Cybersecurity Career Guide

Book description

Kickstart a career in cybersecurity by adapting your existing technical and non-technical skills. Author Alyssa Miller has spent fifteen years in cybersecurity leadership and talent development, and shares her unique perspective in this revealing industry guide.

In Cybersecurity Career Guide you will learn:

  • Self-analysis exercises to find your unique capabilities and help you excel in cybersecurity
  • How to adapt your existing skills to fit a cybersecurity role
  • Succeed at job searches, applications, and interviews to receive valuable offers
  • Ways to leverage professional networking and mentoring for success and career growth
  • Building a personal brand and strategy to stand out from other applicants
  • Overcoming imposter syndrome and other personal roadblocks

Cybersecurity Career Guide unlocks your pathway to becoming a great security practitioner. You’ll learn how to reliably enter the security field and quickly grow into your new career, following clear, practical advice that’s based on research and interviews with hundreds of hiring managers. Practical self-analysis exercises identify gaps in your resume, what makes you valuable to an employer, and what you want out of your career in cyber. You’ll assess the benefits of all major professional qualifications, and get practical advice on relationship building with mentors.

About the Technology
Do you want a rewarding job in cybersecurity? Start here! This book highlights the full range of exciting security careers and shows you exactly how to find the role that’s perfect for you. You’ll go through all the steps—from building the right skills to acing the interview. Author and infosec expert Alyssa Miller shares insights from fifteen years in cybersecurity that will help you begin your new career with confidence.

About the Book
Cybersecurity Career Guide shows you how to turn your existing technical skills into an awesome career in information security. In this practical guide, you’ll explore popular cybersecurity jobs, from penetration testing to running a Security Operations Center. Actionable advice, self-analysis exercises, and concrete techniques for building skills in your chosen career path ensure you’re always taking concrete steps towards getting hired.

What's Inside
  • Succeed at job searches, applications, and interviews
  • Building your professional networking and finding mentors
  • Developing your personal brand
  • Overcoming imposter syndrome and other roadblocks


About the Reader
For readers with general technical skills who want a job in cybersecurity.

About the Author
Alyssa Miller has fifteen years of experience in the cybersecurity industry, including penetration testing, executive leadership, and talent development.

Quotes
Packed with real-world advice on how to enter the cybersecurity field. I’ve never seen all this in a single resource.
- Nathan D’Elboux, ISPAREX consulting

A friendly mentor that helps you plan your career, land your first gigs, and prepare for your ascension. An eye-opening experience.
- Rafik Naccache, fekr Technologies

This amazing book will help you assess, strategize, and successfully transition to a cybersecurity career.
- JMarc Roulleau, GIRO

If you’re new to cybersecurity, this book guides you along the path to get started. If you’re already in the industry, it provides useful exercises to reflect on your career.
- Bobby Lin, Crypto.com

