Cyber Career Paths
Stoic Reactions on Security Analysts, Pentesters, Malware Analysts and more
Hacker Philosophy Weekly is talking about various career paths in cyber in this latest episode of Stoic Reactions: Cyber Career Paths.
One of the best pieces of advice I can give to people starting out in cyber, or to anyone that is unhappy with where they are in their cyber career is: pick one thing and get good at it.
I see too often that people want to be good at “everything” and end up not being great at any one thing. I can only have one full time profession, so why would I burn myself out trying to be “okay” at a lot of things? My best chance at landing a spot on a team is to bring something of value, something that isn’t duplicated already.
Check out the vid if you are interested in exploring, or starting, paths in cyber.
Updates on other content:
I’m currently working on two unique pieces at the moment, both written for those of you that might be worried I was only going the YouTube route =)
Piece 1: Cyberseneca Letter - On Talent Points. This letter discusses how I would spend my talent points (time/skills/mastery) differently if I knew what my talent tree (career) looked like all the way down to the bottom. This mindset is in contrast to how most people spend their talent points, on what they can see in front of them versus building for the big picture, resulting in talent trees that have bloat and talents that are of no help.
Piece 2: What if instead of reading about Sun Tzu I could watch a lecture given by Sun Tzu? Wouldn’t it be insightful not only to hear his words but see all the nonverbal communication given during a lecture? Well, that’s what I’m working on next: Col John Boyd, creator of the OODA loop.
I am using AI to clean up the audio and video of John Boyd’s 6 hour presentation called “Patterns of Conflict.” With the audio cleaned up, I am using AI and manual methods to manually transcribe his presentation, further preserving it for future use. After which, I will then do a series of videos and pieces on applying the concepts of conflict to offensive and defensive cyber operations: the OODA loop.
I have 47 mins of VHS video denoised, slightly upscalled, audio denoised, amplified, and transcribed. I am roughly 20% complete with the project and I have been working on this for 3-4 weeks.
From the Video Description
00:17 - Hacking as a career?
00:48 - Blue Team Hackers
01:06 - Building or Scaling?
01:44 - Scaling at Startups
01:51 - Unfilled Cyber Jobs?
02:05 - Security Analyst: Overview
02:23 - Security Analyst: Operate within the framework
02:43 - Security Analysts: Working with stakeholders
03:04 - Security Analyst: What it does
03:31 - Security Engineer: Overview
04:12 - Security Engineer: TryHackMe Learning Paths
04:35 - Incident Responder: Overview
05:13 - Incident Responder: Skills to have
05:40 - Hacker Perspective on Being IR
05:51 - Incident Responder: Business Impact
06:44 - Digital Forensics: Overview
07:31 - Malware Analyst: Overview
07:52 - Breaking into Cyber as a Malware Analyst
08:25 - Malware Analyst: Scalability is the key
09:09 - Penetration Tester: Overview
09:35 - Penetration Tester: Measuring Risk vs Evaluating Risk
10:04 - Penetration Tester: You specialty is finding things
10:45 - Penetration Tester: People can be exploited too!
11:13 - Red Teamer: Overview
11:25 - Red Teamer: Part of the blue team?
12:05 - Red Teamer: Storytellers
12:36 - Red Teamers: Cyber maturity and red teams
13:17 - Red Teamers: When to switch to Adversary Emulation? 1
4:14 - Red Teamers: What else do they do?
14:35 - How to defeat a red team
14:55 - Red Teamers: What to do with extra exploits
15:33 - Red Teamer: TryHackMe Learning Paths
16:01 - Breaking into Cyber as a Red Teamer: Warning!
17:04 - Don't forget to like and sub =)
There are many paths to choose from in Cyber, but which is for you? Let's take an overview of the most common career paths in Cyber, in this episode of Hacker Philosophy Weekly - Stoic Reactions.
Article by Medium Author Shefali Kumari: https://medium.com/@kumarishefu.4507/...

