Guide to Cyber Security Careers By: Jon Good https://www.jongood.com Table of Contents Introduction .................................................................................................................................................. 3 Certifications ................................................................................................................................................. 4 Vendors ..................................................................................................................................................... 4 Education ...................................................................................................................................................... 6 Certifications vs Degrees............................................................................................................................... 7 Building a Home Lab ..................................................................................................................................... 7 Computer .................................................................................................................................................. 7 Desktop vs Laptop ................................................................................................................................. 7 Build vs Prebuilt .................................................................................................................................... 7 Components .......................................................................................................................................... 7 Virtualization Software ............................................................................................................................. 8 Soft Skills ....................................................................................................................................................... 9 Job Descriptions .......................................................................................................................................... 10 Blue Team (Defensive) ............................................................................................................................ 10 Red Team (Offensive).............................................................................................................................. 10 Career Roadmap ......................................................................................................................................... 11 Timeline................................................................................................................................................... 11 Additional Resources .................................................................................................................................. 14 Career Coaching ...................................................................................................................................... 14 News & Threat Intelligence..................................................................................................................... 14 Professional Associations ........................................................................................................................ 14 Training ................................................................................................................................................... 14 Final Thoughts ............................................................................................................................................. 15 Guide to Cyber Security Careers 2 https://www.jongood.com Introduction Hello and welcome to my FREE eBook, Guide to Cyber Security Careers. Navigating any career field, and in this case Cyber Security, can be particularly challenging for those who are either brand new to the industry or those starting to gain experience in the field. The challenge is not necessarily because there is always a lack of information available, but it is because there can be implied knowledge and usually the advice is not easily adjustable for situations different from the writer. With this eBook my goal is to provide a foundational way of objectively looking at the industry and ways that I approach career progression. This eBook will cover a variety of topics critical to the Cyber Security field to include: • Certifications (Microsoft, Cisco, GIAC, CompTIA…) • Education (college, vocational training, online training…) • Building a Home Lab • Soft Skills (communication, project planning…) • Job Descriptions (Blue Team and Red Team) • Career Roadmap • Final Wrap Up If you have any questions, send me a message on social media found on my website (https://www.jongood.com/). You should also consider signing up for the Cyber Training Pro platform (https://www.cybertrainingpro.com/) where you can get the training that you need and career services (i.e., career coaching, mock interviews, resume and cover letter reviews, etc.). Additionally Cyber Training Pro has a private community for students to interact with each other, CTP staff, and other industry professionals. Guide to Cyber Security Careers 3 https://www.jongood.com Certifications What is a certification for Cyber Security? Unlike professions such as Engineering, Accounting, and Medicine…Cyber Security does not have a Professional Certification or Professional License requirement to become employed in the industry. Instead, we have certifications for many different skills, and each can be beneficial given the right job. When it comes to the overall “value” of certifications for a Cyber Security career, I highly recommend learning about “The Cyber Security Career Continuum” (https://jongood.com/the-cyber-security-career-continuum/). I also encourage you to watch my video on Cyber Security certifications (https://jongood.com/topcyber-security-certifications-for-coolest-jobs-2023/) where I will walk you through the best options to help get you into a Cyber Security job. Below, I have also provided a short summary on the major certification providers including when you should consider looking at each. Remember, the hardest certification is not always the best or most valuable when it comes to getting a