Cybersecurity Roadmap For A Beginner
Cybersecurity Roadmap For A Beginner
security?
You are a successful experienced IT professional (non-cyber) or a beginner who wants to enter Cybersecurity field.
How can you do? What things to be considered? Are there any best approach or steps for this process? In this guide I
am going to share an approach you can follow to successfully break into cybersecurity.
Email: [email protected]
LinkedIn: https://www.linkedin.com/in/chintangurjar/
Table of contents
Research various
Prepare a study Find a mentor in Congrats! Mission
Keep doing your current job Cybersecurity Enter the field Apply for jobs
plan & study Cybersecurity Completed.
domains
Keep doing your current job (If you are not doing a job, skip to the next part)
It is vital to keep earning with your current job until and unless you have successfully entered the Cybersecurity field with a full-time job. Your family might be dependent on you.
Do not take a break for specific study/course/certifications/masters if you already work in the non-cyber-IT field.
How to know what all domains there are in cybersecurity in the first place?
Understand how many various domains there are in the security field.
Take each bullet point from that PDF and Google or ChatGPT it. Ask the below questions yourself:
4. What are day to day routines/roles and responsibilities do people have in that job role?
Disclaimer - https://github.com/iamthefrogy/Disclaimer-Warning
6. Which reputable organizations provide certifications in that domain?
7. Look for the course syllabus of that cert to understand what can be covered?
9. Which roles can you start within that domain as a beginner, and where can you reach a maximum in terms of designation?
11. What are the technical prerequisites required to land a successful first job in this domain?
Disclaimer - https://github.com/iamthefrogy/Disclaimer-Warning
Refer IT to Cyber domain mapping (This is for the people who work in IT and want to start into Cybersecurity)
Understand your position in which and the IT field you are currently working in.
Understand what possible options/areas you can start your journey with within cybersecurity.
If you are an absolute beginner with no IT experience, you can select any field you are interested in. Maybe you would choose domains close to your IT role or possibly completely
separate as you are willing to learn new things from scratch. Any approach would work here.
Disclaimer - https://github.com/iamthefrogy/Disclaimer-Warning
- You may need to learn prompt engineering first to
take out maximum from ChatGPT
Self-Learning Embarking on a personal project Practical application. Personalized - No guidance. Personal interest. Create a project plan
Projects related to the field of interest. learning. - Success depends on self-motivation. and follow through.
Disclaimer - https://github.com/iamthefrogy/Disclaimer-Warning
- Saves time due to multi such as ‘Darknet Diaries’ which provides
tasking tremendous amount of knowledge.
Massive Open Online Courses offering Access to course material from edX, Coursera, FutureLearn. Follow the
MOOCs Not all provide certification. Quality varies.
structured learning on various topics. top universities. Some are free. course syllabus.
Peer Learning Joining or forming a group to learn Collaborative learning. Immediate Scheduling conflicts. Group dynamics may vary. Meetup, student groups. Schedule
Groups together. feedback. regular meetings and follow a study plan.
Tutoring/Coachi Hiring a tutor or coach for personalized Tailored learning plan. Individual Can be expensive. Quality depends on the tutor. Tutoring platforms. Schedule regular
ng guidance. attention. sessions.
Webinars Attending live online workshops or Interactive learning. Access to Fixed timing. Quality varies. Webinar platforms. Attend live sessions
seminars. experts. and interact.
Internships/Appr Learning on the job through Real-world experience. Potential Unpaid or low pay. Quality of learning depends on the Company websites. Apply for internships
enticeships internships or apprenticeships. for job offers. job. and complete assigned tasks.
Conferences/Wo Attending conferences or workshops Networking opportunities. Can be expensive. Travel may be required. Event platforms. Attend sessions and
rkshops related to your field. Exposure to latest trends. engage in discussions.
Online Participating in online forums or Peer support. Diverse Quality of advice varies. Reddit, StackExchange. Engage in
Forums/Commu communities of learners. perspectives. discussions and ask questions.
nities
Social Media Following influencers, joining groups or Free. Informal learning. Quality and reliability of information can vary. LinkedIn Learning, Facebook groups.
Learning pages on social media related to your Follow, engage and participate in
field. discussions.
Identify what learning options you have. There are various learning options for any IT or Cyber field. There are pros and cons to every option, which I have illustrated.
2. Time allocation for your job, social life, and learning security from the above options (Prepare a daily or weekly schedule, Set targets)
3. There are two ways you can create time table to try to follow it:
a. Fixed time for your study in a day/week – This is suitable for people who know their weekly schedule, and they can dedicate a fixed time in a day/week to
study.
b. Fixed hours for your study in a day/week – This is suitable for people who do not have a fixed weekly schedule as they might have a shift job, on-call jobs or
something else. So they can dedicate any slot for fixed 1/2/3 hours in a week.
6. Stick it to your wall or any place which you cannot avoid looking at (e.g., Desk board, Refrigerator, etc.)
Disclaimer - https://github.com/iamthefrogy/Disclaimer-Warning
Enter the field
Talking about reviewing a company, I would personally consider all factors before choosing my next company:
2. Company size – To identify whether no. of employees are increasing or not. If increasing, company is doing great.
3. Company's area of serving – So you can predict what core values you would be serving to the company’s wider level goal/business.
4. Their client base – So that you can understand who will be your most of the stakeholders with whom you will work on regular basis.
5. Glassdoor and other reviews, Ppeople reviews – Does not really matter, but may give you some indication of work culture especially the one with anonymous bad
reviews and then you can ask around in your network to have better view of it before joining.
6. Company Culture – If you're curious about a company's culture, there are a few things you can look into. Check out employee reviews, take a peek at their social media
channels, and pay attention to the language they use on their website. Are they all business and no fun? Or do they seem more laid-back and easygoing? Do they talk
about valuing different perspectives and being inclusive? And what about taking care of their employees' well-being and giving them a good work-life balance? These
are all clues that can help you get a sense of what it might be like to work there.
7. Leadership – If you want to learn more about the company, it's a good idea to look into the people in charge. Who is the CEO and what's their story? How long have
they been working there? What's their leadership style like? You can usually find answers to these questions by doing a bit of online research, reading articles, and
checking out employee reviews.
8. Future Plans – Are you curious about a company's future plans? It's always a good idea to research if they have a clear roadmap for the future, invest in new
technologies or markets, or talk about their strong strategic plan publicly. You can often find this information by checking out employee reviews.
9. Recent News and Events – Look for any recent news articles or press releases related to the company. Has the company been in the news recently? If so, was the
coverage positive or negative?
10. Competitors – Who are the company's main competitors? How does the company differentiate itself from these competitors? Understanding the competitive
landscape can help you understand the challenges and opportunities the company may face.
11. Company Values and Mission Statement – Many companies post their values and mission statement on their website. Do these resonate with you? Do they align with
your own personal values?
I believe below are the foremost common factors one should consider before selecting a company or applying for a role:
There can never be any company which would fulfil all your below needs. (You will need to prioritize a minimum of 2 maximum 3 factors you would assess in your next company. So, if the first 2/3 of
your needs are completed, you can select that company.)
1. Career advancement/Challenging work/Learning and development opportunities: It's crucial to take into account the possibility of personal and professional
growth in the position. Does the organisation prioritize the development of their staff? Are there chances to progress in one's career?
a. Example: The company offers a range of programs to help their employees learn and enhance their skills, including certification sponsorship,
conference/workshop attendance sponsorship, in-house training and development programs, and opportunities for cross-team learning.
