<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Cyberwox Unplugged: Career]]></title><description><![CDATA[Newsletter issues specifically focused on cybersecurity engineering career advice.]]></description><link>https://www.cyberwoxunplugged.com/s/career</link><image><url>https://substackcdn.com/image/fetch/$s_!pA5b!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b1ed158-420f-4ae6-9aaa-adc23c31da06_1280x1280.png</url><title>Cyberwox Unplugged: Career</title><link>https://www.cyberwoxunplugged.com/s/career</link></image><generator>Substack</generator><lastBuildDate>Mon, 04 May 2026 06:59:10 GMT</lastBuildDate><atom:link href="https://www.cyberwoxunplugged.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Dayspring Johnson]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[cyberwox@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[cyberwox@substack.com]]></itunes:email><itunes:name><![CDATA[Day Johnson]]></itunes:name></itunes:owner><itunes:author><![CDATA[Day Johnson]]></itunes:author><googleplay:owner><![CDATA[cyberwox@substack.com]]></googleplay:owner><googleplay:email><![CDATA[cyberwox@substack.com]]></googleplay:email><googleplay:author><![CDATA[Day Johnson]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Cybersecurity Engineering Career Lessons You Won’t Get in Certification Courses]]></title><description><![CDATA[Lessons in Security Engineering from Jason Chan&#8217;s High-Velocity Framework (and My Own Battles in the Field).]]></description><link>https://www.cyberwoxunplugged.com/p/cybersecurity-engineering-career</link><guid isPermaLink="false">https://www.cyberwoxunplugged.com/p/cybersecurity-engineering-career</guid><dc:creator><![CDATA[Day Johnson]]></dc:creator><pubDate>Fri, 21 Nov 2025 14:49:21 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/d1ad9f07-e5c4-453e-ac28-ae20d91e521f_1440x810.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>A few months ago, I read <a href="https://www.linkedin.com/in/jasonbchan/">Jason Chan&#8217;s</a> feature in the TL;DR sec newsletter titled&nbsp;<em><a href="https://tldrsec.com/p/security-for-high-velocity-engineering">"Security for High-Velocity Engineering</a></em>." If you&#8217;ve ever built security tooling or led engineering efforts under pressure, the piece might feel less like a framework and more like a mirror. </p><p>It&#8217;s a strategic blueprint from someone who helped Netflix scale security without slowing the company&#8217;s engineering engine&#8212;a balance that&#8217;s notoriously hard to get right.</p><p>It got me thinking about my own path as a Security Engineer and the various domains I&#8217;ve worked in. </p><p>What stuck with me wasn&#8217;t just Jason&#8217;s structured layers of <strong>context, strategy, and execution</strong>, but how those principles have shown up in my work again and again.</p><p>Sometimes explicitly. Sometimes, without realizing it until later.</p><p>So in this issue, I want to do two things:</p><ol><li><p>Walk you through a few pivotal moments in my security engineering career</p></li><li><p>Extract real, applicable lessons from each so that you can bring them into your own context</p></li></ol><p>This is not just &#8220;what I did.&#8221;</p><p> It&#8217;s &#8220;why it mattered, and what it could mean for you.&#8221;</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberwoxunplugged.com/subscribe?"><span>Subscribe now</span></a></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iF0v!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" width="1456" height="570" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:570,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:188886,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/159067704?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F913f1923-04a0-4fe6-afb6-5e0fca6d78b1_2500x2500.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Join a vibrant cybersecurity community of over 7,000 people who are constantly engaging in conversations and supporting one another, covering topics from cybersecurity and college to certifications, resume assistance, and various non-professional interests like fitness, finance, anime, and other exciting subjects.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://discord.gg/cyberwoxacademy&quot;,&quot;text&quot;:&quot;Join Us!&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://discord.gg/cyberwoxacademy"><span>Join Us!</span></a></p><div><hr></div><p>Watch the full video breakdown below:</p><div id="youtube2-HlGuOdY7Y2I" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;HlGuOdY7Y2I&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/HlGuOdY7Y2I?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h1><strong>When Speed Is the Priority</strong></h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!jADY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a0679f0-5099-4339-82bc-9d522b6dece3_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!jADY!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a0679f0-5099-4339-82bc-9d522b6dece3_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!jADY!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a0679f0-5099-4339-82bc-9d522b6dece3_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!jADY!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a0679f0-5099-4339-82bc-9d522b6dece3_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!jADY!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a0679f0-5099-4339-82bc-9d522b6dece3_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!jADY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a0679f0-5099-4339-82bc-9d522b6dece3_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9a0679f0-5099-4339-82bc-9d522b6dece3_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1559843,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/179558051?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a0679f0-5099-4339-82bc-9d522b6dece3_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!jADY!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a0679f0-5099-4339-82bc-9d522b6dece3_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!jADY!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a0679f0-5099-4339-82bc-9d522b6dece3_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!jADY!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a0679f0-5099-4339-82bc-9d522b6dece3_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!jADY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a0679f0-5099-4339-82bc-9d522b6dece3_1024x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Jason discusses how security teams must make room for velocity, <em>not hinder it</em>. </p><p>That means knowing when to optimize for &#8220;good enough right now&#8221; versus &#8220;perfect later.&#8221;</p><p>That lesson hit me hard during an active cloud campaign while I was a cloud threat detection engineer. </p><p>We were watching an attacker group compromise cloud environments at scale, deploying crypto miners using consistent IAM roles and resource naming patterns.</p><p>We had <strong>clear indicators</strong>, but no time for elegant detection modeling or layered behavioral <strong>TTP-based detections</strong>.</p><p>So I made the call to build and deploy an <strong>IOC-heavy detection</strong>. </p><p>The logic was sharp but narrow. It was very atomic in nature. </p><p>Honestly, it wasn&#8217;t what I&#8217;d want to ship under normal conditions. But it bought us time. </p><p><em>Visibility first. Accuracy later.</em></p><p><strong>What I learned (and you can apply):</strong></p><ul><li><p>There is a time and place for precision, but don&#8217;t let the perfect detection delay critical visibility.</p></li><li><p>Your first iteration (for an atomic detection) doesn&#8217;t have to scale. It has to inform.</p></li><li><p>Build something quickly, but tag it for review. Revisit it once the fire&#8217;s out.</p></li><li><p>Sometimes, shipping quickly is <em>the</em> safest thing to do.</p></li></ul><p>And this applies far beyond cloud detection. </p><p>Whether it&#8217;s building IAM policies, hardening containers, or writing security automation, sometimes velocity is the first layer of resilience.</p><div><hr></div><h1><strong>Build Once, Scale Forever</strong></h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!UYjK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F788120c3-af76-4e50-a315-801158f020c9_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!UYjK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F788120c3-af76-4e50-a315-801158f020c9_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!UYjK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F788120c3-af76-4e50-a315-801158f020c9_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!UYjK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F788120c3-af76-4e50-a315-801158f020c9_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!UYjK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F788120c3-af76-4e50-a315-801158f020c9_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!UYjK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F788120c3-af76-4e50-a315-801158f020c9_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/788120c3-af76-4e50-a315-801158f020c9_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1670405,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/179558051?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F788120c3-af76-4e50-a315-801158f020c9_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!UYjK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F788120c3-af76-4e50-a315-801158f020c9_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!UYjK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F788120c3-af76-4e50-a315-801158f020c9_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!UYjK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F788120c3-af76-4e50-a315-801158f020c9_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!UYjK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F788120c3-af76-4e50-a315-801158f020c9_1024x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Jason describes &#8220;strategy&#8221; as choosing high-leverage work that scales your impact.</p><p>When I was tasked with building detections for Google Cloud (GCP) as a cloud threat detection engineer, I could have started cranking out detections service by service.</p><p>But I knew that wouldn&#8217;t scale, and frankly, I didn&#8217;t fully understand GCP yet. Instead, I stepped back and developed an understanding of the cloud provider and a <strong>cloud</strong> <strong>threat modeling framework</strong>.</p><p>I grouped GCP services into high-level domains - Compute, storage, IAM, databases, and then used those abstractions to understand attack surfaces.</p><p>From there, I could drill down into the specifics: </p><ul><li><p>What does identity misuse look like across IAM and storage? </p></li><li><p>How does lateral movement manifest in GCP&#8217;s managed services?</p></li><li><p>How are GCP services abused differently or similarly to other Cloud services?</p></li></ul><p><strong>What I learned (and you can apply):</strong></p><ul><li><p>Before building tooling or detections, have a mental model of the domain. It doesn&#8217;t have to be perfect&#8212;it just has to make complexity navigable.</p></li><li><p>Focus on identifying common patterns across services rather than isolated exceptions. This is where reliable detection logic starts.</p></li><li><p>If you&#8217;re onboarding into a new cloud provider, threat modeling isn&#8217;t a &#8220;nice to have&#8221;&#8212;it&#8217;s your best shot at building a reusable, scalable detection strategy.</p></li><li><p>Documentation is a weapon. When you build mental models, write them down. It&#8217;ll save the next person weeks of confusion&#8212;and save you from repeating work six months later.</p></li></ul><blockquote><p>If you&#8217;re early in your career, this is gold: <strong>don&#8217;t just solve the problem, try to solve the class of problems.</strong></p></blockquote><div><hr></div><h1><strong>Why Saying &#8220;No&#8221; is Strategic</strong></h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!s2fk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa32a7a88-7b24-43b5-92fd-506cbd41206e_1024x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!s2fk!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa32a7a88-7b24-43b5-92fd-506cbd41206e_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!s2fk!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa32a7a88-7b24-43b5-92fd-506cbd41206e_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!s2fk!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa32a7a88-7b24-43b5-92fd-506cbd41206e_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!s2fk!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa32a7a88-7b24-43b5-92fd-506cbd41206e_1024x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!s2fk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa32a7a88-7b24-43b5-92fd-506cbd41206e_1024x1536.png" width="1024" height="1536" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a32a7a88-7b24-43b5-92fd-506cbd41206e_1024x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3168081,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/179558051?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa32a7a88-7b24-43b5-92fd-506cbd41206e_1024x1536.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!s2fk!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa32a7a88-7b24-43b5-92fd-506cbd41206e_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!s2fk!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa32a7a88-7b24-43b5-92fd-506cbd41206e_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!s2fk!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa32a7a88-7b24-43b5-92fd-506cbd41206e_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!s2fk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa32a7a88-7b24-43b5-92fd-506cbd41206e_1024x1536.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>One of the sharpest lines from Jason&#8217;s piece comes from Netflix&#8217;s former CEO, Reed Hastings: </p><blockquote><p>&#8220;Strategy is about what you don&#8217;t do.&#8221;</p></blockquote><p>In my current role, I work on differentiated threat intelligence for specific business units. </p><p>One thing I&#8217;ve learned the hard way is that <strong>not all intel is valuable</strong>, even if it&#8217;s technically correct or urgent elsewhere.</p><p>The internet is full of noise: threat feeds, CVEs, indicators, and intel reports. But my responsibility is to ask, <em>&#8220;Is this relevant to us?&#8221;</em> If not, I let it go&#8212;even if it seems scary or hyped.</p><p><strong>What I learned (and you can apply):</strong></p><ul><li><p>Intelligence without context is just a distraction.</p></li><li><p>Learn to filter based on <em>business impact</em> and <em>sector alignment</em>, not just raw severity.</p></li><li><p>It&#8217;s okay to ignore the noise&#8212;especially if you&#8217;re building a detection or IR strategy. Not every problem is <strong>your</strong> problem.</p></li><li><p>Write down your priorities or &#8220;filter criteria.&#8221; That makes your decisions repeatable and teachable.</p></li></ul><p>This applies equally across the SecOps team: don&#8217;t get caught writing detections or chasing rabbit holes just because something trended on Twitter.</p><div><hr></div><h1><strong>Institutional Memory is Security Engineering&#8217;s Secret Weapon</strong></h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!CAFu!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55fb27ec-422b-4438-9dcc-dc368cde0c46_1024x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!CAFu!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55fb27ec-422b-4438-9dcc-dc368cde0c46_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!CAFu!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55fb27ec-422b-4438-9dcc-dc368cde0c46_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!CAFu!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55fb27ec-422b-4438-9dcc-dc368cde0c46_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!CAFu!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55fb27ec-422b-4438-9dcc-dc368cde0c46_1024x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!CAFu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55fb27ec-422b-4438-9dcc-dc368cde0c46_1024x1536.png" width="1024" height="1536" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/55fb27ec-422b-4438-9dcc-dc368cde0c46_1024x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3567317,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/179558051?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55fb27ec-422b-4438-9dcc-dc368cde0c46_1024x1536.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!CAFu!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55fb27ec-422b-4438-9dcc-dc368cde0c46_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!CAFu!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55fb27ec-422b-4438-9dcc-dc368cde0c46_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!CAFu!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55fb27ec-422b-4438-9dcc-dc368cde0c46_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!CAFu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55fb27ec-422b-4438-9dcc-dc368cde0c46_1024x1536.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Chan stresses that true scalability requires building systems people can use long after you&#8217;re gone. </p><p>That lesson came alive for me recently.</p><p>There were two major internal systems my team was responsible for&#8212;critical to detection, response, and threat intelligence&#8212;but they were barely understood. </p><p>No central knowledge. No reusable playbooks.</p><p>So, I took it on: I studied the systems, documented their behaviors and <em>our </em>failure points in our interactions with them, hosted a team lunch-and-learn, and built an internal wiki that others could use.</p><p><strong>What I learned (and you can apply):</strong></p><ul><li><p>Documentation isn&#8217;t a chore&#8212;it&#8217;s a force multiplier.</p></li><li><p>If your knowledge lives only in your head, your impact dies when you take PTO.</p></li><li><p>Teach others how to operate what you&#8217;ve built. That&#8217;s when you know you&#8217;ve succeeded.</p></li><li><p>Institutional knowledge is a competitive advantage&#8212;don&#8217;t let it go to waste.</p></li></ul><p>If you&#8217;re early in your career, this is one of the fastest ways to stand out: </p><blockquote><p><strong>Be the person who makes the unclear clear.</strong></p></blockquote><div><hr></div><h1>Final Thoughts</h1><p>Jason Chan&#8217;s framework gave me words for things I was already doing&#8212;but it also challenged me to be more intentional about them. </p><p>His call to build guardrails, not gates&#8230; to prioritize reuse over heroics&#8230; to measure and iterate... all of it resonates more deeply the longer I&#8217;ve been in this space.</p><p>So here&#8217;s my version of his model in practice:</p><ul><li><p><strong>Context</strong>: Understand what your org <em>actually</em> needs, not what LinkedIn or Twitter&#8217;s yelling about.</p></li><li><p><strong>Strategy</strong>: Invest in models, processes, and documentation that outlive you.</p></li><li><p><strong>Execution</strong>: Move fast when needed&#8212;but reflect hard and revise often.</p></li><li><p><strong>Measurement</strong>: Let the data from real incidents teach you how to improve.</p></li></ul><p>If you&#8217;re a security engineer, a detection engineer, a threat hunter, or even just starting, this is your reminder that <em>speed and security don&#8217;t have to be enemies</em>. </p><p>They can be collaborators if you give them structure.</p><p>Keep building paved roads. </p><p>And when you do, leave signs behind for the next engineer.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/p/cybersecurity-engineering-career?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.cyberwoxunplugged.com/p/cybersecurity-engineering-career?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p>]]></content:encoded></item><item><title><![CDATA[The 5 Cybersecurity Engineer Archetypes (and Why You Should Know Yours)]]></title><description><![CDATA[whoami?]]></description><link>https://www.cyberwoxunplugged.com/p/the-5-cybersecurity-engineer-archetypes</link><guid isPermaLink="false">https://www.cyberwoxunplugged.com/p/the-5-cybersecurity-engineer-archetypes</guid><dc:creator><![CDATA[Day Johnson]]></dc:creator><pubDate>Sat, 15 Nov 2025 15:27:21 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/f9a7bf81-50a6-4663-9db2-b051090cc3f7_1440x810.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Every security engineer, regardless of experience level, eventually reaches a point where they pause and ask:</p><p><strong>What kind of engineer am I?</strong></p><p>Not just what tools you use. Not just what your current title says. </p><p>But how do you show up? </p><p>How do you solve problems? </p><p>How do you instinctively approach complexity?</p><p>I&#8217;ve seen this question (and its answer) surface over and over again in Slack threads during IRs, in 1:1s with mentees, in hallway conversations, in the quiet frustration of mid-career engineers trying to &#8220;level up&#8221; but not quite sure how.</p><p>And after half a decade in the field&#8212;from building threat detection pipelines at prominent startups to leading IR and threat detection at one of the largest tech companies on Earth&#8212;I&#8217;ve come to believe that most of us in security tend to move within a few core archetypes.</p><p>Not boxes. Not labels.</p><p><strong>Gravity wells.</strong></p><p>You may have blended skills, but there&#8217;s usually a center of mass&#8212;a force that pulls you toward a particular way of thinking, contributing, and growing. And once you can name that?</p><p>That&#8217;s when your career starts to gain direction.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.cyberwoxunplugged.com/subscribe?"><span>Subscribe now</span></a></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iF0v!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" width="1456" height="570" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:570,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:188886,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/159067704?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F913f1923-04a0-4fe6-afb6-5e0fca6d78b1_2500x2500.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Join a vibrant cybersecurity community of over 7000 people who are constantly engaging in conversations and supporting one another, covering topics from cybersecurity and college to certifications, resume assistance, and various non-professional interests like fitness, finance, anime, and other exciting subjects.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://discord.gg/cyberwoxacademy&quot;,&quot;text&quot;:&quot;Join Us!&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://discord.gg/cyberwoxacademy"><span>Join Us!</span></a></p><div><hr></div><p>Watch the full video breakdown below:</p><div id="youtube2-qDCBAYDEjvo" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;qDCBAYDEjvo&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/qDCBAYDEjvo?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h1>Archetypes: A Language for How We Work</h1><p>Across every security team I&#8217;ve been on, I&#8217;ve seen five archetypes show up again and again. </p><p>These are less about job titles and more about your <em>operating posture</em>.</p><p>How you move through problems, what you prioritize, and what kind of work gives you energy.</p><h2>The Guardian</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!wniw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ecf2b9e-bfaa-4cab-b78d-69bbee6fc56e_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!wniw!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ecf2b9e-bfaa-4cab-b78d-69bbee6fc56e_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!wniw!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ecf2b9e-bfaa-4cab-b78d-69bbee6fc56e_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!wniw!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ecf2b9e-bfaa-4cab-b78d-69bbee6fc56e_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!wniw!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ecf2b9e-bfaa-4cab-b78d-69bbee6fc56e_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!wniw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ecf2b9e-bfaa-4cab-b78d-69bbee6fc56e_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9ecf2b9e-bfaa-4cab-b78d-69bbee6fc56e_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Generated image&quot;,&quot;title&quot;:&quot;Generated image&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Generated image" title="Generated image" srcset="https://substackcdn.com/image/fetch/$s_!wniw!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ecf2b9e-bfaa-4cab-b78d-69bbee6fc56e_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!wniw!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ecf2b9e-bfaa-4cab-b78d-69bbee6fc56e_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!wniw!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ecf2b9e-bfaa-4cab-b78d-69bbee6fc56e_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!wniw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ecf2b9e-bfaa-4cab-b78d-69bbee6fc56e_1024x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>You&#8217;re the shield. The one who jumps on high-severity alerts before anyone else blinks. </p><p>You see logs like other people see spreadsheets in patterns, stories, and subtle shifts. Your radar is constantly scanning for badness.</p><p>You live in detection pipelines, SOAR playbooks, and IR processes. </p><p>You bring signal out of noise. And when things are chaotic, you&#8217;re the one who restores order.</p><p><strong>Superpower</strong>: Translating alerts into action. Noise into signal. Chaos into clarity.</p><p><strong>Growth Edge</strong>: Learning to zoom out. Don&#8217;t just be good at building detection rules or IR workflows. Learn to ask why this detection matters to the business in the first place.</p><h2>The Architect</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!q0Ow!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe60a458b-39aa-4570-9666-614ae0ad4bff_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!q0Ow!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe60a458b-39aa-4570-9666-614ae0ad4bff_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!q0Ow!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe60a458b-39aa-4570-9666-614ae0ad4bff_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!q0Ow!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe60a458b-39aa-4570-9666-614ae0ad4bff_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!q0Ow!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe60a458b-39aa-4570-9666-614ae0ad4bff_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!q0Ow!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe60a458b-39aa-4570-9666-614ae0ad4bff_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e60a458b-39aa-4570-9666-614ae0ad4bff_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Generated image&quot;,&quot;title&quot;:&quot;Generated image&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Generated image" title="Generated image" srcset="https://substackcdn.com/image/fetch/$s_!q0Ow!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe60a458b-39aa-4570-9666-614ae0ad4bff_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!q0Ow!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe60a458b-39aa-4570-9666-614ae0ad4bff_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!q0Ow!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe60a458b-39aa-4570-9666-614ae0ad4bff_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!q0Ow!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe60a458b-39aa-4570-9666-614ae0ad4bff_1024x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div>
      <p>
