{"id":209322,"date":"2024-03-01T15:26:12","date_gmt":"2024-03-01T15:26:12","guid":{"rendered":"https:\/\/michigandigitalnews.com\/index.php\/2024\/03\/01\/cybersecurity-requirements-to-land-a-job-in-the-field\/"},"modified":"2025-06-25T17:21:24","modified_gmt":"2025-06-25T17:21:24","slug":"cybersecurity-requirements-to-land-a-job-in-the-field","status":"publish","type":"post","link":"https:\/\/michigandigitalnews.com\/index.php\/2024\/03\/01\/cybersecurity-requirements-to-land-a-job-in-the-field\/","title":{"rendered":"Cybersecurity requirements to land a job in the field"},"content":{"rendered":"<p> [ad_1]<br \/>\n<br \/><img decoding=\"async\" src=\"https:\/\/content.fortune.com\/wp-content\/uploads\/2024\/03\/Fortune_Rec_Edu_red-glowing-lock-e1709305066950.jpg?w=2048\" \/><\/p>\n<p>The internet is a crowded and dangerous place. Cybercrimes and data breaches are increasing in frequency and cost, posing a serious threat to businesses and everyday people.<\/p>\n<div>\n<p>A report from Cybersecurity Ventures says that the global annual cost of cybercrime is <a href=\"https:\/\/www.esentire.com\/resources\/library\/2023-official-cybercrime-report\" target=\"_blank\" rel=\"noopener\" class=\"sc-47dba8f0-0 iRbseu styledLinkColor \">predicted to reach $9.5 trillion<\/a> in 2024. Meanwhile, the average price tag of a single data breach will <a href=\"https:\/\/www.ibm.com\/reports\/data-breach\" target=\"_blank\" rel=\"noopener\" class=\"sc-47dba8f0-0 iRbseu styledLinkColor \">rise to $4.45 million<\/a>, up 15% from 2023, according to IBM.<\/p>\n<div class=\"sc-bee345e1-0 gjbbDt product-card-wrapper undefined\">\n<p>ADVERTISEMENT<\/p>\n<div class=\"sc-bee345e1-1 kKnppR content-wrapper\">\n<div class=\"sc-bee345e1-5 jZpLCx content\">\n<h4 class=\"sc-bee345e1-6 knmwqY card-title hasSubtitle\"><a href=\"https:\/\/onlinemba.unc.edu\/requestinfo\/index\/\" target=\"_blank\" rel=\"noopener noreferrer\" class=\"sc-47dba8f0-0 iRbseu styledLinkColor \" aria-label=\"Go to UNC Kenan-Flagler's #1-ranked online MBA page\">UNC Kenan-Flagler&#8217;s #1-ranked online MBA<\/a><\/h4>\n<p><span class=\"sc-bee345e1-7 knBRCj isAdvertisement \"> <!-- -->STEM-designated. Tar Heel ROI. No compromises.<!-- --> <\/span><a href=\"https:\/\/onlinemba.unc.edu\/requestinfo\/index\/\" target=\"_blank\" class=\"sc-bee345e1-21 ZiJTY button-mobile\" rel=\"noopener\">Visit Website<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"arrow-svg\" width=\"50\" height=\"50\" viewbox=\"5 5 14 14\" fill=\"none\" fill-opacity=\"0\" stroke=\"#111111\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"arcs\"><path d=\"M9 18l6-6-6-6\"\/><\/svg><\/a><\/div>\n<div class=\"sc-bee345e1-22 cYxxWk section-container\">\n<p><section id=\"sectionContent-0\" aria-labelledby=\"sectionHeader-0\">UNC Kenan-Flagler&#8217;s #1-ranked online MBA is a top choice for experienced professionals with strong undergraduate performance. You can earn your degree at your own pace\u2014in 18 to 36 months\u2014without sacrificing academic quality and rigor. Access lifelong career benefits and join a global community of over 42,000 alumni with an AACSB-accredited online MBA from UNC-Chapel Hill. GMAT waivers available. Learn more today.<\/section>\n<\/p>\n<div class=\"sc-bee345e1-10 eFxwOq accordion-wrapper\">\n<section id=\"accordionContent-0\" aria-labelledby=\"accordionHeader-0\" class=\"sc-bee345e1-13 jWEBUa\">UNC Kenan-Flagler&#8217;s #1-ranked online MBA is a top choice for experienced professionals with strong undergraduate performance. You can earn your degree at your own pace\u2014in 18 to 36 months\u2014without sacrificing academic quality and rigor. Access lifelong career benefits and join a global community of over 42,000 alumni with an AACSB-accredited online MBA from UNC-Chapel Hill. GMAT waivers available. Learn more today.