โŒ

Reading view

There are new articles available, click to refresh the page.

HP, ์ตœ๋Œ€ 6,000๋ช… ๊ฐ์› ์˜ˆ๊ณ ยทยทยท์›์ธ์€ โ€œAI ์ „ํ™˜๊ณผ ๋ถ€ํ’ˆ ๊ฐ€๊ฒฉ ์ƒ์Šนโ€

HP๊ฐ€ 2028๋…„๊นŒ์ง€ 4,000๋ช…์—์„œ 6,000๋ช… ๊ทœ๋ชจ์˜ ์ธ๋ ฅ์„ ๊ฐ์ถ•ํ•  ๊ณ„ํš์ด๋ผ๊ณ  ๋ฐํ˜”๋‹ค. HP๋Š” 10์–ต ๋‹ฌ๋Ÿฌ ์ ˆ๊ฐ์„ ๋ชฉํ‘œ๋กœ ํ•œ AI ์ „ํ™˜ ์ „๋žต์˜ ์ผํ™˜์ด๋ผ๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค.

HP CEO ์—”๋ฆฌ์ผ€ ๋กœ๋ ˆ์Šค๋Š” ์ง€๋‚œ 25์ผ ์ง„ํ–‰๋œ ์‹ค์  ๋ฐœํ‘œ ํ›„ ์ปจํผ๋Ÿฐ์Šค์ฝœ์—์„œ ์ด๋ฒˆ ๊ฐ์›์ด ์ œํ’ˆ ๊ฐœ๋ฐœ, ๋‚ด๋ถ€ ์šด์˜, ๊ณ ๊ฐ ์ง€์› ๋ถ€์„œ๋ฅผ ์ค‘์‹ฌ์œผ๋กœ ์ด๋ค„์งˆ ๊ฒƒ์ด๋ผ๊ณ  ์–ธ๊ธ‰ํ–ˆ๋‹ค. HP๋Š” ๊ตฌ์กฐ์กฐ์ • ๋น„์šฉ์ด ์•ฝ 6์–ต 5,000๋งŒ ๋‹ฌ๋Ÿฌ์— ์ด๋ฅผ ๊ฒƒ์œผ๋กœ ์˜ˆ์ƒํ•˜๋ฉฐ, ์ด ๊ฐ€์šด๋ฐ 2์–ต 5,000๋งŒ ๋‹ฌ๋Ÿฌ๊ฐ€ 2026 ํšŒ๊ณ„์—ฐ๋„์— ๋ฐ˜์˜๋  ๊ฒƒ์ด๋ผ๊ณ  ๋ฐํ˜”๋‹ค.

๋กœ๋ ˆ์Šค๋Š” ์ปจํผ๋Ÿฐ์Šค์ฝœ์—์„œ โ€œ์ด๋ฒˆ ์กฐ์น˜๋ฅผ ํ†ตํ•ด 3๋…„์— ๊ฑธ์ณ 10์–ต ๋‹ฌ๋Ÿฌ ๊ทœ๋ชจ์˜ ์—ฐ๊ฐ„ ๋น„์šฉ ์ ˆ๊ฐ ํšจ๊ณผ๊ฐ€ ๋ฐœ์ƒํ•  ๊ฒƒ์œผ๋กœ ์˜ˆ์ƒํ•œ๋‹ค. ํšŒ์‚ฌ๊ฐ€ ๊ฒฝ์Ÿ๋ ฅ์„ ์œ ์ง€ํ•˜๊ธฐ ์œ„ํ•ด ๋ฐ˜๋“œ์‹œ ํ•„์š”ํ•œ ์ผโ€์ด๋ผ๊ณ  ๋งํ–ˆ๋‹ค.

HP๋Š” ์ด๋ฒˆ ๊ฐ์›์„ AI ๊ธฐ๋ฐ˜์œผ๋กœ ๋น„์ฆˆ๋‹ˆ์Šค ํ”„๋กœ์„ธ์Šค๋ฅผ ์žฌ์„ค๊ณ„ํ•˜๊ธฐ ์œ„ํ•œ ํ•„์ˆ˜ ์กฐ์น˜๋กœ ๊ทœ์ •ํ–ˆ๋‹ค. ํšŒ์‚ฌ๋Š” ์ง€๋‚œ 2๋…„๊ฐ„ ์ œํ’ˆ ๊ฐœ๋ฐœ, ๊ณ ๊ฐ ์„œ๋น„์Šค, ์šด์˜ ํ”„๋กœ์„ธ์Šค ์ „๋ฐ˜์—์„œ AI ํ™œ์šฉ์„ ์‹œ๋ฒ” ์ ์šฉํ•ด ์™”์œผ๋ฉฐ, ์ด์ œ ์ „์‚ฌ๋กœ ํ™•๋Œ€ํ•˜๋Š” ๋‹จ๊ณ„์— ๋“ค์–ด์„ฐ๋‹ค๊ณ  ์–ธ๊ธ‰ํ–ˆ๋‹ค.

