Exploring The Multiverses Of Cybersecurity

56

Transitioning into any field can be an exciting and rewarding yet the most terrifying thing one could do in life, especially when you are leaving behind the comfort of your past role,

And with the increasing importance of digital security in today’s world, there’s a growing demand for skilled professionals who can protect systems, networks, and data from cyber threats. However, entering the field can seem daunting, especially considering the diverse realms within cybersecurity.

I have had people reach out to me about my transition and where to start and i thought i would create a breakdown of the different multiverse realms found in cybersecurity and just look at the map below already gives you an idea how vast the domains can be and the pick a path that aligns with your interests and skills:

Let’s Break It Down A Bit :

1. Network Security: Network security focuses on protecting the integrity and confidentiality of data as it is transmitted across networks. This means keeping the data safe from unauthorized access or changes by maintaining confidentiality, integrity, and availability. It includes securing hardware and software like routers, firewalls, and intrusion detection systems and so much more.

2 . Identity & Access Management: My favorite area focuses on managing users’ identification, authentication, and authorization to access resources such as networks, systems, and applications. It helps ensure only the right user has access to the right resource.

2.a Identity Governance & Administration: Identity Governance plays a crucial role in ensuring the security and integrity of digital systems within organizations. It involves establishing and enforcing policies and procedures for managing user identities and their access to resources. By implementing identity governance practices, companies can maintain control over who has access to sensitive data and critical systems, reducing the risk of unauthorized access or data breaches.

3. Endpoint Security: Endpoint security involves securing devices such as computers, smartphones, and tablets from cyber threats. This domain addresses issues like malware protection, data encryption, and access control mechanisms to prevent unauthorized access to endpoints.

4. Cloud Security: With the increasing adoption of cloud computing, cloud security has become vital to organizations today. This domain involves securing data, applications, and infrastructure hosted on cloud platforms. Professionals in cloud security focus on aspects like identity and access management, data encryption, and secure configuration of cloud services and so much more.

5. Application Security: Application security focuses on securing software applications from security vulnerabilities and threats. This area focuses on the techniques used to protect applications from threats and vulnerabilities from design to development and into the deployment and maintenance stages. It’s an important part of cyber security as applications are often a target for attacks.

6. Information Security Governance and Compliance: This area deals with establishing policies, procedures, and controls to ensure that an organization’s cybersecurity practices comply with relevant regulations and standards. Professionals in this area work on tasks such as risk management, compliance audits, and security policy development.

7. Cyber Threat Intelligence: This area involves gathering, analyzing, and disseminating information about cyber threats and malicious threat actors in the field. Roles in this domain work on identifying emerging threats, understanding adversary tactics and techniques, and providing actionable intelligence to defend against cyber attacks.

8. Incident Response and Forensics: Incident response and forensics focus on responding to cybersecurity incidents and investigating security breaches. This involves activities such as incident triage, containment, eradication, and recovery, as well as forensic analysis of digital evidence to identify the root cause of security incidents.

9. Security Operations: Security operations revolve around watching and analyzing security events and alerts to catch and respond to potential threats as they happen. This area covers activities like security monitoring, implementing SIEM (Security Information and Event Management), and engaging in threat hunting to find and address security risks before they become major issues. The security operations domain is crucial for the overall cybersecurity strategy, acting as a frontline defense to keep systems safe from potential cyber threats.

When picking a path in cybersecurity, consider the following factors:

1. What you enjoy and what you’re good at: Do you want to more hands-on and technical, or do you prefer working with people or do you want to be both: Identify your interests and skills within the realm of cybersecurity. Are you more interested in technical aspects like penetration testing and malware analysis, or do you prefer strategic roles such as risk management and compliance? For example i get energy when i combine my passion for people and technology so being customer facing, running security workshops and demos, speaking at conferences this are some of the things that gives me energy and by aligning what brings you passion to the day to day bustle will help you thrive even when the going gets hard.

2. Career Goals: Define your long-term career goals and aspirations in cybersecurity. Do you aspire to become a cybersecurity analyst, security architect, or chief information security officer (CISO)? Understanding your career goals can help you focus on the relevant skills and experiences needed to achieve them.