<\/section>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>In parallel, the demand for highly skilled cybersecurity professionals, or white hats, is multiplying, too. The U.S. Bureau of Labor Statistics reports that information security analysts\u2014an entry-level cyber defense job earning an average salary of $112,000\u2014will <a href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-analysts.htm#tab-6\" target=\"_blank\" rel=\"noopener\" class=\"sc-47dba8f0-0 iRbseu styledLinkColor \">see a 32% increase in employment<\/a> by 2032, outpacing the growth of most other occupations.<\/p>\n<p>But, a high rate of growth along with a shortage of workers means one thing:<\/p>\n<p>\u201cThere\u2019s a huge gap,\u201d says M.K. Palmore, Director of the Office of CISO at <a href=\"https:\/\/cloud.google.com\/\" target=\"_blank\" rel=\"noopener\" class=\"sc-47dba8f0-0 iRbseu styledLinkColor \">Google Cloud<\/a>. \u201cEvery organization, no matter what they do, is a technology organization. Today, we depend so much on technology\u2014that\u2019s why companies need to build out a cybersecurity framework.\u201d<\/p>\n<p>According to Dana Simberkoff, the Chief Risk, Privacy, and Information Security Officer at <a href=\"https:\/\/www.avepoint.com\/\" target=\"_blank\" rel=\"noopener\" class=\"sc-47dba8f0-0 iRbseu styledLinkColor \">AvePoint Inc.<\/a>, it\u2019s not just a lack of skilled senior employees. There\u2019s a gap in new entry-level hires. \u201cThat\u2019s because of the rise of artificial intelligence and the rise of the profitability of cybercrime. They\u2019re just far more criminals out here than there are good guys,\u201d says Simberkoff.<\/p>\n<p>With nearly <a href=\"https:\/\/www.cyberseek.org\/heatmap.html\" target=\"_blank\" rel=\"noopener\" class=\"sc-47dba8f0-0 iRbseu styledLinkColor \">600,000 unfilled cyber positions<\/a> in the U.S. alone, the competition is fierce, and the expectations are high. But, to get your foot in the door, you need to know what hiring managers are looking for in entry-level candidates.\u00a0<\/p>\n<h2 class=\"wp-block-heading\"><strong>What is cybersecurity?<\/strong><\/h2>\n<p>Cybersecurity is the practice of safeguarding and defending information stored on phones, computers, and within networks from criminals and unauthorized access. This information can range from texts, emails, and social media posts to credit card information and medical records.<\/p>\n<p>Simberkoff adds that cyberattacks are only getting scarier, targeting not only businesses but also individuals and their families.<\/p>\n<p>\u201cMy parents have received phone calls from AI-generated robots, pretending to be their grandchildren, asking for help,\u201d she says. \u201cAs cyberattacks become more personal and sophisticated, the need for cybersecurity professionals ramps up. I think there\u2019s never been a more relevant or important career.\u201d<\/p>\n<h2 class=\"wp-block-heading\"><strong>What are entry-level cybersecurity job requirements?<\/strong><\/h2>\n<p>There\u2019s no single route to getting into the industry\u2014whether it\u2019s getting a degree or certified. But, there is a short checklist of items employers want to see in your application, no matter your background.<\/p>\n<p>\u201cThe delta between how comfortable an organization feels in bringing on new talent and then subsequently training that talent up is not always the same from one organization to the next,\u201d Palmore says<em>. <\/em>Both he and Simberkoff want people to do three things before applying:\u00a0<\/p>\n<ul>\n<li>Gain a base-level understanding of the cybersecurity industry<\/li>\n<li>Demonstrate and develop your security skills with certifications and degrees<\/li>\n<li>Get your hands dirty and learn how to physically do the job<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\"><strong>1. Gain a base-level understanding of the cybersecurity industry<\/strong><\/h2>\n<p>You first need to understand the different domains of the industry. Cybersecurity is a diverse and fascinating field that offers various opportunities for different skills and interests.