Think a Cybersecurity Job is All Technical? Think again.

Join Cybrary

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATION
Already a Member Login Here

< Back to Blog Posts

Think a Cybersecurity Job is All Technical? Think again.

Published: November 9, 2015 | By: TREVORH | Views: 2426
save

Struggling to get that promotion or land that cybersecurity job? Have all the right skills/certifications/years of experience but things just don’t seem to work out? You’ve read about the demand for cyber professionals, seems like a no brainer that the company should be need you. The articles say there are over 200,000 unfilled jobs in the US and several times that, worldwide. Companies are complaining that there aren’t enough professionals with the skillsets to fill their open positions; yet, on paper, there may be dozens of people with those exact skills. So what’s the problem?

A career in cyber security may actually require a little more than just the technical know-how. Yes, being well versed in many technologies is vitally important; but, there are a number of other skills that will help differentiate you and increase your chances at getting that new job/promotion.

Communication: This seems to be over-stated but often over looked. Showing you have, not only, the technical understanding required for the role; but also, the ability to connect and translate those overly complex technical discussions to targeted business functions, is a unique skill, highly sought after in such a tech-heavy field.

Risk Management: Those that have been involved in cyber security for some time realize that it’s not a matter of if, it’s a matter of when you get attacked. Coming to grips with that realization is important in this industry. This is when risk management becomes a key skill to highlight. Being able to identify the makeup of attacks and organize a plan to help mitigate them, and minimize their scale, are vital to a being a good analyst/manager.

Collaboration (or Consensus Building): Working with other divisions, of your organization, to help demonstrate the importance of information security is important. The people in the finance or marketing departments may not realize the role information security plays, not only to them, but the company as a whole. Open, productive dialogue will help not only promote greater security awareness, but you might even see a little more of the budget allocated your way.

Program Management: Cyber security changes quickly, and needs people with the skills to effectively manage a host of dynamic projects surrounding a comprehensive cyber security strategy.

 

Feel free to share your thoughts on what other skills you think are important for your fellow Cybrarians to take into consideration.

And don’t forget to check in on the new positions employers are posting!

< Back to Blog Posts
Enjoy this blog post? Want more Cybytes?
Invite a Friend
and share now
Facebook Twitter Google+ LinkedIn Email
Join Cybrary
7 Comments
  1. This is very informative, thank you! I peeked at the job market after hearing that it is high demand, and looking around I thought, “Wow, there isn’t that many available”. Thinking this I thought it would be impossible to land anything after I get a degree. I even thought it would be a waste but after reading this I see a direction and experience one could have. This was an awesome article.

Page 2 of 2«12
Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

Cybrary|0P3N

DUHK: The Technique That Got the VPN Compromised
Views: 1257 / December 10, 2017
What is Docker? [Series]
Views: 2091 / December 9, 2017
Wanna-Cry Ransomware
Views: 2076 / December 9, 2017
The Abyssal Depth of the Deep Web
Views: 2055 / December 8, 2017
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel