<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Becoming Cyber]]></title><description><![CDATA[Unlock your cyber destiny: Empowering students and career changers to seize cybersecurity success!]]></description><link>https://www.becomingcyber.com</link><image><url>https://substackcdn.com/image/fetch/$s_!OnHX!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1c26a730-e390-4d92-b761-edec5555b41d_500x500.png</url><title>Becoming Cyber</title><link>https://www.becomingcyber.com</link></image><generator>Substack</generator><lastBuildDate>Mon, 18 May 2026 05:05:52 GMT</lastBuildDate><atom:link href="https://www.becomingcyber.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Becoming Cyber Newsletter]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[becomingcyber@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[becomingcyber@substack.com]]></itunes:email><itunes:name><![CDATA[Oritse J. Uku]]></itunes:name></itunes:owner><itunes:author><![CDATA[Oritse J. Uku]]></itunes:author><googleplay:owner><![CDATA[becomingcyber@substack.com]]></googleplay:owner><googleplay:email><![CDATA[becomingcyber@substack.com]]></googleplay:email><googleplay:author><![CDATA[Oritse J. Uku]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Demystifying the Distinction: Cybersecurity vs. Information Security]]></title><description><![CDATA[There&#8217;s so much to learn, when you&#8217;re trying to get into cybersecurity.]]></description><link>https://www.becomingcyber.com/p/demystifying-the-distinction-cybersecurity</link><guid isPermaLink="false">https://www.becomingcyber.com/p/demystifying-the-distinction-cybersecurity</guid><dc:creator><![CDATA[Oritse J. Uku]]></dc:creator><pubDate>Fri, 30 Jun 2023 12:32:36 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Ke_D!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd487ecbc-4cba-4112-a075-2e026892c586_1920x1280.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Ke_D!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd487ecbc-4cba-4112-a075-2e026892c586_1920x1280.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Ke_D!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd487ecbc-4cba-4112-a075-2e026892c586_1920x1280.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Ke_D!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd487ecbc-4cba-4112-a075-2e026892c586_1920x1280.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Ke_D!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd487ecbc-4cba-4112-a075-2e026892c586_1920x1280.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Ke_D!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd487ecbc-4cba-4112-a075-2e026892c586_1920x1280.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Ke_D!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd487ecbc-4cba-4112-a075-2e026892c586_1920x1280.jpeg" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d487ecbc-4cba-4112-a075-2e026892c586_1920x1280.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:167426,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Ke_D!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd487ecbc-4cba-4112-a075-2e026892c586_1920x1280.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Ke_D!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd487ecbc-4cba-4112-a075-2e026892c586_1920x1280.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Ke_D!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd487ecbc-4cba-4112-a075-2e026892c586_1920x1280.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Ke_D!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd487ecbc-4cba-4112-a075-2e026892c586_1920x1280.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://www.pexels.com/photo/young-annoyed-female-freelancer-using-laptop-at-home-3808008/">Andrea Piacquadio</a></figcaption></figure></div><p>There&#8217;s so much to learn, when you&#8217;re trying to get into cybersecurity. You study, learn, and network. Then along the way, you notice that occasionally people say <em>information security</em>, instead of <em>cybersecurity</em>. Some people use the two interchangeably. The usage is confusing, but you may be reluctant to ask.</p><p>The confusion is understandable. Many professionals in the field&#8212;yours truly included&#8212;regularly switch between the two terms or simply use the wrong one. Why? More on that shortly. First let us inquire, what is the difference between cybersecurity and information security?</p><p>Allow me to provide a non-technical analogy.</p><p>Everybody knows what a dog is, right? (One is sleeping next to me as I write this.) Regularly, we refer to dogs as <em>canines</em>. In fact, we act as if <em>canine</em> is simply a fancy word for <em>dog</em>. Here&#8217;s the thing&#8230; Dogs and canines aren&#8217;t necessarily the same thing. Sure, dogs <em>are</em> canines. But wolves, coyotes, and jackals are canines too. Yet when a police cruiser labeled &#8220;K-9 Unit&#8221; drives by, you would never expect a 120-pound wolf to stick its head out the window. Yet, despite the inaccuracy we still regularly treat <em>dog</em> and <em>canine</em> as synonyms in English.</p><p>In this analogy cybersecurity is the dog and information security is the canine. Cybersecurity involves confidentiality, integrity, and availability&#8212;known as the CIA Triad&#8212;for computer systems and networks. Information security is broader, encompassing domains such as identity and asset management (IAM), security assurance, security architecture, and more. Cybersecurity is part of information security, but information security is bigger than just cybersecurity.</p><p>So why do professionals in the field mix the two up? Largely because cybersecurity has developed a brand and awareness. Everyone has heard of cybersecurity nowadays. Even if they cannot explain precisely what cybersecurity is, they know it has to do with stopping bad guys on computers. It took a few decades for cybersecurity to enter the public&#8217;s consciousness. Thus it&#8217;s simpler to say <em>cybersecurity</em>, when you really mean <em>information security</em>.</p><blockquote><p>Cybersecurity is part of information security, but information security is bigger than just cybersecurity.</p></blockquote><p>To be fair, as people move around in their career, they may move from a cybersecurity role to an information security role, then back to another cybersecurity role. Of note however, the top job in this field is called the Chief <em>Information Security</em> Officer (CISO), not the Chief <em>Cybersecurity</em> Officer.</p><p>While professionals in the field are capable of in-depth discussions about the difference between cybersecurity and information security, rest assured that our friends and families have little interest in hearing them. Thus, if you bump into us at a barbecue, we&#8217;re likely to just say we work in cybersecurity. Even though we know, it&#8217;s an imperfect answer.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.becomingcyber.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Becoming Cyber Newsletter! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[InfoSec Career Accelerator: The Essential Skill Set for Newcomers]]></title><description><![CDATA[What is the most valuable skill set which I would recommend that information security newcomers learn?]]></description><link>https://www.becomingcyber.com/p/infosec-career-accelerator</link><guid isPermaLink="false">https://www.becomingcyber.com/p/infosec-career-accelerator</guid><dc:creator><![CDATA[Oritse J. Uku]]></dc:creator><pubDate>Tue, 30 May 2023 12:31:10 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Wllf!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f02be80-6cd8-461f-a30d-c6641d81975e_1920x1280.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Wllf!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f02be80-6cd8-461f-a30d-c6641d81975e_1920x1280.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Wllf!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f02be80-6cd8-461f-a30d-c6641d81975e_1920x1280.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Wllf!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f02be80-6cd8-461f-a30d-c6641d81975e_1920x1280.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Wllf!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f02be80-6cd8-461f-a30d-c6641d81975e_1920x1280.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Wllf!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f02be80-6cd8-461f-a30d-c6641d81975e_1920x1280.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Wllf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f02be80-6cd8-461f-a30d-c6641d81975e_1920x1280.jpeg" width="728" height="485.5" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9f02be80-6cd8-461f-a30d-c6641d81975e_1920x1280.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:728,&quot;bytes&quot;:451242,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Wllf!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f02be80-6cd8-461f-a30d-c6641d81975e_1920x1280.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Wllf!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f02be80-6cd8-461f-a30d-c6641d81975e_1920x1280.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Wllf!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f02be80-6cd8-461f-a30d-c6641d81975e_1920x1280.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Wllf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f02be80-6cd8-461f-a30d-c6641d81975e_1920x1280.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://www.pexels.com/photo/african-american-female-freelancer-using-laptop-and-drinking-coffee-5256142/">Samson Katt</a></figcaption></figure></div><p>What is the most valuable skill set which I would recommend that information security newcomers learn? That&#8217;s an interesting question. After all, infosec isn&#8217;t a single job. The information security career field consists of easily over a dozen roles. So what single skill would be valuable across the spectrum? Easy. Cloud computing. It provides the greatest benefit across a range of roles for information security professionals.</p><p>Not every infosec role is technical, but it&#8217;s vital that every infosec professional achieves a reasonable level of technical acumen. In previous years, that might have included studying for the CompTIA Network+ or a similar certification.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.becomingcyber.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Becoming Cyber Newsletter! Subscribe for free to receive new posts.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div class="pullquote"><p>&#8220;Cloud computing remains the number one most sought-after skill.&#8221;</p></div><p>The rise of cloud computing provides newcomers with a leapfrog opportunity. They can go directly to the new, in-demand skill without needing to focus on on-premise networking first. There&#8217;s even an advantage. Newcomers won&#8217;t have to unlearn legacy ways of doing things, based upon the limitations of on-premise technology.</p><p>Here&#8217;s the bonus. If you gain a solid understanding of cloud computing, you&#8217;ve also acquired a basic understanding of on-premise computing.</p><h1><strong>Cloud is the Future</strong></h1><p>In the not-to-distant future <em>cloud security</em> will simply be called &#8220;cybersecurity.&#8221; That&#8217;s because so much of organizations&#8217; infrastructure will be in the cloud, that securing the cloud will no longer be a niche subset of cybersecurity. Not surprisingly, many infosec senior leaders today have no cloud background and don&#8217;t have the bandwidth to develop this new skill. This creates opportunity for the newer generation.</p><p>By learning cloud you can stand out with an in-demand skill set, which can be reasonably relevant for on-premise security as well. Cloud computing also introduces concepts like <em>shift left</em> and <em>policy-as-code</em>, which skilled infosec professionals can leverage to improve an organization&#8217;s entire security program.</p><p>How much demand is there for cloud-literate professionals? According to the consultancy <a href="https://www2.deloitte.com/us/en/pages/consulting/articles/cloud-computing-skills-shortage.html">Deloitte</a> between 2017 and 2020 the number of cloud job postings increased by 97%. While 90% of IT leaders planned to expand their cloud environments, 80% said a shortage of cloud-literate staff is holding them back.</p><p>In the same Deloitte report, Megan Slabinski&#8211;a district president at the recruiting firm Robert Half&#8211;stated, &#8220;Cloud computing remains the number one most sought-after skill.&#8221; When you combine the cloud skills shortage with the <a href="https://www.isc2.org/Research/Workforce-Study">cybersecurity workforce gap</a>&#8212;3.4 million roles remained unfilled globally in 2022&#8212;a very compelling opportunity becomes evident.</p><h1><strong>Learning Cloud&nbsp;</strong></h1><p>So where do you start? If you&#8217;ve already landed your first information security job, learn whichever cloud platform your organization is using. If you haven&#8217;t landed your first infosec job yet, learn AWS. It has a robust number of certifications and training available, and the concepts are transferable between platforms.</p><p>Learning a new cloud platform after AWS is like learning a second romance language. If you learned to speak Spanish already, learning Portuguese or Italian shouldn&#8217;t be too difficult.</p><p>Personally, I&#8217;ve found <a href="https://acloudguru.com/">A Cloud Guru</a> and <a href="https://tutorialsdojo.com/">Tutorials Dojo</a> very effective resources in studying for and passing cloud certifications. I used ACG for certification courses and TD for practice tests.</p><p>I&#8217;m a supporter of certifications, because they provide a standardized way to learn a new skill set to an established standard. Of course, this must include a good amount of learning by doing. Your cloud certification journey should include ample time spent <em>hands-on-keyboard</em> in the console. After all, the goal is to learn new cloud skills. Certifications are simply evidence of having done so; they are not the genuine goal.</p><h1><strong>Cloud Adoption</strong></h1><p>Organizations across the globe are working on digital transformation efforts, which largely means that they&#8217;re working on their cloud adoption. If technology teams can build it, security teams need to defend it.</p><p>As such, you can expect the demand for security professionals with cloud skills to remain high. The shift towards cloud computing will force information security programs to shift as well. That includes integrating concepts which allow us to be more efficient and effective. If you want to be an information security leader of tomorrow, there&#8217;s a lot of benefit to learning cloud computing today.</p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.becomingcyber.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Becoming Cyber Newsletter! Subscribe for free to receive new posts.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Share Your Good News With The People Who Helped You]]></title><description><![CDATA[We&#8217;ve discussed the value of networking the journey to your first cybersecurity job.]]></description><link>https://www.becomingcyber.com/p/share-your-good-news-with-the-people</link><guid isPermaLink="false">https://www.becomingcyber.com/p/share-your-good-news-with-the-people</guid><dc:creator><![CDATA[Oritse J. Uku]]></dc:creator><pubDate>Fri, 08 Oct 2021 12:30:08 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!YOoF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1b92c106-89d8-4e74-a759-1c75b41fa7cc_1000x667.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!YOoF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1b92c106-89d8-4e74-a759-1c75b41fa7cc_1000x667.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!YOoF!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1b92c106-89d8-4e74-a759-1c75b41fa7cc_1000x667.jpeg 424w, https://substackcdn.com/image/fetch/$s_!YOoF!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1b92c106-89d8-4e74-a759-1c75b41fa7cc_1000x667.jpeg 848w, https://substackcdn.com/image/fetch/$s_!YOoF!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1b92c106-89d8-4e74-a759-1c75b41fa7cc_1000x667.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!YOoF!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1b92c106-89d8-4e74-a759-1c75b41fa7cc_1000x667.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!YOoF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1b92c106-89d8-4e74-a759-1c75b41fa7cc_1000x667.jpeg" width="1000" height="667" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/1b92c106-89d8-4e74-a759-1c75b41fa7cc_1000x667.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:667,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;silhouette photo of man on cliff during sunset&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="silhouette photo of man on cliff during sunset" title="silhouette photo of man on cliff during sunset" srcset="https://substackcdn.com/image/fetch/$s_!YOoF!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1b92c106-89d8-4e74-a759-1c75b41fa7cc_1000x667.jpeg 424w, https://substackcdn.com/image/fetch/$s_!YOoF!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1b92c106-89d8-4e74-a759-1c75b41fa7cc_1000x667.jpeg 848w, https://substackcdn.com/image/fetch/$s_!YOoF!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1b92c106-89d8-4e74-a759-1c75b41fa7cc_1000x667.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!YOoF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1b92c106-89d8-4e74-a759-1c75b41fa7cc_1000x667.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@zacdurant?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText">Zac Durant</a> on <a href="https://unsplash.com/s/photos/success?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText">Unsplash</a></figcaption></figure></div><p>We&#8217;ve discussed the value of networking the journey to your first cybersecurity job. A side effect of your networking is that you&#8217;ll develop a group of cybersecurity professionals and leaders who are interested in your success. These stakeholders are people who took the time to review your resume, talk to you about different cybersecurity specialties, made introductions for you, and so on.</p><p>There is one last step to your journey to become a cybersecurity professional. It&#8217;s by far the easiest. After you accept an offer for your first cybersecurity job, contact the people who helped you get there. It doesn&#8217;t need to be anything overly elaborate. Call them or send them an email and let them know about your success.</p><p>They&#8217;ll have interest in hearing about your new role. Tell them what excites you about the new position. You can even mention your ambitions in the coming years. Then of course, thank them for their role in your journey. Do this <em>before</em> making your big LinkedIn announcement of your new role.</p><blockquote><p>After you accept an offer for your first cybersecurity job, contact the people who helped you get there.</p></blockquote><p>This simple, but important step, serves a few purposes. First, the people who helped you genuinely wish you success. Cybersecurity needs more good people. If you're smart, curious, and driven, we need you. Let your stakeholders know that they helped add another cybersecurity professional to our ranks.</p><p>Second, the followthrough helps to further develop your cybersecurity relationships. There is a value to having a cybersecurity network that extends beyond your employer. By demonstrating that your contact is more than transactional, you can help develop relationships that go beyond one-time assistance.</p><blockquote><p>Cybersecurity needs more good people. If you're smart, curious, and driven, we need you.</p></blockquote><p>Third, you&#8217;ll demonstrate that you&#8217;re a class act. It&#8217;s easy to post your career update to LinkedIn with the presumption that all your stakeholders will see it there. It takes effort to individually create messages to the people who helped. The effort will serve as a demonstration of your character.</p><p>It can be challenging to get into cybersecurity. Because of that challenge it will feel truly amazing when you get that first job. After you do, make sure you stick the landing. Properly thank the people who helped you. It will impact how your cybersecurity stakeholders view you as a professional.</p><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:40711404,&quot;url&quot;:&quot;https://www.becomingcyber.com/p/why-is-cybersecurity-a-future-proof&quot;,&quot;publication_id&quot;:273635,&quot;publication_name&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;publication_logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/1c26a730-e390-4d92-b761-edec5555b41d_500x500.png&quot;,&quot;title&quot;:&quot;What Makes Cybersecurity a &#8216;Future-Proof&#8217; Career?&quot;,&quot;truncated_body_text&quot;:&quot;In a world in which workers&#8212;both blue- and white-collar&#8212;increasingly see their livelihoods automated away, cybersecurity remains a future-proof career. That&#8217;s great for cybersecurity professionals. It can be motivating for aspiring entrants. While technology continues to disrupt seemingly every career field, this on&#8230;&quot;,&quot;date&quot;:&quot;2021-08-31T12:30:18.685Z&quot;,&quot;like_count&quot;:0,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:870380,&quot;name&quot;:&quot;Anonymous&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/3f55ce8d-abfa-42dd-999e-08b26b570f15_4160x4160.jpeg&quot;,&quot;bio&quot;:&quot;A cybersecurity leader in incognito mode.&quot;,&quot;profile_set_up_at&quot;:&quot;2021-07-17T12:40:36.606Z&quot;,&quot;publicationUsers&quot;:[{&quot;id&quot;:222091,&quot;user_id&quot;:870380,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:273635,&quot;name&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;subdomain&quot;:&quot;becomingcyber&quot;,&quot;custom_domain&quot;:&quot;www.becomingcyber.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Becoming Cyber provides students and career changers with the tools they need to break into cybersecurity careers.&quot;,&quot;logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/1c26a730-e390-4d92-b761-edec5555b41d_500x500.png&quot;,&quot;author_id&quot;:870380,&quot;theme_var_background_pop&quot;:&quot;#E8B500&quot;,&quot;created_at&quot;:&quot;2021-01-29T12:19:10.915Z&quot;,&quot;rss_website_url&quot;:null,&quot;email_from_name&quot;:&quot;Becoming Cyber&quot;,&quot;copyright&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false}}],&quot;is_guest&quot;:false}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:null,&quot;language&quot;:&quot;en&quot;,&quot;source&quot;:null}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://www.becomingcyber.com/p/why-is-cybersecurity-a-future-proof?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!OnHX!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1c26a730-e390-4d92-b761-edec5555b41d_500x500.png" loading="lazy"><span class="embedded-post-publication-name">Becoming Cyber Newsletter</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">What Makes Cybersecurity a &#8216;Future-Proof&#8217; Career?</div></div><div class="embedded-post-body">In a world in which workers&#8212;both blue- and white-collar&#8212;increasingly see their livelihoods automated away, cybersecurity remains a future-proof career. That&#8217;s great for cybersecurity professionals. It can be motivating for aspiring entrants. While technology continues to disrupt seemingly every career field, this on&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">5 years ago &#183; Anonymous</div></a></div><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:38790927,&quot;url&quot;:&quot;https://www.becomingcyber.com/p/cybersecurity-is-a-people-business&quot;,&quot;publication_id&quot;:273635,&quot;publication_name&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;publication_logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/1c26a730-e390-4d92-b761-edec5555b41d_500x500.png&quot;,&quot;title&quot;:&quot;Cybersecurity Is A Relationship Business&quot;,&quot;truncated_body_text&quot;:&quot;When people think of the cybersecurity profession, many naturally think of the technical aspect. You certainly need technical proficiency. Many would be surprised to hear, however, that cybersecurity is really a relationship business. Whether you look at the protected or the protectors, people are the lynchpin. The systems and applications, which cyberse&#8230;&quot;,&quot;date&quot;:&quot;2021-07-20T12:30:30.799Z&quot;,&quot;like_count&quot;:0,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:870380,&quot;name&quot;:&quot;Anonymous&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/3f55ce8d-abfa-42dd-999e-08b26b570f15_4160x4160.jpeg&quot;,&quot;bio&quot;:&quot;A cybersecurity leader in incognito mode.&quot;,&quot;profile_set_up_at&quot;:&quot;2021-07-17T12:40:36.606Z&quot;,&quot;publicationUsers&quot;:[{&quot;id&quot;:222091,&quot;user_id&quot;:870380,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:273635,&quot;name&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;subdomain&quot;:&quot;becomingcyber&quot;,&quot;custom_domain&quot;:&quot;www.becomingcyber.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Becoming Cyber provides students and career changers with the tools they need to break into cybersecurity careers.&quot;,&quot;logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/1c26a730-e390-4d92-b761-edec5555b41d_500x500.png&quot;,&quot;author_id&quot;:870380,&quot;theme_var_background_pop&quot;:&quot;#E8B500&quot;,&quot;created_at&quot;:&quot;2021-01-29T12:19:10.915Z&quot;,&quot;rss_website_url&quot;:null,&quot;email_from_name&quot;:&quot;Becoming Cyber&quot;,&quot;copyright&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false}}],&quot;is_guest&quot;:false}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:null,&quot;language&quot;:&quot;en&quot;,&quot;source&quot;:null}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://www.becomingcyber.com/p/cybersecurity-is-a-people-business?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!OnHX!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1c26a730-e390-4d92-b761-edec5555b41d_500x500.png" loading="lazy"><span class="embedded-post-publication-name">Becoming Cyber Newsletter</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">Cybersecurity Is A Relationship Business</div></div><div class="embedded-post-body">When people think of the cybersecurity profession, many naturally think of the technical aspect. You certainly need technical proficiency. Many would be surprised to hear, however, that cybersecurity is really a relationship business. Whether you look at the protected or the protectors, people are the lynchpin. The systems and applications, which cyberse&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">5 years ago &#183; Anonymous</div></a></div>]]></content:encoded></item><item><title><![CDATA[Will Cybersecurity Certifications or Hands-On Experience Land You the Job?]]></title><description><![CDATA[I write a lot about the value of certifications on the road to landing your first cybersecurity job.]]></description><link>https://www.becomingcyber.com/p/will-cybersecurity-certifications</link><guid isPermaLink="false">https://www.becomingcyber.com/p/will-cybersecurity-certifications</guid><dc:creator><![CDATA[Oritse J. Uku]]></dc:creator><pubDate>Fri, 24 Sep 2021 12:30:28 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!qw3M!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6e5689ac-3a17-4e01-ad15-f775d5bfdc26_1000x562.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!qw3M!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6e5689ac-3a17-4e01-ad15-f775d5bfdc26_1000x562.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!qw3M!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6e5689ac-3a17-4e01-ad15-f775d5bfdc26_1000x562.jpeg 424w, https://substackcdn.com/image/fetch/$s_!qw3M!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6e5689ac-3a17-4e01-ad15-f775d5bfdc26_1000x562.jpeg 848w, https://substackcdn.com/image/fetch/$s_!qw3M!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6e5689ac-3a17-4e01-ad15-f775d5bfdc26_1000x562.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!qw3M!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6e5689ac-3a17-4e01-ad15-f775d5bfdc26_1000x562.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!qw3M!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6e5689ac-3a17-4e01-ad15-f775d5bfdc26_1000x562.jpeg" width="1000" height="562" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/6e5689ac-3a17-4e01-ad15-f775d5bfdc26_1000x562.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:562,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;woman in black and white crew neck t-shirt sitting on red couch&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="woman in black and white crew neck t-shirt sitting on red couch" title="woman in black and white crew neck t-shirt sitting on red couch" srcset="https://substackcdn.com/image/fetch/$s_!qw3M!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6e5689ac-3a17-4e01-ad15-f775d5bfdc26_1000x562.jpeg 424w, https://substackcdn.com/image/fetch/$s_!qw3M!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6e5689ac-3a17-4e01-ad15-f775d5bfdc26_1000x562.jpeg 848w, https://substackcdn.com/image/fetch/$s_!qw3M!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6e5689ac-3a17-4e01-ad15-f775d5bfdc26_1000x562.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!qw3M!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6e5689ac-3a17-4e01-ad15-f775d5bfdc26_1000x562.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@matcfelipe?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText">Mateus Campos Felipe</a> on <a href="https://unsplash.com/s/photos/woman-job?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText">Unsplash</a></figcaption></figure></div><p>I write a lot about the value of certifications on the road to landing your first cybersecurity job. However, on the internet you&#8217;ll see plenty of people loudly proclaiming that certifications are BS and the only thing that matters is hands-on experience. So which is it? In order to make yourself marketable, should you pursue certifications or hands-on experience? The short answer is: both.</p><h3><strong>Value of Certifications</strong></h3><p>A cybersecurity certification provides more than a fancy piece of paper, a colorful badge, or resume filler. It provides a roadmap to learn something new. For example, let&#8217;s take the Certified Ethical Hacker (CEH) certification. You could absolutely learn about ethical hacking without the CEH. The benefit you get from the certification is a curated agenda of skills and knowledge to work with.</p><p>Admittedly, passing a certification exam isn&#8217;t a demonstration of expertise in a given subject area. After all, the passing score for most certifications is somewhere around 70%. Back in your school days your parents wouldn&#8217;t have been particularly impressed with a report card touting 70%. What passing a certification does demonstrate is that you understand the topic to a widely understood, acceptable standard. The CompTIA Security+ exam is the same exam around the world. On the other hand, your college course or individual learning will vary in covered topics and depth.