How To Become A Cybersecurity Pro: A Cheat Sheet: by Alison Denisco Rayome
How To Become A Cybersecurity Pro: A Cheat Sheet: by Alison Denisco Rayome
HOW TO BECOME A
CYBERSECURITY PRO:
A CHEAT SHEET
By Alison DeNisco Rayome
TABLE OF CONTENTS
03 Executive summary
04 Why is there an increased demand for
cybersecurity professionals?
05 What are some of the cybersecurity job
roles?
06 What skills are required to work in
cybersecurity?
07 Where are the hottest markets for
cybersecurity jobs?
08 What is the average salary of a cyberse-
curity professional?
08 What are typical interview questions for
a career in cybersecurity?
10 Where can I find resources for a career
in cybersecurity?
2
COPYRIGHT ©2019 CBS INTERACTIVE INC. ALL RIGHTS RESERVED.
HOW TO BECOME A CYBERSECURITY PRO: A CHEAT SHEET
Employees who take on these roles play a key role in the enterprise, as the average cost of a data breach
worldwide is about $3.62 million, according to IBM Security and the Ponemon Institute.
A job in cybersecurity can also command a high paycheck: The average salary for an information security
analyst in the US is $98,350, according to the US Bureau of Labor Statistics, and it’s significantly higher in cities
such as San Francisco and New York.
The shortage of trained cybersecurity professionals has led many organizations to seek nontraditional candi-
dates to fill these roles. To help those interested in the field better understand how to break into a career in
cybersecurity, we’ve pulled together the most important details and resources. (Note: This article on becoming
a cybersecurity pro is available as a free PDF download.)
EXECUTIVE SUMMARY
• Why is there an increased demand for cybersecurity professionals? Cybercrime has exploded in the
past couple of years, with major ransomware attacks such as WannaCry and Petya putting enterprises’ data at
risk. To protect their information and that of their clients, companies across all industries are seeking cyber
professionals to secure their networks.
• What are some of the cybersecurity job roles? A career in cybersecurity can take the form of various
roles, including penetration tester, chief information security officer (CISO), security engineer, incident
responder, security software developer, security auditor, or security consultant.
• What skills are required to work in cybersecurity? The skills required to work in cybersecurity vary
depending on the position and company, but generally may include penetration testing, risk analysis, and
security assessment. Certifications, including Certified in Risk and Information Systems Control (CRISC),
Certified Information Security Manager (CISM), and Certified Information Systems Security Professional
(CISSP) are also in demand, and can net you a higher salary in the field.
• Where are the hottest markets for cybersecurity jobs? Top companies including Apple, Lockheed
Martin, General Motors, Capital One, and Cisco have all been hiring cybersecurity professionals in recent
years. Industries such as healthcare, education, and government are most likely to suffer a cyberattack, which
3
COPYRIGHT ©2019 CBS INTERACTIVE INC. ALL RIGHTS RESERVED.
HOW TO BECOME A CYBERSECURITY PRO: A CHEAT SHEET
will probably lead to an increase in the number of IT security jobs in these sectors.
• What is the average salary of a cybersecurity professional? The average salary for a cybersecurity
professional depends on the position. For example, information security analysts earn a median salary of
$98,350 per year, according to the US Bureau of Labor Statistics. Meanwhile, CISOs earn a median salary of
$221,991, according to Salary.com. Salaries are significantly higher in certain cities, such as San Francisco and
New York.
• What are typical interview questions for a career in cybersecurity? Questions can vary depending on
the position and what the specific company is looking for, according to Forrester analyst Jeff Pollard. For
entry and early career roles, more technical questions should be expected. As you move up the ranks, the
questions may become more about leadership, running a program, conflict resolution, and budgeting.
• Where can I find resources for a career in cybersecurity? ISACA, ISC(2), ISSA, and The SANS Institute
are national and international organizations where you can seek out information about the profession as well
as certification and training options. A number of universities and online courses also offer cybersecurity-re-
lated degrees, certifications, and prep programs.
However, many enterprises face difficulties filling these positions: 55% of US organizations reported that
open cybersecurity positions take at least three months to fill, while 32% said they take six months or more,
according to a 2017 ISACA report. And 27% of companies said they are unable to fill cybersecurity positions
at all.
Cybersecurity remains a relatively new field compared to other computer sciences, so a lack of awareness is
part of the reason for the talent shortage, according to Lauren Heyndrickx, CISO at JCPenney. Misconceptions
about what a cybersecurity job actually entails are common, and might be part of the reason few women and
minorities go into the field, she added. Women now make up 24% of the cybersecurity workforce, and 45% of
those women are millennials, according to an ISC(2) report, and it’s likely that these numbers will continue to
grow over time.
Enrollment in computer science programs has also increased tremendously in the past couple years, and many
4
COPYRIGHT ©2019 CBS INTERACTIVE INC. ALL RIGHTS RESERVED.
HOW TO BECOME A CYBERSECURITY PRO: A CHEAT SHEET
schools are adding cybersecurity majors and concentrations, said Rachel Greenstadt, associate professor of
computer science at Drexel University.