          <a href="https://www.cyberwoxunplugged.com/p/the-5-cybersecurity-engineer-archetypes">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[The Operational Cost of Cybersecurity]]></title><description><![CDATA[The Hidden Cost of optimizing for &#8220;More&#8221; instead of &#8220;Better&#8221;.]]></description><link>https://www.cyberwoxunplugged.com/p/the-operational-cost-of-cybersecurity</link><guid isPermaLink="false">https://www.cyberwoxunplugged.com/p/the-operational-cost-of-cybersecurity</guid><dc:creator><![CDATA[Day Johnson]]></dc:creator><pubDate>Thu, 06 Nov 2025 17:18:29 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!R7vL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d2a85a7-6df8-4f01-ade1-1ade8caa01ca_1024x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In finance, operational expenses, or OpEx, is the money it takes to keep something running.</p><p>Most of the time, you don&#8217;t just buy an asset and walk away; you continue to pay to maintain it. Take an investment property, for example. You pay for staff, maintenance, utilities, and software to sustain operations.</p><p>Cybersecurity is no different.</p><p>Every new detection rule, workflow automation, or control we deploy carries its own <strong>operational expenditure</strong>. It requires continuous validation, clear documentation, and regular upkeep via updates or deprecations.</p><p>But more importantly, it consumes the scarcest resource in cybersecurity: skilled humans. There simply aren&#8217;t enough experienced security professionals to go around, and every new control competes for their limited time, focus, and expertise.</p><p>On the same note, building new things is great; as a matter of fact, I encourage all cybersecurity engineers to be builders. However, building is a capital expenditure (CapEx). It&#8217;s exciting, one-time, and easy to celebrate.</p><p>Maintaining what we build? That&#8217;s OpEx. It&#8217;s invisible, mundane, constant, but essential.</p><p>The more you build, the more <em>likely</em> you are to owe, especially if you cut corners. And like financial debt, it doesn&#8217;t disappear. It compounds. You&#8217;re borrowing time from your future self, and eventually, the bill comes due.</p><p>But enough doom and gloom. This issue isn&#8217;t meant for that. It simply expresses this sentient problem as it relates to cyber defense.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberwoxunplugged.com/subscribe?"><span>Subscribe now</span></a></p><div class="pullquote"><p><strong>Disclaimer</strong></p><p>This post is not about actual financial budgets for running a cybersecurity team; instead, it&#8217;s a lengthy metaphor on the&nbsp;<em>operational cost of security decisions</em>. The unseen expenses we incur in time, attention, and energy every time we add a new detection, control, or process. It&#8217;s about how every rule, workflow, and automation has a &#8220;maintenance bill&#8221;.</p></div><h1><strong>Detection Engineering: Hidden Subscription Fees</strong></h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!R7vL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d2a85a7-6df8-4f01-ade1-1ade8caa01ca_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!R7vL!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d2a85a7-6df8-4f01-ade1-1ade8caa01ca_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!R7vL!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d2a85a7-6df8-4f01-ade1-1ade8caa01ca_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!R7vL!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d2a85a7-6df8-4f01-ade1-1ade8caa01ca_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!R7vL!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d2a85a7-6df8-4f01-ade1-1ade8caa01ca_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!R7vL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d2a85a7-6df8-4f01-ade1-1ade8caa01ca_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2d2a85a7-6df8-4f01-ade1-1ade8caa01ca_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2211544,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/178147231?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d2a85a7-6df8-4f01-ade1-1ade8caa01ca_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!R7vL!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d2a85a7-6df8-4f01-ade1-1ade8caa01ca_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!R7vL!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d2a85a7-6df8-4f01-ade1-1ade8caa01ca_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!R7vL!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d2a85a7-6df8-4f01-ade1-1ade8caa01ca_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!R7vL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d2a85a7-6df8-4f01-ade1-1ade8caa01ca_1024x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Writing a detection rule feels like a win. Even better when it catches an actual threat. You get the dopamine hit of adding coverage, expanding visibility, and contributing to your SOC&#8217;s &#8220;rule count.&#8221;</p><p>But every detection you create is a new &#8220;subscription&#8221;. More specifically, a line item on your cybersecurity operational budget.</p><p>The <strong>starting cost</strong> is the time spent building the detection and testing for precision. Then comes the <strong>forever tax</strong> of cycles spent triaging inevitable false positives. Then there are <strong>hidden fees</strong> in the form of headspace needed to document, tune, and maintain as adversaries shift or your environment evolves.</p><p>Over time, these costs may accumulate into what I call <strong>detection debt</strong>. This is the backlog of unmaintained rules and unreviewed alerts that quietly bleed efficiency from your Cybersecurity Operations function.</p><p>And like real debt, it then <strong>accrues interest</strong> if you don&#8217;t pay it down quickly or reel in your &#8220;spending&#8221; habits: more noise, more fatigue, more missed signals.</p><p>A future issue of the newsletter will address the topic of detection deprecation which may help keep your budget on track.</p><div><hr></div><h1><strong>Incident Response: Expensive Attention</strong></h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!HOUI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56dc595f-bdd2-42ab-9a34-06767ea2eb9c_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!HOUI!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56dc595f-bdd2-42ab-9a34-06767ea2eb9c_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!HOUI!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56dc595f-bdd2-42ab-9a34-06767ea2eb9c_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!HOUI!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56dc595f-bdd2-42ab-9a34-06767ea2eb9c_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!HOUI!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56dc595f-bdd2-42ab-9a34-06767ea2eb9c_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!HOUI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56dc595f-bdd2-42ab-9a34-06767ea2eb9c_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/56dc595f-bdd2-42ab-9a34-06767ea2eb9c_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2395490,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/178147231?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56dc595f-bdd2-42ab-9a34-06767ea2eb9c_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!HOUI!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56dc595f-bdd2-42ab-9a34-06767ea2eb9c_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!HOUI!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56dc595f-bdd2-42ab-9a34-06767ea2eb9c_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!HOUI!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56dc595f-bdd2-42ab-9a34-06767ea2eb9c_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!HOUI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56dc595f-bdd2-42ab-9a34-06767ea2eb9c_1024x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Incident Response operates under high pressure, where time is capital in a very valuable currency.</p><p>And just as a company&#8217;s burn rate determines its financial health, your alert volume and false positive rate determine your cognitive health, especially for the engineers or analysts triaging or responding.</p><p>When <strong>everything</strong> triggers, nothing stands out. It&#8217;s just like <a href="https://www.storyarts.org/library/aesops/stories/boy.html">the boy who cried wolf</a>. When security alerts lose credibility through repetition, coupled with little <strong>detection accountability</strong>, the real threats get ignored.</p><p>Each noisy alert from your detection engineering &#8220;subscription fees&#8221;, misconfigured automation workflows, or irrelevant security escalation/investigation costs minutes, which compound into hours across the team.</p><p>Ultimately, the time (capital) spent, or otherwise wasted, in a security incident could be the difference between containment and compromise. This is where those hidden fees start charging interest and bleeding you even more of your most finite IR resource - time.</p><div><hr></div><h1><strong>GRC: The Cost of Compliance Theater</strong></h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!U5Pt!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd08d54d3-7612-43eb-b34c-d82ea16a6001_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!U5Pt!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd08d54d3-7612-43eb-b34c-d82ea16a6001_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!U5Pt!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd08d54d3-7612-43eb-b34c-d82ea16a6001_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!U5Pt!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd08d54d3-7612-43eb-b34c-d82ea16a6001_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!U5Pt!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd08d54d3-7612-43eb-b34c-d82ea16a6001_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!U5Pt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd08d54d3-7612-43eb-b34c-d82ea16a6001_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d08d54d3-7612-43eb-b34c-d82ea16a6001_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2393817,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/178147231?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd08d54d3-7612-43eb-b34c-d82ea16a6001_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!U5Pt!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd08d54d3-7612-43eb-b34c-d82ea16a6001_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!U5Pt!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd08d54d3-7612-43eb-b34c-d82ea16a6001_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!U5Pt!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd08d54d3-7612-43eb-b34c-d82ea16a6001_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!U5Pt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd08d54d3-7612-43eb-b34c-d82ea16a6001_1024x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Governance, Risk, and Compliance (GRC) resides in the fine print of cyber defense, which is precisely where operational costs accumulate quietly. Every new framework, audit requirement, or control mapping is like adding another recurring bill.</p><p>At first, it looks harmless. One more spreadsheet, one more evidence collection task.</p><p>However, over time, these small costs accumulate into process debt, resulting in endless reviews, repetitive documentation, and reactive reporting loops.</p><p>Essentially, the result of GRC becoming a checklist rather than a compass. OpEx skyrockets without improving actual security outcomes. Policies become artifacts. Audits become rituals.</p><p>You end up paying to maintain a compliance theater instead of actual cyber resilience. Everyone loves a good show, but it should not come at the expense of actual <strong>security</strong>.</p><div><hr></div><h1><strong>Maturity</strong></h1><p>Just as financial maturity isn&#8217;t necessarily measured by how much you make but by how much you actually keep, Security maturity should not simply be measured solely by how much you deploy.</p><p>It should also measure how much you sustain without drowning in your own complexity.</p><p>And your cost model should account for both maintenance and development.</p><p>I don&#8217;t want to reduce operational cost to a mere financial metaphor; I&#8217;ll dare to say that it&#8217;s a mindset.</p><p>It forces you to ask:</p><ul><li><p>Can this &lt;insert control here&gt; survive without me?</p></li><li><p>Can this &lt;insert control here&gt; be maintained six months from now?</p></li><li><p>Can this &lt;insert control here&gt; adapt to changes in the environment?</p></li></ul><p>If the answer is no, it&#8217;s not ready for production &#8212; it&#8217;s just another liability waiting to mature.</p><blockquote><p><strong>Every control is a contract. Every rule is a recurring bill.</strong></p></blockquote><p>The longer you operate without acknowledging this, the more expensive your security becomes.</p><h2><strong>&#128173; Closing Thought</strong></h2><p>What&#8217;s your team&#8217;s real operational cost? Audit your detections, playbooks, and controls to see what you&#8217;re still paying for in time, toil, and attention.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/p/the-operational-cost-of-cybersecurity?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberwoxunplugged.com/p/the-operational-cost-of-cybersecurity?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p>]]></content:encoded></item><item><title><![CDATA[Cybersecurity Mistakes Keeping You Stuck (and How to Fix Them)]]></title><description><![CDATA[Five common mistakes that derail aspiring cybersecurity professionals and how to avoid them before they kill your career progress.]]></description><link>https://www.cyberwoxunplugged.com/p/how-to-kill-your-cybersecurity-progress</link><guid isPermaLink="false">https://www.cyberwoxunplugged.com/p/how-to-kill-your-cybersecurity-progress</guid><dc:creator><![CDATA[Day Johnson]]></dc:creator><pubDate>Fri, 03 Oct 2025 16:02:48 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/b815ffdc-4858-43cd-8762-239dfb0acac0_1382x778.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Let&#8217;s be honest: the internet is full of endless tutorials, bootcamps, and videos that promise to &#8220;<strong>get you into cybersecurity.</strong>&#8221; However, if you&#8217;re not careful, you could inadvertently sabotage your career instead of accelerating it.</p><p>I&#8217;ve been in this space for five years now, working as a security engineer, mentoring hundreds of students, and teaching thousands through <a href="https://www.youtube.com/@DayCyberwox">YouTube</a> and <a href="https://cyberwoxacademy.com/">Cyberwox Academy</a>. </p><blockquote><p>I&#8217;ve seen brilliant people stall out not because they weren&#8217;t smart enough, but because of a few career-killing habits.</p></blockquote><p>If you want to actually land that cybersecurity role and grow, you need to avoid these traps.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberwoxunplugged.com/subscribe?"><span>Subscribe now</span></a></p><div><hr></div><h3><strong>In Case You Missed It</strong></h3><p>I recently went through a cybersecurity 101 series. I&#8217;m sure you didn&#8217;t miss it, but if you did, here&#8217;s the whole workshop series in order:</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;783d9869-8009-43c1-9306-ea4ee9f979a1&quot;,&quot;caption&quot;:&quot;When I first stumbled into the cybersecurity industry, I didn&#8217;t have a map.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Cybersecurity 101, Part 0: Why I&#8217;m Sharing My Cybersecurity 101 Workshop&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:172540827,&quot;name&quot;:&quot;Day Johnson&quot;,&quot;bio&quot;:&quot;Cybersecurity @Amazon (Ex-Datadog &amp; Optiv). Creator @cyberwox @cyberwoxacademy. Believer &#10013;&#65039;.&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F320cfa44-ac32-40b3-8e06-97497673fd1f_4096x4096.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2025-09-08T03:46:31.671Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!GIhi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7cb7c3a5-3781-4b6c-9d53-bd9138b33acd_1024x1024.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.cyberwoxunplugged.com/p/cybersecurity-101-part-0-why-im-sharing&quot;,&quot;section_name&quot;:&quot;Career&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:172315588,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:6,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1996296,&quot;publication_name&quot;:&quot;Cyberwox Unplugged&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!pA5b!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b1ed158-420f-4ae6-9aaa-adc23c31da06_1280x1280.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;4e1af223-1878-496e-99c1-b0795f9c5c5f&quot;,&quot;caption&quot;:&quot;If you&#8217;ve been following CYBERWOX Unplugged for a while, you know this newsletter is where I pull back the curtain.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Cybersecurity 101, Part I: Why It All Matters&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:172540827,&quot;name&quot;:&quot;Day Johnson&quot;,&quot;bio&quot;:&quot;Cybersecurity @Amazon (Ex-Datadog &amp; Optiv). Creator @cyberwox @cyberwoxacademy. Believer &#10013;&#65039;.&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F320cfa44-ac32-40b3-8e06-97497673fd1f_4096x4096.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2025-09-08T12:02:57.917Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!BNAM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbd8279e-bd16-4556-96ff-854e6685b80c_1024x1536.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.cyberwoxunplugged.com/p/cybersecurity-101-part-i-why-it-all&quot;,&quot;section_name&quot;:&quot;Career&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:172312561,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:10,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1996296,&quot;publication_name&quot;:&quot;Cyberwox Unplugged&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!pA5b!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b1ed158-420f-4ae6-9aaa-adc23c31da06_1280x1280.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;812e10ba-86e5-477b-aee8-42e1457b4be3&quot;,&quot;caption&quot;:&quot;In Part I, we discussed why cybersecurity matters in 2025: how it impacts every aspect of our lives, how data has become the new gold, and how finances can be compromised with a single breach.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Cybersecurity 101, Part II: Foundations &amp; Attacks&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:172540827,&quot;name&quot;:&quot;Day Johnson&quot;,&quot;bio&quot;:&quot;Cybersecurity @Amazon (Ex-Datadog &amp; Optiv). Creator @cyberwox @cyberwoxacademy. Believer &#10013;&#65039;.&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F320cfa44-ac32-40b3-8e06-97497673fd1f_4096x4096.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2025-09-15T12:01:58.640Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!dF61!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb465120e-37bc-4382-9137-cba6a4c754b6_1024x1024.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.cyberwoxunplugged.com/p/cybersecurity-101-part-ii-foundations&quot;,&quot;section_name&quot;:&quot;Career&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:172313475,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:6,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1996296,&quot;publication_name&quot;:&quot;Cyberwox Unplugged&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!pA5b!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b1ed158-420f-4ae6-9aaa-adc23c31da06_1280x1280.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;05819a4b-b053-44db-a3e7-6263ebe5b425&quot;,&quot;caption&quot;:&quot;In Part II, we outlined the fundamentals: the CIA Triad, threats, vulnerabilities, risk, and the most common attacks, such as ransomware and insider threats.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Cybersecurity 101, Part III: Defense, Offense, and Career Pathways&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:172540827,&quot;name&quot;:&quot;Day Johnson&quot;,&quot;bio&quot;:&quot;Cybersecurity @Amazon (Ex-Datadog &amp; Optiv). Creator @cyberwox @cyberwoxacademy. Believer &#10013;&#65039;.&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F320cfa44-ac32-40b3-8e06-97497673fd1f_4096x4096.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2025-09-22T14:22:09.552Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!9CvF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19d47e85-25e2-4437-8a49-ace6b3a21e4f_1024x1024.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.cyberwoxunplugged.com/p/cybersecurity-101-part-iii-defense&quot;,&quot;section_name&quot;:&quot;Career&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:172314130,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:6,&quot;comment_count&quot;:2,&quot;publication_id&quot;:1996296,&quot;publication_name&quot;:&quot;Cyberwox Unplugged&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!pA5b!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b1ed158-420f-4ae6-9aaa-adc23c31da06_1280x1280.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;943d7e27-229a-4158-bab9-072d1f151bcc&quot;,&quot;caption&quot;:&quot;Over the past few weeks, we&#8217;ve walked through the whole arc of my two-hour live workshop on cybersecurity.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Cybersecurity 101: Series Recap &amp; Next Steps&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:172540827,&quot;name&quot;:&quot;Day Johnson&quot;,&quot;bio&quot;:&quot;Cybersecurity @Amazon (Ex-Datadog &amp; Optiv). Creator @cyberwox @cyberwoxacademy. Believer &#10013;&#65039;.&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F320cfa44-ac32-40b3-8e06-97497673fd1f_4096x4096.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2025-09-29T12:01:26.787Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!wWgx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe24ce18c-ab38-4eb3-8f95-d9f742e547da_1024x969.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.cyberwoxunplugged.com/p/cybersecurity-101-series-recap-and&quot;,&quot;section_name&quot;:&quot;Career&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:172317878,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:5,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1996296,&quot;publication_name&quot;:&quot;Cyberwox Unplugged&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!pA5b!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b1ed158-420f-4ae6-9aaa-adc23c31da06_1280x1280.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div><hr></div><h1>Mistake #1: Learning Everything at Once</h1><p>I&#8217;ve seen people trying to juggle <strong>Linux, PowerShell, Splunk, malware analysis, and offensive security</strong>&#8230; all at the same time. That&#8217;s not ambition. That&#8217;s burnout.</p><p>Cybersecurity is too deep a field for you to scatter your focus everywhere. </p><p>You need to <strong>choose a lane first</strong>.</p><ul><li><p>If you want to break into systems and networks and get paid to find vulnerabilities, choose <strong>offensive security</strong>.</p></li><li><p>If you want to defend against malicious attackers, detect threats, and build security controls, choose <strong>defensive security</strong>.</p></li></ul><p>Once you&#8217;ve built a foundation, you can always pivot. I&#8217;ve pivoted myself. </p><blockquote><p>This field is flexible, but only if you build <strong>depth</strong> before chasing <strong>breadth</strong>.</p></blockquote><div><hr></div><h2>Mistake #2: Believing a Single Certification Will Save You</h2><p>I love seeing people celebrate when they pass Security+, OSCP, or CCD. But here&#8217;s the truth: <strong>a cert alone won&#8217;t get you the job.</strong></p><blockquote><p>A certification is a <strong>signal of effort</strong>, not proof of ability. </p></blockquote><p>To stand out, you need to stack it with:</p><ul><li><p>Projects that show you can apply your knowledge.</p></li><li><p>Advanced or specialized training in your chosen area.</p></li><li><p>A strong resume and portfolio.</p></li></ul><p>Think of certs as <strong>a door-opener</strong>. Just because a door is open doesn&#8217;t mean you&#8217;re in the house.</p><div><hr></div><h2>Mistake #3: Not Having a Structured Plan</h2><p>Jumping between random YouTube tutorials, free PDFs, and half-finished labs is how people waste years. </p><p><a href="https://youtu.be/frleh0eMXyM">You need structure.</a></p><p>That could be a degree, a bootcamp, or even a self-made plan. Personally, I built a <strong><a href="https://daycyberwox.gumroad.com/l/cyberlearningframework">six-month Cybersecurity Learning Framework</a></strong> to help beginners stay on track, and it works because it forces you to commit to a path and see it through.</p><blockquote><p>Structure creates momentum. Without it, you&#8217;ll stay stuck in &#8220;learning mode&#8221; forever.</p></blockquote><div><hr></div><h2>Mistake #4: Chasing Shiny Objects</h2><p>This one hits close to home for me. </p><p>It&#8217;s so tempting to jump on the new hype wave of AI, blockchain, and cloud-native security right away, abandoning what you&#8217;re currently learning.</p><p>One minute you&#8217;re deep into a Windows memory analysis lab, the next you&#8217;re signing up for an &#8220;AI security&#8221; course you don&#8217;t even understand.</p><p>Here&#8217;s the fix: <strong>define your exact goal.</strong></p><p>Do you want to become:</p><ul><li><p>A detection engineer?</p></li><li><p>An incident responder?</p></li><li><p>A cloud security engineer?</p></li><li><p>An offensive security specialist?</p></li></ul><p>Each of those paths requires specific skills. </p><blockquote><p>Until you pick a target, you&#8217;ll keep drifting.</p></blockquote><div><hr></div><h2>Mistake #5: Neglecting Networking &amp; Mentorship</h2><p>I can&#8217;t stress this enough: <strong>relationships move careers.</strong></p><p>Cybersecurity is full of hidden opportunities, such as referrals, projects, collaborations, and even jobs that never hit LinkedIn job boards. </p><p>I&#8217;ve seen people land life-changing roles simply because they were active in their communities, attended conferences, or found the right mentor (me included).</p><blockquote><p>Yes, your skills matter. However, your network will accelerate your growth in ways that a pure technical grind never will.</p></blockquote><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iF0v!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" width="1456" height="570" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:570,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:188886,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/159067704?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F913f1923-04a0-4fe6-afb6-5e0fca6d78b1_2500x2500.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Join a vibrant cybersecurity community of over 6,900 people who are constantly engaging in conversations and supporting one another, covering topics from cybersecurity and college to certifications, resume assistance, and various non-professional interests like reading, fitness, finance, anime, and other exciting subjects.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://discord.gg/cyberwoxacademy&quot;,&quot;text&quot;:&quot;Join Us!&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://discord.gg/cyberwoxacademy"><span>Join Us!</span></a></p><div><hr></div><h2>The Bottom Line</h2><p>Cybersecurity is huge. </p><p>There are countless domains, endless new tools, and more hype than you can keep up with. If you want to survive and thrive, you need to:</p><ul><li><p><strong>Focus deeply</strong> before broadening out.</p></li><li><p><strong>Build beyond certs</strong> with real projects.</p></li><li><p><strong>Stick to a structured plan.</strong></p></li><li><p><strong>Ignore distractions</strong> until you&#8217;ve mastered the fundamentals.</p></li><li><p><strong>Invest in people</strong> as much as you invest in skills.</p></li></ul><p>Your progress isn&#8217;t solely determined by your knowledge, but also by how you handle the journey.</p><p>The good news? These mistakes are fixable. Start now, and you can avoid wasting years of effort.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share Cyberwox Unplugged&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberwoxunplugged.com/?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share Cyberwox Unplugged</span></a></p><div><hr></div><p></p>]]></content:encoded></item><item><title><![CDATA[Cybersecurity 101: Series Recap & Next Steps]]></title><description><![CDATA[A CYBERWOX Unplugged Epilogue.]]></description><link>https://www.cyberwoxunplugged.com/p/cybersecurity-101-series-recap-and</link><guid isPermaLink="false">https://www.cyberwoxunplugged.com/p/cybersecurity-101-series-recap-and</guid><dc:creator><![CDATA[Day Johnson]]></dc:creator><pubDate>Mon, 29 Sep 2025 12:01:26 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!wWgx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe24ce18c-ab38-4eb3-8f95-d9f742e547da_1024x969.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Over the past few weeks, we&#8217;ve walked through the whole arc of my <strong>two-hour live workshop</strong> on cybersecurity.</p><p>What started as a room of students, career-switchers, and curious professionals asking simple questions &#8212; <em>&#8220;What exactly is cybersecurity?&#8221;</em> &#8212; turned into a deep dive on why this field matters, how attackers operate, and how you can build a career in it.</p><p>If you&#8217;ve been following along since Part I, thank you. If you&#8217;re finding this series now, you&#8217;re right on time.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!wWgx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe24ce18c-ab38-4eb3-8f95-d9f742e547da_1024x969.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!wWgx!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe24ce18c-ab38-4eb3-8f95-d9f742e547da_1024x969.png 424w, https://substackcdn.com/image/fetch/$s_!wWgx!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe24ce18c-ab38-4eb3-8f95-d9f742e547da_1024x969.png 848w, https://substackcdn.com/image/fetch/$s_!wWgx!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe24ce18c-ab38-4eb3-8f95-d9f742e547da_1024x969.png 1272w, https://substackcdn.com/image/fetch/$s_!wWgx!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe24ce18c-ab38-4eb3-8f95-d9f742e547da_1024x969.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!wWgx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe24ce18c-ab38-4eb3-8f95-d9f742e547da_1024x969.png" width="1024" height="969" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e24ce18c-ab38-4eb3-8f95-d9f742e547da_1024x969.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:969,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2268505,&quot;alt&quot;:&quot;Generated image&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Generated image" title="Generated image" srcset="https://substackcdn.com/image/fetch/$s_!wWgx!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe24ce18c-ab38-4eb3-8f95-d9f742e547da_1024x969.png 424w, https://substackcdn.com/image/fetch/$s_!wWgx!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe24ce18c-ab38-4eb3-8f95-d9f742e547da_1024x969.png 848w, https://substackcdn.com/image/fetch/$s_!wWgx!