Roadmap For Success Cybersecurity Ebook
Roadmap For Success Cybersecurity Ebook
California Institute of Arts & Technology is committed to personalized training through comprehensive,
innovative, and high-quality vocational programs that prepare students for a rewarding profession in growing
career fields. CIAT has served over 3,000 students since opening our doors. We keep our class sizes small so
that each of our students get the personalized attention they need to succeed in our programs. At CIAT you’re
more than just a number. Our team supports you through your entire journey from your first day of class to
landing your dream job and beyond.
2
2
Table of Contents
Title page 1
Mission Statement 2
Table of Contents: 3
Flexibility, reliability, and understanding when working in cybersecurity are essential for all 6
candidates.
Women In Cybersecurity 9
Higher Education 10
FAANG 10
The Rapid Adoption of the DevOps Culture to Support Digital Transformation Initiatives 15
Be a Member of a Scrum 15
Learn to be a Scrum-Traveler 15
3
3
Cybersecurity Jobs - Top Career, Salaries, and Education Options 16
What are the Most Common Entry-level Jobs in the Cybersecurity Field? 18
Advanced Certifications 21
Public-Private Partnership 23
4
4
How to Apply for a Job in Cybersecurity 27
Network 28
Be patient 28
Career Planning 29
ACKNOWLEDGMENTS 30
5
5
What Are Employers Looking For
In a Cybersecurity Candidate?
Congratulations! You’re ready to start working as a cybersecurity professional. You’re responsible for
protecting the organization’s data and networks by installing and maintaining security systems. The
ability to react quickly to any security breaches in the network and keep an eye out for network and
application problems is critical all anyone becoming a cybersecurity candidate.
Are you ready to learn about programming, networking, and security operations? These skills will help
you secure your company’s network. As a cybersecurity professional, you will continuously evaluate
organization's security needs and make recommendations.
Depending on the organization’s needs, you could implement new security standards and best
practices or ensure the company maintains updated security and assurance policies. Security
breaches, inside data exfiltration, and external hacking are daily business problems. Students wanting
to become “cyber warriors” should consider what it takes to become a valuable resource for their
organization before starting this journey.
Recent university
graduates are well prepared for
27% the cybersecurity challenges
their organization is facing.
isaca.org
Flexibility, continuous education, and being a scrum member are critical components to success in
cybersecurity. Organizations will change their products, services, and locations based on cybersecurity
breaches and ongoing threats. Candidates need to have that mindset before entering this field.
Additional attributes include:
6
6
Read - Knowledge of Watch Youtube Videos - Attend Online Virtual Events
security models, penetration Classes of attacks, diagnos- - Career in cybersecurity,
testing, encryption, and tic tools, and networking cybersecurity Programs, and
research past cyber-attacks. concepts. vendor presentations.
Security vendors are constantly refreshing YouTube and other online content. Blogs, whitepapers,
and ebooks get released each week.
The candidate is encouraged to bookmark specific vendors, industry groups, and experienced cyber
warriors. By following their blogs, candidates can pick up a first-hand account of a security breach or
hear about the latest email security and encryption.
7
7
Top Employers Hiring Qualified
Cybersecurity Candidates
CYBERSECURITY JOB MARKET IN 2022-2023
Cybersecurity expertise is a highly sought-after technical skill. With threats like phishing, ransomware,
data breaches, and cyberattacks, businesses need cybersecurity engineers to help protect their
networks.
According to the Bureau Of Labor Statistics, a career in cybersecurity is expected to increase by 33%
from 2020 to 2030—much faster than the overall average for all occupations. Cyber-attacks increase
in frequency, and cybersecurity analysts are expected to become increasingly important to help
companies develop innovative solutions to stop hackers from stealing critical information or causing
problems for their computer networks.
There were 1 million unfilled cybersecurity jobs in 2013. By 2022, there would be 3.5 million unfilled
cybersecurity jobs still seeking qualified applicants. Since the dot-com bust, the demand for
cybersecurity professionals has been this high for the first time.
