•Definition of [Cyber]Security Engineering
•NIST Security Framework
•It’s All About the PPTs!
•Scenario Based Walkthrough
•Best Practices for Engineers in 2018
•Resources
~25mins
Building things to
protect, detect,
and respond
to threats.
[Risk Management Control]
Image Source: Fuze
Types of Engineering (Not Exhaustive!)
Systems
Deployment &
Configuration
Systems
Integration
Setup of
Automation &
Orchestration
Solution
Development
It’s All About the PPTs!
Successful
Projects
People
Process
Technology
People & Process
• Who’s the end user?
• Who’s going to
support it?
• How extensible is it?
• What are the training
requirements?
• How do people feel?
• Building champions!
• How does it fit within
the businesses IT?
• How does it align to
the company strategy?
• Does it leverage best
practices for
design/build/deploy?
• How resilient to
change is the solution?
Scenario Walkthrough
1. Business Has Problem: Security Monitoring
Desperate Data Sources, Data Siloed,
Cross-Functional Use Cases, Legacy “Big Data”
Choose a Technology:
2. Magic???
3. 1-12 Months Later…
Success!
Systems Deployment & Configuration
• High/Low-Level
Designs
• Technical Architecture
• Infrastructure Build
• Software Deployment
• Software
Configuration
Integration into Other Systems
• Data Collection
• Data On-boarding
• RESTful API
• CMDB
(Identities & Assets)
• Workflow / Ticketing
• Contextual Analysis
Setup of Automation & Orchestration
• Automated Build
• Auto-scaling
• Responsive Actions
• Version Control
• Configuration
Management
Solution Development
• Data Analytics as a Service
(DAaaS)
• Self Service
• End-to-End Business
Support & Development
• Centres of Excellence
• Solution Champions
Best Practices for Engineers in 2018
• Outcome based
Development
(Lean/Scrum/Agile)
• Version Control (VCS)
• Configuration
Management (CMS)
• Development &
Release Frameworks
(Route-to-Live)
• Capture Knowledge
• Build Lab Environments
• Containerisation for
Rapid & Mobile
Development
• Leverage Cloud Agility
• Consider Multi-Cloud
• Facilitate the Business,
Don’t be a Blocker
Resources
• Splunk/ Data Analytics
• Intro to Splunk
• Free 2-day Course
• Threat Hunting
• Agile based
Development
• Version Control 101
• Configuration
Management 101
• Getting Things Done
Methodology
• Cloud
• Free AWS Tier / Training
• Free Azure Tier / Training
• Starting with Docker
• Starting with Python
• Starting with Go
Say Hello!
@cyberharibu
linkedin.com/in/harrymclaren
harrymclaren.co.uk
Cyber Scotland Connect
•Community Directed Group (What Do You Want?)
Shape Us
•Slack! (Website Coming Soon!)
Connect with Us
•Seeking Contributions (Speaking, Practical Labs, Etc)
Share with Us
Cyber Scotland Connect: What is Security Engineering?

More Related Content

PPTX
Big Data For Threat Detection & Response
PPTX
SIEM Primer:
PPTX
EDR vs SIEM - The fight is on
PDF
INFOGRAPHIC▶ Protecting Corporate Information In the Cloud
PPSX
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
PPTX
IBM - Security Intelligence para PYMES
PPTX
Modern Security Operations & Common Roles/Competencies
PPTX
Perforce on Tour 2015 - How are You Protecting Your Source Code?
Big Data For Threat Detection & Response
SIEM Primer:
EDR vs SIEM - The fight is on
INFOGRAPHIC▶ Protecting Corporate Information In the Cloud
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
IBM - Security Intelligence para PYMES
Modern Security Operations & Common Roles/Competencies
Perforce on Tour 2015 - How are You Protecting Your Source Code?

