Reader small image

You're reading from  Cybersecurity Career Master Plan

Product typeBook
Published inSep 2021
PublisherPackt
ISBN-139781801073561
Edition1st Edition
Right arrow
Authors (4):
Dr. Gerald Auger
Dr. Gerald Auger
author image
Dr. Gerald Auger

Dr. Gerald Auger has worked within information security since 2006 and holds a PhD in cyber operations. Gerald has helped tens of thousands of aspiring cybersecurity professionals through his "Simply Cyber" YouTube channel and is regularly interviewed for his thoughts on cybersecurity professional development. Gerald is a full-time information security practitioner, adjunct faculty at The Citadel, The Military College of South Carolina; chief content creator for Simply Cyber; and managing director at Coastal Information Security Group.
Read more about Dr. Gerald Auger

Jaclyn “Jax” Scott
Jaclyn “Jax” Scott
author image
Jaclyn “Jax” Scott

Jaclyn "Jax" Scott is a tenured Special Operations Warrant Officer with nearly 18 years of experience working in military cyber, electronic warfare, and intelligence operations. She is the founder and content creator of Beans and Bytes tech blog, co-host of the cybersecurity podcast Hackerz and Haecksen, and the president of Outpost Gray, a cybersecurity consulting firm. Jax is an expert in military cyber policy and has led global development operations in cyber countermeasures to mitigate near-peer attacks. She is currently pursuing her master's in Cyber Intelligence at Georgetown University.
Read more about Jaclyn “Jax” Scott

Jonathan Helmus
Jonathan Helmus
author image
Jonathan Helmus

Jonathan Helmus ("Moos1e") is a penetration tester and professor with over 10 years of experience in engineering, information security, and information technology. Jon resides in a small town right outside Seattle, Washington, where he and his family raise alpacas on their mini farm. Currently, Jon works as a freelance educator teaching topics such as pentesting, red teaming, cloud security, and vulnerability exploitation. He also works as a contract pentester and cloud security professional for clients all around the world.
Read more about Jonathan Helmus

Kim Nguyen
Kim Nguyen
author image
Kim Nguyen

Kim Nguyen is a Software Engineer, with a broad background thanks to her B.S. in business administration and M.S. in computer science. Kim's day-to-day work focuses on software engineering of cloud-based technologies, while continuing her research into cybersecurity on the side. Kim is also an instructor at the City University of Seattle, where she teaches computer science courses. She is an active technical speaker and researcher at cybersecurity and computer science conferences. Kim holds several certificates, including AWS Certified Developer and CompTIA Linux+. Kim is the founder of Passion Sets Success, a platform that helps people identify their passion, to achieve the right career for them.
Read more about Kim Nguyen

View More author details
Right arrow

Chapter 9: Trusting the Process

As we conclude this book, Gerald and Jax want to leave you with some final thoughts on goal setting, mentorship, and networking. This final chapter will explain the importance of goalsetting and why goals are critical for career growth. We will explain the importance of mentorship and networking and how both can help with personal and professional growth.

We will be covering the following topics in this chapter:

  • Understanding the SMART goalsetting framework
  • Learning about the mentor and mentee relationship
  • Exploring different ways to network with impact

Understanding the SMART goalsetting framework

Have you ever felt like you are working hard but spinning your wheels? That you have big dreams but cannot seem to reach them, no matter what you do or how hard you try? Goals are the steps to dreams, and they are critical for long-term and sustainable success. This section will help you take a step back and refine your goals by developing, prioritizing, and being specific. In this section, we will review the SMART goalsetting framework to provide guidance on how to create personalized goals to fit your career desires.

Proper goalsetting addresses time-sensitive and important goals first, then moves downward to other goals that are still important to your overall vision.

The following diagram provides a visual depiction of this framework:

Figure 9.1 – SMART framework information graph

SMART is a mnemonic acronym that stands for the following:

  • Specific (what, who, where, and why)
  • Measurable...

Learning about the mentor and mentee relationship

The concept of mentoring has such incredible value, especially within the information security community. It's a practical means for sharing knowledge and networking with like-minded professionals. These relationships can have various forms and lifespans, but there are techniques you can employ to find and maximize their utility.