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe24ce18c-ab38-4eb3-8f95-d9f742e547da_1024x969.png 1272w, https://substackcdn.com/image/fetch/$s_!wWgx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe24ce18c-ab38-4eb3-8f95-d9f742e547da_1024x969.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberwoxunplugged.com/subscribe?"><span>Subscribe now</span></a></p><div><hr></div><h3>In Case You Missed Anything</h3><p>Here&#8217;s the whole workshop series in order:</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;7d098626-4e2a-40c8-9690-32db09794560&quot;,&quot;caption&quot;:&quot;When I first stumbled into the cybersecurity industry, I didn&#8217;t have a map.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Cybersecurity 101, Part 0: Why I&#8217;m Sharing My Cybersecurity 101 Workshop&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:172540827,&quot;name&quot;:&quot;Day Johnson&quot;,&quot;bio&quot;:&quot;Cybersecurity @Amazon (Ex-Datadog &amp; Optiv). Creator @cyberwox @cyberwoxacademy. Believer &#10013;&#65039;.&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F320cfa44-ac32-40b3-8e06-97497673fd1f_4096x4096.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2025-09-08T03:46:31.671Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!GIhi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7cb7c3a5-3781-4b6c-9d53-bd9138b33acd_1024x1024.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.cyberwoxunplugged.com/p/cybersecurity-101-part-0-why-im-sharing&quot;,&quot;section_name&quot;:&quot;Career&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:172315588,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:6,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1996296,&quot;publication_name&quot;:&quot;Cyberwox Unplugged&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!pA5b!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b1ed158-420f-4ae6-9aaa-adc23c31da06_1280x1280.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;89266e21-ba49-4746-a576-4e40c020630d&quot;,&quot;caption&quot;:&quot;If you&#8217;ve been following CYBERWOX Unplugged for a while, you know this newsletter is where I pull back the curtain.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Cybersecurity 101, Part I: Why It All Matters&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:172540827,&quot;name&quot;:&quot;Day Johnson&quot;,&quot;bio&quot;:&quot;Cybersecurity @Amazon (Ex-Datadog &amp; Optiv). Creator @cyberwox @cyberwoxacademy. Believer &#10013;&#65039;.&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F320cfa44-ac32-40b3-8e06-97497673fd1f_4096x4096.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2025-09-08T12:02:57.917Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!BNAM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbd8279e-bd16-4556-96ff-854e6685b80c_1024x1536.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.cyberwoxunplugged.com/p/cybersecurity-101-part-i-why-it-all&quot;,&quot;section_name&quot;:&quot;Career&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:172312561,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:10,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1996296,&quot;publication_name&quot;:&quot;Cyberwox Unplugged&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!pA5b!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b1ed158-420f-4ae6-9aaa-adc23c31da06_1280x1280.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;fa772ab0-240b-439e-88fe-6789a03406b7&quot;,&quot;caption&quot;:&quot;In Part I, we discussed why cybersecurity matters in 2025: how it impacts every aspect of our lives, how data has become the new gold, and how finances can be compromised with a single breach.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Cybersecurity 101, Part II: Foundations &amp; Attacks&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:172540827,&quot;name&quot;:&quot;Day Johnson&quot;,&quot;bio&quot;:&quot;Cybersecurity @Amazon (Ex-Datadog &amp; Optiv). Creator @cyberwox @cyberwoxacademy. Believer &#10013;&#65039;.&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F320cfa44-ac32-40b3-8e06-97497673fd1f_4096x4096.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2025-09-15T12:01:58.640Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!dF61!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb465120e-37bc-4382-9137-cba6a4c754b6_1024x1024.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.cyberwoxunplugged.com/p/cybersecurity-101-part-ii-foundations&quot;,&quot;section_name&quot;:&quot;Career&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:172313475,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:6,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1996296,&quot;publication_name&quot;:&quot;Cyberwox Unplugged&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!pA5b!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b1ed158-420f-4ae6-9aaa-adc23c31da06_1280x1280.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;84cc8e2d-3523-451d-a36d-147f15e102ba&quot;,&quot;caption&quot;:&quot;In Part II, we outlined the fundamentals: the CIA Triad, threats, vulnerabilities, risk, and the most common attacks, such as ransomware and insider threats.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Cybersecurity 101, Part III: Defense, Offense, and Career Pathways&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:172540827,&quot;name&quot;:&quot;Day Johnson&quot;,&quot;bio&quot;:&quot;Cybersecurity @Amazon (Ex-Datadog &amp; Optiv). Creator @cyberwox @cyberwoxacademy. Believer &#10013;&#65039;.&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F320cfa44-ac32-40b3-8e06-97497673fd1f_4096x4096.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2025-09-22T14:22:09.552Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!9CvF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19d47e85-25e2-4437-8a49-ace6b3a21e4f_1024x1024.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.cyberwoxunplugged.com/p/cybersecurity-101-part-iii-defense&quot;,&quot;section_name&quot;:&quot;Career&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:172314130,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:6,&quot;comment_count&quot;:2,&quot;publication_id&quot;:1996296,&quot;publication_name&quot;:&quot;Cyberwox Unplugged&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!pA5b!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b1ed158-420f-4ae6-9aaa-adc23c31da06_1280x1280.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div><hr></div><h3>The Bigger Lesson</h3><p>If there&#8217;s one theme across the entire workshop, it&#8217;s this: <strong>cybersecurity is a mission.</strong></p><p>Yes, it&#8217;s an industry with job titles and salaries. Yes, it&#8217;s a career with many entry points. But at its core, it&#8217;s about protecting people, data, and organizations from those who want to misuse them.</p><p>That mission is what keeps me learning, teaching, and building community through Cyberwox Academy and this newsletter.</p><div><hr></div><h3>What&#8217;s Next</h3><p>If this series lit a spark for you, here are your next steps:</p><ul><li><p>&#127909; <strong>Watch the complete edited workshop</strong> &#8212; available exclusively for <strong>Cyberwox members</strong> on YouTube.<br>&#128073;&#127997;<a href="#">Join here to unlock it</a></p></li><li><p>&#128682; <strong>Join the Cyberwox Academy Discord</strong> &#8212; 6,800+ members learning, building projects, sharing jobs, and supporting each other.<br>&#128073;&#127997; <a href="https://discord.gg/cyberwoxacademy">Join the community her</a>e</p></li><li><p>&#128240; <strong>Stay tuned right here on Cyberwox Unplugged</strong> &#8212; I&#8217;ll continue sharing reflections, career lessons, and deeper dives into the craft of cybersecurity.</p></li></ul><div><hr></div><h3>Final Word</h3><p>I started this series because I didn&#8217;t want the energy from that workshop to fade away after the room emptied. Now it resides here, accessible to anyone who needs it, whether you&#8217;re just curious about cybersecurity or ready to dive in headfirst.</p><p>If it gave you clarity, share it with someone who might need the same spark.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/p/cybersecurity-101-series-recap-and?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberwoxunplugged.com/p/cybersecurity-101-series-recap-and?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p>]]></content:encoded></item><item><title><![CDATA[Cybersecurity 101, Part III: Defense, Offense, and Career Pathways]]></title><description><![CDATA[How Blue and Red Teams operate, and the practical ways you can build a career in cybersecurity.]]></description><link>https://www.cyberwoxunplugged.com/p/cybersecurity-101-part-iii-defense</link><guid isPermaLink="false">https://www.cyberwoxunplugged.com/p/cybersecurity-101-part-iii-defense</guid><dc:creator><![CDATA[Day Johnson]]></dc:creator><pubDate>Mon, 22 Sep 2025 14:22:09 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!9CvF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19d47e85-25e2-4437-8a49-ace6b3a21e4f_1024x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In Part II, we outlined the fundamentals: the CIA Triad, threats, vulnerabilities, risk, and the most common attacks, such as ransomware and insider threats. </p><p>That provided us with a map of&nbsp;<em>what we&#8217;re defending against.</em></p><p>Now let&#8217;s talk about the people who do the defending, and those who play offense to make defenses stronger. From there, we&#8217;ll dive into the most practical question for many of you reading this:</p><blockquote><p><strong>How do you build a career in this field?</strong></p></blockquote><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!9CvF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19d47e85-25e2-4437-8a49-ace6b3a21e4f_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!9CvF!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19d47e85-25e2-4437-8a49-ace6b3a21e4f_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!9CvF!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19d47e85-25e2-4437-8a49-ace6b3a21e4f_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!9CvF!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19d47e85-25e2-4437-8a49-ace6b3a21e4f_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!9CvF!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19d47e85-25e2-4437-8a49-ace6b3a21e4f_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!9CvF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19d47e85-25e2-4437-8a49-ace6b3a21e4f_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/19d47e85-25e2-4437-8a49-ace6b3a21e4f_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Generated image&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Generated image" title="Generated image" srcset="https://substackcdn.com/image/fetch/$s_!9CvF!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19d47e85-25e2-4437-8a49-ace6b3a21e4f_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!9CvF!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19d47e85-25e2-4437-8a49-ace6b3a21e4f_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!9CvF!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19d47e85-25e2-4437-8a49-ace6b3a21e4f_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!9CvF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19d47e85-25e2-4437-8a49-ace6b3a21e4f_1024x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberwoxunplugged.com/subscribe?"><span>Subscribe now</span></a></p><div><hr></div><p>&#9194; Check out parts 1 &amp; 2 if you&#8217;ve missed them!</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;10f3e228-f1fe-491a-bd80-1869740a8e5d&quot;,&quot;caption&quot;:&quot;If you&#8217;ve been following CYBERWOX Unplugged for a while, you know this newsletter is where I pull back the curtain.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Cybersecurity 101, Part I: Why It All Matters&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:172540827,&quot;name&quot;:&quot;Day Johnson&quot;,&quot;bio&quot;:&quot;Cybersecurity @Amazon (Ex-Datadog &amp; Optiv). Creator @cyberwox @cyberwoxacademy. Believer &#10013;&#65039;.&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F320cfa44-ac32-40b3-8e06-97497673fd1f_4096x4096.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2025-09-08T12:02:57.917Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!BNAM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbd8279e-bd16-4556-96ff-854e6685b80c_1024x1536.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.cyberwoxunplugged.com/p/cybersecurity-101-part-i-why-it-all&quot;,&quot;section_name&quot;:&quot;Career&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:172312561,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:10,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1996296,&quot;publication_name&quot;:&quot;Cyberwox Unplugged&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!pA5b!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b1ed158-420f-4ae6-9aaa-adc23c31da06_1280x1280.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;805f21c6-76c9-4932-9f3e-91fe0ab0f1ef&quot;,&quot;caption&quot;:&quot;In Part I, we discussed why cybersecurity matters in 2025: how it impacts every aspect of our lives, how data has become the new gold, and how finances can be compromised with a single breach.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Cybersecurity 101, Part II: Foundations &amp; Attacks&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:172540827,&quot;name&quot;:&quot;Day Johnson&quot;,&quot;bio&quot;:&quot;Cybersecurity @Amazon (Ex-Datadog &amp; Optiv). Creator @cyberwox @cyberwoxacademy. Believer &#10013;&#65039;.&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F320cfa44-ac32-40b3-8e06-97497673fd1f_4096x4096.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2025-09-15T12:01:58.640Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!dF61!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb465120e-37bc-4382-9137-cba6a4c754b6_1024x1024.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.cyberwoxunplugged.com/p/cybersecurity-101-part-ii-foundations&quot;,&quot;section_name&quot;:&quot;Career&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:172313475,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:6,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1996296,&quot;publication_name&quot;:&quot;Cyberwox Unplugged&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!pA5b!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b1ed158-420f-4ae6-9aaa-adc23c31da06_1280x1280.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div><hr></div><h1>The Blue Team: Defenders on the Frontline</h1><p>When most people think of &#8220;cybersecurity jobs,&#8221; they picture the <strong>Blue Team</strong>. These are the defenders, responsible for protecting organizations from day-to-day threats.</p><blockquote><p>I told the workshop: <em>&#8220;Think of the Blue Team as operating on five verbs: Monitoring, Analysis, Detection, Response, and Prevention.&#8221;</em></p></blockquote><ol><li><p><strong>Monitoring</strong> &#8211; Collecting logs and telemetry. Every system, every login, every file download generates a trail. At scale, this translates to billions of records per day. Monitoring gives us visibility.</p></li><li><p><strong>Analysis</strong> &#8211; Separating signal from noise. Not every failed login is an attack, but some are. Analysts sift through the haystack to find the needle.</p></li><li><p><strong>Detection</strong> &#8211; Writing rules and logic to catch bad activity automatically. For example: &#8220;Alert me if anyone logs in from outside Texas when all our employees are based here.&#8221;</p></li><li><p><strong>Response</strong> &#8211; Once an alert fires, the real work begins. Investigating what happened, containing it before it spreads, eradicating the threat, and remediating the environment.</p></li><li><p><strong>Prevention</strong> &#8211; Instead of waiting for threats, build guardrails that prevent them from occurring in the first place. Think strong identity checks, firewalls, or policies that block risky behavior.</p></li></ol><p>Within the Blue Team, careers range from <strong>SOC Analyst</strong> to <strong>Detection Engineer</strong> to <strong>Incident Responder</strong> to <strong>Cloud Security Engineer</strong>. Each has its own flavor, but all share the same mission: protect confidentiality, integrity, and availability.</p><div><hr></div><h1>The Red Team: Offense for Good</h1><p>The <strong>Red Team</strong> takes a different approach. Instead of waiting for attackers, they simulate them.</p><blockquote><p>I explained in the workshop: <em>&#8220;Cybersecurity borrows heavily from the military. Blue Teams defend. Red Teams attack.&#8221;</em></p></blockquote><p>Red Teamers, penetration testers, and adversary emulation specialists attempt to break into systems in the same manner as a malicious hacker would. The difference?</p><p>Their job is to <strong>report the weaknesses they find so that they can be addressed and fixed.</strong></p><p>It&#8217;s offense in service of defense.</p><p>Red Team roles include:</p><ul><li><p><strong>Penetration Testers</strong> &#8211; Contracted to test apps, networks, or infrastructure.</p></li><li><p><strong>Adversary Emulation Specialists</strong> &#8211; Simulate real-world attackers (e.g., APT groups) to see how defenders respond.</p></li><li><p><strong>Red Team Engineers/Operators</strong> &#8211; Build the tools, exploits, and campaigns used in simulations.</p></li></ul><p>Where the Blue Team thrives on logs and detections, the Red Team thrives on creativity, exploitation, and thinking like an attacker.</p><div><hr></div><h3>Audience Q&amp;A Moment</h3><p>One audience member asked: </p><blockquote><p><em>&#8220;So which side is better &#8212; Blue or Red?&#8221;</em></p></blockquote><p>My answer: neither. Both exist because of each other. Red Teams keep Blue Teams sharp. Blue Teams build the guardrails, Red Teams test.</p><p>For careers, it comes down to personality:</p><ul><li><p>Do you love puzzles, detection logic, and digging through logs? Blue might fit.</p></li><li><p>Do you love breaking things, exploiting systems, and thinking adversarially? Red might fit.</p></li></ul><p>And the truth is, you can pivot between the two. Many professionals (myself included) have worn both hats over the years.</p><div><hr></div><h1>Career Pathways Into Cybersecurity</h1><p>Now to the part most people lean forward for: <em>&#8220;How do I get in?&#8221;</em></p><p>I broke it down into <strong>four practical pathways</strong>, and I&#8217;ll expand on them here.</p><h4>1. Certifications (Practical &gt; Theoretical)</h4><p>I emphasized in the workshop that a cert is<strong>n't</strong>&nbsp;a guaranteed ticket to a job. But a good cert offers structure, demonstrates knowledge, and, if practical, shows you can actually do the work.</p><p>My top recommendations:</p><p><strong>For Blue Team (Defensive Security):</strong></p><ul><li><p><strong>Blue Team Level 1 (BTL1)</strong> &#8211; Security Blue Team. Hands-on, 24-hour scenario-based cert.</p></li><li><p><strong>Certified Defensive Security Analyst (CDSA)</strong> &#8211; Hack The Box. Covers monitoring + response.</p></li><li><p><strong>Certified CyberDefender (CCD)</strong> &#8211; CyberDefenders. 48-hour, practical detection + response.</p></li></ul><p><strong>For Red Team (Offensive Security):</strong></p><ul><li><p><strong>PNPT (Practical Network Penetration Tester)</strong> &#8211; TCM Security. Affordable, hands-on.</p></li><li><p><strong>OSCP (Offensive Security Certified Professional)</strong> &#8211; Industry standard. An intense 24-hour exam where you must exploit systems and write a report.</p></li></ul><div><hr></div><h4>2. College (Strategic, but Choose Wisely)</h4><p>Not all degrees are equal. My honest take? </p><blockquote><p><strong>Skip cybersecurity degrees unless they are practical.</strong> </p></blockquote><p>Most are heavy on theory, light on skills.</p><p>Better options:</p><ul><li><p><strong>Computer Science</strong> &#8211; Builds coding + math depth, which makes you far stronger in modern security roles.</p></li><li><p><strong>SANS Institute</strong> &#8211; Expensive, but elite. Highly practical and industry-respected.</p></li><li><p><strong>WGU (Western Governors University)</strong> &#8211; Affordable, cert-heavy, NSA recognized. Great for career switchers.</p></li><li><p><strong>RIT (Rochester Institute of Technology)</strong> &#8211; One of the best U.S. programs in cybersecurity.</p></li></ul><div><hr></div><h4>3. Projects (Proof You Can Do the Work)</h4><p>I can&#8217;t stress this enough: <strong>projects differentiate you.</strong></p><ul><li><p>Build a detection for a real attack in Splunk and blog about it.</p></li><li><p>Analyze malware samples in a home lab and share your findings.</p></li><li><p>Write about how you set up a SIEM, an IDS, or a honeypot at home.</p></li></ul><p>Projects show initiative, practical ability, and communication skills. Employers love seeing them on resumes, GitHub, or LinkedIn.</p><div><hr></div><h4>4. Labs &amp; Practice Grounds</h4><p>Don&#8217;t just read &#8212; practice. The best platforms:</p><ul><li><p><strong>TryHackMe</strong> &#8211; Beginner-friendly, guided labs for both Blue and Red. $14/month is worth it.</p></li><li><p><strong>HackTheBox</strong> &#8211; More advanced, great for offensive practice.</p></li><li><p><strong>Your Own Home Lab</strong> &#8211; The ultimate. Spin up virtual machines, simulate attacks, and practice detection. It&#8217;s how I sharpened my skills early on, and I still use mine.</p></li></ul><div><hr></div><h3>Transferable Skills Count Too</h3><p>If you&#8217;re already in an IT help desk, sysadmin, or networking role, you have a head start. Many of those skills are directly applicable to cybersecurity. </p><p>It&#8217;s easier to pivot from IT to security than from scratch.</p><div><hr></div><h3>The Community Advantage</h3><p>Cybersecurity isn&#8217;t a solo sport. That&#8217;s why I built the <strong>Cyberwox Academy Discord</strong>: a community of over 6,800 members where students, professionals, and recruiters share jobs, resources, and guidance. </p><blockquote><p>I told the workshop: <em>&#8220;I can&#8217;t answer every question alone, but together, this community can.&#8221;</em></p></blockquote><p>Joining spaces like this not only accelerates learning but also exposes you to opportunities. People have literally landed jobs just by networking inside.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iF0v!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" width="1456" height="570" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:570,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:188886,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/159067704?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F913f1923-04a0-4fe6-afb6-5e0fca6d78b1_2500x2500.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Join a vibrant cybersecurity community of over 6,800 people who are constantly engaging in conversations and supporting one another, covering topics from cybersecurity and college to certifications, resume assistance, and various non-professional interests like fitness, finance, anime, and other exciting subjects.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://discord.gg/cyberwoxacademy&quot;,&quot;text&quot;:&quot;Join Us!&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://discord.gg/cyberwoxacademy"><span>Join Us!</span></a></p><div><hr></div><h3>Closing Reflection</h3><p>By the end of the workshop, I wanted the room to walk away with this: <strong>Cybersecurity is a mission, and it needs people.</strong> Whether you lean defensive, offensive, or somewhere in between, there&#8217;s space for you here.</p><p>But breaking in requires more than memorizing definitions. It requires:</p><ul><li><p>Building <strong>practical skill</strong> through certs, labs, and projects.</p></li><li><p>Learning to <strong>communicate risk</strong> in business terms.</p></li><li><p>Plugging into a <strong>community</strong> that pushes you forward.</p></li></ul><p>If you do that, not only will you break in &#8212; you&#8217;ll thrive.</p><div><hr></div><h3>&#127909; Watch the Full Workshop (Cyberwox Members Only)</h3><p>If you&#8217;d like to watch the <strong>complete edited two-hour workshop</strong>, it&#8217;s available exclusively to my <strong>Cyberwox Squad and Syndicate members</strong> on YouTube.</p><p>&#128073;&#127997; <a href="https://youtu.be/HyzprIMUpBI">Join here and watch the full session</a>.</p><div><hr></div><p>&#9989; That&#8217;s the conclusion of this 3-part series: <strong>Cybersecurity 101. </strong>If you&#8217;ve read this far, you&#8217;re already ahead of most people trying to understand this field. Share this with someone who needs to know this.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share&quot;,&quot;text&quot;:&quot;Share Cyberwox Unplugged&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.cyberwoxunplugged.com/?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share"><span>Share Cyberwox Unplugged</span></a></p>]]></content:encoded></item><item><title><![CDATA[Cybersecurity 101, Part II: Foundations & Attacks]]></title><description><![CDATA[The CIA Triad, threats, vulnerabilities, and the real attacks shaking organizations and individuals today.]]></description><link>https://www.cyberwoxunplugged.com/p/cybersecurity-101-part-ii-foundations</link><guid isPermaLink="false">https://www.cyberwoxunplugged.com/p/cybersecurity-101-part-ii-foundations</guid><dc:creator><![CDATA[Day Johnson]]></dc:creator><pubDate>Mon, 15 Sep 2025 12:01:58 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!dF61!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb465120e-37bc-4382-9137-cba6a4c754b6_1024x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In Part I, we discussed why cybersecurity matters in 2025: how it impacts every aspect of our lives, how data has become the new gold, and how finances can be compromised with a single breach.</p><p>Now it&#8217;s time to get a little more structured.</p><p>When I teach cybersecurity, I always emphasize that we need <strong>foundations</strong>&#8212;concepts that simplify a massive, complex field into something we can actually build on.</p><p>That&#8217;s where the <strong>CIA Triad</strong> comes in. And no, I&#8217;m not talking about the spy agency.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!dF61!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb465120e-37bc-4382-9137-cba6a4c754b6_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!dF61!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb465120e-37bc-4382-9137-cba6a4c754b6_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!dF61!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb465120e-37bc-4382-9137-cba6a4c754b6_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!dF61!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb465120e-37bc-4382-9137-cba6a4c754b6_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!dF61!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb465120e-37bc-4382-9137-cba6a4c754b6_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!dF61!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb465120e-37bc-4382-9137-cba6a4c754b6_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b465120e-37bc-4382-9137-cba6a4c754b6_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Generated image&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Generated image" title="Generated image" srcset="https://substackcdn.com/image/fetch/$s_!dF61!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb465120e-37bc-4382-9137-cba6a4c754b6_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!dF61!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb465120e-37bc-4382-9137-cba6a4c754b6_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!dF61!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb465120e-37bc-4382-9137-cba6a4c754b6_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!dF61!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb465120e-37bc-4382-9137-cba6a4c754b6_1024x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberwoxunplugged.com/subscribe?"><span>Subscribe now</span></a></p><div><hr></div><p><em>&#9194; Check out part 1 (why it all matters) if you&#8217;ve missed it!</em></p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;e4c891d8-d22e-4e7d-822a-eb46a3687375&quot;,&quot;caption&quot;:&quot;If you&#8217;ve been following CYBERWOX Unplugged for a while, you know this newsletter is where I pull back the curtain.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Cybersecurity 101, Part I: Why It All Matters&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:172540827,&quot;name&quot;:&quot;Day Johnson&quot;,&quot;bio&quot;:&quot;Cybersecurity @Amazon (Ex-Datadog &amp; Optiv). Creator @cyberwox @cyberwoxacademy. Believer &#10013;&#65039;.&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F320cfa44-ac32-40b3-8e06-97497673fd1f_4096x4096.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2025-09-08T12:02:57.917Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!BNAM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbd8279e-bd16-4556-96ff-854e6685b80c_1024x1536.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.cyberwoxunplugged.com/p/cybersecurity-101-part-i-why-it-all&quot;,&quot;section_name&quot;:&quot;Career&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:172312561,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:9,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Cyberwox Unplugged&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!pA5b!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b1ed158-420f-4ae6-9aaa-adc23c31da06_1280x1280.