\u00a0<\/p>\n<p>The major roles often involve engineering, education, administration, or management. As such, each job has its own level of technical knowledge and training requirements. Generally, these are the aspects of what cybersecurity professionals do:\u00a0<\/p>\n<p><strong>Secure provision<\/strong>: Designing and implementing secure systems and networks.<\/p>\n<p><strong>Operate and maintain<\/strong>: Managing and monitoring the performance and security of systems and networks.\u00a0<\/p>\n<p><strong>Oversee and govern<\/strong>: Developing and enforcing policies and strategies for cybersecurity.\u00a0<\/p>\n<p><strong>Protect and defend<\/strong>: Identifying and responding to cyber threats and incidents.<\/p>\n<p><strong>Analyze<\/strong>: Examining data and information to identify and understand cyber risks and vulnerabilities.\u00a0<\/p>\n<p><strong>Collect and operate<\/strong>: Gathering and using data and information to support cybersecurity operations.\u00a0<\/p>\n<p><strong>Investigate<\/strong>: Conducting forensic analysis and investigations of cyberattacks and incidents.<\/p>\n<p>Palmore suggests exploring various resources such as books, forums, social media, and online courses to gain insights into the mindset and skills required to become a cybersecurity professional.<\/p>\n<p>For those seeking a direction, we recommend reading <em>How Cybersecurity Really Works<\/em> by Sam Grubb and the 6-part book series <em>Cybersecurity All in One for Dummies<\/em>. These resources provide knowledge on how attackers operate\u2014helping people safeguard themselves and their workplaces from online threats.<\/p>\n<h2 class=\"wp-block-heading\"><strong>2. Demonstrate and develop your cybersecurity skills with certifications and degrees<\/strong><\/h2>\n<p>Once you understand all the cybersecurity domains, you should plot a path forward toward developing your skills and knowledge in the roles and responsibilities that interest you.<\/p>\n<p>There are two major paths to becoming cybersecurity literate: Pursuing a degree or training yourself to earn certifications.\u00a0<\/p>\n<p>\u201cSome people who study computer science or other technical fields struggle to enter the industry because employers value hands-on skills more than academic credentials,\u201d Palmore advises. \u201cCerts get folks off to the races\u2014they not only prepare people but also align them with other available industry certs for the future.\u201d These badges satisfy the academic expertise component most employers are looking for.<\/p>\n<h3 class=\"wp-block-heading\"><strong>Relevant cybersecurity certifications<\/strong><\/h3>\n<p>Palmore says it\u2019s possible to exit high school, take certifications, land an internship, and get a full-time cybersecurity role. Here are the main relevant base-level, vendor-neutral cybersecurity certifications that require zero previous experience:<\/p>\n<p><a href=\"https:\/\/www.isc2.org\/certifications\/cc\" target=\"_blank\" rel=\"noopener\" class=\"sc-47dba8f0-0 iRbseu styledLinkColor \"><strong>Certified in Cybersecurity (CC)<\/strong><\/a>: This 100-question entry-level certification from ISC2 tests for fundamental knowledge, skills, and abilities like incident response protocol, network security, and security operations.\u00a0<\/p>\n<p><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-ethical-hacker-ceh-v12\/\" target=\"_blank\" rel=\"noopener\" class=\"sc-47dba8f0-0 iRbseu styledLinkColor \"><strong>Certified Ethical Hacker (CEH)<\/strong><\/a>: This EC-Council certification consists of 125 multiple-choice questions and shows the holder understands things like DDoS attacks, intrusion detections, and virus creation.\u00a0<\/p>\n<p><a href=\"https:\/\/www.giac.org\/certifications\/penetration-tester-gpen\/\" target=\"_blank\" rel=\"noopener\" class=\"sc-47dba8f0-0 iRbseu styledLinkColor \"><strong>GIAC Penetration Testers (GPEN) Certification<\/strong><\/a>: This exam has around 75 multiple-choice questions and ten practical ones. It covers penetration testing best practices like how to execute an exploit and how to do reconnaissance.