Employers are struggling to find qualified cybersecurity professionals. Employers in the United States
currently employ less than half the number of cybersecurity candidates they need to meet their
current demand. There are now 48 qualified candidates for every hundred cybersecurity jobs posted.
1 in 5
say it takes more than 6 months to find qualified cybersecurity
candidates for open positions.
Women In Cybersecurity
8
8
Higher Education
A Bachelor’s Degree in cybersecurity can lead to many entry-level job opportunities, such as
cybersecurity analyst, information security specialist, and penetration tester. Annual median salaries
range from $75,000-$100,000.
Bachelor degree programs like the Applied Bachelor’s in Computer Information Systems -
Cybersecurity Concentration provide the foundational training for those new to tech or early-stage
IT professionals with a prior degree but need industry certifications. Earning a CIS Bachelor's
Degree is a definitive way to show potential employers that you have specialized expertise in
hardware and software support, networking, cybersecurity, and cloud administration. Cybersecurity
professionals need to demonstrate a wide range of technical skills, from hardware and software
management to network security, and this program prepares students for entry-level cybersecurity
careers, starting with the CompTIA Security+ certification.
Washington, D.C.
Top US Cities for Cybersecurity Positions New York, NY
Chicago, IL
Arlington, VA
San Diego, CA
Atlanta, GA
Charlotte, NC
Boston MA
Detroit, MI
Los Angeles, CA
Santa Clara, CA
Portland, OR
Austin, TX
9
9
Top Employers -
United States (Cybersecurity):
Every organization needs cybersecurity resources. If the company uses email, web content, and
online platforms for clients to access products and services, they need a cybersecurity team. Security
vulnerabilities, cyber threats, and digital attacks impact employers.
Employers from 5 people to 100,000 continue recruiting cyber security engineers to help support
DevOps, SecOps, NetOps, and AppDev teams. Many organizations outsource critical IT and secondary
roles because they lack candidates and experienced personnel. Relevant experience in data analytics,
problem-solving skills, and hands-on experience are a plus.
Job Roles: Cybersecurity Engineer, Network Security Engineer, Software Engineering, Penetration
Testing Engineers, Application Security Engineers
Adding Cloud Architects, Sales, Marketing, SecOps-DevOps-Netops, Incident Response, Product
Roles: Engineering, Customer Success, Partnership Manager, IT Helpdesk, Security Analyst
Employers Include:
• Facebook FAANG
• Amazon Web Services
• Apple
• Netflix
• Google
Public Sector:
State / Local Govt, Higher Ed:
• County of Los Angeles – Los Angeles California • George Mason University (VA)
• County of Orange – Orange California • University of Texas
• University of California – Sacramento California • Northwestern University
• The University of Chicago • University of California San Diego
• University of Southern California • State of Virginia
• Arizona State University • State of California
• University of Oregon • State of Florida
10
10
Global Telecom-
Service Providers:
• Level 3 Communications – Denver Colorado
• Cox Communications
• AT&T
• Verizon
• Sprint/TMobile
• Qualcomm
• Broadcom
Global Defense
(Clearance):
• General Dynamics Information Technology
• Leidos
• CACI
• General Atomics and Affiliated Companies
• Northrop Grumman
• BAE Systems
• VIASAT
• SpaceX
• Trustwave
• Raytheon
• SAIC
Global Financial
Fintech:
• PricewaterhouseCoopers LLC
• Bank of America
• Mellon Bank
• CitiGroup
• LPL Financial
• Intuit
• American Express
• Charles Schwab
• Wells Fargo
• Union Bank
• Capital One
• Loan Depot
11
11
Emerging Markets –
Growth Sectors:
• Marriott International
• Resmed
• Dexcom
• Calloway Golf
• Illumina
• Marathon Oil
• Halliburton
• Delta Airlines
• HomeDepot
• Coca-Cola
• Duke Energy
• Capital One
• Ford Motor Company
• Rivian
• Starbucks
12
12
What Are DevOps, NetOps, AppDev, & SecOps?