</p><p>Detractors claim that passing a certification simply demonstrates that you&#8217;re good at taking certification exams. There&#8217;s a bit of truth there. The exams are often in a familiar computerized, multiple choice format. (We&#8217;ll carve out an exception for the <a href="https://www.offensive-security.com/pwk-oscp/">Offensive Security Certified Professional (OSCP)</a> certification. I&#8217;ve never heard anyone claim this 100% hands-on exam is anything less than challenging.) All things considered, you&#8217;ll have an advantage if you&#8217;re good at standardized tests. That skill is not enough though. You need to actually learn the material.</p><p>Honestly, the loudest critics of cybersecurity certifications are a bit disingenuous about the realities of landing a job with no prior cyber or IT experience. Breaking into cybersecurity is hard. The HR software and recruiters are screening most people out based on the content of their resumes. In the absence of professional experience, certifications are valuable in helping get your resume to the hiring manager. Certifications help in the recruiting process.</p><h3><strong>Value of Hands-On Experience</strong></h3><p>While certifications provide a great roadmap to learn new skills, the best way to actually learn new skills is by doing. Build things. Take things apart. Break things. Fix things. Watching a demonstration is useful. What&#8217;s more useful? Working to get things to work on the second, third or fourth attempt. Those lessons will stick with you more than a demonstration. You get a lot of value from hands-on experience. After all, real life isn&#8217;t a multiple choice test.</p><p>How do you get hands-on experience? There are three effective ways to go about it:</p><ol><li><p>Join a cybersecurity bootcamp</p></li><li><p>Use an online cybersecurity lab environment</p></li><li><p>Build a cybersecurity lab environment</p></li></ol><h4>Cyber Bootcamp</h4><p>There are pros and cons to cybersecurity bootcamps. They can be worthwhile, but you&#8217;ll really want to do your research. Not all bootcamps are created equal. Here&#8217;s some with checking out.</p><ul><li><p><a href="https://www.coursereport.com/best-cyber-security-bootcamps">21 Best Cyber Security Bootcamps | Course Report</a></p></li><li><p><a href="https://www.npower.org/apply/cybersecurity/">Cybersecurity | NPower</a></p></li><li><p><a href="https://cybernowlabs.com/cyber-security-analyst-training">Cybersecurity Analyst Training | CyberNow Labs</a></p></li></ul><h4>Online Cyber Lab</h4><p>Want something easy to get your feet wet? Looking for a taste of cybersecurity to see, if it&#8217;s really for you? Online cybersecurity labs are a painless way to get access.</p><ul><li><p><a href="https://www.pbs.org/wgbh/nova/labs/lab/cyber/">Cybersecurity Lab | Nova Labs</a></p></li><li><p><a href="https://community.immersivelabs.online/register">Immersive Labs</a></p></li><li><p><a href="https://cyberskyline.com/professional/purchase">Cyber Skyline Professional</a></p></li><li><p><a href="https://www.infosecinstitute.com/skills/">Infosec Skills | Infosec Institute</a></p></li></ul><h4>Home Cyber Lab</h4><p>Nothing says &#8220;hands-on experience&#8221; like building your own cybersecurity lab. Obviously, you don&#8217;t know what you don&#8217;t know. So leverage some quality online guidance on how to build a home cybersecurity lab.</p><ul><li><p><a href="https://medium.com/illumination/building-a-cybersecurity-lab-a-simple-guide-on-using-security-operating-systems-to-build-a-home-b288cd7ce8f0">Building a cybersecurity lab: A simple guide on using security operating systems to build a home lab | Medium</a></p></li><li><p><a href="https://cybersecurity.att.com/blogs/security-essentials/how-to-build-a-home-it-security-lab-episode-1">Building a home cybersecurity lab | AT&amp;T</a></p></li><li><p><a href="https://www.cyberwoxacademy.com/post/building-a-cybersecurity-homelab">Building a Cybersecurity Homelab | Cyberwox Academy</a></p></li></ul><h3><strong>Do Both</strong></h3><p>When pursuing your first cybersecurity job, it really shouldn&#8217;t be a decision between certifications or hands-on experience. You&#8217;ll want to do both. They each have benefits, which complement each other like peanut butter and chocolate.</p><p>If someone comes to an interview with a couple certifications on their resume and they&#8217;re prepared to talk about their hands-on experience, that person will be in an advantageous position. Sure it takes more time to do both. It&#8217;s an investment in yourself.</p><h3>Recommended Posts</h3><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:38121452,&quot;url&quot;:&quot;https://www.becomingcyber.com/p/do-cybersecurity-certifications-even&quot;,&quot;publication_id&quot;:273635,&quot;publication_name&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;publication_logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/1c26a730-e390-4d92-b761-edec5555b41d_500x500.png&quot;,&quot;title&quot;:&quot;Do Cybersecurity Certifications Even Matter?&quot;,&quot;truncated_body_text&quot;:&quot;There&#8217;s a school of thought in cybersecurity&#8212;and in technology, in general&#8212;that certifications don&#8217;t matter. That experience is the only thing that matters. The thought goes that certification issuing organizations are just in the business of making money. Experience matters more than certifications and certifications are an ineffective measure of one&#8217;s&#8230;&quot;,&quot;date&quot;:&quot;2021-07-06T12:30:42.464Z&quot;,&quot;like_count&quot;:0,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:870380,&quot;name&quot;:&quot;Anonymous&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/3f55ce8d-abfa-42dd-999e-08b26b570f15_4160x4160.jpeg&quot;,&quot;bio&quot;:&quot;A cybersecurity leader in incognito mode.&quot;,&quot;profile_set_up_at&quot;:&quot;2021-07-17T12:40:36.606Z&quot;,&quot;publicationUsers&quot;:[{&quot;id&quot;:222091,&quot;user_id&quot;:870380,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:273635,&quot;name&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;subdomain&quot;:&quot;becomingcyber&quot;,&quot;custom_domain&quot;:&quot;www.becomingcyber.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Becoming Cyber provides students and career changers with the tools they need to break into cybersecurity careers.&quot;,&quot;logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/1c26a730-e390-4d92-b761-edec5555b41d_500x500.png&quot;,&quot;author_id&quot;:870380,&quot;theme_var_background_pop&quot;:&quot;#E8B500&quot;,&quot;created_at&quot;:&quot;2021-01-29T12:19:10.915Z&quot;,&quot;rss_website_url&quot;:null,&quot;email_from_name&quot;:&quot;Becoming Cyber&quot;,&quot;copyright&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false}}],&quot;is_guest&quot;:false}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:null,&quot;language&quot;:&quot;en&quot;,&quot;source&quot;:null}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://www.becomingcyber.com/p/do-cybersecurity-certifications-even?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!OnHX!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1c26a730-e390-4d92-b761-edec5555b41d_500x500.png" loading="lazy"><span class="embedded-post-publication-name">Becoming Cyber Newsletter</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">Do Cybersecurity Certifications Even Matter?</div></div><div class="embedded-post-body">There&#8217;s a school of thought in cybersecurity&#8212;and in technology, in general&#8212;that certifications don&#8217;t matter. That experience is the only thing that matters. The thought goes that certification issuing organizations are just in the business of making money. Experience matters more than certifications and certifications are an ineffective measure of one&#8217;s&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">5 years ago &#183; Anonymous</div></a></div><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:34998469,&quot;url&quot;:&quot;https://www.becomingcyber.com/p/are-cybersecurity-bootcamps-worth&quot;,&quot;publication_id&quot;:273635,&quot;publication_name&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;publication_logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/1c26a730-e390-4d92-b761-edec5555b41d_500x500.png&quot;,&quot;title&quot;:&quot;Are Cybersecurity Bootcamps Worth the Money?&quot;,&quot;truncated_body_text&quot;:&quot;An aspiring cybersecurity professional, considering his training options, recently asked if cybersecurity bootcamps are worth it? That&#8217;s a common question, especially considering the variety of cybersecurity training options available. The short answer is:&quot;,&quot;date&quot;:&quot;2021-04-16T12:30:50.924Z&quot;,&quot;like_count&quot;:1,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:870380,&quot;name&quot;:&quot;Anonymous&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/3f55ce8d-abfa-42dd-999e-08b26b570f15_4160x4160.jpeg&quot;,&quot;bio&quot;:&quot;A cybersecurity leader in incognito mode.&quot;,&quot;profile_set_up_at&quot;:&quot;2021-07-17T12:40:36.606Z&quot;,&quot;publicationUsers&quot;:[{&quot;id&quot;:222091,&quot;user_id&quot;:870380,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:273635,&quot;name&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;subdomain&quot;:&quot;becomingcyber&quot;,&quot;custom_domain&quot;:&quot;www.becomingcyber.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Becoming Cyber provides students and career changers with the tools they need to break into cybersecurity careers.&quot;,&quot;logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/1c26a730-e390-4d92-b761-edec5555b41d_500x500.png&quot;,&quot;author_id&quot;:870380,&quot;theme_var_background_pop&quot;:&quot;#E8B500&quot;,&quot;created_at&quot;:&quot;2021-01-29T12:19:10.915Z&quot;,&quot;rss_website_url&quot;:null,&quot;email_from_name&quot;:&quot;Becoming Cyber&quot;,&quot;copyright&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false}}],&quot;is_guest&quot;:false}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:null,&quot;language&quot;:&quot;en&quot;,&quot;source&quot;:null}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://www.becomingcyber.com/p/are-cybersecurity-bootcamps-worth?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!OnHX!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1c26a730-e390-4d92-b761-edec5555b41d_500x500.png" loading="lazy"><span class="embedded-post-publication-name">Becoming Cyber Newsletter</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">Are Cybersecurity Bootcamps Worth the Money?</div></div><div class="embedded-post-body">An aspiring cybersecurity professional, considering his training options, recently asked if cybersecurity bootcamps are worth it? That&#8217;s a common question, especially considering the variety of cybersecurity training options available. The short answer is&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">5 years ago &#183; 1 like &#183; Anonymous</div></a></div>]]></content:encoded></item><item><title><![CDATA[Always Negotiate Salary, Even For Your First Cybersecurity Job]]></title><description><![CDATA[Landing your first cybersecurity job is challenging.]]></description><link>https://www.becomingcyber.com/p/always-negotiate-salary-even-for</link><guid isPermaLink="false">https://www.becomingcyber.com/p/always-negotiate-salary-even-for</guid><dc:creator><![CDATA[Oritse J. Uku]]></dc:creator><pubDate>Tue, 21 Sep 2021 12:30:35 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!EHOW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F9ec14595-4059-41b7-a68d-f49da623d8cd_1125x750.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!EHOW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F9ec14595-4059-41b7-a68d-f49da623d8cd_1125x750.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!EHOW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F9ec14595-4059-41b7-a68d-f49da623d8cd_1125x750.jpeg 424w, https://substackcdn.com/image/fetch/$s_!EHOW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F9ec14595-4059-41b7-a68d-f49da623d8cd_1125x750.jpeg 848w, https://substackcdn.com/image/fetch/$s_!EHOW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F9ec14595-4059-41b7-a68d-f49da623d8cd_1125x750.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!EHOW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F9ec14595-4059-41b7-a68d-f49da623d8cd_1125x750.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!EHOW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F9ec14595-4059-41b7-a68d-f49da623d8cd_1125x750.jpeg" width="1125" height="750" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/9ec14595-4059-41b7-a68d-f49da623d8cd_1125x750.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:750,&quot;width&quot;:1125,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Unrecognizable elegant female in sweater counting dollar bills while sitting at wooden table with planner and pen&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Unrecognizable elegant female in sweater counting dollar bills while sitting at wooden table with planner and pen" title="Unrecognizable elegant female in sweater counting dollar bills while sitting at wooden table with planner and pen" srcset="https://substackcdn.com/image/fetch/$s_!EHOW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F9ec14595-4059-41b7-a68d-f49da623d8cd_1125x750.jpeg 424w, https://substackcdn.com/image/fetch/$s_!EHOW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F9ec14595-4059-41b7-a68d-f49da623d8cd_1125x750.jpeg 848w, https://substackcdn.com/image/fetch/$s_!EHOW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F9ec14595-4059-41b7-a68d-f49da623d8cd_1125x750.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!EHOW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F9ec14595-4059-41b7-a68d-f49da623d8cd_1125x750.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <strong><a href="https://www.pexels.com/@karolina-grabowska?utm_content=attributionCopyText&amp;utm_medium=referral&amp;utm_source=pexels">Karolina Grabowska</a></strong> from <strong><a href="https://www.pexels.com/photo/crop-woman-counting-money-at-modern-office-table-4475524/?utm_content=attributionCopyText&amp;utm_medium=referral&amp;utm_source=pexels">Pexels</a></strong></figcaption></figure></div><p>Landing your first cybersecurity job is challenging. With some hard work, networking and perseverance you&#8217;ll eventually hear those magic words: &#8220;We&#8217;d like to make you an offer.&#8221; It&#8217;s an amazing feeling after months of job hunting. Now it&#8217;s time to discuss a subject that your teachers and mentors may not have prepared you for: Money.</p><h3><strong>Salary Range</strong></h3><p>Cybersecurity is a <a href="https://www.becomingcyber.com/p/cybersecurity-analysts-make-how-much-101">well compensated</a> career field. For some readers that initial offer may be more than you&#8217;ve ever made before. It might be more than your parents ever made. Your natural instinct is to quickly say &#8220;yes&#8221; and ring the register. Not so fast!</p><p>From the recruit&#8217;s perspective it&#8217;s easy to presume that the company has a specific salary planned for the role. It&#8217;s more likely that they have a <em>salary range</em> planned for each role. It only benefits the company, if you accept their first offer. After all, they likely have some wiggle room in what they can offer.</p><p>Often your prospective employer expects you to negotiate. Their planned salary range will reflect the position, the company, and the geography of the role. Whether the range is $70-80k or $100-120k, it&#8217;s a reasonable assumption that their initial offer was not at the top of the range. Negotiating can earn you some incremental gains.</p><h3><strong>Compounding Returns</strong></h3><p>You probably won&#8217;t be able to negotiate for a dramatically higher salary for your first cybersecurity job, but any increase in salary can have notable implications. Throughout the course of your career your salary in a given year will usually be a function of multiple factors including your previous year&#8217;s salary. Your employer will generally take your previous year&#8217;s salary into consideration for your annual and promotion pay raises (except when you change companies).</p><p>That means any extra salary you can negotiate will have a long lasting impact. Let&#8217;s say we presume you get just a 2% annual raise over the course of the next 30 years. Even in this modest scenario every extra $1,000 you can negotiate for is worth a total of $40,568 over the 30 year period.</p><p>Negotiating for an extra $5,000 may not sound like a big deal. After all, it&#8217;s only an extra $417 a month (before taxes). Even that&#8217;s worth an extra $202,840 over a 30-year period. But you&#8217;re not playing for just annual raises. You&#8217;re looking to get promoted and advance in your career. So let&#8217;s say that in addition to 2% annual raises you also get a promotion every five years with a 20% raise. Every extra $1,000 you negotiate for with your first cybersecurity job, would equate to over $64,000 for the course of 30 years. Negotiating for an additional $5,000 would be worth over $322,000 of lifetime earnings in this scenario.</p><p>Starting to get the point? Any additional salary you can negotiate can have long-term benefits.</p><h3><strong>Be Informed and Sensible</strong></h3><p>When it comes time to negotiate salary, it&#8217;s important to be informed about negotiation techniques and be sensible with your expectations.</p><p>Have a plan. When you get your verbal offer, it is okay not to give an answer right away. Thank them and ask if you can get back to them in a day or two. This will give you time to regroup and prepare for your counter. You don&#8217;t want to negotiate salary on the fly. Below are a few handy salary negotiation resources.</p><ul><li><p><a href="https://www.newsweek.com/how-negotiate-salary-tips-negotiation-email-1611069">How to Negotiate a Salary | Newsweek</a></p></li><li><p><a href="https://www.themuse.com/advice/how-to-negotiate-salary-37-tips-you-need-to-know">How to Negotiate Salary: 37 Tips You Need to Know | The Muse</a></p></li><li><p><a href="https://podcasts.apple.com/us/podcast/fearless-salary-negotiation-tips-with-josh-doody/id736826307?i=1000381936354">Fearless Salary Negotiation Tips with Josh Doody | Listen Money Matters [podcast]</a></p></li><li><p><a href="https://www.indeed.com/career-advice/pay-salary/how-to-negotiate-salary">13 Tips to Negotiate Your Salary and Job Offer | Indeed</a></p></li><li><p><a href="https://hbr.org/2014/04/15-rules-for-negotiating-a-job-offer">15 Rules for Negotiating a Job Offer | Harvard Business Review</a></p></li></ul><p>Being sensible in your expectations requires you to have an idea of what salary range is reasonable. Find company- and title-specific salary information with online resources like <a href="https://www.salary.com/">Salary.com</a>, <a href="https://www.glassdoor.com/Salaries/index.htm">Glassdoor</a>, or <a href="https://www.payscale.com/">PayScale</a>. Your salary negotiation isn't like the movies where they give some wildly inflated counteroffer. Make a counteroffer at the top of the range (or just above it).&nbsp;</p><p>Your bargaining power may not currently be super high. This is after all your first cybersecurity job. However, any additional salary you can negotiate will have long-term, compounding effects. Many employers are expecting you to negotiate.</p><p>At the end of the day it&#8217;s important for you to be happy with your role and your salary. Cybersecurity is well paid. It&#8217;s also hard work. It&#8217;s not uncommon for cybersecurity professionals to work long hours, weekends, and occasionally holidays. You want to feel like you&#8217;re being compensated fairly for your hard work.</p><h3>Recommended Posts:</h3><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:38790927,&quot;url&quot;:&quot;https://www.becomingcyber.com/p/cybersecurity-is-a-people-business&quot;,&quot;publication_id&quot;:273635,&quot;publication_name&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;publication_logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/1c26a730-e390-4d92-b761-edec5555b41d_500x500.png&quot;,&quot;title&quot;:&quot;Cybersecurity Is A Relationship Business&quot;,&quot;truncated_body_text&quot;:&quot;When people think of the cybersecurity profession, many naturally think of the technical aspect. You certainly need technical proficiency. Many would be surprised to hear, however, that cybersecurity is really a relationship business. Whether you look at the protected or the protectors, people are the lynchpin. The systems and applications, which cyberse&#8230;&quot;,&quot;date&quot;:&quot;2021-07-20T12:30:30.799Z&quot;,&quot;like_count&quot;:0,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:870380,&quot;name&quot;:&quot;Anonymous&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/3f55ce8d-abfa-42dd-999e-08b26b570f15_4160x4160.jpeg&quot;,&quot;bio&quot;:&quot;A cybersecurity leader in incognito mode.&quot;,&quot;profile_set_up_at&quot;:&quot;2021-07-17T12:40:36.606Z&quot;,&quot;publicationUsers&quot;:[{&quot;id&quot;:222091,&quot;user_id&quot;:870380,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:273635,&quot;name&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;subdomain&quot;:&quot;becomingcyber&quot;,&quot;custom_domain&quot;:&quot;www.becomingcyber.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Becoming Cyber provides students and career changers with the tools they need to break into cybersecurity careers.&quot;,&quot;logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/1c26a730-e390-4d92-b761-edec5555b41d_500x500.png&quot;,&quot;author_id&quot;:870380,&quot;theme_var_background_pop&quot;:&quot;#E8B500&quot;,&quot;created_at&quot;:&quot;2021-01-29T12:19:10.915Z&quot;,&quot;rss_website_url&quot;:null,&quot;email_from_name&quot;:&quot;Becoming Cyber&quot;,&quot;copyright&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false}}],&quot;is_guest&quot;:false}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:null,&quot;language&quot;:&quot;en&quot;,&quot;source&quot;:null}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://www.becomingcyber.com/p/cybersecurity-is-a-people-business?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!OnHX!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1c26a730-e390-4d92-b761-edec5555b41d_500x500.png" loading="lazy"><span class="embedded-post-publication-name">Becoming Cyber Newsletter</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">Cybersecurity Is A Relationship Business</div></div><div class="embedded-post-body">When people think of the cybersecurity profession, many naturally think of the technical aspect. You certainly need technical proficiency. Many would be surprised to hear, however, that cybersecurity is really a relationship business. Whether you look at the protected or the protectors, people are the lynchpin. The systems and applications, which cyberse&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">5 years ago &#183; Anonymous</div></a></div><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:33833767,&quot;url&quot;:&quot;https://www.becomingcyber.com/p/imposter-syndrome-is-a-real-but-youre&quot;,&quot;publication_id&quot;:273635,&quot;publication_name&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;publication_logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/1c26a730-e390-4d92-b761-edec5555b41d_500x500.png&quot;,&quot;title&quot;:&quot;Imposter Syndrome Is a Real, But You&#8217;re Not Alone&quot;,&quot;truncated_body_text&quot;:&quot;You&#8217;ve worked your butt off completing your cybersecurity training courses and certifications. You&#8217;ve finally scored your first cybersecurity interview. Are you doubting your skills and abilities? Are you starting to question why they would hire you? Do you begin to worry that despite the hard work you&#8217;ve put in, that you&#8217;ll be discovered as a fraud? Th&#8230;&quot;,&quot;date&quot;:&quot;2021-03-23T12:30:33.641Z&quot;,&quot;like_count&quot;:0,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:870380,&quot;name&quot;:&quot;Anonymous&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/3f55ce8d-abfa-42dd-999e-08b26b570f15_4160x4160.jpeg&quot;,&quot;bio&quot;:&quot;A cybersecurity leader in incognito mode.&quot;,&quot;profile_set_up_at&quot;:&quot;2021-07-17T12:40:36.606Z&quot;,&quot;publicationUsers&quot;:[{&quot;id&quot;:222091,&quot;user_id&quot;:870380,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:273635,&quot;name&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;subdomain&quot;:&quot;becomingcyber&quot;,&quot;custom_domain&quot;:&quot;www.becomingcyber.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Becoming Cyber provides students and career changers with the tools they need to break into cybersecurity careers.&quot;,&quot;logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/1c26a730-e390-4d92-b761-edec5555b41d_500x500.png&quot;,&quot;author_id&quot;:870380,&quot;theme_var_background_pop&quot;:&quot;#E8B500&quot;,&quot;created_at&quot;:&quot;2021-01-29T12:19:10.915Z&quot;,&quot;rss_website_url&quot;:null,&quot;email_from_name&quot;:&quot;Becoming Cyber&quot;,&quot;copyright&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false}}],&quot;is_guest&quot;:false}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:null,&quot;language&quot;:&quot;en&quot;,&quot;source&quot;:null}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://www.becomingcyber.com/p/imposter-syndrome-is-a-real-but-youre?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!OnHX!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1c26a730-e390-4d92-b761-edec5555b41d_500x500.png" loading="lazy"><span class="embedded-post-publication-name">Becoming Cyber Newsletter</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">Imposter Syndrome Is a Real, But You&#8217;re Not Alone</div></div><div class="embedded-post-body">You&#8217;ve worked your butt off completing your cybersecurity training courses and certifications. You&#8217;ve finally scored your first cybersecurity interview. Are you doubting your skills and abilities? Are you starting to question why they would hire you? Do you begin to worry that despite the hard work you&#8217;ve put in, that you&#8217;ll be discovered as a fraud? Th&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">5 years ago &#183; Anonymous</div></a></div>]]></content:encoded></item><item><title><![CDATA[Cyber 201: What is Penetration Testing?]]></title><description><![CDATA[When people think of cybersecurity, the first thing that comes to mind for many of them is penetration testing.]]></description><link>https://www.becomingcyber.com/p/cyber-201-what-is-penetration-testing</link><guid isPermaLink="false">https://www.becomingcyber.com/p/cyber-201-what-is-penetration-testing</guid><dc:creator><![CDATA[Oritse J. Uku]]></dc:creator><pubDate>Fri, 17 Sep 2021 12:30:35 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!UVS_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F753dd851-a01f-4fa1-ab3f-2aa0a8abcd9e_1000x625.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!UVS_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F753dd851-a01f-4fa1-ab3f-2aa0a8abcd9e_1000x625.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!UVS_!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F753dd851-a01f-4fa1-ab3f-2aa0a8abcd9e_1000x625.jpeg 424w, https://substackcdn.com/image/fetch/$s_!UVS_!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F753dd851-a01f-4fa1-ab3f-2aa0a8abcd9e_1000x625.jpeg 848w, https://substackcdn.com/image/fetch/$s_!UVS_!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F753dd851-a01f-4fa1-ab3f-2aa0a8abcd9e_1000x625.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!UVS_!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F753dd851-a01f-4fa1-ab3f-2aa0a8abcd9e_1000x625.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!UVS_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F753dd851-a01f-4fa1-ab3f-2aa0a8abcd9e_1000x625.jpeg" width="1000" height="625" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/753dd851-a01f-4fa1-ab3f-2aa0a8abcd9e_1000x625.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:625,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;black and red laptop keyboard&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="black and red laptop keyboard" title="black and red laptop keyboard" srcset="https://substackcdn.com/image/fetch/$s_!UVS_!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F753dd851-a01f-4fa1-ab3f-2aa0a8abcd9e_1000x625.jpeg 424w, https://substackcdn.com/image/fetch/$s_!UVS_!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F753dd851-a01f-4fa1-ab3f-2aa0a8abcd9e_1000x625.jpeg 848w, https://substackcdn.com/image/fetch/$s_!UVS_!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F753dd851-a01f-4fa1-ab3f-2aa0a8abcd9e_1000x625.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!UVS_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F753dd851-a01f-4fa1-ab3f-2aa0a8abcd9e_1000x625.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@jeffhardi?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText">Jeff Hardi</a> on <a href="https://unsplash.com/s/photos/keyboard?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText">Unsplash</a></figcaption></figure></div><p>When people think of cybersecurity, the first thing that comes to mind for many of them is penetration testing. Like a Wu Tang rapper, this cybersecurity specialty is known by many names, including ethical hacking, vulnerability assessment, and Red Teaming. The basic premise is that penetration testers (or <em>pentesters</em>) are good guys, who get paid to act like bad guys, without the pesky hassle of potential lawsuits and prison. What do pentesters actually do? The core of their mission is to find exploitable system vulnerabilities, process gaps, and flaws, so organizations can fix them before threat actors find them.</p><h3><strong>What is a Hacker?</strong></h3><p>The term <em>hacker</em> is widely used and misused, particularly in the media. A lot of definitions you&#8217;ll find imply an inherently nefarious character. They suggest that <em>hacking</em> is by definition synonymous with cybercrime. Technology writer Kamran Sharief provides a more extensive definition. He <a href="https://www.computertechreviews.com/definition/hacker/">explains</a>, &#8220;The term hacker refers to a computer expert. The concept has two primary meanings since it can refer to a hacker (a person who illegally accesses a system to take control or obtain private data) or an expert who is responsible for protecting and improving computer security.&#8221;</p><p>In practice you won&#8217;t hear the term <em>hacker</em> used very often in cybersecurity. It&#8217;s a little one-dimensional. More often you&#8217;ll hear cybersecurity professionals refer to penetration testers (good guys) and threat actors (bad guys).</p><h3><strong>Internal vs External</strong></h3><p>Internal penetration testing teams are more likely to be found in large organizations. They are an indicator of a well budgeted, mature cybersecurity organization. Smaller organizations will often outsource their penetration testing requirements to external firms.</p><p>As with all things in life, there&#8217;s a trade off between working in external or internal pentesting roles. Joining a penetration testing firm (external) may offer you a less &#8220;buttoned up&#8221; work environment. You&#8217;ll undoubtedly gain experience against a wide variety of companies in a number of industries. These external firms may give you more room to harness your inner pirate.</p><p>Joining a penetration testing team for a large organization (internal) can provide opportunities to test more complex corporate environments. There are opportunities to work with the Blue Team to identify things that need to be fixed (i.e., <a href="https://danielmiessler.com/study/purple-team/">Purple Team</a>). You might even get nicer toys to play with.</p><h3><strong>Red Team vs Blue Team</strong></h3><p>If you spend my time hanging around pentesters, you&#8217;ll undoubtedly hear references to <em>Red Team</em> and <em>Blue Team</em>. Cybersecurity borrows liberally from military concepts and terminology. The Red Team/Blue Team concept is a perfect example.</p><p>Military symbology has been used in Europe since the Napoleonic Wars. However, it wasn&#8217;t until World War I that England and France&#8212;former adversaries turned allies&#8212;agreed to use blue for allied symbols and red for adversary symbols. The tradition persists today among NATO militaries.</p><p>In cybersecurity terms, <em>Red Team</em> refers to penetration testers and <em>Blue Team</em> refers to security operations (SOC). The two are often pitted against each other during penetration tests or adversary emulation exercises. As you can imagine, nobody likes to lose. This can make for a touchy relationship at times.</p><h3><strong>Training and Certification</strong></h3><p>I&#8217;m generally a proponent of leveraging certifications to help get past the initial screening to get interviews. Studying for certifications can help, but in pentesting you really need to learn by doing. A good place to start getting your hands dirty is <a href="https://www.hackthebox.eu/">Hack the Box</a> or similar lab environment. The platform provides you with a number of virtual machines to practice your hacking skills on.</p><p>But where can you learn those skills to begin with? The internet is awash with pentesting training. From Udemy to bootcamps to YouTube. The barrier to entry is low. Start with the more economical training options you can find and work your way up from there.</p><p>When it comes to certifications there are plenty to choose from. Here are some notable options:</p><ul><li><p><a href="https://www.offensive-security.com/pwk-oscp/">Offensive Security Certified Professional (OSCP)</a></p></li><li><p><a href="https://www.giac.org/certification/penetration-tester-gpen">GIAC Penetration Tester (GPEN)</a></p></li><li><p><a href="https://www.giac.org/certification/exploit-researcher-advanced-penetration-tester-gxpn">GIAC Exploit Researcher and Advanced Penetration Tester (GXPN)</a></p></li><li><p><a href="https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/">EC-Council Certified Ethical Hacker (CEH)</a></p></li><li><p><a href="https://www.iacertification.org/cpt_certified_penetration_tester.html">IACRB Certified Penetration Tester (CPT)</a></p></li><li><p><a href="https://www.iacertification.org/cept_certified_expert_penetration_tester.html">IACRB Certified Expert Penetration Tester (CEPT)</a></p></li><li><p><a href="https://www.comptia.org/certifications/pentest">CompTIA PenTest+</a></p></li></ul><p>The OSCP makes for a pretty solid calling card in the penetration testing community. As opposed to many cybersecurity certifications, there&#8217;s no multiple choice test to prove your knowledge. It&#8217;s 100% hands on. OSCP is a 24-hour exam in which people regularly run out of time. It&#8217;s definitely not your starting point, but something to work towards. How hard is it? Their motto is &#8220;try harder!&#8221;</p><h3><strong>Is Penetration Testing for You?</strong></h3><p>Start training and pwning boxes early. As Kamran Sharief wrote, &#8220;The term hacker refers to a computer expert.&#8221; You don&#8217;t become an expert by taking a single course&#8230; or even a few courses. You become an expert by becoming a student of your craft.</p><p>It&#8217;s very important to determine whether you actually like pentesting. A lot of people like the idea of penetration testing. To determine if pentesting is really your calling you need to get <em>hands on keyboard</em>. To be honest it&#8217;s perfectly fine if penetration testing isn&#8217;t your thing. There are a lot of specialties in cybersecurity. Most people in cyber aren&#8217;t pentesters.</p><p>However, if you get that dopamine rush from struggling through and finally cracking a box you&#8217;re not supposed to be able to access, then you just might be a future pentester.</p><h3><strong>Recommended Posts:</strong></h3><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:40551951,&quot;url&quot;:&quot;https://www.becomingcyber.com/p/cyber-201-what-is-a-security-operations&quot;,&quot;publication_id&quot;:273635,&quot;publication_name&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;publication_logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/1c26a730-e390-4d92-b761-edec5555b41d_500x500.png&quot;,&quot;title&quot;:&quot;Cyber 201: What is a Security Operations Center?&quot;,&quot;truncated_body_text&quot;:&quot;Most lists of entry-level cybersecurity jobs will undoubtedly include the SOC analyst. The lingering question for many aspiring cybersecurity professionals is: &#8220;What&#8217;s a SOC?&#8221; We&#8217;re going to take a look at the Security Operations Center (SOC) and its role in the cybersecurity landscape. It&#8217;s important to have at le&#8230;&quot;,&quot;date&quot;:&quot;2021-08-27T12:30:14.851Z&quot;,&quot;like_count&quot;:0,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:870380,&quot;name&quot;:&quot;Anonymous&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/3f55ce8d-abfa-42dd-999e-08b26b570f15_4160x4160.jpeg&quot;,&quot;bio&quot;:&quot;A cybersecurity leader in incognito mode.&quot;,&quot;profile_set_up_at&quot;:&quot;2021-07-17T12:40:36.606Z&quot;,&quot;publicationUsers&quot;:[{&quot;id&quot;:222091,&quot;user_id&quot;:870380,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:273635,&quot;name&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;subdomain&quot;:&quot;becomingcyber&quot;,&quot;custom_domain&quot;:&quot;www.becomingcyber.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Becoming Cyber provides students and career changers with the tools they need to break into cybersecurity careers.&quot;,&quot;logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/1c26a730-e390-4d92-b761-edec5555b41d_500x500.png&quot;,&quot;author_id&quot;:870380,&quot;theme_var_background_pop&quot;:&quot;#E8B500&quot;,&quot;created_at&quot;:&quot;2021-01-29T12:19:10.915Z&quot;,&quot;rss_website_url&quot;:null,&quot;email_from_name&quot;:&quot;Becoming Cyber&quot;,&quot;copyright&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false}}],&quot;is_guest&quot;:false}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:null,&quot;language&quot;:&quot;en&quot;,&quot;source&quot;:null}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://www.becomingcyber.com/p/cyber-201-what-is-a-security-operations?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!OnHX!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1c26a730-e390-4d92-b761-edec5555b41d_500x500.png" loading="lazy"><span class="embedded-post-publication-name">Becoming Cyber Newsletter</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">Cyber 201: What is a Security Operations Center?</div></div><div class="embedded-post-body">Most lists of entry-level cybersecurity jobs will undoubtedly include the SOC analyst. The lingering question for many aspiring cybersecurity professionals is: &#8220;What&#8217;s a SOC?&#8221; We&#8217;re going to take a look at the Security Operations Center (SOC) and its role in the cybersecurity landscape. It&#8217;s important to have at le&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">5 years ago &#183; Anonymous</div></a></div><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:41151494,&quot;url&quot;:&quot;https://www.becomingcyber.com/p/cyber-201-what-is-cyber-threat-intelligence&quot;,&quot;publication_id&quot;:273635,&quot;publication_name&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;publication_logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/1c26a730-e390-4d92-b761-edec5555b41d_500x500.png&quot;,&quot;title&quot;:&quot;Cyber 201: What is Cyber Threat Intelligence?&quot;,&quot;truncated_body_text&quot;:&quot;When aspiring cybersecurity professionals consider specialties, cyber threat intelligence (CTI) often peaks their interest. Cyber threat intelligence certainly sounds cool. After all, we&#8217;ve all seen plenty of movies about spies and intelligence analysts. Most people don&#8217;t actually know much about CTI beyond its perceived d&#8230;&quot;,&quot;date&quot;:&quot;2021-09-10T12:30:42.706Z&quot;,&quot;like_count&quot;:0,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:870380,&quot;name&quot;:&quot;Anonymous&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/3f55ce8d-abfa-42dd-999e-08b26b570f15_4160x4160.jpeg&quot;,&quot;bio&quot;:&quot;A cybersecurity leader in incognito mode.&quot;,&quot;profile_set_up_at&quot;:&quot;2021-07-17T12:40:36.606Z&quot;,&quot;publicationUsers&quot;:[{&quot;id&quot;:222091,&quot;user_id&quot;:870380,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:273635,&quot;name&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;subdomain&quot;:&quot;becomingcyber&quot;,&quot;custom_domain&quot;:&quot;www.becomingcyber.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Becoming Cyber provides students and career changers with the tools they need to break into cybersecurity careers.&quot;,&quot;logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/1c26a730-e390-4d92-b761-edec5555b41d_500x500.png&quot;,&quot;author_id&quot;:870380,&quot;theme_var_background_pop&quot;:&quot;#E8B500&quot;,&quot;created_at&quot;:&quot;2021-01-29T12:19:10.915Z&quot;,&quot;rss_website_url&quot;:null,&quot;email_from_name&quot;:&quot;Becoming Cyber&quot;,&quot;copyright&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false}}],&quot;is_guest&quot;:false}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:null,&quot;language&quot;:&quot;en&quot;,&quot;source&quot;:null}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://www.becomingcyber.com/p/cyber-201-what-is-cyber-threat-intelligence?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!OnHX!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1c26a730-e390-4d92-b761-edec5555b41d_500x500.png" loading="lazy"><span class="embedded-post-publication-name">Becoming Cyber Newsletter</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">Cyber 201: What is Cyber Threat Intelligence?</div></div><div class="embedded-post-body">When aspiring cybersecurity professionals consider specialties, cyber threat intelligence (CTI) often peaks their interest. Cyber threat intelligence certainly sounds cool. After all, we&#8217;ve all seen plenty of movies about spies and intelligence analysts. Most people don&#8217;t actually know much about CTI beyond its perceived d&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">5 years ago &#183; Anonymous</div></a></div>]]></content:encoded></item><item><title><![CDATA[These 5 Sectors Could Help You Land Your First Cybersecurity Job]]></title><description><![CDATA[Cybercriminals have been attacking organizations all across the private and public sector.]]></description><link>https://www.becomingcyber.com/p/these-5-sectors-could-help-you-land</link><guid isPermaLink="false">https://www.becomingcyber.com/p/these-5-sectors-could-help-you-land</guid><dc:creator><![CDATA[Oritse J. Uku]]></dc:creator><pubDate>Tue, 14 Sep 2021 12:30:25 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!TDa2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7365a67-8b2e-4937-afb3-902fe02da62f_1000x668.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!TDa2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7365a67-8b2e-4937-afb3-902fe02da62f_1000x668.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!TDa2!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7365a67-8b2e-4937-afb3-902fe02da62f_1000x668.jpeg 424w, https://substackcdn.com/image/fetch/$s_!TDa2!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7365a67-8b2e-4937-afb3-902fe02da62f_1000x668.jpeg 848w, https://substackcdn.com/image/fetch/$s_!TDa2!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7365a67-8b2e-4937-afb3-902fe02da62f_1000x668.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!TDa2!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7365a67-8b2e-4937-afb3-902fe02da62f_1000x668.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!TDa2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7365a67-8b2e-4937-afb3-902fe02da62f_1000x668.jpeg" width="1000" height="668" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/c7365a67-8b2e-4937-afb3-902fe02da62f_1000x668.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:668,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;woman using laptop computer&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="woman using laptop computer" title="woman using laptop computer" srcset="https://substackcdn.com/image/fetch/$s_!TDa2!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7365a67-8b2e-4937-afb3-902fe02da62f_1000x668.jpeg 424w, https://substackcdn.com/image/fetch/$s_!TDa2!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7365a67-8b2e-4937-afb3-902fe02da62f_1000x668.jpeg 848w, https://substackcdn.com/image/fetch/$s_!TDa2!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7365a67-8b2e-4937-afb3-902fe02da62f_1000x668.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!TDa2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7365a67-8b2e-4937-afb3-902fe02da62f_1000x668.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@wocintechchat?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText">Christina @ wocintechchat.com</a> on <a href="https://unsplash.com/s/photos/woman-computer?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText">Unsplash</a></figcaption></figure></div><p>Cybercriminals have been attacking organizations all across the private and public sector. We hear about these attacks increasingly on the news&#8212;the mainstream news at that&#8212;nowadays. How can you leverage this awareness to help land your first cybersecurity job? If you identify companies in sectors with additional cybersecurity needs, you&#8217;ll find companies that are likely hiring. Let&#8217;s take a look at some key sectors with greater needs for cybersecurity talent. Some of them may surprise you.</p><h3><strong>Most Vulnerable Sectors</strong></h3><p>Generally speaking, companies which have suffered cyberattacks will invest to improve their defenses. So which sectors have suffered the most cyberattacks as of late? The publication IT Governance analyzed over 1,000 publicly disclosed security incidents that occurred in 2020. Their analysis revealed <a href="https://www.itgovernance.eu/blog/en/the-5-most-vulnerable-sectors-to-cyber-attacks">five sectors</a>, which were most attacked.</p><ul><li><p><strong>Healthcare and health sciences sector</strong> - 21% of all recorded breaches</p></li><li><p><strong>Public sector</strong> - 18% of all reported incidents</p></li><li><p><strong>Technology and media sector</strong> - 14% of all incidents</p></li><li><p><strong>Education sector</strong> - 14% of all incidents</p></li><li><p><strong>Retail and leisure sector</strong> - 9% of all incidents</p></li></ul><p>Winston Churchill once said, &#8220;Never let a good crisis go to waste.&#8221; The coronavirus is that crisis for cybersecurity. The COVID-19 crisis has created a lot of new opportunities for cybercriminals. As a <a href="https://www.securitymagazine.com/articles/92437-of-organizations-to-increase-cybersecurity-spending-following-covid-19-pandemic">result</a> of that additional cybercriminal activity, 70% of organizations plan to increase their cybersecurity spending following the pandemic.</p><p>These five sectors should provide good opportunities for cybersecurity employment. After all, nothing stimulates cybersecurity spending (and hiring) like a successful cyberattack. Especially one that you had to publicly disclose. As a result of the volume of cyberattacks they suffered in 2020, companies in these sectors need to invest in cybersecurity, which already has a <a href="https://www.isc2.org/-/media/ISC2/Research/2020/Workforce-Study/ISC2ResearchDrivenWhitepaperFINAL.ashx?la=en&amp;hash=2879EE167ACBA7100C330429C7EBC623BAF4E07B">talent shortage</a>. This could be a good opportunity for new talent to get a chance.</p><h3><strong>Critical Infrastructure Sectors</strong></h3><p>In 2013 the United States introduced the <a href="https://www.dhs.gov/sites/default/files/publications/National-Infrastructure-Protection-Plan-2013-508.pdf">National Infrastructure Protection Plan (NIPP)</a> with the mission to &#8220;Strengthen the security and resilience of the Nation&#8217;s critical infrastructure, by managing physical and cyber risks through the collaborative and integrated efforts of the critical infrastructure community.&#8221; The NIPP designated 16 Critical Infrastructure Sectors, which were deemed to be vital to national security.</p><p>Given that the US government declared the cybersecurity in these sectors is strategically important to national security, you can safely assume that companies in these sectors appreciate the importance of investing in cybersecurity.</p><ol><li><p>Chemical Sector</p></li><li><p>Commercial Facilities Sector</p></li><li><p>Communications Sector</p></li><li><p>Critical Manufacturing Sector</p></li><li><p>Dams Sector</p></li><li><p>Defense Industrial Base Sector</p></li><li><p>Emergency Services Sector</p></li><li><p>Energy Sector</p></li><li><p>Financial Services Sector</p></li><li><p>Food and Agriculture Sector</p></li><li><p>Government Facilities Sector</p></li><li><p>Healthcare and Public Health Sector</p></li><li><p>Information Technology Sector</p></li><li><p>Nuclear Reactors, Materials, and Waste Sector</p></li><li><p>Transportation Systems Sector</p></li><li><p>Water and Wastewater Systems Sector</p></li></ol><p>The list of US Critical Infrastructure Sectors can be useful to aspiring cybersecurity professionals. Some sectors are less obvious than others. Naturally, organizations in these sectors are not evenly distributed around the country. Which of these sectors may be bigger where you live?</p><p>Knowing which sectors are deemed critical infrastructure is especially useful for anyone looking to get into <a href="https://www.becomingcyber.com/p/cyber-201-what-is-cyber-threat-intelligence">cyber threat intelligence (CTI)</a>. After all, the &#8220;collaborative and integrated efforts&#8221; that the NIPP&#8217;s mission statement refers to includes intelligence sharing.</p><h3><strong>Find Organizations with Extraordinary Needs</strong></h3><p>In your cybersecurity job hunt, it can be helpful to identify sectors and organizations with an extraordinary need for talent. Some organizations come to appreciate their need for additional cybersecurity investment due to recent cyberattack. Other organizations have a constant recruiting need, which is highlighted by their critical infrastructure status.</p><p>You can find hidden gems of organizations by analyzing less obvious sectors with extraordinary needs. I&#8217;ll bet you wouldn't have thought of the retail and leisure sector or the food and agriculture sector. Use this knowledge of sectors with extraordinary cybersecurity requirements to be strategic about which companies you pursue, network with, and apply to. After all, these things take time (which is the ultimate finite resource). So be focused and approach companies in a targeted manner.</p><h3>Recommended Posts</h3><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:40711404,&quot;url&quot;:&quot;https://www.becomingcyber.com/p/why-is-cybersecurity-a-future-proof&quot;,&quot;publication_id&quot;:273635,&quot;publication_name&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;publication_logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/1c26a730-e390-4d92-b761-edec5555b41d_500x500.png&quot;,&quot;title&quot;:&quot;What Makes Cybersecurity a &#8216;Future-Proof&#8217; Career?&quot;,&quot;truncated_body_text&quot;:&quot;In a world in which workers&#8212;both blue- and white-collar&#8212;increasingly see their livelihoods automated away, cybersecurity remains a future-proof career. That&#8217;s great for cybersecurity professionals. It can be motivating for aspiring entrants. While technology continues to disrupt seemingly every career field, this on&#8230;&quot;,&quot;date&quot;:&quot;2021-08-31T12:30:18.685Z&quot;,&quot;like_count&quot;:0,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:870380,&quot;name&quot;:&quot;Anonymous&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/3f55ce8d-abfa-42dd-999e-08b26b570f15_4160x4160.jpeg&quot;,&quot;bio&quot;:&quot;A cybersecurity leader in incognito mode.&quot;,&quot;profile_set_up_at&quot;:&quot;2021-07-17T12:40:36.606Z&quot;,&quot;publicationUsers&quot;:[{&quot;id&quot;:222091,&quot;user_id&quot;:870380,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:273635,&quot;name&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;subdomain&quot;:&quot;becomingcyber&quot;,&quot;custom_domain&quot;:&quot;www.becomingcyber.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Becoming Cyber provides students and career changers with the tools they need to break into cybersecurity careers.&quot;,&quot;logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/1c26a730-e390-4d92-b761-edec5555b41d_500x500.png&quot;,&quot;author_id&quot;:870380,&quot;theme_var_background_pop&quot;:&quot;#E8B500&quot;,&quot;created_at&quot;:&quot;2021-01-29T12:19:10.915Z&quot;,&quot;rss_website_url&quot;:null,&quot;email_from_name&quot;:&quot;Becoming Cyber&quot;,&quot;copyright&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false}}],&quot;is_guest&quot;:false}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:null,&quot;language&quot;:&quot;en&quot;,&quot;source&quot;:null}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://www.becomingcyber.com/p/why-is-cybersecurity-a-future-proof?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!OnHX!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1c26a730-e390-4d92-b761-edec5555b41d_500x500.png" loading="lazy"><span class="embedded-post-publication-name">Becoming Cyber Newsletter</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">What Makes Cybersecurity a &#8216;Future-Proof&#8217; Career?</div></div><div class="embedded-post-body">In a world in which workers&#8212;both blue- and white-collar&#8212;increasingly see their livelihoods automated away, cybersecurity remains a future-proof career. That&#8217;s great for cybersecurity professionals. It can be motivating for aspiring entrants. While technology continues to disrupt seemingly every career field, this on&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">5 years ago &#183; Anonymous</div></a></div><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:38790927,&quot;url&quot;:&quot;https://www.becomingcyber.com/p/cybersecurity-is-a-people-business&quot;,&quot;publication_id&quot;:273635,&quot;publication_name&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;publication_logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/1c26a730-e390-4d92-b761-edec5555b41d_500x500.png&quot;,&quot;title&quot;:&quot;Cybersecurity Is A Relationship Business&quot;,&quot;truncated_body_text&quot;:&quot;When people think of the cybersecurity profession, many naturally think of the technical aspect. You certainly need technical proficiency. Many would be surprised to hear, however, that cybersecurity is really a relationship business. Whether you look at the protected or the protectors, people are the lynchpin. The systems and applications, which cyberse&#8230;&quot;,&quot;date&quot;:&quot;2021-07-20T12:30:30.799Z&quot;,&quot;like_count&quot;:0,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:870380,&quot;name&quot;:&quot;Anonymous&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/3f55ce8d-abfa-42dd-999e-08b26b570f15_4160x4160.jpeg&quot;,&quot;bio&quot;:&quot;A cybersecurity leader in incognito mode.&quot;,&quot;profile_set_up_at&quot;:&quot;2021-07-17T12:40:36.606Z&quot;,&quot;publicationUsers&quot;:[{&quot;id&quot;:222091,&quot;user_id&quot;:870380,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:273635,&quot;name&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;subdomain&quot;:&quot;becomingcyber&quot;,&quot;custom_domain&quot;:&quot;www.becomingcyber.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Becoming Cyber provides students and career changers with the tools they need to break into cybersecurity careers.&quot;,&quot;logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/1c26a730-e390-4d92-b761-edec5555b41d_500x500.png&quot;,&quot;author_id&quot;:870380,&quot;theme_var_background_pop&quot;:&quot;#E8B500&quot;,&quot;created_at&quot;:&quot;2021-01-29T12:19:10.915Z&quot;,&quot;rss_website_url&quot;:null,&quot;email_from_name&quot;:&quot;Becoming Cyber&quot;,&quot;copyright&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false}}],&quot;is_guest&quot;:false}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:null,&quot;language&quot;:&quot;en&quot;,&quot;source&quot;:null}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://www.becomingcyber.com/p/cybersecurity-is-a-people-business?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!OnHX!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1c26a730-e390-4d92-b761-edec5555b41d_500x500.png" loading="lazy"><span class="embedded-post-publication-name">Becoming Cyber Newsletter</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">Cybersecurity Is A Relationship Business</div></div><div class="embedded-post-body">When people think of the cybersecurity profession, many naturally think of the technical aspect. You certainly need technical proficiency. Many would be surprised to hear, however, that cybersecurity is really a relationship business. Whether you look at the protected or the protectors, people are the lynchpin. The systems and applications, which cyberse&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">5 years ago &#183; Anonymous</div></a></div>]]></content:encoded></item><item><title><![CDATA[Cyber 201: What is Cyber Threat Intelligence?]]></title><description><![CDATA[When aspiring cybersecurity professionals consider specialties, cyber threat intelligence (CTI) often peaks their interest.]]></description><link>https://www.becomingcyber.com/p/cyber-201-what-is-cyber-threat-intelligence</link><guid isPermaLink="false">https://www.becomingcyber.com/p/cyber-201-what-is-cyber-threat-intelligence</guid><dc:creator><![CDATA[Oritse J. Uku]]></dc:creator><pubDate>Fri, 10 Sep 2021 12:30:42 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!MzZB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fc18b5acf-127d-44de-9f24-5c84aeb1dbf0_1000x672.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!MzZB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fc18b5acf-127d-44de-9f24-5c84aeb1dbf0_1000x672.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!MzZB!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fc18b5acf-127d-44de-9f24-5c84aeb1dbf0_1000x672.jpeg 424w, https://substackcdn.com/image/fetch/$s_!MzZB!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fc18b5acf-127d-44de-9f24-5c84aeb1dbf0_1000x672.jpeg 848w, https://substackcdn.com/image/fetch/$s_!MzZB!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fc18b5acf-127d-44de-9f24-5c84aeb1dbf0_1000x672.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!MzZB!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fc18b5acf-127d-44de-9f24-5c84aeb1dbf0_1000x672.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!MzZB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fc18b5acf-127d-44de-9f24-5c84aeb1dbf0_1000x672.jpeg" width="1000" height="672" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/c18b5acf-127d-44de-9f24-5c84aeb1dbf0_1000x672.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:672,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;assorted-color security cameras&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="assorted-color security cameras" title="assorted-color security cameras" srcset="https://substackcdn.com/image/fetch/$s_!MzZB!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fc18b5acf-127d-44de-9f24-5c84aeb1dbf0_1000x672.jpeg 424w, https://substackcdn.com/image/fetch/$s_!MzZB!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fc18b5acf-127d-44de-9f24-5c84aeb1dbf0_1000x672.jpeg 848w, https://substackcdn.com/image/fetch/$s_!MzZB!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fc18b5acf-127d-44de-9f24-5c84aeb1dbf0_1000x672.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!MzZB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fc18b5acf-127d-44de-9f24-5c84aeb1dbf0_1000x672.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@lianhao?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText">Lianhao Qu</a> on <a href="https://unsplash.com/?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText">Unsplash</a></figcaption></figure></div><p>When aspiring cybersecurity professionals consider specialties, cyber threat intelligence (CTI) often peaks their interest. Cyber threat intelligence certainly sounds cool. After all, we&#8217;ve all seen plenty of movies about spies and intelligence analysts. Most people don&#8217;t actually know much about CTI beyond its perceived desirability. It may be one of the harder cybersecurity specialties to get into. So let&#8217;s take a look at what CTI is and the skills it requires.</p><h3><strong>Newest Intelligence Discipline</strong></h3><p>Intelligence has a long and storied <a href="https://sofrep.com/news/obscure-intelligence-agents-agencies-part-1/">history</a>. In the modern era it&#8217;s been divided into a number of intelligence collection disciplines or <em>INTs</em>, including:</p><ul><li><p>Human intelligence (HUMINT) - gathered from a person</p></li><li><p>Signals intelligence (SIGINT) - gathered from interception of electronic transmissions</p></li><li><p>Geospatial intelligence (GEOINT) - gathered from satellite and aerial photography</p></li><li><p>Measurement and signature intelligence (MASINT) - gathered from an array of signatures (distinctive characteristics)</p></li><li><p>Open-source intelligence (OSINT) - gathered from open sources</p></li><li><p>Technical intelligence (TECHINT) - gathered from analysis of weapons and equipment</p></li><li><p>Financial intelligence (FININT) - gathered from analysis of monetary transactions</p></li></ul><p>Cyber threat intelligence&#8212;sometimes called Cyber intelligence (CYBINT) in the <a href="https://www.dni.gov/index.php/what-we-do/members-of-the-ic">Intelligence Community (IC)</a>&#8212;is simply the newest kid on the intel block.</p><p>CTI still draws upon a rich tradition and methods of intelligence gathering and assessment. For example, CTI&#8217;s analytical process will look familiar to any intelligence professional. It uses the same Intelligence Cycle, which is the basis for every intel discipline.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!QAE_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F4f9c1615-d4a8-41a1-8c01-99211cf8b134_608x603.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!QAE_!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F4f9c1615-d4a8-41a1-8c01-99211cf8b134_608x603.png 424w, https://substackcdn.com/image/fetch/$s_!QAE_!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F4f9c1615-d4a8-41a1-8c01-99211cf8b134_608x603.png 848w, https://substackcdn.com/image/fetch/$s_!QAE_!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F4f9c1615-d4a8-41a1-8c01-99211cf8b134_608x603.png 1272w, https://substackcdn.com/image/fetch/$s_!QAE_!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F4f9c1615-d4a8-41a1-8c01-99211cf8b134_608x603.