SlideShare a Scribd company logo
How to Stand Out
in Cybersecurity
By Jeff Starke
Principal Security Engineer | MegaplanIT
01
Presentation name goes here
“The only true wisdom is in
knowing that you know nothing.”
-Socrates
02How to Stand Out in
Presentation name goes here
Meet The Speaker
Being successful within cybersecurity requires that you be dynamic. You can’t rely on
one technology or knowledge base. The job of any security professional is to align
themselves with the business, to the point that you become a business enabler.
Whatever your business provides, and whatever platforms it utilizes, it's your
responsibility to become that type of security professional.
Linux Windows Networking MacOS
AWS Azure
Jeff Starke
Aiming to strengthen
America's network security
infrastructure, one company
at a time.
Principal Security
Engineer
VMware
Ansible
03How to Stand Out in
10%
90%
80%
Windows
Administration
Network
Engineering
Linux
Administration
Presentation name goes here
Cybersecurity Predictions
2019
2018
2021
2024
20XX
Cyber industry was valued
at $120 Billion
Cyber industry expected
to reach $300 Billion
1 Million unfilled
cybersecurity positions
Openings expected to
grow to 3.5 Million
04
High probability of a major
cyber event in
our lifetime
How to Stand Out in
Presentation name goes here
Home Lab
There’s no better way to
learn than by getting your
hands on the equipment.
Volunteer
Contribute to a greater
purpose while helping
support and learn.
Internship
Get paid while learning
valuable skills that will
help shape your career.
Stand-Out Strategies
05How to Stand Out in
Presentation name goes here
Start a Home Lab
Older or no hardware?
No problem.
Home labs provide you an opportunity to gain experience
deploying, testing, and learning about various systems.
This experience can then be leveraged on your resume
and during interviews and help communicate your
passion.
VMware Workstation
06
Virtual Box (Oracle)
KVM (Linux Kernel)
Hyper-V (Windows)
EC2 Instances (AWS) Azure, GCP, etc.
How to Stand Out in
Presentation name goes here
Local co-op is no longer supported.
Each user must have their own
console.
What if we could virtualize?
Want to be able to play local multi-player on
games that only support multi-player online.
The Problem
07
Two Consoles == $$$
Two Games == $$$
Two Online Subscriptions ===
$$$
One Old Desktop == 
Two Games == $$$
No PC Subscriptions ==

Presentation name goes here
Start a Home Lab
08
Two Virtual Windows Gaming Rigs
Dedicated GPU with Zero Latency
Additional Resources for VM Testing
Multi-headed Gaming PC
How to Stand Out in
Presentation name goes here
Volunteer Your Time
Looking to gain
experience and give
back?
Volunteering with a non-profit or school is a great way to
get hands-on experience with enterprise tools. Many
can’t afford cybersecurity specialists and, consequently,
are very vulnerable.
This experience can help highlight your personal goals
and objectives, and show this isn’t just a job in your eyes.
https://greatnonprofits.org/near-me/
09How to Stand Out in
Presentation name goes here
Volunteer Your Time
10
Implement Identity Access Controls
Built Open-Source Security Camera System
Cybersecurity Advisor – Volunteer
Phoenix Dream Center
Phoenix Dream Center provides meals, housing,
counseling and outreach services for homeless and at-
risk youth in our local community.
They offer one of the best (and only) human trafficking
recovery programs in the nation. They provide safe
housing, spiritual care, family care, and educational
programs for those who have been saved from
trafficking.
How to Stand Out in
Presentation name goes here
Work for It
With more structure, you will receive
hands-on experience and mentorship.
11
Interned at SRP under Server Management
CMDB
Change
Control
Server
Hardware
Network
Infrastructure
Patch
Management
NERC CIP
Provisioning
Secure
Wiping
Documenting
Disaster
Recovery
VDI
Project
Planning
How to Stand Out in
Presentation name goes here 12How to Stand Out in
Want more structure, and the
opportunity to get paid while you learn?
Maybe an internship is right for you.
Work for It
https://www.estrellamountain.edu/students/internships