United States (Cybersecurity):
DevOps environments play a crucial role for software developers and systems administrators, while
NetOps is a DevOps-influenced approach to networking. Both create greater business agility, improve
the digital experience for clients, and faster adoption of public clouds.
DevOps creates a fast and efficient application development cycle, while NetOps supports those apps’
speedy and effective deployment. Organizations combine both groups to partner and leverage similar
automation tools to streamline product development in less time.
DevOps rapidly has become the next business model for organizations process for better app delivery,
software solutions revenue growth, and operational transformation.
Application Layer
Application VIP of
Application Developer
Manager Applications
Presentation Layer
Session Layer
Security
Security Engineer CISO CIO
Manager
Transport Layer
Network Layer
Network
Network Engineer
Manager
Data Link Layer IT Director
13
13
Traditional IT workflows categorize resources as network infrastructure and architecture design team
personnel, including the “network engineer” or “security manager.” Roles like automation architects,
scrum leads, and service delivery managers did not exist. Legacy IT structured its resources more
around the OSI model. DevOps shifted the thinking toward a collaboration workplace or “scrum” team.
DevOps, SecOps, and NetOps agility became a horizontal model built on common workflows running
in parallel compared to waterfall methods that relied on business functions before the next task could
be completed.
SecOps/DevOps AppDev/SecOps
Resource Travelers Resource Travelers
IaC helps organizations with their digital transformation journey through developing modern
applications based on agile development, not a waterfall framework. Greater performance of
applications and application protection is recognized early in the development cycle under DevOps
agility. Security functions become enabled at each stage of development instead of at the end of the
creation cycle.
By shifting networking left in the continuous integration continuous delivery (CI/CD) pipeline, NetOps
helps increase efficiency in the software development lifecycle (SDLC) and minimizes late-stage
deployment problems.
14
14
Well structured for its time, this model proved to lack the flexibility to adjust to the changing business
climate. Each department would only focus on their part of the “stack” and quickly pass responsibility
to other groups.
Change control became a struggle for organizations within the traditional IT stack. Simple changes
require downstream and upstream communication, testing, and production validation. Often, a small
application change could require a significant firewall change or a network topology costing the
company money and time. In many cases, simple delays could take months to execute.
After 2008, when cybersecurity events became daily business impacts, companies needed to become
flexible, nimble, and quick to react to stay up with the competitive market and hackers.
Everything about DevOps changed the company’s culture around information technology operations.
Learn To Be A Scrum-Traveler
Travelers are subject matter experts with
tuleap.org experience in specific domains. These
experts move between various scrum teams
and support multiple projects.
Candidates become valuable to any organization through continuous learning, experience, and
collaboration. Being a scrum-traveler helps organizations leverage their talents between various
components within the Agile development model. In one week, the scrum-traveler could be at the
front-end of a new project sprint cycle providing expertise in security within a Microsoft platform. The
following week, the traveler could be involved in several sprints around the quality assurance of a
new solution. Every investment in learning cybersecurity will pay off for each candidate. The more the
candidate invests in knowledge, the more significant opportunity to serve the organization.
15
15
Both reported to a scrum leader. Scrum leaders would be accountable for the project’s success and be
responsible for sprint execution.
All cybersecurity current and future professionals should be well-versed on each OPS term and their
relationship to each other. Gone are the days of silo IT and waterfall methodologies. The future of IT is
DevOps, SecOps, NetOps, NetSecOps, and DevSecOps.
Cybersecurity Jobs -
Top Career, Salaries, and Education Options
The role of a cybersecurity warrior is comprehensive and exciting. Industry trends show a
considerable demand for several cybersecurity roles. Cybersecurity analysts, cloud architects, and
network security professionals are some of the most sought-after candidates.
A degree in cybersecurity provides many options for candidates to move laterally within the industry.
