>Business >Kick-starting your cybersecurity career

Kick-starting your cybersecurity career

A common question that cybersecurity specialists receive in their email inboxes, or at conferences is “What should we do to get into cybersecurity?” 

This blog post by AICorespot is intended to provide insight into that question, with all the disparate factors of the question put forth in a singular location. It should provide you the know-how to go from total beginner, to securing your first job, to reaching the pinnacle of the domain. 


Cybersecurity is a very, very sophisticated discipline, implying you should ideally be sound at a few other spheres of technology before making an attempt to enter into it. This isn’t necessary, but it’s typical and is the best case scenario. The three regions that infosec personnel usually come from are: 

  • Systems Administration
  • Networking 
  • Development 

Those are in the order of the most typical points of entry, not the ideal. Ideally, it would be Development, then Systems Administration, then Networking. 

However, let’s go by the assumption that you do not possess a background in any of those domains, and that you require to begin from scratch, from the ground up. We require to learn things, and there are three primary ways of performing this: 

  • University 
  • Trade School 
  • Certifications 

The best head-start that you could possibly have is to enroll in a four-year Degree in Computer Science or Computer Information Systems or IT with a solid university as the best-case scenario. But while you do it, you require to be carrying out everything else that is specified in this article. 

What you get to know in school is dependent on the class syllabus and your communications with others, your peers and professors, and the content that you can probably get in several varying places. Getting to know and developing things with a selection of other competent individuals is the real advantage of university. The power of networking and collaboration cannot be understated. It’s proven in learning theory that you learn better in groups, and better yet, you learn better by teaching others. Create, disseminate and collaborate like there’s no tomorrow. 

There are several individuals who go to school for Computer Science or Security and never achieve anything noteworthy within the domain or in industry, and there are several who never go and get to the highest echelons. School isn’t the be all and end all it’s pegged to be. 

If you don’t have the opportunity to attend university, you be required to go about your learning journey is another fashion, for example, Trade School or Certifications. All of these will do well and are acceptable substitutes as long as you have the inquisitive nature and drive to finish what you begin. 

Here are the fundamental spheres you are required to get from either university, trade school, or self study/certifications: 

  1. Networking (TCP/IP/switching/routing/protocols, etc) 
  2. Systems Administration (Windows/Linux/Active Directory/hardening, etc.) 
  3. Programming (programming concepts/scripting/object orientation fundamentals) 

Database is in the mix as well, combined with systems administration and programming. If you do not possess a robust foundation in this trio, and in the best-case scenario solid aptitude and capability in at least one of them, then it’s bound to be very difficult for you to evolve beyond the preliminary phases of a cybersecurity career. The issue of criticality at this juncture is to not have gaping holes in your game, and being weak in any one of those is a troubling hole. 

We’re going to have a discussion on certifications later on in this blog, but they’ve been specified here for a purpose: you can leverage the certification study books as teaching guidelines. They’re pretty adept at demonstrating to you the fundamentals. Here are a few instances: 

  • A+ 
  • Security+ 
  • Linux+ 
  • CCNA 

There is some amazing literature out there in the wild, (remember, Google is your friend) that can demonstrate to you the fundamentals of a subject quite swiftly. It’s a solid way to ensure you don’t give room for any major gaps in your know-how and prowess. 


Programming is critical enough to be specified as an independent entry. If you fail to hone your programming skills and capabilities, you will be severely restricted in your cybersecurity career. 

You can land a job without experience as a programmer. You can even get a pretty decent job, if lady luck favours you. And you can also get promotions to management level. However, it is to be noted that you will reach the elite echelons of cybersecurity if you do not possess the knowledge to build and develop things. Websites, tools and utilities, proofs of concept, the list goes on. 

Being ignorant of coding will only do one thing – foster a reliance on personnel who can. And that’s a weakness if there ever was one. 

Learning to code is of paramount criticality. 


One of the most critical things for any cybersecurity pro is a robust set of inputs for news, articles, tools, etc. 

This has conventionally been performed with a listing of preferred news sources on the basis of the variant of security the individual is interested in. There are websites that concentrate on network security, application security, OPSEC, OSINT, government security – the list goes on. 