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!QAE_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F4f9c1615-d4a8-41a1-8c01-99211cf8b134_608x603.png" width="608" height="603" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/4f9c1615-d4a8-41a1-8c01-99211cf8b134_608x603.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:603,&quot;width&quot;:608,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Diagram of the Intelligence Cycle&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Diagram of the Intelligence Cycle" title="Diagram of the Intelligence Cycle" srcset="https://substackcdn.com/image/fetch/$s_!QAE_!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F4f9c1615-d4a8-41a1-8c01-99211cf8b134_608x603.png 424w, https://substackcdn.com/image/fetch/$s_!QAE_!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F4f9c1615-d4a8-41a1-8c01-99211cf8b134_608x603.png 848w, https://substackcdn.com/image/fetch/$s_!QAE_!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F4f9c1615-d4a8-41a1-8c01-99211cf8b134_608x603.png 1272w, https://substackcdn.com/image/fetch/$s_!QAE_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F4f9c1615-d4a8-41a1-8c01-99211cf8b134_608x603.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Intelligence Cycle</figcaption></figure></div><p><strong>Intel in the Private Sector</strong></p><p>Intelligence has long been the domain of nation-states. Countries with large budgets and government mandates conducted intelligence operations on behalf of their citizens. They did so predominantly against other nation-states. With CTI the game changes a bit. Globally the majority of information systems are owned by private organizations and individuals.</p><blockquote><p>Cyber threat intelligence&#8230; is simply the newest kid on the intel block.</p></blockquote><p>Governments have little, if any, visibility into activity on private information systems within their country&#8217;s borders. That visibility is the domain of the private sector. This puts responsibility for CTI in the hands of private organizations. However, they lack the collection assets that governments have. Instead companies utilize a range of security vendors for collection. These vendors also help protect companies from legal liability. Depending on the industry, companies may also participate in intelligence sharing organizations, like sector-based <a href="https://www.nationalisacs.org/">ISACs</a>.</p><p>Just like with countries, bigger companies with large budgets are likely to have more robust CTI programs. Smaller companies may have just one or two cybersecurity (or IT) analysts monitoring <a href="https://logz.io/blog/open-source-threat-intelligence-feeds/">threat feeds</a> as an additional duty. Large companies with mature CTI programs may have a fully-staffed organization of intelligence professionals, supporting a mature <a href="https://www.becomingcyber.com/p/cyber-201-what-is-a-security-operations">Security Operations Center (SOC)</a>.</p><h3><strong>Intelligence Training</strong></h3><p>Cyber threat intelligence can be a highly desired specialty for aspiring cybersecurity professionals. That&#8217;s understandable. It sounds interesting and people tend to be familiar with the concept of <em>intelligence</em>. A challenge is that government&#8212;military and civilian agencies&#8212;has long been the training ground for intelligence professionals.</p><p>How do you get into CTI if you don&#8217;t have neither cybersecurity nor intelligence experience? For starters you need to have a solid understanding of the technology and tools, particularly from the threat actor&#8217;s perspective. Studying for penetration tester certifications, such as the <a href="https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/">Certified Ethical Hacker (CEH)</a>, can help with that.</p><blockquote><p>Just like with countries, bigger companies with large budgets are likely to have more robust CTI programs.</p></blockquote><p>When it comes to CTI specifically, the cybersecurity training ecosystem is a bit less mature. There aren&#8217;t as many training courses and certifications for CTI as other cybersecurity specialties. Here are a few courses and certifications, which can help you learn about CTI and potentially get the attention of CTI recruiters and hiring managers.</p><ul><li><p><a href="https://www.sans.org/cyber-security-courses/cyber-threat-intelligence/">FOR578: Cyber Threat Intelligence | SANS Institute</a></p></li><li><p><a href="https://www.eccouncil.org/programs/threat-intelligence-training/">Certified Threat Intelligence Analyst (C|TIA) | EC-Council</a></p></li><li><p><a href="https://www.cybrary.it/course/mitre-attack-defender-mad-attack-for-cyber-threat-intelligence/">MITRE ATT&amp;CK Defender (MAD) ATT&amp;CK Cyber Threat Intelligence | Cybrary</a></p></li><li><p><a href="https://mitre-engenuity.org/mad/">MITRE ATT&amp;CK Defender (MAD) ATT&amp;CK Cyber Threat Intelligence Certification | MITRE Engenuity</a></p></li></ul><p>Of course, there&#8217;s always something to be said for self-education. Here are some well curated reading lists for anyone seeking to specialize in cyber threat intelligence.</p><ul><li><p><a href="https://medium.com/katies-five-cents/a-cyber-threat-intelligence-self-study-plan-part-1-968b5a8daf9a">A Cyber Threat Intelligence Self-Study Plan: Part 1</a></p></li><li><p><a href="https://medium.com/katies-five-cents/a-top-10-reading-list-if-youre-getting-started-in-cyber-threat-intelligence-c11a18fc9798">A Top 10 Reading List if You&#8217;re Getting Started in Cyber Threat Intelligence</a></p></li><li><p><a href="https://sroberts.medium.com/cti-reading-list-a93ccdd7469c">CTI Reading List</a></p></li></ul><p>CTI is growing in popularity and many organizations are seeking to grow their intel teams. If you don&#8217;t have cybersecurity or intelligence experience, it will take some work and/or time to get into CTI. That&#8217;s to be expected though. If you want it bad enough, you&#8217;ll put in the work.</p><h3>Recommended Posts</h3><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:40551951,&quot;url&quot;:&quot;https://www.becomingcyber.com/p/cyber-201-what-is-a-security-operations&quot;,&quot;publication_id&quot;:273635,&quot;publication_name&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;publication_logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/1c26a730-e390-4d92-b761-edec5555b41d_500x500.png&quot;,&quot;title&quot;:&quot;Cyber 201: What is a Security Operations Center?&quot;,&quot;truncated_body_text&quot;:&quot;Most lists of entry-level cybersecurity jobs will undoubtedly include the SOC analyst. The lingering question for many aspiring cybersecurity professionals is: &#8220;What&#8217;s a SOC?&#8221; We&#8217;re going to take a look at the Security Operations Center (SOC) and its role in the cybersecurity landscape. It&#8217;s important to have at le&#8230;&quot;,&quot;date&quot;:&quot;2021-08-27T12:30:14.851Z&quot;,&quot;like_count&quot;:0,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:870380,&quot;name&quot;:&quot;Anonymous&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/3f55ce8d-abfa-42dd-999e-08b26b570f15_4160x4160.jpeg&quot;,&quot;bio&quot;:&quot;A cybersecurity leader in incognito mode.&quot;,&quot;profile_set_up_at&quot;:&quot;2021-07-17T12:40:36.606Z&quot;,&quot;publicationUsers&quot;:[{&quot;id&quot;:222091,&quot;user_id&quot;:870380,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:273635,&quot;name&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;subdomain&quot;:&quot;becomingcyber&quot;,&quot;custom_domain&quot;:&quot;www.becomingcyber.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Becoming Cyber provides students and career changers with the tools they need to break into cybersecurity careers.&quot;,&quot;logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/1c26a730-e390-4d92-b761-edec5555b41d_500x500.png&quot;,&quot;author_id&quot;:870380,&quot;theme_var_background_pop&quot;:&quot;#E8B500&quot;,&quot;created_at&quot;:&quot;2021-01-29T12:19:10.915Z&quot;,&quot;rss_website_url&quot;:null,&quot;email_from_name&quot;:&quot;Becoming Cyber&quot;,&quot;copyright&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false}}],&quot;is_guest&quot;:false}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:null,&quot;language&quot;:&quot;en&quot;,&quot;source&quot;:null}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://www.becomingcyber.com/p/cyber-201-what-is-a-security-operations?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!OnHX!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1c26a730-e390-4d92-b761-edec5555b41d_500x500.png" loading="lazy"><span class="embedded-post-publication-name">Becoming Cyber Newsletter</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">Cyber 201: What is a Security Operations Center?</div></div><div class="embedded-post-body">Most lists of entry-level cybersecurity jobs will undoubtedly include the SOC analyst. The lingering question for many aspiring cybersecurity professionals is: &#8220;What&#8217;s a SOC?&#8221; We&#8217;re going to take a look at the Security Operations Center (SOC) and its role in the cybersecurity landscape. It&#8217;s important to have at le&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">5 years ago &#183; Anonymous</div></a></div><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:37616624,&quot;url&quot;:&quot;https://www.becomingcyber.com/p/future-trends-cloud-security&quot;,&quot;publication_id&quot;:273635,&quot;publication_name&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;publication_logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/1c26a730-e390-4d92-b761-edec5555b41d_500x500.png&quot;,&quot;title&quot;:&quot;Future Trends: Cloud Security&quot;,&quot;truncated_body_text&quot;:&quot;Future Trends We may not be able to predict the future, but we can certainly foresee the technological trends which will impact it. Any technology, which businesses and governments use to evolve and grow, is going to need securing and defending. Future Trends in technology therefore drive future needs for cybersecurity professionals.&quot;,&quot;date&quot;:&quot;2021-06-18T12:30:03.001Z&quot;,&quot;like_count&quot;:0,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:870380,&quot;name&quot;:&quot;Anonymous&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/3f55ce8d-abfa-42dd-999e-08b26b570f15_4160x4160.jpeg&quot;,&quot;bio&quot;:&quot;A cybersecurity leader in incognito mode.&quot;,&quot;profile_set_up_at&quot;:&quot;2021-07-17T12:40:36.606Z&quot;,&quot;publicationUsers&quot;:[{&quot;id&quot;:222091,&quot;user_id&quot;:870380,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:273635,&quot;name&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;subdomain&quot;:&quot;becomingcyber&quot;,&quot;custom_domain&quot;:&quot;www.becomingcyber.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Becoming Cyber provides students and career changers with the tools they need to break into cybersecurity careers.&quot;,&quot;logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/1c26a730-e390-4d92-b761-edec5555b41d_500x500.png&quot;,&quot;author_id&quot;:870380,&quot;theme_var_background_pop&quot;:&quot;#E8B500&quot;,&quot;created_at&quot;:&quot;2021-01-29T12:19:10.915Z&quot;,&quot;rss_website_url&quot;:null,&quot;email_from_name&quot;:&quot;Becoming Cyber&quot;,&quot;copyright&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false}}],&quot;is_guest&quot;:false}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:null,&quot;language&quot;:&quot;en&quot;,&quot;source&quot;:null}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://www.becomingcyber.com/p/future-trends-cloud-security?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!OnHX!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1c26a730-e390-4d92-b761-edec5555b41d_500x500.png" loading="lazy"><span class="embedded-post-publication-name">Becoming Cyber Newsletter</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">Future Trends: Cloud Security</div></div><div class="embedded-post-body">Future Trends We may not be able to predict the future, but we can certainly foresee the technological trends which will impact it. Any technology, which businesses and governments use to evolve and grow, is going to need securing and defending. Future Trends in technology therefore drive future needs for cybersecurity professionals&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">5 years ago &#183; Anonymous</div></a></div>]]></content:encoded></item><item><title><![CDATA[Focus On Organizational Needs to Excel During Cybersecurity Recruiting ]]></title><description><![CDATA[You&#8217;ve been working hard to learn the necessary skills to become a cybersecurity professional.]]></description><link>https://www.becomingcyber.com/p/focus-on-organizational-needs-to</link><guid isPermaLink="false">https://www.becomingcyber.com/p/focus-on-organizational-needs-to</guid><dc:creator><![CDATA[Oritse J. Uku]]></dc:creator><pubDate>Tue, 07 Sep 2021 12:30:37 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ZwsP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Ff450ef1d-acf2-4dae-9918-a6f1b10c7ecf_1000x667.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ZwsP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Ff450ef1d-acf2-4dae-9918-a6f1b10c7ecf_1000x667.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ZwsP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Ff450ef1d-acf2-4dae-9918-a6f1b10c7ecf_1000x667.jpeg 424w, https://substackcdn.com/image/fetch/$s_!ZwsP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Ff450ef1d-acf2-4dae-9918-a6f1b10c7ecf_1000x667.jpeg 848w, https://substackcdn.com/image/fetch/$s_!ZwsP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Ff450ef1d-acf2-4dae-9918-a6f1b10c7ecf_1000x667.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!ZwsP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Ff450ef1d-acf2-4dae-9918-a6f1b10c7ecf_1000x667.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ZwsP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Ff450ef1d-acf2-4dae-9918-a6f1b10c7ecf_1000x667.jpeg" width="1000" height="667" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/f450ef1d-acf2-4dae-9918-a6f1b10c7ecf_1000x667.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:667,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;person standing on high ground under white sky&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="person standing on high ground under white sky" title="person standing on high ground under white sky" srcset="https://substackcdn.com/image/fetch/$s_!ZwsP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Ff450ef1d-acf2-4dae-9918-a6f1b10c7ecf_1000x667.jpeg 424w, https://substackcdn.com/image/fetch/$s_!ZwsP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Ff450ef1d-acf2-4dae-9918-a6f1b10c7ecf_1000x667.jpeg 848w, https://substackcdn.com/image/fetch/$s_!ZwsP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Ff450ef1d-acf2-4dae-9918-a6f1b10c7ecf_1000x667.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!ZwsP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Ff450ef1d-acf2-4dae-9918-a6f1b10c7ecf_1000x667.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@stephenleo1982?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText">Stephen Leonardi</a> on <a href="https://unsplash.com/s/photos/human?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText">Unsplash</a></figcaption></figure></div><p>You&#8217;ve been working hard to learn the necessary skills to become a cybersecurity professional. Your hopes and dreams have fueled these efforts. There&#8217;s hope for a <a href="https://www.becomingcyber.com/p/why-is-cybersecurity-a-future-proof">future-proof career</a>, which allows you to maintain relevance in an increasingly technology driven world. There&#8217;s the dream of improving your <a href="https://www.becomingcyber.com/p/cybersecurity-analysts-make-how-much-101">economic security</a> at a time in which increased income inequality wreaks havoc on the middle class. There might even be the hope of pursuing a specific <a href="https://www.becomingcyber.com/p/discover-cybersecurity-specialties">cybersecurity specialty</a>, which seems fun and exciting to you.</p><h3><strong>Hiring Managers Are Selfish</strong></h3><p>The truth of the matter is that your hopes and dreams for entering cybersecurity aren&#8217;t the hiring manager's concern. Every applicant has their own hopes and dreams. The hiring manager on the other hand has a business need to fill. This makes hiring managers understandably selfish. The hiring manager&#8217;s primary concern is going to be filling those business needs with the talented people, who can execute them and be a beneficial part of the team.</p><blockquote><p>The truth of the matter is that your hopes and dreams for entering cybersecurity aren&#8217;t the hiring manager's concern.</p></blockquote><p>Some applicants will include executive summaries in their resumes with explanations of what they're looking for in a cybersecurity job. That&#8217;s not going to resonate with hiring managers. Those hiring managers want to know what you can do for them, not what they can do for you. This is especially true for candidates pursuing their first cybersecurity job.</p><p>Look at things from the hiring manager&#8217;s perspective. She could receive up to a couple hundred applications for a single cybersecurity role. Now imagine that she has more than one role open. That&#8217;s a lot of people&#8217;s hopes and dreams to sort through. The hiring manager is going to focus on her organizational needs. After all, that&#8217;s what she gets paid to do.</p><h3><strong>Focus On The Organization&#8217;s Needs</strong></h3><p>To engage in a manner that resonates with hiring managers, focus on the organization&#8217;s needs rather than your own. That means getting a feel for what the hiring manager is looking for in a specific role. What challenges is the organization seeking to solve? What will the primary mission be for whoever gets hired for this role?</p><p>Once you have a feel for that, you can better engage with the hiring manager. Instead of talking about what <em>you</em> want, you can talk about your understanding of her organizational requirements and how you can help fulfill them. What cybersecurity skills have you developed that would be an asset? What non-cybersecurity skills do you have (e.g., strong communications skills) that would be valuable for the role? What personality traits do you possess that would be key for this role and team?</p><blockquote><p>To engage in a manner that resonates with hiring managers, focus on the organization&#8217;s needs rather than your own.</p></blockquote><p>Once you reframe your focus from your hopes and dreams to the organization&#8217;s needs, you&#8217;ll be in a better position to describe yourself as the best candidate for the job. You don&#8217;t need to avoid discussion of your hopes and dreams all together. Just reframe them. Where do the organization&#8217;s needs and your goals intersect? Talk about that. Just remember to keep it as a secondary discussion point after you&#8217;ve adequately expressed how you can help fulfill their objectives.</p><h3><strong>Engagement Opportunities Are Precious</strong></h3><p>Opportunities to engage with hiring managers are precious. Most applications and resumes won&#8217;t actually make it into their hands. Knowing that, make the most of the opportunity, when you have a hiring manager&#8217;s attention. Approach that engagement from the perspective of what you can do for the organization.</p><p>Your hopes and dreams are important for sure. However they&#8217;re more important to you, than anyone else. During the interview process isn&#8217;t really the time to focus on them. The hiring manager needs to be selfish to achieve organizational objectives. If you focus on those organizational objectives, you can find yourself in an advantageous position to advance your hopes and dreams as well.</p><h3>Recommended Posts</h3><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:36368095,&quot;url&quot;:&quot;https://www.becomingcyber.com/p/celebrate-the-small-victories-along&quot;,&quot;publication_id&quot;:273635,&quot;publication_name&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;publication_logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/1c26a730-e390-4d92-b761-edec5555b41d_500x500.png&quot;,&quot;title&quot;:&quot;Celebrate the Small Victories Along the Journey to Your First Cybersecurity Job&quot;,&quot;truncated_body_text&quot;:&quot;The journey towards your cybersecurity career can be an arduous one. It takes time and a lot of effort to self-educate, credentialize, network, apply and interview for roles. That makes it important to celebrate the small victories. After an achievement like, passing a certification exam, you might be tempted to immediately begin studying for the next ce&#8230;&quot;,&quot;date&quot;:&quot;2021-05-14T12:30:12.255Z&quot;,&quot;like_count&quot;:0,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:870380,&quot;name&quot;:&quot;Anonymous&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/3f55ce8d-abfa-42dd-999e-08b26b570f15_4160x4160.jpeg&quot;,&quot;bio&quot;:&quot;A cybersecurity leader in incognito mode.&quot;,&quot;profile_set_up_at&quot;:&quot;2021-07-17T12:40:36.606Z&quot;,&quot;publicationUsers&quot;:[{&quot;id&quot;:222091,&quot;user_id&quot;:870380,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:273635,&quot;name&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;subdomain&quot;:&quot;becomingcyber&quot;,&quot;custom_domain&quot;:&quot;www.becomingcyber.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Becoming Cyber provides students and career changers with the tools they need to break into cybersecurity careers.&quot;,&quot;logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/1c26a730-e390-4d92-b761-edec5555b41d_500x500.png&quot;,&quot;author_id&quot;:870380,&quot;theme_var_background_pop&quot;:&quot;#E8B500&quot;,&quot;created_at&quot;:&quot;2021-01-29T12:19:10.915Z&quot;,&quot;rss_website_url&quot;:null,&quot;email_from_name&quot;:&quot;Becoming Cyber&quot;,&quot;copyright&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false}}],&quot;is_guest&quot;:false}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:null,&quot;language&quot;:&quot;en&quot;,&quot;source&quot;:null}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://www.becomingcyber.com/p/celebrate-the-small-victories-along?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!OnHX!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1c26a730-e390-4d92-b761-edec5555b41d_500x500.png" loading="lazy"><span class="embedded-post-publication-name">Becoming Cyber Newsletter</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">Celebrate the Small Victories Along the Journey to Your First Cybersecurity Job</div></div><div class="embedded-post-body">The journey towards your cybersecurity career can be an arduous one. It takes time and a lot of effort to self-educate, credentialize, network, apply and interview for roles. That makes it important to celebrate the small victories. After an achievement like, passing a certification exam, you might be tempted to immediately begin studying for the next ce&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">5 years ago &#183; Anonymous</div></a></div><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:34998469,&quot;url&quot;:&quot;https://www.becomingcyber.com/p/are-cybersecurity-bootcamps-worth&quot;,&quot;publication_id&quot;:273635,&quot;publication_name&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;publication_logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/1c26a730-e390-4d92-b761-edec5555b41d_500x500.png&quot;,&quot;title&quot;:&quot;Are Cybersecurity Bootcamps Worth the Money?&quot;,&quot;truncated_body_text&quot;:&quot;An aspiring cybersecurity professional, considering his training options, recently asked if cybersecurity bootcamps are worth it? That&#8217;s a common question, especially considering the variety of cybersecurity training options available. The short answer is:&quot;,&quot;date&quot;:&quot;2021-04-16T12:30:50.924Z&quot;,&quot;like_count&quot;:1,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:870380,&quot;name&quot;:&quot;Anonymous&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/3f55ce8d-abfa-42dd-999e-08b26b570f15_4160x4160.jpeg&quot;,&quot;bio&quot;:&quot;A cybersecurity leader in incognito mode.&quot;,&quot;profile_set_up_at&quot;:&quot;2021-07-17T12:40:36.606Z&quot;,&quot;publicationUsers&quot;:[{&quot;id&quot;:222091,&quot;user_id&quot;:870380,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:273635,&quot;name&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;subdomain&quot;:&quot;becomingcyber&quot;,&quot;custom_domain&quot;:&quot;www.becomingcyber.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Becoming Cyber provides students and career changers with the tools they need to break into cybersecurity careers.&quot;,&quot;logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/1c26a730-e390-4d92-b761-edec5555b41d_500x500.png&quot;,&quot;author_id&quot;:870380,&quot;theme_var_background_pop&quot;:&quot;#E8B500&quot;,&quot;created_at&quot;:&quot;2021-01-29T12:19:10.915Z&quot;,&quot;rss_website_url&quot;:null,&quot;email_from_name&quot;:&quot;Becoming Cyber&quot;,&quot;copyright&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false}}],&quot;is_guest&quot;:false}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:null,&quot;language&quot;:&quot;en&quot;,&quot;source&quot;:null}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://www.becomingcyber.com/p/are-cybersecurity-bootcamps-worth?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!OnHX!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1c26a730-e390-4d92-b761-edec5555b41d_500x500.png" loading="lazy"><span class="embedded-post-publication-name">Becoming Cyber Newsletter</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">Are Cybersecurity Bootcamps Worth the Money?</div></div><div class="embedded-post-body">An aspiring cybersecurity professional, considering his training options, recently asked if cybersecurity bootcamps are worth it? That&#8217;s a common question, especially considering the variety of cybersecurity training options available. The short answer is&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">5 years ago &#183; 1 like &#183; Anonymous</div></a></div>]]></content:encoded></item><item><title><![CDATA[You Can’t Pay It Back, You Can Only Pay It Forward]]></title><description><![CDATA[The journey to landing your first cybersecurity job can be a tough one.]]></description><link>https://www.becomingcyber.com/p/you-cant-pay-it-back-you-can-only</link><guid isPermaLink="false">https://www.becomingcyber.com/p/you-cant-pay-it-back-you-can-only</guid><dc:creator><![CDATA[Oritse J. Uku]]></dc:creator><pubDate>Fri, 03 Sep 2021 12:30:11 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!36bl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Faea383b8-f76d-49e4-8e75-ad708de17c06_1000x667.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!36bl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Faea383b8-f76d-49e4-8e75-ad708de17c06_1000x667.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!36bl!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Faea383b8-f76d-49e4-8e75-ad708de17c06_1000x667.jpeg 424w, https://substackcdn.com/image/fetch/$s_!36bl!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Faea383b8-f76d-49e4-8e75-ad708de17c06_1000x667.jpeg 848w, https://substackcdn.com/image/fetch/$s_!36bl!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Faea383b8-f76d-49e4-8e75-ad708de17c06_1000x667.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!36bl!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Faea383b8-f76d-49e4-8e75-ad708de17c06_1000x667.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!36bl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Faea383b8-f76d-49e4-8e75-ad708de17c06_1000x667.jpeg" width="1000" height="667" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/aea383b8-f76d-49e4-8e75-ad708de17c06_1000x667.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:667,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;person sitting on top of gray rock overlooking mountain during daytime&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="person sitting on top of gray rock overlooking mountain during daytime" title="person sitting on top of gray rock overlooking mountain during daytime" srcset="https://substackcdn.com/image/fetch/$s_!36bl!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Faea383b8-f76d-49e4-8e75-ad708de17c06_1000x667.jpeg 424w, https://substackcdn.com/image/fetch/$s_!36bl!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Faea383b8-f76d-49e4-8e75-ad708de17c06_1000x667.jpeg 848w, https://substackcdn.com/image/fetch/$s_!36bl!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Faea383b8-f76d-49e4-8e75-ad708de17c06_1000x667.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!36bl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Faea383b8-f76d-49e4-8e75-ad708de17c06_1000x667.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@dnevozhai?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText">Denys Nevozhai</a> on <a href="https://unsplash.com/s/photos/excited-woman-jumping?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText">Unsplash</a></figcaption></figure></div><p>The journey to landing your first cybersecurity job can be a tough one. Some companies won&#8217;t have the courtesy to even send you a simple, rejection email. You&#8217;ll have interviews that you feel like you nailed, but they don&#8217;t go anywhere. Despite the headaches, eventually you&#8217;ll land your first cybersecurity job. And when you do, it&#8217;ll feel amazing. You&#8217;ll want to jump in the air and shout with excitement. You&#8217;ll yell &#8220;YES!&#8221; to no one in particular. It&#8217;s a pretty awesome feeling.</p><p>When you get to that celebratory, fist pumping stage, you&#8217;ll undoubtedly have someone to thank for helping you get there. We like to believe that we&#8217;re self-made professionals, who depended only on our own hard work, intelligence, and perseverance. Sure, that&#8217;s true... but it&#8217;s not the whole story. We all get some help along the way.</p><h3><strong>We All Get Some Help</strong></h3><p>You might have a friend or an acquaintance in industry, who gave you feedback on your resume. Likely some people sat down with you for informational interviews. Maybe a cybersecurity professional that you reached out to on LinkedIn gave you some time. If you&#8217;re really fortunate maybe someone referred you for a cybersecurity job. Whether it be something big or small, we all get help along the way.</p><p>You can email those people to thank them&#8212;and you should&#8212;but you can&#8217;t really pay them back. The only thing you can really do is pay it forward.</p><h3><strong>Pay It Forward</strong></h3><p>What does it mean to pay it forward? As you get established as a cybersecurity professional, people will reach out to you for help getting into the industry. A friend will want to introduce you to a nephew or a sister, who&#8217;s considering a cybersecurity career. A student or alum for your alma mater may contact you on LinkedIn hoping for a 30-minute chat. Take the time. That&#8217;s paying it forward.</p><p>In the beginning it&#8217;ll be easier to make the time. You&#8217;ll have fewer responsibilities at work as you get started in your cybersecurity career. Then something ironic will happen. As you progress in your career you will have 1) more insight to share with aspiring cybersecurity professionals and 2) less bandwidth to share it. Make the time.