Tea with Copi: Cybersecurity as a Career Choice


Introduction

Today I had an earnest discussion with Copi about Cybersecurity as a career. We talked about why someone might choose it and what some of its qualifications are, then discussed the merits of certifications, degrees and experience. Copi also provided a breakdown of a few certs that align with specific Cybersecurity subfields.

I’ll present the conversation in full, and save commentary for the end. Enjoy.


The Conversation


Conclusion

When Copi asked what I thought might be additional qualities necessary for the field, I should have included vigilance, perseverance and nerves of steel. Maintaining calm and focus is crucial for defenders, whether it is presenting information to executives, explaining to staff why they can’t install whatever software they want, or responding to an active threat that is crawling through the network and disrupting services.

Cybersecurity is definitely not a field that should be entered into lightly, and might not be for everyone. It takes dedication, and requires specific skillsets, knowledge and personality traits. Since I first began in the field, there have been major strides in introducing it as an option to younger and younger generations. I wonder what this indicates regarding general trends in the state of the world. I’ll save that for another conversation.


References

¹https://www.nist.gov/blogs/cybersecurity-insights/why-employers-should-embrace-competency-based-learning-cybersecurity

²https://www.isc2.org/Insights/2022/06/ISC2-Research-Finds-Employer-Hiring-Practices-Must-Evolve-to-Overcome-the-Workforce-Gap


Daily Cuppa

Today’s cup of tea is Mandarin Mint Mindfulness provided by Yogi.
It’s a soothing blend of citrus and mint that helps calm the mind and body. The perfect thing for putting a defender in a clear headspace.


If you enjoyed this article, or the site in general, feel free to buy the author a cup of tea.
The author is also available for work.

Previous
Previous

Fun with Python: File Hashing v2

Next
Next

IT Security 101: Common Network Ports and Protocols