Table Of ContentCybersecurity Career Guide
ALYSSA MILLER
To comment go to liveBook
Manning
Shelter Island
For more information on this and other Manning titles go to
www.manning.com
Copyright
For online information and ordering of these and other
Manning books, please visit www.manning.com. The
publisher offers discounts on these books when ordered in
quantity.
For more information, please contact
Special Sales Department
Manning Publications Co.
20 Baldwin Road
PO Box 761
Shelter Island, NY 11964
Email: [email protected]
©2022 by Manning Publications Co. All rights
reserved.
No part of this publication may be reproduced, stored in a
retrieval system, or transmitted, in any form or by means
electronic, mechanical, photocopying, or otherwise, without
prior written permission of the publisher.
Many of the designations used by manufacturers and sellers
to distinguish their products are claimed as trademarks.
Where those designations appear in the book, and Manning
Publications was aware of a trademark claim, the
designations have been printed in initial caps or all caps.
♾ Recognizing the importance of preserving what has been
written, it is Manning’s policy to have the books we publish
printed on acid-free paper, and we exert our best efforts to
that end. Recognizing also our responsibility to conserve the
resources of our planet, Manning books are printed on
paper that is at least 15 percent recycled and processed
without the use of elemental chlorine.
Manning Publications Co.
20 Baldwin Road Technical
PO Box 761
Shelter Island, NY 11964
Development editor:Karen Miller
Review editor:Aleksandar Dragosavljević
Production editor:Deirdre S. Hiam
Copy editor:Sharon Wilkey
Proofreader:Jason Everett
Typesetter:Dennis Dalinnik
Cover designer:Marija Tudor
ISBN: 9781617298202
contents
dedication
front matter
preface
acknowledgments
about this book
about the author
about the cover illustration
Part 1 Exploring cybersecurity careers
1 This thing we call cybersecurity
1.1 What is cybersecurity
1.2 The role of cybersecurity
Cybersecurity in the business world
Cybersecurity defending society
1.3 The cybersecurity culture
Privacy and liberty
Open information sharing
Do no harm
1.4 The cybersecurity “industry”
Is cybersecurity an industry?
The effects of digital transformation
The human element
The internet of everything
So, is cybersecurity an industry?
1.5 The value of human diversity in cybersecurity
The cybersecurity diversity gap
Why it matters
How it applies to your career path
2 The cybersecurity career landscape
2.1 The many disciplines of cybersecurity
Security operations
Digital forensics and incident response
Security architecture and design
Security assessment and verification
Application, software, and product security
Governance and compliance
Education and awareness
Sales and sales support
Leaders and executives
2.2 Characteristics of a security professional
Inventors and creators
Obsessively inquisitive
Compulsive learning
Idealism
Forget about the “infosec rockstar”
2.3 Considerations of anonymity
3 Help wanted, skills in a hot market
3.1 Job seekers vs. job openings
3.2 Cybersecurity job role progression
Entry-level roles
Senior roles
Architect roles
Security leadership
Executive leadership
3.3 Common skills for security roles
Common technical skills
Soft skills
Part 2 Preparing for and mastering your job
search
4 Taking the less traveled path
4.1 The entry-level challenge
Considering cybersecurity degree programs
Finding your path to security
4.2 Know yourself
Identifying the authentic you
Finding your passion
Developing your personal objective
4.3 Own yourself
Technical capabilities
Core skills
Soft skills
The capabilities inventory
4.4 Connect yourself
Choosing a focus discipline
Identifying gaps and challenges
5 Addressing your capabilities gap
5.1 The alphabet soup of security certifications
Security certification overview
(ISC)2 Certified Information Systems Security Professional
CompTIA Security+
EC-Council Certified Ethical Hacker
Other certifications
How many is too many?
5.2 Academic cybersecurity programs
Degree programs
Advanced research programs
5.3 Less formal skills building
Industry conferences
CTFs, playgrounds, and personal labs
Webinars, podcasts, and live-stream events
Other community meetups
6 Resumes, applications, and interviews
6.1 Mastering the resume
One document is not enough
Format
Check the boxes
Proofreading
6.2 Choosing and applying to job openings
Using job search tools
Finding the right roles
Matching requirements
Office, remote, or hybrid working environments
6.3 Crushing the job interviews
The recruiter or HR screen
The hiring manager interview
The technical interview
6.4 Considering the job offer
Don’t rush things
Negotiating for something better
Employment agreements
Part 3 Building for long-term success
7 The power of networking and mentorship
7.1 Building a professional network
Social media
Industry groups and networking events
Other meetups, conferences, and events
Making your network productive
7.2 Exploring the role of mentorship
Qualities of a good mentor
What to expect from a mentor
What your mentor expects
How many mentors should a person have
7.3 Managing the mentor relationship
Forms of mentoring relationships
Structure of a mentoring relationship
Ending a mentor relationship
7.4 Building those relationships
8 The threat of impostor syndrome
8.1 Defining impostor syndrome
What is impostor syndrome?
Why do we care about impostor syndrome?
Who experiences impostor syndrome?
8.2 Understanding the causes of impostor syndrome
Perfectionism
Industry expectations
Comparison to others
Lack of representation
Diminishing accomplishments
8.3 Overcoming impostor syndrome
Avoid competition
Set goals and define what success means to you
Turn to colleagues and peers
Be a resource to others
Acknowledge and celebrate your achievements
9 Achieving success
9.1 Overcoming challenges in cybersecurity careers