๋กœ๋ ˆ์Šค๋Š” โ€œ์šฐ๋ฆฌ๊ฐ€ ํ™•์ธํ•œ ๊ฒƒ์€ ํ”„๋กœ์„ธ์Šค ์žฌ์„ค๊ณ„๋ถ€ํ„ฐ ์‹œ์ž‘ํ•ด์•ผ ํ•œ๋‹ค๋Š” ์ ์ด๋‹ค. AI, ํŠนํžˆ ์—์ด์ „ํ‹ฑ AI๋ฅผ ํ™œ์šฉํ•ด ํ”„๋กœ์„ธ์Šค๋ฅผ ์žฌ๊ตฌ์„ฑํ•˜๋ฉด ์ƒ๋‹นํ•œ ํšจ๊ณผ๋ฅผ ๊ฑฐ๋‘˜ ๊ฒƒ์œผ๋กœ ๋ณด์ธ๋‹คโ€๋ผ๊ณ  ๋งํ–ˆ๋‹ค.

HP๋Š” ์ ˆ๊ฐ๋  10์–ต ๋‹ฌ๋Ÿฌ๋ฅผ ์ œํ’ˆ ํ˜์‹  ๊ฐ€์†์— 20%, ๊ณ ๊ฐ ๋งŒ์กฑ๋„ ํ–ฅ์ƒ์— 40%, ์ƒ์‚ฐ์„ฑ ์ œ๊ณ ์— 40% ๋น„์œจ๋กœ ๋ฐฐ๋ถ„ํ•  ๊ณ„ํš์ด๋ผ๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค.

๋ถ„์„๊ฐ€๋Š” ์˜๋ฌธ ์ œ๊ธฐ

HP๋Š” ์ด๋ฒˆ ์กฐ์น˜๋ฅผ AI ํ™œ์šฉ์„ ์œ„ํ•œ ์ „ํ™˜์ด๋ผ๊ณ  ์„ค๋ช…ํ–ˆ์ง€๋งŒ, ์ผ๋ถ€ ๋ถ„์„๊ฐ€๋Š” ์‹ค์ œ ๊ฐ์›์ด AI์˜ ์ƒ์‚ฐ์„ฑ ํ–ฅ์ƒ ๋•Œ๋ฌธ์ธ์ง€, ์•„๋‹ˆ๋ฉด ์ „ํ†ต์ ์ธ ๋น„์šฉ ์••๋ฐ•์— ๋”ฐ๋ฅธ ์กฐ์น˜์ธ์ง€์— ๋Œ€ํ•ด ์˜๋ฌธ์„ ์ œ์‹œํ–ˆ๋‹ค.

๊ทธ๋ ˆ์ดํ•˜์šด๋“œ๋ฆฌ์„œ์น˜์˜ ์ตœ๊ณ ์• ๋„๋ฆฌ์ŠคํŠธ ์‚ฐ์น˜ํŠธ ๋น„๋ฅด ๊ณ ๊ธฐ์•„๋Š” โ€œHP์˜ ์ง์› ๊ฐ์ถ•์€ ๋‹จ๊ธฐ์ ์ธ AI ํ™œ์šฉ ํšจ๊ณผ๋ณด๋‹ค๋Š” ๋น„์šฉ ํ†ต์ œ ๋ชฉ์ ์ด ๋” ํฌ๊ฒŒ ์ž‘์šฉํ•œ ๊ฒƒ์œผ๋กœ ๋ณด์ธ๋‹คโ€๋ผ๋ฉฐ, โ€œํšŒ์‚ฌ๋Š” ์ด๋ฒˆ ์กฐ์น˜๋ฅผ AI ์ „ํ™˜ ์ „๋žต์˜ ์ผํ™˜์œผ๋กœ ์„ค๋ช…ํ–ˆ์ง€๋งŒ, PC ์ˆ˜์š” ๋‘”ํ™”, ๋ถ€ํ’ˆ ๊ฐ€๊ฒฉ ๊ธ‰๋“ฑ, ์ฃผ์š” ์‚ฌ์—… ๋ถ€๋ฌธ์˜ ๋งˆ์ง„ ์••๋ฐ• ๋“ฑ ๊ธˆ์œต ์ง€ํ‘œ๋ฅผ ๋ณด๋ฉด ๋ณด๋‹ค ์ „ํ†ต์ ์ธ ๋น„์šฉ ์ ˆ๊ฐ ๋ฌธ์ œ๋กœ ํ•ด์„๋œ๋‹คโ€๋ผ๊ณ  ๋งํ–ˆ๋‹ค.