Many cybersecurity candidates start as network engineers, eventually moving to a security architect
role or an information security manager. Finding cybersecurity talent is a challenge for every industry
to help fill many cybersecurity job openings that go unfilled over time due to the lack of available
candidates.
Cybersecurity experts are pivotal in every organization’s success. A secured network, applications,
and cloud systems are financially and economically critical. Many companies seek out corporations
that are secure, audited, and proven to be compliant with privacy and data security mandates.
16
16
The Career Outlook for Cybersecurity Positions
Depending on the position and employer, the education requirements for this profession usually include
a bachelor’s degree like an IT degree, computer science degree, or information assurance degree.
Many security administrators gain professional experience through entry-level IT support jobs. Earning a
certification can significantly improve career prospects.
Cybersecurity careers are like other professions: people most likely to succeed are the ones that
possess specific job skills. Specific skills in the field of cybersecurity are undoubtedly valuable for
anyone aiming to thrive in a cybersecurity career.
However, that doesn’t mean individuals should give up on cybersecurity career paths if they don’t have
all the capabilities yet. Before applying for jobs in cybersecurity, the candidate should consider their
education, certifications, and experience. Each candidate should possess relevant knowledge and skill
sets:
Analytical skills
Security incident analysis - attack tool analysis - critical thinking
Technical Skills
Determining Security Weaknesses - Understanding security protocols
Communication Skills
Communicating events throughout the organization
Presentation Skills
Document and present all security issues, events, and breaches to internal stakeholders.
Patience
Cybersecurity is dynamic. You must be patient with your career. Opportunities spawn every
day. Companies continue to struggle to retain top talent, and demand for cybersecurity warriors
continues to increase. Security training is constant in the cybersecurity job market.
17
17
Understand the difference between Agile and Waterfall Application
Development
The main difference is that Waterfall is a linear working system requiring the team to complete
each project phase before moving on to the next one. At the same time, Agile encourages the
team to work simultaneously on different project stages.
What Are the Most Common Entry-level Jobs in the Cybersecurity Field?
A cybersecurity candidate has several entry-level positions to apply for. Each role is in very high
demand by companies, governments, and education institutions.
Cybersecurity Analyst
It is highly recommended for candidates that start as desktop security analysts wanting to move
up to a more significant challenge and more responsibility.
18
18
Cloud Security Architect
The candidate should have at least two years of experience in cloud engineering, operations, and
automation. The candidate should complete the AWS cloud architect certification and Microsoft
Azure credential.
Cybersecurity Manager
An analyst or manager is in charge of protecting the confidentiality and integrity of data, whether
in storage or transit.
Penetration Tester
Often referred to as Penetration Testing experts or Vulnerability Testers, these ethical hackers
conduct frequent security tests across systems, networks, apps, databases, and your virtual
infrastructure to identify potential vulnerabilities that cybercriminals can exploit.
Many compensation packages will include a salary, bonus program, stock options, 401K, medical/
dentist, education reimbursement, and mileage expense.
19
19
What Is the Expected Annual Salary Expectation?
According to the U.S. BLS, the number of jobs in the network and computer systems administrators
category is expected to grow by 5 percent by 2030.
The average salary of a Security+ certified professional is $115,170 in the U.S. and 106,910 worldwide
(Certification Magazine 2022 Salary Survey). Of course, pay depends on many different factors and,
including degree status and industry experience.
The average yearly salary for a professional with CompTIA Security+ certification according to
PayScale, in the United States, is $78,000.
IT Engineer
Salary is $81,820 per year Source: CompTIA
20
20
Importance Of Cybersecurity
Certifications and Industry Consortiums
Cybersecurity is one of the most crucial areas for ensuring
a business’s success and longevity. With cyberattacks
growing in sophistication, it’s essential for business owners
to protect their companies by hiring qualified cybersecurity
professionals to protect their company assets. Candidates
with certifications in information security and cybersecurity
with relevant work experience will have many options in
the profession.
