SlideShare a Scribd company logo
1 of 13
Landing a
Cybersecurity
job
Whoami?
❖ Kharim Mchatta
❖ CEO of HACK IT CONSULTANCY
❖Founder of H4K-IT a cybersecurity community inTanzania
❖Author of 4 Cybersecurity books
❖ Cybersecurity professional (Pen tester & Digital Forensics expert)
❖ Founder of H4K-IT (Cybersec community in TZ)
❖ CTF player
❖ Blogger
❖ Author at eForensics and Pentets Magazine in Poland
❖ DW Swahili Subject matter expert (cybersecurity)
ROAD MAP OF TODAYS DISCUSSION
Understanding cybersecurity careers Skills required in cybersecurity
Entry paths in cybersecurity Cybersecurity careers
ROAD MAP OF TODAYS DISCUSSION
Certifications Learning platforms
Demonstration of hands on experience Ethics, Inegrity and honesty
Cybersecurity is a field that is ever evolving. The need of cybersecurity
expert is ever evolving due to the demand.
People need to understand that when we talk about cybersecurity, we don’t
mean hacking only, there are a lot of sub careers that an individual could
venture in and some of them include:
Understanding Cybersecurity Careers
CYBERSECURITY
Technical Roles
Non - Technical Roles
In cybersecurity there is no clear path on how you could get started in,
there are multiples ways on which you can get started into cybersecurity
which includes the following:
Entry Paths in Cybersecurity
CYBERSECURITY
Education
Cybersecurity communities
Research
Certifications
Network
In cybersecurity learning never ends, meaning that you are constantly
learning in order to gain new skills. This is due to the advancement in
technology daily.
Here are some skills that are required in order to thrive in cybersecurity
Skills Required in Cybersecurity
CYBERSECURITY
Research
Networking
Operating System
Report Writing
Building Virtual Machines
Terminal System Administrator
Soft Skills/Business Skills
As a beginner in cybersecurity there are various cybersecurity beginner
level careers that you could go for. Not all careers are fit for a beginner
hence you will have to look for jobs that have the following key words:
➢ Graduate Trainee
➢ Internships
➢ Research
➢ Volunteering
➢ Junior PenetrationTester
➢ Entry Level
Cybersecurity Careers
CYBERSECURITY
Certifications are very importance when trying to secure your first job in
any organization. Some of the certification that an individual may pursue
for this industry may include the following
➢ CEH – Certified Ethical Hacker
➢ CHFI – Computer Hacking Forensics Investigator
➢ Comptia Security ++
➢ OSCP
➢ CISA – Certified Information System Auditors
➢ CISM – Certified Information Security Manager
Certifications
CYBERSECURITY
Note: Do certifications based on the career line you want to focus on
A lot of employers are looking for individuals who have done something
tangible apart from their degree and certification. Here are some of the
following way on which individuals could be able to demonstrate their
skills
➢ Through projects
➢ Through playing CTF’s
➢ Through building labs
➢ Through content creation
➢ Through research and documentation
Demonstration of Hands-on Experience
CYBERSECURITY
There are a lot of learning platforms on which you can use in order to
sharpen your skills and learn the technical aspects of cybersecurity and
some of them include
Learning Platforms
CYBERSECURITY
In order to be successful in landing your first cybersecurity job you need to
have a combination of everything that was discussed in the previous slides.
A lot of people have focused on obtaining technical skills forgetting other
skills which could help them gain competitive advantage over the others.
Closing remarks: everybody has their own path and journey in life, always
be open a flexible to adjust yourself so that you can thrive and grow, if you
see that being employed is not working for you then try being self
employed
Summary & Closing Remarks
CYBERSECURITY
This intellectual property belongs to HACK IT Consultancy a
cybersecurity company located in Dar es salaam,Tanzania.
Author: Kharim Mchatta
Contact: +255 735 212 145
Email: info@hackitconsultacy.com
Website: www.h4k-it.com
LinkedIn: hack it consultancy Instagram: @hackitconsultancy