์ด๋ฒˆ ๊ฐ์›์€ HP๊ฐ€ ์˜ฌํ•ด 2์›” 1,000๋ช…์—์„œ 2,000๋ช… ๊ทœ๋ชจ์˜ ์ธ๋ ฅ์„ ์ค„์ธ ๋ฐ ์ด์–ด ์ง„ํ–‰๋˜๋Š” ์ถ”๊ฐ€ ์กฐ์น˜๋‹ค. ๊ทธ ์ด์ „์—๋Š” 2022๋…„ 11์›” ์‹œ์ž‘๋œ โ€˜ํ“จ์ฒ˜ ๋ ˆ๋”” ํŠธ๋žœ์Šคํฌ๋ฉ”์ด์…˜(Future Ready Transformation)โ€™ ํ”„๋กœ๊ทธ๋žจ์„ ํ†ตํ•ด ์ด 9,400๋ช…์ด ์˜ํ–ฅ์„ ๋ฐ›์•˜๋‹ค. ๋ˆ„์ ๋œ ๊ฐ์› ๊ทœ๋ชจ๊ฐ€ ์ปค์ง€๋ฉด์„œ HP์˜ ์šด์˜ ์—ฐ์†์„ฑ์— ๋Œ€ํ•œ ์šฐ๋ ค๋„ ์ œ๊ธฐ๋˜๊ณ  ์žˆ๋‹ค.

์„œ๋น„์Šค ๋ฐ ๊ฐ€๊ฒฉ ๋ถˆํ™•์‹ค์„ฑ ์ง๋ฉด

ํ•˜๋“œ์›จ์–ด ๊ต์ฒด๋ฅผ ๊ณ„ํšํ•˜๊ฑฐ๋‚˜ ๋ฒค๋” ๊ด€๊ณ„๋ฅผ ๊ด€๋ฆฌํ•˜๋Š” CIO ์ž…์žฅ์—์„œ๋Š” ์ด๋ฒˆ ๊ตฌ์กฐ์กฐ์ •์ด ์„œ๋น„์Šค ์ˆ˜์ค€๊ณผ ๋‚ฉ๊ธฐ์ผ์— ์–ด๋–ค ์˜ํ–ฅ์„ ๋ฏธ์น ์ง€ ์šฐ๋ คํ•  ๋งŒํ•˜๋‹ค. ์—ฌ๊ธฐ์— ๋ฉ”๋ชจ๋ฆฌ ๊ฐ€๊ฒฉ ์ƒ์Šน ์••๋ฐ•๊นŒ์ง€ ๋”ํ•ด์ง€๋ฉด์„œ ํ–ฅํ›„ ์ œํ’ˆ ๊ฐ€๊ฒฉ ์ธ์ƒ์ด ๋ถˆ๊ฐ€ํ”ผํ•˜๋‹ค๋Š” ์‹ ํ˜ธ๋„ ๋‚˜์˜ค๊ณ  ์žˆ๋‹ค.

๊ณ ๊ธฐ์•„๋Š” HP์™€ ์œ ์‚ฌํ•œ ๊ตฌ์กฐ์กฐ์ •์„ ์ง„ํ–‰ ์ค‘์ธ ์—ฌ๋Ÿฌ ๋ฒค๋”์—์„œ ์ด๋ฏธ ์šด์˜์ƒ์˜ ๋ฌธ์ œ๊ฐ€ ๋“œ๋Ÿฌ๋‚˜๊ณ  ์žˆ๋‹ค๊ณ  ์ง€์ ํ–ˆ๋‹ค. ๋˜ํ•œ ๊ทธ๋Š” โ€œ์ผ๋ถ€ HP ๊ณ ๊ฐ์€ ์ง€์—ญ ์ง€์› ์กฐ์ง์ด ์žฌํŽธ๋œ ์ดํ›„ ๋ณด์ฆ ์ˆ˜๋ฆฌ ์ฒ˜๋ฆฌ ์†๋„๊ฐ€ ๋Šฆ์–ด์ง€๊ณ , ์žฌ๊ณ  ์ •๋ณด ์—…๋ฐ์ดํŠธ๋„ ์˜ˆ์ธกํ•˜๊ธฐ ์–ด๋ ต๋‹ค๋Š” ๋ถˆ๋งŒ์„ ์ œ๊ธฐํ•˜๊ณ  ์žˆ๋‹คโ€๋ผ๊ณ  ๋งํ–ˆ๋‹ค.

