Reader small image

You're reading from  Cybersecurity Architect's Handbook

Product typeBook
Published inMar 2024
PublisherPackt
ISBN-139781803235844
Edition1st Edition
Right arrow
Author (1)
Lester Nichols
Lester Nichols
author image
Lester Nichols

Lester E. Nichols III currently resides in North Texas and is the Director Security Architecture/VP Cybersecurity Operations at JPMorgan Chase & Co. Previous experience includes the Director of IT Infrastructure and Security for a development company, SOC oversight manager/Senior Infrastructure Officer within DHS and previous experience in Local/Federal/DoD/financial sectors. Lester has post graduate education with a Master's of Science Degree in Information Assurance from Norwich University, the oldest private military school in the United States, and multiple industry certifications including CISSP and SANS certs, as well as others. Lester is also a contributing author to the Computer Security Handbook 5th-6th Editions by Wiley Press.
Read more about Lester Nichols

Right arrow

Entry-Level- to-Architect Roadmap

“There are not more than five musical notes, yet the combinations of these five give rise to more melodies than can ever be heard. There are not more than five primary colours, yet in combination they produce more hues than can ever been seen. There are not more than five cardinal tastes, yet combinations of them yield more flavours than can ever be tasted.”

–Sun Tzu

In the previous chapter, we covered an understanding of how comprehensive and communicative documentation serves as a basis for effective cybersecurity architecture and governance. The combination of standards-based formats, purpose-built tools, and collaborative approaches enables organizations to create, manage, and consume documentation efficiently. By adopting the recommendations outlined in this chapter, cybersecurity teams can produce documentation that informs and educates rather than obfuscates. The methodologies aim to make documentation comprehensive...

The journey

It is important to remember that the journey begins with the first step. In this case, it is deciding where to go. While it is possible to just travel along life with no direction or destination, this can lead to great excitement or utter stagnation. Like a boat that has no rudder or sail, you are left to tidal forces to take you from place to place. This can definitely provide adventure and excitement but also has the potential to leave you stranded in the middle of the ocean without resources and at the mercy of the destructive power of an ocean storm.

Your career can be as equally challenging, making the desired destination an important decision to make regardless of where you begin. Using Jeff Goldblum’s character Ian Malcolm from Jurassic Park as an example, he explains chaos theory using drops of water. Ian takes a drop of water and places it on the hand of another character, and it flows down the hand in a specific direction. He then repeats what he did...

Where to start

The parallels between aerial combat maneuvering and navigating a cybersecurity career are more than metaphorical. Both require operating within intense OODA loops—continuously observing, orienting, deciding, and acting.

Like fighter pilots, cyber professionals must voraciously absorb intelligence on the latest threats, innovations, and industry movements. This radar sweep of the environment equates to OODA’s observation phase.

They must then orient themselves by analyzing observations and synthesizing context on where they stand relative to the frontier. What skills, certs, or experience will differentiate them from the competition?

Informed orientation enables decisive career maneuvering. Should they specialize further or expand their breadth? Pursue management or technical mastery? Switch industries or domains? The optimal decision stems from timely orientation.

Finally, prompt action is imperative—upskilling rapidly, seizing opportunities...

The cold open

For those looking to pivot into a cybersecurity career from a non-technical background, the path to becoming a CSA may seem daunting. However, with proper planning and focus, it is certainly achievable. The key is to take incremental steps to methodically build both technical expertise and business acumen. While the core competency stage may rely more on self-study, later milestones benefit from structured learning.

Taking inventory of your skills

The first stage is gaining core competencies. For those outside technology, this means learning networking basics, operating systems, and scripting. Certifications such as CompTIA IT Fundamentals, Network+, and Security+ provide initial credibility. Hands-on projects, online courses, and volunteering for tech roles during your current job can accelerate learning:

  • Research job roles and skill requirements for entry-level IT and cybersecurity roles to understand expected qualifications. Identify knowledge gaps.
  • ...

The transfer

For technology professionals seeking to advance their careers toward a CSA role, the journey requires building diverse hands-on experience and demonstrating architectural vision. While foundational technology skills provide a strong starting point, progressing through increasing levels of responsibility and capability is key.

The first milestone after gaining core competencies is obtaining an intermediate cybersecurity practitioner role, such as security analyst, network security engineer, or penetration tester. Certifications such as Security+, CISSP, and CEH validate capabilities. Immerse yourself in specific security domains while strengthening soft skills such as communication, collaboration, and project management.

The next stage involves demonstrating leadership and versatility as a security specialist or consultant. Expand the depth of skills in your chosen specialty while broadening knowledge across other areas. Pursue advanced certifications and lead complex...

How to expand

Launching a cybersecurity career on strong technical foundations is crucial. Common starting points are degrees in computer science or information technology, which provide fundamental knowledge of systems, networking, and programming. Hands-on roles such as systems administrator or network engineer allow burgeoning professionals to hone real-world skills in managing systems, servers, and infrastructure. During 2–4 years in these positions, continuous learning is imperative. Pursuing entry-level certifications such as CompTIA’s Network+ and Security+ validates core competencies and shows commitment to growth.

Pivoting to cybersecurity

Armed with well-rounded technical abilities, the next phase involves transitioning into cybersecurity-focused functions. Roles such as security analyst, ethical hacker, and vulnerability assessor provide a specific understanding of cyber risks, compliance standards, TI, and security testing. Immersion in these roles allows...

Summary

This chapter outlined a framework for progressing through a cybersecurity career, using the journey from entry-level to architect roles as an example. It emphasized that while cybersecurity foundations seem basic, combining them creatively like musical notes into elegant solutions requires finesse gained over time.

It examined milestones at each level. Early roles focus on building diverse technical competencies and foundational certs while avoiding overspecialization. Mid-level pivots into hands-on security functions, pursuing intermediate certifications and specializing while networking to enable advancement. At the advanced stage, cultivating specialized expertise in a domain while demonstrating leadership versatility is key.

Reaching the pinnacle of the CSA role requires synthesizing technical and business capabilities. Personal examples illustrated potential pathways, such as progressing from network engineering to infrastructure security to enterprise architecture...

lock icon
The rest of the chapter is locked
You have been reading a chapter from
Cybersecurity Architect's Handbook
Published in: Mar 2024Publisher: PacktISBN-13: 9781803235844
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
undefined
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime

Author (1)

author image
Lester Nichols

Lester E. Nichols III currently resides in North Texas and is the Director Security Architecture/VP Cybersecurity Operations at JPMorgan Chase & Co. Previous experience includes the Director of IT Infrastructure and Security for a development company, SOC oversight manager/Senior Infrastructure Officer within DHS and previous experience in Local/Federal/DoD/financial sectors. Lester has post graduate education with a Master's of Science Degree in Information Assurance from Norwich University, the oldest private military school in the United States, and multiple industry certifications including CISSP and SANS certs, as well as others. Lester is also a contributing author to the Computer Security Handbook 5th-6th Editions by Wiley Press.
Read more about Lester Nichols