On an increasing basis, however, Twitter is substituting the following of websites. The main reason for this is the freshness of information. Twitter functions on a real-time basis, which confers upon it an advantage over conventional sources. 

Twitter enables you to create (and subscribe to) listings. Therefore, if your handle @johndoe, you can merely append / list/listname to it and tweets from everybody belonging to that listing. 

Our suggestion is to leverage two primary sources: 

  1. Twitter 
  2. RSS Feeds 

Get to following individuals on Twitter who can provide you with new methods of thought, new methods of learning, and new know-how for you to devour. Get into the devour mindset, over the consumption mindset. Read and learn all you can. And identify all of their sources and references and get to tracking those in your RSS reader. Feedly comes highly recommended for RSS. 

Developing your Lab 

Possessing a lab is critical. It’s literally one of the initial things that candidates get asked about during the interview process. What are the capacities of the lab or network they have to play with, and if they reply that they do not have either – it’s downhill for them from there. 

The lab is where you undergo the learning process, which is so crucial. The lab is where you get to execute your projects. The lab is where you evolve. 

There are some options available at your disposal for laboratory setups. 

  1. VMware (or something of the like) on a laptop or desktop 
  2. VMware (or something of the like) on a laptop or desktop that functions as a server 
  3. An actual server with VMWare (or something of the like) on it 
  4. VPS systems online (EC2, Linode, Digital Ocean, LightSail, etc.) 

We suggest a combo of #3 and #4 if you have the financial resources, with #3 coming in pole position. Here are a few of the things you desire to be able to perform in such a space: 

  • Construct an active directory forest for your home 
  • Run your proprietary DNS from Active Directory 
  • Run your proprietary DHCP server from Active Directory 
  • Have several zones within your network, which includes a DMZ is you’re going to serve services from the home. 
  • Graduate to an actual firewall asap. We suggest Sophos firewall (known prior as Astaro), as it’s been leveraged comprehensively ever since it came out, but there are other good iptables and pf options. Performing this will need you to learn about routing and NAT, and all kinds of fundamentals that are really critical for progression. 
  • Stand up a website on Windows/IIS 
  • Stand up a website on Linux/PHP 
  • Construct a blog on Linux/Wordpress 
  • Have a Kali Linux installation always primed to go 
  • Construct an OpenBSD box and develop a DNS server leveraging DJBDNS 
  • Establish a proxy server 
  • Construct and execute your proprietary VPN on a VPS 
  • Construct and configure an email server that can deliver email online leveraging Postfix, Qmail, or Sendmail (we suggest Postfix) 

We leveraged an array of terms above that you might need to research into. Take that up as an activity. 

These are the fundamentals. A majority of individuals who are hardcore cybersecurity purists have performed the listing above hundreds or even thousands of times over the passage of time. 

The benefit of a lab is that you now have a location to experiment. You hear about something from your news intake, and you can hop onto your laboratory, spin up a box, and mess around with it. That’s invaluable for an expanding infosec consciousness. 

Now that you have that list up and running, you can begin concentrating on your proprietary projects. 

This is where the book smarts ceases and creativity commences. You ought to consistently be operating on projects. 

As a novice, or even as a sophisticated practitioner, no person should ever question you what you’re working on and you state: “Nothing”. Unless you’re taking a break in-between, obviously. 

Projects have a tendency to cross over considerably into programming. The concept here is that you come up with a tool or utility that might be beneficial to individuals, and you go ahead and create it. 

And during the learning process, don’t be concerned too much if somebody has already done something prior. It’s a ton of fun to create, and you wish to get acquainted to the excitement of going from concept to completion leveraging code. 

The critical skill you’re attempting to inculcate is the capacity to detect an issue with the way things are presently performed, and then to 1) devise a solution, and 2) develop the tool to find a solution to it. 

Projects demonstrate that you can actually go about applying knowledge, in opposition to only gathering it.  

Don’t contemplate about the number of projects you have. If you approach it in that fashion it’ll not be organic. Rather, only concentrate on fascinating issues within security, and let the ideas and projects come to you organically. 

In the writing world, there’s a maxim that states: “Show, don’t say.” Projects are demonstrations, and gathering know-how is telling. 

Practice with Bounties 

Now that you possess a lab, possess some robust abilities, and a few projects you’ve been hacking on, you might wish to operate on a few bug bounties.  