๊ณ ๊ธฐ์•„๋Š” โ€œCIO๋Š” ๊ณ„์ • ๊ด€๋ฆฌํŒ€๊ณผ ์ง์ ‘ ๋…ผ์˜ํ•ด ์–ด๋–ค ๋ณ€ํ™”๊ฐ€ ์ง„ํ–‰๋˜๊ณ  ์žˆ๋Š”์ง€ ํŒŒ์•…ํ•˜๊ณ , ๋ˆ„๊ฐ€ ์–ด๋–ค ์˜์—ญ์˜ ์ „๋‹ฌ ์ฑ…์ž„์„ ๋งก๋Š”์ง€ ๋ช…ํ™•ํžˆ ํ•ด์•ผ ํ•œ๋‹ค. ๋˜ํ•œ ๊ตฌ์กฐ์กฐ์ • ์ด์ „์— ์ฒด๊ฒฐ๋œ ์ง€์›ยท์„œ๋น„์Šค ๊ณ„์•ฝ์ด ์žˆ๋‹ค๋ฉด ์ด๋ฅผ ๋‹ค์‹œ ๊ฒ€ํ† ํ•  ํ•„์š”๊ฐ€ ์žˆ๋‹คโ€๋ผ๊ณ  ์กฐ์–ธํ–ˆ๋‹ค.

๋น„์šฉ ์ธก๋ฉด์—์„œ๋„ HP๋Š” ๋ฉ”๋ชจ๋ฆฌ ์นฉ ๊ฐ€๊ฒฉ ์ƒ์Šน์ด 2026 ํšŒ๊ณ„์—ฐ๋„ ํ•˜๋ฐ˜๊ธฐ ์ˆ˜์ต์„ฑ์— ์˜ํ–ฅ์„ ์ค„ ๊ฒƒ์ด๋ผ๊ณ  ๊ฒฝ๊ณ ํ–ˆ๋‹ค. ์™„ํ™” ์กฐ์น˜๋ฅผ ์ ์šฉํ•˜๋”๋ผ๋„ ์ฃผ๋‹น 0.30๋‹ฌ๋Ÿฌ ๊ทœ๋ชจ์˜ ์ถฉ๊ฒฉ์ด ๋ถˆ๊ฐ€ํ”ผํ•  ๊ฒƒ์œผ๋กœ ์˜ˆ์ƒํ–ˆ๋‹ค.

HP๋Š” ์ด๋Ÿฌํ•œ ์••๋ฐ•์— ๋Œ€์‘ํ•˜๊ธฐ ์œ„ํ•ด ๊ณต๊ธ‰์ฒ˜ ๋‹ค๋ณ€ํ™”, ์ผ๋ถ€ ์ œํ’ˆ๊ตฐ์˜ ๋ฉ”๋ชจ๋ฆฌ ๊ตฌ์„ฑ ์ถ•์†Œ, ๊ฐ€๊ฒฉ ์ธ์ƒ ๋“ฑ์„ ๋ณ‘ํ–‰ํ•  ๊ณ„ํš์ด๋‹ค. ๋กœ๋ ˆ์Šค๋Š” โ€œํ•˜๋ฐ˜๊ธฐ ๊ฐ€์ด๋˜์Šค๋ฅผ ๋ณด์ˆ˜์ ์œผ๋กœ ์ œ์‹œํ•˜๋Š” ๋™์‹œ์—, ์ €๊ฐ€ ๊ณต๊ธ‰์ฒ˜ ํ™•๋ณด, ๋ฉ”๋ชจ๋ฆฌ ๊ตฌ์„ฑ ์ถ•์†Œ, ๊ฐ€๊ฒฉ ์กฐ์ •๊ณผ ๊ฐ™์€ ์ ๊ทน์ ์ธ ์กฐ์น˜๋ฅผ ์‹œํ–‰ํ•˜๊ณ  ์žˆ๋‹คโ€๋ผ๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค.