More Related Content

Similar to How to Stand Out in Cybersecurity

Would you like to make a great level of residual income today?
Would you like to make a great level of residual income today?Would you like to make a great level of residual income today?
Would you like to make a great level of residual income today?
neilc548
 
Enhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber RangeEnhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber Range
scoopnewsgroup
 
232 a7d01
232 a7d01232 a7d01
Incident Response in the wake of Dear CEO
Incident Response in the wake of Dear CEOIncident Response in the wake of Dear CEO
Incident Response in the wake of Dear CEO
Paul Dutot IEng MIET MBCS CITP OSCP CSTM
 
How Cyber Security Courses Opens Up Amazing Career Opportunities?
How Cyber Security Courses Opens Up Amazing Career Opportunities?How Cyber Security Courses Opens Up Amazing Career Opportunities?
How Cyber Security Courses Opens Up Amazing Career Opportunities?
Robert Smith
 
Webinar | Cybersecurity vulnerabilities of your business - Berezha Security G...
Webinar | Cybersecurity vulnerabilities of your business - Berezha Security G...Webinar | Cybersecurity vulnerabilities of your business - Berezha Security G...
Webinar | Cybersecurity vulnerabilities of your business - Berezha Security G...
Berezha Security Group
 
Juarez Barbosa Junior - Microsoft - OSL19
Juarez Barbosa Junior - Microsoft - OSL19Juarez Barbosa Junior - Microsoft - OSL19
Juarez Barbosa Junior - Microsoft - OSL19
marketingsyone
 
Von JavaEE auf Microservice in 6 Monaten - The Good, the Bad, and the wtfs...
Von JavaEE auf Microservice in 6 Monaten - The Good, the Bad, and the wtfs...Von JavaEE auf Microservice in 6 Monaten - The Good, the Bad, and the wtfs...
Von JavaEE auf Microservice in 6 Monaten - The Good, the Bad, and the wtfs...
André Goliath
 
Best Cyber Security Certification And Tableau Online Training Courses Online
Best Cyber Security Certification And Tableau Online Training Courses OnlineBest Cyber Security Certification And Tableau Online Training Courses Online
Best Cyber Security Certification And Tableau Online Training Courses Online
Skill squad
 
Head in the Clouds, Feet on the Ground
Head in the Clouds, Feet on the GroundHead in the Clouds, Feet on the Ground
Head in the Clouds, Feet on the Ground
RickMeasham
 
So... you want to be a security consultant
So... you want to be a security consultant So... you want to be a security consultant
So... you want to be a security consultant
abnmi
 
Brand Commerce - We all know the shiny stuff at the front. But what magic is ...
Brand Commerce - We all know the shiny stuff at the front. But what magic is ...Brand Commerce - We all know the shiny stuff at the front. But what magic is ...
Brand Commerce - We all know the shiny stuff at the front. But what magic is ...
Rien van den Bosch
 
ChatGPT and not only: How to use the power of GPT-X models at scale
ChatGPT and not only: How to use the power of GPT-X models at scaleChatGPT and not only: How to use the power of GPT-X models at scale
ChatGPT and not only: How to use the power of GPT-X models at scale
Maxim Salnikov
 
SCS Service_PPT
SCS Service_PPTSCS Service_PPT
SCS Service_PPT
Christine Laikind
 
How secure are your IT systems? (Darrell Burkey, CASE)
How secure are your IT systems? (Darrell Burkey, CASE)How secure are your IT systems? (Darrell Burkey, CASE)
How secure are your IT systems? (Darrell Burkey, CASE)
makinglinks
 
Triangulum - Ransomware Evolved - Why your backups arent good enough
Triangulum - Ransomware Evolved - Why your backups arent good enoughTriangulum - Ransomware Evolved - Why your backups arent good enough
Triangulum - Ransomware Evolved - Why your backups arent good enough
Martin Opsahl
 
