How To Get Into Cyber Security: Tips, Strategy And Skills

When Italy native Angelica Marotta '17G graduated from the University of Pisa with a bachelor's degree in computer science, she wasn't sure where she wanted her career to take her.

She received multiple job offers, but still felt she hadn't found her true professional identity. That is, until she discovered cyber security.

To break into the field, Marotta knew she needed to learn more. She searched for a program to meet those needs and found Southern New Hampshire University (SNHU) fit the bill. 

The online programs allowed her as an international student to continue working in Italy and earn a cyber security-focused graduate certificate and master’s degree. 

Today, she's a researcher in the field both in Italy and with MIT's Sloan School of Management, exploring how businesses around the world are implementing IT security practices.

"In cyber security, you may face issues that didn't even exist when you started studying this particular subject," said Marotta. "It's likely that you’ll find yourself working on something you’d never expect."

Marotta is just one of a fast-growing group of new cyber security workers. According to the US Bureau of Labor Statistics (BLS), cyber security jobs are projected to grow about 28% by 2026, a rate that far outpaces other careers. Median pay for these roles was $95,510 in 2017.

SNHU graduates, instructors and career advisors shared tips and strategies that can help you get started on a cyber security career path.

What Is Cyber Security All About?

As a cyber security worker, you could help create and enforce IT security policies to protect against cybercrime.

A cyber security job description may also include working with an organisation to ensure compliance with government regulations. You could even be hired to hack into companies' software and IT infrastructure to help identify and strengthen areas of vulnerability.

Cyber security is a fast-growing field with diverse opportunities available. No matter what cyber security career path you take, you'll need specific skills and training to succeed.

Is Cyber Security a Good Career?

As more individuals and organisations around the world become dependent on technology for their day-to-day operations, cybercrime has also become more common, from identity theft and phishing schemes to computer viruses and data breaches.

Two-thirds of people online, more than 2 billion individuals, have had their personal information stolen or compromised, according to a 2018 report from IT security company McAfee. 

Approximately 300,000 new viruses are introduced by cyber criminals every day, with cybercrime costing the world $600 billion annually, the report found.

It’s no surprise, then, that cyber security jobs are also on the rise. The need for skilled workers in the field is so high, the nonprofit ISACA predicts there will be a global shortage of 2 million cyber security professionals by 2019, according to a 2017 Forbes article.

"An employer told me, ’It is not a matter of if you will be hacked – it is WHEN will you be hacked,’” said career advisor Caitlin Glennen. “Because of this, companies cannot hire enough people with cyber skills."

Consider Your Cyber Security Career Interests

When getting started in cyber security, consider your interests and ideal work environment to determine an area of specialization.

"Today, computers and digital media are everywhere," said adjunct instructor Rodney Royster, a senior cyber security manager. "Almost every business or industry you can think of operates within this space. So, in short, a cyber security degree holder can work everywhere. The question here should be, where can they not work?"

Cyber security analysts are in high demand across many industries, Royster said, including healthcare, manufacturing, financial services, law enforcement, transportation and power and utilities.

Job descriptions vary within the field of cyber security itself, Royster said. You could work as a forensics analyst, helping investigate cybercrimes and trace the activity of cyber criminals. You could also work as a security architect, building and testing digital protections for IT infrastructure. Those roles could lead to chief information security officer, leading a team of analysts to set company IT security policy.

Ready to take a deeper dive? Cyberseek.org provides detailed information about supply and demand in the cyber security market. It offers an interactive map showing where the jobs are and an interactive career pathway, with common jobs by title, how to get there and what average salaries are. 

Is Cyber Security Hard to Learn? Explore Degree Options

Getting started in cyber security requires foundational knowledge of IT practices, computer technology and math. Luckily, there are a growing number of options for cyber security education.

Up to 88% of job postings seek at least a bachelor's degree in cyber security or IT, according to a 2018 analysis by Burning Glass, while a cyber security master's degree could help you specialise in a specific area of the field. 

No matter what your educational career path, it's important to have a strong understanding of basic IT principles, practices and tools, said adjunct instructor Gary Asp, a senior security and compliance analyst.

"In order to really be effective as a security professional, you have to have a firm understand of the technology you’re talking about," Asp said.

For Cyndie Ramirez '18, a cyber security degree program not only helped her land a security analyst job before graduating, it also inspired her ultimate career goals.

Ramirez was working on an associate degree in computer networking when she first discovered a love of cyber security. While she was initially nervous to enter what she saw as a mostly male field, a professor encouraged her to explore her interests further, an exploration that eventually led to a cyber security bachelor's degree from SNHU and a full-time job in the field.

"I found myself fascinated with trying to build networks secured in every way possible, so intruders could not gain access," Ramirez said. "I then knew right away I wanted to gain my bachelor's degree to be the front-line team that investigates intrusions and helps mitigate them."

Seek Hands-On Cyber Security Experience

A cyber security degree is an important step toward your IT security career, but gaining hands-on experience can be just as powerful when it comes to finding a job in the field.

"Breaking into the industry is going to require you to dedicate yourself to gaining experience alongside your education," Glennen said.

Finding an internship or getting involved in a student organization is a great way to get real-world experience, build your professional skills and make key connections in the field.

Kristina Greenshields '18 said her participation with the National Cyber League (NCL), a non-profit that provides a virtual training ground to develop cyber security knowledge, was instrumental in preparing her to find work as a cyber security specialist. 