๋กœ๋ ˆ์Šค๋Š” ๋˜ํ•œ HP๊ฐ€ 2026 ํšŒ๊ณ„์—ฐ๋„ ์ƒ๋ฐ˜๊ธฐ๋ฅผ ์ถฉ๋‹นํ•  ๋งŒํ•œ ์žฌ๊ณ ๋ฅผ ํ™•๋ณดํ•˜๊ณ  ์žˆ์ง€๋งŒ, ํ•˜๋ฐ˜๊ธฐ์—๋Š” ์žฌ๊ณ ๊ฐ€ ์†Œ์ง„๋˜๋ฉด์„œ ํ˜„์žฌ์˜ ๋†’์€ ๋ฉ”๋ชจ๋ฆฌ ๊ฐ€๊ฒฉ์ด ์ƒ์‚ฐ ์›๊ฐ€์— ๋ฐ˜์˜๋ผ, ๋งˆ์ง„ ์••๋ฐ•์ด ์‹ฌํ•ด์งˆ ๊ฒƒ์œผ๋กœ ์ „๋งํ–ˆ๋‹ค.

PC ๋ฐ ์„œ๋ฒ„ ๋ฒค๋” ์ „๋ฐ˜์˜ ํ๋ฆ„

PC์™€ ์„œ๋ฒ„ ๋ฒค๋” ์ „๋ฐ˜์ด ์œ ์‚ฌํ•œ ์••๋ฐ•์„ ๋ฐ›๋Š” ๊ฐ€์šด๋ฐ, HP์˜ ๊ฐ์›๋„ ์—…๊ณ„์˜ ์ถ”์„ธ๋ฅผ ๋”ฐ๋ฅธ ๊ฒƒ์œผ๋กœ ๋ถ„์„๋œ๋‹ค.

๊ณ ๊ธฐ์•„๋Š” โ€œHP, ๋ธ, ๋ ˆ๋…ธ๋ฒ„, HPE์—์„œ ์ตœ๊ทผ ์ด์–ด์ง„ ๊ฐ์› ์‚ฌ๋ก€๋Š” ์ด๋“ค ๊ธฐ์—…์ด ์šด์˜ ๋ฐฉ์‹์„ ์žฅ๊ธฐ์ ์œผ๋กœ ๋ณ€ํ™”ํ•˜๊ณ  ์žˆ์Œ์„ ๋ณด์—ฌ์ค€๋‹ค. ๋งŽ์€ ๋ฒค๋”๊ฐ€ ๋Œ€๊ทœ๋ชจ ํŒ๋งค ์ „๋žต, ๋ฐฉ๋Œ€ํ•œ ์ œํ’ˆ ํฌํŠธํด๋ฆฌ์˜ค, ์ธ๋ ฅ ์ค‘์‹ฌ์˜ ์ง€์› ๋ชจ๋ธ์—์„œ ๋ฒ—์–ด๋‚˜, ๋‹จ์ˆœํ™”๋œ ์ œํ’ˆ ๊ตฌ์„ฑ, ์ค‘์•™์ง‘์ค‘์‹ ์šด์˜, AIยท์„œ๋น„์Šคยทํด๋ผ์šฐ๋“œ ๊ธฐ๋ฐ˜ ํ”Œ๋žซํผ ํˆฌ์ž๋กœ ์ด๋™ํ•˜๊ณ  ์žˆ๋‹คโ€๋ผ๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค.

๊ทธ๋Š” ๋ฒค๋”์˜ ์ „ํ™˜ ๊ณผ์ •์—์„œ ๊ธฐ์—… ๊ณ ๊ฐ์ด ์šด์˜์ƒ์˜ ๋ถˆํŽธ์„ ๊ฒช์„ ์ˆ˜ ์žˆ๋‹ค๊ณ  ์ง„๋‹จํ•˜๋ฉด์„œ, โ€œ์ง€๊ธˆ ์ค‘์š”ํ•œ ๊ฒƒ์€ ์žฅ๊ธฐ ์ „๋žต๋งŒ์ด ์•„๋‹ˆ๋ผ, ์ „ํ™˜๊ธฐ ๋™์•ˆ ์–ผ๋งˆ๋‚˜ ์•ˆ์ •์ ์œผ๋กœ ์šด์˜์„ ์œ ์ง€ํ•  ์ˆ˜ ์žˆ๋Š”๊ฐ€๋‹คโ€๋ผ๊ณ  ๋งํ–ˆ๋‹ค.
dl-ciokorea@foundryco.com
โ€ƒ

5 plead guilty to laptop farm and ID theft scheme to land North Koreans US IT jobs

Five men have pleaded guilty to running laptop farms and providing other assistance to North Koreans to obtain remote IT work at US companies in violation of US law, federal prosecutors said.

