- The Encrypted Digest
- Posts
- The Melting Pot of Cybersecurity: Your Past Career Can Be Your Strength
The Melting Pot of Cybersecurity: Your Past Career Can Be Your Strength
Unearthing the Hidden Treasures: The Melting Pot of Cybersecurity: Your Past Career Can Be Your Strength.
Dear Readers,
As we crack open the case on this Friday edition of Encrypted Digest, we're turning our focus to a seldom-acknowledged fact about cybersecurity: it's a melting pot. And the ingredients? They're as diverse as they come. People from a vast array of backgrounds and previous career paths have successfully pivoted into this dynamic field. Moreover, their unique experiences are not merely relevant; they have become their secret weapons.
Here's an interesting observation: The career trajectory in cybersecurity is increasingly looking more like a skills conglomerate than a linear path. Intrigued? Let's dive deeper.
The world of cybersecurity is far from a one-size-fits-all. It's a diverse, intricate ecosystem that thrives on a myriad of skills, perspectives, and experiences. If you've been wondering how your background as a [insert your field here] might translate into a career in cybersecurity or if you possess the right tools to make the switch, you're not alone.
However, the truth may surprise you. Cybersecurity isn't solely about codes and ciphers. It's about understanding systems, problem-solving, and a whole lot of creativity. It's about leveraging the unique skills you've honed over the years and applying them in novel ways.
In this edition, we'll explore how different roles can transition uniquely into the cybersecurity domain. We aim to demystify the journey by providing actionable insights. From healthcare to finance, from education to IT, we'll illuminate the pathways and help you see the bridges between where you are now, and where you want to be in the cyber world.
So grab a cup of coffee or tea, settle in, and get ready to see your career trajectory in a new light. It's time to embrace the potential of your past career and wield it as your strength in the ever-evolving world of cybersecurity.
Onward and upward!
Depending on your aim lets go through some career paths than can translate over. Note that even if your job title doesn’t match it doesn’t mean your job responsibilities don’t align. Furthermore I’m omitting some IT general positions because we covered those previously as well.
A final word before we dig in. Once we cover the below with industries and such I will place some disclaimers as well as actionable items you can do now to set yourself up for success.
Industry: Finance
Role: Financial Analyst
Transferrable/Translatable Skills:
Analytical Skills: Financial analysts need to interpret complex financial data and make recommendations based on this data. In cybersecurity, this skill translates well as professionals need to analyze patterns, detect anomalies and devise solutions based on the data and threat analysis.
Regulatory Compliance Knowledge: In the finance sector, understanding and complying with regulatory requirements is key. This understanding is equally important in cybersecurity, especially when dealing with data privacy and security standards like GDPR, HIPAA, PCI-DSS etc.
Risk Management: Financial analysts often assess the potential risks of investment decisions. In cybersecurity, risk assessment is a major part of the job, as professionals need to identify, evaluate, and mitigate security risks.
Attention to Detail: Finance professionals often work with complex numerical data and need to be meticulous to avoid errors. In cybersecurity, being detail-oriented helps in detecting security gaps or vulnerabilities and ensuring all security protocols are followed.
Estimated Time in Position to Gain Necessary Skills: A financial analyst or a similar role for at least 3-4 years can provide you with solid analytical skills, risk management and regulatory compliance knowledge.
Best Aligned Cyber Title: With the skills acquired as a financial analyst, a good entry point in the cybersecurity field could be as a Security Analyst or a Cybersecurity Risk Analyst. These roles involve assessing a company’s security measures, identifying vulnerabilities, and determining how to best mitigate those potential risks - all tasks closely related to financial analysis work.
Role: Registered Nurse / Data Entry Specialist / Healthcare Professional
Transferrable/Translatable Skills:
Understanding of Healthcare Regulations: Healthcare professionals have a deep understanding of healthcare regulations, such as HIPAA, that are essential when dealing with patient data. This translates well to cybersecurity where compliance with data privacy and security regulations is key.