More Related Content

Similar to Landing a job in cybersecurity | 2022

How to become a SOC Analyst and build a dream career with it.pptx
How to become a SOC Analyst and build a dream career with it.pptxHow to become a SOC Analyst and build a dream career with it.pptx
How to become a SOC Analyst and build a dream career with it.pptxInfosectrain3
 
How to become a SOC Analyst and build a dream career with it.pptx
How to become a SOC Analyst and build a dream career with it.pptxHow to become a SOC Analyst and build a dream career with it.pptx
How to become a SOC Analyst and build a dream career with it.pptxinfosec train
 
What skills are essential for a successful career in information technology.docx
What skills are essential for a successful career in information technology.docxWhat skills are essential for a successful career in information technology.docx
What skills are essential for a successful career in information technology.docxSurendra Gusain
 
Technophile CEO's Revamping the Tech October 2020
Technophile CEO's Revamping the Tech October 2020Technophile CEO's Revamping the Tech October 2020
Technophile CEO's Revamping the Tech October 2020Merry D'souza
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking sushmach10
 
12 Best Career in Cyber Security 2023 EMERSON EDUARDO RODRIGUES
12 Best Career in Cyber Security 2023 EMERSON EDUARDO RODRIGUES12 Best Career in Cyber Security 2023 EMERSON EDUARDO RODRIGUES
12 Best Career in Cyber Security 2023 EMERSON EDUARDO RODRIGUESEMERSON EDUARDO RODRIGUES
 
Intro to INFOSEC
Intro to INFOSECIntro to INFOSEC
Intro to INFOSECSean Whalen
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information SecurityAhmed Sayed-
 
11. wireless-penetration-testing-training-cyber51
11. wireless-penetration-testing-training-cyber5111. wireless-penetration-testing-training-cyber51
11. wireless-penetration-testing-training-cyber51Doree Garcia, CCNA, OSWP
 
A Beginner’s Guide to Capture the flag (CTF) Hacking
A Beginner’s Guide to Capture the flag (CTF) HackingA Beginner’s Guide to Capture the flag (CTF) Hacking
A Beginner’s Guide to Capture the flag (CTF) Hackinginfosec train
 
How to become an Ethical Hacker
How to become an Ethical HackerHow to become an Ethical Hacker
How to become an Ethical HackerPiotrPatun
 
Should i study cyber security
Should i study cyber securityShould i study cyber security
Should i study cyber securityVishal Singh
 
Secure Coding - Are we doing it wrong
Secure Coding - Are we doing it wrongSecure Coding - Are we doing it wrong
Secure Coding - Are we doing it wrongbryns
 
Cybersecurity for Beginners | 2021
Cybersecurity for Beginners | 2021Cybersecurity for Beginners | 2021
Cybersecurity for Beginners | 2021KharimMchatta
 
How Cyber Security Courses Opens Up Amazing Career Opportunities?
How Cyber Security Courses Opens Up Amazing Career Opportunities?How Cyber Security Courses Opens Up Amazing Career Opportunities?
How Cyber Security Courses Opens Up Amazing Career Opportunities?Robert Smith
 
Threat Modelling | 2023
Threat Modelling | 2023Threat Modelling | 2023
Threat Modelling | 2023KharimMchatta
 
So... you want to be a security consultant
So... you want to be a security consultant So... you want to be a security consultant
So... you want to be a security consultant abnmi
 
What Cybersecurity Certifications Make You The Most Money Today.pptx
What Cybersecurity Certifications Make You The Most Money Today.pptxWhat Cybersecurity Certifications Make You The Most Money Today.pptx
What Cybersecurity Certifications Make You The Most Money Today.pptxinfosec train
 

Similar to Landing a job in cybersecurity | 2022 (20)