Additional resources:
• 5 reasons your company can’t hire a cybersecurity professional, and what you can do to fix it (TechRepublic)
• Cybersecurity spotlight: The critical labor shortage (Tech Pro Research)
• Report: 57% of businesses can’t find enough IT security pros (TechRepublic)
• Report: Despite growing security threats, CXOs struggle to find cybersecurity professionals (TechRepublic)
• Phishing and spearphishing: An IT pro’s guide (free PDF) (TechRepublic)
• Cybersecurity: Two-thirds of CIOs say threats increasing, cite growth of ransomware (TechRepublic)
• Top 3 reasons cybersecurity pros are changing jobs (TechRepublic)
• These women want to fix cybersecurity’s massive gender gap (CNET)
• International Women’s Day: A plea to the infosec community (ZDNet)
• Gender gap: Why information security needs more women (TechRepublic)
• Cybercrime and cyberwar: A spotter’s guide to the groups that are out to get you (ZDNet)
• Special report: Cybersecurity in an IoT and mobile world (free PDF) (TechRepublic)
• Essential reading for IT leaders: 10 books on cybersecurity (free PDF) (TechRepublic)
• Defending against cyberwar: How the cybersecurity elite are working to prevent a digital apocalypse (free
PDF) (TechRepublic)
In-demand roles include penetration testers, who go into a system or network, find vulnerabilities, and either
report them to the organization or patch them themselves. Cybersecurity engineers, who often come from a
technical background within development, dive into code to determine flaws and how to strengthen an organi-
zation’s security posture. Security software developers integrate security into applications software during the
design and development process.
Computer forensics experts conduct security incident investigations, accessing and analyzing evidence from
computers, networks, and data storage devices. Security consultants act as advisors, designing and implementing
5
COPYRIGHT ©2019 CBS INTERACTIVE INC. ALL RIGHTS RESERVED.
HOW TO BECOME A CYBERSECURITY PRO: A CHEAT SHEET
the strongest possible security solutions based on the needs and threats facing an individual company.
At the top of the chain, CISOs helm a company’s cybersecurity strategy, and must continuously adapt to battle
the latest threats.
Additional resources:
• Rise of the CISO: Why the C suite needs a security chief (TechRepublic)
• Job description: Identity access management specialist (Tech Pro Research)
• Job description: Computer forensic analyst (Tech Pro Research)
• Job description: Information security analyst (Tech Pro Research)
• Job description: Security architect (Tech Pro Research)
• Cybersecurity burnout: 10 most stressful parts of the job (TechRepublic)
• 8 hard truths about working in cybersecurity (TechRepublic)
Certifications in cybersecurity teach these and other valuable job skills, and often lead to higher salaries in
the field. Those such as Certified in Risk and Information Systems Control (CRISC), Certified Information
Security Manager (CISM), and Certified Information Systems Security Professional (CISSP) are currently in
high demand.
Cybersecurity jobs don’t necessarily require developer skills or a degree, Pollard said. “You don’t need a
bachelor’s degree in a specific field to be great at security; in fact, you don’t necessarily need [a degree] at all,”
according to Pollard. “Recognize that cybersecurity is a skill, and teach people the profession of enterprise
security. That means treating it like an apprenticeship or training program.”
Cybersecurity is an interdisciplinary field that requires knowledge in tech, human behavior, finance, risk, law,
and regulation. Many people in the cybersecurity workforce enter the field from other careers that tap these
skills, and translate them to cyber.
6
COPYRIGHT ©2019 CBS INTERACTIVE INC. ALL RIGHTS RESERVED.
HOW TO BECOME A CYBERSECURITY PRO: A CHEAT SHEET
“If you have security skills, there are plenty of opportunities available for you,” according to Pollard. “If you
have an interest in security and perhaps have a nontraditional background but are willing to learn, opportunities
are certainly open from that perspective as well.”
Additional resources:
• Rise of the ‘accidental’ cybersecurity professional (TechRepublic)
• Cybersecurity specialisation status up for grabs with new ACS accreditation program (ZDNet)
• Ethical hackers: How hiring white hats can help defend your organisation against the bad guys
(TechRepublic)
• The next generation of cybersecurity professionals is being created by the Girl Scouts (TechRepublic)
• 10 bad habits cybersecurity professionals must break (TechRepublic)
• Encryption: A guide for business leaders (free PDF) (TechRepublic)
• Man-in-the-middle attacks: An insider’s guide (free PDF) (TechRepublic)
Industries such as healthcare, education, and government are most likely to experience a cyberattack, and cyber-
security jobs are likely to increase across those fields in particular. Demand for cybersecurity professionals will
only continue to increase in the coming years, experts say.
It’s going to be especially important for young people to enter the field in the coming years, according to
Wesley Simpson, COO of ISC(2). Currently, only 7% of cybersecurity workers are under age 29, and 13% are
between ages 30 and 34. The average age of cyber professionals is 42.
“Over the next 10 years, we will have a large population of cyber professionals starting to retire,” Simpson said.
