SlideShare a Scribd company logo
CyberUp
Getting your first cybersec job
David Strom
blog.strom.com
March 2023
(slideshare.net/davidstrom)
Who am I
• More than 35 years of B2B tech journalism,
written 3 non-fiction computer tech books,
magazine editor
• Started in IT back in 1982 and worked for
both government and private industry
doing end-user computing
• Spoken around the world at numerous
computer and business conferences, back
when that was a thing.
The process
• Understand the job market
• Build your brand
• Decide on education path
• Go to a couple of conferences
• Get an internship, find a mentor
Understand the job market
• What types of cybersec jobs are out there?
• Blue team – people who defend the infrastructure
• Red team – in-house people who attack things to find
weak points
• Audit/compliance/governance teams
Blue team Red team
• Security analyst
• Forensics
• Incident responder
• Security engineering roles
• Identity and access management
• Pen tester of various kinds
(network, physical entry, security
operations)
• Vulnerability researcher
• Malware analyst
Build your
brand
• Use one of these tools
(Knowem.com,
domains.google)
• Start and maintain a
Wordpress blog
• Set up all the various
social media IDs as well
as work religiously on
your LinkedIn bio
Decide on your
education path
• Online classes in computer science/cybersec (here are
three of the best ones) 
• Read my article in Computerworld on how to pick the
right class
Look into coding academies
Provider/Link Cost Other certifications to consider
COMPTIA Security+
$390 for 90-minute test
Penetration testing, cybersecurity
analyst and general IT courses
too
EC-Council Certified
Ethical Hacker (CEH) $1200 for four-hour test
More than a dozen cybersecurity
specializations including disaster
recovery, penetration testing
ISACA Certified Info
Security Manager (CISM)
$760 for four-hour test for non-
members but significant discounts
for members, study materials extra
Courses on risk management,
data privacy and auditing
ISC2 Certified Cloud
Security Practitioner
(CCSP)
$549 for four-hour test
Also offer numerous other cloud-
based security classes and boot
camps for above tests
Offensive Security
Penetration Testing
$800 for a one year subscription
Three different levels, other
certifications in web apps and
devops
SANS Institute Network $8,000 for in-person instruction at Dozens of courses covering a
Go to a couple of conferences
• ‘cons (including Black Hat/DEFCON in Vegas in August)
• Local STL cyber events
• Try one or two Bsides in different cities
• Join a capture the flag team and give that a go too
• Contribute to your favorite open source projects
Get an internship, etc.
• Choose a niche narrow enough
that you can conquer it
• Figure out what you are missing
and find the right mentor
• Avoid known bad employers
• Learn how to do people
networking, even if you are an
introvert
Other things worth reading
• My blog for Avast gives some perspective on different kinds
of jobs available in cybersec
• Daniel Meissler -- How to build a cybersec career (has a
great discussion on which certifications matter)
• How Walmart does cybersec (an in-depth look)

More Related Content

PPTX
Charting a Career in Information Security - August 2020
ODP
Negative Unemployment and Great Job Satisfaction? Why infosec is AWESEOME
PPTX
Career In Information security
PDF
Rothke stimulating your career as an information security professional
PPTX
Cyber Security Seminar.pptx
PDF
Becoming a Pentester
PDF
Best Cyber Security Training Certification | ACS Networks and Technologies Pv...
PDF
Level Up - A Career in Security
Charting a Career in Information Security - August 2020
Negative Unemployment and Great Job Satisfaction? Why infosec is AWESEOME
Career In Information security
Rothke stimulating your career as an information security professional
Cyber Security Seminar.pptx
Becoming a Pentester
Best Cyber Security Training Certification | ACS Networks and Technologies Pv...
Level Up - A Career in Security

Similar to Getting Your First Cybersecurity Job (20)

