Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireCybersecurity News

Getting started in cybersecurity – 6 essential skills to consider

By Dmitry Dontov
cybersecurity-freepik
July 15, 2021

Scarcity creates opportunity – and you’d be hard-pressed to find a sector more abundant in both than cybersecurity. And, it's estimated, 3.5 million security positions across the world will go unfilled this year. Colleges and security trade programs just aren’t churning out qualified graduates fast enough to meet the rising demand, as hackers mount attacks at an increasingly unbelievable pace. The volume of total malware attacks increased by 358% last year, while ransomware rates soared by 435%, according to one report. It’s no wonder why 78% of senior IT and security leaders feel they lack sufficient protection against cyberattacks!

Capable cybersecurity professionals can expect to be spoiled for choice in the job market today and well compensated for their in-demand skillsets. For those considering entering the field, I’d like to lay out the state of security today, explore potential career paths, and provide some guidance on the steps you can take, including skills you can develop to make it happen.

 

Understanding the Market

Constant change defines the cybersecurity sector. Cybercriminals and security professionals play an infinite game of cat and mouse. The birth of every sophisticated tool or technology sparks a multitude of new attack vectors and tactics, which security teams work tirelessly to identify and block, ad infinitum. At its core, the discipline seeks to protect organizations’ digital assets from theft or exposure. No matter how advanced security services and tools become, organizations will still need skilled cybersecurity administrators to carry out successful implementations and monitoring, and provide the level of creativity and human “it” factor required to achieve a strong security posture.

Ransomware is a perfect illustration of the ever-evolving state of cybersecurity. It has been making headlines for years, but we continue to see new variations and growth in its scale and sophistication. At first, these attacks and the tools used to launch them were typically reserved for sophisticated hacking groups with exceptional skills and resources. Today, the barrier to entry is much lower due to Ransomware-as-a-Service (RaaS) offerings available on the dark web that democratize cyber extortion for a small fee. As a result, novice hackers can launch powerful ransomware attacks and inflict immense damage on major organizations anywhere in the world. Now, security professionals are up against everyone from inexperienced “script kiddies” to state-sponsored attackers and even “cartels” that work together to execute massive ransomware attacks across the world.

Cyber extortion attacks are just one example of the dynamic nature of today’s threat landscape. Hackers are even targeting cybersecurity companies themselves, as we saw with the FireEye breach in which hackers compromised “red team” source code, and more recently with the SolarWinds supply chain attack. There are too many attack techniques to list here, but in short, cybercriminals use a broad range of tactics and constantly update their approach to evade detection and inflict maximum damage. The trick for existing cybersecurity professionals and those hoping to join their ranks is anticipating where they’ll strike next and how best to address it.

 

Where to Start

You might be hoping for a definitive answer as to the best way to become a cybersecurity professional. The truth is, there’s no standard academic or career path. As with the field itself, the backgrounds of cybersecurity professionals are vast and varied. Some study IT or application development, while many have completely unrelated degrees and didn’t take a single IT or security-related course in college. This is likely due to the fact that years back, security degrees, classes and trainings were exceedingly hard to come by, and most relevant coursework was a minor focus within general IT disciplines. This problem has since evaporated, as data breaches and cyber attacks have taken center stage over the past decade.

So, the obvious answer is to get a security degree from a reputable university. While this will undoubtedly provide a strong foundation and stand out as relevant training on your resume, there are other ways of getting experience too. You can explore co-op or internship opportunities that offer valuable hands-on experience and on-the-job training with specific tools and in real-world cybersecurity scenarios. After all, many organizations hire interns directly out of school to fill the growing need with individuals that already have first-hand experience and in-house training.

Another route would be to identify and earn well-known industry credentials such as the CEH (Certified Ethical Hacker) training, the CSX Cybersecurity Fundamentals Certificate, the CompTIA Security+ certification, and others. These types of bona fides are open to anyone and signal to potential employers that your fundamental security education and knowledge warrant serious consideration.

Apart from formal security education and certifications, you can also find ways to engrain yourself within the cybersecurity community by connecting with others on social media networks such as Twitter and Reddit, or at national or local industry conferences. Networking and engaging with the security community can help build your understanding of the industry and even surface potential employment opportunities. And lastly, consider gaining experience through the DIY route and create a security lab environment at home or in the cloud. Here you can get first-hand exposure to the tools and platforms most organizations use today, explore security disciplines the interest you most, and establish hacker cred that organizations love to see on resumes and in job interviews. 

 

High-Value Security Skills

While there isn’t a one-size-fits-all path to entering the security market, there are some specific skillsets organizations will undoubtedly look for when reviewing candidates. Some examples include:

  1. Risk Identification and Management – In order to mitigate security risks, you must understand the threats. Identifying business, security, and compliance risks is basic table stakes.
  2. Technical Fundamentals – DevOps, programming and administration are fundamental skills for modern security professionals.
  3. Data Management and Analysis – We live in a world of data. The volume of data is increasing exponentially and being able to analyze data in the form of log records and security notifications is the key. Data scientists and data officers are becoming an integral part of Security Operations teams.
  4. Cloud – Having knowledge of cloud environments and cloud apps is a standard skill for many security professionals now. With the number of cloud services growing every year, organizations need talent that can understand what the apps do and the overall landscape, but also how to manage the access and risk associated with them.
  5. Automation – It is an essential part of the modern security flow. Learning about the latest automation technology and techniques can be a key driver in reducing friction from the security process.
  6. Threat Hunting – Early detection can reduce risk, which is why many enterprises highly value threat hunting skills. In a world where it’s not “if” but “when,” having security professionals that can quickly identify and hunt threats is a requirement.

Cybersecurity is one of the most challenging and exciting professions today. There’s a tremendous amount of opportunity for those with the right level of curiosity, skill and work ethic. If you’re considering breaking into the field, I encourage you to start with the above guidance and insights. As security threats continue to grow in sophistication, volume and severity, the new generation of cybersecurity professionals will play an invaluable role in improving our collective security.

KEYWORDS: cyber security malware ransomware risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Dmitry dontov

Dmitry Dontov is CEO and Chief Architect of Spin Technology, a cloud data protection company based in Palo Alto, and the former CEO of Optimum Web Outsourcing, a software development company from Eastern Europe. As a serial entrepreneur with over 20 years of experience in security and team management, Dmitry has a strong background in the cloud protection field and is an expert in SaaS data security. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Harrods

Harrods’ Cyberattack: Cybersecurity Leaders Weigh In

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • 5 mins with Leaf-Clark

    5 minutes with Jay Leaf-Clark - Getting started in cybersecurity

    See More
  • Woman holding laptop and wearing a hijab

    Why women should consider cybersecurity to help close the skills gap

    See More
  • erp-freepik1170.jpg

    7 essential capabilities to consider when evaluating ERP security, risk and compliance solutions

    See More

Related Products

See More Products
  • databasehacker

    The Database Hacker's Handboo

See More Products

Events

View AllSubmit An Event
  • September 3, 2024

    From DDoS Protection to WAAP: How Layered Protection Enhances Your Cybersecurity Strategy

    ON DEMAND: By participating in the webinar, attendees will gain enhanced knowledge of cyber threats and understand the current spectrum of cyber threats facing businesses.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!