Broken by design (Danny Fullerton)
Broken by design (Danny Fullerton)Broken by design (Danny Fullerton)
Broken by design (Danny Fullerton)
Hackfest Communication
 
The Trinity in Exponential Technologies: Open Source, Blockchain and Microsof...
The Trinity in Exponential Technologies: Open Source, Blockchain and Microsof...The Trinity in Exponential Technologies: Open Source, Blockchain and Microsof...
The Trinity in Exponential Technologies: Open Source, Blockchain and Microsof...
Juarez Junior
 
vDesk.works Secure Cloud Desktop Solution.pptx
vDesk.works Secure Cloud Desktop Solution.pptxvDesk.works Secure Cloud Desktop Solution.pptx
vDesk.works Secure Cloud Desktop Solution.pptx
vDesk.Works
 
7 Experts on Implementing Microsoft Defender for Endpoint
7 Experts on Implementing Microsoft Defender for Endpoint7 Experts on Implementing Microsoft Defender for Endpoint
7 Experts on Implementing Microsoft Defender for Endpoint
Mighty Guides, Inc.
 

Similar to How to Stand Out in Cybersecurity (20)

Would you like to make a great level of residual income today?
Would you like to make a great level of residual income today?Would you like to make a great level of residual income today?
Would you like to make a great level of residual income today?
 
Enhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber RangeEnhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber Range
 
232 a7d01
232 a7d01232 a7d01
232 a7d01
 
Incident Response in the wake of Dear CEO
Incident Response in the wake of Dear CEOIncident Response in the wake of Dear CEO
Incident Response in the wake of Dear CEO
 
How Cyber Security Courses Opens Up Amazing Career Opportunities?
How Cyber Security Courses Opens Up Amazing Career Opportunities?How Cyber Security Courses Opens Up Amazing Career Opportunities?
How Cyber Security Courses Opens Up Amazing Career Opportunities?
 
Webinar | Cybersecurity vulnerabilities of your business - Berezha Security G...
Webinar | Cybersecurity vulnerabilities of your business - Berezha Security G...Webinar | Cybersecurity vulnerabilities of your business - Berezha Security G...
Webinar | Cybersecurity vulnerabilities of your business - Berezha Security G...
 
Juarez Barbosa Junior - Microsoft - OSL19
Juarez Barbosa Junior - Microsoft - OSL19Juarez Barbosa Junior - Microsoft - OSL19
Juarez Barbosa Junior - Microsoft - OSL19
 
Von JavaEE auf Microservice in 6 Monaten - The Good, the Bad, and the wtfs...
Von JavaEE auf Microservice in 6 Monaten - The Good, the Bad, and the wtfs...Von JavaEE auf Microservice in 6 Monaten - The Good, the Bad, and the wtfs...
Von JavaEE auf Microservice in 6 Monaten - The Good, the Bad, and the wtfs...
 
Best Cyber Security Certification And Tableau Online Training Courses Online
Best Cyber Security Certification And Tableau Online Training Courses OnlineBest Cyber Security Certification And Tableau Online Training Courses Online
Best Cyber Security Certification And Tableau Online Training Courses Online
 
Head in the Clouds, Feet on the Ground
Head in the Clouds, Feet on the GroundHead in the Clouds, Feet on the Ground
Head in the Clouds, Feet on the Ground
 
So... you want to be a security consultant
So... you want to be a security consultant So... you want to be a security consultant
So... you want to be a security consultant
 
Brand Commerce - We all know the shiny stuff at the front. But what magic is ...
Brand Commerce - We all know the shiny stuff at the front. But what magic is ...Brand Commerce - We all know the shiny stuff at the front. But what magic is ...
Brand Commerce - We all know the shiny stuff at the front. But what magic is ...
 