How to become a SOC Analyst and build a dream career with it.pptx
How to become a SOC Analyst and build a dream career with it.pptxHow to become a SOC Analyst and build a dream career with it.pptx
How to become a SOC Analyst and build a dream career with it.pptx
 
How to become a SOC Analyst and build a dream career with it.pptx
How to become a SOC Analyst and build a dream career with it.pptxHow to become a SOC Analyst and build a dream career with it.pptx
How to become a SOC Analyst and build a dream career with it.pptx
 
What skills are essential for a successful career in information technology.docx
What skills are essential for a successful career in information technology.docxWhat skills are essential for a successful career in information technology.docx
What skills are essential for a successful career in information technology.docx
 
Technophile CEO's Revamping the Tech October 2020
Technophile CEO's Revamping the Tech October 2020Technophile CEO's Revamping the Tech October 2020
Technophile CEO's Revamping the Tech October 2020
 
Technophile CEO's Revamping the Tech October 2020
Technophile CEO's Revamping the Tech October 2020Technophile CEO's Revamping the Tech October 2020
Technophile CEO's Revamping the Tech October 2020
 
Brochure of ICSS
Brochure of ICSS Brochure of ICSS
Brochure of ICSS
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
12 Best Career in Cyber Security 2023 EMERSON EDUARDO RODRIGUES
12 Best Career in Cyber Security 2023 EMERSON EDUARDO RODRIGUES12 Best Career in Cyber Security 2023 EMERSON EDUARDO RODRIGUES
12 Best Career in Cyber Security 2023 EMERSON EDUARDO RODRIGUES
 
Intro to INFOSEC
Intro to INFOSECIntro to INFOSEC
Intro to INFOSEC
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information Security
 
11. wireless-penetration-testing-training-cyber51
11. wireless-penetration-testing-training-cyber5111. wireless-penetration-testing-training-cyber51
11. wireless-penetration-testing-training-cyber51
 
A Beginner’s Guide to Capture the flag (CTF) Hacking
A Beginner’s Guide to Capture the flag (CTF) HackingA Beginner’s Guide to Capture the flag (CTF) Hacking
A Beginner’s Guide to Capture the flag (CTF) Hacking
 
How to become an Ethical Hacker
How to become an Ethical HackerHow to become an Ethical Hacker
How to become an Ethical Hacker
 
Should i study cyber security
Should i study cyber securityShould i study cyber security
Should i study cyber security
 
Secure Coding - Are we doing it wrong
Secure Coding - Are we doing it wrongSecure Coding - Are we doing it wrong
Secure Coding - Are we doing it wrong
 
Cybersecurity for Beginners | 2021
Cybersecurity for Beginners | 2021Cybersecurity for Beginners | 2021
Cybersecurity for Beginners | 2021
 
How Cyber Security Courses Opens Up Amazing Career Opportunities?
How Cyber Security Courses Opens Up Amazing Career Opportunities?How Cyber Security Courses Opens Up Amazing Career Opportunities?
How Cyber Security Courses Opens Up Amazing Career Opportunities?
 
Threat Modelling | 2023
Threat Modelling | 2023Threat Modelling | 2023
Threat Modelling | 2023
 
So... you want to be a security consultant
So... you want to be a security consultant So... you want to be a security consultant
So... you want to be a security consultant
 
What Cybersecurity Certifications Make You The Most Money Today.pptx
What Cybersecurity Certifications Make You The Most Money Today.pptxWhat Cybersecurity Certifications Make You The Most Money Today.pptx
What Cybersecurity Certifications Make You The Most Money Today.pptx
 

More from KharimMchatta

Cyber threat in Africa | 2023
Cyber threat in Africa | 2023Cyber threat in Africa | 2023
Cyber threat in Africa | 2023KharimMchatta
 
AI in Cybersecurity | 2023
AI in Cybersecurity | 2023AI in Cybersecurity | 2023
AI in Cybersecurity | 2023KharimMchatta
 
Web app security essentials | 2022
Web app security essentials | 2022Web app security essentials | 2022
Web app security essentials | 2022KharimMchatta
 