</p><p>Remember what it&#8217;s like being on the other side trying to get into the industry. You can accomplish this without becoming a full-giver of advice. You can go to the occasional <a href="https://www.meetup.com/">Meet Up</a> to share some insight with people trying to get into cyber. You can participate in career panels at your alma mater or another local school. You can start a <a href="https://substack.com/">newsletter</a> to help people get into cybersecurity (wink).</p><h3><strong>Stay Motivated to Help</strong></h3><p>Everyone in cybersecurity is busy, but we can all find at least a little time to help others get into the industry. Each time you help someone find their first cybersecurity job, you have a long-term impact on their economic livelihood. That&#8217;s not a small thing.</p><p>Anytime that you feel too busy to have to have that phone chat or review that resume for an aspiring cybersecurity professional, remember that fiery fist-pumping emotion from when you finally landed your first cybersecurity job. It&#8217;s an amazing feeling. In some way&#8212;big or small&#8212;you can help someone else have that feeling. You can spread the joy.</p><p>Remember the ecstatic feeling of landing your first cybersecurity job and how thankful you were to everyone who helped you. You can&#8217;t really pay it back to those people who helped you... but you can pay it forward.</p><h3>Recommended Posts:</h3><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:39214184,&quot;url&quot;:&quot;https://www.becomingcyber.com/p/your-first-cybersecurity-job-may&quot;,&quot;publication_id&quot;:273635,&quot;publication_name&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;publication_logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/1c26a730-e390-4d92-b761-edec5555b41d_500x500.png&quot;,&quot;title&quot;:&quot;Your First Cybersecurity Job May Be Closer Than You Think&quot;,&quot;truncated_body_text&quot;:&quot;Finding your first cybersecurity job is challenging, even after the certifications and the networking. For many people an opportunity exists a little closer to home. You can find opportunities to transition to a cybersecurity role at your current employer. That first cybersecurity role is always going to involve someone taking a chance on you. However, &#8230;&quot;,&quot;date&quot;:&quot;2021-07-27T12:30:07.567Z&quot;,&quot;like_count&quot;:0,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:870380,&quot;name&quot;:&quot;Anonymous&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/3f55ce8d-abfa-42dd-999e-08b26b570f15_4160x4160.jpeg&quot;,&quot;bio&quot;:&quot;A cybersecurity leader in incognito mode.&quot;,&quot;profile_set_up_at&quot;:&quot;2021-07-17T12:40:36.606Z&quot;,&quot;publicationUsers&quot;:[{&quot;id&quot;:222091,&quot;user_id&quot;:870380,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:273635,&quot;name&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;subdomain&quot;:&quot;becomingcyber&quot;,&quot;custom_domain&quot;:&quot;www.becomingcyber.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Becoming Cyber provides students and career changers with the tools they need to break into cybersecurity careers.&quot;,&quot;logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/1c26a730-e390-4d92-b761-edec5555b41d_500x500.png&quot;,&quot;author_id&quot;:870380,&quot;theme_var_background_pop&quot;:&quot;#E8B500&quot;,&quot;created_at&quot;:&quot;2021-01-29T12:19:10.915Z&quot;,&quot;rss_website_url&quot;:null,&quot;email_from_name&quot;:&quot;Becoming Cyber&quot;,&quot;copyright&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false}}],&quot;is_guest&quot;:false}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:null,&quot;language&quot;:&quot;en&quot;,&quot;source&quot;:null}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://www.becomingcyber.com/p/your-first-cybersecurity-job-may?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!OnHX!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1c26a730-e390-4d92-b761-edec5555b41d_500x500.png" loading="lazy"><span class="embedded-post-publication-name">Becoming Cyber Newsletter</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">Your First Cybersecurity Job May Be Closer Than You Think</div></div><div class="embedded-post-body">Finding your first cybersecurity job is challenging, even after the certifications and the networking. For many people an opportunity exists a little closer to home. You can find opportunities to transition to a cybersecurity role at your current employer. That first cybersecurity role is always going to involve someone taking a chance on you. However, &#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">5 years ago &#183; Anonymous</div></a></div><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:36284355,&quot;url&quot;:&quot;https://www.becomingcyber.com/p/get-your-foot-in-the-door-find-the&quot;,&quot;publication_id&quot;:273635,&quot;publication_name&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;publication_logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/1c26a730-e390-4d92-b761-edec5555b41d_500x500.png&quot;,&quot;title&quot;:&quot;Get Your Foot in the Door, Find the Low Hanging Fruit&quot;,&quot;truncated_body_text&quot;:&quot;Plenty of career changers pivot toward cybersecurity with great ambitions. They have goals to quickly become managers, then executives, then CISOs. Maybe they seek to become world-class penetration testers or forensic investigators. The ambition is laudable. However, these goals are dependent on landing that&#8212;often elusive&#8212;first cybersecurity job.&quot;,&quot;date&quot;:&quot;2021-05-11T12:30:08.843Z&quot;,&quot;like_count&quot;:0,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:870380,&quot;name&quot;:&quot;Anonymous&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/3f55ce8d-abfa-42dd-999e-08b26b570f15_4160x4160.jpeg&quot;,&quot;bio&quot;:&quot;A cybersecurity leader in incognito mode.&quot;,&quot;profile_set_up_at&quot;:&quot;2021-07-17T12:40:36.606Z&quot;,&quot;publicationUsers&quot;:[{&quot;id&quot;:222091,&quot;user_id&quot;:870380,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:273635,&quot;name&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;subdomain&quot;:&quot;becomingcyber&quot;,&quot;custom_domain&quot;:&quot;www.becomingcyber.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Becoming Cyber provides students and career changers with the tools they need to break into cybersecurity careers.&quot;,&quot;logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/1c26a730-e390-4d92-b761-edec5555b41d_500x500.png&quot;,&quot;author_id&quot;:870380,&quot;theme_var_background_pop&quot;:&quot;#E8B500&quot;,&quot;created_at&quot;:&quot;2021-01-29T12:19:10.915Z&quot;,&quot;rss_website_url&quot;:null,&quot;email_from_name&quot;:&quot;Becoming Cyber&quot;,&quot;copyright&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false}}],&quot;is_guest&quot;:false}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:null,&quot;language&quot;:&quot;en&quot;,&quot;source&quot;:null}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://www.becomingcyber.com/p/get-your-foot-in-the-door-find-the?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!OnHX!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1c26a730-e390-4d92-b761-edec5555b41d_500x500.png" loading="lazy"><span class="embedded-post-publication-name">Becoming Cyber Newsletter</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">Get Your Foot in the Door, Find the Low Hanging Fruit</div></div><div class="embedded-post-body">Plenty of career changers pivot toward cybersecurity with great ambitions. They have goals to quickly become managers, then executives, then CISOs. Maybe they seek to become world-class penetration testers or forensic investigators. The ambition is laudable. However, these goals are dependent on landing that&#8212;often elusive&#8212;first cybersecurity job&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">5 years ago &#183; Anonymous</div></a></div>]]></content:encoded></item><item><title><![CDATA[What Makes Cybersecurity a ‘Future-Proof’ Career?]]></title><description><![CDATA[In a world in which workers&#8212;both blue- and white-collar&#8212;increasingly see their livelihoods automated away, cybersecurity remains a future-proof career.]]></description><link>https://www.becomingcyber.com/p/why-is-cybersecurity-a-future-proof</link><guid isPermaLink="false">https://www.becomingcyber.com/p/why-is-cybersecurity-a-future-proof</guid><dc:creator><![CDATA[Oritse J. Uku]]></dc:creator><pubDate>Tue, 31 Aug 2021 12:30:18 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!OSYC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb7b02b6-e55a-494d-a703-1c9d97b3f8ca_1000x667.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!OSYC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb7b02b6-e55a-494d-a703-1c9d97b3f8ca_1000x667.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!OSYC!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb7b02b6-e55a-494d-a703-1c9d97b3f8ca_1000x667.jpeg 424w, https://substackcdn.com/image/fetch/$s_!OSYC!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb7b02b6-e55a-494d-a703-1c9d97b3f8ca_1000x667.jpeg 848w, https://substackcdn.com/image/fetch/$s_!OSYC!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb7b02b6-e55a-494d-a703-1c9d97b3f8ca_1000x667.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!OSYC!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb7b02b6-e55a-494d-a703-1c9d97b3f8ca_1000x667.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!OSYC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb7b02b6-e55a-494d-a703-1c9d97b3f8ca_1000x667.jpeg" width="1000" height="667" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/db7b02b6-e55a-494d-a703-1c9d97b3f8ca_1000x667.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:667,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;three person standing near wall inside building&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="three person standing near wall inside building" title="three person standing near wall inside building" srcset="https://substackcdn.com/image/fetch/$s_!OSYC!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb7b02b6-e55a-494d-a703-1c9d97b3f8ca_1000x667.jpeg 424w, https://substackcdn.com/image/fetch/$s_!OSYC!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb7b02b6-e55a-494d-a703-1c9d97b3f8ca_1000x667.jpeg 848w, https://substackcdn.com/image/fetch/$s_!OSYC!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb7b02b6-e55a-494d-a703-1c9d97b3f8ca_1000x667.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!OSYC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb7b02b6-e55a-494d-a703-1c9d97b3f8ca_1000x667.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@werner01?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText">Werner Du plessis</a> on <a href="https://unsplash.com/s/photos/future?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText">Unsplash</a></figcaption></figure></div><p>In a world in which workers&#8212;both blue- and white-collar&#8212;increasingly see their livelihoods automated away, cybersecurity remains a future-proof career. That&#8217;s great for cybersecurity professionals. It can be motivating for aspiring entrants. While technology continues to disrupt seemingly every career field, this one seems immune. So what makes cybersecurity different than so many other fields?</p><h3><strong>What Does &#8216;Future-Proof&#8217; Even Mean?</strong></h3><p>According to the <a href="https://www.collinsdictionary.com/dictionary/english/future-proof">Collins Dictionary</a>, &#8220;If something is future-proof, it will continue to be useful or successful in future if the situation changes.&#8221; Change is certainly coming. Could a shortage of cybersecurity professionals make the field future-proof? After all, there was a <a href="https://www.isc2.org/-/media/ISC2/Research/2020/Workforce-Study/ISC2ResearchDrivenWhitepaperFINAL.ashx?la=en&amp;hash=2879EE167ACBA7100C330429C7EBC623BAF4E07B">cyber workforce gap</a> of approximately 3.12 million cybersecurity professionals globally in 2020 (including over 879,000 in the United States).</p><p>However, current demand doesn&#8217;t necessarily equate to future demand though. After all, there&#8217;s <a href="https://www.businessinsider.com/truckers-pay-hike-salary-truck-driver-shortage-2021-6">increasing demand</a> for commercial truck drivers today. That doesn&#8217;t mean the profession will survive the coming onslaught of <a href="https://spectrum.ieee.org/this-year-autonomous-trucks-will-take-to-the-road-with-no-one-on-board">autonomous commercial</a> fleets.</p><blockquote><p>In a world in which workers&#8212;both blue- and white-collar&#8212;increasingly see their livelihoods automated away, cybersecurity remains a future-proof career.</p></blockquote><p>Being smart or well-educated doesn&#8217;t make one&#8217;s career future-proof either. Lawyers first saw their monopoly on legal service under assault by DIY websites like LegalZoom. Then technology allowed law firms to replace armies of young attorneys with <a href="https://www.nytimes.com/2011/03/05/science/05legal.html">e-discovery</a> software. Now there&#8217;s concern of artificial intelligence outright <a href="https://www.cnbc.com/2017/02/17/lawyers-could-be-replaced-by-artificial-intelligence.html">replacing</a> lawyers.</p><p>As waves of technological advances fuel what Klaus Schwab of the World Economic Forum <a href="https://www.britannica.com/topic/The-Fourth-Industrial-Revolution-2119734">dubbed</a> the <em>Fourth Industrial Revolution</em>, past professional demand does not guarantee future success. Some professions will become the 21st century equivalent of the <a href="https://civilwartalk.com/threads/what-company-made-the-last-buggy-whip-in-america-and-was-it-really-the-best.176907/">buggy whip maker</a>.</p><h3><strong>What Makes Cybersecurity Different?</strong></h3><p>Klaus <a href="https://www.britannica.com/topic/The-Fourth-Industrial-Revolution-2119734">referred</a> to the <em>Fourth Industrial Revolution</em> as &#8220;a series of social, political, cultural, and economic upheavals that will unfold over the 21st century.&#8221; A number of professions are currently fighting to maintain their relevance in this period of change, attempting to withstand the successive waves of technology.</p><blockquote><p>&#8220;If something is future-proof, it will continue to be useful or successful in future if the situation changes.&#8221;</p></blockquote><p>Cybersecurity was made for this period. Rather than attempting to withstand waves of technology, cybersecurity rides the waves like the nimblest of surfers. As the world becomes increasingly interconnected the susceptibility of attack by bad actors increases. Therefore, each wave of technology represents something new that needs to be secured.</p><p>Cybersecurity isn&#8217;t a destination. It&#8217;s a way of being. That&#8217;s the secret sauce that allows it to be a future-proof career. The likelihood of finishing securing the information systems (which touch the lives of billions of people globally) is about the same as the likelihood of you reaching the end of the internet.</p><h3><strong>Retaining Purpose</strong></h3><p>During these pivotal times future-proof careers can provide not just economic security. They can also provide a continued sense of purpose. That&#8217;s valuable in a world in which people&#8217;s jobs are regularly automated away.</p><p>We are just scratching the surface of the conveniences and opportunities that this era of epochal change will create. These conveniences and opportunities will come at a cost however. Don&#8217;t wait for the revolution to come find you. Pursuing a future-proof career&#8212;whether it be cybersecurity or another field&#8212;can help retain your sense of agency and pursue. After all, the future is now.</p><h3>Recommended Posts:</h3><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:36284355,&quot;url&quot;:&quot;https://www.becomingcyber.com/p/get-your-foot-in-the-door-find-the&quot;,&quot;publication_id&quot;:273635,&quot;publication_name&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;publication_logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/1c26a730-e390-4d92-b761-edec5555b41d_500x500.png&quot;,&quot;title&quot;:&quot;Get Your Foot in the Door, Find the Low Hanging Fruit&quot;,&quot;truncated_body_text&quot;:&quot;Plenty of career changers pivot toward cybersecurity with great ambitions. They have goals to quickly become managers, then executives, then CISOs. Maybe they seek to become world-class penetration testers or forensic investigators. The ambition is laudable. However, these goals are dependent on landing that&#8212;often elusive&#8212;first cybersecurity job.&quot;,&quot;date&quot;:&quot;2021-05-11T12:30:08.843Z&quot;,&quot;like_count&quot;:0,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:870380,&quot;name&quot;:&quot;Anonymous&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/3f55ce8d-abfa-42dd-999e-08b26b570f15_4160x4160.jpeg&quot;,&quot;bio&quot;:&quot;A cybersecurity leader in incognito mode.&quot;,&quot;profile_set_up_at&quot;:&quot;2021-07-17T12:40:36.606Z&quot;,&quot;tos_accepted_at&quot;:&quot;2018-09-10T01:55:01.893Z&quot;,&quot;publicationUsers&quot;:[{&quot;id&quot;:222091,&quot;user_id&quot;:870380,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:273635,&quot;name&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;subdomain&quot;:&quot;becomingcyber&quot;,&quot;custom_domain&quot;:&quot;www.becomingcyber.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Becoming Cyber provides students and career changers with the tools they need to break into cybersecurity careers.&quot;,&quot;logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/1c26a730-e390-4d92-b761-edec5555b41d_500x500.png&quot;,&quot;author_id&quot;:870380,&quot;theme_var_background_pop&quot;:&quot;#E8B500&quot;,&quot;created_at&quot;:&quot;2021-01-29T12:19:10.915Z&quot;,&quot;rss_website_url&quot;:null,&quot;email_from_name&quot;:&quot;Becoming Cyber&quot;,&quot;copyright&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false}}],&quot;is_guest&quot;:false}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:null,&quot;language&quot;:&quot;en&quot;,&quot;source&quot;:null}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://www.becomingcyber.com/p/get-your-foot-in-the-door-find-the?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!OnHX!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1c26a730-e390-4d92-b761-edec5555b41d_500x500.png" loading="lazy"><span class="embedded-post-publication-name">Becoming Cyber Newsletter</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">Get Your Foot in the Door, Find the Low Hanging Fruit</div></div><div class="embedded-post-body">Plenty of career changers pivot toward cybersecurity with great ambitions. They have goals to quickly become managers, then executives, then CISOs. Maybe they seek to become world-class penetration testers or forensic investigators. The ambition is laudable. However, these goals are dependent on landing that&#8212;often elusive&#8212;first cybersecurity job&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">5 years ago &#183; Anonymous</div></a></div><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:38790927,&quot;url&quot;:&quot;https://www.becomingcyber.com/p/cybersecurity-is-a-people-business&quot;,&quot;publication_id&quot;:273635,&quot;publication_name&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;publication_logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/1c26a730-e390-4d92-b761-edec5555b41d_500x500.png&quot;,&quot;title&quot;:&quot;Cybersecurity Is A Relationship Business&quot;,&quot;truncated_body_text&quot;:&quot;When people think of the cybersecurity profession, many naturally think of the technical aspect. You certainly need technical proficiency. Many would be surprised to hear, however, that cybersecurity is really a relationship business. Whether you look at the protected or the protectors, people are the lynchpin. The systems and applications, which cyberse&#8230;&quot;,&quot;date&quot;:&quot;2021-07-20T12:30:30.799Z&quot;,&quot;like_count&quot;:0,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:870380,&quot;name&quot;:&quot;Anonymous&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/3f55ce8d-abfa-42dd-999e-08b26b570f15_4160x4160.jpeg&quot;,&quot;bio&quot;:&quot;A cybersecurity leader in incognito mode.&quot;,&quot;profile_set_up_at&quot;:&quot;2021-07-17T12:40:36.606Z&quot;,&quot;tos_accepted_at&quot;:&quot;2018-09-10T01:55:01.893Z&quot;,&quot;publicationUsers&quot;:[{&quot;id&quot;:222091,&quot;user_id&quot;:870380,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:273635,&quot;name&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;subdomain&quot;:&quot;becomingcyber&quot;,&quot;custom_domain&quot;:&quot;www.becomingcyber.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Becoming Cyber provides students and career changers with the tools they need to break into cybersecurity careers.&quot;,&quot;logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/1c26a730-e390-4d92-b761-edec5555b41d_500x500.png&quot;,&quot;author_id&quot;:870380,&quot;theme_var_background_pop&quot;:&quot;#E8B500&quot;,&quot;created_at&quot;:&quot;2021-01-29T12:19:10.915Z&quot;,&quot;rss_website_url&quot;:null,&quot;email_from_name&quot;:&quot;Becoming Cyber&quot;,&quot;copyright&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false}}],&quot;is_guest&quot;:false}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:null,&quot;language&quot;:&quot;en&quot;,&quot;source&quot;:null}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://www.becomingcyber.com/p/cybersecurity-is-a-people-business?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!OnHX!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1c26a730-e390-4d92-b761-edec5555b41d_500x500.png" loading="lazy"><span class="embedded-post-publication-name">Becoming Cyber Newsletter</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">Cybersecurity Is A Relationship Business</div></div><div class="embedded-post-body">When people think of the cybersecurity profession, many naturally think of the technical aspect. You certainly need technical proficiency. Many would be surprised to hear, however, that cybersecurity is really a relationship business. Whether you look at the protected or the protectors, people are the lynchpin. The systems and applications, which cyberse&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">5 years ago &#183; Anonymous</div></a></div>]]></content:encoded></item><item><title><![CDATA[Cyber 201: What is a Security Operations Center?]]></title><description><![CDATA[Most lists of entry-level cybersecurity jobs will undoubtedly include the SOC analyst.]]></description><link>https://www.becomingcyber.com/p/cyber-201-what-is-a-security-operations</link><guid isPermaLink="false">https://www.becomingcyber.com/p/cyber-201-what-is-a-security-operations</guid><dc:creator><![CDATA[Oritse J. Uku]]></dc:creator><pubDate>Fri, 27 Aug 2021 12:30:14 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!i8Uu!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc09b816-7933-4671-aed1-38b8e786441c_1000x667.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!i8Uu!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc09b816-7933-4671-aed1-38b8e786441c_1000x667.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!i8Uu!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc09b816-7933-4671-aed1-38b8e786441c_1000x667.jpeg 424w, https://substackcdn.com/image/fetch/$s_!i8Uu!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc09b816-7933-4671-aed1-38b8e786441c_1000x667.jpeg 848w, https://substackcdn.com/image/fetch/$s_!i8Uu!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc09b816-7933-4671-aed1-38b8e786441c_1000x667.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!i8Uu!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc09b816-7933-4671-aed1-38b8e786441c_1000x667.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!i8Uu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc09b816-7933-4671-aed1-38b8e786441c_1000x667.jpeg" width="1000" height="667" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/cc09b816-7933-4671-aed1-38b8e786441c_1000x667.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:667,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;unknown persons using computer indoors&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="unknown persons using computer indoors" title="unknown persons using computer indoors" srcset="https://substackcdn.com/image/fetch/$s_!i8Uu!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc09b816-7933-4671-aed1-38b8e786441c_1000x667.jpeg 424w, https://substackcdn.com/image/fetch/$s_!i8Uu!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc09b816-7933-4671-aed1-38b8e786441c_1000x667.jpeg 848w, https://substackcdn.com/image/fetch/$s_!i8Uu!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc09b816-7933-4671-aed1-38b8e786441c_1000x667.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!i8Uu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc09b816-7933-4671-aed1-38b8e786441c_1000x667.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@arlington_research?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText">Arlington Research</a> on <a href="https://unsplash.com/s/photos/computers-women?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText">Unsplash</a></figcaption></figure></div><p>Most lists of entry-level cybersecurity jobs will undoubtedly include the SOC analyst. The lingering question for many aspiring cybersecurity professionals is: &#8220;What&#8217;s a SOC?&#8221; We&#8217;re going to take a look at the Security Operations Center (SOC) and its role in the cybersecurity landscape. It&#8217;s important to have at least a basic understanding of how the SOC fits in organizationally, regardless of where you land your first cybersecurity job.</p><p>According to security vendor <a href="https://www.crowdstrike.com/cybersecurity-101/security-operations-center-soc/">CrowdStrike</a>, &#8220;A security operations center (SOC) includes the people, processes and technologies responsible for monitoring, analyzing and maintaining an organization&#8217;s information security.&#8221; So what does that actually mean? Let&#8217;s focus on those stated tasks: monitor, analyze and maintain.</p><h3><strong>Monitor</strong></h3><p>Basically, security operation centers monitor everything that happens on its organization&#8217;s network continuously looking for anomalies. As you can imagine, that's a lot of traffic to monitor, so the people, processes and technologies become very important.</p><p>In order to maximize the visibility SOCs have of their network, they need to understand which technology and process gives them visibility of which portions of their network. Just ensuring full visibility is a big task. Once an organization has visibility to fully monitor their network for anomalies, then they need to do something with all that data.</p><h3><strong>Analyze</strong></h3><p>Anomalies don&#8217;t always represent bad or malicious activity. After all, by <a href="https://www.merriam-webster.com/thesaurus/anomaly">definition</a> an anomaly is simply, &#8220;something that is different from what is ordinary or expected.&#8221; That means that monitoring can produce a lot of suspicious <a href="https://csrc.nist.gov/glossary/term/event">events</a>&#8212;any observable occurrence in a network or system&#8212;which aren&#8217;t <a href="https://csrc.nist.gov/glossary/term/threat">threats</a>.</p><blockquote><p>According to security vendor <a href="https://www.crowdstrike.com/cybersecurity-101/security-operations-center-soc/">CrowdStrike</a>, &#8220;A security operations center (SOC) includes the people, processes and technologies responsible for monitoring, analyzing and maintaining an organization&#8217;s information security.&#8221;</p></blockquote><p>How does the SOC determine which suspicious events are actually threats? People, processes and technologies really come into play here. Obviously, SOC analysts are a big part of the equation. (There&#8217;s a reason why we call them <em>analysts</em>.) However, you can&#8217;t just throw people at the problem. Qualified cybersecurity professionals are a limited resource (thus the <a href="https://www.becomingcyber.com/p/cybersecurity-needs-you">skills shortage</a>) and it&#8217;s unsustainable, leading to burnout.</p><p>Organizations therefore need to design processes and adopt technologies, which allow them to employ their people most effectively. Well designed and executed processes and technologies allow SOCs filter out suspicious events, in order to intelligently utilize the time of SOC analysts.</p><h3><strong>Maintain</strong></h3><p>At first glance, maintaining an organization&#8217;s information security may sound like a mundane task. But what is the actual task? It is to maintain the confidentiality, integrity, and availability (CIA) of an organization&#8217;s information systems. That sounds like a bigger task, doesn&#8217;t it? How do you maintain the CIA triad after you&#8217;ve identified malicious incidents through analysis? You contain whatever has disrupted confidentiality, integrity or availability of your organization&#8217;s information systems.</p><p>Maintaining an organization&#8217;s information security leans heavily on people, processes and technologies. In order to maintain security the SOC needs to understand what &#8220;right&#8221; looks like (i.e., get a good baseline of normal network activity). It will need to develop processes to standardize complex tasks. As part of these processes, the SOC will really depend on its people. SOC analysts at various levels will need to execute interconnected tasks in a coordinated manner to maintain the organization&#8217;s information security.</p><p>Sounds like challenging work? It is. But it can be exciting and it&#8217;s important.</p><h3><strong>SOC Analysts Tiers</strong></h3><p>You&#8217;ll hear about SOC Level 1, 2, and 3 Analysts. Those roles with a higher number require greater experience and have greater responsibilities. A SOC Level 1 Analyst is a front-line cybersecurity professional responsible for monitoring and responding to security related alerts. A SOC Level 3 Analyst is more of a subject matter expert (SME) and/or manager.</p><p>A SOC Level 1 Analyst role can be a good place to start one&#8217;s cybersecurity career. SOC Level 1 Analysts are always in demand and the role provides a lot of hands-on experience.</p><h3><strong>Training Programs</strong></h3><ul><li><p><a href="https://www.eccouncil.org/programs/certified-soc-analyst-csa/">Certified SOC Analyst (CSA) | EC-Council</a></p></li><li><p><a href="https://www.cybrary.it/catalog/career-path/soc-analyst-level-1/">Become a SOC Analyst - Level 1 | Cybrary</a></p></li><li><p><a href="https://www.cybrary.it/catalog/career-path/soc-analyst-level-2/">Become a SOC Analyst - Level 2 | Cybrary</a></p></li><li><p><a href="https://www.cybrary.it/catalog/career-path/soc-analyst-level-3/">Become a SOC Analyst - Level 3 | Cybrary</a></p></li><li><p><a href="https://docs.microsoft.com/en-us/learn/certifications/security-operations-analyst/">Microsoft Certified: Security Operations Analyst Associate</a></p></li></ul><p>A Security Operations Center is a big investment, so many organizations will outsource the roles to a Managed Security Service Provider (MSSP). Whether using an in-house SOC or an external MSSP, Security Operations is often the first line of defense against cyberattacks.