Transitioning to a Career in Cybersecurity

By Eric Noonan • November 1, 2018

The demand for cybersecurity talent far outstrips the supply at present, something which will likely continue for the foreseeable future. This insatiable demand has created more and more opportunities than ever before for those interested in a career in cybersecurity.

That said, many aspiring cybersecurity professionals are left wondering how to make the transition. Where do I start? What should I read? Should I get certified? What qualifications do I need? These are just some of the questions I’m frequently asked by Uber drivers, waiters, and a host of other people looking to make the jump.

The good news is that, if you’re willing to put in the sweat equity and spend your free time working hard to learn what you need to know, there is a clear and rewarding path to your goal.

I’ve helped dozens of people get into cybersecurity over the years, largely by sharing my own personal experience of career transition. I’ve introduced people to potential mentors, pointed them towards self-paced educational tools and, many times, allowed them to use CyberSheath training resources at no cost.

In fact, one of the greatest joys of working at CyberSheath for me is being able to give smart, motivated people the opportunity and the tools to make career transitions, and then watching them go on great success in their new field. We have dozens of these success stories, so read on if you’d like to be one of them…

Think

First, you must have initiative and drive. If you need to be spoon-fed instructions, you make excuses, or you’re too busy with work, life, school, kids, etc., then you’re simply not going to be able to put in the blood, sweat and tears needed to make this transition. If, on the other hand, you can think for yourself and you’re willing to do whatever it takes to make it work, you’ll likely find yourself reaping the rewards in no time.

Read

Read incessantly and voraciously. If you’re looking for the magical reading list that will transform you into a cybersecurity pro, well…there isn’t one. Just take the initiative, pick up a book, and then pick up another, and read everything you can about cybersecurity.

You’ll have a slew of acronyms to learn, along with vendor jargon and security concepts, so any reading material that helps you to become familiar with these basics will give you a good foundation on which to build your cybersecurity knowledge. Vendor marketing materials, product installation manuals, blogs, research reports, and security frameworks are a great place to start.

Do

You can’t become a security practitioner without practice. Set up a lab with whatever resources you can cobble together and do something, anything — it doesn’t matter what at this stage. If you’re stuck for ideas, there are endless online resources to help you get started.

I personally started in cybersecurity by approaching a company owner and convincing him that if he trained me, I could be a great employee. He provided the training, including the lab equipment and training materials, and I provided the sweat equity.

That was almost 20 years ago and nothing has changed. CEOs and company executives are still willing to invest in motivated people who are taking the initiative to better themselves. In fact, just like me, many of them will be happy to help if asked.

If you’re willing to take the steps outlined above, then you have the ingredients required for a successful career transition. If you’d like help making that transition, contact us today to learn about CyberSheath’s cybersecurity training and education resources.

 

 

Cybersheath Blog

CMMC Compliance Dashboard: Gain New Visibility into Compliance

CMMC is not a compliance framework. It’s a maturity model. That has big implications for how you approach compliance, but also how you keep track of all the elements that make up compliance. And yet, visibility has been one of the most difficult challenges facing DIB contractors. It used to…

CMMCEnclave: Add Versatility with a More Flexible Approach

The enclave approach to CMMC compliance is one of the most cost effective and least disruptive ways to safeguard CUI. You can maintain high-value custodial security of CUI without upending your existing processes, procedures, and people. That way, you can maintain the proper level of CMMC compliance and remain eligible…

How to Offboard Your Managed Services Provider

For any of a variety of reasons including lack of communication, slow response times, or prolonged downtime, your organization has decided to change your managed service provider (MSP). Whether you have already signed an agreement with a new MSP or you are actively looking for a replacement, now is the…

Our Trusted Partners

Cyberark McAfee Thycotic RSA Tenable Alien Vault Alert Logic Microsoft