2. Base Pay/Salary/Bonus/Benefits: When it comes to choosing a job, the compensation package, including salary, bonuses, and benefits, is an important factor to
consider.
a. Example: Companies offer discounts on general goods, insurance packages, annual bonus schemes, shares, holidays and other types of leaves, etc.
Disclaimer - https://github.com/iamthefrogy/Disclaimer-Warning
3. Team/People/Boss/Management/Colleagues: Your job satisfaction is greatly influenced by the quality of your team and managers.
a. Example: Conduct thorough research on top and intermediate-level management personnel by browsing through LinkedIn and other social networks.
Scrutinize their posts, content creation, and level of engagement to evaluate their personality traits. This will help you make an informed decision on whether
or not to work with them in the future.
4. Flexibility/Work-life Balance: With the rise of remote work, many values the flexibility to work from different locations or choose their working hours.
a. Example: Does the company provide remote work or flexible working days? How many days you can maximum work from home in a week? How many
days/months you can maximum work from outside of your country? One of the great example is here - https://jobs.netflix.com/work-life-philosophy
5. Type of company (Small, Big, Product based, Consulting based, Research-based, etc.)/Reputation/Brand: The type of company and its reputation can impact
your work experience and future career opportunities.
a. Example: Working for Big4 consulting firms and FAANG companies can greatly add values to your resume. Research about the top companies in the world
through it’s sectors such as:
i. Info Tech – Apple, Microsoft, Meta, Google, Amazon, Intel, AMD, Salesforce, Nvidia, Adobe, IBM, Cisco, ServiceNow, MSI, Qualcomm, HPE, Broadcom,
etc.
ii. Healthcare – UnitedHealth Group, Johnson & Johnson, Lilly, Pfizer, Abbott, Merck, Abbvie, Danher, Amgen, Medtronic, etc.
iii. Finance – Berkshire Hathway, JPMorgan Chase & Co., VISA, Mastercard, Bank of America, Wells Fargo, Paypal, S&P Global, Citi, Aon, Blackrock,
Goldman Sach, etc.
iv. Consumer – Amazon, Macdonalds, Nike, TJX, The Home Depot, Ebay, Walmart, Pepsico, P&G, Cocacola, etc.
v. Industrial – UPS, Honeywell, GE, Boeing, Lockheed Martin, etc.
vi. Communication – Google, Meta, Netflix, AT&T, T-Mobile, Comcast, Walt Disney, Verizon, etc.
vii. Energy – Exxon Mobil, Chevron, NextEra Energy, Duke energy, etc.
To begin, it is important to compile a comprehensive list of industries within the market and identify the top 15 companies in each industry. This information can be
organized using a spreadsheet in Excel. It is recommended to aim for a high-level position within your desired industry as a long-term goal.
6. Type of Industry they serve (Banking/Financial, Retail, Gaming, Healthcare, etc.) /Reputation/Brand: Matching your interest with a relevant industry can result in
a more fulfilling career.
a. Example: If you're passionate about gaming, companies like Electronic Arts or Ubisoft could be a great fit.
Below is the list of all industries so far I know.
Infotech, Healthcare, Logistics, Transportation, Gaming, Consumer, Industrial, Communication, Energy, Automotive, Aerospace, Agriculture, Biotechnology, Chemicals,
Construction, Defense, Education, Electronics, Entertainment, Environmental Services, Fashion, Financial Services, Food and Beverage, Forestry, Hospitality, Insurance,
Legal Services, Manufacturing, Mining, Oil & Gas, Pharmaceuticals, Printing and Publishing, Professional Services, Real Estate, Renewable Energy, Retail,
Telecommunications, Textiles, Tourism, Utilities, Waste Management, E-commerce, Art & Culture, Fishing, Sports, Human Resources, Marine, Non-Profit, Online Media,
Venture Capital & Private Equity, Research, Government, Public Relations, Security, Semiconductors, Shipping, Social Services, Space & Astronomy, Venture Capital and
Private Equity, Wholesale, Design, Music
7. Location: The proximity of the company may have an impact on your daily routine and travel time. However, with the rise of remote work, this aspect may
not hold as much significance for certain individuals.
a. Example: If you work for a company based in a major city such as New York, London, Auckland, Mumbai, Delhi, San Francisco, etc., you can enjoy the perks of
an exciting city life. However, this may come at the expense of higher living expenses and longer commute times.
8. Types of services they offer: Understanding the company's product/service is essential, but its rank on the priority list may vary based on personal interest.
a. Example: Amazon Web Services (AWS) offers a broad spectrum of cloud services. If you're interested in cloud technology, this could be a compelling aspect of
the job.
9. Job Security: Especially in uncertain times, the stability of the industry and company is a crucial consideration.
Disclaimer - https://github.com/iamthefrogy/Disclaimer-Warning
a. Example: Jobs in the healthcare industry, such as at a company like Johnson & Johnson, are often considered more stable compared to gaming industry or
consulting industry. (This is just an example, not my opinion)
Finding the right mentor is challenging, especially for beginners in the security field. There are DOs and DON'Ts to consider before selecting the right mentor for yourself:
2. Don't select mentors just based on their online presence/appearance/how famous they are in the industry.
3. Don't select mentors just based on the total no. of experience they have.
4. Don't select mentors just based on their super technical hacking skills.
5. Don't select mentors just based on the number of achievements they possess.
6. Select a mentor who is down to earth, willing to learn from you as well while also coaching you.
7. Select a mentor who just not only solves your tech queries but gives you a perfect vision/direction for what you need to do to become XYZ down the line in the next 2-5
years and so on.
8. Select a mentor who is regularly contributing and giving back to the community.
9. Select a mentor with the right attitude not only the right knowledge.
10. Give time for your research, talk to them regularly, and talk to many regularly before you select them as your mentor.
11. Select more than one mentors even though their style of mentorship could be different, but it can greatly benefit you.
12. Make sure your mentor has the specific expertise or work experience in the area of cybersecurity you're interested in. For example, if you're keen on penetration testing,
it would be beneficial to have a mentor who has hands-on experience in that field.
13. The mentor you select should be reasonably available to guide you. If they are too busy or not responsive, you may not be able to benefit from their knowledge and
expertise. It's important to have a discussion about the frequency of meetings and the availability of time from both parties, whether on a weekly or monthly basis.
Additionally, it's important to determine the preferred mode of communication, whether in-person or online. If online, it's important to specify the platform to be used.
14. Your mentor should be patient and understanding, as learning new skills often takes time. They should be able to offer constructive feedback without making you feel
overwhelmed.
15. A good mentor can connect you with other professionals and resources in the field. This will not only expand your knowledge but also help you build your professional
network.
16. A good mentor should inspire and motivate you. Their passion for the field should be evident, which in turn can spark your interest and keep you motivated.
17. Most notably, in the above list, ensure all or the majority of the points give a green signal to select your mentor and don't just evaluate anyone based on one or a few
DOs or DON'Ts. Remember, no one is perfect in this world.
Disclaimer - https://github.com/iamthefrogy/Disclaimer-Warning
Only think of applying for a job if you have:
Disclaimer - https://github.com/iamthefrogy/Disclaimer-Warning
Job hunting tips
If you are an experienced IT professional, you will need to tweak your resume to make it sound more of a cybersecurity one than just an IT.