</p><h3>Recommended Posts</h3><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:38121452,&quot;url&quot;:&quot;https://www.becomingcyber.com/p/do-cybersecurity-certifications-even&quot;,&quot;publication_id&quot;:273635,&quot;publication_name&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;publication_logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/1c26a730-e390-4d92-b761-edec5555b41d_500x500.png&quot;,&quot;title&quot;:&quot;Do Cybersecurity Certifications Even Matter?&quot;,&quot;truncated_body_text&quot;:&quot;There&#8217;s a school of thought in cybersecurity&#8212;and in technology, in general&#8212;that certifications don&#8217;t matter. That experience is the only thing that matters. The thought goes that certification issuing organizations are just in the business of making money. Experience matters more than certifications and certifications are an ineffective measure of one&#8217;s&#8230;&quot;,&quot;date&quot;:&quot;2021-07-06T12:30:42.464Z&quot;,&quot;like_count&quot;:0,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:870380,&quot;name&quot;:&quot;Anonymous&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/3f55ce8d-abfa-42dd-999e-08b26b570f15_4160x4160.jpeg&quot;,&quot;bio&quot;:&quot;A cybersecurity leader in incognito mode.&quot;,&quot;profile_set_up_at&quot;:&quot;2021-07-17T12:40:36.606Z&quot;,&quot;tos_accepted_at&quot;:&quot;2018-09-10T01:55:01.893Z&quot;,&quot;publicationUsers&quot;:[{&quot;id&quot;:222091,&quot;user_id&quot;:870380,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:273635,&quot;name&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;subdomain&quot;:&quot;becomingcyber&quot;,&quot;custom_domain&quot;:&quot;www.becomingcyber.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Becoming Cyber provides students and career changers with the tools they need to break into cybersecurity careers.&quot;,&quot;logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/1c26a730-e390-4d92-b761-edec5555b41d_500x500.png&quot;,&quot;author_id&quot;:870380,&quot;theme_var_background_pop&quot;:&quot;#E8B500&quot;,&quot;created_at&quot;:&quot;2021-01-29T12:19:10.915Z&quot;,&quot;rss_website_url&quot;:null,&quot;email_from_name&quot;:&quot;Becoming Cyber&quot;,&quot;copyright&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false}}],&quot;is_guest&quot;:false}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:null,&quot;language&quot;:&quot;en&quot;,&quot;source&quot;:null}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://www.becomingcyber.com/p/do-cybersecurity-certifications-even?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!OnHX!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1c26a730-e390-4d92-b761-edec5555b41d_500x500.png" loading="lazy"><span class="embedded-post-publication-name">Becoming Cyber Newsletter</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">Do Cybersecurity Certifications Even Matter?</div></div><div class="embedded-post-body">There&#8217;s a school of thought in cybersecurity&#8212;and in technology, in general&#8212;that certifications don&#8217;t matter. That experience is the only thing that matters. The thought goes that certification issuing organizations are just in the business of making money. Experience matters more than certifications and certifications are an ineffective measure of one&#8217;s&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">5 years ago &#183; Anonymous</div></a></div><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:37616624,&quot;url&quot;:&quot;https://www.becomingcyber.com/p/future-trends-cloud-security&quot;,&quot;publication_id&quot;:273635,&quot;publication_name&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;publication_logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/1c26a730-e390-4d92-b761-edec5555b41d_500x500.png&quot;,&quot;title&quot;:&quot;Future Trends: Cloud Security&quot;,&quot;truncated_body_text&quot;:&quot;Future Trends We may not be able to predict the future, but we can certainly foresee the technological trends which will impact it. Any technology, which businesses and governments use to evolve and grow, is going to need securing and defending. Future Trends in technology therefore drive future needs for cybersecurity professionals.&quot;,&quot;date&quot;:&quot;2021-06-18T12:30:03.001Z&quot;,&quot;like_count&quot;:0,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:870380,&quot;name&quot;:&quot;Anonymous&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/3f55ce8d-abfa-42dd-999e-08b26b570f15_4160x4160.jpeg&quot;,&quot;bio&quot;:&quot;A cybersecurity leader in incognito mode.&quot;,&quot;profile_set_up_at&quot;:&quot;2021-07-17T12:40:36.606Z&quot;,&quot;tos_accepted_at&quot;:&quot;2018-09-10T01:55:01.893Z&quot;,&quot;publicationUsers&quot;:[{&quot;id&quot;:222091,&quot;user_id&quot;:870380,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:273635,&quot;name&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;subdomain&quot;:&quot;becomingcyber&quot;,&quot;custom_domain&quot;:&quot;www.becomingcyber.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Becoming Cyber provides students and career changers with the tools they need to break into cybersecurity careers.&quot;,&quot;logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/1c26a730-e390-4d92-b761-edec5555b41d_500x500.png&quot;,&quot;author_id&quot;:870380,&quot;theme_var_background_pop&quot;:&quot;#E8B500&quot;,&quot;created_at&quot;:&quot;2021-01-29T12:19:10.915Z&quot;,&quot;rss_website_url&quot;:null,&quot;email_from_name&quot;:&quot;Becoming Cyber&quot;,&quot;copyright&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false}}],&quot;is_guest&quot;:false}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:null,&quot;language&quot;:&quot;en&quot;,&quot;source&quot;:null}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://www.becomingcyber.com/p/future-trends-cloud-security?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!OnHX!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1c26a730-e390-4d92-b761-edec5555b41d_500x500.png" loading="lazy"><span class="embedded-post-publication-name">Becoming Cyber Newsletter</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">Future Trends: Cloud Security</div></div><div class="embedded-post-body">Future Trends We may not be able to predict the future, but we can certainly foresee the technological trends which will impact it. Any technology, which businesses and governments use to evolve and grow, is going to need securing and defending. Future Trends in technology therefore drive future needs for cybersecurity professionals&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">5 years ago &#183; Anonymous</div></a></div>]]></content:encoded></item><item><title><![CDATA[Three Reasons You Shouldn’t Get Into Cybersecurity]]></title><description><![CDATA[Let&#8217;s face it, cybersecurity isn&#8217;t for everyone.]]></description><link>https://www.becomingcyber.com/p/three-reasons-you-shouldnt-get-into</link><guid isPermaLink="false">https://www.becomingcyber.com/p/three-reasons-you-shouldnt-get-into</guid><dc:creator><![CDATA[Oritse J. Uku]]></dc:creator><pubDate>Tue, 24 Aug 2021 12:30:10 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!RCJb!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6d3f0ad-3cb8-4ed4-918b-a1cc9baeb4e7_1125x750.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!RCJb!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6d3f0ad-3cb8-4ed4-918b-a1cc9baeb4e7_1125x750.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!RCJb!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6d3f0ad-3cb8-4ed4-918b-a1cc9baeb4e7_1125x750.jpeg 424w, https://substackcdn.com/image/fetch/$s_!RCJb!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6d3f0ad-3cb8-4ed4-918b-a1cc9baeb4e7_1125x750.jpeg 848w, https://substackcdn.com/image/fetch/$s_!RCJb!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6d3f0ad-3cb8-4ed4-918b-a1cc9baeb4e7_1125x750.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!RCJb!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6d3f0ad-3cb8-4ed4-918b-a1cc9baeb4e7_1125x750.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!RCJb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6d3f0ad-3cb8-4ed4-918b-a1cc9baeb4e7_1125x750.jpeg" width="1125" height="750" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/d6d3f0ad-3cb8-4ed4-918b-a1cc9baeb4e7_1125x750.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:750,&quot;width&quot;:1125,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Unrecognizable young woman demonstrating prohibition sign showing gesture of refuse using hand and note with sign stop&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Unrecognizable young woman demonstrating prohibition sign showing gesture of refuse using hand and note with sign stop" title="Unrecognizable young woman demonstrating prohibition sign showing gesture of refuse using hand and note with sign stop" srcset="https://substackcdn.com/image/fetch/$s_!RCJb!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6d3f0ad-3cb8-4ed4-918b-a1cc9baeb4e7_1125x750.jpeg 424w, https://substackcdn.com/image/fetch/$s_!RCJb!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6d3f0ad-3cb8-4ed4-918b-a1cc9baeb4e7_1125x750.jpeg 848w, https://substackcdn.com/image/fetch/$s_!RCJb!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6d3f0ad-3cb8-4ed4-918b-a1cc9baeb4e7_1125x750.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!RCJb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6d3f0ad-3cb8-4ed4-918b-a1cc9baeb4e7_1125x750.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by&nbsp;<strong><a href="https://www.pexels.com/@anete-lusina?utm_content=attributionCopyText&amp;utm_medium=referral&amp;utm_source=pexels">Anete Lusina</a></strong>&nbsp;from&nbsp;<strong><a href="https://www.pexels.com/photo/woman-showing-paper-with-prohibition-sign-5723268/?utm_content=attributionCopyText&amp;utm_medium=referral&amp;utm_source=pexels">Pexels</a></strong></figcaption></figure></div><p>Let&#8217;s face it, cybersecurity isn&#8217;t for everyone. Sure there's a lot of hype around the field. While tons of people are talking about cybersecurity, that doesn&#8217;t mean that everyone will enjoy it. What are some key reasons that you shouldn&#8217;t get into cybersecurity?</p><h3><strong>You Value Routine In Your Work Schedule</strong></h3><p>For a variety of reasons you may highly value routine in your work schedule. Maybe you have commitments outside of work that are inflexible time-wise. Perhaps you simply don&#8217;t want to sacrifice time with friends or family for your career. A predictable work schedule might be very important to you.</p><p>Cybersecurity can often present a work schedule that is less than predictable. At its essence, cybersecurity is&#8212;as the name states&#8212;<em>security</em> work. That means that when things go wrong, people&#8217;s personal schedules can suffer. Bad actors don&#8217;t respect weekends or holidays. In fact some will intentionally target them.</p><blockquote><p>Bad actors don&#8217;t respect weekends or holidays.</p></blockquote><p>You&#8217;ll struggle to find many experienced cybersecurity professionals, who have never had their evening, weekend, or a holiday disrupted by work. Of course, some roles (such as, incident responders) are more hectic than others. To many extents though, a career in cybersecurity involves accepting the lack of routine that accompanies it. If you value a fixed work routine above all else, cybersecurity might not be right for you.</p><h3><strong>You Prefer Not to Depend on Others</strong></h3><p>No one can successfully defend an organization alone. Maybe you prefer a level of autonomy in which you don&#8217;t have to deal with other people. Perhaps you want to succeed or fail on your own merits. Does being dependent on others for your success frustrates you?</p><p>There are some cybersecurity roles in which you wouldn&#8217;t be dependent upon or accountable to others for your success, such as independent researchers. However, when it comes to defending organizations, cybersecurity is a team sport. You have to work well with others to be effective and you&#8217;re dependent on them for your organizational success.</p><p>You can undoubtedly find a specialized niche that doesn&#8217;t require other people. By and large you&#8217;ll need to depend on others in cybersecurity. If you value autonomy over teamwork, cybersecurity might not be right for you.</p><h3><strong>You&#8217;re Not a Fan of Studying</strong></h3><p>Technology changes. Industry frameworks evolve. The line between &#8220;learning&#8221; and &#8220;doing&#8221; blur in cybersecurity. Cybersecurity requires life-long learning. Not everyone enjoyed school, but you&#8217;ll need to be willing to study new topics to succeed. For example, different organizations will have varying technology stacks. If you have no desire to learn new technologies over the course of your career, you&#8217;ll find yourself with limited career options.</p><blockquote><p>Cybersecurity requires life-long learning.</p></blockquote><p><em>Becoming Cyber</em> often discusses the best <a href="https://www.becomingcyber.com/p/best-certifications-for-breaking">entry-level certifications</a> to break into cybersecurity. As you progress in your career there will likely be expectations of obtaining more advanced certifications, like the <a href="https://www.isc2.org/Certifications/CISSP">Certified Information Systems Security Professional (CISSP)</a> or <a href="https://www.isaca.org/credentialing/cism">Certified Information Security Manager (CISM)</a>. Getting in the door doesn&#8217;t mean you&#8217;re done studying for certifications.</p><p>Technology continues to advance over time. In order to stay relevant, you need to keep studying and learning. You need to keep up. If you&#8217;re not a fan of continued learning, cybersecurity may not be right for you.</p><h3><strong>What Next?</strong></h3><p>Cybersecurity is a great career field. If it&#8217;s not right for you, that&#8217;s okay. There are other high growth, future-oriented careers out there. You can learn more about them in books like <em><a href="https://www.amazon.com/Industries-Future-Alec-Ross/dp/1476753660/">The Industries of the Future</a></em> by Alec Ross. If you are not dissuaded in your cybersecurity interests, there is plenty of work. We just need to land you that first cybersecurity job. Let&#8217;s get back to work.</p><h3>Recommended Posts:</h3><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:39214184,&quot;url&quot;:&quot;https://www.becomingcyber.com/p/your-first-cybersecurity-job-may&quot;,&quot;publication_id&quot;:273635,&quot;publication_name&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;publication_logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/1c26a730-e390-4d92-b761-edec5555b41d_500x500.png&quot;,&quot;title&quot;:&quot;Your First Cybersecurity Job May Be Closer Than You Think&quot;,&quot;truncated_body_text&quot;:&quot;Finding your first cybersecurity job is challenging, even after the certifications and the networking. For many people an opportunity exists a little closer to home. You can find opportunities to transition to a cybersecurity role at your current employer. That first cybersecurity role is always going to involve someone taking a chance on you. However, &#8230;&quot;,&quot;date&quot;:&quot;2021-07-27T12:30:07.567Z&quot;,&quot;like_count&quot;:0,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:870380,&quot;name&quot;:&quot;Anonymous&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/3f55ce8d-abfa-42dd-999e-08b26b570f15_4160x4160.jpeg&quot;,&quot;bio&quot;:&quot;A cybersecurity leader in incognito mode.&quot;,&quot;profile_set_up_at&quot;:&quot;2021-07-17T12:40:36.606Z&quot;,&quot;tos_accepted_at&quot;:&quot;2018-09-10T01:55:01.893Z&quot;,&quot;is_guest&quot;:false}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:null,&quot;language&quot;:&quot;en&quot;,&quot;source&quot;:null}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://www.becomingcyber.com/p/your-first-cybersecurity-job-may?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!OnHX!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1c26a730-e390-4d92-b761-edec5555b41d_500x500.png" loading="lazy"><span class="embedded-post-publication-name">Becoming Cyber Newsletter</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">Your First Cybersecurity Job May Be Closer Than You Think</div></div><div class="embedded-post-body">Finding your first cybersecurity job is challenging, even after the certifications and the networking. For many people an opportunity exists a little closer to home. You can find opportunities to transition to a cybersecurity role at your current employer. That first cybersecurity role is always going to involve someone taking a chance on you. However, &#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">5 years ago &#183; Anonymous</div></a></div><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:34683829,&quot;url&quot;:&quot;https://www.becomingcyber.com/p/plotting-your-cybersecurity-career&quot;,&quot;publication_id&quot;:273635,&quot;publication_name&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;publication_logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/1c26a730-e390-4d92-b761-edec5555b41d_500x500.png&quot;,&quot;title&quot;:&quot;Plotting Your Cybersecurity Career Path&quot;,&quot;truncated_body_text&quot;:&quot;We talk a lot about pursuing your first cybersecurity job, but what comes after that? Cyber Seek is a usual tool for plotting out the first few hops of your cybersecurity career. Cyber Seek&#8217;s interactive Career Pathway displays a succession of potential cybersecurity jobs. It starts with Feeder Roles, then progresses to Entry-Level, Mid-Level, then Adva&#8230;&quot;,&quot;date&quot;:&quot;2021-04-09T12:30:57.571Z&quot;,&quot;like_count&quot;:0,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:870380,&quot;name&quot;:&quot;Anonymous&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/3f55ce8d-abfa-42dd-999e-08b26b570f15_4160x4160.jpeg&quot;,&quot;bio&quot;:&quot;A cybersecurity leader in incognito mode.&quot;,&quot;profile_set_up_at&quot;:&quot;2021-07-17T12:40:36.606Z&quot;,&quot;tos_accepted_at&quot;:&quot;2018-09-10T01:55:01.893Z&quot;,&quot;is_guest&quot;:false}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:null,&quot;language&quot;:&quot;en&quot;,&quot;source&quot;:null}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://www.becomingcyber.com/p/plotting-your-cybersecurity-career?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!OnHX!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1c26a730-e390-4d92-b761-edec5555b41d_500x500.png" loading="lazy"><span class="embedded-post-publication-name">Becoming Cyber Newsletter</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">Plotting Your Cybersecurity Career Path</div></div><div class="embedded-post-body">We talk a lot about pursuing your first cybersecurity job, but what comes after that? Cyber Seek is a usual tool for plotting out the first few hops of your cybersecurity career. Cyber Seek&#8217;s interactive Career Pathway displays a succession of potential cybersecurity jobs. It starts with Feeder Roles, then progresses to Entry-Level, Mid-Level, then Adva&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">5 years ago &#183; Anonymous</div></a></div>]]></content:encoded></item><item><title><![CDATA[Cybersecurity Analysts Make How Much?! [UPDATE]]]></title><description><![CDATA[One great thing about the cybersecurity industry is that it offers people economic security, when the middle class is under pressure. Experienced cybersecurity professionals enjoy a 0% unemployment rate. Many potential career changers really want to know, &#8220;How much can I make in cybersecurity?&#8221;]]></description><link>https://www.becomingcyber.com/p/cybersecurity-analysts-make-how-much-101</link><guid isPermaLink="false">https://www.becomingcyber.com/p/cybersecurity-analysts-make-how-much-101</guid><dc:creator><![CDATA[Oritse J. Uku]]></dc:creator><pubDate>Fri, 20 Aug 2021 12:30:35 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!2OXX!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F880aaa7a-58f8-4d1f-80f6-74523135b9c6_1125x750.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!2OXX!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F880aaa7a-58f8-4d1f-80f6-74523135b9c6_1125x750.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!2OXX!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F880aaa7a-58f8-4d1f-80f6-74523135b9c6_1125x750.jpeg 424w, https://substackcdn.com/image/fetch/$s_!2OXX!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F880aaa7a-58f8-4d1f-80f6-74523135b9c6_1125x750.jpeg 848w, https://substackcdn.com/image/fetch/$s_!2OXX!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F880aaa7a-58f8-4d1f-80f6-74523135b9c6_1125x750.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!2OXX!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F880aaa7a-58f8-4d1f-80f6-74523135b9c6_1125x750.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!2OXX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F880aaa7a-58f8-4d1f-80f6-74523135b9c6_1125x750.jpeg" width="1125" height="750" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/880aaa7a-58f8-4d1f-80f6-74523135b9c6_1125x750.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:750,&quot;width&quot;:1125,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Photo of an Elderly Woman Flaunting Money &quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Photo of an Elderly Woman Flaunting Money " title="Photo of an Elderly Woman Flaunting Money " srcset="https://substackcdn.com/image/fetch/$s_!2OXX!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F880aaa7a-58f8-4d1f-80f6-74523135b9c6_1125x750.jpeg 424w, https://substackcdn.com/image/fetch/$s_!2OXX!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F880aaa7a-58f8-4d1f-80f6-74523135b9c6_1125x750.jpeg 848w, https://substackcdn.com/image/fetch/$s_!2OXX!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F880aaa7a-58f8-4d1f-80f6-74523135b9c6_1125x750.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!2OXX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F880aaa7a-58f8-4d1f-80f6-74523135b9c6_1125x750.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by&nbsp;<strong><a href="https://www.pexels.com/@ron-lach?utm_content=attributionCopyText&amp;utm_medium=referral&amp;utm_source=pexels">Ron Lach</a></strong>&nbsp;from&nbsp;<strong><a href="https://www.pexels.com/photo/photo-of-an-elderly-woman-flaunting-money-7884134/?utm_content=attributionCopyText&amp;utm_medium=referral&amp;utm_source=pexels">Pexels</a></strong></figcaption></figure></div><p>One great thing about the cybersecurity industry is that it offers people economic security, when the middle class is under pressure. Experienced cybersecurity professionals enjoy a <a href="https://www.geektime.com/cybersecurity-is-the-job-of-the-future/">0% unemployment rate</a>. Many potential career changers really want to know, &#8220;How much can I make in cybersecurity?&#8221; I&#8217;ll spare you the standard explanation that <em>it depends</em>.</p><p>In 2020, the median income for an information security analyst was <strong>$103,590 per year</strong> (with less than 5 years experience) <a href="https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm">according to</a> the US Bureau of Labor Statistics (BLS). (That&#8217;s a 3.9% increase from 2019.) Meanwhile, the US median household income <a href="https://dqydj.com/average-median-top-household-income-percentiles/">was</a> $68,400 in that same year. You read that right. In the US, the <em>individual</em> median information security analyst earned <strong>51% more</strong> than the <em>entire</em> median household in 2020!</p><p>Where are all these jobs? All over the United States, but the highest numbers are in Virginia, Texas, California, New York and Florida. &nbsp;The <a href="https://www.bls.gov/oes/current/oes151212.htm">highest paying</a> states however are California, New York, New Jersey, District of Columbia, and Virginia.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!1Rck!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0d02d8df-5912-44e0-a2d5-ed17a1ae6a9c_800x600.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!1Rck!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0d02d8df-5912-44e0-a2d5-ed17a1ae6a9c_800x600.png 424w, https://substackcdn.com/image/fetch/$s_!1Rck!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0d02d8df-5912-44e0-a2d5-ed17a1ae6a9c_800x600.png 848w, https://substackcdn.com/image/fetch/$s_!1Rck!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0d02d8df-5912-44e0-a2d5-ed17a1ae6a9c_800x600.png 1272w, https://substackcdn.com/image/fetch/$s_!1Rck!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0d02d8df-5912-44e0-a2d5-ed17a1ae6a9c_800x600.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!1Rck!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0d02d8df-5912-44e0-a2d5-ed17a1ae6a9c_800x600.png" width="800" height="600" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/0d02d8df-5912-44e0-a2d5-ed17a1ae6a9c_800x600.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:600,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!1Rck!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0d02d8df-5912-44e0-a2d5-ed17a1ae6a9c_800x600.png 424w, https://substackcdn.com/image/fetch/$s_!1Rck!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0d02d8df-5912-44e0-a2d5-ed17a1ae6a9c_800x600.png 848w, https://substackcdn.com/image/fetch/$s_!1Rck!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0d02d8df-5912-44e0-a2d5-ed17a1ae6a9c_800x600.png 1272w, https://substackcdn.com/image/fetch/$s_!1Rck!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0d02d8df-5912-44e0-a2d5-ed17a1ae6a9c_800x600.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Source: U.S. Bureau of Labor Statistics</figcaption></figure></div><p>Cybersecurity is an exciting, future-proof career field, which offers a lot of opportunities. The BLS states, &#8220;Employment of information security analysts is projected to grow 31 percent from 2019 to 2029, much faster than the average for all occupations.&#8221; That&#8217;s at least a solid decade of cybersecurity job growth ahead of us.</p><blockquote><p>In the US, the <em>individual</em> median information security analyst earned <strong>51% more</strong> than the <em>entire</em> median household in 2020!</p></blockquote><p>But we know it can be daunting to try something new. This is especially true for career changers. However, the economic security, which the field offers, may be tempting enough to get you to make the leap. Go ahead and take a bet on yourself!</p><h3>Recommended Posts:</h3><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:35371784,&quot;url&quot;:&quot;https://www.becomingcyber.com/p/life-is-short-take-a-chance-and-bet&quot;,&quot;publication_id&quot;:273635,&quot;publication_name&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;publication_logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/1c26a730-e390-4d92-b761-edec5555b41d_500x500.png&quot;,&quot;title&quot;:&quot;Life is Short, Take a Chance and Bet on Yourself&quot;,&quot;truncated_body_text&quot;:&quot;By one estimate the average American will spend 109,980 hours at work in their lifetime. That&#8217;s one third of your life.This is a number that I think about, when I hear people talking themselves out of pursuing new opportunities. Not that we should all quit our careers and pursue passion projects, like opening a pottery center. (Admittedly, that&#8217;s pretty&#8230;&quot;,&quot;date&quot;:&quot;2021-04-23T12:30:59.307Z&quot;,&quot;like_count&quot;:0,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:870380,&quot;name&quot;:&quot;Anonymous&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/3f55ce8d-abfa-42dd-999e-08b26b570f15_4160x4160.jpeg&quot;,&quot;bio&quot;:&quot;A cybersecurity leader in incognito mode.&quot;,&quot;profile_set_up_at&quot;:&quot;2021-07-17T12:40:36.606Z&quot;,&quot;tos_accepted_at&quot;:&quot;2018-09-10T01:55:01.893Z&quot;,&quot;is_guest&quot;:false}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:null,&quot;language&quot;:&quot;en&quot;,&quot;source&quot;:null}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://www.becomingcyber.com/p/life-is-short-take-a-chance-and-bet?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!OnHX!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1c26a730-e390-4d92-b761-edec5555b41d_500x500.png" loading="lazy"><span class="embedded-post-publication-name">Becoming Cyber Newsletter</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">Life is Short, Take a Chance and Bet on Yourself</div></div><div class="embedded-post-body">By one estimate the average American will spend 109,980 hours at work in their lifetime. That&#8217;s one third of your life.This is a number that I think about, when I hear people talking themselves out of pursuing new opportunities. Not that we should all quit our careers and pursue passion projects, like opening a pottery center. (Admittedly, that&#8217;s pretty&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">5 years ago &#183; Anonymous</div></a></div><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:39214184,&quot;url&quot;:&quot;https://www.becomingcyber.com/p/your-first-cybersecurity-job-may&quot;,&quot;publication_id&quot;:273635,&quot;publication_name&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;publication_logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/1c26a730-e390-4d92-b761-edec5555b41d_500x500.png&quot;,&quot;title&quot;:&quot;Your First Cybersecurity Job May Be Closer Than You Think&quot;,&quot;truncated_body_text&quot;:&quot;Finding your first cybersecurity job is challenging, even after the certifications and the networking. For many people an opportunity exists a little closer to home. You can find opportunities to transition to a cybersecurity role at your current employer. That first cybersecurity role is always going to involve someone taking a chance on you. However, &#8230;&quot;,&quot;date&quot;:&quot;2021-07-27T12:30:07.567Z&quot;,&quot;like_count&quot;:0,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:870380,&quot;name&quot;:&quot;Anonymous&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/3f55ce8d-abfa-42dd-999e-08b26b570f15_4160x4160.jpeg&quot;,&quot;bio&quot;:&quot;A cybersecurity leader in incognito mode.&quot;,&quot;profile_set_up_at&quot;:&quot;2021-07-17T12:40:36.606Z&quot;,&quot;tos_accepted_at&quot;:&quot;2018-09-10T01:55:01.893Z&quot;,&quot;is_guest&quot;:false}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:null,&quot;language&quot;:&quot;en&quot;,&quot;source&quot;:null}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://www.becomingcyber.com/p/your-first-cybersecurity-job-may?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!OnHX!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1c26a730-e390-4d92-b761-edec5555b41d_500x500.png" loading="lazy"><span class="embedded-post-publication-name">Becoming Cyber Newsletter</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">Your First Cybersecurity Job May Be Closer Than You Think</div></div><div class="embedded-post-body">Finding your first cybersecurity job is challenging, even after the certifications and the networking. For many people an opportunity exists a little closer to home. You can find opportunities to transition to a cybersecurity role at your current employer. That first cybersecurity role is always going to involve someone taking a chance on you. However, &#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">5 years ago &#183; Anonymous</div></a></div>]]></content:encoded></item><item><title><![CDATA[How To Find Your Cybersecurity Passion]]></title><description><![CDATA[Cybersecurity is an exciting career field with a diversity of roles. Ethical hackers may come to mind for a lot of people. But there&#8217;s so much more to cybersecurity. How can you find the role that you&#8217;ll be passionate about? There are some good resources to help you find a target role to begin your cybersecurity career, which suit your interests and skill sets.]]