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div><hr></div><h1>The CIA Triad: Cybersecurity&#8217;s North Star</h1><p>At one point in the workshop, I asked: <em>&#8220;How do we make sense of something as broad as cybersecurity?&#8221;</em></p><blockquote><p>My answer: Start with the <strong>CIA Triad</strong> &#8212; Confidentiality, Integrity, and Availability. </p></blockquote><p>These three principles are the foundation of everything we do.</p><ul><li><p><strong>Confidentiality</strong> - Ensuring that only authorized individuals can access the data.</p><ul><li><p>Imagine your mortgage account. Only you and an authorized individual from your bank should have access to this information. Confidentiality is what prevents your neighbor, your co-worker, or a hacker on the other side of the world from peeking in. In practice, we enforce this through encryption, access controls, and identity verification.</p></li></ul></li><li><p><strong>Integrity</strong> - Ensuring the data isn&#8217;t tampered with.</p><ul><li><p>If your mortgage account lists you as <em>Dayspring Johnson</em>, integrity ensures no one can sneak in and flip that to <em>James Johnson</em>. If that change happened, the system would now recognize James as the owner. Integrity keeps systems from being manipulated behind your back.</p></li></ul></li><li><p><strong>Availability </strong>-<strong> </strong>Ensuring you can access your data when you need it.</p><ul><li><p>If ransomware locks down your bank account, retirement funds, or even your laptop, then your data may still exist, but it&#8217;s unavailable to you. And in practice, that&#8217;s the same as losing it.</p></li></ul></li></ul><blockquote><p>I told the room, <em>&#8220;If you remember nothing else from today, remember these three. Break any one of them, and security collapses.&#8221;</em></p></blockquote><div><hr></div><h1>Threats, Vulnerabilities, and Risk</h1><p>Once you know the CIA Triad, the next question is: <em>what actually threatens these three pillars?</em></p><p>We use three words constantly in this industry: <strong>threats, vulnerabilities, and risk.</strong></p><ul><li><p><strong>Threats</strong> &#8211; These are individuals or forces that attempt to cause harm. Attackers trying to break in, steal data, or disrupt availability. A ransomware crew is a threat. An insider misusing access is a threat.</p></li><li><p><strong>Vulnerabilities</strong> &#8211; These are the weaknesses in your system that threats exploit. An unpatched server. A weak password. A misconfigured cloud bucket. No matter how &#8220;secure&#8221; we think we are, vulnerabilities always exist. That&#8217;s why vulnerability management is a whole career path of its own.</p></li><li><p><strong>Risk</strong> &#8211; This is how businesses understand all of it. You can tell an executive, &#8220;There&#8217;s an RCE in the web service,&#8221; but that won&#8217;t land. Instead, we say: <em>&#8220;There&#8217;s a high risk of customer data exposure that could cost millions.&#8221;</em> Risk is the translation layer between technical threats and business impact.</p></li></ul><blockquote><p>I explained in the workshop: <em>&#8220;If we can&#8217;t communicate in terms of risk, we fail the business. Cybersecurity is often seen as a cost center. Unless we show the value of reducing risk, leadership won&#8217;t keep investing in us.&#8221;</em></p></blockquote><p>This is why terms like <strong>low risk, medium risk, and high risk</strong> exist. </p><p>They&#8217;re not just words &#8212; they&#8217;re how we justify budgets, policies, and jobs.</p><div><hr></div><h1>When Cybersecurity Becomes a Cost Center</h1><p>I highlighted an important point: most companies see cybersecurity as a cost rather than a revenue generator. It doesn&#8217;t generate income directly, but it helps avoid losses.</p><p>However, the exception is when you work <strong>for a cybersecurity company</strong>. </p><p>For vendors like CrowdStrike and SentinelOne, as well as cloud providers like AWS and Microsoft, security <em>is</em> the product. </p><p>In those cases, cybersecurity is a revenue generator, not a cost center.</p><p>Understanding this distinction helps you see why translation to &#8220;risk language&#8221; is critical. </p><p>If your leadership only sees cost with no apparent benefit, security budgets disappear quickly.</p><div><hr></div><h1>Common Cyber Attacks</h1><p>With foundations set, I shifted the workshop into what most people really wanted to know: <em>what does this look like in the real world?</em></p><p>We explored two common, dangerous attack types.</p><h2><strong>1. Ransomware: Digital Kidnapping</strong></h2><p>I asked the room to imagine this: you log into your computer, and suddenly everything is locked. A message pops up demanding Bitcoin. If you don&#8217;t pay, not only will you never see your files again, but the attacker promises to leak them to the world.</p><p>That&#8217;s ransomware.</p><p>Attackers infiltrate, encrypt, and extort. They make billions every year. Ransomware campaigns have paralyzed entire governments, hospitals, and school districts.</p><p>In the workshop, I broke down how they get in (called <strong>initial access vectors</strong>):</p><ul><li><p>Phishing emails</p></li><li><p>Typo-squatted websites (e.g., <em>bnkofamerica.com</em> instead of <em>bankofamerica.com</em>)</p></li><li><p>Malicious downloads disguised as free software or media</p></li><li><p>Even calling help desks and impersonating executives</p></li></ul><blockquote><p>And then I told the room: <em>&#8220;Stopping ransomware isn&#8217;t about one magic tool. Antivirus, EDR, firewalls &#8212; they help. But attackers evolve. That&#8217;s why we preach <strong>defense in depth</strong>: layered defenses across endpoints, networks, cloud, and people. One layer fails? Another should catch it.&#8221;</em></p></blockquote><h2><strong>2. Insider Threats: Danger on the Inside</strong></h2><p>The second attack type doesn&#8217;t involve outsiders breaking in. Its employees are misusing the access they already have.</p><p>I painted the picture:</p><blockquote><p>&#8220;You&#8217;re an accountant at a bank. You have access to social security numbers, retirement accounts, and client records. You notice one account has $20 million sitting in it. Meanwhile, you&#8217;re making $70,000. The temptation is real.&#8221;</p></blockquote><p>That&#8217;s an insider threat. </p><p>And it&#8217;s why companies need not only external defenses, but also monitoring and policies for insiders. In fact, the team I work on at Amazon focuses heavily on insider threats because insiders already understand systems, already have access, and can often cause just as much damage as an external attacker.</p><div><hr></div><h1>Audience Q&amp;A Moments</h1><p>This was one of my favorite parts of the workshop &#8212; people weren&#8217;t shy about asking questions.</p><blockquote><p><strong>Q: What&#8217;s the point of an antivirus if attackers always bypass it?</strong></p></blockquote><p>I explained that legacy antivirus was &#8220;signature-based,&#8221; relying on known file fingerprints. Attackers quickly learned to modify files so that signatures no longer matched. Modern tools are behavioral, so they look at what a file does. </p><p>But even then, attackers adapt. That&#8217;s why <strong>prevention</strong> (not downloading shady files in the first place) is stronger than relying purely on detection tools.</p><blockquote><p><strong>Q: Should I accept cookies on websites?</strong></p></blockquote><p>Cookies mainly track you. </p><p>I usually deny them, or at least clear them often. Better yet, use privacy-focused browsers like Brave. But the bigger lesson is this: <em>you always have the freedom not to use a site if it feels invasive.</em> Exercising that choice is part of your personal security posture.</p><blockquote><p><strong>Q: What if I already downloaded something shady?</strong></p></blockquote><p>If you only downloaded it, delete it. </p><p>If you opened it, assume persistence and consider a complete reset or reimage. Painful, yes &#8212; but safer. Attackers often build mechanisms that survive reboots or file deletions.</p><div><hr></div><h1>Practical Tools I Recommended</h1><p>I also gave the room some practical starting points anyone could use:</p><ul><li><p><strong>Malwarebytes</strong> &#8211; A free (with paid tier) tool that blocks malicious websites and downloads.</p></li><li><p><strong>Microsoft Defender</strong> &#8211; Comes built into Windows and is often enough to catch common threats.</p></li><li><p><strong>Skepticism</strong> &#8211; Still the best defense. If something feels off, question it before you click.</p></li></ul><div><hr></div><h3>Wrapping Up Part II</h3><p>By the end of this section of the workshop, the room had a clearer picture: cybersecurity isn&#8217;t just about hackers in hoodies. It&#8217;s about <strong>protecting confidentiality, integrity, and availability</strong>; translating threats into risks businesses can understand; and recognizing that both ransomware crews and insiders pose real dangers.</p><p>In <strong>Part III</strong>, we&#8217;ll go deeper into the <strong>people side of defense</strong>: how Blue Teams monitor, detect, and respond, how Red Teams attack to make systems stronger, and the real career pathways you can take to join the fight.</p><div><hr></div><h3>&#127909; Watch the Full Workshop (Cyberwox Members Only)</h3><p>If you&#8217;d like to watch the <strong>complete edited two-hour workshop</strong>, it&#8217;s available exclusively to my <strong>Cyberwox Squad and Syndicate members</strong> on YouTube.</p><p>&#128073;&#127997; <a href="https://youtu.be/HyzprIMUpBI">Join here and watch the full session</a>.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iF0v!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" width="1456" height="570" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:570,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:188886,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/159067704?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F913f1923-04a0-4fe6-afb6-5e0fca6d78b1_2500x2500.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Join a vibrant cybersecurity community of over 6,800 people who are constantly engaging in conversations and supporting one another, covering topics from cybersecurity and college to certifications, resume assistance, and various non-professional interests like fitness, finance, anime, and other exciting subjects.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://discord.gg/cyberwoxacademy&quot;,&quot;text&quot;:&quot;Join Us!&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://discord.gg/cyberwoxacademy"><span>Join Us!</span></a></p><div><hr></div><p>&#9989; Next up: <strong>Cybersecurity 101, Part III: Defenders, Offense, and Careers</strong></p><p><em>How Blue and Red Teams operate, and the practical ways you can build a career in cybersecurity.</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share&quot;,&quot;text&quot;:&quot;Share Cyberwox Unplugged&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.cyberwoxunplugged.com/?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share"><span>Share Cyberwox Unplugged</span></a></p>]]></content:encoded></item><item><title><![CDATA[Cybersecurity 101, Part I: Why It All Matters]]></title><description><![CDATA[The mission behind security, how it shapes your everyday life, and why data and money make you a target.]]></description><link>https://www.cyberwoxunplugged.com/p/cybersecurity-101-part-i-why-it-all</link><guid isPermaLink="false">https://www.cyberwoxunplugged.com/p/cybersecurity-101-part-i-why-it-all</guid><dc:creator><![CDATA[Day Johnson]]></dc:creator><pubDate>Mon, 08 Sep 2025 12:02:57 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!BNAM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbd8279e-bd16-4556-96ff-854e6685b80c_1024x1536.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>If you&#8217;ve been following CYBERWOX Unplugged for a while, you know this newsletter is where I pull back the curtain. </p><p>Not quick hot takes. Not polished LinkedIn posts. </p><p>This is where I reflect, document, and share the more profound lessons that shape my career and this community.</p><p>Earlier this year, I had the opportunity to give a <strong>two-hour live workshop</strong> on the fundamentals of cybersecurity, not just as a technical field, but as an <strong>industry, a career, and most importantly, a mission.</strong></p><p>The room wasn&#8217;t full of seasoned pros. </p><p>It was a mix of students, curious professionals, and individuals seeking to understand how hacking and security affect their daily lives. That&#8217;s why I removed the jargon and started from the ground up.</p><p>What follows in this three-part series is the <strong>whole arc of that workshop</strong>, adapted into long-form essays. </p><p>I haven&#8217;t skimmed or over-summarized. </p><p>I want you to feel the flow of the session, hear the audience questions, and absorb the stories that made people nod, laugh, or suddenly sit forward.</p><p>And for those of you in the <strong>Cyberwox Squad or Cyberwox Syndicate tiers</strong> on YouTube, the <strong>full edited workshop video</strong> is available in your <a href="https://youtu.be/HyzprIMUpBI">members-only feed</a>.</p><div><hr></div><h1>Setting The Tone</h1><p>No slides. No flashy animations. </p><p>Just me, a room full of people, and an honest conversation about cybersecurity.</p><p>That was intentional. I didn&#8217;t want to bore anyone with technical diagrams or a death-by-PowerPoint presentation. </p><p>Instead, I wanted to break down cybersecurity in plain English, connect it directly to people&#8217;s lives, and make the space feel interactive.</p><p>So before I even introduced myself, I asked three simple questions.</p><div><hr></div><h2>The Three Questions That Changed the Tone</h2><blockquote><p>&#8220;By a show of hands, how many of you have heard of cybersecurity or hacking?&#8221;</p></blockquote><p>Almost every hand in the room went up.</p><blockquote><p>&#8220;How many of you have ever been hacked&#8230;maybe your WhatsApp, your Facebook, or even your bank account?&#8221;</p></blockquote><p>Some hands stayed up, some went down. People laughed nervously, realizing how close to home this was.</p><blockquote><p>&#8220;Alright&#8230; now, how many of you have ever hacked someone else?&#8221;</p></blockquote><p>This one got the loudest reaction. Smiles, chuckles, side-eyes.</p><p>I started with those questions because it sets the tone: <strong>cybersecurity is not some abstract thing that only hackers in hoodies deal with. It&#8217;s already part of your life.</strong> </p><p>If your phone, car, accounts, or retirement money are online, then cybersecurity affects you every single day.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberwoxunplugged.com/subscribe?"><span>Subscribe now</span></a></p><div><hr></div><h1>Who I Am and Why This Matters</h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!BNAM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbd8279e-bd16-4556-96ff-854e6685b80c_1024x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!BNAM!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbd8279e-bd16-4556-96ff-854e6685b80c_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!BNAM!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbd8279e-bd16-4556-96ff-854e6685b80c_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!BNAM!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbd8279e-bd16-4556-96ff-854e6685b80c_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!BNAM!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbd8279e-bd16-4556-96ff-854e6685b80c_1024x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!BNAM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbd8279e-bd16-4556-96ff-854e6685b80c_1024x1536.png" width="1024" height="1536" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/bbd8279e-bd16-4556-96ff-854e6685b80c_1024x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Generated image&quot;,&quot;title&quot;:&quot;Generated image&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Generated image" title="Generated image" srcset="https://substackcdn.com/image/fetch/$s_!BNAM!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbd8279e-bd16-4556-96ff-854e6685b80c_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!BNAM!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbd8279e-bd16-4556-96ff-854e6685b80c_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!BNAM!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbd8279e-bd16-4556-96ff-854e6685b80c_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!BNAM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbd8279e-bd16-4556-96ff-854e6685b80c_1024x1536.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>If you're new here, I'm Day, and I'm 23 years old.</p><p>I&#8217;ve been working in cybersecurity for about half a decade. Here&#8217;s a snapshot of that journey:</p><ul><li><p>Started with an <strong>internship during my freshman year of college</strong> &#8212; one of the best ways to break into the field.</p></li><li><p>Worked across <strong>cloud security, threat detection, and incident response</strong>.</p></li><li><p>Most recently, I&#8217;ve been doing <strong>threat hunting, threat intelligence, and adversary emulation</strong>.</p></li><li><p>Today, I work on <strong>Amazon&#8217;s cybersecurity team</strong>, protecting global customers every single day.</p></li></ul><p>That list might sound like I&#8217;ve jumped around a lot, but that&#8217;s actually the strength of this industry. </p><p>Once you build one skillset, you can pivot into others. </p><p>Threat Detection skills make you a better responder. </p><p>Incident Response experience makes you a sharper Threat Hunter. </p><p>It&#8217;s all connected by one thing: <strong>protecting people and systems from attackers.</strong></p><div><hr></div><h1>Beyond a Career: Cybersecurity as a Mission</h1><p>When discussing careers, it&#8217;s tempting to focus on money, titles, and prestige. And yes, cybersecurity pays well, but here&#8217;s my perspective:</p><blockquote><p><strong>Cybersecurity is not just a career. It&#8217;s a mission.</strong></p></blockquote><p>That mission looks like this:</p><ul><li><p>Protecting your family and the people you care about.</p></li><li><p>Protecting companies that serve millions.</p></li><li><p>Protecting entire societies from adversaries who want to exploit weaknesses.</p></li></ul><p>When you see your work as a mission, it becomes easier to stay motivated. It fuels the grind of learning, experimenting, and growing. </p><p>Without that mission, cybersecurity can seem like an endless treadmill of alerts and acronyms. But with it, every detection, every fix, every analysis feels like being part of something bigger.</p><div><hr></div><h2>Why Cybersecurity Matters in 2025</h2><p>We have been through a global tech revolution for over twenty years. Now, every company, in some way, is a&nbsp;<strong>software or tech company</strong>.</p><ul><li><p>Your <strong>bank</strong> doesn&#8217;t just hold money; it runs databases, servers, apps, and APIs.</p></li><li><p>Your <strong>grocery store</strong> doesn&#8217;t just sell food; it manages online orders, payment systems, and delivery platforms.</p></li><li><p>Even the&nbsp;<strong>library,</strong>&nbsp;where I gave the workshop, runs portals, databases, and Wi-Fi services.</p></li></ul><p>Everywhere you look, the crown jewel is the same: <strong>data.</strong></p><div><hr></div><h2>Data Is the New Gold</h2><p>Here&#8217;s how I broke it down in the workshop:</p><p>Your name. Your phone number. Your address. Your income. Your browsing habits. Your medical records.</p><p>All of these are&nbsp;<strong>extremely valuable</strong>&nbsp;not only to companies that sell ads but also to adversaries.</p><ul><li><p>Companies use your data to target you with ads or develop more effective AI models.</p></li><li><p>Attackers use your data to steal your identity, open accounts in your name, or blackmail you.</p></li><li><p>Even something as simple as a leaked email and password combination can cascade into massive financial damage if reused across multiple accounts.</p></li></ul><blockquote><p>Data is leverage. </p></blockquote><div><hr></div><h2>The Financial Dimension</h2><p>The second crown jewel is money.</p><p>Bank accounts, mortgages, retirement savings &#8212; all of these live online now. </p><p>If an attacker compromises those systems, they don&#8217;t just inconvenience you; they can equally <strong>wreck your financial life.</strong></p><ul><li><p>They can open fraudulent loans.</p></li><li><p>They can max out credit cards.</p></li><li><p>They can drain retirement accounts.</p></li><li><p>They can even get mortgages in your name.</p></li></ul><p>At a bigger scale, if attackers compromise a financial institution itself, entire communities are at risk.</p><p>This is why cybersecurity is no longer optional. </p><p>If attackers control your <strong>data</strong> and your <strong>finances</strong>, they essentially control your life.</p><div><hr></div><h2>Why the Mission Is Urgent</h2><blockquote><p>In the workshop, I told the room, <em>&#8220;This is why we need more people in this industry. The attackers are motivated. The money is real. The harm is personal.&#8221;</em></p></blockquote><p>Ransomware alone is a&nbsp;<strong>billion-dollar criminal industry</strong>, rivaling drug cartels. And on the other side? Companies, governments, and individuals who often lack the defenses needed to keep up.</p><p>That gap is where cybersecurity professionals come in. </p><p>It&#8217;s why the <strong>mission</strong> matters.</p><div><hr></div><h3>Closing Thoughts for Part I</h3><p>That&#8217;s where I ended the opening portion of the workshop. Before diving into frameworks or attack types, I wanted everyone to sit with this truth:</p><blockquote><p><strong>Cybersecurity isn&#8217;t just for engineers. It already touches your everyday life. And the stakes are higher than ever.</strong></p></blockquote><p>In <strong>Part II</strong>, we&#8217;ll dig into the <strong>foundations of cybersecurity</strong>: the CIA Triad (Confidentiality, Integrity, Availability), threats, vulnerabilities, and how we translate all of that into the language businesses understand: risk.</p><div><hr></div><h3>&#127909; Watch the Full Workshop (Cyberwox Members Only)</h3><p>If you&#8217;d like to watch the <strong>complete edited two-hour workshop</strong>, it&#8217;s available exclusively to my <strong>Cyberwox Squad and Syndicate members</strong> on YouTube.</p><p>&#128073;&#127997; <a href="https://youtu.be/HyzprIMUpBI">Join here and watch the full session</a>.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iF0v!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" width="1456" height="570" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:570,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:188886,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/159067704?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F913f1923-04a0-4fe6-afb6-5e0fca6d78b1_2500x2500.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Join a vibrant cybersecurity community of over 6,800 people who are constantly engaging in conversations and supporting one another, covering topics from cybersecurity and college to certifications, resume assistance, and various non-professional interests like fitness, finance, anime, and other exciting subjects.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://discord.gg/cyberwoxacademy&quot;,&quot;text&quot;:&quot;Join Us!&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://discord.gg/cyberwoxacademy"><span>Join Us!</span></a></p><div><hr></div><p>&#9989; Next up: <strong>Cybersecurity 101, Part II: Foundations &amp; Attacks</strong></p><p><em>The CIA Triad, threats, vulnerabilities, and the real-world attacks that are shaking organizations and individuals today.</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share&quot;,&quot;text&quot;:&quot;Share Cyberwox Unplugged&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberwoxunplugged.com/?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share"><span>Share Cyberwox Unplugged</span></a></p>]]></content:encoded></item><item><title><![CDATA[Cybersecurity 101, Part 0: Why I’m Sharing My Cybersecurity 101 Workshop]]></title><description><![CDATA[Part 0: Introduction to the Series (Editor&#8217;s Note).]]></description><link>https://www.cyberwoxunplugged.com/p/cybersecurity-101-part-0-why-im-sharing</link><guid isPermaLink="false">https://www.cyberwoxunplugged.com/p/cybersecurity-101-part-0-why-im-sharing</guid><dc:creator><![CDATA[Day Johnson]]></dc:creator><pubDate>Mon, 08 Sep 2025 03:46:31 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!GIhi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7cb7c3a5-3781-4b6c-9d53-bd9138b33acd_1024x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>When I first stumbled into the cybersecurity industry, I didn&#8217;t have a map.</p><p>I was 18, a college freshman, and an immigrant trying to figure out not just how to pass classes, but how to carve out a future in an industry I barely understood. Back then, terms like <em>Blue Team</em> and <em>Red Team</em> sounded like code names from a movie, not real jobs people built careers around.</p><p>What kept me moving forward wasn&#8217;t confidence. It was a sense of mission. </p><p>I wanted to protect people even if I couldn&#8217;t yet explain how.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberwoxunplugged.com/subscribe?"><span>Subscribe now</span></a></p><div><hr></div><h1>Why This Series Exists</h1><p>Fast forward five years: I&#8217;ve worked across cloud security, detection engineering, incident response, and threat hunting at companies like Datadog and Amazon. </p><p>I&#8217;ve learned a lot. I&#8217;ve failed a lot. And through it all, one truth keeps showing up:</p><blockquote><p><strong>cybersecurity is intimidating until someone slows down long enough to make it human.</strong></p></blockquote><p>Recently, I gave a <strong>two-hour live workshop</strong> on the fundamentals of cybersecurity. The room wasn&#8217;t filled with experts. It was students, career-switchers, and curious professionals who wanted to know:</p><ul><li><p><em>What exactly is cybersecurity?</em></p></li><li><p><em>How does it affect me on a day-to-day basis?</em></p></li><li><p><em>How do people actually build careers in it?</em></p></li></ul><p>The questions were simple, but the conversations were powerful. </p><p>People leaned forward. They laughed. Some looked nervous when they realized how close to home these risks hit. That&#8217;s when I knew this workshop needed to live beyond that room.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iF0v!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" width="1456" height="570" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:570,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:188886,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/159067704?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F913f1923-04a0-4fe6-afb6-5e0fca6d78b1_2500x2500.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Join a vibrant cybersecurity community of over 6,800 people who are constantly engaging in conversations and supporting one another, covering topics from cybersecurity and college to certifications, resume assistance, and various non-professional interests like fitness, finance, anime, and other exciting subjects.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://discord.gg/cyberwoxacademy&quot;,&quot;text&quot;:&quot;Join Us!&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://discord.gg/cyberwoxacademy"><span>Join Us!</span></a></p><div><hr></div><h1>What You&#8217;ll Get Here</h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!GIhi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7cb7c3a5-3781-4b6c-9d53-bd9138b33acd_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!GIhi!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7cb7c3a5-3781-4b6c-9d53-bd9138b33acd_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!GIhi!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7cb7c3a5-3781-4b6c-9d53-bd9138b33acd_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!GIhi!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7cb7c3a5-3781-4b6c-9d53-bd9138b33acd_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!GIhi!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7cb7c3a5-3781-4b6c-9d53-bd9138b33acd_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!GIhi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7cb7c3a5-3781-4b6c-9d53-bd9138b33acd_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7cb7c3a5-3781-4b6c-9d53-bd9138b33acd_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Generated image&quot;,&quot;title&quot;:&quot;Generated image&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Generated image" title="Generated image" srcset="https://substackcdn.com/image/fetch/$s_!GIhi!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7cb7c3a5-3781-4b6c-9d53-bd9138b33acd_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!GIhi!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7cb7c3a5-3781-4b6c-9d53-bd9138b33acd_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!GIhi!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7cb7c3a5-3781-4b6c-9d53-bd9138b33acd_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!GIhi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7cb7c3a5-3781-4b6c-9d53-bd9138b33acd_1024x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Over the following three newsletters, I&#8217;m sharing the whole arc of that workshop. </p><p>Not a skimmed recap. Not bullet-point slides. But the stories, the frameworks, and even the audience Q&amp;A that made the session come alive.