job. Suggested Resources: • • • CompTIA Roadmap: https://www.comptia.org/content/it-careers-path-roadmap/cybersecurityspecialist DoD 8410 Mandate: https://www.sans.org/dodd-8140/ Guide to Cyber Security Careers eBook (You are reading this now) Vendors CompTIA (https://www.comptia.org/): CompTIA is known as the entry level certification vendor of choice. They provide certifications on a variety of different skillsets from repair technician (A+) to networking (Network+), to security (Security+). The certifications from CompTIA are vendor neutral, meaning they focus on the concepts but not necessarily the technology. eLearnSecurity (https://www.elearnsecurity.com/): Primarily focused on penetration testing certifications, eLearnSecurity uses practical exams to make sure you can walk-the-walk and create a final report to show your findings. eLearnSecurity is less known when compared to other vendors but there is value to be had here. GIAC (https://www.giac.org/): GIAC has certifications covering just about anything you can think of such as reverse engineering, incident response, and penetration testing. These certifications are highly sought after, but without the SANS training, you should not even look at these. (See SANS) Guide to Cyber Security Careers 4 https://www.jongood.com ISACA (https://www.isaca.org/): ISACA focuses on global adoption for the audit, governance, risk, and privacy areas of Cyber Security. The CISA and CISM are two widely known certifications produced by ISACA, but all of these have an experience requirement more suited to 3+ years into your career. ISC2 (https://www.isc2.org/): ISC2 (ISC squared), is most known for their CISSP certification, which is the “gold standard” when it comes to Information Security & Cyber Security certifications. This vendor is not necessarily as useful for those trying to break into the field from zero knowledge because most of their certifications require at least a few years of experience. Do not get me wrong though, most if not everybody should be aiming for the CISSP later in their career. Offensive Security (https://www.offensive-security.com/): Offensive Security is known for their penetration testing certifications. There is an extensive lab environment, where you can break into simulated systems and hone your ethical hacking skills. The courses and exams are challenging but if you really want to be a penetration tester, you need to get at least the OSCP to have some real credibility. SANS (https://www.sans.org/): SANS offers the highest quality training available for Cyber Security. Typically, the best value comes from going to a physical conference to not only learn but also to network with highly motivated professionals and experts in the field. The course material is developed to prepare you for the GIAC certification exam, but do not kid yourself…these courses are quite expensive. I would not look at these until you have at least a few years of experience, or if your employer is willing to foot the bill. Security Blue Team (https://securityblue.team/): Security Blue Team is a newer certification vendor that launched their certification program in mid2020. The thing that differentiates this program is that the skills you will learn are specifically focused on security operations and therefore they are highly technical with hands-on skill development. Although these certifications are still relatively new, they are gaining traction quickly in the industry. Guide to Cyber Security Careers 5 https://www.jongood.com Education Within the last ten years, the amount of college and university Cyber Security programs offered has increased dramatically. Prior to that you typically had the option of getting a Computer Science degree or going straight for certifications. The National Security Agency (NSA) came up with a program several years ago called the National Centers of Academic Excellence (https://www.nsa.gov/resources/studentseducators/centers-academic-excellence/) to develop curriculum for Cyber Defense and Cyber Operations. I would highly encourage you to research these schools and be careful if you decide to go with somebody else. With degrees, you are basically going to find three different categories of programs: certification-based, technical, and non-technical. Certification-Based: The major players in this type of degree are Western Governors University (https://www.wgu.edu/) and SANS (https://www.sans.edu/). The general idea is that all your coursework is based around certifications. When it comes down to it, the major benefit for this type of program is focused learning without a lot of “extra” or general education classes. With WGU, they have a large student population so you can benefit from all those students going through the program. With SANS on the other hand, you can have some additional networking opportunities and frankly you get the best certifications possible. Keep in mind though that the SANS program is significantly more expensive. The final point with this program type is that all these certifications can be achieved without going through these programs. Technical: The technical programs that exist are generally from more traditional universities and colleges. From the variety that I have seen, the programs are typically linked to Computer Science or Engineering schools (departments) at colleges or universities and have some sort of programming requirement. If you are looking into a master’s degree program, this can be challenging if you do not have a technical undergraduate degree because you are likely going to need additional classes to qualify. Non-Technical: “Non-technical” programs honestly can range in a variety of topics that can also include technical components. Expect to learn about policy and there is a good chance that you will be geared for a more managerial or Governance, Risk and Compliance (GRC) role. These programs can link to Business, Engineering, Computer Science, Computer Information Systems, or really any other school (department) at a college or university. Guide to Cyber Security Careers 6 https://www.jongood.com Certifications vs Degrees This really depends a lot on you. Obvious factors include ability to focus, cost, time commitment and many others. People have been successful go either way. Ultimately, if you go for a degree then you