Becoming part of the growing cybersecurity workforce as a security specialist is full of lifelong choices
of opportunity. From being a penetration tester to a role in cybersecurity management, the decision for
a candidate to follow a cybersecurity career will be rewarding for years to come.
Here we will break down the top certifications and other guidance you’ll need to make the right
decision. This will serve as an excellent primer for individuals embarking on a cybersecurity career.
Basics of Cybersecurity
Certifications are an essential part of any career in information security. They’re
also a good way for employers to identify potential critical hires for their
cybersecurity positions.
There are specific and very generic cybersecurity certifications. You can get certified to perform
a particular job, work with certain products, or be employed by a company. Broad certificates
are relevant across job roles and industries and usually enhance someone’s existing career.
Most certifications require ongoing training, such as the Certified IT Security Professional (CISSP)
certification, which requires recertification every five years. The CISA certification must be updated
every three years.
Accredited organizations provide cybersecurity certifications that follow and maintain a certain level
of industry-accepted standards. Certifications are valued because they are accepted by IT industry
accrediting bodies and government agencies that set criteria.
21
21
Why Do You Need a Cybersecurity Certification?
The global cyber security market is forecast to expand at a compound rate of 10% a year through 2027,
which means new jobs — and fierce competition for those high-paying jobs as more and more people
try to get into cybersecurity. Every financial, healthcare sector, risk management, and government
organization seeks certified professionals to help fill the many cybersecurity job openings.
Certification holders with a solid educational background in cybersecurity will show prospective
employers they are ready for the challenge. So ask yourself: Where do you see yourself in three
years? Do you want to focus on a company’s security infrastructure, or do you want to be on the front
lines? Or perhaps you want to be an auditor or pen tester, ensuring current systems work as they’re
supposed to. For executives, maybe you just want a proper understanding of the systems supporting
your company.
As for difficulty level, certification exams range from moderate to challenging, depending on the
material and type of certificate. For example, the highly technical Certified Ethical Hacker certification
requires months of study and years of cybersecurity experience. At the same time, an entry-level
certificate like Microsoft’s Technology Associate Security Fundamentals might only call for a good
general knowledge of computing and how programs and computer networks operate.
These certifications help round out areas of expertise, educate people about new technology and
industry methods, and develop domain expertise. Most major cybersecurity certifications fall into this
category.
As each candidate decides on which domain within cybersecurity they wish to pursue, the following
certifications are recommended:
CompTIA Sec+
Amazon Cloud Security Architect
CEH - Certified Ethical Highly recommended for candidates pursuing
Hacker a career as a cloud security architect. This role
focuses on building, designing, and installing
AWS Security Specialty
security systems for cloud-based computing and
Microsoft Azure Security Engineer data storage systems.
22
22
CISSP
Certified Information Systems Security Professional (Highly recommended after the candidate has
at least two years of practical experience in a cyber security role.
SANS GIAC
The GIAC Security Expert (GSE), recently ranked the highest-value certification in the industry, is
widely recognized as one of the most challenging and meaningful credentials in cybersecurity
CISM
Certified Information Security Manager - Highly recommended if the candidate pursues a career
path towards IT or SecOps management.
CISA
Certified Information Security Auditor - Highly recommended if the candidate considers a career as
an internal or external IT auditor.
CCNA
Cisco Certified Network Associate - Recommended for all candidates to demonstrate basic
knowledge of networking principles.
CCNP
Certified Cisco Networking Professional - Highly recommended for candidates with one year of
experience in networking, security operations, or cloud services.
MCAA
Microsoft Certified Azure Architect -Microsoft Certification validates your abilities to stay current and
perform in job roles for a modern digital business. Ninety-one percent of certified technical experts
believe that the effort employees put into acquiring new skills contributes to their success.
23
23
Top Cybersecurity Industry Usergroups and Consortiums
The cybersecurity market host several industry user groups, consortium, and conferences. Many of
these user groups are specific to particular domains and areas of interest within the cybersecurity
consortium.