If you are a beginner, you will require to create a professional resume to apply for a job. There are plenty of cybersecurity resume templates on Google that you can refer to.
If you have no professional experience in IT or Cybersecurity, you can add below things in your resume as a beginner. Kindly refer to the Resume writing – How not to blunder
section.
Select any portal to apply for jobs but do not forget to use Google for jobs. Many jobs I have found on Google jobs portal which is not available on LinkedIn. Also Google jobs portal
just extracts data from all various job portals.
You can contact specific cybersecurity recruitment companies who fill positions for big companies.
You can add cybersecurity-specific HRs to your LinkedIn to build relations and ask them to take an interest in your profile.
Prepare for interviews based on job descriptions. Whatever roles/responsibilities are mentioned in the JD, most likely, you will be asked questions from those areas only + some the
things you have mentioned in your resume.
1. Understand each line of JD.
2. Give ChatGPT a little paragraph about the company information.
3. Then instruct ChatGPT to guess technical and scenario-based questions that can be potetntially asked to you once you supply full JD to it.
4. Get questions from ChatGPT and try to prepare answers.
5. Ensure you don’t just mug up Q&A, you must have done that work practically even.
6. Understand each line of JD and try to find online labs/resources to learn. E.g., TryHackme.
7. Practice it practically.
8. Try to evaluate what soft-skill-based questions can be asked and be ready to answer with specific examples.
It is not over yet. You have just entered the cybersecurity world. There are things you will need to continue doing for better survival and better growth.
1. Learn more things – Learn those things in your company which you cannot simply learn by Google and YouTube. E.g., One can learn how to hack a website by sitting
at home, but cannot learn, how to design a new secure architecture diagram for application development within the DevSecOps project based on their company's
infrastructure. That is the real experience.
2. Advancing to management – See what else you would require learning apart from tech skills to advance your career to the management level. Learn more soft skills in
business, and management. Learn people, process and technology problem dealing.
3. Know your competitions – Competitions are everywhere; it is an excellent way to keep yourself motivated and learn more things that others are learning in your
network.
4. Know the market – Understand how the market is shifting in cybersecurity, know various new vendors coming into the market, and launching their products to tackle
large enterprise problems. Understand what problems are being discussed in the community through conference panel discussions, YouTube podcasts, or other
sources. Understand the market when you started your career, how rapidly it is changing, and where it is going. You can determine your future roles and opportunities
and can set goals accordingly.
Disclaimer - https://github.com/iamthefrogy/Disclaimer-Warning
5. Do not get demotivated – Cybersecurity is a very competitive field. You will meet many people in your life who might know more things than you. Don't get
demotivated by that. If they know 2 things, you know 1; if they share 1 extra thing with you, now you both know 2 things. So always keep +ve attitude of learning from
them and don't get demotivated by your position of learning.
6. Make StackOverflow, ChatGPT & Google your besties – It is not important what you don't know; it is crucial to how quickly can you learn. Google and StackOverflow
are the best sources for your doubts (tech or non-tech). Keep them at your fingertips. It is ok to ask stupid questions, so keep asking around.
7. Community appearance – You should attend/present at well-known conferences. Start with your local town conference/meetups. Present on a few topics. Gain
confidence in public speaking. Then advance to national level conferences and then international level. Meet more people and build relationships.
8. Bad practices in Cybersecurity – Nothing is perfect in this world. In cybersecurity, even there are bad practices, loopholes, and cheats. Ensure whatever small or big
decision you take; you do all your sanity checks and don't get training to all of these.
9. Work on Your Communication Skills - Whether it's writing an email, presenting a project, or just daily conversation, effective communication is crucial in the
workplace. The better you are at conveying your ideas, the more impact you'll have.
10. Mentorship - Seek out mentors within your industry. These individuals can provide guidance, offer advice, and help navigate your career path. Similarly, be willing to
mentor those who are newer or less experienced than you. This can be a rewarding experience that also improves your leadership skills.
11. Maintain a Healthy Work-Life Balance - This one often gets overlooked, but it's crucial to your long-term success and mental health. Make sure to take time for
yourself and your loved ones. Exercise, hobbies, and relaxation are just as important for your career growth as your professional development.
12. Professional Certifications - Earning professional certifications in cybersecurity can be very beneficial in expanding your knowledge and skills, and it could also make
you more attractive to employers. Certifications like CompTIA Security+, Certified Ethical Hacker (CEH), Certified Information Systems Security Professional (CISSP), etc.
can give you an edge in your career.
Disclaimer - https://github.com/iamthefrogy/Disclaimer-Warning
risk assessments; cybersecurity Assessment, Participate in online
frameworks (NIST, ISO 27001) Cybersecurity Audit cybersecurity communities
Study cryptography
Symmetric and asymmetric Understanding the legal and
Encryption, principles, understand real- Crypto101, Coursera
encryption; hash functions; digital ethical implications of
Cryptography Cryptanalysis, PKI world applications; practice Cryptography
signatures; public key infrastructure encryption, strong attention
Management encrypting and decrypting Course
(PKI) to detail
messages
Disclaimer - https://github.com/iamthefrogy/Disclaimer-Warning
Understanding of cloud-based Understanding cloud security
Get cloud-specific
technologies (AWS, Azure, Google governance, risk
Cloud Architecture, certifications like AWS AWS Training,
Cloud Security Cloud); virtualization; container management and
Cloud GRC, DevSecOps Security, Azure Security Microsoft Learn
security; cloud security architecture compliance (GRC), contract
Engineer
and tools negotiation
Participate in incident
Incident detection, analysis and Crisis management, strong Incident Management,
response drills; Get SANS Institute, EC-
Incident Response response; digital forensics; communication skills, Digital Forensics,
certifications like Certified Council
remediation decisiveness Disaster Recovery
Incident Handler (ECIH)
International
Understanding of data lifecycle,
Understanding business Data Governance, Learn about privacy laws Association of
data encryption, data loss
Data Security value of data, ethical Privacy Compliance, and regulations, Privacy
prevention (DLP), privacy
considerations Data Loss Prevention understand DLP tools Professionals,
regulations (GDPR, CCPA)
Coursera - GDPR
Knowledge of secure facility design, Understanding of risk Facility Security, ASIS International,
Physical Security access control systems, surveillance management, interpersonal Surveillance, Personal Gain a broad Security
systems skills Security understanding of physical Management
security principles, learn
Disclaimer - https://github.com/iamthefrogy/Disclaimer-Warning
how physical and cyber
security overlap
Disclaimer - https://github.com/iamthefrogy/Disclaimer-Warning
Gain experience in
Knowledge of advanced
Advanced Persistent penetration testing; Red Team Journal,
penetration testing techniques; Strategic thinking,
Threat Emulation, Social participate in red team Red
Red Teaming familiarity with threat emulation; adaptability, team
Engineering, Physical exercises; acquire CRT Teaming/Adversary
understanding of social engineering collaboration
Intrusion (Check Red Team) or Simulation Toolkit
and physical security
similar certifications
Security engineers develop and implement security solutions using threats and
Security Engineer • Testing and screening security measures across software
vulnerability data - often sourced from members of the security workforce. Security
(Design, monitor and maintain • Monitor networks and reports to update systems and mitigate
security controls, networks, and engineers work across circumventing a breadth of attacks, including web application
vulnerabilities
systems to help prevent attacks, network threats, and evolving trends and tactics. The ultimate goal is to
cyberattacks) • Identify and implement systems needed for optimal security
retain and adopt security measures to mitigate the risk of attack and data loss.