MUST get certifications because it is a natural part of our industry. If you go for certifications, you do not necessarily need a degree. If you already have a degree (in anything), you might only need to get certifications. In a perfect world you would have a Cyber Security degree and certifications, but the most important thing is that you keep learning and pushing forward. Building a Home Lab In Cyber Security, some of the tools that we use can be extremely dangerous to a company’s network if we do not know what we are doing. Some types of testing we might do is even illegal to perform without written permission from somebody of authority. For those reasons just mentioned, a home lab is an essential component to improving your Cyber Security skills. In addition to the information below, make sure to visit my playlist on building a home lab for cyber security (https://youtube.com/playlist?list=PLErQ2qAXz3rp1rqHIdSx8QmW3n7Zqi9UL). Computer When it comes to computers, there are so many different options that will work. Desktop vs Laptop The first decision you will need to make is based on form factor and mobility. If you decide you want a laptop either for class or to be mobile in general, then you will have to buy it from a vendor (Apple, Microsoft, Dell, etc.). Both choices have their pros and cons, for example desktop components can be upgraded very easily. Build vs Prebuilt The second decision you will have to make is if you want to build your own computer (you assemble the parts) or buy a prebuilt computer (Apple, Microsoft, Dell, etc.). This really depends on how much time you have on your hands and your experience level. Building a computer takes research and making sure all the parts are compatible, which frankly for a beginner or new person to technology jobs can cause frustration and potentially not be worth it. On the other hand, if you build a computer correctly then you can get a lot more bang for your buck. A website extremely helpful in picking parts is PCPartPicker (https://pcpartpicker.com/). Components CPU Processor I would highly recommend you go with at least a Quad-Core processor. You do not necessarily need the latest and greatest but if you want to run several virtual machines at once (and you probably will), then anything less will cause performance issues. You might run into issues with software and operating systems if you use the Apple M chips (M1, M2, etc.) because not everything is compatible. Guide to Cyber Security Careers 7 https://www.jongood.com RAM These days 16GB of RAM is common among all computers Similar to the recommendation for processor, more RAM is always better. Each virtual machine that you run, will most likely perform best if it has 48GB of RAM, especially if it is a Windows virtual machine as they tend to be resource hogs. If you get a laptop, 16GB is probably going to be the most common option with the ability of up to 64GB with some models, however with desktops you could get 32GB, 64GB, or more with ease. Desktops also allow you to upgrade your memory over time, however some laptops (especially Apple) cannot be upgraded. Internal Storage For internal storage (hard drive), you want to try at all costs to get a solid-state drive for the performance and reliability that they provide. I would recommend at least 500GB but 1TB (or more) provides more room for storing virtual machines, files, and anything else you want to store. Like RAM, desktops are easy to upgrade but whatever you do, do not try to run these on an external USB drive. Operating System If you choose Windows, I highly recommend getting the professional version for additional features not found in the other versions. Other than Windows, you have the option of Mac OS or any version of Linux. I typically do not recommend using Linux as your main operating system, especially for beginners, because most tasks are going to require a good amount of tinkering (leave that to virtual machines and avoid the frustration). Other Components Everything else is personal preference, such as graphics cards, screen size, etc. and will not have much of an impact on the Cyber Security aspects. Virtualization Software Today, we no longer need racks and racks of equipment in our home lab to perform experiments. Virtualization allows us to create networks and perform testing in a controlled environment that we own and destroy without fear of legal jeopardy. When it comes to Virtualization software, there are three main players that you can decide from: VirtualBox (https://www.virtualbox.org/) Virtual Box is developed by Oracle and is a very well-known and free virtualization software. Hyper-V (https://docs.microsoft.com/en-us/virtualization/hyper-v-on-windows/about/) Hyper-V is the virtualization software from Microsoft. If you are using Windows 10 Professional, you can enable the software using Microsoft’s instructions to deploy virtual machines. VMware Workstation Player (https://www.vmware.com/products/workstation-player.html) VMware is the third virtualization software choice. All the virtualization software options generally function the same, however if you are getting prebuilt virtual machines from somebody then they will typically have less issues with VMware. I personally prefer the Professional version because you get a lot more features and customizability. Guide to Cyber Security Careers 8 https://www.jongood.com Soft Skills When it comes to soft skills for Cyber Security careers, or even for technology jobs in general, there are many different areas you want to improve. This list is not going to cover all the soft skills required but this list is extremely important for you to develop. Problem Solving When it comes to technology related jobs, one of our primary purposes is to solve problems. In Cyber Security specifically, you will start to realize that many ideal security solutions can cause significant roadblocks for the business if implemented to the extreme. If people come to you with a request that has security issues, it is important that you analyze the situation and if it is legitimate for the business, we need to try to find the path to “YES.” Creativity Along with problem solving, sometimes we need to get creative with solutions and think outside of the box. Perhaps another software solution does the same thing but is more