Here is a list of regional and national groups all candidates should participate in:
CompTIA
The Computing Technology Industry Association
ISSA
International Systems Security Association (regional and national)
WiCYS
Woman in Cybersecurity
WSC
Woman’s society of CyberJutsu
ACIC
Automotive Cybersecurity Industry Consortium
ISACA
Information Systems Audit and Control Association (regional and national)
RSA Conference
Yearly conference - a global industry consortium.
SANS.Org
SANS focuses on continuous certification and learning for cyber professionals.
ISC2
(ISC)² was founded in 1989 as the International Information System Security Certification
Consortium, Inc. Our founders saw the need for standardization and certification in the
cybersecurity industry. Since then, our founders and members have been shaping the information
security profession.
AISP
Association of Information Security Professionals
24
24
How To Develop
A Successful Career in the Cybersecurity Field
Cybersecurity jobs continue to grow as more regulation and security incidents impact people’s lives.
As technology continues to become an integral part of our daily lives, it’ll be essential to protect
the technology that makes it possible. The cybersecurity industry suffers from a lack of qualified
candidates to deal with the constant attack on organizations’ security systems and assets.
Cybersecurity is in every facet of a life well beyond the board room.
It’s no wonder many analysts regularly identify cybersecurity
threats as one of the top two issues facing business today—
failing to keep data security risks, fines from government
entities, and damage to reputations. Security professionals at
all levels not only know the most current security concepts and
industry trends, but they also know the most recent privacy and
security regulations. For example, the new California Consumer
Privacy Act of 2020, which gives consumers more control over
their data, went into effect on Jan. 1, 2021. When a security
incident occurs, companies are often fined, executives are
fired, customers may leave, and an organization‘s reputation
takes a hit. Cybersecurity experts help companies avoid the
headaches of a cyberattack by keeping their security strategy
and operations up to date.
Organizations will change their product offerings, services, and locations based on cybersecurity
breaches and ongoing threat assessments.
How do you stay up with the constant change in cybersecurity?
To start, you’ll want to develop good work habits, including the capacity to work methodically (in a
detail-oriented manner).
The following critical skills also come in handy:
Flexibility
Continuous education
Being a scrum member
An eye for integration skills.
Any good cybersecurity professional knows how to holistically examine a company’s security setup,
including threat modeling, specifications, implementation, testing, and vulnerability assessment.
They also understand security issues associated with operating systems, networking, and virtualization
software.
25
25
Knowledge Gained Is Knowledge Earned.
Organizations will create new jobs for cyber security engineers based on needs following a security
attack. Cybersecurity positions within organizations are not static.
Knowledge of Risk Management - Foundation Skills in risk, compliance, and auditing helpful
Knowledge of Network Security - Hands-on experience helpful
Knowledge of Network Protocols - Relevant Experience in Network protocols and ports
Understanding of incident Response - Analytical skills helpful
Knowledge of Intrusion Detection - Technical background in IDS, IPS, and Host-based helpful
Understanding of System Administration - Background in Security Concepts helpful
Knowledge, past experiences, the latest educational investments in workshops, and attending lectures
will all bring value to the candidate:
Accepting the concept of trial and error is critical for any cybersecurity candidate. Like other career
paths, many people in the early days of cybersecurity did not attend a formal school to learn the craft.
Many early practitioners learned cybersecurity by picking up a manual or learning as they went along.
In the late 1990s, the idea of a firewall looked more like an extended access control list on a Cisco
router. Setting up a firewall looks similar to loading a server application in a single computer device
with two cables coming in and out—one for the “clean” and the other for the “dirty” network. There was
no formal education around deploying firewalls, not even a youtube video.
Technology is far from perfect. Configuration mistakes happen daily to SecOps, DevOps, and NetOps
team members. Sometimes, these mistakes aren’t recognized for several months after deployment.