Incident Incident responders respond productively and efficiently to security breaches. • Developing and adopting a thorough, actionable incident
Responsibilities include creating plans, policies, and protocols for organisations to response plan
Responder/Digital enact during and following incidents. This is often a highly pressurized position with • Maintaining strong security best practices and supporting
Forensics assessments and responses required in real-time, as attacks are unfolding. Incident incident response measures
Disclaimer - https://github.com/iamthefrogy/Disclaimer-Warning
(Identifies and mitigates response metrics include MTTD, MTTA, and MTTR - the meantime to detect, • Post-incident reporting and preparation for future attacks,
attacks whilst an attacker’s
operations are still unfolding)
acknowledge, and recover (from attacks.) The aim is to achieve a swift and effective considering learnings and adaptations to take from incidents
response, retain financial standing and avoid negative breach implications.
Ultimately, incident responders protect the company's data, reputation, and financial • Collect digital evidence while observing legal procedures
standing from cyber-attacks. • Analyse digital evidence to find answers related to the case
• Document your findings and report on the case
If you like to play detective, this might be the perfect job. If you are working as part
of a law-enforcement department, you would be focused on collecting and analysing
evidence to help solve crimes: charging the guilty and exonerating the innocent. On
the other hand, if your work falls under defending a company's network, you will be
using your forensic skills to analyse incidents, such as policy violations.
You may see penetration testing referred to as Pentesting and ethical hacking. A
Penetration • Conduct tests on computer systems, networks, and web-based
penetration tester's job role is to test the security of the systems and software within
applications
Tester a company - this is achieved through attempts to uncover flaws and vulnerabilities
• Perform security assessments, audits, and analyse policies
(Responsible for testing through systemised hacking. Penetration testers exploit these vulnerabilities to
technology products for • Evaluate and report on insights, recommending actions for
evaluate the risk in each instance. The company can then take these insights to
security loopholes) attack prevention
rectify issues to prevent a real-world cyberattack.
Red teamers share similarities to penetration testers, with a more targeted job role.
Penetration testers look to uncover many vulnerabilities across systems to keep • Emulate the role of a threat actor to uncover exploitable
Red Teamer cyber-defense in good standing, whilst red teamers are enacted to test the vulnerabilities, maintain access and avoid detection
(Plays the role of an adversary, company's detection and response capabilities. This job role requires imitating cyber • Assess organizations’ security controls, threat intelligence, and
attacking an organization and
criminals' actions, emulating malicious attacks, retaining access, and avoiding incident response procedures
providing feedback from an
enemy’s perspective) detection. Red team assessments can run for up to a month, typically by a team • Evaluate and report on insights, with actionable data for
external to the company. They are often best suited to organisations with mature companies to avoid real-world instances
security programs in place.
Disclaimer - https://github.com/iamthefrogy/Disclaimer-Warning
A Security Operations Center (SOC) is a team of IT security professionals tasked with
monitoring a company’s network and systems 24 hours a day, seven days a week. As Tier 2 analyst in the SOC, your duties will involve
Their purpose of monitoring is to: • Focus on the deeper investigation, analysis and remediation.
Security Analyst
• Proactively hunt for adversaries
(SOC – Tier 2) • Find vulnerabilities on the network • Monitor and resolve more complex alerts
(Incident Responder) • Detect unauthorized activity • Prepare weekly/monthly reporting
• Discover policy violations
• Detect intrusions
Master's Degree
Myths Reality
A Master's degree in cybersecurity is not It is true but not 100%. There are some intermediate benefits of having a master’s degree on your resume. Those benefits are not
required. just limited to your technical and academic knowledge of cybersecurity but also related to your people networking and other soft
skills such as team building, project management, strategic planning, communication, business communication writing, etc.
A Master's degree in cybersecurity is helpful to There won't be any difference in your starting salary as a fresher in cybersecurity even though you have a masters from any
get more salary or a quick job. country.
There is an exception to this. If your university is super famous and has quality placements, then based on grad assessments, they
can give you a good package as a starter compared to someone who just passed out from university and is trying to find a job via
LinkedIn and other portals.
Cybersecurity requires skills, and masters, they It is not true, and it is based on the university to university and country to country. What you see people doing in the community
don't teach practical knowledge; they only teach is knowledge of working in corporate & doing professional research. Don't expect the university will provide you with that level of
basic skills and primarily theoretical. knowledge.
Disclaimer - https://github.com/iamthefrogy/Disclaimer-Warning
Master's programs are designed to develop your cyber foundation and let you know how many different fields there in
cybersecurity are rather than teaching you very professional stuff that is being used in the corporate world. They expect you to
clear your fundamentals, communication, and consulting skills. Also, if you are a university pass out, companies understand your
level of knowledge, so they will not even expect you to showcase your skills that match their company's requirements.
If I have masters in cybersecurity, my chances of It won't make any difference in job interviews; people with even CA or commerce with cyber knowledge and skills can get a job
getting selected for job interviews are higher instead of you. This field demands skills and knowledge and not your solid academic background only.
The first thing to consider is why you want to study for a master's in the first place. Is it so that you can progress in your career? Is it a requirement to pursue a particular field? Or are you
just doing it for the sake of learning? Whatever the reason, it can help you to narrow down your options. Don't be tempted to pick a degree just because you feel it might look good on
your CV, either.
This question is very hypothetical, and there is not a single answer. There are 50-50% advantages and disadvantages of doing and not doing a master’s in your career, especially in
cybersecurity or any other field.
Advantages:
• If you do a master’s degree in foreign country, you will get good local exposure to that country; you will be studying and spending time with different people from
various countries.
• Your communication will be improved.
• You will be doing many projects with your classmates together, which will teach you how professional project management can be done, including planning,
execution, communication, & presentation.
• You will be able to travel to a new country to meet new people, get exposure to the local cybersecurity market of that country, regional security conferences, etc.
Disadvantages:
• A Master's degree will not give you real-life knowledge of security that is being done in corporates. However, this is not a big disadvantage, as those programs are
designed to build a foundation only.
• A Master's degree takes 2/3 years of your life. So, if you want to skip it, you can have 2/3 years of corporate experience instead of doing masters.
• Masters will not give you a higher salary.
• Masters will not make you different in job interviews.
• Course fees are very high, especially you if are going for a master's degree in western countries.
• Important: You may or may not get a post-study work visa. In most countries, once you study, there are very tiny chances of finding a company that can sponsor
you, so you may have to come back to your original country after studying there. Work visa sponsorships are very, very, very rare for Indian students.
So, it really depends on you. If you have TIME and MONEY and want to get some foreign exposure, you can do master; else, you can prefer doing it from your own country. If you don't
have time and money, you can skip it and get a job directly after your bachelor's.
Access to the career services department has been in helping you prepare for interviews and search for internships and full-time jobs
Internship
The answer to this question is too broad. It depends on many factors such as:
• Which company is providing Internship (Product based company, security consulting company, Big4 etc.?)
• What are their requirements for internship programs?
• What will be the job roles and responsibilities during the internship?
• What are the expectations from an employer?