The pleas come amid a rash of similar schemes orchestrated by hacking and threat groups backed by the North Korean government. The campaigns, which ramped up nearly five years ago, aim to steal millions of dollars in job revenue and cryptocurrencies to fund North Korean weapons programs. Another motive is to seed cyber attacks for espionage. In one such incident, a North Korean man who fraudulently obtained a job at US security company KnowBe4 installed malware immediately upon beginning his employment.

On Friday, the US Justice Department said that five men pleaded guilty to assisting North Koreans in obtaining jobs in a scheme orchestrated by APT38, also tracked under the name Lazarus. APT38 has targeted the US and other countries for more than a decade with a stream of attack campaigns that have grown ever bolder and more advanced. All five pleaded guilty to wire fraud, and one to aggravated identity theft, for a range of actions.

Read full article

Comments

ยฉ Getty Images

How Do Threat Hunters Keep Organizations Safe?

Neil Wyler started his job amid an ongoing cyberattack. As a threat hunter, he helped his client discover that millions of records had been stolen over four months. Even though his client used sophisticated tools, its threat-hunting technology did not detect the attack because the transactions looked normal. But with Wylerโ€™s expertise, he was able to realize that data was leaving the environment as well as entering the system. His efforts saved the company from suffering even more damage and disruption.ย 

Wyler shows that threat hunters can help prevent a cybersecurity catastrophe. But what is a threat hunter, and how can they improve an organizationโ€™s security posture?

What is Threat Hunting?

While enterprise security systems are a key part of cybersecurity, threat hunters provide organizations extra protection. A threat hunter reviews all the security data and systems to look for abnormalities and potential malware issues. Threat hunting complements automated security tools and is best used in conjunction with that technology. By combining the strengths of both human expertise and artificial intelligence (AI) tools, companies can find cyber threats faster and reduce damage.

Responsibilities of a Threat Hunter

Threat hunters search, log, monitor and neutralize threats to find issues before they become serious problems. In some companies, threat hunters design the threat-hunting program, which starts by building the hypothesis the program is looking to answer, such as searching for malware with specific criteria. Threat hunting typically involves looking for malware threats incorporated into commercial technology but not yet known.

Threat hunters use three approaches: structured, unstructured and situational.

During structured tests, the threat hunter leverages indicators of attack (IoAs) and the tactics, techniques and procedures (TTPs) of an attacker. Unstructured hunts occur when a trigger indicates a compromise, and the hunter looks at patterns before and after the detection. Situational hunts commence when a risk assessment is warranted, such as knowing attacks are happening at similar companies.

What makes threat hunting different from other cybersecurity tasks is that they donโ€™t just use security information and event management (SIEM), endpoint detection and response (EDR) and other typical processes. Instead, threat hunters search through security data to look for patterns that indicate malware or attackers. Once they discover a cyber criminalโ€™s potential entry method, they work to patch the issue to prevent future incidents.

Pursuing a Career as a Threat Hunter

Threat hunting is often one of the responsibilities of a cybersecurity analyst. However, some managed service professionals (MSPs) hire threat hunters whose primary responsibility is threat hunting for clients. Cybersecurity firms also hire threat hunters to provide the service to their clients. Additionally, threat hunters can work freelance for companies that need threat-hunting expertise but donโ€™t want to hire an MSP.

Companies often look for certifications or bachelorโ€™s degrees when hiring for analyst and threat-hunting positions. Candidates can also go into threat hunting with digital badges or certifications. However, cybersecurity analysts can learn threat-hunting skills on the job and then move into a threat-hunting role.

Threat hunters need strong technical skills and expertise with cybersecurity tools. However, the most important skills are problem-solving and analysis because the role requires manually reviewing data. Threat hunters must also have a strong interest in cybersecurity and a willingness to continually stay updated on cyber criminalsโ€™ latest TTPs. Additionally, threat hunters need good written skills to communicate findings to IT leaders. Because threat hunters often work on a team with other cybersecurity professionals, they also need the ability to collaborate and verbally communicate with others.