Data Management Skills: In a data entry role, you'd already be well-acquainted with the handling of sensitive data, a skill directly applicable to roles in cybersecurity.
Critical Thinking and Problem-Solving: These skills are vital in healthcare for diagnosing patients and formulating treatment plans. In cybersecurity, these skills are applied when identifying, analyzing, and resolving security threats.
Attention to Detail: In healthcare, overlooking a small detail can have major consequences. Similarly, in cybersecurity, a small unnoticed vulnerability can lead to significant data breaches.
Communication Skills: Healthcare professionals communicate with patients, families, and teams regularly. In cybersecurity, effective communication is important when explaining technical issues to non-technical colleagues or clients, and collaborating within the security team.
Estimated Time in Position to Gain Necessary Skills: Several years of experience (at least 3-4 years) as a healthcare professional can equip you with the understanding of healthcare regulations, critical thinking, problem-solving, and communication skills necessary for a role in cybersecurity.
Best Aligned Cyber Title: With the skills gained as a healthcare professional, a good entry point into the cybersecurity field could be as a Healthcare Information Security Analyst or Security Compliance Analyst. These roles would leverage their understanding of healthcare regulations and standards, and their analytical skills to safeguard sensitive health information.
Industry: Education
Role: Teacher (Math/Science)
Transferrable/Translatable Skills:
Problem-solving: A large part of teaching, especially in subjects like math and computer science, involves solving problems and encouraging students to develop their own problem-solving skills. This mindset is valuable in cybersecurity, where professionals need to identify vulnerabilities and mitigate threats.
Explaining complex ideas simply: Cybersecurity is a field that requires explaining complex security protocols and risks to non-technical people. Teachers, who often have to break down complex subjects for students to understand, have this skill in abundance.
Logical Thinking: Math and computer science teachers utilize logical thinking every day. This kind of structured thinking is crucial for understanding how a threat actor might exploit a system's vulnerabilities.
Estimated Time in Position to Gain Necessary Skills: Approximately 3-5 years of teaching experience can provide a foundation for a career in cybersecurity.
Best Aligned Cyber Title: With the skills gained as a teacher, positions like Cybersecurity Educator, Cybersecurity Awareness Trainer, or even roles like Security Consultant where explaining complex security issues to clients is a key part of the job, could be within reach.
Remember, roles within the education sector can vary greatly from one institution to another, and this is just one example. The key is to identify the skills you have developed in your role that can transfer into a cybersecurity position.
Industry: Software Development
Role: QA Engineer/DevOps Engineer
Transferrable/Translatable Skills:
Software and System Testing: QA and DevOps engineers are adept at testing for flaws and bugs in software and systems. This skill translates well into cybersecurity, where professionals are tasked with finding and fixing system vulnerabilities.
Understanding of SDLC: A comprehensive understanding of the software development life cycle (SDLC) helps cybersecurity professionals anticipate potential security issues at each stage of development and deployment.
Automation Skills: Proficiency in automation can be a huge asset in cybersecurity. This skill can be used to automate repetitive tasks and to create scripts for detecting abnormal activities, thereby increasing efficiency.
Estimated Time in Position to Gain Necessary Skills: 2-3 years in a QA or DevOps role can equip you with a substantial skill set to transition into cybersecurity.
Best Aligned Cyber Title: The experience and skills of QA and DevOps engineers can lead to roles such as Application Security Engineer, DevSecOps Engineer, or Security Analyst, where their understanding of software development and systems can be applied to secure them.
Allow me to get a bit personal here. Throughout my journey, I've encountered HR representatives that left a lot to be desired, but also those who were nothing short of spectacular, going against the tide to make real, impactful changes. A heartfelt shout-out to all the dedicated HR professionals out there - your work doesn't go unnoticed. Thank you!
Industry: Human Resources
Role: Human Resources Professional
Transferrable/Translatable Skills:
Data Management: HR professionals deal with a lot of sensitive data on a regular basis, making them aware of the importance of data protection and privacy, which are integral parts of cybersecurity.