</p><p>Here&#8217;s how it will unfold:</p><p><strong>Part I: Why Cybersecurity Matters in 2025</strong><br><em>The mission behind security, how it shapes your everyday life, and why data and money make you a target.</em></p><p><strong>Part II: Foundations &amp; Attacks</strong><br><em>The CIA Triad, threats, vulnerabilities, and the real-world attacks that are shaking organizations and individuals today.</em></p><p><strong>Part III: Defenders, Offense, and Careers</strong><br><em>How Blue and Red Teams operate, and the practical ways you can build a career in cybersecurity.</em></p><div class="pullquote"><h3>For Cyberwox Members</h3><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!UN9D!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a2b1e25-26b6-4c87-9b67-441b54a8a1b4_2500x626.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!UN9D!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a2b1e25-26b6-4c87-9b67-441b54a8a1b4_2500x626.png 424w, https://substackcdn.com/image/fetch/$s_!UN9D!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a2b1e25-26b6-4c87-9b67-441b54a8a1b4_2500x626.png 848w, https://substackcdn.com/image/fetch/$s_!UN9D!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a2b1e25-26b6-4c87-9b67-441b54a8a1b4_2500x626.png 1272w, https://substackcdn.com/image/fetch/$s_!UN9D!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a2b1e25-26b6-4c87-9b67-441b54a8a1b4_2500x626.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!UN9D!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a2b1e25-26b6-4c87-9b67-441b54a8a1b4_2500x626.png" width="394" height="98.7706043956044" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3a2b1e25-26b6-4c87-9b67-441b54a8a1b4_2500x626.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:365,&quot;width&quot;:1456,&quot;resizeWidth&quot;:394,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!UN9D!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a2b1e25-26b6-4c87-9b67-441b54a8a1b4_2500x626.png 424w, https://substackcdn.com/image/fetch/$s_!UN9D!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a2b1e25-26b6-4c87-9b67-441b54a8a1b4_2500x626.png 848w, https://substackcdn.com/image/fetch/$s_!UN9D!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a2b1e25-26b6-4c87-9b67-441b54a8a1b4_2500x626.png 1272w, https://substackcdn.com/image/fetch/$s_!UN9D!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a2b1e25-26b6-4c87-9b67-441b54a8a1b4_2500x626.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>The <strong>full edited two-hour workshop video</strong> is available exclusively to my <strong>Cyberwox Squad and Syndicate members</strong> on YouTube.</p><p>&#128073;&#127997; <a href="https://youtu.be/HyzprIMUpBI">Join here and watch the whole session</a>.</p></div><h3>Why I Care</h3><p>Cyberwox Unplugged has always been the place where I write what I wish I had known when I was starting out. A space to slow down, to reflect, and to share both the technical lessons and the personal ones.</p><p>If you&#8217;re new, welcome. If you&#8217;ve been following for a while, thank you. Either way, my hope is simple: that this series gives you clarity, direction, and maybe even the spark of a mission that&#8217;s kept me going.</p><div><hr></div><h3>Let&#8217;s Begin</h3><p>Start with <strong>Part I: Why Cybersecurity Matters in 2025</strong> &#8594; <a href="https://www.cyberwoxunplugged.com/p/cybersecurity-101-part-i-why-it-all?r=2uq5cr">Read it here</a>.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share&quot;,&quot;text&quot;:&quot;Share Cyberwox Unplugged&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.cyberwoxunplugged.com/?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share"><span>Share Cyberwox Unplugged</span></a></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberwox Unplugged is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[The Cybersecurity Certification Trap]]></title><description><![CDATA[A Practical Framework for Choosing Cyber & Cloud Certs That Actually Move Your Career.]]></description><link>https://www.cyberwoxunplugged.com/p/the-cybersecurity-certification-trap</link><guid isPermaLink="false">https://www.cyberwoxunplugged.com/p/the-cybersecurity-certification-trap</guid><dc:creator><![CDATA[Day Johnson]]></dc:creator><pubDate>Fri, 05 Sep 2025 12:03:37 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/169317196/3e2193b03ab0bcaefc830bd8b7d9d6e6.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<h1>TL;DR (but don&#8217;t stop here)</h1><p>Most people burn time and money on certifications that don&#8217;t change their trajectory. Use this 4&#8209;question framework every time you consider a cert:</p><ol><li><p><strong>Career Value:</strong> <em>Does this tangibly move me toward the role I want?</em></p></li><li><p><strong>Hands&#8209;On Depth:</strong> <em>Will I build and prove real skills, not just memorize trivia?</em></p></li><li><p><strong>Planned Application:</strong> <em>Exactly how (and how soon) will I use these skills on the job or in projects?</em></p></li><li><p><strong>Faster Alternatives:</strong> <em>Is there a more practical path (cert, lab, project) that gets me further, faster?</em></p></li></ol><p>If the answer to any of these is weak, pass. Simple.</p><div><hr></div><h1><strong>About Me</strong></h1><p>If you're new here, I'm Day, a Cybersecurity Engineer at Amazon. With five years in cybersecurity, my experience covers Detection Engineering, Cloud Security, Incident Response, Threat Hunting, and most recently, Threat Intelligence.</p><p>Before Amazon, I worked at Datadog as a cloud threat detection engineer, where I researched cloud threats and built detections for various cloud providers and SaaS applications.</p><p>I've worked my way up from various SOC analyst roles, investigating everything from endpoint threats to building detection systems for cloud-based abuse, so I know exactly what it takes to break into this field and make career advancements.</p><p>I started, just like many of you, learning from scratch, asking questions, and figuring it out one step at a time. <strong>And now, I'm here to help you do the same.</strong></p><p>If you want to stay up-to-date on the cybersecurity industry and everything technical and career-related, be sure to like and subscribe to the newsletter for more content like this.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iF0v!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" width="1456" height="570" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:570,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:188886,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/159067704?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F913f1923-04a0-4fe6-afb6-5e0fca6d78b1_2500x2500.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Join a vibrant cybersecurity community of over 6,800 people who are constantly engaging in conversations and supporting one another, covering topics from cybersecurity and college to certifications, resume assistance, and various non-professional interests like fitness, finance, anime, and other exciting subjects.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://discord.gg/cyberwoxacademy&quot;,&quot;text&quot;:&quot;Join Us!&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://discord.gg/cyberwoxacademy"><span>Join Us!</span></a></p><div><hr></div><h1>The Problem: Cert Chasing Without Strategy</h1><p>I&#8217;ve taken numerous certifications for learning, career advancement, and as part of my time at WGU. </p><p>Some were worth it. Some weren&#8217;t. </p><p>The difference came down to one thing: <strong>did it create real leverage</strong> in my career?</p><p>2025 (or any year of your life) is not the time to spend on anything that doesn&#8217;t materially level you up. </p><p>No more paying for multiple&#8209;choice trivia that never shows up in your day job. </p><p>No more &#8220;I&#8217;ll just add this to my r&#233;sum&#233;&#8221; without a plan to apply it.</p><p>Let&#8217;s fix the way you evaluate certs&#8212;once and for all.</p><div><hr></div><h1>The 4&#8209;Question Certification Framework</h1><h2>1) <strong>Does it create career value?</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!8nDi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15631713-cadf-4424-a5d6-34fbfe63f49a_1024x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8nDi!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15631713-cadf-4424-a5d6-34fbfe63f49a_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!8nDi!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15631713-cadf-4424-a5d6-34fbfe63f49a_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!8nDi!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15631713-cadf-4424-a5d6-34fbfe63f49a_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!8nDi!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15631713-cadf-4424-a5d6-34fbfe63f49a_1024x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8nDi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15631713-cadf-4424-a5d6-34fbfe63f49a_1024x1536.png" width="1024" height="1536" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/15631713-cadf-4424-a5d6-34fbfe63f49a_1024x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Generated image&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Generated image" title="Generated image" srcset="https://substackcdn.com/image/fetch/$s_!8nDi!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15631713-cadf-4424-a5d6-34fbfe63f49a_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!8nDi!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15631713-cadf-4424-a5d6-34fbfe63f49a_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!8nDi!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15631713-cadf-4424-a5d6-34fbfe63f49a_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!8nDi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15631713-cadf-4424-a5d6-34fbfe63f49a_1024x1536.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Don&#8217;t start by asking &#8220;Is this cert popular?&#8221; Start by asking: <strong>&#8220;Does this push me directly toward the role, scope, or compensation band I&#8217;m targeting?&#8221;</strong></p><p><strong>How to test that quickly:</strong></p><ul><li><p>Pull 15&#8211;20 recent job postings for the role you want.</p></li><li><p>Highlight every required or &#8220;nice to have&#8221; cert. Notice the patterns.</p></li><li><p>Map the cert&#8217;s curriculum to the skills those jobs demand.</p></li><li><p>If there&#8217;s a weak or non&#8209;existent connection, skip it.</p></li></ul><blockquote><p>If it doesn&#8217;t move you toward your target role, it&#8217;s a distraction.</p></blockquote><h2>2) <strong>Does it teach you hands&#8209;on skills?</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!e-bo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F533f9fe4-982e-47fe-ad74-79f2ada95501_1024x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!e-bo!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F533f9fe4-982e-47fe-ad74-79f2ada95501_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!e-bo!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F533f9fe4-982e-47fe-ad74-79f2ada95501_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!e-bo!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F533f9fe4-982e-47fe-ad74-79f2ada95501_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!e-bo!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F533f9fe4-982e-47fe-ad74-79f2ada95501_1024x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!e-bo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F533f9fe4-982e-47fe-ad74-79f2ada95501_1024x1536.png" width="1024" height="1536" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/533f9fe4-982e-47fe-ad74-79f2ada95501_1024x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Generated image&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Generated image" title="Generated image" srcset="https://substackcdn.com/image/fetch/$s_!e-bo!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F533f9fe4-982e-47fe-ad74-79f2ada95501_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!e-bo!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F533f9fe4-982e-47fe-ad74-79f2ada95501_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!e-bo!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F533f9fe4-982e-47fe-ad74-79f2ada95501_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!e-bo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F533f9fe4-982e-47fe-ad74-79f2ada95501_1024x1536.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Multiple&#8209;choice is not how modern teams validate your ability to <strong>ship</strong>, <strong>respond</strong>, <strong>detect</strong>, or <strong>break</strong> systems. </p><p>The market is flooded with practical training now. Use it.</p><p><strong>Prefer these styles of exams and programs:</strong></p><ul><li><p><strong>Hands&#8209;on labs</strong> in real or simulated environments</p></li><li><p><strong>Capstone projects</strong> that you can show and talk through</p></li><li><p><strong>Scenario-based exams</strong> (IR, SOC triage, malware, adversary emulation)</p></li><li><p><strong>Challenge platforms</strong> (HTB, TryHackMe, CyberDefenders) tied to certs</p></li></ul><p>Examples:</p><ul><li><p><strong>Defensive / SOC:</strong></p><ul><li><p><em>Security Blue Team</em> &#8212; <strong>BTL1</strong></p></li><li><p><em>CyberDefenders</em> &#8212; <strong>CCD</strong></p></li><li><p><em>Hack The Box</em> &#8212; <strong>CDSA</strong></p></li></ul></li><li><p><strong>Offensive:</strong></p><ul><li><p><em>TCM</em> &#8212; <strong>PNPT</strong></p></li><li><p><em>INE/eLearnSecurity</em> &#8212; <strong>eJPT, eCPPT, malware analysis tracks</strong></p></li><li><p><em>Offensive Security</em> &#8212; <strong>OSCP/OSEP</strong> (when you truly need that depth and rigor)</p></li></ul></li><li><p><strong>Cloud &amp; AppSec:</strong></p><ul><li><p><em>Cloud Breach</em> &#8212; Offensive AWS/Azure</p></li><li><p><em>Altered Security</em> &#8212; Azure AD, Azure application security</p></li><li><p><em>Microsoft &amp; AWS</em> &#8212; now adding real lab credits so you actually deploy and test (you get Azure credit to build and break things + AWS Free Tier)</p></li></ul></li><li><p><strong>DevSecOps:</strong></p><ul><li><p><em>DevSecOps Institute</em> and a growing set of <strong>hands&#8209;on</strong> DevOps/SRE/Supply-chain security certs</p></li></ul></li></ul><p>If it&#8217;s not practical, <strong>you&#8217;re paying to forget it.</strong></p><h2>3) <strong>How will you apply it immediately?</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!oduH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef6d6fe8-e8aa-4ecf-a002-7d4b27e95d10_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!oduH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef6d6fe8-e8aa-4ecf-a002-7d4b27e95d10_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!oduH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef6d6fe8-e8aa-4ecf-a002-7d4b27e95d10_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!oduH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef6d6fe8-e8aa-4ecf-a002-7d4b27e95d10_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!oduH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef6d6fe8-e8aa-4ecf-a002-7d4b27e95d10_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!oduH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef6d6fe8-e8aa-4ecf-a002-7d4b27e95d10_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ef6d6fe8-e8aa-4ecf-a002-7d4b27e95d10_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Generated image&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Generated image" title="Generated image" srcset="https://substackcdn.com/image/fetch/$s_!oduH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef6d6fe8-e8aa-4ecf-a002-7d4b27e95d10_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!oduH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef6d6fe8-e8aa-4ecf-a002-7d4b27e95d10_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!oduH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef6d6fe8-e8aa-4ecf-a002-7d4b27e95d10_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!oduH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef6d6fe8-e8aa-4ecf-a002-7d4b27e95d10_1024x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>If you don&#8217;t use it, you will lose it. Rapidly.</p><p>Before you pay:</p><ul><li><p><strong>Define the use case.</strong> &#8220;I&#8217;m an IR analyst who wants attacker empathy, so I&#8217;ll take PNPT and immediately emulate those TTPs to harden our detections.&#8221;</p></li><li><p><strong>Define the artifact.</strong> &#8220;I will build a purple-team playbook, tune three detections, and push a Sigma rule PR by the end of the month.&#8221;</p></li><li><p><strong>Define the repetition loop.</strong> &#8220;Every Friday, I&#8217;ll spend 90 minutes re&#8209;running one offensive technique in the lab, documenting telemetry and defensive visibility gaps.&#8221;</p></li></ul><p>No plan to apply = guaranteed skill decay.</p><h2>4) <strong>Are there faster, more practical alternatives?</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!eTRb!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97682be8-4f8c-493c-87cb-951d6637e607_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!eTRb!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97682be8-4f8c-493c-87cb-951d6637e607_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!eTRb!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97682be8-4f8c-493c-87cb-951d6637e607_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!eTRb!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97682be8-4f8c-493c-87cb-951d6637e607_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!eTRb!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97682be8-4f8c-493c-87cb-951d6637e607_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!eTRb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97682be8-4f8c-493c-87cb-951d6637e607_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/97682be8-4f8c-493c-87cb-951d6637e607_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Generated image&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Generated image" title="Generated image" srcset="https://substackcdn.com/image/fetch/$s_!eTRb!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97682be8-4f8c-493c-87cb-951d6637e607_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!eTRb!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97682be8-4f8c-493c-87cb-951d6637e607_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!eTRb!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97682be8-4f8c-493c-87cb-951d6637e607_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!eTRb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97682be8-4f8c-493c-87cb-951d6637e607_1024x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Many legacy certs still get promoted because they&#8217;ve been around forever. That doesn&#8217;t mean they&#8217;re the best <em>for you</em>.</p><p><strong>Example:</strong> For the price of <strong>PenTest+</strong>, you can get <strong>PNPT</strong>, which gives you a complete end&#8209;to&#8209;end practical exam with reporting that mirrors real consulting work. </p><p>Same &#8220;destination&#8221; (penetration testing competency), but PNPT gets you there <strong>faster and deeper</strong>.</p><p>Ask yourself: <em>Is there a practical training program, project, lab series, or community-driven cert that gets me to demonstrable skill faster?</em></p><p>If yes, choose that.</p><div><hr></div><h1>A Simple Scorecard (Use This Before You Swipe Your Card)</h1><p>Score each question from <strong>0 to 3</strong>. Anything <strong>&lt;8 total</strong> is a pass for me.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!cAJ0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F146e73cb-f3d4-4d9b-bd83-06926d3f7bbb_1828x594.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!cAJ0!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F146e73cb-f3d4-4d9b-bd83-06926d3f7bbb_1828x594.png 424w, https://substackcdn.com/image/fetch/$s_!cAJ0!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F146e73cb-f3d4-4d9b-bd83-06926d3f7bbb_1828x594.png 848w, https://substackcdn.com/image/fetch/$s_!cAJ0!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F146e73cb-f3d4-4d9b-bd83-06926d3f7bbb_1828x594.png 1272w, https://substackcdn.com/image/fetch/$s_!cAJ0!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F146e73cb-f3d4-4d9b-bd83-06926d3f7bbb_1828x594.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!cAJ0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F146e73cb-f3d4-4d9b-bd83-06926d3f7bbb_1828x594.png" width="1456" height="473" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/146e73cb-f3d4-4d9b-bd83-06926d3f7bbb_1828x594.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:473,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:110933,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/169317196?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F146e73cb-f3d4-4d9b-bd83-06926d3f7bbb_1828x594.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!cAJ0!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F146e73cb-f3d4-4d9b-bd83-06926d3f7bbb_1828x594.png 424w, https://substackcdn.com/image/fetch/$s_!cAJ0!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F146e73cb-f3d4-4d9b-bd83-06926d3f7bbb_1828x594.png 848w, https://substackcdn.com/image/fetch/$s_!cAJ0!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F146e73cb-f3d4-4d9b-bd83-06926d3f7bbb_1828x594.png 1272w, https://substackcdn.com/image/fetch/$s_!cAJ0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F146e73cb-f3d4-4d9b-bd83-06926d3f7bbb_1828x594.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>Sample Scorecard Evaluation: PenTest+ vs PNPT</h3><h4>&#127919; Target Role: Junior Penetration Tester / Offensive Security Consultant</h4><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!wpL_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd84af2b3-b97a-4f85-b32e-132d6e4543bf_1460x634.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!wpL_!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd84af2b3-b97a-4f85-b32e-132d6e4543bf_1460x634.png 424w, https://substackcdn.com/image/fetch/$s_!wpL_!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd84af2b3-b97a-4f85-b32e-132d6e4543bf_1460x634.png 848w, https://substackcdn.com/image/fetch/$s_!wpL_!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd84af2b3-b97a-4f85-b32e-132d6e4543bf_1460x634.png 1272w, https://substackcdn.com/image/fetch/$s_!wpL_!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd84af2b3-b97a-4f85-b32e-132d6e4543bf_1460x634.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!wpL_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd84af2b3-b97a-4f85-b32e-132d6e4543bf_1460x634.png" width="1456" height="632" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d84af2b3-b97a-4f85-b32e-132d6e4543bf_1460x634.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:632,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:121166,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/169317196?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd84af2b3-b97a-4f85-b32e-132d6e4543bf_1460x634.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!wpL_!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd84af2b3-b97a-4f85-b32e-132d6e4543bf_1460x634.png 424w, https://substackcdn.com/image/fetch/$s_!wpL_!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd84af2b3-b97a-4f85-b32e-132d6e4543bf_1460x634.png 848w, https://substackcdn.com/image/fetch/$s_!wpL_!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd84af2b3-b97a-4f85-b32e-132d6e4543bf_1460x634.png 1272w, https://substackcdn.com/image/fetch/$s_!wpL_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd84af2b3-b97a-4f85-b32e-132d6e4543bf_1460x634.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>Total Score</strong></p><ul><li><p><strong>PenTest+:</strong> 3/12 &#8594; &#10060; Skip (Low value, not practical)</p></li><li><p><strong>PNPT:</strong> 12/12 &#8594; &#9989; Strong pick (Career-aligned, hands-on, and applicable)</p></li></ul><div><hr></div><h1>Quick, Opinionated Shortlists</h1><p><strong>If you&#8217;re heading into SOC / IR / Detection Engineering</strong></p><ul><li><p>BTL1, CCD, CDSA, PJSA, SAL1</p></li><li><p>Practical Malware Analysis tracks (INE/eLearnSecurity)</p></li><li><p>Build Purple team labs (SCYTHE, Atomic Red Team, DetectionLab, etc.) + writeups</p></li></ul><p><strong>If you want Offensive Security / Adversary Emulation</strong></p><ul><li><p>PNPT (strong ROI)</p></li><li><p>CPTS, CJSA, PT1</p></li><li><p>eJPT &#8594; eCPPT progression</p></li><li><p>OSCP/OSEP when you need to clear that bar for specific roles or teams</p></li></ul><p><strong>If you&#8217;re focused on Cloud Security (Blue &amp; Red)</strong></p><ul><li><p>Cloud Breach (AWS/Azure offensive)</p></li><li><p>Altered Security (Azure AD, Azure appsec)</p></li><li><p>Microsoft certs are now increasingly tied to real Azure credits and labs&#8212;use them in a <em>practical</em> way.</p></li></ul><p><strong>If you&#8217;re going DevSecOps / Platform Security / Supply Chain</strong></p><ul><li><p>Practical DevSecOps</p></li><li><p>Supplement with hands-on lab work: IaC scanning, SCA/SBOM pipelines, signing/verification, policy-as-code</p></li></ul><div><hr></div><h1>Common Traps (Skip These)</h1><ul><li><p><strong>Certs you can&#8217;t map to a role you actually want.</strong></p></li><li><p><strong>MCQ exams sold as &#8220;industry standard&#8221; with no lab component.</strong></p></li><li><p><strong>&#8220;I&#8217;ll just learn it now for later&#8221;</strong> with no maintenance plan.</p></li><li><p><strong>Choosing the name-brand test when a practical, cheaper option exists.</strong></p></li><li><p><strong>Paying for prestige over proof.</strong> Hiring managers care far more about what you can <strong>do</strong> and <strong>show</strong>.</p></li></ul><div><hr></div><h1>If You&#8217;re Still in School (WGU, bootcamps, etc.)</h1><p>Use those required certs to <strong>build a practical foundation</strong>, then pivot hard into hands&#8209;on paths:</p><ul><li><p>Treat every &#8220;theory-heavy&#8221; cert as a <strong>primer</strong>, not the finish line.</p></li><li><p>Immediately wrap practical labs, projects, or purple-team exercises around the content.</p></li><li><p>Publish what you learn: detection writeups, IR playbooks, Sigma rules, Terraform modules, attack simulation notes&#8230; <strong>make it visible.</strong></p></li></ul><div><hr></div><h1>Action Plan (Do This Today)</h1><ol><li><p><strong>Define your target role</strong> (title, team, and comp band).</p></li><li><p><strong>Collect 15&#8211;20 job descriptions</strong> and extract the common required skills/tools.</p></li><li><p><strong>List 3&#8211;5 certs you&#8217;re considering</strong> and run them through the scorecard.</p></li><li><p><strong>Pick one</strong> that clears your bar.</p></li><li><p><strong>Write a 4-week application plan</strong>: what you&#8217;ll build, tune, emulate, or publish using those skills.</p></li><li><p><strong>Ship the artifact</strong>. Talk about it publicly (GitHub, blog, Substack, LinkedIn, X).</p></li><li><p><strong>Rinse, refine, repeat.</strong></p></li></ol><div><hr></div><h2>My Final Take</h2><p>Certifications can be either rocket fuel or busywork disguised as progress. </p><p>The difference is <strong>intentionality</strong>. </p><p>If it doesn&#8217;t add real value to your path, isn&#8217;t practical, won&#8217;t be applied, and has a better alternative, you already know the move: <strong>don&#8217;t take it</strong>.</p><p>Be surgical. Be practical. </p><p>Go further, faster<strong>, and smartly</strong>.</p><div><hr></div><h1><strong>Cyberwox Resources</strong></h1><h4><strong>Resources for your career</strong></h4><p>&#128313;<a href="https://discord.gg.cyberwoxacademy/">Join the Cyberwox Academy Discord!!</a></p><p>&#128311; <a href="https://www.cyberstoriespodcast.com/podcast">Check out the episodes of the Cyberstories Podcast on your favorite platform</a></p><p>&#128313;<a href="https://daycyberwox.gumroad.com/l/cyberlearningframework">Cyberwox Cybersecurity Notion Templates for planning your career</a></p><p>&#128313;<a href="https://daycyberwox.gumroad.com/l/cybersecurityresume">Cyberwox Best Entry-Level Cybersecurity Resume Template</a></p><p>&#128313;<a href="https://www.linkedin.com/learning/introduction-to-aws-threat-detection/">Learn AWS Threat Detection with my LinkedIn Learning Course</a></p><div><hr></div><h1><strong>Closing</strong></h1><p>Once again, you made it this far :)</p><p>Feel free to reply, share your thoughts, or pass this on to someone who needs it.</p><p>Thanks for reading. If you'd like, you can subscribe and restack - it helps spread the word and encourages me to continue writing content. If not, I&#8217;ll see you around&#8230;somewhere on the internet!</p><div><hr></div><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/p/fastest-way-to-become-a-cloud-security?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share&amp;token=eyJ1c2VyX2lkIjoxNzI1NDA4MjcsInBvc3RfaWQiOjE2MjEwNzg2MiwiaWF0IjoxNzUwMDM2MzYwLCJleHAiOjE3NTI2MjgzNjAsImlzcyI6InB1Yi0xOTk2Mjk2Iiwic3ViIjoicG9zdC1yZWFjdGlvbiJ9.yefIOBQAgPrM20p1VQBblBYeHUOqudzpaRmbhfcKCa0&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading Cyberwox Unplugged! This post is public, so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/p/the-cybersecurity-certification-trap?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberwoxunplugged.com/p/the-cybersecurity-certification-trap?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div>]]></content:encoded></item><item><title><![CDATA[Do You Really Need the CompTIA A+ to Get Into Cybersecurity?]]></title><description><![CDATA[A personal reflection on why the CompTIA A+ can help but won&#8217;t define your cybersecurity career.]]