Cybersecurity Career Master Plan: Proven techniques and effective tips to help you advance in your cybersecurity career

Cybersecurity Career Master Plan: Proven techniques and effective tips to help you advance in your cybersecurity career

  • Downloads:2352
  • Type:Epub+TxT+PDF+Mobi
  • Create Date:2021-11-13 09:50:55
  • Update Date:2025-09-06
  • Status:finish
  • Author:Dr. Gerald Auger
  • ISBN:1801073562
  • Environment:PC/Android/iPhone/iPad/Kindle

Download

Reviews

Dennis Hunter

The “how to” book your career has been waiting for …I teach Cybersecurity for CompTIA and was the product manager for the Cisco CCNA Security certification。 After years in the field of doing the job of Technical support while at IBM, the inevitable layoffs came and I was faced with “what now in my 50’s。Along came Cybersecurity and I have never looked back at the help desk。 Free yourself and buy this book。

C

An actionable cybersecurity career guide, walking you through choosing a target role to meeting the job requirements to finding and getting a job to advancing in your career。 It explains the fields available within cybersecurity, the various pathways to enter, details about education and certifications, gaining experience, and branding yourself。 There are many useful resource recommendations。 The co-authors helpfully give examples of how they applied the advice given in the book。 I appreciate th An actionable cybersecurity career guide, walking you through choosing a target role to meeting the job requirements to finding and getting a job to advancing in your career。 It explains the fields available within cybersecurity, the various pathways to enter, details about education and certifications, gaining experience, and branding yourself。 There are many useful resource recommendations。 The co-authors helpfully give examples of how they applied the advice given in the book。 I appreciate that they're willing to point out both pros and cons of working in infosec。The book focuses on these infosec domains: risk assessment, governance, threat intelligence, security operations, security architecture, and learning。The book could have used more editing to improve the flow, especially because 4 people co-authored the book。I highly recommend this book to those aspiring to an infosec career and those looking to advance their infosec career。I requested an advance copy of this book, which I received in exchange for an honest review。NotesNew Career in Cyber… "Who Dis?"Cybersecurity job pros• Flexible hours• Great salaries• Remote work• Variety of cultures• Diverse positions and specialties• Recruiters look for you• You can train yourself (no formal education needed)Cybersecurity job cons• Prereqs for even entry-level positions (e。g。, SOC analyst)• Businesses don't understand cybersecurity• Rapid change, endless learning• Adversaries don't take breaks• Serious passion required• Mental burnout due to mentally taxing work• Easy to be jack of all trades and master of noneWhich Career Field Is Best for You?Cybersecurity domains• Physical security• Risk assessment• Governance• Threat intelligence• Security operations• Security architecture• Frameworks, standards, & software• Development• Learning Cyber Threat Intelligence (CTI)Description: "companies and Threat Intelligence Analysts need to be ahead of the game by staying posted about the most recent attacks, business trends, and even global news。 This helps them analyze, predict, and prevent existing and potential cyber attacks。 The practice of improving cybersecurity safeguards through sharing, learning, analyzing, and forecasting cyber threats and adversaries is known as Cyber Threat Intel。"CTI components: analytics, research, intelligence。3 types of CTI• Tactical: Addresses attacker tactics (attack procedures, vulnerabilities, entry points)。 Often involves collaboration with IR team, risk analysts, IT。• Operational: Provides in-depth, highly technical details of threats (motives, attacker tools and techniques, IOCs)。 Often involves collaboration with IR team, risk analysts, IT。• Strategic: Focuses on non-technical aspects: risks, impacs, effects on organizations)。 Helps with defense decisions。 Often involves collaboration with GRC analysts。CTI analysts should stay updated on domestic and global news, attacks, technologies, politics。Different Strokes for Different FolksGovernment work pros• Many interesting opportunities• Many resources (e。g。, documentation)• Stability (low likelihood of job loss)• Pensions (some roles)• Training budget• Conference travel• Well-defined responsibilities (low likelihood of being asked to take responsibilities beyond job description)Government work cons• Slow hiring process• Contract cycles (your work depends on contract renewal)• Lower salaries than private sector• Inability to accept gifts from vendors• Potential to be pigeonholed Exploring Certifications and CollegeYou can take the CISSP before you have 5 yrs of professional cybersecurity experience, you'll just have the associate title until you reach 5 yrs。Getting Hands-On Experience with No ExperienceInfosec conferences• Black Hat• DEF CON• RSA• THOTCON• Grayhat• Gartner's Identity and Access Management• CryptoCon• BSidesLocal infosec groups• (ISC)²• ISACAYou may be able to convince small to medium businesses to create an internship for you。 Contact someone in company's IT or information security department。 Explain your situation and say you'd like to help as an intern for 3-6 months。 Describe your experience。Time to Brand Yourself – Not the Burning TypeFinding your why1。 If you could be anything, what would that be and why?2。 What motivates you to achieve better things for your life?3。 When you think about your answer to #2, how does it make you feel?#2 is your why; it motivates you to achieve #1Setting goals1。 What's stopping you from becoming your answer to #1 above?2。 What 1-2 things can you do now to reduce or eliminate those things in the previous answer?3。 If all your barriers and fears were gone, what would your ideal title/job be?4。 How would that title/job better support your why?How to Land a Jay-Oh-Bee!Job search platforms• Glassdoor• LinkedIn• Indeed• Google• ZipRecruiter• CareerBuilderInfosec job search platforms• infosec-job。com• cybersecjobs。com• ninjajobs。com• dice。com• whitetruffle。com• angel。coSalary• High-paying industries: banking, finance, healthcare• Lower-paying industries: industrial, retail• Generally, the larger the company, the higher the salary, and the wider the salary range in the company。• Look up salary ranges on LinkedIn Salary and payscale。com。Résumé• Check if your résumé is ATS (Applicant Tracking System) friendly with resumeworded。com and skillsyncer。com。• Create a master résumé that contains all your info。 For each position you apply to, copy the master résumé and customize it to fit the job post。• Quantify achievements whenever possible (e。g。, reduced risk by 70%)。• List your proficiency for skills (e。g。, proficient, beginner)。• Include soft skills (communication, mentorship, leadership, teamwork, etc。)• For each project, experience, or activity, include only 3-5 bullet points (1-2 lines each)。• ResumeGenius。com has free sample résumés and cover letters。Keep records of all jobs you apply to。 Save entire job post (not just URL), as posts can be taken down。If interview involves a technical assessment and you get stuck, say, "I'd like to do [X], but I'm not sure how to get there。 Could you give me a hint?"Behavioral interview questions• Talk about a time you solved a conflict with a team member。• What would you do if your team leader disagreed with you?• What are your top strengths and weaknesses?1-2 certificates is enough for entry-level positions。Giving Back to Others and YourselfBlack Hat is "the professional version of DEF CON。"Cybersecurity employees typically stay with a company for 1。5 - 2 yrs。 If a company's cybersecurity employees stay for less than a year, that could be a sign of a bad employer。 。。。more