There are very few; I would say only a handful of companies that provide quality internships where you would learn valuable things. Most of the money-making companies are running
CEH (Certified ethical hacker – Which is the official certification from EC-Council, a well-reputed cybersecurity certification authority) and related courses on the name of an internship.
For example, if my company's name is Prakash, then I will provide my own CEH certification in the name of "PCEH – Prakash Certified Ethical Hacker" and so on.
So, I have prepared 'DO' and 'DON'T' for selecting a company for your internship.
DO
Ask them about your daily responsibilities, tasks, and job routines.
Ask them what the learning options are they can provide to you during your internship.
Disclaimer - https://github.com/iamthefrogy/Disclaimer-Warning
Ask them what their expectations from you during the duration of the internship will be.
Ask more and more people around for the reviews of those companies you are evaluating for internships.
Identify your career interests. This could be done by self-reflection, speaking with a Career Counsellor or your mentor
Ask the company about paid or unpaid Internships. You can go for any as far as other criteria are matched.
If you are interested in any company and can't find any internship opportunity, you can check their website and social media. Connect to their HRs via LinkedIn and ask the same.
Better understand and research who they are, what they do, their strengths and weaknesses
Perform at least 5 mock interviews with your career counsellor or mentor before going for an internship interview.
DON'T
Don't select a company that do not serve any clients or serve any handful of clients only with simple projects.
Don't select a company that asks you to teach their students via their coaching, training programs.
Don't get attracted by their company's reputation through magazines, press, awards from random conferences or panels.
Don't select a company where only 4/5 people are working; all are Founders, Co-Founders, Directors. If you do, please check their professional background. Check whether they
obtained these titles without having any prior corporate experience or started their start-ups after having at least 8 years of experience in the industry.
Cybersecurity-specific cert provider authorities - ISC2, eLearnSecurity, Offensive Security, ISACA, EC-Council, CompTIA, CREST, SANS, GIAC, etc.
These are vendor product-specific cert provider authorities – Amazon (AWS), Google (GCP), Microsoft (Azure), Cisco, Checkpoint, etc. There can be others as well.
Are these certs requiring in the market? Search LinkedIn jobs where those JDs require these certs for the jobs. If they are not required, no need to go for that cert
Are you going for a beginner level cert in your particular domain or going for a management/high-level cert directly? Know what the starting point vs is ending point
Are you going to obtain multiple certs from the same cert provider or choose different cert providers every time? It is good to have different cert providers' certificates on your
resume.
Disclaimer - https://github.com/iamthefrogy/Disclaimer-Warning
Are you taking cert for the sake of job only? Or for knowledge?
If the job only then is, you are spending a huge amount of money without having any job confirmation even?
What will be the future of this cert after 5 years? Can it be obsolete? Will people still feel its value?
E.g., the Overtime value of CEH has dropped, companies still recommend it, but anyone who has CEH is not that regarded compared to OSCP, OSCE, GPEN, etc.
E.g., Regardless of the time period, the value of CISSP, Security+ have always been there in any company. It has never decreased.
Are your career goals aligned with the certificate you are going to obtain?
If possible, it is recommended to obtain a certificate in technical and managerial areas of your cybersecurity domain.
Types of companies
Consulting
Legends Small Consulting Firms Product-based Firms Security Vendor Firms
(Big4 & Other Big companies)
Size They are giants, thousands of employees Small and Medium Enterprises It can be any small, medium, large Enterprises It can be any small, medium, large Enterprises
Big giants serve the entire world. Big giants serve the entire world.
Limited based on their presence, areas of services they
Client-base Serves clients all over the world
provide due to expertise Small companies are limited to serve their local Small companies are limited to serve their local
clients. clients.
Depends on the areas of services they master. They will Two types of roles:
provide services in limited cybersecurity areas based on 1. Serve clients by solving their queries on
Executes various types of projects (Projects You will be doing anything and everything to
their expertise. your security products OR
Project type vary from technical to management all secure the products of these companies from
2. Work with the engineering team to
areas of cybersecurity) external attackers.
Some only provide technical, some provide tech + enhance product algorithm, engine,
management, etc. features, signatures.
Disclaimer - https://github.com/iamthefrogy/Disclaimer-Warning
Good learning opportunities in consulting Massive as you work within a company to secure
Learning & technical both areas. Their own global Limited (From your peers and surroundings) Mostly, you their infrastructure. So, you have the advantage Limited based on the area you work in for that
opportunity network cross-country learning will be a self-learner of knowing the company better than external firm.
opportunities attackers.
Competitive salaries (depends on the size of the Competitive salaries (depends on the size of the
Salary Competitive salaries It depends on the size and revenue of the organization
company) company)
No worries.
Here are ten great resume-building activities that will make you stand out from the competition: (Thanks to Naomi Buckwalter for compiling this list -
https://www.linkedin.com/in/naomi-buckwalter/)
Once you do the majority of these, you would have a good number of things to showcase in your resume and your Interview.
Below are some common resume blunders I have seen over the years. Try to avoid it.
Disclaimer - https://github.com/iamthefrogy/Disclaimer-Warning
Resume Blunders to Avoid
Typos and Grammatical It's crucial to proofread your resume before submitting it. Errors may suggest a lack of attention to detail or professionalism.
Errors
Providing Inaccurate Whether it's wrong dates or exaggerated qualifications, falsifying information is always a big no-no.
Information
Using an Unprofessional Your email address should be simple, professional, and easily identifiable as yours. Avoid using inappropriate or quirky email handles.
Email Address
Including Personal Details about your age, religion, marital status, and other personal data should not be on your resume, as they could lead to unconscious bias or even
Information legal issues.
Having an Objective
That's Not Related to If you include an objective, it should directly relate to the position you're applying for.
the Job
One-size-fits-all
Tailor your resume to the specific job you're applying for. Highlight the most relevant experiences and skills.
Resumes
Overloading Your Keep your resume concise. Typically, a resume should not exceed two pages. Too much text can be overwhelming and important information may be
Resume overlooked.
Listing Responsibilities Employers are more interested in what you've accomplished in your roles than a list of duties.
Instead of Achievements
Including Irrelevant
Hobbies, interests, and experiences that do not relate to the job you're applying for should not be included.
Information
Not Using Action Verbs Use strong action verbs to begin your bullet points to give them more impact.
Using Clichéd Terms like "synergy", "go-getter", and "team player" are overused and have lost their impact. Be specific about your skills and accomplishments instead.
Buzzwords
Lack of Specifics Vague statements do not help employers understand your abilities. Be specific and offer details about your accomplishments.
Poor Formatting Avoid using unusual fonts, colors, or graphics. Stick to a clean, professional format.
Including References on
Unless specifically asked, you don't need to include references in your resume. The phrase "references available upon request" is also unnecessary.
Your Resume
Outdated Information If it's not recent or relevant, consider whether it really needs to be on your resume.
Not Using Numbers Quantifying your achievements can help give a clearer picture of your capabilities and impact.
Disclaimer - https://github.com/iamthefrogy/Disclaimer-Warning
Using an Inappropriate
The file name should be professional and make it clear whose resume it is.
Resume File Name
Having an Unfocused
Career Objective or If included, these should clearly communicate your career goals and why you're a good fit for the position.
Summary
Excessive Jargon or
Not everyone reading your resume may understand industry-specific terminology, so it's best to avoid or explain it.
Acronyms
Inconsistent Tense Use past tense for past jobs and present tense for your current job.