3. Industry Trends and Demand: Stay informed about industry trends and demand for specific cybersecurity roles and skills. Research job market trends, certifications, and emerging technologies to identify areas of high demand and opportunities for growth in the field.

4. Continuous Learning and Development: Cybersecurity is a dynamic and rapidly evolving field, so it’s essential to prioritize continuous learning and development. Invest in formal education, training programs, and industry certifications to stay abreast of the latest trends, tools, and best practices in cybersecurity.

5. Networking and Professional Development: I can’t stress this point further, build a strong professional network within the cybersecurity community by attending industry conferences, participating in online forums and communities, and connecting with experienced professionals in the field is key, and networking can provide valuable insights, mentorship, and career opportunities. I always like to say my career was somehow built on LinkedIn and thanks to the countless connection that helped me pave my way to today, so don’t neglect this part of the process.

Transitioning into a cybersecurity career comes with challenges that we should be mindful of:

  1. Technical Learning Curve: For those transitioning from non-technical backgrounds, grasping the technical intricacies of cybersecurity can be daunting. Concepts like encryption protocols, network configurations, and threat detection mechanisms may seem overwhelming at first. Learning these fundamentals takes time and dedication, and you should be prepared to invest in continuous learning to bridge the gap.
  2. Embracing Lifelong Learning: As you embark on your journey into cybersecurity, embrace the learning process wholeheartedly. Recognize that there’s a lot to absorb, especially if you’re coming from a non-technical background, the cybersecurity landscape evolves rapidly, with new threats emerging and technology advancing at a rapid pace. And by going down this path we kind of have to commit to lifelong learning to stay relevant and effective in our chose roles and this means staying updated on the latest trends, tools, and best practices through continuous learning, certifications, and hands-on experience.
  3. Embrace the power of AI in your career: can be a game-changer. As I sometimes find myself needing to write quick KQL query or a lines of code, seeing Chat GPT generate them in seconds still blows my mind. I remember the fun I had researching why my code wasn’t working ;-), and now we have AI and the countless of tools that can help us understand different industry concepts/terms, find useful resources to improve our transition. It’s like having a smart assistant guiding you through your career journey, making everything smoother and more efficient. So, don’t hesitate to leverage and learn about AI as you transition into a new career—it’s your ally in achieving your goals and staying competitive in today’s fast-paced field.
  4. There’s a lot to learn but still be mindful about Burnout: The demanding nature of cybersecurity roles can lead to burnout if individuals fail to prioritize self-care and establish healthy boundaries. Without proper self-care practices in place, burnout becomes a real risk. So set realistic and achievable expectations and goals for yourself, and carve out time for rest and recharge to prevent burnout and maintain long-term career sustainability.
  5. Don’t Skip The Basics: Begin by familiarizing yourself with fundamental concepts such as network security, encryption, and threat detection. Understand how different technologies and protocols work together to safeguard systems and data against cyber threats. Focus on mastering core concepts before delving into more specialized areas within cybersecurity.
  6. Nothing Beats Hands-On Experience: Theory is important, but practical experience is invaluable in cybersecurity. Look for opportunities to gain hands-on experience through internships, part-time roles, or volunteering for cybersecurity projects and events. Participate in capture-the-flag (CTF) competitions, cybersecurity workshops, and hackathons to apply your knowledge in real-world scenarios and develop practical skills and my wish for you is you finally land that entry-level role where you can fully immerse yourself in the cybersecurity world and thrive one day at a time.

Remember to be patient with yourself as you transition or navigate the early in career process, keep learning, stay updated on industry trends, all this while still prioritize self-care and although i know that this can’t really be considered as the ultimate guide to landing yourself in a cybersecurity position unfortunately no magical line of code for that(hopefully soon), I do hope it can be of use to anyone starting out and needing guidance and a small light of hope and proof that you will eventually reap the fruits of your hard work one day so don’t give up.

Leave a Reply

Your email address will not be published. Required fields are marked *

Like
Close

Made with and coffee

© Copyright 2020. All rights reserved.
Translate »
error: Content is protected !!
Verified by MonsterInsights