></description><link>https://www.becomingcyber.com/p/how-to-find-your-cybersecurity-passion</link><guid isPermaLink="false">https://www.becomingcyber.com/p/how-to-find-your-cybersecurity-passion</guid><dc:creator><![CDATA[Oritse J. Uku]]></dc:creator><pubDate>Tue, 17 Aug 2021 12:30:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Ey1m!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F207088f0-7d1d-4472-928b-6cb01846e667_1000x773.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Ey1m!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F207088f0-7d1d-4472-928b-6cb01846e667_1000x773.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Ey1m!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F207088f0-7d1d-4472-928b-6cb01846e667_1000x773.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Ey1m!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F207088f0-7d1d-4472-928b-6cb01846e667_1000x773.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Ey1m!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F207088f0-7d1d-4472-928b-6cb01846e667_1000x773.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Ey1m!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F207088f0-7d1d-4472-928b-6cb01846e667_1000x773.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Ey1m!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F207088f0-7d1d-4472-928b-6cb01846e667_1000x773.jpeg" width="1000" height="773" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/207088f0-7d1d-4472-928b-6cb01846e667_1000x773.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:773,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;MacBook on woman's lap&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="MacBook on woman's lap" title="MacBook on woman's lap" srcset="https://substackcdn.com/image/fetch/$s_!Ey1m!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F207088f0-7d1d-4472-928b-6cb01846e667_1000x773.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Ey1m!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F207088f0-7d1d-4472-928b-6cb01846e667_1000x773.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Ey1m!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F207088f0-7d1d-4472-928b-6cb01846e667_1000x773.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Ey1m!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F207088f0-7d1d-4472-928b-6cb01846e667_1000x773.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@mimithian?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText">Mimi Thian</a> on <a href="https://unsplash.com/s/photos/woman-computer?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText">Unsplash</a></figcaption></figure></div><p>Cybersecurity is an exciting career field with a diversity of roles. Ethical hackers may come to mind for a lot of people. But there&#8217;s so much more to cybersecurity. How can you find the role that you&#8217;ll be passionate about? There are some good resources to help you find a target role to begin your cybersecurity career, which suit your interests and skill sets.&nbsp;</p><h3><strong>Learn By Viewing</strong></h3><p>YouTube is a great resource for learning about cybersecurity careers. You can find some articulate, experienced and passionate professionals to explain all the different types of cybersecurity jobs.</p><p>Dr. Gerald Auger&#8217;s <a href="https://youtu.be/iW5UitULXLY">YouTube video</a>, <em>5 Entry Level Cyber Jobs You Need to Know About</em>, is a reliable resource. Dr. Auger lays out common job duties, required soft skills, job growth, and median salary for each of these roles. He also explains the downside of each role, which is surprisingly helpful. After all, when trying to decide which role suits you, it is generally helpful to determine early which roles don&#8217;t suit you.</p><p>The roles which Dr. Auger discusses are:</p><ul><li><p>Cyber Defense Incident Responder</p></li><li><p>Cyber Forensics Expert</p></li><li><p>Cyber Security Engineers</p></li><li><p>Cyber Operator</p></li><li><p>Vulnerability Assessment Analyst</p></li></ul><p>There are certainly more cybersecurity roles, but these are good building blocks for your understanding of entry-level roles. Search <em>&#8220;entry level cybersecurity jobs&#8221;</em> in YouTube and you&#8217;ll find a variety of other videos vying to explain the various roles and responsibilities in cybersecurity.</p><h3><strong>Learn By Doing</strong></h3><p>After you get a basic understanding of entry-level cybersecurity roles, one or two may jump out as a good fit for you. Obviously, you don&#8217;t want to pursue a cybersecurity role simply based on having watched a couple of videos. You want to get a better feel for whether this role is really what you want. Do you find it intriguing and fulfilling?</p><p>Cybrary&#8217;s online <a href="https://app.cybrary.it/browse/refined?view=careerPath">Career Paths</a> training will be quite useful. It&#8217;s a low commitment way to get exposure to and hands-on experience in cybersecurity roles of interest. The Career Paths training include:</p><ul><li><p>Become a SOC Analyst 1</p></li><li><p>Become a Systems Administrator</p></li><li><p>Become a Cyber Security Engineer</p></li><li><p>Become a Penetration Tester</p></li><li><p>Become an Incident Handler</p></li><li><p>Become an Azure Cloud Engineer</p></li></ul><p>As you start down a Career Path, if it excites and motivates you to keep learning, then you&#8217;re likely on the right path. If it is not what you expected and you're not feeling it, at least you determined that early on. You can back up and try something different. Learning by doing is a valuable way to test your cybersecurity interests.</p><h3><strong>What Next</strong></h3><p>Your cybersecurity career will undoubtedly have many twists and turns. You may be quite surprised by what you end up doing ten years from now. But as you seek to find your way into the career field, it&#8217;s helpful to find something you&#8217;re passionate about. It gives you something to aspire to. Starting your cybersecurity career journey with a goal, based on your interests and aptitude, will provide you with a target to aim for.</p><h3>Recommended Posts</h3><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:36772812,&quot;url&quot;:&quot;https://www.becomingcyber.com/p/this-uncommon-cybersecurity-skill&quot;,&quot;publication_id&quot;:273635,&quot;publication_name&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;publication_logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/1c26a730-e390-4d92-b761-edec5555b41d_500x500.png&quot;,&quot;title&quot;:&quot;This Uncommon Cybersecurity Skill Can Help Propel Your Career&quot;,&quot;truncated_body_text&quot;:&quot;Cybersecurity is a career field full of smart people with a wide variety of deeply technical skills. It can be intimidating for career changers. There is a key skill that you can bring to cybersecurity, which will help set you apart from your peers. It&#8217;s a skill that some of the most experienced and technical cybersecurity professionals don&#8217;t have. That&#8230;&quot;,&quot;date&quot;:&quot;2021-05-25T12:30:21.174Z&quot;,&quot;like_count&quot;:0,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:870380,&quot;name&quot;:&quot;Anonymous&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/3f55ce8d-abfa-42dd-999e-08b26b570f15_4160x4160.jpeg&quot;,&quot;bio&quot;:&quot;A cybersecurity leader in incognito mode.&quot;,&quot;profile_set_up_at&quot;:&quot;2021-07-17T12:40:36.606Z&quot;,&quot;tos_accepted_at&quot;:&quot;2018-09-10T01:55:01.893Z&quot;,&quot;is_guest&quot;:false}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:null,&quot;language&quot;:&quot;en&quot;,&quot;source&quot;:null}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://www.becomingcyber.com/p/this-uncommon-cybersecurity-skill?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!OnHX!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1c26a730-e390-4d92-b761-edec5555b41d_500x500.png" loading="lazy"><span class="embedded-post-publication-name">Becoming Cyber Newsletter</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">This Uncommon Cybersecurity Skill Can Help Propel Your Career</div></div><div class="embedded-post-body">Cybersecurity is a career field full of smart people with a wide variety of deeply technical skills. It can be intimidating for career changers. There is a key skill that you can bring to cybersecurity, which will help set you apart from your peers. It&#8217;s a skill that some of the most experienced and technical cybersecurity professionals don&#8217;t have. That&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">5 years ago &#183; Anonymous</div></a></div><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:36284355,&quot;url&quot;:&quot;https://www.becomingcyber.com/p/get-your-foot-in-the-door-find-the&quot;,&quot;publication_id&quot;:273635,&quot;publication_name&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;publication_logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/1c26a730-e390-4d92-b761-edec5555b41d_500x500.png&quot;,&quot;title&quot;:&quot;Get Your Foot in the Door, Find the Low Hanging Fruit&quot;,&quot;truncated_body_text&quot;:&quot;Plenty of career changers pivot toward cybersecurity with great ambitions. They have goals to quickly become managers, then executives, then CISOs. Maybe they seek to become world-class penetration testers or forensic investigators. The ambition is laudable. However, these goals are dependent on landing that&#8212;often elusive&#8212;first cybersecurity job.&quot;,&quot;date&quot;:&quot;2021-05-11T12:30:08.843Z&quot;,&quot;like_count&quot;:0,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:870380,&quot;name&quot;:&quot;Anonymous&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/3f55ce8d-abfa-42dd-999e-08b26b570f15_4160x4160.jpeg&quot;,&quot;bio&quot;:&quot;A cybersecurity leader in incognito mode.&quot;,&quot;profile_set_up_at&quot;:&quot;2021-07-17T12:40:36.606Z&quot;,&quot;tos_accepted_at&quot;:&quot;2018-09-10T01:55:01.893Z&quot;,&quot;is_guest&quot;:false}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:null,&quot;language&quot;:&quot;en&quot;,&quot;source&quot;:null}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://www.becomingcyber.com/p/get-your-foot-in-the-door-find-the?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!OnHX!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1c26a730-e390-4d92-b761-edec5555b41d_500x500.png" loading="lazy"><span class="embedded-post-publication-name">Becoming Cyber Newsletter</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">Get Your Foot in the Door, Find the Low Hanging Fruit</div></div><div class="embedded-post-body">Plenty of career changers pivot toward cybersecurity with great ambitions. They have goals to quickly become managers, then executives, then CISOs. Maybe they seek to become world-class penetration testers or forensic investigators. The ambition is laudable. However, these goals are dependent on landing that&#8212;often elusive&#8212;first cybersecurity job&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">5 years ago &#183; Anonymous</div></a></div>]]></content:encoded></item><item><title><![CDATA[Should You Get a LinkedIn Premium Account?]]></title><description><![CDATA[If you&#8217;ve spent any time on LinkedIn, you&#8217;ve undoubtedly seen people with little golden LinkedIn logos on their profiles. Those are people with LinkedIn Premium accounts. Sure they may look cool, but are LinkedIn Premium accounts worth the money for aspiring cybersecurity professionals?]]></description><link>https://www.becomingcyber.com/p/should-you-get-a-linkedin-premium</link><guid isPermaLink="false">https://www.becomingcyber.com/p/should-you-get-a-linkedin-premium</guid><dc:creator><![CDATA[Oritse J. Uku]]></dc:creator><pubDate>Fri, 13 Aug 2021 12:30:39 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!9cg6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8600987-4096-43db-925d-ffc61dd3a751_1000x667.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!9cg6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8600987-4096-43db-925d-ffc61dd3a751_1000x667.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!9cg6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8600987-4096-43db-925d-ffc61dd3a751_1000x667.jpeg 424w, https://substackcdn.com/image/fetch/$s_!9cg6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8600987-4096-43db-925d-ffc61dd3a751_1000x667.jpeg 848w, https://substackcdn.com/image/fetch/$s_!9cg6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8600987-4096-43db-925d-ffc61dd3a751_1000x667.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!9cg6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8600987-4096-43db-925d-ffc61dd3a751_1000x667.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!9cg6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8600987-4096-43db-925d-ffc61dd3a751_1000x667.jpeg" width="1000" height="667" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/c8600987-4096-43db-925d-ffc61dd3a751_1000x667.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:667,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;text on black background&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="text on black background" title="text on black background" srcset="https://substackcdn.com/image/fetch/$s_!9cg6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8600987-4096-43db-925d-ffc61dd3a751_1000x667.jpeg 424w, https://substackcdn.com/image/fetch/$s_!9cg6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8600987-4096-43db-925d-ffc61dd3a751_1000x667.jpeg 848w, https://substackcdn.com/image/fetch/$s_!9cg6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8600987-4096-43db-925d-ffc61dd3a751_1000x667.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!9cg6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8600987-4096-43db-925d-ffc61dd3a751_1000x667.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@gregbulla?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText">Greg Bulla</a> on <a href="https://unsplash.com/s/photos/linkedin?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText">Unsplash</a></figcaption></figure></div><p>If you&#8217;ve spent any time on LinkedIn, you&#8217;ve undoubtedly seen people with little golden LinkedIn logos on their profiles. Those are people with <a href="https://premium.linkedin.com/">LinkedIn Premium</a> accounts. Sure they may look cool, but are LinkedIn Premium accounts worth the money for aspiring cybersecurity professionals?</p><p>LinkedIn already offers a lot of resources with basic accounts for free. When considering paying for a premium account, it&#8217;s important to recognize what you&#8217;re trying to achieve. Then you can weigh the cost and benefits.</p><p>Networking is a key function in discovering opportunities for your first cybersecurity job. Basic LinkedIn resources are generally adequate. However, a LinkedIn Premium account will provide you with benefits which are largely worth the cost.</p><h3><strong>LinkedIn Premium Costs</strong></h3><p>There are <a href="https://www.linkedin.com/help/linkedin/answer/71/linkedin-free-accounts-and-premium-subscriptions">four types</a> of LinkedIn Premium subscriptions. Fortunately, the subscription intended for job hunters&#8212;Premium Career&#8212;is the most affordable of them. In the United States the Premium Career subscription will run you $29.99 per month. Admittedly, that&#8217;s not cheap, but is half the price of the next most inexpensive subscription, Premium Business.</p><blockquote><p>When considering paying for a premium account, it&#8217;s important to recognize what you&#8217;re trying to achieve.</p></blockquote><p>LinkedIn offers a complimentary month, so that monthly Premium Career subscription can be a good way to get a feel for LinkedIn Premium and determine if it's worth the cost for you. You can save 33% by paying annually, but you can switch to annual payment at any given time. The monthly subscription is therefore still a good place to start.</p><h3><strong>Benefits of LinkedIn Premium Career</strong></h3><p><a href="https://www.becomingcyber.com/p/how-to-use-linkedin-to-build-your">Networking</a> and building relationships among cybersecurity professionals is vital to your transition to a cybersecurity career. By definition this involves reaching out to people you don&#8217;t know. It leaves you with the question of how to contact people you don&#8217;t know on LinkedIn? After all, the platform put restrictions on that for basic accounts.</p><blockquote><p>Networking is a key function in discovering opportunities for your first cybersecurity job.</p></blockquote><p>Some people opt to simply send connection requests to strangers hoping they&#8217;ll be accepted. There&#8217;s certainly a population of people, who will accept any connection request sent their way. For many people though, it&#8217;s considered poor etiquette.</p><p>LinkedIn Premium allows you to use InMail to message people outside of your network. This is huge, because it allows you to intentionally engage with people outside of your personal network. A thoughtfully written message is preferred to a random LinkedIn connection request. If you do it right, today&#8217;s LinkedIn message will be tomorrow&#8217;s LinkedIn connection.</p><p>Additional benefits to the Premium Career subscription are Job Insights to LinkedIn job posts, interview preparation, access to LinkedIn Learning courses, a Resume Builder, and greater transparency on who&#8217;s viewed your profile in the last 90 days. These are all bonuses. The ability to message people outside of your network will be the single greatest benefit for aspiring cybersecurity professionals building their networks in the community. It can have tangible benefits for aspiring professionals.</p><ul><li><p>LinkedIn offers <a href="https://socialimpact.linkedin.com/programs/veterans/premiumform">U.S. service members and veterans</a> a free 1-year Premium Career subscription in collaboration with ID.me.</p></li></ul><h3><strong>Way Forward</strong></h3><p>Networking is an important part of finding your first cybersecurity job and LinkedIn is the premier social media site upon which to do so. You can certainly network using a basic LinkedIn account. This may be adequate, if your network includes a number of people already working in cybersecurity. Otherwise, a LinkedIn Premium Career account can be a good, near-term investment to start making cybersecurity connections outside of your network. Step up your online networking to help find your first cybersecurity job.</p><h3>Recommended Posts:</h3><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:32475667,&quot;url&quot;:&quot;https://www.becomingcyber.com/p/expanding-your-cyber-network-on-linkedin&quot;,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;publication_logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/1c26a730-e390-4d92-b761-edec5555b41d_500x500.png&quot;,&quot;title&quot;:&quot;Expanding Your Cyber Network on LinkedIn Improves Your Job Search&quot;,&quot;truncated_body_text&quot;:&quot;LinkedIn is an important professional social network, which is valuable to your cybersecurity job search. This builds up the Build Your Network phase of our six-phase Roadmap to a Cybersecurity Career. Connecting with fellow cybersecurity aspirants, industry professionals, and cybersecurity mentors expands your likelihood of learning about open cybersec&#8230;&quot;,&quot;date&quot;:&quot;2021-02-19T13:31:00.169Z&quot;,&quot;like_count&quot;:0,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:870380,&quot;name&quot;:&quot;Anonymous&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/3f55ce8d-abfa-42dd-999e-08b26b570f15_4160x4160.jpeg&quot;,&quot;bio&quot;:&quot;A cybersecurity leader in incognito mode.&quot;,&quot;profile_set_up_at&quot;:&quot;2021-07-17T12:40:36.606Z&quot;,&quot;tos_accepted_at&quot;:&quot;2018-09-10T01:55:01.893Z&quot;,&quot;is_guest&quot;:false}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:null,&quot;language&quot;:&quot;en&quot;,&quot;source&quot;:null}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://www.becomingcyber.com/p/expanding-your-cyber-network-on-linkedin?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!OnHX!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1c26a730-e390-4d92-b761-edec5555b41d_500x500.png" loading="lazy"><span class="embedded-post-publication-name">Becoming Cyber Newsletter</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">Expanding Your Cyber Network on LinkedIn Improves Your Job Search</div></div><div class="embedded-post-body">LinkedIn is an important professional social network, which is valuable to your cybersecurity job search. This builds up the Build Your Network phase of our six-phase Roadmap to a Cybersecurity Career. Connecting with fellow cybersecurity aspirants, industry professionals, and cybersecurity mentors expands your likelihood of learning about open cybersec&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">5 years ago &#183; Anonymous</div></a></div><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:36023059,&quot;url&quot;:&quot;https://www.becomingcyber.com/p/follow-cybersecurity-leaders-on-linkedin&quot;,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;publication_logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/1c26a730-e390-4d92-b761-edec5555b41d_500x500.png&quot;,&quot;title&quot;:&quot;Follow Cybersecurity Leaders on LinkedIn&quot;,&quot;truncated_body_text&quot;:&quot;Social media offers a great opportunity for aspiring cybersecurity professionals. It provides a chance for you to learn from cybersecurity leaders, who you don&#8217;t personally know. On LinkedIn&#8212;the social media platform of professionals&#8212;you can &#8220;follow&#8221; people, who you don&#8217;t know, which is huge!&quot;,&quot;date&quot;:&quot;2021-05-04T12:30:52.346Z&quot;,&quot;like_count&quot;:0,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:870380,&quot;name&quot;:&quot;Anonymous&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/3f55ce8d-abfa-42dd-999e-08b26b570f15_4160x4160.jpeg&quot;,&quot;bio&quot;:&quot;A cybersecurity leader in incognito mode.&quot;,&quot;profile_set_up_at&quot;:&quot;2021-07-17T12:40:36.606Z&quot;,&quot;tos_accepted_at&quot;:&quot;2018-09-10T01:55:01.893Z&quot;,&quot;is_guest&quot;:false}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:null,&quot;language&quot;:&quot;en&quot;,&quot;source&quot;:null}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://www.becomingcyber.com/p/follow-cybersecurity-leaders-on-linkedin?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!OnHX!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1c26a730-e390-4d92-b761-edec5555b41d_500x500.png" loading="lazy"><span class="embedded-post-publication-name">Becoming Cyber Newsletter</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">Follow Cybersecurity Leaders on LinkedIn</div></div><div class="embedded-post-body">Social media offers a great opportunity for aspiring cybersecurity professionals. It provides a chance for you to learn from cybersecurity leaders, who you don&#8217;t personally know. On LinkedIn&#8212;the social media platform of professionals&#8212;you can &#8220;follow&#8221; people, who you don&#8217;t know, which is huge&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">5 years ago &#183; Anonymous</div></a></div>]]></content:encoded></item><item><title><![CDATA[Future Trends: Operational Technology (OT) Security]]></title><description><![CDATA[While most cybersecurity programs focus on IT security, there is a real need for cybersecurity professionals in OT security. It can be an advantageous specialty for career changers, who have prior experience with OT systems, or people who just appreciate the tangibleness of OT. If you can develop the skills, you&#8217;ll undoubtedly find ready demand for them.]]></description><link>https://www.becomingcyber.com/p/future-trends-operational-technology</link><guid isPermaLink="false">https://www.becomingcyber.com/p/future-trends-operational-technology</guid><dc:creator><![CDATA[Oritse J. Uku]]></dc:creator><pubDate>Tue, 10 Aug 2021 12:31:23 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Yt8Y!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F562b91a4-6002-4b99-8f27-9708746f0574_1127x750.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Yt8Y!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F562b91a4-6002-4b99-8f27-9708746f0574_1127x750.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Yt8Y!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F562b91a4-6002-4b99-8f27-9708746f0574_1127x750.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Yt8Y!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F562b91a4-6002-4b99-8f27-9708746f0574_1127x750.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Yt8Y!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F562b91a4-6002-4b99-8f27-9708746f0574_1127x750.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Yt8Y!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F562b91a4-6002-4b99-8f27-9708746f0574_1127x750.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Yt8Y!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F562b91a4-6002-4b99-8f27-9708746f0574_1127x750.jpeg" width="1127" height="750" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/562b91a4-6002-4b99-8f27-9708746f0574_1127x750.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:750,&quot;width&quot;:1127,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;High Angle View of A Man&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="High Angle View of A Man" title="High Angle View of A Man" srcset="https://substackcdn.com/image/fetch/$s_!Yt8Y!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F562b91a4-6002-4b99-8f27-9708746f0574_1127x750.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Yt8Y!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F562b91a4-6002-4b99-8f27-9708746f0574_1127x750.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Yt8Y!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F562b91a4-6002-4b99-8f27-9708746f0574_1127x750.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Yt8Y!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F562b91a4-6002-4b99-8f27-9708746f0574_1127x750.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Much of cybersecurity is focused on protecting information technology (IT). You&#8217;re familiar with the staples of IT&#8230;. servers, desktops, network attached storage, etc. The at-risk infrastructure that gets less press is operational technology (OT). NIST <a href="https://csrc.nist.gov/glossary/term/operational_technology">defines</a> OT as &#8220;Programmable systems or devices that interact with the physical environment (or manage devices that interact with the physical environment).&#8221;</p><p>While IT operates in the world of data, OT operates in the physical world. It includes infrastructure like industrial control systems (ICS), building management systems, fire control systems, and physical access control mechanisms. Most people rarely think about these systems until they stop working. The <a href="https://www.zdnet.com/article/colonial-pipeline-ransomware-attack-everything-you-need-to-know/">Colonial Pipeline ransomware attack</a> is an excellent example.</p><p>While most cybersecurity programs focus on IT security, there is a real need for cybersecurity professionals in OT security. It can be an advantageous specialty for career changers, who have prior experience with OT systems, or people who just appreciate the tangibleness of OT. If you can develop the skills, you&#8217;ll undoubtedly find ready demand for them.</p><h3><strong>What Makes OT Different?</strong></h3><p>The casual observer may assume there&#8217;s not much difference between IT and OT. We&#8217;ve heard of medical <a href="https://fortune.com/2020/03/13/hospital-hacked-ransomware-medical-imaging-machine/">MRI machines</a> and <a href="https://mspoweruser.com/uks-nuclear-submarines-runs-windows-xp-submarines/">British nuclear submarines</a> operating on Windows XP. One could extrapolate that the OT world runs on Microsoft just like the IT world does. (Note: No one should be running Windows XP anymore.) That assumption, while understandable, is wrong.</p><p>Instead OT deals with software the most people would be unfamiliar with, like Siemen&#8217;s WinCC RT Professional, Schneider Electric&#8217;s Wonderware, or Inductive Automation&#8217;s Ignition. OT systems are traditionally isolated and self-contained. Designed to run autonomously. OT devices are however being put on the internet at a rapid pace.</p><p>While this allows a limited technical staff to maintain a lot of infrastructure, it also opens up organizations to a world of bad actors. <a href="https://www.wired.com/story/russia-gru-hackers-us-grid/">Russian state actors</a> have attacked the US power grid and other critical infrastructure for years.</p><h3><strong>Career Opportunities</strong></h3><p>Operational technology represents a suite of tools that most people have no experience with. This provides an opportunity to anyone with prior experience with OT or simply motivation. But how do you get OT security experience? Fortunately, some notable cybersecurity organizations offer both training and certification.</p><blockquote><p>The casual observer may assume there&#8217;s not much difference between IT and OT&#8230; That assumption, while understandable, is wrong.</p></blockquote><p>(ISC)2 offers the course, <a href="https://www.isc2.org/Development/Immersive-Courses/Exploring-Cybersecurity-in-Industrial-Control-Systems">Exploring Cybersecurity in Industrial Control Systems</a>. This course explores the fundamental concepts around security concerns within industrial control systems (ICS) helping you understand how ICS supports critical infrastructure and the global need for ICS security, as it proliferates in various industries. It is an affordable introduction to anyone exploring OT security.</p><p>EC-Council offers a <a href="https://www.eccouncil.org/programs/ics-scada-cybersecurity/">ICS/SCADA Cybersecurity program</a>. This is a relatively affordable training and certification option. However, you must have at least one year of information security experience to be eligible for the program.</p><p>SANS Institute&#8217;s <a href="https://www.sans.org/cyber-security-courses/ics-scada-cyber-security-essentials">ICS410: ICS/SCADA Security Essentials</a> course provides a foundational set of standardized skills and knowledge for industrial cybersecurity professionals. Certifications from SANS Institute&#8217;s sister organization GIAC continually represents the gold standard for technical cybersecurity certification. ICS410&#8217;s accompanying certification, <a href="https://www.giac.org/certification/global-industrial-cyber-security-professional-gicsp">Global Industrial Cyber Security Professional (GICSP)</a>, will certainly help an aspiring OT security professional to stand out.</p><h3><strong>What Next?</strong></h3><p>OT security isn&#8217;t for everybody, but it represents a vitally important niche of cybersecurity. Much of a nation&#8217;s critical infrastructure would be considered operational technology. If you&#8217;re curious whether OT security is right for you, check out a few introductory videos on YouTube. If you&#8217;re still interested after that, explore your training options. There will undoubtedly be no shortage of demand for this cybersecurity niche.