Reader small image

You're reading from  Cybersecurity Career Master Plan

Product typeBook
Published inSep 2021
PublisherPackt
ISBN-139781801073561
Edition1st Edition
Right arrow
Authors (4):
Dr. Gerald Auger
Dr. Gerald Auger
author image
Dr. Gerald Auger

Dr. Gerald Auger has worked within information security since 2006 and holds a PhD in cyber operations. Gerald has helped tens of thousands of aspiring cybersecurity professionals through his "Simply Cyber" YouTube channel and is regularly interviewed for his thoughts on cybersecurity professional development. Gerald is a full-time information security practitioner, adjunct faculty at The Citadel, The Military College of South Carolina; chief content creator for Simply Cyber; and managing director at Coastal Information Security Group.
Read more about Dr. Gerald Auger

Jaclyn “Jax” Scott
Jaclyn “Jax” Scott
author image
Jaclyn “Jax” Scott

Jaclyn "Jax" Scott is a tenured Special Operations Warrant Officer with nearly 18 years of experience working in military cyber, electronic warfare, and intelligence operations. She is the founder and content creator of Beans and Bytes tech blog, co-host of the cybersecurity podcast Hackerz and Haecksen, and the president of Outpost Gray, a cybersecurity consulting firm. Jax is an expert in military cyber policy and has led global development operations in cyber countermeasures to mitigate near-peer attacks. She is currently pursuing her master's in Cyber Intelligence at Georgetown University.
Read more about Jaclyn “Jax” Scott

Jonathan Helmus
Jonathan Helmus
author image
Jonathan Helmus

Jonathan Helmus ("Moos1e") is a penetration tester and professor with over 10 years of experience in engineering, information security, and information technology. Jon resides in a small town right outside Seattle, Washington, where he and his family raise alpacas on their mini farm. Currently, Jon works as a freelance educator teaching topics such as pentesting, red teaming, cloud security, and vulnerability exploitation. He also works as a contract pentester and cloud security professional for clients all around the world.
Read more about Jonathan Helmus

Kim Nguyen
Kim Nguyen
author image
Kim Nguyen

Kim Nguyen is a Software Engineer, with a broad background thanks to her B.S. in business administration and M.S. in computer science. Kim's day-to-day work focuses on software engineering of cloud-based technologies, while continuing her research into cybersecurity on the side. Kim is also an instructor at the City University of Seattle, where she teaches computer science courses. She is an active technical speaker and researcher at cybersecurity and computer science conferences. Kim holds several certificates, including AWS Certified Developer and CompTIA Linux+. Kim is the founder of Passion Sets Success, a platform that helps people identify their passion, to achieve the right career for them.
Read more about Kim Nguyen

View More author details
Right arrow

Chapter 8: Giving Back to Others and Yourself

Alright, so now we get to the part of your journey where you need to figure out what you need to do to continue developing and learning throughout your career. Up until this point, we have discussed different careers, how to get skills for those careers, and also helped you plan your way to getting that first cybersecurity job. However, the story continues even after you land the ideal job that you patiently and diligently worked so hard to get. 

This chapter is going to discuss what you need to do after your successful appointment, as well as things to look out for. When all your hard work pays off, that does not mean you stop working. However, you can take frequent breaks and start to settle into your career. It's time to start learning how you can continue your information security path in the direction that you desire. This chapter is written to help you understand how continuing your growth will help influence your success...

The "How-To" of public speaking

To begin this chapter, we will discuss topics to consider when it comes to public speaking or giving lectures to other cybersecurity enthusiasts. This entails submitting proposals to conferences and events that are based on relevant topics of interest to you, or research areas that you want to discuss with folks in the industry. This is a great way to teach yourself to still be a student, while also giving back and teaching others. It is also a great way to showcase yourself as a professional! Think of public speaking as a way to have a live resume, where you discuss your history as a cybersecurity professional, and also the topics that interest you.

Important note

There is an old saying that goes "To teach, one must maintain the mind of a student. A student continually learns and strives to obtain new knowledge. A teacher must do the same, but share that knowledge to enlighten those around them."

In information security...

What burnout is and how to avoid it

You know that feeling when you are passionate about something, and then you start to lose interest in it – even though you still really want to enjoy it? Often, this type of lifeless feeling can make us feel exhausted and be unable to participate in what we love. For example, perhaps you really love playing chess, but you have dived so deep into playing the game with no breaks that it has made you feel exhausted. Additionally, perhaps you have played through the exhaustion and used substances to help push through.