></description><link>https://www.cyberwoxunplugged.com/p/do-you-really-need-the-comptia-a</link><guid isPermaLink="false">https://www.cyberwoxunplugged.com/p/do-you-really-need-the-comptia-a</guid><dc:creator><![CDATA[Day Johnson]]></dc:creator><pubDate>Mon, 25 Aug 2025 12:03:14 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!jq_S!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F906409cb-02e0-4094-b8a8-f3229cc6cbe6_1024x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>If you&#8217;re trying to break into cybersecurity, especially if you&#8217;re entirely new to the field, one of the first questions you&#8217;ve probably asked is: <em>Do I need the CompTIA A+?</em></p><p>I&#8217;ve been on both sides of this. </p><p>I failed the A+ twice, came back and passed, and even went on to complete the full CompTIA &#8220;trifecta&#8221; (A+, Network+, Security+). </p><p>Along the way, I discovered both the value <em>and</em> the limits of CompTIA A+ in a cybersecurity career.</p><p>Here&#8217;s my honest opinion based on my experience, not just what I read online.</p><div><hr></div><h1><strong>My Perspective</strong></h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!NLbQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b283989-d608-4188-a88c-97e7f1666d3b_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!NLbQ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b283989-d608-4188-a88c-97e7f1666d3b_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!NLbQ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b283989-d608-4188-a88c-97e7f1666d3b_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!NLbQ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b283989-d608-4188-a88c-97e7f1666d3b_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!NLbQ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b283989-d608-4188-a88c-97e7f1666d3b_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!NLbQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b283989-d608-4188-a88c-97e7f1666d3b_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6b283989-d608-4188-a88c-97e7f1666d3b_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Generated image&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Generated image" title="Generated image" srcset="https://substackcdn.com/image/fetch/$s_!NLbQ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b283989-d608-4188-a88c-97e7f1666d3b_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!NLbQ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b283989-d608-4188-a88c-97e7f1666d3b_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!NLbQ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b283989-d608-4188-a88c-97e7f1666d3b_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!NLbQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b283989-d608-4188-a88c-97e7f1666d3b_1024x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>When I first set out, I didn&#8217;t have any IT background. </p><p>No jobs, no internships, no professional experience. Just a freshman in college who was &#8220;tech savvy&#8221; but honestly had significant gaps in knowledge.</p><p>That&#8217;s where the <strong>CompTIA</strong> <strong>A+ became foundational</strong> for me. </p><p>It taught me the basics of hardware, software troubleshooting, virtualization, networking, and even a bit of security. </p><p>It gave me the vocabulary and confidence to start talking about IT in interviews and internships.</p><p>So yes, <strong>the CompTIA A+ was valuable as a learning tool</strong>. </p><p>It laid the groundwork for everything else: Network+, Security+, internships, and eventually, the career I have now.</p><div><hr></div><h1><strong>Counterarguments (And Why They&#8217;re True Too)</strong></h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6lzR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa17a5b40-c400-48b9-a402-5eabb667063b_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6lzR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa17a5b40-c400-48b9-a402-5eabb667063b_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!6lzR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa17a5b40-c400-48b9-a402-5eabb667063b_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!6lzR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa17a5b40-c400-48b9-a402-5eabb667063b_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!6lzR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa17a5b40-c400-48b9-a402-5eabb667063b_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6lzR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa17a5b40-c400-48b9-a402-5eabb667063b_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a17a5b40-c400-48b9-a402-5eabb667063b_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Generated image&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Generated image" title="Generated image" srcset="https://substackcdn.com/image/fetch/$s_!6lzR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa17a5b40-c400-48b9-a402-5eabb667063b_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!6lzR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa17a5b40-c400-48b9-a402-5eabb667063b_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!6lzR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa17a5b40-c400-48b9-a402-5eabb667063b_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!6lzR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa17a5b40-c400-48b9-a402-5eabb667063b_1024x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Here&#8217;s the reality:</p><ul><li><p><strong>You don&#8217;t </strong><em><strong>need</strong></em><strong> the CompTIA A+ to work in cybersecurity.</strong> Employers aren&#8217;t hiring security analysts because of an A+ certification. It won&#8217;t get your resume fast-tracked for a SOC, incident response, or any cybersecurity role.</p></li><li><p>Even for IT help desk jobs, the CompTIA A+ is <strong>less recognized now</strong> than it was a decade ago. Many employers don&#8217;t care about it at all.</p></li><li><p>If you&#8217;re already technical &#8212; maybe you&#8217;ve been tinkering with computers for years, are a hobbyist home labber, or you studied CS/IT  in school &#8212; the A+ will feel redundant. You could skip it and jump straight into Security+ or a cloud cert.</p></li></ul><p>So while it gave me the foundation I needed, I also tell people: <strong>don&#8217;t treat it as a mandatory step.</strong></p><div><hr></div><h2><strong>About Me</strong></h2><p>If you're new here, I'm Day, a Cybersecurity Engineer at Amazon. With five years in cybersecurity, my experience covers Detection Engineering, Cloud Security, Incident Response, Threat Hunting, and most recently, Threat Intelligence.</p><p>Before Amazon, I worked at Datadog as a cloud threat detection engineer, where I researched cloud threats and built detections for various cloud providers and SaaS applications.</p><p>I've worked my way up from SOC analyst roles, investigating everything from endpoint threats to cloud-based abuse, so I know exactly what it takes to break into this field.</p><p>I started, just like many of you, learning from scratch, asking questions, and figuring it out one step at a time. <strong>And now, I'm here to help you do the same.</strong></p><p>I was able to break into cybersecurity as early as my freshman year of college. I&#8217;ve secured several jobs and interviews before earning my college degree, and I&#8217;ve helped thousands of people achieve the same success on my various content channels and in my Discord Community.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iF0v!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" width="1456" height="570" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:570,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:188886,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/159067704?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F913f1923-04a0-4fe6-afb6-5e0fca6d78b1_2500x2500.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Join a vibrant cybersecurity community of over 6,500 people who are constantly engaging in conversations and supporting one another, covering topics from cybersecurity and college to certifications, resume assistance, and various non-professional interests like fitness, finance, anime, and other exciting subjects.</p><div><hr></div><h1><strong>My Advice</strong></h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!jq_S!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F906409cb-02e0-4094-b8a8-f3229cc6cbe6_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!jq_S!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F906409cb-02e0-4094-b8a8-f3229cc6cbe6_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!jq_S!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F906409cb-02e0-4094-b8a8-f3229cc6cbe6_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!jq_S!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F906409cb-02e0-4094-b8a8-f3229cc6cbe6_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!jq_S!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F906409cb-02e0-4094-b8a8-f3229cc6cbe6_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!jq_S!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F906409cb-02e0-4094-b8a8-f3229cc6cbe6_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/906409cb-02e0-4094-b8a8-f3229cc6cbe6_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Generated image&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Generated image" title="Generated image" srcset="https://substackcdn.com/image/fetch/$s_!jq_S!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F906409cb-02e0-4094-b8a8-f3229cc6cbe6_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!jq_S!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F906409cb-02e0-4094-b8a8-f3229cc6cbe6_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!jq_S!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F906409cb-02e0-4094-b8a8-f3229cc6cbe6_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!jq_S!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F906409cb-02e0-4094-b8a8-f3229cc6cbe6_1024x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Here&#8217;s what I&#8217;d recommend, based on living this journey myself:</p><ol><li><p><strong>Evaluate Your Starting Point.</strong></p><ul><li><p>If you&#8217;re brand new, non-technical, or lack confidence with computers, the A+ (or at least studying its materials) is a great launchpad.</p></li><li><p>If you already know how systems, networks, and troubleshooting work, skip it and go deeper.</p></li></ul></li><li><p><strong>Study the Materials Even If You Skip the Exam.</strong></p><ul><li><p>The objectives cover core IT fundamentals every cybersecurity pro should understand.</p></li><li><p>Read through them, watch Professor Messer, check Jason Dion&#8217;s practice tests &#8212; even if you don&#8217;t sit for the test, you&#8217;ll get the knowledge.</p></li></ul></li><li><p><strong>Don&#8217;t Let Certifications Define You.</strong></p><ul><li><p>I failed the A+ twice. What made the difference wasn&#8217;t a piece of paper &#8212; it was how I learned from failure, changed my study approach, and built discipline.</p></li><li><p>In interviews, my A+ alone didn&#8217;t land me internships. Selling myself, showing curiosity, and demonstrating what I learned mattered more than the cert itself.</p></li></ul></li><li><p><strong>Use A+ as a Stepping Stone.</strong></p><ul><li><p>If you do take it, use it as a bridge to Network+ and Security+. Networking, especially, will pay dividends in security analysis and investigations.</p></li></ul></li></ol><div><hr></div><h1><strong>Personal Experiences That Shaped My View</strong></h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!H6Iy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31ae777e-1540-48ae-8611-e4ba7586a4db_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!H6Iy!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31ae777e-1540-48ae-8611-e4ba7586a4db_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!H6Iy!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31ae777e-1540-48ae-8611-e4ba7586a4db_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!H6Iy!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31ae777e-1540-48ae-8611-e4ba7586a4db_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!H6Iy!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31ae777e-1540-48ae-8611-e4ba7586a4db_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!H6Iy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31ae777e-1540-48ae-8611-e4ba7586a4db_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/31ae777e-1540-48ae-8611-e4ba7586a4db_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Generated image&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Generated image" title="Generated image" srcset="https://substackcdn.com/image/fetch/$s_!H6Iy!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31ae777e-1540-48ae-8611-e4ba7586a4db_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!H6Iy!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31ae777e-1540-48ae-8611-e4ba7586a4db_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!H6Iy!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31ae777e-1540-48ae-8611-e4ba7586a4db_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!H6Iy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31ae777e-1540-48ae-8611-e4ba7586a4db_1024x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><strong>Failure is a Turning Point</strong></h3><p>My first attempts were a mess. </p><p>Studied for both Core 1 &amp; Core 2 at the same time. Used Cisco IT Essentials instead of the actual CompTIA A+ materials. Failed twice, right before my birthday. </p><p>I wanted to quit &#8212; but my dad encouraged me to try again. That encouragement was the catalyst for everything that came next.</p><h3><strong>The Power of Fundamentals</strong></h3><p>At my internship, I once had to analyze an IP address connection during an investigation. It clicked for me that without the networking fundamentals I picked up through A+ and later Network+, I would&#8217;ve struggled.</p><h3><strong>Not Just the Cert, But the Confidence</strong></h3><p>Even when employers didn&#8217;t care about my CompTIA A+, I cared. Because I knew I could hold my own in technical conversations, and that confidence carried me into bigger opportunities.</p><div><hr></div><h1><strong>Closing Reflection</strong></h1><p>So, do you need the CompTIA A+ to get into cybersecurity?</p><p><strong>No.</strong><br>But for the right person &#8212; especially if you&#8217;re brand new, uncertain, or starting from zero &#8212; it can be a powerful foundation.</p><p>The CompTIA A+ won&#8217;t define your career. What will define it is your willingness to learn, to adapt, to fail forward, and to keep going.</p><p>Because in this field, the certs don&#8217;t make you.<br>The journey does.</p><p>Stay tuned.</p><div><hr></div><h1>Cyberwox Resources on the CompTIA A+</h1><div id="youtube2-JUy3g_l_Wu0" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;JUy3g_l_Wu0&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/JUy3g_l_Wu0?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div id="youtube2-l4taKWNnHHQ" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;l4taKWNnHHQ&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/l4taKWNnHHQ?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div id="youtube2-LukCgEWu5I8" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;LukCgEWu5I8&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/LukCgEWu5I8?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div id="youtube2-IJrVyo1N724" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;IJrVyo1N724&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/IJrVyo1N724?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h3>&#128161; <strong>A Note of Gratitude</strong></h3><p>Before I sign off, a huge thank you to all of you who support <em>CYBERWOX Unplugged</em> as paid subscribers. You make it possible for me to keep creating honest, reflective content like this, rooted in my own journey. </p><p>I don&#8217;t take that support for granted.</p><p>If you&#8217;re still on the fence, consider joining. It helps sustain the work and gives you access to deeper subscriber-only posts, resources, and behind-the-scenes reflections.</p><p>This is just the beginning.</p><div><hr></div><p>Thanks for reading Cyberwox Unplugged! This post is public, so feel free to share it.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/p/do-you-really-need-the-comptia-a?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberwoxunplugged.com/p/do-you-really-need-the-comptia-a?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[How The Top 1% Of Cybersecurity Engineers Work ]]></title><description><![CDATA[The Mercenary Mindset.]]></description><link>https://www.cyberwoxunplugged.com/p/how-the-top-1-of-cybersecurity-engineers</link><guid isPermaLink="false">https://www.cyberwoxunplugged.com/p/how-the-top-1-of-cybersecurity-engineers</guid><dc:creator><![CDATA[Day Johnson]]></dc:creator><pubDate>Fri, 15 Aug 2025 12:03:10 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/167956652/14ab7325a5351d264ec66ea631d2f7e4.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>Some people wait to be told what to do. Others move like mercenaries, delivering value before anyone even realizes there&#8217;s a gap.</p><p>This isn&#8217;t about ego, titles, or theatrics. It&#8217;s about execution. About being the kind of operator who steps into chaos and leaves behind clarity through <strong>efficiency</strong>, and <strong>impact</strong>.</p><p>This is the mindset I&#8217;ve been reflecting on lately, particularly as I&#8217;ve transitioned through various roles and companies in my half-decade cybersecurity career.</p><p>We often discuss frameworks, titles, skills, and playbooks in cybersecurity. But sometimes, what separates good from great isn&#8217;t a fancy detection algorithm, a well-polished resume, or even years of experience.</p><p><strong>It&#8217;s how you move.</strong></p><p>I call it the <strong>mercenary mindset</strong>, but not in the &#8220;gun-for-hire&#8221; sense.</p><p>I&#8217;m also not talking about loyalty to the highest bidder or some kind of dark ops aesthetic.</p><p>I&#8217;m talking about the <strong>real mercenary archetype</strong>. The type of person who doesn&#8217;t wait for permission. They don&#8217;t stall for clarity. They don&#8217;t need a job description to act.</p><p>They step in.</p><p>Assess the landscape.</p><p>Adapt to the terrain.</p><p>Execute the mission with precision.</p><p>And most importantly, <strong>they leave things better than they found them</strong>.</p><div><hr></div><h1><strong>About Me</strong></h1><p>If you're new here, I'm Day, a Cybersecurity Engineer at Amazon. With five years in cybersecurity, my experience covers Detection Engineering, Cloud Security, Incident Response, Threat Hunting, and most recently, Threat Intelligence.</p><p>Before Amazon, I worked at Datadog as a cloud threat detection engineer, where I researched cloud threats and built detections for various cloud providers and SaaS applications.</p><p>I've worked my way up from various SOC analyst roles, investigating everything from endpoint threats to building detection systems for cloud-based abuse, so I know exactly what it takes to break into this field and make career advancements.</p><p>I started, just like many of you, learning from scratch, asking questions, and figuring it out one step at a time. <strong>And now, I'm here to help you do the same.</strong></p><p>If you want to stay up-to-date on the cybersecurity industry and everything technical and career-related, be sure to like and subscribe to the newsletter for more content like this.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iF0v!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" width="1456" height="570" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:570,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:188886,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/159067704?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F913f1923-04a0-4fe6-afb6-5e0fca6d78b1_2500x2500.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Join a vibrant cybersecurity community of over 6,500 people who are constantly engaging in conversations and supporting one another, covering topics from cybersecurity and college to certifications, resume assistance, and various non-professional interests like fitness, finance, anime, and other exciting subjects.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://discord.gg/cyberwoxacademy&quot;,&quot;text&quot;:&quot;Join Us!&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://discord.gg/cyberwoxacademy"><span>Join Us!</span></a></p><div><hr></div><h1><strong>The Mercenary Archetype</strong></h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!4aLU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbaa260da-074f-42c6-a3a0-64be0780f128_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!4aLU!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbaa260da-074f-42c6-a3a0-64be0780f128_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!4aLU!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbaa260da-074f-42c6-a3a0-64be0780f128_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!4aLU!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbaa260da-074f-42c6-a3a0-64be0780f128_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!4aLU!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbaa260da-074f-42c6-a3a0-64be0780f128_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!4aLU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbaa260da-074f-42c6-a3a0-64be0780f128_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/baa260da-074f-42c6-a3a0-64be0780f128_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Generated image&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Generated image" title="Generated image" srcset="https://substackcdn.com/image/fetch/$s_!4aLU!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbaa260da-074f-42c6-a3a0-64be0780f128_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!4aLU!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbaa260da-074f-42c6-a3a0-64be0780f128_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!4aLU!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbaa260da-074f-42c6-a3a0-64be0780f128_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!4aLU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbaa260da-074f-42c6-a3a0-64be0780f128_1024x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Historically, mercenaries have played pivotal roles in shaping outcomes. </p><p>This was not because they were the most powerful, but rather because they were efficient, decisive, and unencumbered by internal red tape.</p><p>Take <a href="https://en.wikipedia.org/wiki/Executive_Outcomes">Executive Outcomes</a>, for example, one of the most well-known private military companies of the 1990s. With a few hundred well-trained personnel and outdated equipment, they helped stabilize conflict zones and secure strategic resources that entire national armies had failed to manage.</p><p>Their success wasn&#8217;t rooted in scale. It was rooted in <strong>clarity of mission</strong> and <strong>precision of execution</strong>.</p><p>Now think about that through the lens of your cybersecurity career.</p><ul><li><p>How often do we see teams spin their wheels waiting for a Jira (or similar system) ticket to be resolved?</p></li><li><p>How many times do people hold off on building a solution because they haven&#8217;t been told to?</p></li><li><p>How many incident remediation tasks get delayed because no one wants to take ownership of the gray areas?</p></li></ul><p><strong>Mercenaries thrive in the gray</strong>. That&#8217;s where the impact is.</p><div><hr></div><h1>Personal Case Studies</h1><h2><strong>Case Study 1: How I Built and Deployed an IR Analysis Procedure in a Single Day</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!r6lg!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9beabff8-7c9b-4c4a-abcb-1224f7de36a6_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!r6lg!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9beabff8-7c9b-4c4a-abcb-1224f7de36a6_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!r6lg!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9beabff8-7c9b-4c4a-abcb-1224f7de36a6_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!r6lg!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9beabff8-7c9b-4c4a-abcb-1224f7de36a6_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!r6lg!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9beabff8-7c9b-4c4a-abcb-1224f7de36a6_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!r6lg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9beabff8-7c9b-4c4a-abcb-1224f7de36a6_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9beabff8-7c9b-4c4a-abcb-1224f7de36a6_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Generated image&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Generated image" title="Generated image" srcset="https://substackcdn.com/image/fetch/$s_!r6lg!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9beabff8-7c9b-4c4a-abcb-1224f7de36a6_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!r6lg!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9beabff8-7c9b-4c4a-abcb-1224f7de36a6_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!r6lg!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9beabff8-7c9b-4c4a-abcb-1224f7de36a6_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!r6lg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9beabff8-7c9b-4c4a-abcb-1224f7de36a6_1536x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Not long ago, while I was still working as a Security Engineer on my day job&#8217;s incident response team, a new detection triggered. </p><p>It was built recently and triggered on suspicious behavior, which was something worth investigating. </p><p>But as I looked into it, I quickly realized there was a problem. There was no documented response process for this alert&#8212;nothing for analysts to follow. </p><p>No clear runbook.</p><p>Just ambiguity.</p><p>Guess what? We love ambiguity over here.</p><p>But that ambiguity had a cost.</p><p>Analysts were escalating alerts like this to engineers because they weren&#8217;t confident in the next steps. The result was longer investigation times, duplicated effort, and a slow, inconsistent feedback loop.</p><p>Now I could&#8217;ve waited. </p><p>Sent a Slack message about it. </p><p>Logged a ticket. </p><p>Mentioned it in a weekly sync.</p><p>But that&#8217;s not how mercenaries move.</p><p>While actively working on the escalated alert, I created the missing process in real time. I defined the triage flow, codified the expected behaviors, and scoped it not just to that one alert, but to an entire class of similar alerts. That instantly multiplied the value of the effort.</p><p>Since the investigation involved decoding tokens, I also wrote a lightweight Python script to automate that decoding. It was designed to work within our data confidentiality boundaries while saving analysts significant time.</p><p>By the end of the same day, I had:</p><ul><li><p>Investigated and closed the alert</p></li><li><p>Created a repeatable response framework for similar detections</p></li><li><p>Built a Python tool that the team could use going forward</p></li><li><p>Reduced time-to-resolution for all future alerts in that class</p></li></ul><p>That wasn&#8217;t a heroic moment. That was a <strong>mercenary moment</strong>. </p><p>A single day of focused, strategic work that scaled our team&#8217;s capability in a measurable way.</p><h2><strong>Case Study 2: Dropped into New Terrain and Building from Scratch</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!WG_8!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cd02f9c-318d-40e2-a435-cce81224c46d_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!WG_8!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cd02f9c-318d-40e2-a435-cce81224c46d_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!WG_8!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cd02f9c-318d-40e2-a435-cce81224c46d_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!WG_8!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cd02f9c-318d-40e2-a435-cce81224c46d_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!WG_8!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cd02f9c-318d-40e2-a435-cce81224c46d_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!WG_8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cd02f9c-318d-40e2-a435-cce81224c46d_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5cd02f9c-318d-40e2-a435-cce81224c46d_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Generated image&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Generated image" title="Generated image" srcset="https://substackcdn.com/image/fetch/$s_!WG_8!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cd02f9c-318d-40e2-a435-cce81224c46d_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!WG_8!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cd02f9c-318d-40e2-a435-cce81224c46d_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!WG_8!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cd02f9c-318d-40e2-a435-cce81224c46d_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!WG_8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cd02f9c-318d-40e2-a435-cce81224c46d_1024x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In my previous role as a Cloud Threat Detection Engineer, I primarily worked on cloud infrastructure detections across AWS, Azure, and GCP. </p><p>That was my zone. I had a strong foundation there.