Table of contents

  1. Cybersecurity Career Guide
  2. Copyright
  3. dedication
  4. contents
  5. front matter
    1. preface
    2. acknowledgments
    3. about this book
    4. Who should read this book
    5. How this book is organized
    6. liveBook discussion forum
    7. Other online resources
    8. about the author
    9. about the cover illustration
  6. Part 1 Exploring cybersecurity careers
  7. 1 This thing we call cybersecurity
    1. 1.1 What is cybersecurity
    2. 1.2 The role of cybersecurity
      1. 1.2.1 Cybersecurity in the business world
      2. 1.2.2 Cybersecurity defending society
    3. 1.3 The cybersecurity culture
      1. 1.3.1 Privacy and liberty
      2. 1.3.2 Open information sharing
      3. 1.3.3 Do no harm
    4. 1.4 The cybersecurity “industry”
      1. 1.4.1 Is cybersecurity an industry?
      2. 1.4.2 The effects of digital transformation
      3. 1.4.3 The human element
      4. 1.4.4 The internet of everything
      5. 1.4.5 So, is cybersecurity an industry?
    5. 1.5 The value of human diversity in cybersecurity
      1. 1.5.1 The cybersecurity diversity gap
      2. 1.5.2 Why it matters
      3. 1.5.3 How it applies to your career path
    6. Summary
  8. 2 The cybersecurity career landscape
    1. 2.1 The many disciplines of cybersecurity
      1. 2.1.1 Security operations
      2. 2.1.2 Digital forensics and incident response
      3. 2.1.3 Security architecture and design
      4. 2.1.4 Security assessment and verification
      5. 2.1.5 Application, software, and product security
      6. 2.1.6 Governance and compliance
      7. 2.1.7 Education and awareness
      8. 2.1.8 Sales and sales support
      9. 2.1.9 Leaders and executives
    2. 2.2 Characteristics of a security professional
      1. 2.2.1 Inventors and creators
      2. 2.2.2 Obsessively inquisitive
      3. 2.2.3 Compulsive learning
      4. 2.2.4 Idealism
      5. 2.2.5 Forget about the “infosec rockstar”
    3. 2.3 Considerations of anonymity
    4. Summary
  9. 3 Help wanted, skills in a hot market
    1. 3.1 Job seekers vs. job openings
    2. 3.2 Cybersecurity job role progression
      1. 3.2.1 Entry-level roles
      2. 3.2.2 Senior roles
      3. 3.2.3 Architect roles
      4. 3.2.4 Security leadership
      5. 3.2.5 Executive leadership
    3. 3.3 Common skills for security roles
      1. 3.3.1 Common technical skills
      2. 3.3.2 Soft skills
    4. Summary
  10. Part 2 Preparing for and mastering your job search
  11. 4 Taking the less traveled path
    1. 4.1 The entry-level challenge
      1. 4.1.1 Considering cybersecurity degree programs
      2. 4.1.2 Finding your path to security
    2. 4.2 Know yourself
      1. 4.2.1 Identifying the authentic you
      2. 4.2.2 Finding your passion
      3. 4.2.3 Developing your personal objective
    3. 4.3 Own yourself
      1. 4.3.1 Technical capabilities
      2. 4.3.2 Core skills
      3. 4.3.3 Soft skills
      4. 4.3.4 The capabilities inventory
    4. 4.4 Connect yourself
      1. 4.4.1 Choosing a focus discipline
      2. 4.4.2 Identifying gaps and challenges
    5. Summary
  12. 5 Addressing your capabilities gap
    1. 5.1 The alphabet soup of security certifications
      1. 5.1.1 Security certification overview
      2. 5.1.2 (ISC)2 Certified Information Systems Security Professional
      3. 5.1.3 CompTIA Security+
      4. 5.1.4 EC-Council Certified Ethical Hacker
      5. 5.1.5 Other certifications
      6. 5.1.6 How many is too many?
    2. 5.2 Academic cybersecurity programs
      1. 5.2.1 Degree programs
      2. 5.2.2 Advanced research programs
    3. 5.3 Less formal skills building
      1. 5.3.1 Industry conferences
      2. 5.3.2 CTFs, playgrounds, and personal labs
      3. 5.3.3 Webinars, podcasts, and live-stream events
      4. 5.3.4 Other community meetups
    4. Summary
  13. 6 Resumes, applications, and interviews
    1. 6.1 Mastering the resume
      1. 6.1.1 One document is not enough
      2. 6.1.2 Format
      3. 6.1.3 Check the boxes
      4. 6.1.4 Proofreading
    2. 6.2 Choosing and applying to job openings
      1. 6.2.1 Using job search tools
      2. 6.2.2 Finding the right roles
      3. 6.2.3 Matching requirements
      4. 6.2.4 Office, remote, or hybrid working environments
    3. 6.3 Crushing the job interviews
      1. 6.3.1 The recruiter or HR screen
      2. 6.3.2 The hiring manager interview
      3. 6.3.3 The technical interview
    4. 6.4 Considering the job offer
      1. 6.4.1 Don’t rush things
      2. 6.4.2 Negotiating for something better
      3. 6.4.3 Employment agreements
    5. Summary
  14. Part 3 Building for long-term success
  15. 7 The power of networking and mentorship
    1. 7.1 Building a professional network
      1. 7.1.1 Social media
      2. 7.1.2 Industry groups and networking events
      3. 7.1.3 Other meetups, conferences, and events
      4. 7.1.4 Making your network productive
    2. 7.2 Exploring the role of mentorship
      1. 7.2.1 Qualities of a good mentor
      2. 7.2.2 What to expect from a mentor
      3. 7.2.3 What your mentor expects
      4. 7.2.4 How many mentors should a person have
    3. 7.3 Managing the mentor relationship
      1. 7.3.1 Forms of mentoring relationships
      2. 7.3.2 Structure of a mentoring relationship
      3. 7.3.3 Ending a mentor relationship
    4. 7.4 Building those relationships
    5. Summary
  16. 8 The threat of impostor syndrome
    1. 8.1 Defining impostor syndrome
      1. 8.1.1 What is impostor syndrome?
      2. 8.1.2 Why do we care about impostor syndrome?
      3. 8.1.3 Who experiences impostor syndrome?
    2. 8.2 Understanding the causes of impostor syndrome
      1. 8.2.1 Perfectionism
      2. 8.2.2 Industry expectations
      3. 8.2.3 Comparison to others
      4. 8.2.4 Lack of representation
      5. 8.2.5 Diminishing accomplishments
    3. 8.3 Overcoming impostor syndrome
      1. 8.3.1 Avoid competition
      2. 8.3.2 Set goals and define what success means to you
      3. 8.3.3 Turn to colleagues and peers
      4. 8.3.4 Be a resource to others
      5. 8.3.5 Acknowledge and celebrate your achievements
    4. Summary
  17. 9 Achieving success
    1. 9.1 Overcoming challenges in cybersecurity careers
      1. 9.1.1 Burnout
      2. 9.1.2 Gatekeeping
      3. 9.1.3 Stagnation
    2. 9.2 Building your career strategy
      1. 9.2.1 Describe your long-term vision
      2. 9.2.2 Identify your personal growth needs
      3. 9.2.3 Build a 1, 3, 5 plan
    3. 9.3 Pivoting
      1. 9.3.1 Recognize when change is needed
      2. 9.3.2 You need to pivot, now what?
      3. 9.3.3 Shoot your shot
    4. 9.4 Putting it all into motion
    5. Summary
  18. glossary
  19. index

Product information

  • Title: Cybersecurity Career Guide
  • Author(s): Alyssa Miller
  • Release date: June 2022
  • Publisher(s): Manning Publications
  • ISBN: 9781617298202