this post was submitted on 12 Jun 2024
35 points (97.3% liked)
Asklemmy
43811 readers
949 users here now
A loosely moderated place to ask open-ended questions
If your post meets the following criteria, it's welcome here!
- Open-ended question
- Not offensive: at this point, we do not have the bandwidth to moderate overtly political discussions. Assume best intent and be excellent to each other.
- Not regarding using or support for Lemmy: context, see the list of support communities and tools for finding communities below
- Not ad nauseam inducing: please make sure it is a question that would be new to most members
- An actual topic of discussion
Looking for support?
Looking for a community?
- Lemmyverse: community search
- sub.rehab: maps old subreddits to fediverse options, marks official as such
- !lemmy411@lemmy.ca: a community for finding communities
~Icon~ ~by~ ~@Double_A@discuss.tchncs.de~
founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
I currently work in cybersecurity in a Senior Incident Response role. Fair warning, my opinion is biased by my own route into cybersecurity and the fact that I deal with incidents and not managing people. Though, I do get involved in interviewing and hiring. I'd say you have a good start at it. While I am sure I will be accused of gatekeeping, I much prefer working with analysts who have spent time in help desk and even as a sysadmin/netadmin. It helps if you have a good understanding of how systems and networks work. I don't expect new analysts to just jump into Wireshark and start reading through packets with me (I'm a weirdo who really enjoys that), but I will assume that I can talk, at a high level, about TCP/UDP, LDAP, SMB/CIFS, RDP or SSH and they won't be completely lost. Though, no one is expected to know everything and we all have our weak spots; so, don't be intimidated if any of that acronym soup isn't instantly familiar. Everyone is Googling stuff constantly. You'll memorize some of it due to repetition, but never be afraid to ask questions.
The last time my company was hiring for the SOC, the number one thing I was looking for in interviews was some evidence of an inquisitive mind. Someone geeking out over their home lab, TryHackMe or stuff like that was a sure-fire way to get my vote. I tend to be ambivalent about certs. I had some Windows 2000 certs (technically, those don't expire, but ya...), a Sec+ (it's expired) and an active CISSP (mile wide, inch deep, only useful for impressing hiring managers). I took a week long, in person training for the CEH but never took the test due to the COVID pandemic. Also, if the course (an official EC-Council course) was anything to judge by, that cert is just high-grade bullshit. I also have dealt with far too many "paper tigers" in my career to fall over swooning when someone has a bunch of alphabet soup behind their name. So, while I would recommend getting some certs, hiring managers love them, don't get too caught up on them. You'll learn far more just breaking stuff and troubleshooting it. The Net+/Sec+ duo is usually a good start.
On coding skills, I do recommend getting some ability to read/write code. The language isn't super important. Python is a good one to have some literacy in, it gets used everywhere. But, unless you are going to push heavily into security development, you don't need to be at the same level as a developer. If you can pop open exploits in exploit-db.com and make sense of what they are doing, and be sure the code isn't going to root your test box, that's usually enough.
Let me also recommend that you work to keep your communications/writing skills sharp. A lot of what one does in cybersecurity revolves around getting other people to do stuff. You will be regularly writing reports and needing to convince people to do stuff and/or explaining why you just kicked their system off the network. It really sucks to read incident reports from someone whose grasp of the language is lacking. Get in the habit of documenting what you do, taking screenshots, and writing in clear, concise language. You don't need to be Shakespeare, but at least get your spelling right (spell check exists, use it), and get the basics of grammar down. If you hand me a resume with there/their/they're mixed up, you're going to walk into an interview with negative marks already against you.
On the upshot, now is a fantastic time to be getting into cybersecurity. Organizations are desperate to hire trained people and some will be willing to roll the dice on a less experienced analysts who shows potential. Feel free to ask questions, I enjoy what I do most days and am happy to talk about it.
How’d you get into IT? I feel like my path into computer work has been a bit unorthodox. I have a political science degree but no college experience with cs just otj experience. It feels like having my background definitely helps on the soft skills just may be a bit of hindrance compared to those with cs degrees.
I just kinda "fell" into IT. In terms of college, I hold an Associates Degree in Math/Science from a community college; so, slightly more than nothing, but only just. I was very lucky in that my father spent an insane amount of money in the early 80's to buy a computer and then turned me loose on it. I was doing simple programming in GW-Basic by the time I was a teenager and got pretty good at making boot disks to play games. I just became that kid who "knew computers". After leaving college, a friend of mine convinced me to put a resume in at the company he worked for. They needed a computer tech and I fit the bill. From there it was a long sequence of job hops every 3-5 years until I ended up as a sysadmin dealing with mostly Windows systems, Active Directory, Exchange and SQL. Plus, anything else which just needed someone to "figure it out". That eventually landed me at a gig working as a sysadmin at a US FedGov site (which is why I got my CISSP). There I often worked closely with the cybersecurity team, as they would need stuff done on the domain, and I would get it done. When they had an opening on their team, they did everything short of drag me into the office to apply for that spot. I worked in cybersecurity for that site until a bit after the COVID pandemic when I got a message on LinkedIn about a "FULLY REMOTE" (yes, the message put that all in caps) position. I was curious and applied. I now work from home, reading other peoples' email and trying to keep the network secure for a Fortune 500 company.
The best advice I can offer is: keep learning and never be afraid to just try.
A lot of my career is based around "oh shit, it's broke. Here sylver_dragon, you figure it out." I loved logic puzzles as a kid and now I basically do them for a living. I would also recommend nurturing professional relationships and don't burn bridges you don't need to. That friend, who got me my first IT job was also pivotal, about a decade later, in getting me to apply to a different company he worked for at the time. When I put my resume in, it passed through the hands of several different people, people whom I had worked with at that first job. Between my performance and them knowing what type of person I was, everyone one of them said, "yup, hire this guy". Having good working relationships now can pay a lot of dividends in the future.
I see, that honestly sounds like a pretty natural way get into IT. I have basically had a computer since I was in kindergarten and one parent had a MacBook while I had a windows computer. I am thankful for that because I’ve noticed that I’ve always been a bit more savvy than average people. Hearing stories like yours definitely makes me confident that I can still get really far without a CS degree.
Thankfully I’ve kept in good touch with all my past colleagues so hopefully it will work for me like it did with you.