Long Paragraphs Instead of writing long paragraphs, use bullet points to make your resume easier to read and understand.
No Clear Structure Your resume should have a clear structure with headers, bullet points, and consistent formatting.
Using "I" or "My" It's better to use third-person or no pronouns at all in your resume.
Not Highlighting If you were promoted in a company, it's important to highlight this to show your success and progression.
Promotions
Lack of Contact You'd be surprised how many people forget to include their contact information. Make sure to include your phone number and professional email
Information address.
Unless you are applying for a job where your appearance is important (like acting or modeling), there's no need to include a picture. It could potentially
Including a Picture lead to discrimination.
Not Showcasing Especially when changing industries or roles, it's important to highlight skills that can transfer from one job to another.
Transferable Skills
Irrelevant Job Unless you can demonstrate how an older or unrelated job helped develop your skills for the job you're currently applying for, it's usually best to leave it
Experience off your resume.
Many companies use automated applicant tracking systems (ATS) that look for specific keywords related to the job. If your resume doesn't have those
Missing Keywords keywords, it might be overlooked.
Overusing Bold or Italic Use bold and italic text sparingly to highlight important parts of your resume. Overuse can make it look cluttered and unprofessional.
Text
Disclaimer - https://github.com/iamthefrogy/Disclaimer-Warning
No Hyperlinks to
Professional Online Including hyperlinks to your LinkedIn profile or online portfolio can provide more context and depth to your resume.
Profiles
Including High School Unless you're a recent high school graduate, there's no need to include high school information. Focus on more recent and relevant education and
Information experience.
Your profile picture matters a lot to many. It’s not about to look, but it’s about professionalism. We have social media like Facebook, Instagram, etc., to
share our photos in whichever way we want. But on LinkedIn, many HRs or professionals would want to see you as a professional. Posting a professional
Profile pic profile pic shows your attitude, how seriously you take a LinkedIn platform, and professionalism. Not that it’s going to affect you a lot in your next
Interview round, but something to consider in order to mature your LinkedIn profile from all 360 degrees.
Things you share and like describe your personality. This is a very common issue among all. People share and like a random post. People use LinkedIn
from their perspective but not from the other’s (HR and big company’s CEO or manager) perspective. Ask yourself if you are HR and if you want to find a
candidate to work in your company, and you are visiting his or her profile. You find more stuff regarding other general things such as jokes, politics,
Things you share and random debates, inspirational quotes etc. How would you know that the person is good at his domain or not? Does that profile sound good? If you are a
like
cybersecurity person and visit my profile, there should be some takeaway for you in terms of my knowledge sharing through my profile. So, you visit my
profile, and you will find more articles, links, etc., about cybersecurity that may interest you. Because this is a professional network, and you should try to
share and like stuff related to your profession only. So, the point is only talking about shares and likes related to your field, not random things.
Writing a post also matters a lot. Do not write stuff out of your field, portraits discrimination, hate rate, bad things about a specific community, cast,
Writing a post on your religion, etc. Your post must be crystal clear and should be understood by all types of audiences who read it. Don’t do bulk sharing. You shared a post
wall today; wait for 5 days at least to write another post. Let people read, react like and share your existing work. Don’t act like a spammer or unprofessional
enthusiast who just keep on sharing things to increase your reachability.
Only write posts that are not discussed before yet not explored a lot. Well, I would never talk about cybersecurity, why it is essential, what is website
hacking, etc. Numerous amounts of the stuff are there on the internet. I would only discuss specific things within the topic only, which can take the
interest of others. If I sound unique, people may create an impression that I am a researcher/explorer, not just a techie guy who works on cybersecurity.
Write relevant posts Writing a post can be your own work, discussion topic, research, tutorial, literature review and debate outcomes. Always before writing, think that do I
sound negative? Can many people dislike this, or do I have a negative view of this topic compared to others? Do not share such things at all. You must
be neutral on each topic. Be neutral, be unique, add more specific and detailed things to explain your writing, give a clear message do not sound
confused that whether you are asking or telling or just sharing or what you want, avoid using short forms and F words or any lame and abusing words.
Be gentle all the time. When someone adds you give these two lines to them. Thanks for adding me to your professional network. I am glad to connect
Be polite and gentle with you. How are you? No need to use sir, mam; no one likes that on LinkedIn. If you share something and people give negative comments, then gently
accept, or share your further argument. Do not fight. Choose your words carefully.
Disclaimer - https://github.com/iamthefrogy/Disclaimer-Warning
Keep your LinkedIn profile up to date with your contact info, email id, phone number and other details. For your every job, also mention what your key
Contact information role in that company was. Also, mention if any awards or recognition you got in that company or not. For this, you can visit my profile and check yourself
how I highlighted my work in each former company.
Write your introduction paragraph carefully, mention three things. What are you? No. of experience and what are you looking for in your future (means
Introduction Paragraph where you want to move your career ahead, what you want to learn, what type of challenging roles you are looking for)
Mention the relevant achievements in your profile only. I have plenty of national-level prizes in drawing competitions but does it relevant to my profile.
Achievements HR is visiting my profile to see what kind of tech expertise I have. How does it matter to them? Even within IT, I hold web and graphics designing
certification from Aren animation. Still, I work on cybersecurity, so I don’t see a reason to share this even in my profile. So only share relevant things.
Add the best profile title. 2 liner title. Whoever visits your profile, he/she should have your impression just by looking at your profile title only. For this, visit
Profile title my profile and see how and what I wrote under my name.
Add images or documents to your experience. Did you know that you can add media files to your experience? It is a great way to create a visual portfolio
Upload documents along with your standard resume information.
Ask for Endorsements are great, but recommendations are the currency of the realm on LinkedIn. Reach out to past colleagues, managers, and associates and
recommendations ask that they write you a recommendation.
It is hard to get a job in a foreign country sitting in your own country. Why because of Visa sponsorship.
Visa Issues: One of the major obstacles that many international students face when seeking employment is their visa status. Companies might be reluctant to hire someone who requires
sponsorship for a work visa due to the additional cost and paperwork involved. Also, there can be uncertainties around the length of stay the visa allows.
Local Experience: Some employers may prefer candidates who have previous work experience in the country, as they would be more familiar with local industry practices, regulatory
environments, and cultural norms. This can put international students at a disadvantage, especially if they don't have any local work experience.
Cultural Differences: Even with the right skills and qualifications, cultural differences can impact a candidate's ability to fit into the workplace. These could include language barriers,
communication styles, and understanding of local customs and etiquette.
Networking: In many industries and countries, a lot of jobs are found through networking. International students may lack this local network which makes it more difficult for them to
learn about job opportunities.
Among all above, VISA is the biggest factor. Let’s understand that in detail:
In the UK, an international candidate usually needs to have a Tier 2 (General) visa to work. For a company to hire such a candidate, they generally need to do the following:
Disclaimer - https://github.com/iamthefrogy/Disclaimer-Warning
1. Obtain a Sponsor License: Before a company can employ someone from outside the UK, they generally need to be licensed to sponsor international workers by the Home Office.
This involves an application process, during which the company must demonstrate that they are a genuine organization operating lawfully in the UK, and that they are aware of
and capable of carrying out their sponsorship duties.
2.
3. Issue a Certificate of Sponsorship: Once the company has a Sponsor Licence, they can issue a Certificate of Sponsorship (CoS) to the individual they wish to hire. This is not a
physical document, but a unique reference number that the candidate will need when they apply for their visa.