</p><h4>Recommended Posts:</h4><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:37750363,&quot;url&quot;:&quot;https://www.becomingcyber.com/p/future-trends-iot-security&quot;,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;publication_logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/1c26a730-e390-4d92-b761-edec5555b41d_500x500.png&quot;,&quot;title&quot;:&quot;Future Trends: IoT Security&quot;,&quot;truncated_body_text&quot;:&quot;Future Trends As cyberpunk author William Gibson once said, &#8220;The future is already here &#8211; it's just not evenly distributed.&#8221; We continue to explore Future Trends, which are already seeded and growing today. Technology, which drives people&#8217;s lives, businesses, and governments, will alway need to be protected and secured.&quot;,&quot;date&quot;:&quot;2021-06-25T12:30:19.055Z&quot;,&quot;like_count&quot;:0,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:870380,&quot;name&quot;:&quot;Anonymous&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/3f55ce8d-abfa-42dd-999e-08b26b570f15_4160x4160.jpeg&quot;,&quot;bio&quot;:&quot;A cybersecurity leader in incognito mode.&quot;,&quot;profile_set_up_at&quot;:&quot;2021-07-17T12:40:36.606Z&quot;,&quot;tos_accepted_at&quot;:&quot;2018-09-10T01:55:01.893Z&quot;}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:null,&quot;language&quot;:&quot;en&quot;,&quot;source&quot;:null}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://www.becomingcyber.com/p/future-trends-iot-security?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!OnHX!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1c26a730-e390-4d92-b761-edec5555b41d_500x500.png" loading="lazy"><span class="embedded-post-publication-name">Becoming Cyber Newsletter</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">Future Trends: IoT Security</div></div><div class="embedded-post-body">Future Trends As cyberpunk author William Gibson once said, &#8220;The future is already here &#8211; it's just not evenly distributed.&#8221; We continue to explore Future Trends, which are already seeded and growing today. Technology, which drives people&#8217;s lives, businesses, and governments, will alway need to be protected and secured&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">5 years ago &#183; Anonymous</div></a></div><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:37616624,&quot;url&quot;:&quot;https://www.becomingcyber.com/p/future-trends-cloud-security&quot;,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;publication_logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/1c26a730-e390-4d92-b761-edec5555b41d_500x500.png&quot;,&quot;title&quot;:&quot;Future Trends: Cloud Security&quot;,&quot;truncated_body_text&quot;:&quot;Future Trends We may not be able to predict the future, but we can certainly foresee the technological trends which will impact it. Any technology, which businesses and governments use to evolve and grow, is going to need securing and defending. Future Trends in technology therefore drive future needs for cybersecurity professionals.&quot;,&quot;date&quot;:&quot;2021-06-18T12:30:03.001Z&quot;,&quot;like_count&quot;:0,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:870380,&quot;name&quot;:&quot;Anonymous&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/3f55ce8d-abfa-42dd-999e-08b26b570f15_4160x4160.jpeg&quot;,&quot;bio&quot;:&quot;A cybersecurity leader in incognito mode.&quot;,&quot;profile_set_up_at&quot;:&quot;2021-07-17T12:40:36.606Z&quot;,&quot;tos_accepted_at&quot;:&quot;2018-09-10T01:55:01.893Z&quot;}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:null,&quot;language&quot;:&quot;en&quot;,&quot;source&quot;:null}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://www.becomingcyber.com/p/future-trends-cloud-security?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!OnHX!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1c26a730-e390-4d92-b761-edec5555b41d_500x500.png" loading="lazy"><span class="embedded-post-publication-name">Becoming Cyber Newsletter</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">Future Trends: Cloud Security</div></div><div class="embedded-post-body">Future Trends We may not be able to predict the future, but we can certainly foresee the technological trends which will impact it. Any technology, which businesses and governments use to evolve and grow, is going to need securing and defending. Future Trends in technology therefore drive future needs for cybersecurity professionals&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">5 years ago &#183; Anonymous</div></a></div>]]></content:encoded></item><item><title><![CDATA[When It Comes to Your Resume, Style Matters]]></title><description><![CDATA[A common mistake persists among aspiring cybersecurity professionals, when it comes to resume writing. Some continue to believe their resume&#8217;s content is the only thing that matters. It&#8217;s understandable.]]></description><link>https://www.becomingcyber.com/p/when-it-comes-to-your-resume-style</link><guid isPermaLink="false">https://www.becomingcyber.com/p/when-it-comes-to-your-resume-style</guid><dc:creator><![CDATA[Oritse J. Uku]]></dc:creator><pubDate>Fri, 06 Aug 2021 12:30:08 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!SrxQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5907d96-74a8-404b-82bb-f74f1201ab7d_1125x750.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!SrxQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5907d96-74a8-404b-82bb-f74f1201ab7d_1125x750.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!SrxQ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5907d96-74a8-404b-82bb-f74f1201ab7d_1125x750.jpeg 424w, https://substackcdn.com/image/fetch/$s_!SrxQ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5907d96-74a8-404b-82bb-f74f1201ab7d_1125x750.jpeg 848w, https://substackcdn.com/image/fetch/$s_!SrxQ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5907d96-74a8-404b-82bb-f74f1201ab7d_1125x750.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!SrxQ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5907d96-74a8-404b-82bb-f74f1201ab7d_1125x750.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!SrxQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5907d96-74a8-404b-82bb-f74f1201ab7d_1125x750.jpeg" width="1125" height="750" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/b5907d96-74a8-404b-82bb-f74f1201ab7d_1125x750.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:750,&quot;width&quot;:1125,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Multiethnic happy smiling women checking papers while speaking in comfortable conference hall in daytime&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Multiethnic happy smiling women checking papers while speaking in comfortable conference hall in daytime" title="Multiethnic happy smiling women checking papers while speaking in comfortable conference hall in daytime" srcset="https://substackcdn.com/image/fetch/$s_!SrxQ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5907d96-74a8-404b-82bb-f74f1201ab7d_1125x750.jpeg 424w, https://substackcdn.com/image/fetch/$s_!SrxQ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5907d96-74a8-404b-82bb-f74f1201ab7d_1125x750.jpeg 848w, https://substackcdn.com/image/fetch/$s_!SrxQ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5907d96-74a8-404b-82bb-f74f1201ab7d_1125x750.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!SrxQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5907d96-74a8-404b-82bb-f74f1201ab7d_1125x750.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by&nbsp;<strong><a href="https://www.pexels.com/@alexander-suhorucov?utm_content=attributionCopyText&amp;utm_medium=referral&amp;utm_source=pexels">Alexander Suhorucov</a></strong>&nbsp;from&nbsp;<strong><a href="https://www.pexels.com/photo/diverse-cheerful-colleagues-talking-about-important-documents-6457488/?utm_content=attributionCopyText&amp;utm_medium=referral&amp;utm_source=pexels">Pexels</a></strong></figcaption></figure></div><p>A common mistake persists among aspiring cybersecurity professionals, when it comes to resume writing. Some continue to believe their resume&#8217;s content is the only thing that matters. It&#8217;s understandable.</p><p>You spend so much time trying to develop the right resume bullets to capture all your relevant experience. With such limited space, it&#8217;s tempting to use it all. After you&#8217;ve spent hours writing and rewriting your resume, it is easy to expect that someone will dutifully read it all.</p><p>In reality style matters just as much as substance. A well designed resume is going to get more attention. It makes it easier for recruiters and hiring managers to find the information they&#8217;re looking for. Conversely a well written resume&#8212;which is hard on the eyes&#8212;will do you a disservice.</p><h3><strong>Myth That Someone Is &#8216;Reading&#8217; Your Resume</strong></h3><p>When people think of their resume being <em>read</em>, many have this image of someone sitting at a desk and reading their resume top-to-bottom like the latest suspense novel. Sounds cool, but that's fiction. No one is reading your resume top-to-bottom. You&#8217;re lucky if someone spends 30 seconds reviewing your resume.</p><p>What does a resume review really look like? One common scenario is that someone reviews your application directly in an Applicant Tracking System (ATS) or similar recruiting software. When this occurs, your application is literally a line item amongst the dozens or hundreds of applicants. The recruiter may view your resume within the ATS to determine which resumes to send to the hiring manager. The recruiter has plenty of applications to choose from. If she chose to view your resume, she won&#8217;t linger on it. The recruiter will make a decision and move on.</p><blockquote><p>You&#8217;re lucky if someone spends 30 seconds reviewing your resume.</p></blockquote><p>The second scenario is really a continuation of the first one. The hiring manager receives a batch of resumes&#8212;via email or through an HR software tool&#8212;from the recruiter to review. Even if the hiring manager spends more time reviewing it, your resume is being compared against the others resumes. (When was the last time you compared your resume to someone else&#8217;s?) The hiring manager is a busy person, so she makes a decision of who should be interviewed, informs the recruiter, then moves on with her day.</p><h3><strong>Purpose In Style&nbsp;</strong></h3><p>Writing and designing your resume thoughtfully so that it is readable and well-organized is important. Not just because it makes the document easier to read. Consider resume writing to be a demonstration of your ability to synthesize big concepts into a digestible, readable product.</p><p>When a candidate sends a three-page resume representing their six years of work experience, they&#8217;ve just demonstrated an inability to be concise. When a student drafts a single-space, densely packed resume that looks like a <em>wall of text</em>, they demonstrate an inability to be creative and engaging in their writing. When a career changer provides a resume full of work experience bullets that don&#8217;t actually say anything of substance, they demonstrate suboptimal deductive reasoning. These are all negative indicators.</p><blockquote><p>An attractive looking resume allows the reader to make positive inferences about your professionalism and attitude.</p></blockquote><p>Is it unfair to make conclusions about a candidate&#8217;s aptitude in brevity, creativity, or deductive reasoning, based on a one- to two-page resume? Maybe. But what else does the hiring manager have to go off of? Furthermore, some candidates will succeed in doing so.</p><h3><strong>Design Your Masterpiece</strong></h3><p>Your resume is about your experience and how you present it to the world. How to present your experience can certainly be daunting, especially when venturing into a new career field, like cybersecurity. You can&#8217;t control your past experience. (Given the luxury of 20-20 hindsight it&#8217;s easy to dwell on what you <em>should</em> have majored in school or what past jobs you <em>should</em> have taken.) You <em>do</em> control how you present that past and current experience.</p><p>Every candidate has the same canvas to work with in crafting their resumes. The most experienced candidates do not necessarily have the best looking resumes. The goal of your resume is to make a hiring manager say, <em>I want to talk to that candidate</em>.</p><p>A well designed resume allows the reader to easily find the relevant information to come to that conclusion. An attractive looking resume allows the reader to make positive inferences about your professionalism and attitude.</p><p>Even if you're not the best fit for the job you are applying for, they may refer you to another role. You have the same one- to two-pages to design your resume as everyone else. Be thoughtful about it. Go forth and design your resume masterpiece.</p><h4>Recommended Posts:</h4><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:38699486,&quot;url&quot;:&quot;https://www.becomingcyber.com/p/you-should-probably-have-more-than&quot;,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;publication_logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/1c26a730-e390-4d92-b761-edec5555b41d_500x500.png&quot;,&quot;title&quot;:&quot;You Should Probably Have More Than One Resume&#8230; Here&#8217;s Why&quot;,&quot;truncated_body_text&quot;:&quot;As you seek your first cybersecurity job you&#8217;re probably open to different types of roles in several industries. That&#8217;s okay. If you&#8217;re trying to apply to all of those positions with the same resume, you may write an increasingly bloated resume. That&#8217;s not okay.&quot;,&quot;date&quot;:&quot;2021-07-16T12:30:39.627Z&quot;,&quot;like_count&quot;:0,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:870380,&quot;name&quot;:&quot;Anonymous&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/3f55ce8d-abfa-42dd-999e-08b26b570f15_4160x4160.jpeg&quot;,&quot;bio&quot;:&quot;A cybersecurity leader in incognito mode.&quot;,&quot;profile_set_up_at&quot;:&quot;2021-07-17T12:40:36.606Z&quot;,&quot;tos_accepted_at&quot;:&quot;2018-09-10T01:55:01.893Z&quot;}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:null,&quot;language&quot;:&quot;en&quot;,&quot;source&quot;:null}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://www.becomingcyber.com/p/you-should-probably-have-more-than?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!OnHX!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1c26a730-e390-4d92-b761-edec5555b41d_500x500.png" loading="lazy"><span class="embedded-post-publication-name">Becoming Cyber Newsletter</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">You Should Probably Have More Than One Resume&#8230; Here&#8217;s Why</div></div><div class="embedded-post-body">As you seek your first cybersecurity job you&#8217;re probably open to different types of roles in several industries. That&#8217;s okay. If you&#8217;re trying to apply to all of those positions with the same resume, you may write an increasingly bloated resume. That&#8217;s not okay&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">5 years ago &#183; Anonymous</div></a></div><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:36947858,&quot;url&quot;:&quot;https://www.becomingcyber.com/p/the-best-way-to-get-your-resume-in&quot;,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;publication_logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/1c26a730-e390-4d92-b761-edec5555b41d_500x500.png&quot;,&quot;title&quot;:&quot;The Best Way to Get Your Resume in the Hands of a Hiring Manager&quot;,&quot;truncated_body_text&quot;:&quot;The average online job posting will receive up to 250 applications. As you can imagine no one is actually reading all 250 resumes. Instead each resume will be reviewed by an applicant tracking system (ATS). A recruiter will review the resumes, which passed the ATS review, then the recruiter sends the (perceived) most viable candidates to the hiring mana&#8230;&quot;,&quot;date&quot;:&quot;2021-06-01T12:30:14.822Z&quot;,&quot;like_count&quot;:0,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:870380,&quot;name&quot;:&quot;Anonymous&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/3f55ce8d-abfa-42dd-999e-08b26b570f15_4160x4160.jpeg&quot;,&quot;bio&quot;:&quot;A cybersecurity leader in incognito mode.&quot;,&quot;profile_set_up_at&quot;:&quot;2021-07-17T12:40:36.606Z&quot;,&quot;tos_accepted_at&quot;:&quot;2018-09-10T01:55:01.893Z&quot;}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:null,&quot;language&quot;:&quot;en&quot;,&quot;source&quot;:null}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://www.becomingcyber.com/p/the-best-way-to-get-your-resume-in?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!OnHX!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1c26a730-e390-4d92-b761-edec5555b41d_500x500.png" loading="lazy"><span class="embedded-post-publication-name">Becoming Cyber Newsletter</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">The Best Way to Get Your Resume in the Hands of a Hiring Manager</div></div><div class="embedded-post-body">The average online job posting will receive up to 250 applications. As you can imagine no one is actually reading all 250 resumes. Instead each resume will be reviewed by an applicant tracking system (ATS). A recruiter will review the resumes, which passed the ATS review, then the recruiter sends the (perceived) most viable candidates to the hiring mana&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">5 years ago &#183; Anonymous</div></a></div>]]></content:encoded></item><item><title><![CDATA[Why Cyber Security is Hard to Learn (Tips For Success!)]]></title><description><![CDATA[Great advice about learning cybersecurity from Cyberspatial! Do you prefer top-down, bottom-up, or project-based learning?]]></description><link>https://www.becomingcyber.com/p/why-cyber-security-is-hard-to-learn</link><guid isPermaLink="false">https://www.becomingcyber.com/p/why-cyber-security-is-hard-to-learn</guid><dc:creator><![CDATA[Oritse J. Uku]]></dc:creator><pubDate>Wed, 04 Aug 2021 18:20:10 GMT</pubDate><enclosure url="https://substackcdn.com/image/youtube/w_728,c_limit/vI79qT4lcfA" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Great advice about learning cybersecurity from <a href="https://cyberspatial.com/">Cyberspatial</a>! Do you prefer top-down, bottom-up, or project-based learning?</p><p></p><div id="youtube2-vI79qT4lcfA" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;vI79qT4lcfA&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/vI79qT4lcfA?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div>]]></content:encoded></item><item><title><![CDATA[Top Excuse Given for Students Not Getting This Valuable Cybersecurity Certification]]></title><description><![CDATA[For university students pursuing a cybersecurity career, a CompTIA Security+ certification is an excellent place to start.]]></description><link>https://www.becomingcyber.com/p/top-excuse-given-for-students-not</link><guid isPermaLink="false">https://www.becomingcyber.com/p/top-excuse-given-for-students-not</guid><dc:creator><![CDATA[Oritse J. Uku]]></dc:creator><pubDate>Tue, 03 Aug 2021 12:30:44 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Gf1m!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0e4ab1a2-9444-438c-8ffd-386da8495396_1125x750.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>For university students pursuing a cybersecurity career, a <a href="https://www.comptia.org/certifications/security">CompTIA Security+</a> certification is an excellent place to start. Students should really strive to pass the Security+, while they&#8217;re still in school. The certification will help candidates stand out from the pack, when applying for their first cybersecurity job. However relatively few students&#8212;undergraduate and graduate&#8212;will actually complete the Security+ while in school. The common excuse given is ironic: Time.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Gf1m!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0e4ab1a2-9444-438c-8ffd-386da8495396_1125x750.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Gf1m!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0e4ab1a2-9444-438c-8ffd-386da8495396_1125x750.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Gf1m!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0e4ab1a2-9444-438c-8ffd-386da8495396_1125x750.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Gf1m!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0e4ab1a2-9444-438c-8ffd-386da8495396_1125x750.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Gf1m!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0e4ab1a2-9444-438c-8ffd-386da8495396_1125x750.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Gf1m!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0e4ab1a2-9444-438c-8ffd-386da8495396_1125x750.jpeg" width="1125" height="750" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/0e4ab1a2-9444-438c-8ffd-386da8495396_1125x750.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:750,&quot;width&quot;:1125,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Man and Woman Sitting on Concrete Bench Using Laptop Computers&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Man and Woman Sitting on Concrete Bench Using Laptop Computers" title="Man and Woman Sitting on Concrete Bench Using Laptop Computers" srcset="https://substackcdn.com/image/fetch/$s_!Gf1m!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0e4ab1a2-9444-438c-8ffd-386da8495396_1125x750.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Gf1m!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0e4ab1a2-9444-438c-8ffd-386da8495396_1125x750.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Gf1m!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0e4ab1a2-9444-438c-8ffd-386da8495396_1125x750.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Gf1m!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0e4ab1a2-9444-438c-8ffd-386da8495396_1125x750.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by&nbsp;<strong><a href="https://www.pexels.com/@armin-rimoldi?utm_content=attributionCopyText&amp;utm_medium=referral&amp;utm_source=pexels">Armin Rimoldi</a></strong>&nbsp;from&nbsp;<strong><a href="https://www.pexels.com/photo/city-man-people-woman-5554289/?utm_content=attributionCopyText&amp;utm_medium=referral&amp;utm_source=pexels">Pexels</a></strong></figcaption></figure></div><h3><strong>Time Is Of The Essence</strong></h3><p>When it comes to landing their first cybersecurity jobs, students typically have a distinct advantage over career changers. Students have time on their side. Career changers are either working full-time (studying cybersecurity on nights and weekends) or they&#8217;re between jobs (trying to get a cybersecurity job before their savings and/or benefits run out).</p><p>Sure, days can be long for undergraduate students and longer for graduate students. However, with a <a href="https://www.isc2.org/-/media/ISC2/Research/2020/Workforce-Study/ISC2ResearchDrivenWhitepaperFINAL.ashx?la=en&amp;hash=2879EE167ACBA7100C330429C7EBC623BAF4E07B">global shortage</a> of 3.12 million cybersecurity professionals, rest assured that days are even longer for cybersecurity teams. The underlying question is, <em>How much do you really want to get into cybersecurity?</em></p><blockquote><p>If most students will opt not to pursue the Security+ certification, then those who do will stand out.</p></blockquote><p>Ask any cybersecurity professional and they&#8217;ll tell you stories about working 12 or 16 hour days, tales of working on holidays, or having to cancel personal plans at the last minute. That&#8217;s security work. By definition the schedule for cybersecurity is threat-driven. Despite this, cybersecurity professionals still prioritize and make the time to study, learn new skills, and earn new certifications. All this without the generous vacation schedule that students enjoy.</p><h3><strong>Why CompTIA Security+?</strong></h3><p>Students pursuing cybersecurity careers come from numerous fields of study. There&#8217;s no <em>one</em> path to a cybersecurity career though. That can make it difficult to stand out amongst all the applicants for entry-level positions. One needs to do just that to make it to the hiring manager for her to consider for potential interviews.</p><p>A CompTIA Security+ certification allows students to rise above their peers in the application process. Hiring managers have a reasonable understanding of the knowledge level they can expect from Security+ certification holders. If most students will opt not to pursue the Security+ certification, then those who do will stand out. This is advantageous for making it through early resume screening.</p><p>Certifications aren't just about having a pretty piece of paper with a seal and your name. It&#8217;s about the knowledge that you gain along the way. The knowledge that you gain while studying for the CompTIA Security+ will prepare you with the knowledge to excel during cybersecurity interviews (and on the job). Some interviewers may even skip interview questions regarding material covered in the certification exam all together.</p><h3><strong>Way Forward</strong></h3><p>I&#8217;ve advised plenty of students over the years to get their CompTIA Security+ while still in school. It&#8217;s additional work, but it&#8217;s a manageable amount of work and will contribute directly to their earning potential upon graduation. Most don&#8217;t do it. They give the excuse that they don&#8217;t have enough time.</p><p>Students can certainly land their first cybersecurity job without a Security+ certification. Having the certification&#8212;any cybersecurity certification, really&#8212;will simply increase your chances of being selected for interviews and help prepare them with requisite knowledge. Certifications provide recruiters a standardized measure to use in your favor during resume screening and provides hiring managers with an apples-to-apples measure, when selecting candidates to interview. (Hint: If two candidates have similar educational backgrounds and experience, or lack thereof, the candidate with a cybersecurity certification is more likely to get the interview.)</p><p>If you do get an interview without pursuing CompTIA Security+ or some other cybersecurity certification, whatever you do, don&#8217;t tell the interviewer that you were thinking about pursuing certification, but didn&#8217;t have the time. It won&#8217;t impress.</p><p>In 2016, a seventeen year old became the <a href="https://www.comptia.org/blog/meet-chase-lucas-comptia-security-certified-and-cybersecurity-bound-at-age-17">youngest person ever to pass</a> the CompTIA Security+. I have confidence that this is a manageable feat for ambitious university students pursuing cybersecurity careers.</p><h4>Recommended Posts:</h4><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:38121452,&quot;url&quot;:&quot;https://www.becomingcyber.com/p/do-cybersecurity-certifications-even&quot;,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;publication_logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/1c26a730-e390-4d92-b761-edec5555b41d_500x500.png&quot;,&quot;title&quot;:&quot;Do Cybersecurity Certifications Even Matter?&quot;,&quot;truncated_body_text&quot;:&quot;There&#8217;s a school of thought in cybersecurity&#8212;and in technology, in general&#8212;that certifications don&#8217;t matter. That experience is the only thing that matters. The thought goes that certification issuing organizations are just in the business of making money. Experience matters more than certifications and certifications are an ineffective measure of one&#8217;s&#8230;&quot;,&quot;date&quot;:&quot;2021-07-06T12:30:42.464Z&quot;,&quot;like_count&quot;:0,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:870380,&quot;name&quot;:&quot;Anonymous&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/3f55ce8d-abfa-42dd-999e-08b26b570f15_4160x4160.jpeg&quot;,&quot;bio&quot;:&quot;A cybersecurity leader in incognito mode.&quot;,&quot;profile_set_up_at&quot;:&quot;2021-07-17T12:40:36.606Z&quot;,&quot;tos_accepted_at&quot;:&quot;2018-09-10T01:55:01.893Z&quot;}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:null,&quot;language&quot;:&quot;en&quot;,&quot;source&quot;:null}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://www.becomingcyber.com/p/do-cybersecurity-certifications-even?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!OnHX!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1c26a730-e390-4d92-b761-edec5555b41d_500x500.png" loading="lazy"><span class="embedded-post-publication-name">Becoming Cyber Newsletter</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">Do Cybersecurity Certifications Even Matter?</div></div><div class="embedded-post-body">There&#8217;s a school of thought in cybersecurity&#8212;and in technology, in general&#8212;that certifications don&#8217;t matter. That experience is the only thing that matters. The thought goes that certification issuing organizations are just in the business of making money. Experience matters more than certifications and certifications are an ineffective measure of one&#8217;s&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">5 years ago &#183; Anonymous</div></a></div><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:32715639,&quot;url&quot;:&quot;https://www.becomingcyber.com/p/best-certifications-for-breaking&quot;,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Becoming Cyber Newsletter&quot;,&quot;publication_logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/1c26a730-e390-4d92-b761-edec5555b41d_500x500.png&quot;,&quot;title&quot;:&quot;Best Certifications for Breaking into Cybersecurity&quot;,&quot;truncated_body_text&quot;:&quot;Education has become increasingly democratized in recent years. There are a lot of paths available for your cybersecurity self-education: college/graduate school, bootcamps, online courses, YouTube videos, books, etc. This variety of learning pathways make the Credentialization phase of your&quot;,&quot;date&quot;:&quot;2021-02-22T13:30:48.781Z&quot;,&quot;like_count&quot;:0,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:870380,&quot;name&quot;:&quot;Anonymous&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/3f55ce8d-abfa-42dd-999e-08b26b570f15_4160x4160.jpeg&quot;,&quot;bio&quot;:&quot;A cybersecurity leader in incognito mode.&quot;,&quot;profile_set_up_at&quot;:&quot;2021-07-17T12:40:36.606Z&quot;,&quot;tos_accepted_at&quot;:&quot;2018-09-10T01:55:01.893Z&quot;}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:null,&quot;language&quot;:&quot;en&quot;,&quot;source&quot;:null}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://www.becomingcyber.com/p/best-certifications-for-breaking?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!OnHX!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1c26a730-e390-4d92-b761-edec5555b41d_500x500.png" loading="lazy"><span class="embedded-post-publication-name">Becoming Cyber Newsletter</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">Best Certifications for Breaking into Cybersecurity</div></div><div class="embedded-post-body">Education has become increasingly democratized in recent years. There are a lot of paths available for your cybersecurity self-education: college/graduate school, bootcamps, online courses, YouTube videos, books, etc. This variety of learning pathways make the Credentialization phase of your&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">5 years ago &#183; Anonymous</div></a></div>]]></content:encoded></item></channel></rss>