\u00a0<\/p>\n<p><a href=\"https:\/\/www.comptia.org\/certifications\/security\" target=\"_blank\" rel=\"noopener\" class=\"sc-47dba8f0-0 iRbseu styledLinkColor \"><strong>CompTIA Security+<\/strong><\/a>: This 90-question exam evaluates your proficiency in detecting network vulnerabilities, configuring and implementing low-risk network architecture, and troubleshooting security issues. It also assesses your knowledge of laws and regulations related to the subject matter.\u00a0<\/p>\n<p>If you are still trying to figure out where to begin, <em>Fortune<\/em> compiled a list of <a href=\"https:\/\/fortune.com\/education\/articles\/free-online-cybersecurity-courses\/\" target=\"_self\" rel=\"noopener\" class=\"sc-47dba8f0-0 iRbseu styledLinkColor \">free online cybersecurity courses<\/a> correlating with entry-level certifications.<\/p>\n<h3 class=\"wp-block-heading\"><strong>Relevant cybersecurity degrees<\/strong><\/h3>\n<p>According to <a href=\"https:\/\/www.cyberdefensemagazine.com\/cyberdefensemediagroupmediakit.pdf\" target=\"_blank\" rel=\"noopener\" class=\"sc-47dba8f0-0 iRbseu styledLinkColor \">Cyber Defense Magazine<\/a>, California State University, Carnegie Mellon University, and George Washington University secure the top three positions among the best cybersecurity universities.<\/p>\n<p>Every school will have different programs\u2014each teaching slightly different curriculums. The degrees below teach the fundamentals of the industry:<\/p>\n<ul>\n<li>Computer science<\/li>\n<li>Cybersecurity engineering<\/li>\n<li>Cybersecurity operations<\/li>\n<li>Computer engineering<\/li>\n<li>Information assurance<\/li>\n<\/ul>\n<p>For more information on getting a formal education,<em> Fortune <\/em>assembled a <a href=\"https:\/\/fortune.com\/education\/articles\/these-5-cybersecurity-masters-programs-cost-about-15k-or-less\/\" target=\"_self\" rel=\"noopener\" class=\"sc-47dba8f0-0 iRbseu styledLinkColor \">list of cybersecurity programs<\/a> that cost around $15,000 or less.\u00a0<\/p>\n<h2 class=\"wp-block-heading\"><strong>3. Learn how to physically do the job through internships, volunteering, and mentorship programs<\/strong><\/h2>\n<p>The final checklist item you need is practical experience. On resumes, employers want to see you\u2019ve applied all the information you learned to the real world.\u00a0<\/p>\n<p>\u201cThe key piece missing for most people in the interview process is the ability to say, \u2018Hey, I\u2019ve used these particular skills and solved real-world problems,\u2019\u201d Palmore says. The solution is opportunities like internships, informal volunteer work, and mentorship programs\u2014all of which get your hands dirty and help you interview better.\u00a0<\/p>\n<p>To gain this experience, you can explore different opportunities that suit your goals and interests. Here is what you need to know:<\/p>\n<ul>\n<li><strong>Internships:<\/strong> These offer short-term, real-world cybersecurity experience. They can be paid or unpaid and come from various sources, such as companies, agencies, schools, or nonprofits.\u00a0<\/li>\n<li><strong>Volunteer work:<\/strong> This can be as simple as assisting a colleague, someone in your network, or a nonprofit organization with small tasks or skills you want to learn. You can volunteer through well-known organizations like <a href=\"https:\/\/www.isc2.org\/volunteer\" target=\"_blank\" rel=\"noopener\" class=\"sc-47dba8f0-0 iRbseu styledLinkColor \">ISC2<\/a>, <a href=\"https:\/\/www.wicys.org\/benefits\/volunteer-leadership-roles\/\" target=\"_blank\" rel=\"noopener\" class=\"sc-47dba8f0-0 iRbseu styledLinkColor \">WiCyS<\/a>, or <a href=\"https:\/\/wecyberup.org\/levelup\/\" target=\"_blank\" rel=\"noopener\" class=\"sc-47dba8f0-0 iRbseu styledLinkColor \">CyberUp<\/a>.