The purpose for this is ideally summarized as a fast track to real experience, which is the #1 ask of anybody seeking to provide you with a job. So on top of coding prowess, (with your projects), with bounties you can additionally obtain testing experience. 

There are two primary platforms you can perform bounties on: BugCrowd, and HackerOne. There are several more but those have the most programs and the maximum maturity. 

The process is that you sign up on the website, search for a program or application you have interest in searching for bugs on, and then you deep dive right in. Here are a few things to retain in memory: 

  • Go through the rules and restrictions connected with every program very meticulously. You don’t wish to run afoul of either the platform or the client. 
  • There are several variants of bounty program. Some pay money and are higher scrutiny and competition, and others are more for the reasons for Karma, or Kudos, and are better avenues for novices to practice. 
  • We highly suggest Jason Haddix’s content with regards to web bounties, learning his methods is the quickest way to begin identifying bugs. 

The world is pretty nuanced, with an array of rules, and a unique etiquette that you ought to learn. So be respectful of that and you’ll be more efficient and less probable to step on any toes. 

Both in the scenario of programming on GitHub and performing bounties, the objective is to obtain professional experience under your belt prior to landing a job, or prior to securing a job in the domain that you desire. It’s the way to demonstrate instead of tell. 

Being active on GitHub and possessing some solid bug finds in your bounty profiles is a way to establish yourself far apart from somebody who is essentially pure theory, and can easily assist you in securing your first position, or a fresh position in a domain you’ve not yet established your presence in. 

Maintain a Presence 

Ok, now that you’ve performed a few projects it’s time to inform people about them with the help of your brand platform. It’s a necessity to have a robust brand. It can be low-key if you desire, and the domain is already full of too much ego, but you do require a platform to broadcast through. 

If you’re introverted and/or feel like it’s boastful to talk about anything you’ve done, don’t do so. This is not a domain where that mentality will be beneficial to you. To get to the mid to high echelons you are required to learn how to sell yourself and your work.  

Introversion and farcial humility will not do you any good. Carry out solid work and be willing to enter into discourse about it. But do it from a sharing and collaborative perspective, not from a place of arrogance and self-assuredness.  


To start with, you require a website. Some refer to this as a blog, and that’s ok. The point s that you require a place to broadcast yourself from. You ought to have an about page, some decent contact details, a listing of your projects, etc. And again, if you are a blogger then that’s the place to do it. 

Just comprehend that your website and its associated domain are at the epicentre of your identity, so in the best-case scenario you’d have a solid domain that will last a literal lifetime. Firstnamelastname.com is likely ideal, but several individuals can’t do that as their names are fairly widespread. There are a few other options, but select with care. You wish for this domain to stay the same until you live. 

Choose something that is solid is our suggestion. Brand identity makes all the difference in the 21st century. 

You ought to blog and host all your projects on your proprietary websites and syndicate everyplace else. 

Avoid penning down too much on other services such as Medium or Blogger – and for certain steer clear of Facebook for anything but arbitrary thoughts and communications. If you develop anything of interest on platforms that aren’t your proprietary domain, convert it into a finished piece and host it on your own website. 


Likewise for Twitter. Ensure that you have a good handle. The best case scenario is firstnamelastname, but if you’re unable to do that, choose a robust alternative. Again, this is a permanent personal infrastructure, so do don’t make it @L33tH4xors97. That will turn less attractive as you age. 

After you’ve obtained a robust handle, it’s time to begin following some individuals. There are an array of good lists out there for individuals to follow in infosec. Leverage one of those to put you on the right track, and then adjust to taste. 

Take part in conversation. Let it be organic. Do not overextend when you don’t possess the requisite know-how. But if you want to share something or to contribute, then do it. It doesn’t make a difference if you have three followers and the others have 10,000. Twitter is a meritocracy. And if it is not, pretend it is. 

One decent way to begin is with retweeting content that you fancy from others. As you become more able to include value yourself you can begin alternating between retweets and your own proprietary content.  

Don’t take things too seriously. Several leading security figures on Twitter ramble on about next to nothing a majority of the time. The others just post immaculate content. Just be yourself and it’ll come through. And if it does not, and you feel like you’re doing it all wrong, don’t be too concerned. Stick to the above and you should be fine. 