When things do break, and they will, a good cybersecurity professional will focus on experience,
knowledge of the product, and remember the fundamentals of all solutions; they will break, and
rebooting doesn’t always fix the problem. Solving the problem through trial and error for the
cybersecurity professional is a good thing. Sometimes, there are many ways to solve a cybersecurity
issue. Multiple team members from DevOps, SecOps, and NetsOps will often collaborate to develop
options to solve the problems. Together, the teams learn from each other.
Many cybersecurity professionals are driven to learn about the daily applications, systems, and
networks they protect. More often, a SecOps, DevOps, or NetOps person will volunteer their time in
other parts of the information technology to gain more knowledge of the organization’s digital
26
26
landscape. Some will block out time on their weekly calendar to help out in the IT helpdesk helping out
with trouble tickets. Some cybersecurity team members will volunteer to help with weekend network
cutovers or system upgrades. The cybersecurity professionals will learn more about the organization’s
technology environment and become more well-rounded teammates to others in the IT department.
The applicants must be honest and assess their cybersecurity skill set, education, and career
expectations. Cybersecurity is no different.
Seek mentors to help build the three positions’ shortlist and advise which companies will most
likely be hiring. The field is filled with experienced cybersecurity professionals who love to
mentor others.
Landing the first role in cybersecurity is only the start. Experienced cybersecurity warriors did not
start as senior incident directors on day one. The journey within cybersecurity is dynamic.
What Do All Candidates Need to Have Ready Before Applying For a Job?
Understanding Industry Terms:
All applicants should be well versed in industry terms and acronyms for cybersecurity. These
acronyms for cybersecurity roles include:
27
27
SecOps - Security Operations and Security Engineering
NetOps - Network Operations and Network Engineer Role
DevOps - System Operations and Software Developers
APPDev - Application Development and Software Engineering
CISSP - Certification Information Systems Security Professional
Another critical component in the journey in the cybersecurity job market is earning advanced industry
certifications. CompTIA Security+, Cisco CCNA, and Microsoft Azure fundamentals should be a focus
for the applicant to achieve before and during the job search.
Network:
A great way to discover an entry-level job in cybersecurity is to network with professionals in the
industry. Networking at vendor seminars, Linkedin groups, and job fairs is a great way to learn about
companies currently hiring.
While searching for that perfect role in cybersecurity, volunteer or hire on as a contractor within
a company to gain valuable hands-on experience—document what you have learned in these
contracting engagements without disclosing any sensitive information about the company, the content
you create could help during your interview process by showing recruiters and employers firsthand
what you have accomplished so far in your journey.
Before any interview, always practice with a friend or mentor. Role-playing is very helpful for you to
learn the best to answer cybersecurity questions during an interview. Even with significant experience
in cybersecurity, the ability to articulate and communicate effectively is a very positive trait.
Be Patient:
Jobs are there. Companies are hiring. It takes time for a company to line up the job role, budget for the
salary and benefits, and interview to find the best candidate for the position.
28
28
TAKE
THE FIRST STEP.
IT Career Development at CIAT
Building a strong IT career takes hard work and dedication. Whether you’re just starting in the field
or advancing your career, learning how to create an education plan that aligns with your career goals
saves you time and money and delivers the most significant return on your investment.
Now that you’ve chosen an education plan with a goal in mind, and now you’re focused on making the
most of your educational resources to ensure you’re setting yourself up for success in the job market.
The most impactful recommendation we give to all new CIAT students in the tech field is not to wait
until graduation to start their IT career planning. When you begin your career planning steps from day
1 of your program, you graduate career-ready and are more likely to find your first job quickly, with
competitive salary ranges.
29
29
Acknowledgments
7. ISACA.org - https://www.isaca.org/resources/infographics/state-of-cybersecurity-2021-infographic
8. CBInsights - https://www.cbinsights.com/research/cybersecurity-artificial-intelligence-startups-market-map/
9. cybersecurityventures.com - https://cybersecurityventures.com/jobs/
14. “The Phoenix Project: A Novel about IT, DevOps, and Helping Your Business Win” - Gene Kim, Kevin Behr,
George Spafford
30
30