What's hot (20)

PDF
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
PPT
Top 10 SIEM Best Practices, SANS Ask the Expert
PPTX
PaaS security challenges and solutions (salesforce vision)
PDF
Improving IR Workflow - Using Risk-Based Escalation in HP ArcSight ESM
PDF
Outpost24 webinar: Security Analytics: what's in a risk score
PPTX
Tictaclabs Managed Cyber Security Services
PDF
Outpost24 webinar - Implications when migrating to a Zero Trust model
PPTX
Best Practices for Scoping Infections and Disrupting Breaches
PPTX
Shared Security Responsibility in the AWS Public Cloud
PDF
Issa symc la 5min mr
PDF
LogSentinel Next-Gen SIEM
PDF
Top 5 Cloud Security Predictions for 2016
PDF
RSA: Security Analytics Architecture for APT
PPTX
How to Secure Your IaaS and PaaS Environments
PDF
DTS Solution - Building a SOC (Security Operations Center)
PDF
From SIEM to SOC: Crossing the Cybersecurity Chasm
PPTX
Outpost24 webinar: Risk-based approach to security assessments
PPTX
Information Security: Advanced SIEM Techniques
PDF
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
PPTX
Vulnerability Testing Services Case Study
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
Top 10 SIEM Best Practices, SANS Ask the Expert
PaaS security challenges and solutions (salesforce vision)
Improving IR Workflow - Using Risk-Based Escalation in HP ArcSight ESM
Outpost24 webinar: Security Analytics: what's in a risk score
Tictaclabs Managed Cyber Security Services
Outpost24 webinar - Implications when migrating to a Zero Trust model
Best Practices for Scoping Infections and Disrupting Breaches
Shared Security Responsibility in the AWS Public Cloud
Issa symc la 5min mr
LogSentinel Next-Gen SIEM
Top 5 Cloud Security Predictions for 2016
RSA: Security Analytics Architecture for APT
How to Secure Your IaaS and PaaS Environments
DTS Solution - Building a SOC (Security Operations Center)
From SIEM to SOC: Crossing the Cybersecurity Chasm
Outpost24 webinar: Risk-based approach to security assessments
Information Security: Advanced SIEM Techniques
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
Vulnerability Testing Services Case Study
Ad

Similar to Cyber Scotland Connect: What is Security Engineering? (20)

PDF
Devops, Secops, Opsec, DevSec *ops *.* ?
PPTX
Software-Engineering-and-Best-Practices.
PDF
Configuration management: automating and rationalizing server setup with CFEn...
PDF
Configuration management: automating and rationalizing server setup with CFEn...
PPTX
Splunk User Group Edinburgh - September Event
PPTX
SplunkLive! Paris 2018: Legacy SIEM to Splunk
PDF
Oracle Systems _ Kevin Mcisaac _ The IT Landscape has changes - have you_.pdf
PDF
Coding Secure Infrastructure in the Cloud using the PIE framework
PPTX
DevOps and the cloud: all hail the (developer) king - Daniel Bryant, Steve Poole
PPTX
DevoxxUK 2016: "DevOps: Microservices, containers, platforms, tooling... Oh y...
PDF
The Return of the Dull Stack Engineer
PPTX
OWASP - Analyst, Engineer or Consultant?
PDF
Productivity Engineering: Surviving DevOps
PPTX
JAXLondon 2015 "DevOps and the Cloud: All Hail the (Developer) King"
PDF
The What, Why, and How of DevSecOps
PPTX
Best Practices for a CoE
PDF
Why we got to Docker
PDF
Modern Web development and operations practices
PPTX
Splunk für Security
PDF
SFBA Splunk Usergroup meeting March 13, 2024
Devops, Secops, Opsec, DevSec *ops *.* ?
Software-Engineering-and-Best-Practices.
Configuration management: automating and rationalizing server setup with CFEn...
Configuration management: automating and rationalizing server setup with CFEn...
Splunk User Group Edinburgh - September Event
SplunkLive! Paris 2018: Legacy SIEM to Splunk
Oracle Systems _ Kevin Mcisaac _ The IT Landscape has changes - have you_.pdf
Coding Secure Infrastructure in the Cloud using the PIE framework
DevOps and the cloud: all hail the (developer) king - Daniel Bryant, Steve Poole
DevoxxUK 2016: "DevOps: Microservices, containers, platforms, tooling... Oh y...
The Return of the Dull Stack Engineer
OWASP - Analyst, Engineer or Consultant?
Productivity Engineering: Surviving DevOps
JAXLondon 2015 "DevOps and the Cloud: All Hail the (Developer) King"
The What, Why, and How of DevSecOps
Best Practices for a CoE
Why we got to Docker
Modern Web development and operations practices
Splunk für Security
SFBA Splunk Usergroup meeting March 13, 2024
Ad