4. Carry out a Resident Labour Market Test (RLMT): Before they can issue a CoS, the company generally needs to demonstrate that they've made a genuine effort to fill the
position with a resident worker. This often involves advertising the job in the UK for a certain period and documenting the recruitment process. As of my knowledge cutoff in
2021, the RLMT requirement has been replaced by a points-based immigration system, but employers still need to demonstrate that the job is at an appropriate skill level and
that it pays a suitable salary.
5. Manage Ongoing Sponsorship Duties: Once the individual is employed, the sponsoring company has a range of ongoing duties to fulfill. These can include keeping records on
the employee, reporting certain changes to the Home Office, and ensuring that the individual is complying with the conditions of their visa.
These processes can be time-consuming and costly for the company. They also involve a degree of risk, as the company's Sponsor Licence can be downgraded or removed if they fail to
fulfill their duties. Furthermore, visa applications can be refused for a variety of reasons, which can leave the company without the employee they were planning to hire.
Even after all these headaches, there is a 50-50 chance that the government will be convinced to grant permission to that company to hire you. None of the methods is accurate and
achievable. Because getting a job in abroad company depends on so many factors such as:
Job titles 2. Create a list of job roles/titles/positions you are interested in or relevant to your area of domains.
LinkedIn Job Filter (Country) 3. Go to LinkedIn jobs. Filter country with one of your dream countries. Give a single job title.
LinkedIn Job Filters (Date) 4. Filter results by latest jobs first through advanced filters of LinkedIn.
Apply for jobs 5. Apply for every single job you think are worth it for you to have.
6. Once you have applied to all the jobs of the last 30 days, create job alerts on LinkedIn for any new job posts that come out in that
Create alerts country. Apply it straightaway.
Disclaimer - https://github.com/iamthefrogy/Disclaimer-Warning
Change country 7. Repeat the entire process with another country in next week. Keep shuffling countries and repeat the same steps.
8. Add 10 cybersecurity practitioners every day in your LinkedIn from the country you want to go in who work in the same area of
Add security people
security as you.
Add security HRs 9. Add 5 cybersecurity HR every day in your LinkedIn from the country you want to go in.
10. After increasing your network in the local region of your dream country, you need to do create unique, valuable research and start
posting regular content on LinkedIn. Let people know who you are, what you can do, what your interests, etc. If they know you
Share knowledge more, there are good chances they might want to work with you, or they see you as a potential candidate for their company, etc.
Disclaimer - https://github.com/iamthefrogy/Disclaimer-Warning
I am satisfied with my job because:
Disclaimer - https://github.com/iamthefrogy/Disclaimer-Warning
General DOs and DON'Ts in Cybersecurity
Apart from all the things we have discussed so far, there are still plenty of things you should and shouldn't do in the cybersecurity industry. The following table
illustrates DOs and DON’Ts of the cybersecurity industry.
DO
If you develop more curiosity, you will learn a lot, which is the only way to succeed in our industry.
Keep a target of two years and ask yourself where you want to see yourself in the next two years. Keep achieving this target and then set a new target after two years.
• Share knowledge. Don’t just keep it with you. If you share, you will: (Source: https://github.com/s0md3v/be-a-hacker)
• Be appreciated and it will motivate you to share more.
• Any mistakes or improvements to be made in your content will be pointed out so the overall quality of it will increase.
• You can only explain something if you understand it well which can be a self-check to see if you actually know enough about a topic.
• Exposure is a great thing. It will bring you opportunities and the power to influence people for good.
It is good to work in different areas of cybersecurity; maybe some of the areas might not be relevant after some years; at that time, if you would have knowledge and skills in other
areas of cybersecurity, you would be able to survive and find a new job. It would be easier for you to switch from one domain to another at that time.
Respect gender diversity and give the same amount of respect to all men and women.
Maintain healthy relationships with everyone in cybersecurity because the security industry is very small, and you would meet the same people wherever you go.
DON'T
Do not go for the paid courses which are already available freely on the internet
Disclaimer - https://github.com/iamthefrogy/Disclaimer-Warning
Do not get attracted by fame and money game after bug bounty industry
Do not apply any shortcuts in the industry, whether it's for certification or getting a job.
A rockstar is a person who might be skilled but isn't a very good person to work/talk with. They often have a big ego; they like to work alone because they know* everything and they
often look down on people. It doesn't essentially mean that they are bad people because this behaviour can be both intentional and unintentional. The point is, they look bad doing
so and more importantly, make others feel bad.
To be honest, this is a common problem and I too once started to slip into this zone due to depression, it was not fun, that's why I have included it.
Don't be some egoistic genius sitting in a room. (Source: https://github.com/s0md3v/be-a-hacker)
I think below are the challenges beginners face in any industry when they step into the corporate world. Not only I have shared the challenges, but I also shared how you can overcome
them.
Communication fear • Don’t understand how to communicate with new professionals in the market. There are plenty of videos on YouTube specifically for business and corporate
• Don’t understand what business and corporate communication vs friendly college/social life communication skills improvisation. It is essential to go through it and stand
communication is different from your fellow beginners in the market as a beginner. You can use the
• Don’t know how to start talking with new professionals below keywords to go through YouTube videos.
• Don’t know what to talk what not to talk about until you make a healthy relationship with the • Professional communication skills
new professional • Business communication skills
• LinkedIn communication skills
• Business communication
Unprofessional communication Below are some examples of unprofessional communication. Simple, don’t do things mentioned in the left column.
• Asking straightaway for reference and jobs • Keep patience
• Asking questions for which you can easily get answers from Google • Start with simple, small
• Chasing people often as they might be busy • Build slow healthy relations
• Writing long intro email until and unless someone asked you • Ask experienced people around you to help you
• Giving your resume straightaway as you add people • Ask your mentor
• Not checking your tone of the message • Observe how to experience people talk to you when you are talking with them
• Adapt different professional people’s talking/writing styles to improvise
yourself.
Lack of patience Beginners are very much desperate to get something, whether it’s material, an answer to a question, Remember, what’s essential for you can or cannot be important for others. So, it is
suggestion or even a reply from HR after applying for a job. wise to keep patience. Keep patience as there are always other ways, different
alternatives for your needs.
They send chaser emails, call them, and find ways to communicate with them faster via phone, social
media, etc. Give them reasonable sufficient time. Don’t chase people often as you want things to
move desperately.
Disclaimer - https://github.com/iamthefrogy/Disclaimer-Warning
Especially for jobs, if HR does not reply after you apply for the job, maybe your
resume is not selected. No HR in the world just receives a resume and send it to the
dustbin without looking at it.
Writing blunders (Resume, LinkedIn, Beginners make a lot of mistakes in resumes, LinkedIn profiles and emails to any professional. I have described all the resumes and LinkedIn blunders in a detailed section of this
Email) article.
Lack of industry/corporate Beginners assume things in their own way, but they are not well-versed with the reality of how Some tips for you:
understanding corporate works. What you think outside is not the same case as how a company works within the • Unless and until you work in the industry, you cannot understand how it
inside. operates from outside
• Don’t assume ask around
For example, submitting 1 bug (vulnerability) to a company, you think why the company has not • Keep patience
responded for 4/5 days even as it’s just a straightforward bug. • Keep seeking advice of your mentors
What you don’t know is, any single bug/vulnerability related comms that come from outside will go
through a proper VDP program inside for which app team, infra team, incident management,
vulnerability management and SOC team would be a part of. They all are responsible for doing one or
many things with that report. Such as:
Hence, when you apply, you should not expect a quick response.