Social Media 

There are an array of other social media outlets. The other dominant one you should be more than concerned about is LinkedIn. Ensure to create a profile and stay active. Exert effort into it. Keep it up to date. And just connect with persons who you either know or who you’ve had at least some interaction with. Including everybody reduces the potency of the network for you and for others. 

It’s simple to do too much with social media. Steer clear of that influence. Concentrate on your website and Twitter, with some LinkedIn thrown in for good measure. Facebook should stay mostly independent, due to its casual nature. 

And remember – everything begins with your website. Develop content there, and then communicate it through Twitter, Facebook, LinkedIn, and whatever other channels you leverage. But don’t develop there first. 


Experts receive so many queries with regards to cybersecurity certifications. Several. They primarily come in two variants: 

  1. Are infosec certifications valuable? 
  2. What are the ones that come recommended? 

We have some insight into these questions. 

Certifications do make a difference. And so do university credentials. And experience always makes a difference. And so does anything else that individuals think matters. 

Things only have the value that others ascribe to them. 

Certifications do not possess any inherent worth. They’re valued exactly as much as individuals believe they’re worth. If organizations are asking for them at places you desire to get employed at, they surely make a difference. If the workplaces you wish to get hired are not concerned at all about them, they don’t possess any value there. It’s that simple. 

However, for novices, yes, they make a difference. 

Which certification? 

Let’s do this on a phased basis. 

Novice certs 

If you’re just beginning, we suggest you obtain the following certs: 

  1. A+ 
  2. Network+ 
  3. Linux+ 
  4. Security+ 

In this scenario, we are not stating that these certs have humongous value other than for the most newest of beginners, but there is a value add to your profile when you study an qualify for them. 

Like we had specified prior in the education portion of this blog, certs have good study materials, and if you get all four of these certifications you will have a decent comprehension of the fundamentals. 

Advanced Certifications 

We’d like to explain Infosec certifications as such: You require your CISSP, you ought to obtain an audit cert, (CISA/CISM), and you ought to obtain a technical cert (SANS). So: 

  1. CISSP for anybody who’s targeting employment in security 
  2. CISA/CISM for comprehensive security personnel who wish to become managers 
  3. SANS (GSEC/GPEN/GWAPT) for technical personnel 
  4. OSCP for pentesting oriented people 

After you have accumulated four years of experience in cybersecurity, you should have obtained your CISSP. It’s the closest thing to a traditional baseline that the domain currently has. It’s actually better in contrast to a computer science degree in a ton of organizations (as so many do not leverage their time in university properly) 

Then you wish to cover the audit space, which is a crucial aspect of infosec. Obtain your CISA or CISM for that. 

And lastly, you wish to get one or more tech certs. We recommend beginning with the GSEC, which is shockingly comprehensive. From there you can branch into GCIA or GPEN or GWAPT on the basis of your preferences. But if you only obtain the GSEC that would be a decent way to flesh out your food groups. 

OSCP and CREST are the most valued certs for hardcore prep evaluators, so definitely begin thinking about those if that’s your fascination. 

Then there’s CEH. It exists and individuals at times ask about it – so you might as well obtain it for the sake of it. But don’t be a braggart about it  – and particularly not around seasoned security personnel. 


Retain in your mind that you can perform several of these phases in parallel.  

Alright, so currently we have some academic credentials, we’ve got a lab running, we’re operating on a few projects, we’ve got our website and Twitter launching off, and we’re papered up. 

Now you are required to reach out to and speak with some people. Again, you can and should have been performing this all along, but if you haven’t been it’s certainly time to do it. 

Watch who’s visiting your website. Watch Twitter for interesting communications. Talk to these personnel. Begin conversations. Go to where they’ll be and communicate with them physically. Go to Vegas for Blackhat and DEFCON week. Tons of infosec personnel are available to interact with. 

Identify a mentor 

This one is nearly worth its own section, but we’ll just place them here. Identify somebody who has a style that you desire and request them to mentor you. Email them. Call them up. But perform your research prior. Ensure you’ve performed the instructions in this guide to begin with.  

To obtain the ideal response from a prospective mentor, make it obvious in your first interaction that you’ve exerted effort in upfront. 