Policy Development: HR professionals are often involved in creating company policies which can also include cybersecurity policies, such as those related to internet usage or handling of sensitive data. Their ability to understand, communicate, and enforce policies is a valuable asset in the field of cybersecurity.
Training and Awareness: HR often drives employee training, including security awareness training. Their experience in creating engaging training materials and conducting sessions would be beneficial in cybersecurity roles focused on user education.
Understanding People: HR's expertise in dealing with people can be beneficial in understanding the human element of security, including insider threats, social engineering, and fostering a security-conscious culture.
Estimated Time in Position to Gain Necessary Skills: Approximately 3-5 years of HR experience could provide a strong foundation for a transition into cybersecurity.
Best Aligned Cyber Title: With their background, HR professionals might find roles such as Cybersecurity Policy Analyst, Security Awareness Trainer, or even a Security Manager to be a good fit. The latter, particularly in a smaller organization, might involve a combination of policy, training, and incident response.

Continuing on!
One thing I want to emphasize is the subjective nature of a "good fit" in a cybersecurity role. What works for one person might not necessarily work for another, and vice versa. There's a notion that the grass is always greener on the other side, and while that might sometimes be true, it's crucial to remember that your career journey is all about you. It's about what you want, where your passions lie, and how you can use your unique skills to make an impact in the world of cybersecurity.
A previous colleague of mine, for example, was a teacher in their previous career. On the surface, this might not seem like an easy transition into cybersecurity. After all, they didn't have a background in programming, or any technical cybersecurity experience to speak of. But they had a gift for explaining complex concepts in a way that anyone could understand, and they used this skill to pivot into a role in Cyber Awareness Training. They now lead educational programs for their company, teaching employees about cybersecurity principles and best practices.
I tell you this story to underscore that there's no one-size-fits-all path into cybersecurity. This field is vast and diverse, with a multitude of roles that require a wide range of skills. Take a good look at your current job description and see how your skills might apply to roles within the IT or cybersecurity sphere. You might be surprised at what you find.
One trend you'll notice across the board, though, is the importance of problem-solving, and continuous learning. These elements are common threads running through many cybersecurity roles, and they're all skills that you can develop and refine over time, in any profession.
Remember, pivoting from a non-cyber role into an IT role is a significant step towards a cybersecurity career. Every step you take in this direction is progress. If you're eager to expedite this transition, consider getting a certification. It's by no means a mandatory requirement, but it could potentially make your journey smoother and more straightforward. I've provided an overview of various certifications that can benefit all industries, so take a look and see what piques your interest. The cybersecurity field is broad, and there's room for everyone.
CompTIA Certifications:
Security+: This is a global certification that validates the baseline skills necessary to perform core security functions and pursue an IT security career.
CySA+ (Cybersecurity Analyst): This certification applies behavioral analytics to networks and devices to prevent, detect, and combat cybersecurity threats.
PenTest+: This certification verifies that successful candidates have the knowledge and skills required to plan and scope an assessment, understand legal and compliance requirements, perform vulnerability scanning and penetration testing, analyze data, and effectively report and communicate results.
(ISC)² Certifications:
SSCP (Systems Security Certified Practitioner): Ideal for IT administrators, managers, directors, and network security professionals, the SSCP certifies you have advanced technical skills and knowledge to implement, monitor, and administer IT infrastructure using security best practices, policies, and procedures.
CISSP (Certified Information Systems Security Professional): This is a globally recognized certification in the field of IT security. The CISSP is ideal for experienced security practitioners, managers, and executives interested in proving their knowledge across a wide array of security practices and principles.
ISACA Certifications:
CISA (Certified Information Systems Auditor): This certification is for professionals who identify and manage business and technology risks through information systems audits. It's particularly relevant for those coming from an audit, finance, or risk background.
CISM (Certified Information Security Manager): The management-focused CISM is unique in the way that it prepares and enables an individual to manage an enterprise’s information security program. It’s a great fit for professionals in managerial roles or aspiring to them.