As cybersecurity risks and threats continue to increase, threat hunting is apt to become an even more crucial facet of cybersecurity. Organizations need the human touch to catch sophisticated threats, even using sophisticated tools. Cybersecurity professionals specializing in threat hunting or adding it to their skill set will likely have solid employment opportunities.

The post How Do Threat Hunters Keep Organizations Safe? appeared first on Security Intelligence.

How To Write The Perfect Cover Letter in 2023

how to write a cover letter

A well-written cover letter can be the make or break for your job application. And given how competitive the job market in the UK is at the moment, every advantage you have over your competitors can be crucial.

Before you even think about how to write the perfect cover letter, you need a well-written CV that grabs a Hiring Managerโ€™s attention. Lucky for you, weโ€™ve put together tips on writing CVs here. But once youโ€™ve got the attention of the Hiring Manager, thatโ€™s where your cover letter comes in and highlights why youโ€™re the right candidate for the job.

Here at Dynamic we speak to Hiring Managers everyday. And we know exactly what they want to see from a candidate. And weโ€™re here to share those secrets with you, so you can write a cover letter thatโ€™s impossible to ignore, and lands you that interview for your dream job.

ย 

How Important Is a Cover Letter?

But before we get started, itโ€™s important to ask the question, do you need a cover letter in 2023? We would argue that whether a job application asks for a cover letter or not, you should still include one. And weโ€™re not the only ones who think so.

A study from ResumeLab, shows that 83% of recruiters agree that while they arenโ€™t โ€˜strictly necessaryโ€™, a well-written cover letter, tailored to the job you are applying for, can be an important part of their hiring decision.

And 74% of recruitment decision makers prefer to receive a job application which includes a cover letter thatโ€™s separate from the CV.

So while skilled professionals are as in demand as they have ever been, there is still a huge amount of competition for the roles out there. And a great way to set yourself apart from other applicants is to write a cover letter that shows youโ€™ve done your research and want the job more than the next applicant.

ย 

How To Write The Perfect Cover Letter in 7 Easy Steps

So hereโ€™s our 7 steps on how to write a cover letter that helps you stand out from the crowd and gets you into that interview!

ย 

1. Do Your Research and Tailor Your Cover Letter to the Job, Company, and Hiring Manager

Letโ€™s start with the most obvious. If you send over a generic cover letter that you send for every job, itโ€™s going to be just that: Generic.

Your cover letter should talk about the role and how your experience relates to the job. Use specific examples from the job description and your own experience. And what work does the company do that youโ€™re excited to be a part of? Even showing your understanding of the work the company does, or the clients they work with, shows youโ€™ve done your research.ย 

And you should also aim to address the cover letter to the hiring manager of the business. You can usually find out this information from LinkedIn or the company website.

ย 

2. Use Specific Examples of Your Experience, to Demonstrate Why You Can Do the Job.

Similar to in your CV, you should aim to use statistics and figures to back up any arguments you make in your cover letter. If the job is asking for applicants to have experienceย 

When writing your cover letter, you should keep the job description youโ€™re applying for close to hand. This is so you can relate your experience to the requirement of the job: Essentially showing why youโ€™re perfectly equipped to do the job at hand.

Spelling it out and making it a reality for the hiring manager on why youโ€™re their perfect candidate, makes it impossible for them to not give you an interview.

ย 

3. Emphasise Your Technical Ability to do the Job.

At the end of the day, a lot of hiring decisions are based on technical ability to do the job. So in an industry like IT where you need experience with a variety of technologies and software, this becomes even more important.ย 

And despite what you may think, from our experience there is very rarely the perfect candidate for a job. Businesses will happily hire someone who fills 80% of the requirements, who they can teach the other 20%, and build them out into the employee they are looking for.ย 

And given the wide variety of tech out there in the IT industry, you may not have worked with all the software they want. But if you have worked with similar tech, itโ€™s well worth emphasising the fact that you do have those transferable skills: Alongside all the tech that you have worked with that they want.

ย 

4. Explain Why Youโ€™re Excited for the Opportunity and the Company.

A cover letter should also convey your excitement at the opportunity, for both the position and the company.

Highlight examples of whatโ€™s so great about the company, and what aspect of the job interests you the most. Because what really interests hiring managers is seeing your passion for your work come through the page: Something thatโ€™s often hard to convey with merely a CV.

ย 

5. Keep It Short.

Hiring Managers want to see a cover letter. But, what they donโ€™t want to see is a 10 page cover letter detailing your life story, or repeating everything you already stated in your CV!

So aim to keep your cover letter to one page or less. The Hiring Manager reading your application is likely reading through many CVs and cover letters. So you want to keep yours short, to the point, and get straight into why they should give you the job.