Make it as simple as feasible for them to assist you and you’re not probable to be turned down. One thing we’ve observed with cyber security is that personnel are really willing to assist others who are eager to work and are just beginning. 


Offer to intern with an organization. Offer to do their leg work. Author scripts for them. Curate and edit their blog posts. Assist them in sifting through information. These things can assist, and might lead directly to an interview or other variant of hookup for you in the future. 


Conferences are a method to perform a few things in the domain: 

  1. Observe what fresh research is being performed. 
  2. Catch up with your other cybersecurity friends who reside far off. 
  3. Put forth your own thoughts, ideas, and research for others to consume. 

With regards to list item #1, you actually don’t have to visit a physical conference. A majority of talks – particularly the really solid ones – are made available immediately afterward, so you can just take them off of the website. 

That doesn’t assist with #2 though, and a majority of cybersecurity veterans after approximately a decade on the scene are mostly attending conferences to visit with their friends. The talks essentially serve as a setting for doing so instead of the centrepiece – particularly since they can just get the talks online. 

However, for newcomers to the domain talks can be a priceless way to learn about the cybersecurity culture. Here are a few we’d suggest considering: 

If you’re just beginning, you should certainly visit DEFCON at least once. It’s essentially a parody of itself at this juncture, but that’s only because it’s become so widespread. A victim of its own success. 

Prior to DEFCON each year is BlackHat, which is a tad more corporate (and costly), but is also still decent for fresh individuals to attend. 

Specialists in the domain are beginning to avoid these more and more every year, and are rather going to smaller cons that have the feel of old DEFCON, e.g., higher quality talks, a smaller venue that enables more intimate discourse with other participants, and a lesser number of people. 

A few of these consist of: 

  • DerbyCon 
  • ShmooCon 
  • ThotCon 
  • CactusCon 
  • HouSecCon 

…among others. 

Our new favoured conference variant are more TED-like single-track conferences that concentrate on putting forth ideas in opposition to just fresh ways to break things. We require that breaker concept, to be certain, but we additionally require to hear more about overall concepts and how to actually rectify things. 

We’re specifically enamoured with ENIGMA, for instance. The single-track model is the way to go in our opinion. 

On top of these conventional variants of conferences, you ought to be signing up locally with your OWASP chapter. Begin with attendance to the meetings and taking everything in, and then offer to volunteer to assist, and then – when you’re set to go – give a talk yourself. 

You wish to do the same thing with BSides in your local area. BSides are essentially the alternative to major conferences in any provided area. The largest one is in Las Vegas and correlates with the BlackHat/DEFCON event. 

The bottom line: 

  1. Begin local, take part, and attempt to provide your own talks as you’re soon as you’re set to go. 
  2. If you’ve never been to a conference prior you should probably do DEFCON at the very least, once 
  3. The lesser, but widespread conferences such as DerbyCon and ShmooCon are typically viewed as “better” by a majority at this juncture, however, that’s a sliding bar that shifts with time on the basis of popularity and exclusivity 
  4. Remember that the main advantage of conferences is networking and observing your friends in a cybersecurity setting. 

Making Contributions 

Another brilliant way to propel your career is to leverage your capacities to assist on several projects. 

This is usually done leveraging your programming KSAs, and the key is to identify things that align with your interests and your work. You do not wish to force this step, or any of them really. Do what comes to you organically. 

A decent way to begin is to merely notice, for the utilities that you leverage and enjoy, if they have any outstanding bugs or problems. Talk to the creator(s) of the tool and provide your help. 

Github lends itself well to this variant of interaction due to pull requests, which enable you to rectify something which they can then bring into the project if they like it. 

99% of project leaders will jump all over this, and probably mention you within the credits as well. 

  • It’s good practice for you 
  • It helps enhance the tool 
  • You’ll assist the project leader out 
  • You’ll obtain your name out there as an active programmer 

Even if you’re not assisting in a technical fashion, there are all kinds of ways to assist in projects. You could assist in organization of input, develop documentation, get the word out with regards to the project, etc. Identify stuff you are concerned about and help in making them better. 

Don’t look for credit, fame, or recognition. Make it with regards to the output and allow everything else to come organically. 