Cybersecurity in the blue economy | 2022
Cybersecurity in the blue economy | 2022Cybersecurity in the blue economy | 2022
Cybersecurity in the blue economy | 2022KharimMchatta
 
Commonwealth of Learning cybersecurity training for teachers | 2022
Commonwealth of Learning  cybersecurity training for teachers | 2022Commonwealth of Learning  cybersecurity training for teachers | 2022
Commonwealth of Learning cybersecurity training for teachers | 2022KharimMchatta
 
Cybersecurity and Digital Forensics | 2022
Cybersecurity and Digital Forensics | 2022Cybersecurity and Digital Forensics | 2022
Cybersecurity and Digital Forensics | 2022KharimMchatta
 
Application penetration testing | 2021
Application penetration testing | 2021Application penetration testing | 2021
Application penetration testing | 2021KharimMchatta
 
Enhancing Cyber threat hunting for your team | 2021
Enhancing Cyber threat hunting for your team | 2021Enhancing Cyber threat hunting for your team | 2021
Enhancing Cyber threat hunting for your team | 2021KharimMchatta
 
Cybercrime's accelerated by covid 19 | 2021
Cybercrime's accelerated by covid 19 | 2021Cybercrime's accelerated by covid 19 | 2021
Cybercrime's accelerated by covid 19 | 2021KharimMchatta
 
Threat Modelling in Penetration Testing | 2021
Threat Modelling in Penetration Testing  | 2021Threat Modelling in Penetration Testing  | 2021
Threat Modelling in Penetration Testing | 2021KharimMchatta
 
Careers in cybersecurity | 2021
Careers in cybersecurity | 2021Careers in cybersecurity | 2021
Careers in cybersecurity | 2021KharimMchatta
 

More from KharimMchatta (11)

Cyber threat in Africa | 2023
Cyber threat in Africa | 2023Cyber threat in Africa | 2023
Cyber threat in Africa | 2023
 
AI in Cybersecurity | 2023
AI in Cybersecurity | 2023AI in Cybersecurity | 2023
AI in Cybersecurity | 2023
 
Web app security essentials | 2022
Web app security essentials | 2022Web app security essentials | 2022
Web app security essentials | 2022
 
Cybersecurity in the blue economy | 2022
Cybersecurity in the blue economy | 2022Cybersecurity in the blue economy | 2022
Cybersecurity in the blue economy | 2022
 
Commonwealth of Learning cybersecurity training for teachers | 2022
Commonwealth of Learning  cybersecurity training for teachers | 2022Commonwealth of Learning  cybersecurity training for teachers | 2022
Commonwealth of Learning cybersecurity training for teachers | 2022
 
Cybersecurity and Digital Forensics | 2022
Cybersecurity and Digital Forensics | 2022Cybersecurity and Digital Forensics | 2022
Cybersecurity and Digital Forensics | 2022
 
Application penetration testing | 2021
Application penetration testing | 2021Application penetration testing | 2021
Application penetration testing | 2021
 
Enhancing Cyber threat hunting for your team | 2021
Enhancing Cyber threat hunting for your team | 2021Enhancing Cyber threat hunting for your team | 2021
Enhancing Cyber threat hunting for your team | 2021
 
Cybercrime's accelerated by covid 19 | 2021
Cybercrime's accelerated by covid 19 | 2021Cybercrime's accelerated by covid 19 | 2021
Cybercrime's accelerated by covid 19 | 2021
 
Threat Modelling in Penetration Testing | 2021
Threat Modelling in Penetration Testing  | 2021Threat Modelling in Penetration Testing  | 2021
Threat Modelling in Penetration Testing | 2021
 
Careers in cybersecurity | 2021
Careers in cybersecurity | 2021Careers in cybersecurity | 2021
Careers in cybersecurity | 2021
 

Recently uploaded

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 

Recently uploaded (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Landing a job in cybersecurity | 2022