</p><p>However, I was then temporarily reassigned to a team focused on cloud workload detection. Think Linux systems, container activity, and Kubernetes clusters. </p><p>This was less familiar territory.</p><p>I could have hesitated. </p><p>Could&#8217;ve waited to get trained up. </p><p>But mercenaries don&#8217;t (can&#8217;t) ask the terrain to change. They <strong>adapt to it</strong>.</p><p>Within one quarter, I developed a structured onboarding framework for new engineers, enabling them to write agent-based and rule-based detections for cloud workloads. </p><p>I mapped out common attacker behaviors, data sources, and detection strategies. I didn&#8217;t just ramp myself up. I reduced the ramp-up time for everyone who came after me.</p><p>Then I was handed a noisy detection for Network Utilities Executed in a Container. It triggered constantly. False positives everywhere. Most engineers would <em>suppress</em> it through exclusion-based detection filters.</p><p>Instead, I decomposed it into multiple high-fidelity detections.</p><ul><li><p>One focused on curl or wget used for data exfiltration</p></li><li><p>Another focused on command-line requests containing suspicious URIs</p></li></ul><p>This approach eventually surfaced real-world threats, including a live PyPI supply chain attack, which abused the curl utility to send data to an attacker-controlled infrastructure.</p><p>That detection wouldn&#8217;t have been possible without decomposing the original alert into something sharper and more intentional.</p><p>I documented the full methodology. I turned that one fix into a repeatable process that others could apply across other detections.</p><p>I wasn&#8217;t the loudest person in the room. I wasn&#8217;t the most senior engineer (in fact, I was the most junior engineer).</p><p>But I delivered the signal where there was noise.</p><p>That&#8217;s <strong>mercenary execution</strong>.</p><div><hr></div><h1>Mercenary Execution</h1><p><strong>Sometimes, Mercenaries Move Fast Because They Love the Fight</strong></p><p>Here&#8217;s the part we don&#8217;t talk about enough.</p><p>Some people move like mercenaries, not because they&#8217;re forced to. </p><p>Not because they want recognition or the money. </p><p>Not because they&#8217;re trying to impress someone.</p><p>Some people move like mercenaries because <strong>they love the work</strong>.</p><p>They love the hunt. The build. The pressure. The challenge of untangling complex security problems and delivering sharp, effective solutions.</p><p>That&#8217;s me. And if you&#8217;re reading this, it&#8217;s probably you, too.</p><p>The reason I could build a runbook, script, and close an investigation all in one day wasn&#8217;t just because it needed to be done. It was because I enjoyed the challenge. </p><p>I liked the problem. </p><p>I was <strong>locked in</strong>.</p><p>When I stepped into an unfamiliar domain, such as Linux and container detection engineering, it wasn&#8217;t just about adapting. It was about embracing the opportunity to grow and build something useful. </p><p>I liked being in the arena. I enjoyed making the messy stuff make sense.</p><p><strong>When you love the work, you don&#8217;t wait for direction. You move.</strong></p><ul><li><p>You build things no one asked for because you know they&#8217;re needed.</p></li><li><p>You care deeply about getting it right, not for applause, but because you find joy in the process.</p></li></ul><p><strong>Loving the work is the cheat code</strong>. It&#8217;s the engine behind sharp execution, fast iteration, and long-term growth.</p><p>It&#8217;s what turns &#8220;extra work&#8221; into meaningful craft.</p><div><hr></div><h1><strong>The Mercenary Playbook</strong></h1><p>This mindset isn&#8217;t about breaking rules or ignoring process.</p><p>It&#8217;s about having a <a href="https://www.amazon.jobs/content/en/our-workplace/leadership-principles">bias toward action</a> and a habit of excellence.</p><p>It looks like:</p><ul><li><p>Prioritizing outcomes over checkboxes</p></li><li><p>Owning the gray areas no one else wants to touch</p></li><li><p>Building tools, docs, and workflows that outlive your tenure</p></li><li><p>Learning just enough to ship, and then learning some more to keep iterating</p></li><li><p>Executing with precision, not waiting for someone to tell you to</p></li></ul><p><strong>Ask Yourself</strong></p><ul><li><p>What&#8217;s a broken process or detection flow that you could fix this week?</p></li><li><p>What uncomfortable space have you been avoiding because it&#8217;s unfamiliar?</p></li><li><p>What would happen if you stopped waiting for permission and started executing with conviction?</p></li></ul><h2><strong>Final Thoughts</strong></h2><p>The mercenary mindset is not about ego or chaos.</p><p>It&#8217;s about precise, repeatable, decisive execution.</p><p>It&#8217;s about leaving things better than you found them.</p><p>And it&#8217;s about loving the mission enough to keep showing up, even when no one&#8217;s watching.</p><p>You don&#8217;t need to be the most senior. You don&#8217;t need a fancy title.</p><p>You need to be the one who <strong>gets things done</strong>.</p><div><hr></div><h1><strong>Cyberwox Resources</strong></h1><h4><strong>Resources for your career</strong></h4><p>&#128313;<a href="https://discord.gg.cyberwoxacademy/">Join the Cyberwox Academy Discord!!</a></p><p>&#128311; <a href="https://www.cyberstoriespodcast.com/podcast">Check out the episodes of the Cyberstories Podcast on your favorite platform</a></p><p>&#128313;<a href="https://daycyberwox.gumroad.com/l/cyberlearningframework">Cyberwox Cybersecurity Notion Templates for planning your career</a></p><p>&#128313;<a href="https://daycyberwox.gumroad.com/l/cybersecurityresume">Cyberwox Best Entry-Level Cybersecurity Resume Template</a></p><p>&#128313;<a href="https://www.linkedin.com/learning/introduction-to-aws-threat-detection/">Learn AWS Threat Detection with my LinkedIn Learning Course</a></p><div><hr></div><h1><strong>Closing</strong></h1><p>Once again, you made it this far :)</p><p>Feel free to reply, share your thoughts, or pass this on to someone who needs it.</p><p>Thanks for reading. If you'd like, you can subscribe and restack - it helps spread the word and encourages me to continue writing content. If not, I&#8217;ll see you around&#8230;somewhere on the internet!</p><div><hr></div><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/p/fastest-way-to-become-a-cloud-security?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share&amp;token=eyJ1c2VyX2lkIjoxNzI1NDA4MjcsInBvc3RfaWQiOjE2MjEwNzg2MiwiaWF0IjoxNzUwMDM2MzYwLCJleHAiOjE3NTI2MjgzNjAsImlzcyI6InB1Yi0xOTk2Mjk2Iiwic3ViIjoicG9zdC1yZWFjdGlvbiJ9.yefIOBQAgPrM20p1VQBblBYeHUOqudzpaRmbhfcKCa0&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading Cyberwox Unplugged! This post is public, so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/p/how-the-top-1-of-cybersecurity-engineers?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberwoxunplugged.com/p/how-the-top-1-of-cybersecurity-engineers?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div>]]></content:encoded></item><item><title><![CDATA[Getting Your First Cybersecurity Job - College, Certifications & Work Experience]]></title><description><![CDATA[How To Leverage The 4 Levels of Cybersecurity Career Experience.]]></description><link>https://www.cyberwoxunplugged.com/p/getting-your-first-cybersecurity</link><guid isPermaLink="false">https://www.cyberwoxunplugged.com/p/getting-your-first-cybersecurity</guid><dc:creator><![CDATA[Day Johnson]]></dc:creator><pubDate>Sat, 26 Jul 2025 15:52:48 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/169311039/8a75fbadde9bdd727b7b1ff630cc5f8d.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>Getting your first cybersecurity job will undoubtedly be the hardest of all the cybersecurity jobs you will get throughout your career.</p><p>I've applied to hundreds, if not thousands, of jobs so far, and I certainly didn't get most of them; in fact, I was rejected from most of them, which is entirely normal.</p><p>Most of the jobs I&#8217;ve had have been obtained through referrals and my network, rather than through applications, but that&#8217;s a topic for another day.</p><p>The thing is this: with each rejection, I learned something new, like an area of interviewing that I could improve upon or a skill set that I was missing, and with each application, I became a better and better candidate, landing various jobs, including my current one as a Security Engineer at Amazon.</p><div><hr></div><h1><strong>About Me</strong></h1><p>If you're new here, I'm Day, a Cybersecurity Engineer at Amazon. With five years in cybersecurity, my experience covers Detection Engineering, Cloud Security, Incident Response, Threat Hunting, and most recently, Threat Intelligence.</p><p>Before Amazon, I worked at Datadog as a cloud threat detection engineer, where I researched cloud threats and built detections for various cloud providers and SaaS applications.</p><p>I've worked my way up from various SOC analyst roles, investigating everything from endpoint threats to building detection systems for cloud-based abuse, so I know exactly what it takes to break into this field and make career advancements.</p><p>I started, just like many of you, learning from scratch, asking questions, and figuring it out one step at a time. <strong>And now, I'm here to help you do the same.</strong></p><p>If you want to stay up-to-date on the cybersecurity industry and everything technical and career-related, be sure to like and subscribe to the newsletter for more content like this.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iF0v!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" width="1456" height="570" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:570,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:188886,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/159067704?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F913f1923-04a0-4fe6-afb6-5e0fca6d78b1_2500x2500.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Join a vibrant cybersecurity community of over 6,000 people who are constantly engaging in conversations and supporting one another, covering topics from cybersecurity and college to certifications, resume assistance, and various non-professional interests like fitness, finance, anime, and other exciting subjects.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://discord.gg/cyberwoxacademy&quot;,&quot;text&quot;:&quot;Join Us!&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://discord.gg/cyberwoxacademy"><span>Join Us!</span></a></p><div><hr></div><h1><strong>My Personal Experience and Advice</strong></h1><p>I'd like to start by sharing with you my experience of applying to a bunch of jobs, combined with my years of experience working in the cybersecurity industry and exposure to lots of colleagues, recruiters, and hiring managers, so that I can give you my take on how you should apply for cybersecurity jobs, depending on how much relevant experience you have.</p><p>For each stage, I'll focus solely on the most critical aspects, such as having a strong resume, an irresistible portfolio, the right technical and problem-solving skills, and an optimized LinkedIn profile, as these will serve as a good baseline to start from.</p><p>That&#8217;s when your career starts to gain direction.</p><p><code>Please note that I use 'Stage' and 'Level' interchangeably for the remainder of this newsletter.</code></p><h2><strong>Level One: No Relevant Experience and No University Degree</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!60EL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1e942c6-ae94-45b8-8574-c233d5093f4b_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!60EL!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1e942c6-ae94-45b8-8574-c233d5093f4b_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!60EL!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1e942c6-ae94-45b8-8574-c233d5093f4b_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!60EL!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1e942c6-ae94-45b8-8574-c233d5093f4b_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!60EL!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1e942c6-ae94-45b8-8574-c233d5093f4b_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!60EL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1e942c6-ae94-45b8-8574-c233d5093f4b_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b1e942c6-ae94-45b8-8574-c233d5093f4b_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Generated image&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Generated image" title="Generated image" srcset="https://substackcdn.com/image/fetch/$s_!60EL!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1e942c6-ae94-45b8-8574-c233d5093f4b_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!60EL!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1e942c6-ae94-45b8-8574-c233d5093f4b_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!60EL!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1e942c6-ae94-45b8-8574-c233d5093f4b_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!60EL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1e942c6-ae94-45b8-8574-c233d5093f4b_1024x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Let's start with Stage One, where you have no relevant experience, no university degree, and no cybersecurity certification.</p><p>I'm not going to lie; this is a very challenging starting position, but if you're truly determined to become a cybersecurity professional, there are several steps you can take to achieve your goal.</p><p>Your number one priority should be to gain hands-on, relevant experience. </p><p>Depending on your age, I recommend pursuing different activities.</p><p>Say, if you're in high school, and you don't want to go to or cannot go to college for whatever reason, you could apply for apprenticeships or training programs available at your school. </p><p>These programs are typically designed for students nearing the end of high school, such as those in 11th or 12th grade, or for those who have recently graduated from high school. Most large corporations offer similar programs.</p><p>The names of these programs might differ by country, state, or the program itself; they might be called apprenticeships or training programs, but the idea is the same:  </p><ul><li><p>To allow you to develop your skills</p></li><li><p>Get real-life experience</p></li><li><p>Get paid enough at the same time</p></li></ul><p>Even if you don't go for a specific cybersecurity apprenticeship program, as long as you work with technology, systems, or networks as part of the role, you should be fine.</p><p>You could use these programs as a stepping stone to accelerate your journey to become a full-time cybersecurity professional at a very young age.</p><p>Now, if you're not in high school and you've been stuck in another job that you don't like and are super interested in data analytics, I'd recommend focusing on </p><ul><li><p>Learning the technical skills required</p></li><li><p>Getting well-known and knowledge-dense certifications</p></li><li><p>Building a strong portfolio to showcase your skills</p></li><li><p>Writing a great resume</p></li><li><p>Optimizing your LinkedIn profile (more on this later in the newsletter).</p></li></ul><p>I&#8217;ve already created video guides on how to optimize your LinkedIn profile and write a resume, as well as various cybersecurity portfolio projects, where I go through everything in detail. </p><div id="youtube2--Oz8QFVaAg0" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;-Oz8QFVaAg0&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/-Oz8QFVaAg0?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div id="youtube2-JMRCGh5xAtg" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;JMRCGh5xAtg&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/JMRCGh5xAtg?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>However, as a quick summary, I'd start by learning the basics through the CompTIA Trifecta curriculum, then pursue a program like the <a href="https://imp.i384100.net/B0Kz3J">Google Cybersecurity Certificate</a> or <a href="https://imp.i384100.net/baPM4v">Microsoft Cybersecurity Certificate</a>, and finally decide on the path you want to take.</p><p>You can choose either the Offensive or Defensive side of Cybersecurity. Then, I recommend completing labs, projects, and certifications to reinforce this. </p><p>You can also learn a programming language of your choice. I'd personally recommend Python.</p><p>In terms of certifications, I can primarily speak to defensive ones, so you can opt for well-known ones, such as the BTL1 from Security Blue Team, the CCD from CyberDefenders, or the CDSA from HackTheBox.</p><p><a href="https://www.youtube.com/playlist?list=PLDqMNdDvMsRkA4hm81vcnyVKhfToAs6oY">I&#8217;ve made several videos about these certifications on my channel</a>.</p><p>For offensive security, based on a conversation with my friend <a href="https://www.linkedin.com/in/tadi-kadango">Tadi</a>, who&#8217;s an Offensive Security Engineer, you can go for certifications like the eJPT from eLearn Security, the PNPT from TCM Security, or the OSCP from Offensive Security. </p><p>You can watch more about how he got into offensive security, just like me, without a college degree.</p><div id="youtube2-uBs_fdib5Oc" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;uBs_fdib5Oc&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/uBs_fdib5Oc?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>I have already put together a cybersecurity learning framework that you can review at the end of this newsletter.</p><p>I've personally gone through everything at this stage because I got into cybersecurity as a college freshman without a degree, so I can relate to this, and I believe others can too. If you're currently teaching yourself cybersecurity while in college or another situation, feel free to share your feedback in the comments below. </p><p>I'm sure we'd all appreciate hearing your thoughts and insights.</p><h2><strong>Level Two: No Relevant Experience, But Have a University Degree</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!808R!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1978c7ca-a52e-4f4a-889a-e9c4dfe5cd6c_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!808R!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1978c7ca-a52e-4f4a-889a-e9c4dfe5cd6c_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!808R!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1978c7ca-a52e-4f4a-889a-e9c4dfe5cd6c_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!808R!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1978c7ca-a52e-4f4a-889a-e9c4dfe5cd6c_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!808R!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1978c7ca-a52e-4f4a-889a-e9c4dfe5cd6c_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!808R!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1978c7ca-a52e-4f4a-889a-e9c4dfe5cd6c_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1978c7ca-a52e-4f4a-889a-e9c4dfe5cd6c_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Generated image&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Generated image" title="Generated image" srcset="https://substackcdn.com/image/fetch/$s_!808R!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1978c7ca-a52e-4f4a-889a-e9c4dfe5cd6c_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!808R!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1978c7ca-a52e-4f4a-889a-e9c4dfe5cd6c_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!808R!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1978c7ca-a52e-4f4a-889a-e9c4dfe5cd6c_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!808R!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1978c7ca-a52e-4f4a-889a-e9c4dfe5cd6c_1024x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Moving on to stage two, where you still lack relevant experience but have a college degree. Here, depending on whether you just graduated, are about to graduate, or graduated over three years ago, I would approach applying for jobs differently. </p><p>If you're about to graduate or are a recent graduate, focus on applying to graduate job programs designed for those in their final year of higher education or recent graduates. </p><p>While you probably won't find a cybersecurity-specific graduate program, getting into a program that helps you develop technical skills would be ideal. </p><p>I know several people who transitioned into cybersecurity this way; it often makes the process easier. </p><p>Graduate job programs are beneficial because they typically involve placements lasting six to twelve months and include rotations that provide valuable experience. This allows you to work in various teams and departments, helping you determine what you want to do by learning what you don't want to do. </p><p>If you graduated a while ago, pursued something else, traveled, or life led you in a different direction, and now you want to pursue a career in cybersecurity, I recommend focusing on the cybersecurity roadmap, your resume, portfolio, and certifications outlined in Stage One. </p><p>Also, highlight your degree, especially if you studied relevant fields such as computer science, cybersecurity, IT, or Information Systems, or took courses related to cybersecurity.</p><h2><strong>Level Three: Some Relevant Experience</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!1eYa!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F427fcffb-862b-4a23-a7bd-eee8a057abef_1024x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!1eYa!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F427fcffb-862b-4a23-a7bd-eee8a057abef_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!1eYa!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F427fcffb-862b-4a23-a7bd-eee8a057abef_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!1eYa!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F427fcffb-862b-4a23-a7bd-eee8a057abef_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!1eYa!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F427fcffb-862b-4a23-a7bd-eee8a057abef_1024x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!1eYa!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F427fcffb-862b-4a23-a7bd-eee8a057abef_1024x1536.png" width="1024" height="1536" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/427fcffb-862b-4a23-a7bd-eee8a057abef_1024x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Generated image&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Generated image" title="Generated image" srcset="https://substackcdn.com/image/fetch/$s_!1eYa!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F427fcffb-862b-4a23-a7bd-eee8a057abef_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!1eYa!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F427fcffb-862b-4a23-a7bd-eee8a057abef_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!1eYa!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F427fcffb-862b-4a23-a7bd-eee8a057abef_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!1eYa!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F427fcffb-862b-4a23-a7bd-eee8a057abef_1024x1536.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Let's move on to stage three, where you have some relevant job experience. </p><p>For example, in your current role, you handle Identity and Access Management and work with endpoints or vulnerability scanners daily, or you might be involved in governance, compliance, or similar areas. </p><p>You may not be performing advanced cybersecurity tasks, but you're actively working within the security field. </p><p>For instance, if you're a systems administrator managing user access controls, your duties may differ from those of a cybersecurity analyst; however, you still utilize tools to manage user privileges and create reports for IT meetings and presentations. </p><p>This is valuable experience to highlight at the top of your resume. </p><p>However, since you're applying for a cybersecurity role, emphasize the security aspects of your work that support system integrity rather than just your general IT skills. </p><p>Network management skills are essential and necessary in cybersecurity; however, since they are not the primary focus for recruiters and hiring managers, don't place them at the top of your resume. </p><p>Instead, showcase how well you understand the security implications of user permissions and how effectively you can communicate security threats using data to a non-technical audience, rather than your overall communication skills or IT reporting abilities.</p><h2><strong>Level Four: Plenty of Relevant Experience</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!noYb!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc71ba4f0-db56-47c7-aa54-4d3c4516d20e_1024x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!noYb!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc71ba4f0-db56-47c7-aa54-4d3c4516d20e_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!noYb!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc71ba4f0-db56-47c7-aa54-4d3c4516d20e_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!noYb!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc71ba4f0-db56-47c7-aa54-4d3c4516d20e_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!noYb!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc71ba4f0-db56-47c7-aa54-4d3c4516d20e_1024x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!noYb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc71ba4f0-db56-47c7-aa54-4d3c4516d20e_1024x1536.png" width="1024" height="1536" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c71ba4f0-db56-47c7-aa54-4d3c4516d20e_1024x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Generated image&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Generated image" title="Generated image" srcset="https://substackcdn.com/image/fetch/$s_!noYb!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc71ba4f0-db56-47c7-aa54-4d3c4516d20e_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!noYb!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc71ba4f0-db56-47c7-aa54-4d3c4516d20e_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!noYb!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc71ba4f0-db56-47c7-aa54-4d3c4516d20e_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!noYb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc71ba4f0-db56-47c7-aa54-4d3c4516d20e_1024x1536.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Finally, level four, where you have substantial relevant experience and are looking to transition into cybersecurity by applying the skills you've gained throughout your career. </p><p>Let's use a specific scenario, based on personal experience, to demonstrate how you can apply your existing skills to cybersecurity. I</p><p> I have coached someone who worked as a systems administrator, managing various systems, networks, and security protocols daily. </p><p>Their focus was on identifying potential vulnerabilities in the network, managing access controls, ensuring security protocols were in place, and reviewing network packet captures using Wireshark for analysis. </p><p>Although the role was not explicitly cybersecurity-named, the skills they developed over the years were highly applicable to cybersecurity tasks, such as reviewing system logs for anomalies or intrusions, implementing security measures, and developing strategies to mitigate threats. </p><p>If you're in a similar position where your skills are transferable to cybersecurity, I would highlight this relevant work experience at the top of your resume.</p><div><hr></div><h1><strong>Concluding Advice and Encouragement</strong></h1><p>Now, this is probably the most crucial advice, whether you have no experience or a lot, it's not to give up. </p><p>It may sound clich&#233;, but the difference between successful and less successful people isn't really their ability to succeed; it's their ability to bounce back from defeat, failures, and rejections, to work hard, and to improve and grow. </p><p>I&#8217;ve been rejected over a hundred times, maybe even over a thousand, and the first rejection really hurt, so did the second, the tenth, and the hundredth. </p><p>Of course, these rejections affected me; it was a sad, frustrating, and discouraging experience. </p><p>I thought, "This is not fair; I'm clearly doing my best as an entry-level candidate. I've got the certificates, the projects, everything," but that was definitely the wrong mindset. </p><p>The moment I stopped dwelling on the rejections and started analyzing why I was rejected and how I could improve so it wouldn't happen again, everything changed. </p><p>I focused, pushed through, and worked tirelessly. It's this work ethic, the countless hours of learning, the days spent alone in my room, forgoing pleasures, building and sharpening my skills, that landed me my job and helped me grow quickly. </p><p>Don't dwell on the past; live in the present, and focus on the future. Another thing I&#8217;ve learned is to stop comparing myself to others; I'm just trying to do my absolute best and be a good person. </p><p>Everything I've achieved since leaving Nigeria at age 14 has come through my hard work and the grace of my Lord and Savior, Jesus Christ, and I am truly proud of it. </p><p>I hope you can take inspiration from my experience and continue moving forward.</p><p>Remember, it's not success that defines you. It's your ability to bounce back from failures that truly shapes who you are.</p><h1><strong>Recent Content</strong></h1><p><em>A few publications I&#8217;ve released recently</em>.</p><h2><strong>Building A Cyber Threat Intelligence Career with Nigel Boston | EP 26</strong></h2><p>Chatting with Nigel Boston, who is a Senior Cyber Threat Intelligence Professional. Nigel has built and led threat intelligence programs that reduce incident response times, operationalize threat intelligence, and automate workflows to help teams focus on what matters: staying ahead of the threat curve.