"Without my advisor pushing me to join (the NCL) I wouldn’t have had the confidence I had to talk to people about cyber security in interviews," Greenshields said. "It gave me the hands-on experience that I needed in conjunction to my degree classes."

Earn Cyber Security Certifications to Enhance Skills

Another way to enhance your cyber security resume and stand out among qualified applicants is to earn IT security certifications.

There are many cyber security certifications available from a variety of organisations and institutions, Royster said, as well as free online certification courses and tools. Certifications improve and test your knowledge in specific areas of the cyber security field, and ensure prospective employers of your skills and expertise.

Be sure to do some research into your certification options. While some cyber security certifications are designed for entry-level workers just getting started in the field, others require years of professional experience and may even be paid for by your employer. 

Don’t Overlook Soft Skills

When it comes to finding work in IT security, soft skills may be just as valuable as technical skills like coding and math.

Cyber security often involves working within a team of IT analysts, company leaders and other employees to ensure security protocols are followed, requiring strong communication, project management and problem-solving skills, said Asp.

"A lot of what you do in IT is building relationships," said Asp. "Good communication is 80% listening and 20% talking. That helps build those good relationships because the people that you're communicating with feel heard, which opens the pathways for good collaboration. And you absolutely need collaboration for good IT security."

Never Stop Learning

Hackers and other cyber criminals don't stop trying new ways to infiltrate IT infrastructure. As a cyber security worker, you can't stop either. A commitment to continuing education is key to ensuring your success in the IT security field.

"In general, one can expect that there will be new threats each day," said adjunct instructor Dr. Trebor Evans, a chief information security officer. "In cyber security-related positions, what you guard against in the morning could be different from what you have to learn about and guard against later that same day."

Success in cyber security also requires creativity and a willingness to stay up to date with industry news and trends.

"Working in cyber security means that you have to continuously educate yourself," said Nalisha Varnado '18, a senior cyber security analyst. 

"Hackers are always going to try to find ways to avoid being discovered by security professionals and software developers. Hackers find new vulnerabilities often and it is important to stay up to date with the current exploits that are being discovered in the community."

The Future of Cyber Security

Cyber security job growth shows no signs of slowing down as businesses, organisations and individuals continue to gain access to more advanced technology and technology also becomes more pervasive in our everyday lives.

As our reliance on technology grows, from the phones we carry and the cars we drive to the way we shop, get entertainment and even access medical care, so will our need to protect personal data and IT infrastructure.

A career in cyber security means you can be on the front lines of protecting technology, and the people that use it.

"Cyber security is not just about technology and systems, it's mostly about people," Marotta said. "This work stems from people and affects people, and it's a great way to figure out why people do things and how they can be protected... It allows you to impact society."

SNHU:

You Might Also Read:

Want A Career In Cybersecurity?

The Five Most In-Demand Cybersecurity Roles

« The UK Will Be Hit By A Category One Cyber-Attack
What Is Blockchain Technology? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

DCL Search & Select

DCL Search & Select

DCL Search & Selection connect candidates to the best companies in the IT Security, Telco, UC, Outsourcing, ERP, Audit & Control markets.

APWG

APWG

APWG is the international coalition unifying the global response to cybercrime across industry, government, law-enforcement and NGO communities.

Daon

Daon

Daon offers a universal biometric authentication platform for mobile devices.

Sintef Digital

Sintef Digital

Sintef Digital carries out research in Information and Communication Technology for industry and the public sector.

SecLytics

SecLytics

SecLytics is the leader in Predictive Threat Intelligence. Our SaaS-based Augur platform leverages behavioral profiling and machine learning to hunt down cyber criminals.

Cyberteq

Cyberteq

Cyberteq is an innovative Information and Communication Technology Consulting Company, enabling it’s customers to take full advantage of the latest technologies in a secure manner.

Bio-Morphis

Bio-Morphis

Bio-Morphis Reflex solution is a paradigm shift in the approach to information systems security.

DDOS-Guard

DDOS-Guard

DDoS-GUARD is one of the leading service providers on the global DDoS protection and content delivery markets.

Blaick Technologies

Blaick Technologies

Blaick is an Israeli cyber-security company which deploys proprietary Artificial Intelligence threats detection technology for early prevention of online cyber crime.

Hackuity

Hackuity

Hackuity is a breakthrough technology solution that rethinks the way of managing IT vulnerabilities in enterprises.

Riskonnect

Riskonnect

Riskonnect technology empowers organizations with the ability to anticipate, manage, and respond in real-time to strategic, operational, and digital risks across the extended enterprise.

Epoch Concepts

Epoch Concepts

Offering a full line of IT services, solutions, and integration capabilities, Epoch Concepts is the trusted partner of the US military, federal agencies, private enterprises, and systems integrators.

Purple Team

Purple Team

Purple Team is an expert cybersecurity and managed security service provider focused on arming your IT infrastructure with both red team and blue team services.

Red Helix

Red Helix

Red Helix (formerly Phoenix Datacom) is a market leader in network performance and cyber security.

Invictus International Consulting

Invictus International Consulting

Invictus International Consulting are a recognized leader in full-spectrum cyber technology solutions designed to protect the security of our nation's global defense and critical infrastructure.

Softanics

Softanics

Softanics’ ArmDot protects .NET apps with advanced obfuscation, control flow protection, and virtualization, securing code against reverse engineering without requiring agents or environment changes.