Poor grades Some beginners will have poor grades in their education, and they are hesitant to show them on their You don’t need to write grades or show them to any company unless and if they ask
resumes. you. Just mention what study you have completed.
In the cybersecurity world, skills and practical knowledge weigh more than grades. If
some companies, ask for grades and also questions you why poor grades you can
answer them below:
Disclaimer - https://github.com/iamthefrogy/Disclaimer-Warning
• You were interested more in practical knowledge during your education; hence
you focused on real skills than theoretical knowledge.
• Maybe you might genuinely have some social or other responsibilities or any
other reason you got poor grades; you can transparently explain those.
• Maybe you are preparing for the cybersecurity certification.
So, you don't need to fear even if you have poor grades. You can still transparently
show your education stuff on your resume.
Lack of self-learning I have seen beginners asking many simple questions for which answers are readily available on I think the YouTube industry has created so many videos on YouTube which lets you
Google. Self-learning is really required in the cybersecurity industry. know from very simple things to very complex things; on top of that, you can search
all the things easily on Reddit and Google.
You should only ask other questions if you cannot find answers easily from Google
or any other sources on the internet.
Don’t know which companies to go for Often beginners don't know which company they should apply for a job, whether it's a product base, I have covered this challenge & it’s solution in-depth within this article.
consulting, or a good security company.
Feeling demotivation, there are two types of demotivation. I have covered both of them in detail within this article, along with the possible
1. knowledge and skills demotivation solutions.
2. Experience demotivation
How to stay up to date with the latest knowledge in the security field
If you Google this, there are plenty of methods to stay up to date in the security field. The best way I found is by using more and more hashtags (#). Individuals and companies both love
hashtags. If there are any latest news, people tweet it using hashtags. If you follow any blog, YouTube channel, or any single resource, you will not have other domain knowledge than
those creators put out there. If you start visiting many links, you will not be able to keep a bookmark of all URLs, and management would be difficult. All you can do is collection of more
and more hashtags.
DO
Know what your area of the domain is specifically (E.g., SOC, Pentest, Cloud Security)
Start listing all possible hashtags in those areas. Ensure you think of a wide variety of stuff while creating hashtags, such as methodologies being used, most common tools being
used, other relevant tags being used with that, etc.
Filter noise of data by looking at the latest (last 24 hours, last week) contents only.
Read it
Create a weekly schedule on reading on 1 topic every day; then follow the cycle.
DON'T
Disclaimer - https://github.com/iamthefrogy/Disclaimer-Warning
Don't add irrelevant hashtags for which people don't often put any content (simply because they don't use those hashtags even)
Don't add a very long hashtag for which chances of finding content are tiny
Sample hashtag database for you to start with (you can create your own like this)
Disclaimer - https://github.com/iamthefrogy/Disclaimer-Warning
I have found this scenario that many college/university pass-outs become CEO/Founder/Co-Founder straight after graduation. Some think that having a founder/co-founder/CEO on a
profile makes a difference, and it looks cool. I am not saying no one should become an entrepreneur, but my point is without having any proper corporate experience, you should not
jump straight into entrepreneurship.
One should not become an entrepreneur in cybersecurity without having any of the single things from below:
Without any of the single thing from above, there is no way you can survive in the market, and I guarantee you.
Post this analysis, create a product, and sell in the market as an entrepreneur.
Since you will be a young, dynamic aspirant, if you go with this all analysis, you will still be excited to work on something as you want to become a CEO, don’t rush, the market is very
dynamic, almost there are every solution in the market, and they are good even. So do proper research else, don’t even think about this.
I have seen plenty of people who started their company without having any of the above and then:
- Not able to serve client properly as they don’t understand how big corporate works internally
- Not able to beat their competitors as they don’t know what they are up against
- Not able to know how the market industry works as no experience of working in corporate at all
- Struggle to get a project as they don’t have good funding to invest, unique service or unique product.
- No one knows about you as you are an absolute fresher with no credible experience or achievements.
- You lose patience after a few years of trying to run your company, and when you close it, search for a good job with a stable income in any big company.
Disclaimer - https://github.com/iamthefrogy/Disclaimer-Warning
How not get demotivated in cybersecurity?
Demotivation in cybersecurity is not a new thing. Due to the high amount of competition in security, things such as attitude, knowledge monopoly, marketing of experience and
knowledge is common. A lot of youngsters who get demotivated when:
Knowledge/Skills Demotivation
You learn
Now
Disclaimer - https://github.com/iamthefrogy/Disclaimer-Warning
You know SAME as They know
You need to take this as a positive approach and keep constant learning without getting demotivated. If another person knows 5 things, you learn them from YouTube, Blogs, Courses,
and Free materials. Now you and they both have the same knowledge, so there is no need to get demotivated in security if you don’t know things.
Be grateful that you met that person through whom you came to know what else you needed to learn. Make a not, learn it. Have the same knowledge as they now. Mission
accomplished.
Experience Demotivation
If you get demotivated by someone’s massive experience in cybersecurity, always believe in the below diagram
So at the end we all are same. In fact younger generation (pink bar) has slight advantage in this case where they can learn new technology and advance their last
couple of years of career when older generation (orange bar) has already retired by that time.
Disclaimer - https://github.com/iamthefrogy/Disclaimer-Warning
Appendix 1 - IT to Cyber domain/role mapping
Network security
Filtering
VPN
DDOS protection
Infrastructure VAPT
DevOps, Web Developer, Software Developer, Development Manager, Project Development Manager (Agile/Scrum Master), Project
Manager, Database Administrator, Database Engineer, Quality Tester, QA Engineer
Threat modelling
DevSecOps
Design review
Secure coding
Static Analysis
Bug bounty
VAPT
Application security testing (Web, Android, iOS, thick/thin client app testing)
SAST
DAST
WAF
RASP
Disclaimer - https://github.com/iamthefrogy/Disclaimer-Warning
Windows Administrator, Server Administrator, Linux Administrator, System Administrator, Windows/Linux Engineer, IT analyst, IT
Helpdesk Analyst, Helpdesk Technician, Technical Support Engineer/Specialist, Programmer
Endpoint security
Anti-virus/anti-malware
EDR solutions
HIDS/HIPS
App whitelisting
Infrastructure VAPT
Secure configurations
Auditor, Reviewer, Compliance Manager, Financial Auditor/Reviewer, Legal and Regulatory and any Senior Leadership within IT role
Compliance (PCI, SOX, HIPPA, NIST, FedRAMP)
Lawsuit Risk
Risk management
Security strategies
Vulnerability Management
Risk assessment
Security awareness
DR/BRP
Disclaimer - https://github.com/iamthefrogy/Disclaimer-Warning
Cloud Architect, Cloud Consultant, Cloud Service Developer, Cloud Administrator, Cloud System Engineer
Incident response
Breach investigation
Forensics analysis
Breach communication
Crisis Management
Blockchain Security
Malware analysis
Reverse Engineering
Disclaimer - https://github.com/iamthefrogy/Disclaimer-Warning
References:
• https://www.careeraddict.com/choose-master-degree
Disclaimer - https://github.com/iamthefrogy/Disclaimer-Warning