secure, or maybe there is a way to automate things securely? Do not be afraid to experiment and think outside of the box because after all, that is what attackers are doing. Teamwork Face it, you are going to be working in teams in Cyber Security. Whether that means your department team or a team with other areas of the business, you must be capable of working together. Communication With teamwork comes the need to be able to communicate effectively both verbally and written. Cyber Security deals with a lot of documentation so being able to clearly put words on paper will help in reports, procedure documentation, and frequent email communication. Cyber Security also must interact with auditors and employees of all levels, therefore speaking ability is extremely important. I am not saying you must be as captivating as Steve Jobs, but you should be able to explain things verbally. One last point that is frequently lost in communication is that you need to cater your communication to the audience. If you are speaking to executives, do not start telling them about the methods within your code because you will lose them quickly. Flexibility Priorities are always changing because both technologies and the business you work for are always evolving. Although it can be easy to get caught up in a routine of doing things a certain way, you should understand that the only thing guaranteed is change. Business, technology, compliance and legal requirements are some of the things that can drive change and you need to be flexible. Guide to Cyber Security Careers 9 https://www.jongood.com Job Descriptions This list is not going to encompass all the potential jobs that exist, but these are the most likely roles that you could find yourself performing when you first get into Cyber Security. I also want to make the point that many companies will use these titles interchangeably (possibly even incorrectly), so you must read the job description and ask questions to determine the real responsibilities. Blue Team (Defensive) Risk & Compliance Analyst This role is heavily focused on making sure the company is compliant. Of the roles listed in this section, the Risk & Compliance Analyst role will have the most amount of documentation requirements. Depending on the industry, the documentation requirements will vary but expect highly regulated environments to have plenty of documentation. Also, this role is typically not as hands-on with technology and relies on subject matter experts and process audits. Security Analyst As a Security Analyst you should expect to deal heavily with log analysis of various tools. This could include SIEM (Security Information and Event Management) tools and vulnerability management tools to name a few. You will find that a lot of Security Analysts work in Security Operation Centers (SOC) and depending on the industry/company you would find yourself working on shifts. Security Administrator It is possible that a Security Administrator role could have analyst or engineer duties as well, however typically administrators will administer various applications and make sure they function correctly. You could configure vulnerability management tools to configure scans or configure some type of reporting and alerting capabilities. Security Engineer A Security Engineer is typically the person who will configure new systems and possibly develop the architecture. This position requires the ability to determine requirements and understand how all the components work together. Red Team (Offensive) Penetration Tester Penetration Testers (Pen testers, Ethical Hackers, Red Teamer, etc.) are the people who test the security of a company. Depending on the engagement rules, this role typically is imitating an attacker to determine vulnerabilities that exist. Typically, these roles work for consulting companies, but their work can be exciting. Guide to Cyber Security Careers 10 https://www.jongood.com Career Roadmap Essentially there are three types of people trying to break into Cyber Security careers: • • • Currently in College for IT or Cyber Security Degree Not interested in College or Changing Careers Currently working in IT but not Cyber Regardless of which type that you associate with, the advice below will still be consistent. One possible scenario that might come up is your college degree plan requires certifications earlier than listed below, in which you should adjust accordingly. Another example is if you already have a certain level of knowledge then you could expediate the program. Although the following roadmap focuses on certifications and technical abilities, there are a few things that I want you to understand before diving in. 1. You will notice that initially the focus is less on Cyber Security and more on general knowledge of Information Technology (IT). Building a foundation of knowledge is important because Cyber Security relies on knowing the underlying technology and how it operates. Cyber Security certifications should never be your first certifications for several reasons including the fact that it usually leads to an overconfidence in what you think you know, what you expect for a job, and what you expect for a salary. 2. If you follow the below roadmap, spend time improving your resume, and practice interview questions, you will have a dramatically higher chance of landing an entry level job at a help desk, in IT, or even in Cyber Security. Timeline All the time periods given below are the estimated time it will take you to complete that section. For example, the first section will take approximately 6 months in total to complete both the Network+ and Security+ certifications. ~6 months This year is all about building up a solid foundation of knowledge and skills. These certification exams can be expensive so starting out you want to pace yourself, especially as you become comfortable with studying for the exams. My advice is to start out with conceptual certifications because as you start mixing in technology, things can get exponentially more complex and confusing without a foundation. • • Objectives: o Learn concepts and begin following news from the industry. o Do not be afraid to download virtual machines and just break things…be curious. Potential Certifications: 1. CompTIA: Network+ (Study Resources) 2. CompTIA: Security+ (Study Resources) Guide to Cyber Security Careers 11 https://www.jongood.com 9-12 months This step is a continuation of the first step where we are trying to build a more solid foundation. Networking is the backbone of Information Technology and Security so having strong knowledge is important. Linux is in this step because many security tools and server operations tend to be in the Linux or Unix environments so it is a must. • • Objectives: o Continue to build your level of knowledge. o Consider learning basic scripting or programming (Bash, PowerShell, and Python). Potential Certifications: 1. Cisco CCNA (Study Resources) 2. CompTIA: Linux+ (Study Resources) 12 months With everybody trying to move to the cloud, now is the time to start looking at cloud certifications to make sure you stay relevant. If you are currently employed and looking to go into Cyber Security in your company, you should go for the vendor that the company uses. Otherwise, the vendor does not matter too much, but ideally you want a really strong foundation in the type of technology. • • Objectives: o Aggressively learn about the cloud and how to secure it o Continue to improve your development skills (Bash, PowerShell, and Python) Potential Certifications (pick one vendor and do all): 1. Amazon AWS Cloud Practitioner (Study Resources 2. Amazon AWS Solutions Architect Associate (Study Resources) 3. Amazon AWS Security Specialty (Study Resources) OR 1. Google GCP Cloud Digital Leader – Foundational 2. Google GCP Cloud Engineer – Associate 3. Google GCP Cloud Security Engineer – Professional OR 1. Microsoft Certified Azure Fundamentals 2. Microsoft Certified: Azure Administrator Associate 3. Microsoft Certified: Azure Security Engineer Associate Unlimited+ Months The reason we have focused so much on foundational knowledge such as Networking and Cloud is because the greatest number of jobs will always be on the defensive side. Getting your first job in Security will probably be one of the most challenging and frustrating things about the industry, however once you get that first job things become easier to navigate. Guide to Cyber Security Careers 12 https://www.jongood.com At this point you have a solid amount of knowledge of the core technologies that are going to be used in any company and a fantastic resume if you have not already landed a job. Now you should begin to research other subjects in Cyber Security to not only expand your knowledge, but also to see if something interests you enough to specialize in. Those who can specialize and become experts in a certain area can make A LOT of money, but they can also have a lot of choice about where they work. Objectives: Explore and find a specialization Potential Certifications: TBD based on specialization, but at minimum you should aim for the CISSP from ISC2 (at around 4 years of experience) Guide to Cyber Security Careers 13 https://www.jongood.com Additional Resources As somebody who once was a beginner in Cyber Security and walked in your shoes, I know that it can be challenging to find high-quality career resources. Although I have given you a wealth of knowledge in this eBook, below you will find other resources that I highly encourage you to take advantage of in your career. Career Coaching Some of my students prefer to receive 1-on-1 attention (https://www.jongood.com/services/) where we can review your resume, perform mock interviews, or answer any specific questions that might arise. Although I offer a lot of free advice and information, it can be extremely helpful to get dedicated attention. As the community grows, it becomes challenging to give individual advice and Career Coaching sessions help resolve that issue. News & Threat Intelligence Professionals who are aware of cyber events occurring in the world and threats that exist can instantly build professional credibility. It is that kind of information that helps you think about future issues so that you not only develop solutions that work today but that will also work tomorrow. Fortunately, you do not have to sort through all the current events because I will not only discuss relevant topics, but I will also provide you with an expert analysis with critical thinking about why the topic matters. Visit my website (https://www.jongood.com/threat-intel/) where you can stay current. Professional Associations Within the Cyber Security career field there are several associations that you can join for low cost, and usually even lower if you are a student. Associations will meet for training, and they also provide a great opportunity to network with professionals. Sometimes meeting the right person or hiring manager can be the most effective way to land your dream job. I have listed some popular options below, but you will want to research which of these associations have Chapters in your local area. • • • IEEE (https://www.ieee.org/) ISACA (https://www.isaca.org/) ISC2 (https://www.isc2.org/) • • • ISSA (https://www.issa.org/) OWASP (https://owasp.org/) PMI (https://www.pmi.org/) Training On Cyber Training Pro (https://www.cybertrainingpro.com/), you can find an extensive library of training, career services and resources. Topics include anything from beginner advice up to advanced Cyber Security and we are constantly adding content. Students also get exclusive access to our private community. Guide to Cyber Security Careers 14 https://www.jongood.com Final Thoughts Cyber Security is an exciting field to work in and it has way more jobs than there are professionals to fill them. With new regulations and compliance requirements being enforced every year, you can expect the demand to only increase. Do not kid yourself, you will need to work to improve your skills if you want to get the six figure salaries, but there are a lot of them out there for you to achieve. I want to truly thank you for taking the time to read through this eBook and consider the advice I have provided. The goal of this eBook is to help give you a foundation for breaking into Cyber Security instead of giving you exact suggestions that are likely to change every year. Feel free to reach out to me as we all continue this journey through the Cyber Security industry and help companies strive for secure networks! Sincerely, Jon Good Guide to Cyber Security Careers 15 https://www.jongood.com