CRISC (Certified in Risk and Information Systems Control): This certification is ideal for professionals who identify and manage risks through the development, implementation, and maintenance of information systems (IS) controls.
EC-Council Certifications:
CEH (Certified Ethical Hacker): This is a professional certification for IT professionals to show they know how to find weaknesses and vulnerabilities in a system, much like a malicious hacker would, but in a lawful and legitimate manner.
Offensive Security Certifications:
OSCP (Offensive Security Certified Professional): This is a hands-on certification that covers penetration testing methodologies and tools. It's one of the more respected certifications within the cybersecurity community.
SANS GIAC Certifications:
GSEC (GIAC Security Essentials Certification): This certification is for security professionals who want to demonstrate they are qualified for IT systems hands-on roles with respect to security tasks.
GCIH (GIAC Certified Incident Handler): This certification focuses on detecting, responding, and resolving computer security incidents.
Now for some actionable principles you can implement now. Something you can do after reading this.
Start with Basics: Cybrary.it is a fantastic resource that offers a vast number of free courses on cybersecurity topics ranging from the basics to more advanced concepts.
Online Learning Platforms: Websites like Coursera, Udacity, and edX offer numerous cybersecurity courses. They also offer learning paths and nanodegree programs in cybersecurity. Although most courses are paid, they often provide the option to audit the course for free.
Hands-On Practice: Websites like Hack The Box and TryHackMe offer virtual environments where you can test your hacking skills legally and safely. They're a great way to get hands-on experience.
Join the Community: Reddit has several subreddits (like r/cybersecurity, r/netsec, r/AskNetsec) where you can join in the conversation, ask questions, and learn from more experienced professionals.
Open Source Contributions: Contributing to open-source cybersecurity projects on platforms like GitHub can help you gain practical experience. It's also a great way to demonstrate your skills to potential employers.
Reading Security Blogs & Reports: Regularly reading cybersecurity blogs (like Krebs on Security, Schneier on Security, Dark Reading, etc.) and reports (like Verizon's annual Data Breach Investigations Report) will help you stay up-to-date with the latest trends and threats.
Cybersecurity News: Websites like The Hacker News, Threatpost, or CyberScoop will keep you updated on the latest news in the cybersecurity world.
Certification Preparation: If you plan on getting a cybersecurity certification like CompTIA Security+, CISSP, or CISA, websites like Professor Messer (free video lessons), Cybrary (free and paid courses), and CCCure (practice quizzes) can help you prepare.
FRIDAY FUN: Hey Readers, let's slow the tempo and take a breather as we transition into the weekend.
Book Recommendation:
Considering a quiet weekend with a good book? Check out "Thinking, Fast and Slow" by Daniel Kahneman. This fascinating exploration into the two systems that drive the way we think—fast, intuitive thinking, and slow, deliberate thinking—is a compelling read for anyone interested in understanding the mechanics of decision making.
Movie Recommendation:
Looking for some weekend viewing? Check out "Sneakers" (1992). This classic tech-heist film stars Robert Redford, Sidney Poitier, and River Phoenix as a group of security experts who find themselves drawn into a dangerous plot. While a bit dated, it's still a fun romp and a must-see for any cybersecurity enthusiast!
And now, to wrap up your Friday with a dash of whimsy and a pinch of the unexpected, I've crafted a trio of haikus for your enjoyment. I must say, the process of piecing together these petite poems has been an absolute riot! Here they are for your reading or cringe pleasure….
In the hush of dawn,
Steel meets silence, mind meets heart —
Ghost's dance with the wind.
Stars gleam in night's cloak,
Paths untrodden call to us —
Adventure awaits.
In the eye of truth,
Unyielding, stands honor's heart —
Echoing in deeds.
Rushing rivers roar,
Unseen, precious moments flee —
Stillness holds the key.
Leaves fall, seasons shift,
In change, life's hues are unveiled —
Nature's art in time.
That’s all and take care I’ll let next weeks topic be a surprise, but don’t let that stop you from headed over to the twitter page for direct feedback on what you’d like to see!