First, let's explain the difference between a mentor and mentee. Everybody was a beginner at some point in any skill. Experienced people have acquired knowledge and can share it with those that do not have it yet. They can mentor a mentee to transition them from knowing nothing on a topic or skill to becoming proficient. 

"Those that fail to learn from history are doomed to repeat it" is a famous quote by Winston Churchill and very applicable here. A mentor can guide a mentee to avoid pitfalls and mistakes the mentor has already made. Hopefully, you can see the immense value as...

Exploring different ways to network with impact

I read a book called Never Eat Alone by author Keith Ferrazzi, and there was a description in this book that stuck with me. The book is based around using your time wisely while still finding time to network. The author explains that there are three ways of launching a successful business, as follows:

  • You have a lot of wealth, which affords you the ability to finance your company.
  • You are an expert in a specific field, such as an attorney or doctor.
  • You have a healthy network that comprises wealthy influential people who trust you and would be willing to invest in your business.

I pondered about which one of these would be the most realistic for me to accomplish in the shortest period. I decided to focus on number three and develop a strong and influential network.

Building followers is different than building a network. In the Chapter 6, Time to Brand Yourself – Not the Burning Type, we talked about...

Summary

As we come to the end of this book, we want to remind you that the cybersecurity field is very diverse. In this chapter, we provided you with the final tools for your toolkit so that you can be as successful as possible.

Having a clear vision of your achievable and supportive goals is critical for success. If you don't have one yet, find a mentor. The mentor/mentee relationships in this industry are vital. It's the backbone of growth. Finally, build your family and your network. Consider your network a reflection of your morals and desires.

At this point, you should have a clearer picture of cybersecurity, the different career paths available, and how to create and set goals. We encourage you to take a few minutes and write down where you believe your skills and passion best fit within the industry. Create goals around that career path and begin taking the steps to reach your dream. If you have questions or need additional guidance, please reach out to any...

lock icon
The rest of the chapter is locked
You have been reading a chapter from
Cybersecurity Career Master Plan
Published in: Sep 2021Publisher: PacktISBN-13: 9781801073561
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
undefined
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime

Authors (4)

author image
Dr. Gerald Auger

Dr. Gerald Auger has worked within information security since 2006 and holds a PhD in cyber operations. Gerald has helped tens of thousands of aspiring cybersecurity professionals through his "Simply Cyber" YouTube channel and is regularly interviewed for his thoughts on cybersecurity professional development. Gerald is a full-time information security practitioner, adjunct faculty at The Citadel, The Military College of South Carolina; chief content creator for Simply Cyber; and managing director at Coastal Information Security Group.
Read more about Dr. Gerald Auger

author image
Jaclyn “Jax” Scott

Jaclyn "Jax" Scott is a tenured Special Operations Warrant Officer with nearly 18 years of experience working in military cyber, electronic warfare, and intelligence operations. She is the founder and content creator of Beans and Bytes tech blog, co-host of the cybersecurity podcast Hackerz and Haecksen, and the president of Outpost Gray, a cybersecurity consulting firm. Jax is an expert in military cyber policy and has led global development operations in cyber countermeasures to mitigate near-peer attacks. She is currently pursuing her master's in Cyber Intelligence at Georgetown University.
Read more about Jaclyn “Jax” Scott

author image
Jonathan Helmus

Jonathan Helmus ("Moos1e") is a penetration tester and professor with over 10 years of experience in engineering, information security, and information technology. Jon resides in a small town right outside Seattle, Washington, where he and his family raise alpacas on their mini farm. Currently, Jon works as a freelance educator teaching topics such as pentesting, red teaming, cloud security, and vulnerability exploitation. He also works as a contract pentester and cloud security professional for clients all around the world.
Read more about Jonathan Helmus

author image
Kim Nguyen

Kim Nguyen is a Software Engineer, with a broad background thanks to her B.S. in business administration and M.S. in computer science. Kim's day-to-day work focuses on software engineering of cloud-based technologies, while continuing her research into cybersecurity on the side. Kim is also an instructor at the City University of Seattle, where she teaches computer science courses. She is an active technical speaker and researcher at cybersecurity and computer science conferences. Kim holds several certificates, including AWS Certified Developer and CompTIA Linux+. Kim is the founder of Passion Sets Success, a platform that helps people identify their passion, to achieve the right career for them.
Read more about Kim Nguyen