ChatGPT and not only: How to use the power of GPT-X models at scale
ChatGPT and not only: How to use the power of GPT-X models at scaleChatGPT and not only: How to use the power of GPT-X models at scale
ChatGPT and not only: How to use the power of GPT-X models at scale
 
SCS Service_PPT
SCS Service_PPTSCS Service_PPT
SCS Service_PPT
 
How secure are your IT systems? (Darrell Burkey, CASE)
How secure are your IT systems? (Darrell Burkey, CASE)How secure are your IT systems? (Darrell Burkey, CASE)
How secure are your IT systems? (Darrell Burkey, CASE)
 
Triangulum - Ransomware Evolved - Why your backups arent good enough
Triangulum - Ransomware Evolved - Why your backups arent good enoughTriangulum - Ransomware Evolved - Why your backups arent good enough
Triangulum - Ransomware Evolved - Why your backups arent good enough
 
Broken by design (Danny Fullerton)
Broken by design (Danny Fullerton)Broken by design (Danny Fullerton)
Broken by design (Danny Fullerton)
 
The Trinity in Exponential Technologies: Open Source, Blockchain and Microsof...
The Trinity in Exponential Technologies: Open Source, Blockchain and Microsof...The Trinity in Exponential Technologies: Open Source, Blockchain and Microsof...
The Trinity in Exponential Technologies: Open Source, Blockchain and Microsof...
 
vDesk.works Secure Cloud Desktop Solution.pptx
vDesk.works Secure Cloud Desktop Solution.pptxvDesk.works Secure Cloud Desktop Solution.pptx
vDesk.works Secure Cloud Desktop Solution.pptx
 
7 Experts on Implementing Microsoft Defender for Endpoint
7 Experts on Implementing Microsoft Defender for Endpoint7 Experts on Implementing Microsoft Defender for Endpoint
7 Experts on Implementing Microsoft Defender for Endpoint
 

Recently uploaded

Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
jpupo2018
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 

Recently uploaded (20)

Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 

How to Stand Out in Cybersecurity

  • 1. How to Stand Out in Cybersecurity By Jeff Starke Principal Security Engineer | MegaplanIT 01
  • 2. Presentation name goes here “The only true wisdom is in knowing that you know nothing.” -Socrates 02How to Stand Out in
  • 3. Presentation name goes here Meet The Speaker Being successful within cybersecurity requires that you be dynamic. You can’t rely on one technology or knowledge base. The job of any security professional is to align themselves with the business, to the point that you become a business enabler. Whatever your business provides, and whatever platforms it utilizes, it's your responsibility to become that type of security professional. Linux Windows Networking MacOS AWS Azure Jeff Starke Aiming to strengthen America's network security infrastructure, one company at a time. Principal Security Engineer VMware Ansible 03How to Stand Out in 10% 90% 80% Windows Administration Network Engineering Linux Administration
  • 4. Presentation name goes here Cybersecurity Predictions 2019 2018 2021 2024 20XX Cyber industry was valued at $120 Billion Cyber industry expected to reach $300 Billion 1 Million unfilled cybersecurity positions Openings expected to grow to 3.5 Million 04 High probability of a major cyber event in our lifetime How to Stand Out in
  • 5. Presentation name goes here Home Lab There’s no better way to learn than by getting your hands on the equipment. Volunteer Contribute to a greater purpose while helping support and learn. Internship Get paid while learning valuable skills that will help shape your career. Stand-Out Strategies 05How to Stand Out in
  • 6. Presentation name goes here Start a Home Lab Older or no hardware? No problem. Home labs provide you an opportunity to gain experience deploying, testing, and learning about various systems. This experience can then be leveraged on your resume and during interviews and help communicate your passion. VMware Workstation 06 Virtual Box (Oracle) KVM (Linux Kernel) Hyper-V (Windows) EC2 Instances (AWS) Azure, GCP, etc. How to Stand Out in
  • 7. Presentation name goes here Local co-op is no longer supported. Each user must have their own console. What if we could virtualize? Want to be able to play local multi-player on games that only support multi-player online. The Problem 07 Two Consoles == $$$ Two Games == $$$ Two Online Subscriptions === $$$ One Old Desktop ==  Two Games == $$$ No PC Subscriptions == 
  • 8. Presentation name goes here Start a Home Lab 08 Two Virtual Windows Gaming Rigs Dedicated GPU with Zero Latency Additional Resources for VM Testing Multi-headed Gaming PC How to Stand Out in
  • 9. Presentation name goes here Volunteer Your Time Looking to gain experience and give back? Volunteering with a non-profit or school is a great way to get hands-on experience with enterprise tools. Many can’t afford cybersecurity specialists and, consequently, are very vulnerable. This experience can help highlight your personal goals and objectives, and show this isn’t just a job in your eyes. https://greatnonprofits.org/near-me/ 09How to Stand Out in
  • 10. Presentation name goes here Volunteer Your Time 10 Implement Identity Access Controls Built Open-Source Security Camera System Cybersecurity Advisor – Volunteer Phoenix Dream Center Phoenix Dream Center provides meals, housing, counseling and outreach services for homeless and at- risk youth in our local community. They offer one of the best (and only) human trafficking recovery programs in the nation. They provide safe housing, spiritual care, family care, and educational programs for those who have been saved from trafficking. How to Stand Out in
  • 11. Presentation name goes here Work for It With more structure, you will receive hands-on experience and mentorship. 11 Interned at SRP under Server Management CMDB Change Control Server Hardware Network Infrastructure Patch Management NERC CIP Provisioning Secure Wiping Documenting Disaster Recovery VDI Project Planning How to Stand Out in
  • 12. Presentation name goes here 12How to Stand Out in Want more structure, and the opportunity to get paid while you learn? Maybe an internship is right for you. Work for It https://www.estrellamountain.edu/students/internships