More from Harry McLaren (20)

PPTX
Security Operations, MITRE ATT&CK, SOC Roles / Competencies
PPTX
Becoming a Defender (Blue Teams FTW!)
PPTX
Virtual Splunk User Group - Phantom Workbook Automation & Threat Hunting with...
PPTX
SOC Fundamental Roles & Skills
PPTX
Hunting Hard & Failing Fast (ScotSoft 2019)
PPTX
Splunk Phantom, the Endpoint Data Model & Splunk Security Essentials App!
PPTX
Collecting AWS Logs & Introducing Splunk New S3 Compatible Storage (SmartStore)
PPTX
Using Metrics for Fun, Developing with the KV Store + Javascript & News from ...
PPTX
Splunk .conf18 Updates, Config Add-on, SplDevOps
PPTX
SplDevOps: Making Splunk Development a Breeze With a Deep Dive on DevOps' Con...
PPTX
Lessons on Human Vulnerability within InfoSec/Cyber
PPTX
TSTAS, the Life of a Splunk Trainer and using DevOps in Splunk Development
PPTX
Cyber Scotland Connect: Getting into Cybersecurity (Deck 2)
PPTX
Cyber Scotland Connect: Getting into Cybersecurity (Deck 1)
PPTX
Cyber Scotland Connect: Welcome & Purpose Statement
PPTX
Latest Updates to Splunk from .conf 2017 Announcements
PPTX
Securing the Enterprise/Cloud with Splunk at the Centre
PPTX
Security Meetup Scotland - August 2017 (Deconstructing SIEM)
PPTX
Deconstructing SIEM
PPTX
Supporting Splunk at Scale, Splunking at Home & Introduction to Enterprise Se...
Security Operations, MITRE ATT&CK, SOC Roles / Competencies
Becoming a Defender (Blue Teams FTW!)
Virtual Splunk User Group - Phantom Workbook Automation & Threat Hunting with...
SOC Fundamental Roles & Skills
Hunting Hard & Failing Fast (ScotSoft 2019)
Splunk Phantom, the Endpoint Data Model & Splunk Security Essentials App!
Collecting AWS Logs & Introducing Splunk New S3 Compatible Storage (SmartStore)
Using Metrics for Fun, Developing with the KV Store + Javascript & News from ...
Splunk .conf18 Updates, Config Add-on, SplDevOps
SplDevOps: Making Splunk Development a Breeze With a Deep Dive on DevOps' Con...
Lessons on Human Vulnerability within InfoSec/Cyber
TSTAS, the Life of a Splunk Trainer and using DevOps in Splunk Development
Cyber Scotland Connect: Getting into Cybersecurity (Deck 2)
Cyber Scotland Connect: Getting into Cybersecurity (Deck 1)
Cyber Scotland Connect: Welcome & Purpose Statement
Latest Updates to Splunk from .conf 2017 Announcements
Securing the Enterprise/Cloud with Splunk at the Centre
Security Meetup Scotland - August 2017 (Deconstructing SIEM)
Deconstructing SIEM
Supporting Splunk at Scale, Splunking at Home & Introduction to Enterprise Se...

Recently uploaded (20)