“We don’t have a good plan to backfill those large number of folks starting to leave the industry. We need to be
able to educate and bring awareness to all facets of cybersecurity, and [send a message] that regardless of if you
have a technical degree or not, it’s a great, diverse, lucrative career for folks to get into.”
7
COPYRIGHT ©2019 CBS INTERACTIVE INC. ALL RIGHTS RESERVED.
HOW TO BECOME A CYBERSECURITY PRO: A CHEAT SHEET
Additional resources:
• Help wanted: Universities double down on security to help fill 1 million open jobs (TechRepublic)
• Top 10 companies hiring cybersecurity professionals (TechRepublic)
• The world needs more cybersecurity pros, but millennials aren’t interested in the field (TechRepublic)
• The 3 most in-demand cybersecurity jobs of 2017 (TechRepublic)
• Cyber Soldiers: White-hat hackers (CBS News)
• One in three cybersecurity job openings go begging, survey finds (ZDNet)
• Become an Ethical Hacker Bonus Bundle (TechRepublic Academy)
Demand for skilled cybersecurity professionals has made the field “a seller’s market,” according to Pollard.
Skilled job candidates are more able to negotiate salary, benefits, and perks such as working remotely than in
the past, according to Stephen Zafarino, senior director of recruiting at staffing agency Mondo.
Additional resources:
• The 10 highest-paying cybersecurity jobs (TechRepublic)
• The 10 best tech jobs that pay the highest salaries (TechRepublic)
• Why women still make up only 24% of cybersecurity pros (TechRepublic)
8
COPYRIGHT ©2019 CBS INTERACTIVE INC. ALL RIGHTS RESERVED.
HOW TO BECOME A CYBERSECURITY PRO: A CHEAT SHEET
Questions can vary depending on the position and what the specific company is looking for, Pollard said.
For entry and early career roles, more technical questions should be expected. As you move up the ranks, the
questions may become more about leadership, running a program, conflict resolution, and budgeting.
An opening question to test the candidate’s ability to think on the spot might be “How do you build a botnet?”
causing them to work out how they would infect, control, and coordinate a botnet from scratch—instantly
putting them in the shoes of the attacker, Gaughf said. Then they may be asked “How would you defend
against your botnet?” to gain the other perspective.
In an initial interview, Pollard said, a candidate can also expect technical questions, such as:
• What are some ways malware can evade detection by antivirus products?
• What is a cross-site scripting (XSS) attack, and how does it work?
• Outside of XSS, what are a few other examples of web application attacks?
• What is a man-in-the-middle attack, and how can it be prevented?
• What is the difference between TCP and UDP? What kind of use cases are better for UDP?
Candidates may also expect questions to determine how they keep up with the industry, Gaughf said, such as:
“I might hand them some log data and ask questions about the contents of the data. I might hand them a
forensic capture from a system and ask them to perform light investigative work and answer details about the
attacker,” Pollard said. “If the person was going to be a developer I might ask them to write some code that
could parse through data. If the person was going to be a penetration tester, I might hand them a basic web
application and ask them to attack it.”
After that point, the candidate may have a final interview to explain their solution, reasoning, and methodology.
“For both parties—the company and the candidate—this is lots of work,” Pollard said. “And it doesn’t fit
the traditional interview arrangement where you sort through a mountain of resumes, pick some people to
9
COPYRIGHT ©2019 CBS INTERACTIVE INC. ALL RIGHTS RESERVED.
HOW TO BECOME A CYBERSECURITY PRO: A CHEAT SHEET
interview, and then rely on a series of 30-45 minute questions, and move people forward based on some
combination of responses, instinct, and emotion.”
Additional resources:
• Five traits employers should look for when hiring cyber security professionals (TechRepublic)
• Landing that infosec job: These experts share their best career advice (ZDNet)
• How to answer tough interview questions: 8 tips (TechRepublic)
• 8 ways to be less nervous about your next job interview (TechRepublic)
• 10 signs you may not be cut out for a cybersecurity job (TechRepublic)
• Coding school graduates: Are they worth hiring? (TechRepublic)
• Google for Jobs is ready to get you hired (TechRepublic)
You can reach out to the person in your organization who is currently responsible for cybersecurity, and see if
you can shadow them or become a mentee.
A number of universities and online courses also offer cybersecurity-related degrees and certifications.
Additional resources:
• Five essential cybersecurity audiobooks (TechRepublic)
• Five essential cybersecurity podcasts for IT professionals (TechRepublic)
• Learn cybersecurity basics with these essential YouTube videos (TechRepublic)
• Essential follows: Information security experts on Twitter (TechRepublic)
• New training platform uses real-world situations to train cybersecurity experts faster (TechRepublic)
• The best password managers of 2019 (CNET)
10
COPYRIGHT ©2019 CBS INTERACTIVE INC. ALL RIGHTS RESERVED.
CREDITS
Editor In Chief ABOUT TECHREPUBLIC
Bill Detwiler
TechRepublic is a digital publication and online community
Editor In Chief, UK that empowers the people of business and technology. It
Steve Ranger
provides analysis, tips, best practices, and case studies
Associate Managing aimed at helping leaders make better decisions about
Editors technology.
Teena Maddox
Mary Weilage DISCLAIMER