PPTX
Starting your Career in Information Security
PPTX
Cyber security certification course
PPTX
Cybersecurity career options & Getting started
PPT
Webinar 2 IT Security
PDF
DIY Education in Cyber Security
PDF
Cybersecurity Skills that Companies Are Desperately Hiring - Copy.pdf
PPTX
Cybersecurity_Career_Presentation_No_Images.pptx
PPTX
2014 - KSU - So You Want to Be in Cyber Security?
PPTX
Cybersecurity Awareness Session by Adam
PPTX
How Training and Consulting Companies Can Position CISSP, CISM and CRISC
PPTX
Should i study cyber security
PPTX
2015 KSU So You Want To Be in Cyber Security
PDF
Cyber security course in Trivandrum.ppt.
ODP
Butler Tech - Working in IT and InfoSec
PPTX
Get started in cybersecurity in 2022
PDF
So... you want to be a security consultant
PDF
Skills For Career In Security
PPTX
Career in cyber security
PDF
Navigating the Cybersecurity Analyst Career Path and Beyond
Starting your Career in Information Security
Cyber security certification course
Cybersecurity career options & Getting started
Webinar 2 IT Security
DIY Education in Cyber Security
Cybersecurity Skills that Companies Are Desperately Hiring - Copy.pdf
Cybersecurity_Career_Presentation_No_Images.pptx
2014 - KSU - So You Want to Be in Cyber Security?
Cybersecurity Awareness Session by Adam
How Training and Consulting Companies Can Position CISSP, CISM and CRISC
Should i study cyber security
2015 KSU So You Want To Be in Cyber Security
Cyber security course in Trivandrum.ppt.
Butler Tech - Working in IT and InfoSec
Get started in cybersecurity in 2022
So... you want to be a security consultant
Skills For Career In Security
Career in cyber security
Navigating the Cybersecurity Analyst Career Path and Beyond
Ad

More from David Strom (20)

PPTX
Spark Twitter fails Mar2023
PPTX
Understanding passwordless technologies
PPTX
What endpoint protection solutions are available on the market today?
PPTX
Fears and fulfillment with IT security
PPTX
Protecting your digital and online privacy
PPTX
AI and cyber security: new directions, old fears
PPTX
The legalities of hacking back
PPTX
How to market your book in today's social media world
PPTX
​Understanding the Internet of Things
PPTX
How to make your mobile phone safe from hackers
PPTX
Implications and response to large security breaches
PPT
Using social networks to find your next job (2017)
PPTX
Security v. Privacy: the great debate
PPTX
Using OpenStack to Control VM Chaos
PPTX
Notable Twitter fails
PPTX
How to make the move towards hybrid cloud computing
PPTX
Listen to Your Customers: How IT Can Provide Better Support
PPTX
Network security practice: then and now
PPTX
Biggest startup mistakes
PPTX
Picking the right Single Sign On Tool to protect your network
Spark Twitter fails Mar2023
Understanding passwordless technologies
What endpoint protection solutions are available on the market today?
Fears and fulfillment with IT security
Protecting your digital and online privacy
AI and cyber security: new directions, old fears
The legalities of hacking back
How to market your book in today's social media world
​Understanding the Internet of Things
How to make your mobile phone safe from hackers
Implications and response to large security breaches
Using social networks to find your next job (2017)
Security v. Privacy: the great debate
Using OpenStack to Control VM Chaos
Notable Twitter fails
How to make the move towards hybrid cloud computing
Listen to Your Customers: How IT Can Provide Better Support
Network security practice: then and now
Biggest startup mistakes
Picking the right Single Sign On Tool to protect your network
Ad

Recently uploaded (20)

PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Approach and Philosophy of On baking technology
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPT
Teaching material agriculture food technology
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Empathic Computing: Creating Shared Understanding
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
KodekX | Application Modernization Development
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
MIND Revenue Release Quarter 2 2025 Press Release
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Spectral efficient network and resource selection model in 5G networks
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Approach and Philosophy of On baking technology
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Teaching material agriculture food technology
Building Integrated photovoltaic BIPV_UPV.pdf
Empathic Computing: Creating Shared Understanding
Encapsulation_ Review paper, used for researhc scholars
KodekX | Application Modernization Development
Unlocking AI with Model Context Protocol (MCP)
Review of recent advances in non-invasive hemoglobin estimation
Mobile App Security Testing_ A Comprehensive Guide.pdf