Editor's Notes

  1. Can I get a quick show of hands, who here is currently working in cyber security? Who is currently working in another field of IT? That’s helpful to know. I hope that everyone can take something away from this presentation.
  2. I’m a big fan of stoic philosophy, and Socrates was a stoic during his time. This quote is extremely relevant to cybersecurity and I think anyone who has worked in cyber security would agree. There’s a lot to know. Security Domains Security Tools Underlying Infrastructure Cyber includes a lot, and is always changing.
  3. Personal Mission What I do This quote I adapted from something (John Visneski, Director of Information Security for Pokemon Company International) once said. (Read)
  4. In order to understand where we’re going, we need to know where we’ve been. Types of Cybersecurity Openings (Not everyone’s a CISO) Outside of the business focus… is cyber as it relates to National Security (Far behind other nations)
  5. Listed here are the three strategies we’ll be reviewing, and that I highly recommend you pursue, for standing out in cybersecurity. (pause)
  6. First up is the idea of having a home lab. I always recommend everyone start a home lab, and the first response I get is that they don’t have the resources. Experience that you can leverage Don’t just read the instructions
  7. Personal Case Study Time! I had a problem… My wife and I liked to play local multi-player games, but most games stopped including that feature.
  8. So I built STASYS, a multi-headed gaming PC. An ESX server hosting two virtual windows gaming rigs. Each had a dedicated graphics card and experienced zero latency because of the hardware pass-through. Another benefit was that this provided me with a personal, virtual environment for deploying, testing, and learning about other platforms.
  9. Second strategy I have is to volunteer your time. When you’re still building your skills you might not have enough experience to get hired directly into a cybersecurity role. Hands on w/ enterprise tools As well as highlight… (last paragraph) Mention link Word of caution, experience needed
  10. Personal Case Study Time! I’m currently volunteering with… PDC provides… (first paragraph) New Equipment > Identity Access Controls and Security Policy They also needed an updated security system… Currently looking for donations!
  11. Now, for our third and final strategy, getting into an internship. For this one I’m going to flip the script! Let’s start with my personal case study! SRP Experience Built on Learning Highlight Bubbles (Configuration Management Database) Extremely helpful in developing my current skill set