Responding to CFPs 

Closely connected to mastering the conference scene is actually talking at those conferences. And in order to do so, you have to get acquainted with the Call for Papers (CFP) game. 

If you visit any conference site you’ll probably observe a link for speakers, or for CFPs, and this is where you can identify how to submit. You can additionally subscribe to the conference’s email and get notified as soon as a CFP opens as well. 

Essentially, conferences function on talks. Solid talks, with robust speakers. It’s the pulse of any solid event. So each year, a few months prior to the event occurring, the conference will open up their CFP, or call for papers, which is how individuals submit talks for consideration. 

It’s referred to as a call for papers as the entire concept stems from the academic domain. In that context, it’s a bunch of doctoral degree holders or graduate students submitting actual academic papers to a specialized conference (like the Peruvian butterfly Mating Symposium) that are vey specialized, replete with citations, and not likely to be of interest to anybody outside their narrow domain. 

Cyber security has borrowed the concept, but the rules are far more relaxed. To start with, individuals aren’t submitting academic-style papers in a majority of cases. They’re talks. Presentations, slides, really. 

Here are the things you’ll require to have to be able to submit. 

  1. A Great Title: Conferences have an array of talks, and it’s difficult to obtain individual’s attention. So you are required to have a pithy title. Something that is concise and descriptive. One instance that we might soon put forth with a friend is “From WTF to CTF: How to become a cyber security force of nature in less than 2 years.” That will probably get some individuals in seats. 
  2. A Decent Abstract: The abstract (again, from the academic domain) is where you will provide a fundamental summarization of what you’re set to be giving a speech about. You are required to really nail this, as it (combined with the title) is where the review committee is set to make the decision on whether or not to accept you. Dependent on the conference this should be 1-5 paragraphs. Ensure to have the following: a fundamental description of the idea or concept, instances of what will be encompassed, and which individuals will obtain from it. Ensure to mention if there are any demos or handouts. Conferences love those. 
  3. An in-depth description: Some conferences need you to furnish a much more comprehensive description of the speech. What the independent sections are. What the demo will cover. You should have that available if you’re intending to submit to conferences that need it, but in a majority of scenarios you’ll be able to get by with an adequately detailed abstract. 
  4. Your biography: You’ll always require a bio. You should keep one ready. Observe the speaker’s bundle section below. You might want to have two or so bios available. A very formal one that speaks about yourself seriously with tons of references to your work. And probably something more fun and light-hearted for more tech-oriented or hackerish conferences. 
  5. A headshot: You’ll often require a picture of yourself to send in with the talk. Ensure to have a few, so you can custom make it for the variant of conference you’re giving a speech at. The headshot will probably be different for RSA or some government conference than for DEFCON or Shmoocon. 

The speaker’s bundle 

We suggest you develop a speaker’s bundle that consists of all of these: 

  • Bio(s) 
  • Headshot(s) 
  • Talks (one for each one) 
    • Title 
    • Abstract 
    • Description 

Have these documented somewhere so you can swiftly copy and paste into CFP forms for several conferences as required. It really sucks to miss CFPs as you couldn’t get organized quick enough. 

Have this all primed to go. Conferences occur all through the year, which implies that once you get into it, you’ll probably be submitting to at the very least a few conferences each financial quarter. 

Getting your first job 

There’s an odd thing occurring with jobs in the cybersecurity space. Organizations believe there is a dearth of candidates, and individuals seeking to get into the domain believe there are no jobs. And they’re both correct. 

Individuals are really confused with regards to this paradox, but as it turns out to be a really simple solution: there are no beginning positions – only mid-level and advanced. 

Entry-level positions aren’t really an option within cybersecurity. 

In order to be useful to a team you have to be useful on the initial day, and that needs you to have some combo of these three things: 

  1. A degree in CS and/or something cybersecurity related 
  2. A robust set of certifications that demonstrate know-how similar to a degree 
  3. A body of practical, tangible project work that demonstrates you can actually do the stuff you’ll be asked to perform on the job. 

For most individuals reading this, #1 is not an option at this juncture, if that weren’t the scenario you’d already have a position. So you’re most probably going to require a combo of #2 and #3.  

For real-world work, you’re going to require a blog, a GitHub account, a Twitter account, and most critically – you’ll require to identify or develop projects you are concerned about and actually generate code around them. 