<\/li>\n<li><strong>Mentorship programs:<\/strong> Employers, schools, and networks offer both formal and informal one-on-one mentorship programs. If you\u2019re interested in gaining insights from experts in a more personalized setting than volunteering or interning, consider joining a mentorship program like the ones offered by <a href=\"https:\/\/mentorcruise.com\/filter\/cybersecurity\/\" target=\"_blank\" rel=\"noopener\" class=\"sc-47dba8f0-0 iRbseu styledLinkColor \">MentorCruise<\/a>.<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\"><strong>Hone these required soft skills to get hired in cybersecurity<\/strong><\/h2>\n<p>It\u2019s worth noting that both experts agree that being able to communicate effectively is the number one requirement for aspiring cybersecurity professionals.\u00a0<\/p>\n<p>\u201cIf you can communicate, there\u2019s a place for you in this industry\u2014if you can communicate well, there\u2019s a place for you at very high levels,\u201d Palmore says. \u201cLeadership skills are also desperately needed. At the end of the day, you can be as technically proficient as you want to be, but if you don\u2019t have these two things, you\u2019ll never be able to rise up the ladder.\u201d<\/p>\n<p>Simberkoff adds that communication skills are not only about conveying technical concepts to non-technical audiences but also about managing complex and dynamic situations.<\/p>\n<p>\u201cThis job is about herding cats. We are wrangling people into a single place. We get scratched, we get dirty. That makes it exciting and weird,\u201d Simberkoff says.<\/p>\n<p>She also emphasizes the importance of being able to relay matters of risk to stakeholders who do not deal with the daily operations of the technologies.<\/p>\n<p>\u201cBelieve it or not, there is a premium value in being able to relay technical concepts to non-technical audiences and to be able to relay matters of risk to audiences who don\u2019t deal with the daily operations of these technologies,\u201d Simberkoff adds.<\/p>\n<h2 class=\"wp-block-heading\"><strong>The takeaway<\/strong><\/h2>\n<p>In the face of escalating cyber threats, the need for cybersecurity professionals has never been more pressing. You can enter this field by equipping yourself with a strong understanding of cybersecurity fundamentals, pursuing relevant certifications or degrees, and gaining practical experience.<\/p>\n<p>If you want to learn more about the fast track to getting hired, <em>Fortune<\/em> ranked the <a href=\"https:\/\/fortune.com\/education\/bootcamps\/best-cybersecurity-bootcamps\/\" target=\"_self\" rel=\"noopener\" class=\"sc-47dba8f0-0 iRbseu styledLinkColor \">Best Cybersecurity Bootcamps<\/a>.<\/p>\n<\/div>\n<p>[ad_2]<br \/>\n<br \/><a href=\"https:\/\/fortune.com\/education\/articles\/cybersecurity-requirements-to-land-a-career\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[ad_1] The internet is a crowded and dangerous place. Cybercrimes and data breaches are increasing in frequency and cost, posing a serious threat to businesses<\/p>\n","protected":false},"author":1,"featured_media":209323,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[149],"tags":[],"_links":{"self":[{"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/posts\/209322"}],"collection":[{"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/comments?post=209322"}],"version-history":[{"count":3,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/posts\/209322\/revisions"}],"predecessor-version":[{"id":341000,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/posts\/209322\/revisions\/341000"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/media\/209323"}],"wp:attachment":[{"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/media?parent=209322"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/categories?post=209322"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/tags?post=209322"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}