Joshua Mason

I had the honor of getting an advance copy of Cybersecurity Career Master Plan by 👉🏼 Gerald Auger, Ph。D。 , Jax S , Jon Helmus , and Kim Nguyen , for the opportunity to write a review。And, as I would expect from this crowd, the book is amazing。If you follow or are connected to these 4, then you already know how great they are and what they bring to the table。And if you're a fan of Simply Cyber , then you might already know the quality to expect。This book works well for someone who has no idea wha I had the honor of getting an advance copy of Cybersecurity Career Master Plan by 👉🏼 Gerald Auger, Ph。D。 , Jax S , Jon Helmus , and Kim Nguyen , for the opportunity to write a review。And, as I would expect from this crowd, the book is amazing。If you follow or are connected to these 4, then you already know how great they are and what they bring to the table。And if you're a fan of Simply Cyber , then you might already know the quality to expect。This book works well for someone who has no idea what cybersecurity is, but wants to go all-in。 And it's great for those who are in the industry but are not sure how to level up and get to that dream job。The first couple chapters introduce you to cybersecurity from the ground up。 It's very well written and it's quite thorough。 It even gets into networking, subnetting, and cloud services。Then there are the chapters on mentoring, connecting, building out your network and social media presence as part of your personal brand。Going even deeper into the technical, they take you through the steps to create your own home lab and get setup with other training resources。I highly recommend this book to anyone who is growing in their cybersecurity career。 。。。more