You don’t need to be a full-stack developer, but you require to be able to program. You have to have the capacity to create stuff. Perhaps it’s automation of a workflow. Perhaps it’s developing a new tool. Perhaps it’s making an improved version of a tool that has gone stale. 

Be Aware of the Job 

The next thing you require to be able to perform is show that you possess prowess in the tasks that you’re probable to be asked to do. Here’s a listing of some of these tasks: 

  • Managing Security Appliances / Services: One of the initial things you’ll be required to do is handle a security appliance/cloud service, like a firewall, IPS, etc. Be aware of what it does. Be aware of how to go about configuring it (you’ll have to read the manual and watch videos for). Make it log centrally. Configure reporting to be able to display value from the purchase. 
  • Responding to Security Questionnaires: This is something that each security team has to perform, and it’s typically a dirty job that needs a lot of tech knowledge, experience, and the capability to be – creative. If you’re capable of helping the team with this you’re worth a slot on the team as is. 
  • Doing Product Evaluations: Management usually asks the team to implement X variant of protection, whether that’s endpoint defence, cloud WAF, deception technology, AI SOC augmentation – whatever the case might be. You are required to be able to identify the leading vendors, develop a rating system, carry out the assessment, and then write up a recommendation for administration on the basis of your research and the output of the evaluation. 
  • Author a quick script: There will be several times on the team when you require to pull data from somewhere, do something to it, and obtain the outcomes to insert into a narrative. Data consistently requires to be pulled, massaged, and presented. Having this ability provides you a dominant advantage. 
  • Carrying out security reviews: For several reasons, you will often be asked to assess the security of a website, an organization we’re about to buy, or whatever else. You require to be able – as a non-specialist – to perform a cursory look at whatever it is and make a really swift assessment. 

This is a brief list, and we’ll keep including to it as we think of more. However, what we find so interesting about it is that it displays why there aren’t junior cybersecurity positions. These all need considerable schooling, training, experience, intelligence, or some combo thereof.  

If you, as a candidate can demonstrate in your interviews that you can perform these things, you’re far more probable to be hired. 

A typical denominator in almost all of them is robust writing capacities. 

Mastering being a professional 

We’re now entering into the domain of the advanced arts. This is what will fetch you out of the middle tech regions into the land the guru and the innovator, the leader. 

Being a professional is the packaging that you leverage to put yourself out there. Failing at this implies your content can be world-class and you can still go unnoticed or be passed over. Here are the fundamentals: 

  1. Dependability: Do not make commitments you cannot keep. Don’t be absent at meetings. Be punctual. Don’t miss deadlines for projects. Under-promise and over-deliver. 
  2. Wardrobe: Develop a solid wardrobe. Get rid of the T-shirts and the gym shoes. Purchase some quality jeans (dark) and some good shoes. Make an investment in solid dress shirts. Ensure everything is fitted. And purchase a couple of jackets to don with your shirt and jeans. Lastly, purchase at the least one good suit for when it’s required. 
  3. Speak concisely: Be clear and crisp with your verbal communication. Don’t meander. Get them out cleanly and stop so the other individual can have an opportunity to speak.  
  4. Tighten up your writing: Learn and implement this. 
  5. Learn to present: Public speaking is a tough nut to crack for several people, but if you do not have the presentation capacities you’ll be severely restricted in how far you can progress. We suggest Toastmasters for anybody who has considerable problems with the prospect of getting in front of people. 

These abilities magnify everything else that you do, and you’ll be in the company of individuals who are woefully unskilled in a single or more of these regions at all times. Be the individual who’s strong in all of these regions and you will show well in nearly any scenario. 

Comprehend the business 

This is an aspect of development that several tech personnel are lacking in, and it severely restricts their capacity to take part in communication beyond a specific level. 

Here’s the fundamental rule: For the business, everything boils down to money. Money in, money out. So all of the work you’re performing with your risk program, or your vulnerability scans, or your new zero-day exploit – that’s all way below the area of concentration for the enterprise. 

Organizations wish to quantify risk so they can determine how much should be spent on mitigating it. You should be prepped to at least think about how much risk exists – in terms of dollars, how much money will be required to mitigate that risk in several ways, and what (if any) residual risk will stay. 