PPT
What is a Computer? Input Devices /output devices
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PPT
Geologic Time for studying geology for geologist
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PPTX
Modernising the Digital Integration Hub
PDF
WOOl fibre morphology and structure.pdf for textiles
PPTX
Web Crawler for Trend Tracking Gen Z Insights.pptx
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
Architecture types and enterprise applications.pdf
PPTX
Tartificialntelligence_presentation.pptx
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
CloudStack 4.21: First Look Webinar slides
DOCX
search engine optimization ppt fir known well about this
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Hindi spoken digit analysis for native and non-native speakers
What is a Computer? Input Devices /output devices
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
Geologic Time for studying geology for geologist
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Modernising the Digital Integration Hub
WOOl fibre morphology and structure.pdf for textiles
Web Crawler for Trend Tracking Gen Z Insights.pptx
Assigned Numbers - 2025 - Bluetooth® Document
sustainability-14-14877-v2.pddhzftheheeeee
Taming the Chaos: How to Turn Unstructured Data into Decisions
Enhancing emotion recognition model for a student engagement use case through...
A review of recent deep learning applications in wood surface defect identifi...
Architecture types and enterprise applications.pdf
Tartificialntelligence_presentation.pptx
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
CloudStack 4.21: First Look Webinar slides
search engine optimization ppt fir known well about this
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Zenith AI: Advanced Artificial Intelligence
Hindi spoken digit analysis for native and non-native speakers

Cyber Scotland Connect: What is Security Engineering?

  • 1. What is [Cyber]Security Engineering? Harry McLaren – Managing Consultant at ECS
  • 2. Harry McLaren •Alumnus of Napier University • Active Student Mentor •Managing Consultant at ECS [Security] • Splunk Enablement Lead, Engineer & Architect • Previous Roles: • Security Engineer, SOC Analyst, IT Technician
  • 3. Coming Up: •Definition of [Cyber]Security Engineering •NIST Security Framework •It’s All About the PPTs! •Scenario Based Walkthrough •Best Practices for Engineers in 2018 •Resources ~25mins
  • 4. Building things to protect, detect, and respond to threats. [Risk Management Control]
  • 6. Types of Engineering (Not Exhaustive!) Systems Deployment & Configuration Systems Integration Setup of Automation & Orchestration Solution Development
  • 7. It’s All About the PPTs! Successful Projects People Process Technology
  • 8. People & Process • Who’s the end user? • Who’s going to support it? • How extensible is it? • What are the training requirements? • How do people feel? • Building champions! • How does it fit within the businesses IT? • How does it align to the company strategy? • Does it leverage best practices for design/build/deploy? • How resilient to change is the solution?
  • 9. Scenario Walkthrough 1. Business Has Problem: Security Monitoring Desperate Data Sources, Data Siloed, Cross-Functional Use Cases, Legacy “Big Data” Choose a Technology: 2. Magic??? 3. 1-12 Months Later… Success!
  • 10. Systems Deployment & Configuration • High/Low-Level Designs • Technical Architecture • Infrastructure Build • Software Deployment • Software Configuration
  • 11. Integration into Other Systems • Data Collection • Data On-boarding • RESTful API • CMDB (Identities & Assets) • Workflow / Ticketing • Contextual Analysis
  • 12. Setup of Automation & Orchestration • Automated Build • Auto-scaling • Responsive Actions • Version Control • Configuration Management
  • 13. Solution Development • Data Analytics as a Service (DAaaS) • Self Service • End-to-End Business Support & Development • Centres of Excellence • Solution Champions
  • 14. Best Practices for Engineers in 2018 • Outcome based Development (Lean/Scrum/Agile) • Version Control (VCS) • Configuration Management (CMS) • Development & Release Frameworks (Route-to-Live) • Capture Knowledge • Build Lab Environments • Containerisation for Rapid & Mobile Development • Leverage Cloud Agility • Consider Multi-Cloud • Facilitate the Business, Don’t be a Blocker
  • 15. Resources • Splunk/ Data Analytics • Intro to Splunk • Free 2-day Course • Threat Hunting • Agile based Development • Version Control 101 • Configuration Management 101 • Getting Things Done Methodology • Cloud • Free AWS Tier / Training • Free Azure Tier / Training • Starting with Docker • Starting with Python • Starting with Go
  • 17. Cyber Scotland Connect •Community Directed Group (What Do You Want?) Shape Us •Slack! (Website Coming Soon!) Connect with Us •Seeking Contributions (Speaking, Practical Labs, Etc) Share with Us

Editor's Notes

  • #6: Image Source: https://www.fuze.com/blog/on-the-Evolving-Cybersecurity-Landscape
  • #10: Image Source: https://southpark.cc.com
  • #11: Image Source: https://aws.amazon.com/quickstart/architecture/splunk-enterprise/