While securing one's inaugural position in the realm of cybersecurity might appear straightforward, the process is far from facile. In this presentation, we meticulously examine the multifaceted challenges associated with attaining a foothold in the cybersecurity industry. By delineating diverse strategies and approaches, we aim to impart valuable insights into the nuanced journey of realizing one's professional aspirations. This comprehensive exploration underscores the significance of a strategic and informed approach to ultimately materialize the endeavor of securing an ideal role within the cybersecurity domain.
2. Whoami?
❖ Kharim Mchatta
❖ CEO of HACK IT CONSULTANCY
❖Founder of H4K-IT a cybersecurity community inTanzania
❖Author of 4 Cybersecurity books
❖ Cybersecurity professional (Pen tester & Digital Forensics expert)
❖ Founder of H4K-IT (Cybersec community in TZ)
❖ CTF player
❖ Blogger
❖ Author at eForensics and Pentets Magazine in Poland
❖ DW Swahili Subject matter expert (cybersecurity)
3. ROAD MAP OF TODAYS DISCUSSION
Understanding cybersecurity careers Skills required in cybersecurity
Entry paths in cybersecurity Cybersecurity careers
4. ROAD MAP OF TODAYS DISCUSSION
Certifications Learning platforms
Demonstration of hands on experience Ethics, Inegrity and honesty
5. Cybersecurity is a field that is ever evolving. The need of cybersecurity
expert is ever evolving due to the demand.
People need to understand that when we talk about cybersecurity, we don’t
mean hacking only, there are a lot of sub careers that an individual could
venture in and some of them include:
Understanding Cybersecurity Careers
CYBERSECURITY
Technical Roles
Non - Technical Roles
6. In cybersecurity there is no clear path on how you could get started in,
there are multiples ways on which you can get started into cybersecurity
which includes the following:
Entry Paths in Cybersecurity
CYBERSECURITY
Education
Cybersecurity communities
Research
Certifications
Network
7. In cybersecurity learning never ends, meaning that you are constantly
learning in order to gain new skills. This is due to the advancement in
technology daily.
Here are some skills that are required in order to thrive in cybersecurity
Skills Required in Cybersecurity
CYBERSECURITY
Research
Networking
Operating System
Report Writing
Building Virtual Machines
Terminal System Administrator
Soft Skills/Business Skills
8. As a beginner in cybersecurity there are various cybersecurity beginner
level careers that you could go for. Not all careers are fit for a beginner
hence you will have to look for jobs that have the following key words:
➢ Graduate Trainee
➢ Internships
➢ Research
➢ Volunteering
➢ Junior PenetrationTester
➢ Entry Level
Cybersecurity Careers
CYBERSECURITY
9. Certifications are very importance when trying to secure your first job in
any organization. Some of the certification that an individual may pursue
for this industry may include the following
➢ CEH – Certified Ethical Hacker
➢ CHFI – Computer Hacking Forensics Investigator
➢ Comptia Security ++
➢ OSCP
➢ CISA – Certified Information System Auditors
➢ CISM – Certified Information Security Manager
Certifications
CYBERSECURITY
Note: Do certifications based on the career line you want to focus on
10. A lot of employers are looking for individuals who have done something
tangible apart from their degree and certification. Here are some of the
following way on which individuals could be able to demonstrate their
skills
➢ Through projects
➢ Through playing CTF’s
➢ Through building labs
➢ Through content creation
➢ Through research and documentation
Demonstration of Hands-on Experience
CYBERSECURITY
11. There are a lot of learning platforms on which you can use in order to
sharpen your skills and learn the technical aspects of cybersecurity and
some of them include
Learning Platforms
CYBERSECURITY
12. In order to be successful in landing your first cybersecurity job you need to
have a combination of everything that was discussed in the previous slides.
A lot of people have focused on obtaining technical skills forgetting other
skills which could help them gain competitive advantage over the others.
Closing remarks: everybody has their own path and journey in life, always
be open a flexible to adjust yourself so that you can thrive and grow, if you
see that being employed is not working for you then try being self
employed
Summary & Closing Remarks
CYBERSECURITY
13. This intellectual property belongs to HACK IT Consultancy a
cybersecurity company located in Dar es salaam,Tanzania.
Author: Kharim Mchatta
Contact: +255 735 212 145
Email: info@hackitconsultacy.com
Website: www.h4k-it.com
LinkedIn: hack it consultancy Instagram: @hackitconsultancy