This is really tough to do and you don’t wish to do it in a false, pseudo-scientific way. However, you are required to realize that each security decision is at its core a business, therefore costing money. That’s a maturity marker for InfoSec people. 

A few individuals accept this at some juncture and keep progressing, and other reject this outright and spend the remainder of their careers flipping tables. 

In summary, try to have numbers for stuff whenever feasible, and attempt to think in terms of risk and business impact in opposition to particular vulnerabilities and other info. 

Having Passion 

Till now, we’ve been speaking with regards to the tangibles. Now let’s talk a little about the other – and arguably the most critical – key differentiators between somebody who gets to the top of the ladder and who fades away in the middle. 

Curiosity, interest, and passion. 

90% of being successful is merely getting 100,000 chances to do so. You get opportunities by merely showing up. By spinning up that VM. By authoring that proof of concept. By authoring that blog post. And you have to do it constantly across a number of years. 

You can perform this in two differing ways: 

  1. Inhuman accounts of self-discipline facilitate you to do this 
  2. A deep, innate passion compels you to do this 

Not many individuals can maintain the first one for a long period. It’s hollow. It’s empty. These variants are out there, however they often burn out and move on to something else. The top people are compelled. 

Most who soldier on with cybersecurity for several years, and who are successful, accomplish as they’re powered by an internal molten core. They couldn’t stop performing security if they attempted. 

Ideally, somebody wishing to achieve in this world of cybersecurity should have mastered the art of self-discipline. It’s critical. It’s worthy of respect. You require a specific amount of it. 

But if you really wish to thrive, and do so without a frozen soul, you should be pulled by passion instead of being pushed by discipline. 

Becoming a Guru 

Now that you’ve done all of this. You’ve got experience under your belt, you’re in your 30s, 40s, 50s whatever, and things are looking upward. What does the top tier appear like? What are the leading information security able to perform that others are not? 

To start with, the typically have all of the stuff we’ve already spoken about. However, they have extra dimensions that set them apart. Instances include: 

  1. Financial knowledge: The capacity to manage budgets, comprehend startup financing, make purchase decisions etc. 
  2. Management experience: Handling projects and handling people are two different beasts, and individuals at this tier are good at both. 
  3. An extended network: Several at this tier are aware of a good percentage of the major players in cybersecurity and industry. 
  4. Dress/etiquette: Players at this table have considerably upgraded wardrobes, manners, etiquette, and enjoy more sophisticated leisure activities, for example: golf, skiing, boating, etc.  
  5. Advanced education: Having a master’s degree at this tier is a decent idea. It’s not critical, but several top-tier positions do seek for university graduates as a check point. 
  6. Media savvy: Receive training and capable of speaking with the media about several subjects. 
  7. The Tech/Business Hybrid. Individuals at this level are able to go into a room of devs and assist them, get on a call with a Fortune 50 Customer, update the board on a critical issue, and then perform an interview with a media source. 
  8. Creativity: The ones who make it this far are expected to bring up fresh and novel ideas and strategies to problems on a regular cadence. It’s not adequate at this level to merely execute on what you’ve been given. Innovation is key. 

Reversing the Interview 

There’s another thing that leading security personnel usually do after they’ve seen and done quite a few things in the domain: 

They begin thinking more about how they can alter the world, and less about what the organization is providing them. 

So rather than querying with regards to the 401k, or with regards to vacation, or pay, they’re more probable to query how much support they’ll have in the enterprise for performing what they believe requires to be done. Or they’ll begin just taking jobs where they feel they can directly impact security in a tangible fashion. 

Leading candidates are having convos in opposition to being interviewed. 

Essentially, following a specific level of experience and success, some minimal percentage of security professionals will decide that there’s nearly nothing a soul-crushing organization could provide them that would make them want to work there. And at that juncture, they’ll just take up jobs where they feel like they’re making an actual difference. 

Not everybody gets to that juncture in their career, and not everybody necessarily should. However, it’s a critical distinction in viewpoint: are they still working to get more from the organizations they are employed at, or have they transitioned to caring more about their impact on the domain? 


We hope this resource is beneficial to individuals as they enter and move through the several levels of a Cybersecurity career. 

The love lies in the journey. 

Add Comment