  • 2. Whoami? ❖ Kharim Mchatta ❖ CEO of HACK IT CONSULTANCY ❖Founder of H4K-IT a cybersecurity community inTanzania ❖Author of 4 Cybersecurity books ❖ Cybersecurity professional (Pen tester & Digital Forensics expert) ❖ Founder of H4K-IT (Cybersec community in TZ) ❖ CTF player ❖ Blogger ❖ Author at eForensics and Pentets Magazine in Poland ❖ DW Swahili Subject matter expert (cybersecurity)
  • 3. ROAD MAP OF TODAYS DISCUSSION Understanding cybersecurity careers Skills required in cybersecurity Entry paths in cybersecurity Cybersecurity careers
  • 4. ROAD MAP OF TODAYS DISCUSSION Certifications Learning platforms Demonstration of hands on experience Ethics, Inegrity and honesty
  • 5. Cybersecurity is a field that is ever evolving. The need of cybersecurity expert is ever evolving due to the demand. People need to understand that when we talk about cybersecurity, we don’t mean hacking only, there are a lot of sub careers that an individual could venture in and some of them include: Understanding Cybersecurity Careers CYBERSECURITY Technical Roles Non - Technical Roles
  • 6. In cybersecurity there is no clear path on how you could get started in, there are multiples ways on which you can get started into cybersecurity which includes the following: Entry Paths in Cybersecurity CYBERSECURITY Education Cybersecurity communities Research Certifications Network
  • 7. In cybersecurity learning never ends, meaning that you are constantly learning in order to gain new skills. This is due to the advancement in technology daily. Here are some skills that are required in order to thrive in cybersecurity Skills Required in Cybersecurity CYBERSECURITY Research Networking Operating System Report Writing Building Virtual Machines Terminal System Administrator Soft Skills/Business Skills
  • 8. As a beginner in cybersecurity there are various cybersecurity beginner level careers that you could go for. Not all careers are fit for a beginner hence you will have to look for jobs that have the following key words: ➢ Graduate Trainee ➢ Internships ➢ Research ➢ Volunteering ➢ Junior PenetrationTester ➢ Entry Level Cybersecurity Careers CYBERSECURITY
  • 9. Certifications are very importance when trying to secure your first job in any organization. Some of the certification that an individual may pursue for this industry may include the following ➢ CEH – Certified Ethical Hacker ➢ CHFI – Computer Hacking Forensics Investigator ➢ Comptia Security ++ ➢ OSCP ➢ CISA – Certified Information System Auditors ➢ CISM – Certified Information Security Manager Certifications CYBERSECURITY Note: Do certifications based on the career line you want to focus on
  • 10. A lot of employers are looking for individuals who have done something tangible apart from their degree and certification. Here are some of the following way on which individuals could be able to demonstrate their skills ➢ Through projects ➢ Through playing CTF’s ➢ Through building labs ➢ Through content creation ➢ Through research and documentation Demonstration of Hands-on Experience CYBERSECURITY
  • 11. There are a lot of learning platforms on which you can use in order to sharpen your skills and learn the technical aspects of cybersecurity and some of them include Learning Platforms CYBERSECURITY
  • 12. In order to be successful in landing your first cybersecurity job you need to have a combination of everything that was discussed in the previous slides. A lot of people have focused on obtaining technical skills forgetting other skills which could help them gain competitive advantage over the others. Closing remarks: everybody has their own path and journey in life, always be open a flexible to adjust yourself so that you can thrive and grow, if you see that being employed is not working for you then try being self employed Summary & Closing Remarks CYBERSECURITY
  • 13. This intellectual property belongs to HACK IT Consultancy a cybersecurity company located in Dar es salaam,Tanzania. Author: Kharim Mchatta Contact: +255 735 212 145 Email: info@hackitconsultacy.com Website: www.h4k-it.com LinkedIn: hack it consultancy Instagram: @hackitconsultancy