Getting Your First Cybersecurity Job

  • 1. CyberUp Getting your first cybersec job David Strom blog.strom.com March 2023 (slideshare.net/davidstrom)
  • 2. Who am I • More than 35 years of B2B tech journalism, written 3 non-fiction computer tech books, magazine editor • Started in IT back in 1982 and worked for both government and private industry doing end-user computing • Spoken around the world at numerous computer and business conferences, back when that was a thing.
  • 3. The process • Understand the job market • Build your brand • Decide on education path • Go to a couple of conferences • Get an internship, find a mentor
  • 4. Understand the job market • What types of cybersec jobs are out there? • Blue team – people who defend the infrastructure • Red team – in-house people who attack things to find weak points • Audit/compliance/governance teams
  • 5. Blue team Red team • Security analyst • Forensics • Incident responder • Security engineering roles • Identity and access management • Pen tester of various kinds (network, physical entry, security operations) • Vulnerability researcher • Malware analyst
  • 6. Build your brand • Use one of these tools (Knowem.com, domains.google) • Start and maintain a Wordpress blog • Set up all the various social media IDs as well as work religiously on your LinkedIn bio
  • 7. Decide on your education path • Online classes in computer science/cybersec (here are three of the best ones)  • Read my article in Computerworld on how to pick the right class
  • 8. Look into coding academies
  • 9. Provider/Link Cost Other certifications to consider COMPTIA Security+ $390 for 90-minute test Penetration testing, cybersecurity analyst and general IT courses too EC-Council Certified Ethical Hacker (CEH) $1200 for four-hour test More than a dozen cybersecurity specializations including disaster recovery, penetration testing ISACA Certified Info Security Manager (CISM) $760 for four-hour test for non- members but significant discounts for members, study materials extra Courses on risk management, data privacy and auditing ISC2 Certified Cloud Security Practitioner (CCSP) $549 for four-hour test Also offer numerous other cloud- based security classes and boot camps for above tests Offensive Security Penetration Testing $800 for a one year subscription Three different levels, other certifications in web apps and devops SANS Institute Network $8,000 for in-person instruction at Dozens of courses covering a
  • 10. Go to a couple of conferences • ‘cons (including Black Hat/DEFCON in Vegas in August) • Local STL cyber events • Try one or two Bsides in different cities • Join a capture the flag team and give that a go too • Contribute to your favorite open source projects
  • 11. Get an internship, etc. • Choose a niche narrow enough that you can conquer it • Figure out what you are missing and find the right mentor • Avoid known bad employers • Learn how to do people networking, even if you are an introvert
  • 12. Other things worth reading • My blog for Avast gives some perspective on different kinds of jobs available in cybersec • Daniel Meissler -- How to build a cybersec career (has a great discussion on which certifications matter) • How Walmart does cybersec (an in-depth look)

Editor's Notes

  • #6: Lesley Carhart is behind that TISIPHONE site and she has a great series of articles on Starting an infosec career and lots of other useful stuff (such as how to do mentoring right and improve your resume, along with a great discussion of the various cybersec roles along with descriptions of a typical day in the life, what to avoid, and a personal anecdote from someone who does the job
  • #7: Knowem.com – can search through 500 popular social networks, along with over 150 domain extensions, and the entire USPTO Trademark database. You can quickly figure out what has been taken, and what is still available. It only shows you whether or not a domain is available. Second best is Google’s own domains.google — this allows you to search 300 domain extensions if you want to find something a bit more unusual. It also shows you the current market rate for a particular available name, which may or may not be accurate, depending on which registrar you end up using to buy the domain. If you want to do further research on just the domains, I would also use  Domainchecktools.com. It provides deeper research into about-to-expire domains, which again may or may not be accurate. Some of this info can be obtained from the internet command whois, which shows you sometimes who owns a particular domain and when it was purchased and when it expires.
  • #9: Launchcode has 3 courses, including one for women all free and all virtual Claim has 4 different classes, online and in person, costs $15,000 but loans and scholarships are available
  • #11: CSoOnline.com conference guide. --- https://www.csoonline.com/article/3155500/the-cso-guide-to-top-security-conferences.html
  • #12: That link will take you to Daniel Miessler’s suggestions on how to pick a mentor