This example of the chess-playing scenario is an indicator of burnout. Burnout is a phase of emotional, physical, and mental exhaustion caused by extreme and extended stress over a period of time. It happens when you feel defeated, emotionally drained, and powerless to meet endless demands. In the case of the chess scenario, the game was played over a prolonged period of time, without any breaks. This could cause mental exhaustion...

Indicators of a toxic environment

Toxic work environments can leave you feeling tired, unfulfilled, or even worthless (harsh but true) when it comes to your professional and personal life. This tends to take a toll on us physically, and can even affect us mentally. In today's cyber work environment, it is easy to get overworked because there tends to always be a problem that needs solving, and never enough time to solve it:

Figure 8.3 – Toxicity

Toxicity in the workplace may not look like someone constantly yelling at you or giving you unrealistic deadlines. In fact, a lot of toxicity within the workplace is very subtle and may not even impact you in the way you think. The following are some indicators of a toxic work environment and how you can remove yourself professionally without burning any bridges. 

Exclusion and gossip 

We have learned over the years that there is no room for gossip within the workplace. This doesn't...

Summary

This chapter talked a lot about different things that we need to think about when speaking with others in a conference or mentor setting. As discussed, there are lots of ways to give back to the industry, and quite a few different roads to take when attempting to help others. Remember that it doesn't matter how you help or make a positive impact – it matters that at some point, you find your own way to make that positive impact.

The next section is going to discuss how you can trust yourself, the industry, and the overall process of getting into cybersecurity. Remember that your cyber career is not about the destination, it is about the journey!

Further reading

Refer to the following links for more information on the topics covered in this chapter:

lock icon
The rest of the chapter is locked
You have been reading a chapter from
Cybersecurity Career Master Plan
Published in: Sep 2021Publisher: PacktISBN-13: 9781801073561
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
undefined
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €14.99/month. Cancel anytime

Authors (4)

author image
Dr. Gerald Auger

Dr. Gerald Auger has worked within information security since 2006 and holds a PhD in cyber operations. Gerald has helped tens of thousands of aspiring cybersecurity professionals through his "Simply Cyber" YouTube channel and is regularly interviewed for his thoughts on cybersecurity professional development. Gerald is a full-time information security practitioner, adjunct faculty at The Citadel, The Military College of South Carolina; chief content creator for Simply Cyber; and managing director at Coastal Information Security Group.
Read more about Dr. Gerald Auger

author image
Jaclyn “Jax” Scott

Jaclyn "Jax" Scott is a tenured Special Operations Warrant Officer with nearly 18 years of experience working in military cyber, electronic warfare, and intelligence operations. She is the founder and content creator of Beans and Bytes tech blog, co-host of the cybersecurity podcast Hackerz and Haecksen, and the president of Outpost Gray, a cybersecurity consulting firm. Jax is an expert in military cyber policy and has led global development operations in cyber countermeasures to mitigate near-peer attacks. She is currently pursuing her master's in Cyber Intelligence at Georgetown University.
Read more about Jaclyn “Jax” Scott

author image
Jonathan Helmus

Jonathan Helmus ("Moos1e") is a penetration tester and professor with over 10 years of experience in engineering, information security, and information technology. Jon resides in a small town right outside Seattle, Washington, where he and his family raise alpacas on their mini farm. Currently, Jon works as a freelance educator teaching topics such as pentesting, red teaming, cloud security, and vulnerability exploitation. He also works as a contract pentester and cloud security professional for clients all around the world.
Read more about Jonathan Helmus

author image
Kim Nguyen

Kim Nguyen is a Software Engineer, with a broad background thanks to her B.S. in business administration and M.S. in computer science. Kim's day-to-day work focuses on software engineering of cloud-based technologies, while continuing her research into cybersecurity on the side. Kim is also an instructor at the City University of Seattle, where she teaches computer science courses. She is an active technical speaker and researcher at cybersecurity and computer science conferences. Kim holds several certificates, including AWS Certified Developer and CompTIA Linux+. Kim is the founder of Passion Sets Success, a platform that helps people identify their passion, to achieve the right career for them.
Read more about Kim Nguyen