ย 

6. Have a Clear Structure: Introduction, Body, Conclusion.

Your cover letter should have a clear structure that makes it easy for the reader to follow and find the relevant information: Introduction, body, and conclusion.

The introduction paragraph should introduce yourself and why you are writing.

The body of the message should discuss why you are applying for the role, and why they should give it to you. Using specific examples of your previous experience and skills to show why youโ€™re a good fit for the job.

Finally, you should use the conclusion as an opportunity to reiterate your interest in the position and to thank the hiring manager for considering your application.

ย 

7. Proofread, or Have Someone Else Look Over it.

Now itโ€™s all finished, itโ€™s time to proofread before you send it off. When hiring managers are looking for their next Network Engineer or Cyber Security Analyst, theyโ€™re not looking for someone who has a passion for writing. But if your cover letter is riddled with spelling mistakes, it doesnโ€™t look great, and can actually hurt your chances of getting an interview.

Another great step to take (if possible) is to have someone else look over it for you. Sometimes a fresh pair of eyes can help you spot mistakes you donโ€™t even realise youโ€™re making.

ย 

Cover Letter Template

But better than telling you how to write the perfect cover letter, is giving you a cover letter template to work with. Below is an example cover letter you can use to create your own individual cover letter.ย 

The areas marked in red are the details you will need to edit for your cover letter. Many of these areas will need to be changed for each individual job that you apply for.

ย 

Dear (Hiring Managerโ€™s Name),

My name is (Your Name) and I am writing to express my interest in the (Position) role. I have (Number) years of experience as a (Your current position) andย I am confident in my ability to make a valuable contribution to your team.

I have previous experience working with (Skills and technologies mentioned in job posting), and Iโ€™m excited to continue to develop these skills at (Company). What really excites me about this position, is the opportunity to work with (Specific technology). I have previous experience working with (Technology), and this previous experience will be crucial to my success in the (Position).

I currently hold (Relevant/ similar certifications to those mentioned in the job posting) certifications, that will assist me in the (Position) role. Additionally, I am working towards earning (X certification), to support my own professional development, and my career goal of reaching a (Position you want to reach in your career).

Thank you for considering my application. I look forward to speaking with you further about how my skills and experience will make me an effective part of your team.

Sincerely,

(Your Name)

ย 

Cover Letter Template Example

Now the above may seem a bit confusing. So here is what this Cover Letter may actually look like for you.

ย 

Dear Mrs Brown,

My name is Hames Jones and I am writing to express my interest in the Network Engineer position. I haveย 2 years of experience as a Junior Network Engineer andย I am confident in my ability to make a valuable contribution to your team.

I have previous experience working with LAN and WLAN environments, from implementation to management, and Iโ€™m excited to continue to develop these skills at IT Solutions Inc. What really excites me about this position, is the opportunity to work with Cisco FirePOWER. While I havenโ€™t used it before, Iโ€™ve previously worked with FortiGate, and this previous experience will be crucial to my success in the Network Engineer Position.

I currently hold a CCNA certification, which will assist me in the Network Engineer role. Additionally, I am working towards earning a CCNP Enterprise, to support my own professional development, and my career goal of reaching a Senior Network Engineer position in the near future.

Thank you for considering my application. I look forward to speaking with you further about how my skills and experience will make me an effective part of your team.

Sincerely,

James Jones

ย 

Your cover letter may contain much more information than this, referencing more of the skills that the job advert asks applicants to have. But this should give you an accurate idea of how to create your own cover letter, and how to relate your own experiences to the position you are applying for.

ย 

The Only Time You Donโ€™t Need to Write a Cover Letter.

One of the only times when you donโ€™t need to know how to write a cover letter, is when youโ€™re working with a recruiter or recruitment agency in your industry.ย 

Here at Dynamic, weโ€™re experts in recruiting in the IT Industry: Network, Infrastructure, IT Sales, Cyber and Cloudโ€ฆ Because we understand our market, our clients and our candidates: And our clients trust us to bring applicants to them who are right for the role. This means they often donโ€™t ask for a cover letter, because a recruiters job is to sell you to the Hiring Manager without the need for a cover letter.

If youโ€™re looking for your next IT position, you can look at our open job vacancies here. Or reach out to us here for a confidential chat about taking the next step in your IT career.

The post How To Write The Perfect Cover Letter in 2023 appeared first on Dynamic Search Solutions.

โŒ