Source |
AlienVault Lab Blog |
Identifiant |
8350188 |
Date de publication |
2023-06-28 10:00:00 (vue: 2023-06-28 16:06:42) |
Titre |
La cybersécurité n'est pas un outil ou un logiciel;est un état d'esprit: combler l'écart pour les changeurs de carrière Cybersecurity is not a tool or software piece; is a state of mind: Bridging the gap for career changers |
Texte |
Introduction
In recent years, the field of cybersecurity has witnessed a significant influx of professionals from non-Information Technology (IT) backgrounds who are making the leap into this dynamic industry. As a cybersecurity technical developer and instructor, I have had the privilege of delivering many customers in-person and virtual training courses and meeting numerous individuals seeking to transition into cybersecurity from diverse non-IT related fields.
I can remember Cindy, a lawyer in a large firm, not really finding fulfillment after a “boring” eighteen months at the firm. Also, Ann, an actress with over 17 successful years of movie and theater experience, wanting to get into the industry for higher income to support her daughter. Then Richard, a radiologist tired of the customer abuse he was receiving and wanting more in life.
Everything starts with the right mindset at the onset; and not every career in cybersecurity is deeply technical.
Cybersecurity is a broad field and cybersecurity professionals may do their jobs in a variety of ways. This includes the following roles - keeping in mind that at least two of them are not 100% technical.
They can have roles that protect a company’s internal networks and data from outside threat actors as information security professionals.
They can have roles in risk management where they can confirm businesses take appropriate measures to protect against cybercrime.
They can have roles where they can confirm businesses comply with local, state, and federal cybersecurity and data protections laws.
Aside from being super solid on the OSI Model, hands-on TCP/IP, networking skills, a couple of industry certifications, a drive to self-study, some basic coding and a couple of bootcamps, an aspiring cybersecurity professional must also consider their skills. They bring things to the table from the fields where they come from, which are useful, fully transferable and appreciated!
Sometimes as “seasoned professionals” we forget to investigate fresh ways to pivot in incident response (IR) scenarios for example.
Technical skills can, with some education, hands-on practice, and self-study, be mastered, but the main ones that you will need for the transition are not going to be found in the classroom, or in the computer screen. These are the face-to-face interactions we have with friends, family, coworkers, and strangers. In other words, the soft skills; those skills that cannot be coded or productized but indeed can be monetized.
Transitioning from entertainment/law/health and many other industries to the cybersecurity field does bring valuable transferable skills. In this article I aim to explore the many valuable skills career changers bring to the table and highlight seven essential skills they must possess to successfully embark on this exciting and amazing journey.
Attention to detail:
Actors pay great attention to detail, focusing on nuances in dialogue, characterization, and stage directions. In cybersecurity, meticulousness is essential when reviewing code, identifying vulnerabilities, conducting security assessments, and analyzing logs. Her ability to spot inconsistencies and pay attention to minute details can be valuable.
Radiology technicians work with complex medical imaging equipment, where precision and attention to detail are crucial. This skill translates well to the cybersecurity field, where professionals need to analyze large amounts of data, identify vulnerabilities, and detect potential threats with accuracy.
Lawyers pay great attention to detail when reviewing legal documents, contracts, and evidence. This attention to detail can be valuable in cybersecurity, where professionals must review policies, analyze security controls, and identify potential vulnerabilities. They can also contribute to ensuring cybersecurity practices align with legal and regulatory standards. |
Notes |
★★★
|
Envoyé |
Oui |
Condensat |
“it “non “seasoned 100 1000 abilities ability abnormalities about abuse accept accountability accuracy acquire act actors actress adapt adaptability adaptability: adapting additionally adhere advantageous advocating after against agreements aim align all already also always amazing amounts analysis analytical analyze analyzing ann another applied applying appreciated approach appropriate are areas argue article articulate aside aspiring assess assessment—key assessments assets attention background backgrounds basic behalf being beneficial benefit between bootcamps breaches bridge bridging bring broad brothers businesses but can cannot card career cases certain certifications challenges challenging changers characterization characters cindy cindy’s circumstances classroom clear clients code coded coding collaborate collaboration collaboration: come coming communication company’s complex compliance comply computer concepts conclusion: conduct conducting confidentiality confirm consent consider considerations continues contracts contribute controls convey conveying copyright couple courses coworkers creative critical cross crucial customer customers cybercrime cybersecurity data daughter day decisions deeply defenses delivering demand detail detail: details detect developed developer diagnostic dialogue different digital directions directly disciplines diverse diversity documents does doing domain draft dream drive dss during dynamic ecosystems education effective effectively eighteen embark embracing emerging encounter encountered engrain enrich ensure ensuring entertainment entertainment/law/health environment equipment essential ethical evaluate ever every everyday everything evidence evolving example excel excellent exciting expanding experience experiences explain exploit explore extract face familiarity family federal field fields find finding findings firm focusing following forget fortify fostering found frameworks fresh friends from fulfillment fully fun fundamental future gain gap gdpr general get getting goes going great grow guidance hackers hacking had handle hands hard has hat hats have health healthcare help helping her high higher highlight highly hipaa hire hired his honed honing huge humble identify identifying images imaging immense implications importance incident incidents includes income inconsistencies increasingly indeed individuals industries industry influx information instructor insurance integrity intellectual interactions internal internally interpret interview interview; intricate introduction investigate issues it’s job jobs journey keeping key knowledge knowledge: known large last law laws lawyer lawyers leap learn least legal leverage license life likely local logical logs looking main make making malicious management manner many mastered mastering may measures medical meeting members methodologies meticulousness mind mind: mindset minute mitigate model monetized months more most movie must nailing nature navigate need negotiate networking networks new non nonverbal not now nuances numerous often one ones onset; operating oral organizations osi other outside over paramount patient patients patterns pay payment pci penetration people performances perhaps person perspectives persuade persuasion pertaining piece; pivot play plays plethora policies pollinated portability position possess possesses possessing potential power practice practices precision preparation prerequisites present presenting principles privacy privilege problem problems production productive productized professional professionals professionals” property propose proprietary protect protection protections provide push put quickly radiologist radiologists radiology rapidly really receiving recent regularly regulation regulations regulatory rehearsals related related” relevant remember reports requirements research response review reviewing richard right risk risks role roles safeguard same saying scenarios screen secrets secure security seeking self sensitive settings seven |
Tags |
Tool
Vulnerability
Threat
Medical
|
Stories |
|
Move |
|