</p><p>In this episode, we discuss how Nigel discovered cyber threat intelligence and carved a path into the field, what core security skills make a difference in Cyber Threat Intelligence, and how threat intelligence intersects with detection engineering, cloud security, and even AI.</p><p>We also dive into the future of threat intelligence, the rise of actionable intelligence, and his new course, Cyber Threat Intelligence Fundamentals, with Ellington Cyber Academy (ECA), which is a game-changer for anyone looking to break into the space.</p><p>We&#8217;ve also had Kenneth, the founder of ECA, in EP 10, so definitely be sure to check that out.</p><p>Whether you're new to cybersecurity or looking to elevate your threat intelligence, this conversation is packed with clarity, strategy, and real-world wisdom.</p><p>Quick side note: This episode was filmed in November 2024, so you can expect to see me with shorter hair.</p><div id="youtube2-FhxvCaArrpg" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;FhxvCaArrpg&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/FhxvCaArrpg?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:167957780,&quot;url&quot;:&quot;https://www.cyberstoriespodcast.com/p/cyber-threat-intelligence-with-nigel-33f&quot;,&quot;publication_id&quot;:2973795,&quot;publication_name&quot;:&quot;Cyber Stories Podcast&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!Y3kp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00a8c60c-50a7-4a5b-a9fb-49554d9197e8_1280x1280.png&quot;,&quot;title&quot;:&quot;Cyber Threat Intelligence with Nigel Boston | EP. 26&quot;,&quot;truncated_body_text&quot;:&quot;Chatting with Nigel Boston, who is a Senior Cyber Threat Intelligence Professional. Nigel has built and led threat intelligence programs that reduce incident response times, operationalize threat intelligence, and automate workflows to help teams focus on what really matters: staying ahead of the threat curve.&quot;,&quot;date&quot;:&quot;2025-07-04T16:34:00.000Z&quot;,&quot;like_count&quot;:0,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:172540827,&quot;name&quot;:&quot;Day Johnson&quot;,&quot;handle&quot;:&quot;cyberwox&quot;,&quot;previous_name&quot;:null,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F320cfa44-ac32-40b3-8e06-97497673fd1f_4096x4096.jpeg&quot;,&quot;bio&quot;:&quot;&#10013;&#65039; | Cybersecurity Engineer @Amazon (Ex-Datadog &amp; Optiv). Building a fulfilling cybersecurity engineering career.&quot;,&quot;profile_set_up_at&quot;:&quot;2023-10-02T06:56:32.769Z&quot;,&quot;reader_installed_at&quot;:&quot;2023-10-31T20:35:37.346Z&quot;,&quot;publicationUsers&quot;:[{&quot;id&quot;:1994687,&quot;user_id&quot;:172540827,&quot;publication_id&quot;:1996296,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:true,&quot;publication&quot;:{&quot;id&quot;:1996296,&quot;name&quot;:&quot;Cyberwox Unplugged&quot;,&quot;subdomain&quot;:&quot;cyberwox&quot;,&quot;custom_domain&quot;:&quot;www.cyberwoxunplugged.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Sharing my cybersecurity engineering career learnings with anecdotes from life.&quot;,&quot;logo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8f98062e-b3db-4b1d-9b38-1525ae2212c9_1280x1280.png&quot;,&quot;author_id&quot;:172540827,&quot;primary_user_id&quot;:172540827,&quot;theme_var_background_pop&quot;:&quot;#9A6600&quot;,&quot;created_at&quot;:&quot;2023-10-02T06:56:50.705Z&quot;,&quot;email_from_name&quot;:&quot;Day Johnson from CYBERWOX&quot;,&quot;copyright&quot;:&quot;Dayspring Johnson&quot;,&quot;founding_plan_name&quot;:&quot;Founding Member&quot;,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false,&quot;payments_state&quot;:&quot;enabled&quot;,&quot;language&quot;:null,&quot;explicit&quot;:false,&quot;homepage_type&quot;:&quot;newspaper&quot;,&quot;is_personal_mode&quot;:false}},{&quot;id&quot;:3024612,&quot;user_id&quot;:172540827,&quot;publication_id&quot;:2973795,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:2973795,&quot;name&quot;:&quot;Cyber Stories Podcast&quot;,&quot;subdomain&quot;:&quot;cyberstoriespodcast&quot;,&quot;custom_domain&quot;:&quot;www.cyberstoriespodcast.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Conversations with Tech &amp; Cybersecurity Professionals from diverse backgrounds, experiences, and points of view on building a successful career.&quot;,&quot;logo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/00a8c60c-50a7-4a5b-a9fb-49554d9197e8_1280x1280.png&quot;,&quot;author_id&quot;:172540827,&quot;primary_user_id&quot;:null,&quot;theme_var_background_pop&quot;:&quot;#FF6719&quot;,&quot;created_at&quot;:&quot;2024-09-04T05:36:02.914Z&quot;,&quot;email_from_name&quot;:&quot;Day Johnson from CYBERWOX&quot;,&quot;copyright&quot;:&quot;Day Johnson&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false,&quot;payments_state&quot;:&quot;disabled&quot;,&quot;language&quot;:null,&quot;explicit&quot;:false,&quot;homepage_type&quot;:&quot;newspaper&quot;,&quot;is_personal_mode&quot;:false}}],&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:&quot;podcast&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://www.cyberstoriespodcast.com/p/cyber-threat-intelligence-with-nigel-33f?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!Y3kp!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00a8c60c-50a7-4a5b-a9fb-49554d9197e8_1280x1280.png" loading="lazy"><span class="embedded-post-publication-name">Cyber Stories Podcast</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title-icon"><svg width="19" height="19" viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg">
  <path d="M3 18V12C3 9.61305 3.94821 7.32387 5.63604 5.63604C7.32387 3.94821 9.61305 3 12 3C14.3869 3 16.6761 3.94821 18.364 5.63604C20.0518 7.32387 21 9.61305 21 12V18" stroke-linecap="round" stroke-linejoin="round"></path>
  <path d="M21 19C21 19.5304 20.7893 20.0391 20.4142 20.4142C20.0391 20.7893 19.5304 21 19 21H18C17.4696 21 16.9609 20.7893 16.5858 20.4142C16.2107 20.0391 16 19.5304 16 19V16C16 15.4696 16.2107 14.9609 16.5858 14.5858C16.9609 14.2107 17.4696 14 18 14H21V19ZM3 19C3 19.5304 3.21071 20.0391 3.58579 20.4142C3.96086 20.7893 4.46957 21 5 21H6C6.53043 21 7.03914 20.7893 7.41421 20.4142C7.78929 20.0391 8 19.5304 8 19V16C8 15.4696 7.78929 14.9609 7.41421 14.5858C7.03914 14.2107 6.53043 14 6 14H3V19Z" stroke-linecap="round" stroke-linejoin="round"></path>
</svg></div><div class="embedded-post-title">Cyber Threat Intelligence with Nigel Boston | EP. 26</div></div><div class="embedded-post-body">Chatting with Nigel Boston, who is a Senior Cyber Threat Intelligence Professional. Nigel has built and led threat intelligence programs that reduce incident response times, operationalize threat intelligence, and automate workflows to help teams focus on what really matters: staying ahead of the threat curve&#8230;</div><div class="embedded-post-cta-wrapper"><div class="embedded-post-cta-icon"><svg width="32" height="32" viewBox="0 0 24 24" xmlns="http://www.w3.org/2000/svg">
  <path classname="inner-triangle" d="M10 8L16 12L10 16V8Z" stroke-width="1.5" stroke-linecap="round" stroke-linejoin="round"></path>
</svg></div><span class="embedded-post-cta">Listen now</span></div><div class="embedded-post-meta">10 months ago &#183; Day Johnson</div></a></div><h2><strong>Detection-In-Depth</strong></h2><p>A guest post on <strong><a href="https://dispatch.thorcollective.com/">THOR Collective</a></strong> Dispatch!</p><p><em>Also featured on the <a href="https://tldrsec.com/p/tldr-sec-282">tl;dr sec</a> newsletter issue #282 under the blue team section, and as a Detection Engineering Gem in issue #112 of the <a href="https://www.detectionengineering.net/p/det-eng-weekly-113-can-i-get-a-rule">Detection Engineering Weekly</a> Newsletter!</em><br><br>I explore the mindset of <strong>detection-in-depth</strong>, which is first a play on the existing &#8220;defense-in-depth&#8221; concept, outlining a strategy where defenders aim to catch adversaries across every stage of their attack, not just during initial access.<br><br>It walks through:<br>- Why detection-in-depth means catching adversaries at every stage, not just the first or somewhere in the middle.<br>- The importance of tuning OOTB rules for the context and uniqueness of your environment<br>- How precision and not just coverage make alerts more effective<br><br>This one&#8217;s for security engineers, IR folks, and anyone who&#8217;s ever looked at an alert and thought, &#8220;This could be better.&#8221;</p><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:162946825,&quot;url&quot;:&quot;https://dispatch.thorcollective.com/p/detection-in-depth&quot;,&quot;publication_id&quot;:3916490,&quot;publication_name&quot;:&quot;THOR Collective Dispatch&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!8mB0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f0d0d66-07ae-4f5b-a26a-b6d91cfc488e_1280x1280.png&quot;,&quot;title&quot;:&quot;Detection-In-Depth&quot;,&quot;truncated_body_text&quot;:&quot;Detection-in-depth is an evolution of the classic cybersecurity principle known as defense-in-depth. Defense-in-depth means that no single security control can fully protect an environment&#8212;instead, multiple layered defenses must work together to slow down, detect, and ultimately stop adversaries.&quot;,&quot;date&quot;:&quot;2025-05-08T15:01:49.630Z&quot;,&quot;like_count&quot;:26,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:172540827,&quot;name&quot;:&quot;Day Johnson&quot;,&quot;handle&quot;:&quot;cyberwox&quot;,&quot;previous_name&quot;:null,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F320cfa44-ac32-40b3-8e06-97497673fd1f_4096x4096.jpeg&quot;,&quot;bio&quot;:&quot;&#10013;&#65039; | Cybersecurity Engineer @Amazon (Ex-Datadog &amp; Optiv). Building a fulfilling cybersecurity engineering career.&quot;,&quot;profile_set_up_at&quot;:&quot;2023-10-02T06:56:32.769Z&quot;,&quot;reader_installed_at&quot;:&quot;2023-10-31T20:35:37.346Z&quot;,&quot;is_guest&quot;:true,&quot;bestseller_tier&quot;:null,&quot;primaryPublicationId&quot;:1996296,&quot;primaryPublicationName&quot;:&quot;Cyberwox Unplugged&quot;,&quot;primaryPublicationUrl&quot;:&quot;https://www.cyberwoxunplugged.com&quot;,&quot;primaryPublicationSubscribeUrl&quot;:&quot;https://www.cyberwoxunplugged.com/subscribe?&quot;}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:&quot;newsletter&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://dispatch.thorcollective.com/p/detection-in-depth?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!8mB0!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f0d0d66-07ae-4f5b-a26a-b6d91cfc488e_1280x1280.png" loading="lazy"><span class="embedded-post-publication-name">THOR Collective Dispatch</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">Detection-In-Depth</div></div><div class="embedded-post-body">Detection-in-depth is an evolution of the classic cybersecurity principle known as defense-in-depth. Defense-in-depth means that no single security control can fully protect an environment&#8212;instead, multiple layered defenses must work together to slow down, detect, and ultimately stop adversaries&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">a year ago &#183; 26 likes &#183; Day Johnson</div></a></div><h2><strong>Career Quest: Cybersecurity Careers with Day Johnson</strong></h2><p>I had the pleasure of sitting with students from my Alma mater (WGU) and sharing with them about Cybersecurity career pathways.</p><div id="youtube2-CQM-2uKOmP0" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;CQM-2uKOmP0&quot;,&quot;startTime&quot;:&quot;711s&quot;,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/CQM-2uKOmP0?start=711s&amp;rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><h2>Getting Your First CYBERSECURITY Job - College, Certifications &amp; Work Experience</h2><p>The YouTube version of this post!</p><div id="youtube2-IJULNe9Gkeg" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;IJULNe9Gkeg&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/IJULNe9Gkeg?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h1><strong>Closing</strong></h1><p>Once again, you made it this far :)</p><p>Feel free to reply, share your thoughts, or pass this on to someone who needs it.</p><p>Thanks for reading. If you'd like, you can subscribe and restack - it helps spread the word and encourages me to continue writing content. If not, I&#8217;ll see you around&#8230;somewhere on the internet!</p><div><hr></div><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/p/fastest-way-to-become-a-cloud-security?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share&amp;token=eyJ1c2VyX2lkIjoxNzI1NDA4MjcsInBvc3RfaWQiOjE2MjEwNzg2MiwiaWF0IjoxNzUwMDM2MzYwLCJleHAiOjE3NTI2MjgzNjAsImlzcyI6InB1Yi0xOTk2Mjk2Iiwic3ViIjoicG9zdC1yZWFjdGlvbiJ9.yefIOBQAgPrM20p1VQBblBYeHUOqudzpaRmbhfcKCa0&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading Cyberwox Unplugged! This post is public, so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/p/getting-your-first-cybersecurity?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberwoxunplugged.com/p/getting-your-first-cybersecurity?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div>]]></content:encoded></item><item><title><![CDATA[My Honest Thoughts on the Cybersecurity Job Market in 2025 ]]></title><description><![CDATA[Artificial Intelligence (AI), Outsourcing & Economic Turmoil.]]></description><link>https://www.cyberwoxunplugged.com/p/my-honest-thoughts-on-the-cybersecurity</link><guid isPermaLink="false">https://www.cyberwoxunplugged.com/p/my-honest-thoughts-on-the-cybersecurity</guid><dc:creator><![CDATA[Day Johnson]]></dc:creator><pubDate>Tue, 01 Jul 2025 14:18:00 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/165570612/653b6e655d00ccb65df8dc941d32ea92.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>In 2025, the cybersecurity job market presents a paradox.</p><p>On one hand, the <strong>global shortage of cybersecurity professionals</strong> remains a pressing issue.</p><p>According to <strong><a href="https://cybersecurityventures.com/jobs-report-2021/">Cybersecurity Ventures</a></strong>, there are <strong>3.5 million unfilled cybersecurity positions worldwide</strong>, a number that has persisted since 2021.</p><p>In the U.S. alone, nearly <strong><a href="https://www.comptia.org/en-us/resources/research/state-of-cybersecurity-2025/">470,000 cybersecurity job openings</a></strong> were reported between May 2023 and April 2024.</p><p>On the other hand, specific traditional roles are experiencing a decline.</p><p>Job postings for <strong>Security Engineers</strong> and <strong>Security Analysts</strong> <strong><a href="https://www.scworld.com/analysis/cybersecurity-job-market-faces-disruptions-hiring-declines-in-key-roles-amid-automation-and-outsourcing">have decreased</a></strong> by approximately <strong>25%</strong> from 2022 to 2024.</p><p>This decline is <strong><a href="https://www.cybersecuritytribe.com/news/us-cybersecurity-recruitment-trends-for-2025?utm_source=chatgpt.com">attributed</a></strong> to factors such as automation, outsourcing, and the evolving nature of cybersecurity threats.</p><div><hr></div><h1><strong>About Me</strong></h1><p>If you're new here, I'm Day, a Cybersecurity Engineer at Amazon. With five years in cybersecurity, my experience covers Detection Engineering, Cloud Security, Incident Response, Threat Hunting, and most recently, Threat Intelligence.</p><p>Before Amazon, I worked at Datadog as a cloud threat detection engineer, where I researched cloud threats and built detections for various cloud providers and SaaS applications.</p><p>I've worked my way up from SOC analyst roles, investigating everything from endpoint threats to cloud-based abuse, so I know exactly what it takes to break into this field.</p><p>I started just like many of you&#8212;learning from scratch, asking questions, and figuring it out one step at a time. <strong>And now, I'm here to help you do the same.</strong></p><p>If you want to stay up-to-date on the cybersecurity industry and everything technical and career-related, be sure to like and subscribe to the newsletter for more content like this. </p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iF0v!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" width="1456" height="570" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:570,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:188886,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/159067704?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F913f1923-04a0-4fe6-afb6-5e0fca6d78b1_2500x2500.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Join a vibrant cybersecurity community of over 6,000 people who are constantly engaging in conversations and supporting one another, covering topics from cybersecurity and college to certifications, resume assistance, and various non-professional interests like fitness, finance, anime, and other exciting subjects.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://discord.gg/cyberwoxacademy&quot;,&quot;text&quot;:&quot;Join Us!&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://discord.gg/cyberwoxacademy"><span>Join Us!</span></a></p><div><hr></div><h1>The Impact of AI on Cybersecurity Roles</h1><p>Now, let's dive into this issue by first understanding the impact of AI on cybersecurity operations.</p><h3>Automation and Augmentation</h3><p>Artificial Intelligence (AI) is revolutionizing cybersecurity operations.</p><p>AI systems are now capable of analyzing vast amounts of data, detecting anomalies, and responding to threats in real-time.</p><p>For instance, AI can process up to <strong><a href="https://cloud.google.com/transform/101-real-world-generative-ai-use-cases-from-industry-leaders">billions of data points daily</a></strong>, significantly enhancing threat detection and similar capabilities.</p><p>However, this innovation is a double-edged sword.</p><p>While it increases efficiency, <strong>it also reduces the demand for entry-level roles</strong> focused on routine cybersecurity tasks.</p><p>Conversely, there is a growing need for professionals who can architect, manage, and oversee AI-driven systems, interpret complex data, have a deep understanding of cyber threats, and make informed strategic decisions.</p><div><hr></div><h2>The Rise of Outsourcing in Cybersecurity</h2><h3>Globalization of Cybersecurity Services</h3><p>Outsourcing has also become a significant trend in cybersecurity.</p><p>Organizations are increasingly turning to <strong>Managed Security Service Providers (MSSPs)</strong> and <strong>Security Operations Center as a Service (SOCaaS)</strong> to handle their security needs.</p><p>This shift is driven by factors such as cost-effectiveness, access to specialized expertise, and the need for 24/7 monitoring.</p><p>While outsourcing offers benefits to organizations, it also affects job opportunities for cybersecurity professionals.</p><p>There's a growing emphasis on roles that require professionals who can bridge the gap between outsourced services and organizational objectives.</p><div><hr></div><h2>Economic Factors Influencing the Cybersecurity Job Market</h2><h3>Budget Constraints and Strategic Investments</h3><p>Economic pressures are also influencing how organizations allocate resources to cybersecurity.</p><p>While overall spending on cybersecurity continues to grow, there is a shift toward strategic investments in people, technologies, and services that offer <strong>the highest return on investment</strong>.</p><p>This includes AI-driven solutions, cloud security, and advanced threat detection systems.</p><h3>Regulatory Compliance and Risk Management</h3><p>Additionally, international regulatory requirements are becoming more stringent and, quite frankly, <strong><a href="https://www.edpb.europa.eu/news/news/2023/12-billion-euro-fine-facebook-result-edpb-binding-decision_en">more expensive</a></strong>, compelling organizations to invest in compliance and risk management.</p><p>This trend is creating demand for professionals skilled in <strong>Governance, Risk, and Compliance (GRC)</strong>, as well as those who can navigate complex regulatory landscapes.</p><p>In fact, there has been a substantial increase in specialized cybersecurity roles focused on data protection and user privacy, particularly in positions such as Privacy Engineering, Data Protection Officers (DPOs), and Privacy Compliance Specialists.</p><p>Across various roles, I&#8217;ve also experienced legal professionals being embedded in cybersecurity organizations, both product-focused and operationally focused.</p><p>These roles have become increasingly critical as organizations navigate complex privacy regulations and consumer data protection requirements.</p><div><hr></div><h1>What Now?</h1><p>So what does all this mean for you?</p><p>You already know that AI is changing the game, but it <strong>can&#8217;t replace real-world experience</strong>.</p><p>You can&#8217;t prompt your way out of a real-world incident. You can&#8217;t ChatGPT your way through a breach when a customer&#8217;s data is at risk for a publicly traded company.</p><p>What you <em>need</em> is reps. What you <em>need</em> is judgment.</p><p>And that&#8217;s precisely why DFIR Labs, the sponsor of this issue, stood out to me.</p><div class="pullquote"><p><strong>DFIR LABS BY THE TEAM BEHIND THE DFIR REPORT</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!PEdp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bea6a83-ee50-429f-9423-061c403e6ac4_400x400.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!PEdp!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bea6a83-ee50-429f-9423-061c403e6ac4_400x400.png 424w, https://substackcdn.com/image/fetch/$s_!PEdp!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bea6a83-ee50-429f-9423-061c403e6ac4_400x400.png 848w, https://substackcdn.com/image/fetch/$s_!PEdp!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bea6a83-ee50-429f-9423-061c403e6ac4_400x400.png 1272w, https://substackcdn.com/image/fetch/$s_!PEdp!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bea6a83-ee50-429f-9423-061c403e6ac4_400x400.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!PEdp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bea6a83-ee50-429f-9423-061c403e6ac4_400x400.png" width="400" height="400" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2bea6a83-ee50-429f-9423-061c403e6ac4_400x400.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:400,&quot;width&quot;:400,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;The DFIR Report&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="The DFIR Report" title="The DFIR Report" srcset="https://substackcdn.com/image/fetch/$s_!PEdp!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bea6a83-ee50-429f-9423-061c403e6ac4_400x400.png 424w, https://substackcdn.com/image/fetch/$s_!PEdp!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bea6a83-ee50-429f-9423-061c403e6ac4_400x400.png 848w, https://substackcdn.com/image/fetch/$s_!PEdp!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bea6a83-ee50-429f-9423-061c403e6ac4_400x400.png 1272w, https://substackcdn.com/image/fetch/$s_!PEdp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bea6a83-ee50-429f-9423-061c403e6ac4_400x400.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Gain hands-on access to the type of cyber chaos that no simulation can recreate: with ambiguous enterprise logs, noisy alerts, subtle lateral movement, and the tactics real attackers use when they breach your network. Based on&nbsp;<strong>actual intrusion cases</strong>&nbsp;grounded in incidents that occurred in the wild, you&#8217;ll learn to think like an analyst, not just follow a checklist, and begin to recognize attacker behavior and tradecraft in real telemetry. </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://bit.ly/cwx-dfirlabs-training&quot;,&quot;text&quot;:&quot;Master DFIR with Hands-on Labs&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://bit.ly/cwx-dfirlabs-training"><span>Master DFIR with Hands-on Labs</span></a></p></div><h1>Positioning yourself for success</h1><p>Alright &#8212; now let&#8217;s talk about how to position yourself to win in this new cybersecurity world.</p><h3>1 - Embrace Continuous Learning</h3><p>If there&#8217;s one trait that separates those who <em>thrive</em> in cybersecurity from those who eventually stagnate, it&#8217;s an unshakable commitment to <strong>continuous learning</strong>.</p><p>Cybersecurity isn&#8217;t just dynamic, it&#8217;s also <em>volatile</em>.</p><p>The threat landscape doesn&#8217;t evolve year to year. It changes by the week, sometimes by the day.</p><p>New CVEs drop. New threat actors emerge. Cloud platforms update security models. AI opens doors to both powerful defense tools and new classes of adversarial abuse.</p><p>If you&#8217;re not consistently sharpening your skills, you&#8217;re falling behind.</p><p>But here&#8217;s the nuance people miss:</p><p>Continuous learning isn&#8217;t just about earning certs or reading blog posts. That&#8217;s important, yes &#8212; but it&#8217;s not enough.</p><p><strong>You need friction. You need context. You need reps.</strong></p><p>Because cybersecurity isn&#8217;t just a knowledge game, it&#8217;s a <strong>judgment game</strong>.</p><p>You don&#8217;t just need to <em>know</em> what lateral movement is. You need to <em>recognize</em> it when it&#8217;s buried under ten thousand other logs.</p><p>You need to know when a misconfiguration is just sloppy infrastructural negligence, and when it&#8217;s signaling malicious intent.</p><p>That&#8217;s how you build instincts. That&#8217;s how you learn to investigate under pressure, follow leads, ask better questions, and ultimately become the kind of security professional companies <em>can&#8217;t automate away</em>.</p><h3>2 - Develop Cross-Functional Expertise</h3><p>A while back, Cybersecurity used to live in a silo.</p><p>You had the network engineering people, the developers, the infrastructure teams, and somewhere in a dark corner, the security team that everyone avoided unless something went really wrong.</p><p>But in 2025, that model is dead.</p><p>Today, <strong>cybersecurity is both a business enabler and a cost center.</strong></p><p>So if you're not thinking cross-functionally, you&#8217;re not thinking strategically.</p><p>Gone are the days when your job was monitoring logs, patching systems, or tweaking firewall rules.</p><p>That&#8217;s table stakes.</p><p>Organizations now expect security professionals to operate at the intersection of <strong>technology, business, risk, and communication</strong>.</p><p>Here&#8217;s what that means:</p><ul><li><p>You need to understand how security decisions impact <strong>product development</strong></p></li><li><p>You need to know how an exploited misconfiguration can affect <strong>customer trust</strong> and potential <strong>revenue</strong>.</p></li><li><p>You should be able to explain to an executive why an unpatched vulnerability is not just a CVSS score, but could lead to <strong>real financial liability</strong>.</p></li><li><p>And when you&#8217;re working in the cloud? Understanding <strong>DevOps</strong>, <strong>CI/CD pipelines</strong>, <strong>IaC</strong>, and <strong>cloud-native architecture</strong> isn&#8217;t a &#8220;nice to have.&#8221; It&#8217;s baseline fluency.</p></li></ul><p>The best cybersecurity engineers I know and I&#8217;ve worked with aren&#8217;t just technically sharp &#8212; they&#8217;re also able to walk into a room of stakeholders from engineering, product, legal, and compliance and explain what&#8217;s at risk in <strong>plain English</strong>.</p><p>They know when to escalate, when to advise, and when to collaborate.</p><p>And let me say this clearly: <strong>Being technically brilliant but context-blind will hold you back</strong>.</p><p>You&#8217;ll get overlooked for leadership roles, for strategic projects, even for the kind of work that really moves the needle.</p><p>Cross-functional expertise doesn&#8217;t mean you have to be an expert in everything.</p><p>It means you need to build enough breadth to communicate effectively and enough depth to execute responsibly.</p><p>It&#8217;s about thinking beyond just systems and endpoints.</p><p>It&#8217;s about understanding <strong>the business</strong> and helping protect the <strong>entire value chain</strong> &#8212; from source code to customer experience.</p><p>Learn that, and you become indispensable.</p><h3>3 - Cultivate Soft Skills</h3><p>Let&#8217;s be real &#8212; when most people hear &#8220;soft skills,&#8221; they roll their eyes.</p><p>Especially in cybersecurity, where it&#8217;s easy to assume the only thing that matters is how technically sharp you are.</p><p>Can you reverse engineer malware? Write detections? Secure infrastructure?</p><p>That stuff matters and is important. No question. <strong>Full stop.</strong></p><p>But here&#8217;s what a lot of early-career folks don&#8217;t realize until it&#8217;s too late:</p><p><strong>The further you grow in cybersecurity, the more your success depends on your ability to work with people.</strong></p><p>Not tools. Not terminals. Not tickets. <strong>People.</strong></p><p>Soft skills &#8212; and I&#8217;m talking about honest communication, leadership, and emotional intelligence &#8212; are what separate good security engineers from the ones who actually lead initiatives, gain trust, and make strategic impact.</p><p>Here&#8217;s what cultivating soft skills actually looks like in our field:</p><ol><li><p>Being able to walk into a tense post-incident review and <strong>clearly explain what happened</strong> without throwing anyone under the bus.</p></li><li><p>Communicating risk to leadership in the <strong>language they understand</strong> by translating technical findings into business impact.</p></li><li><p>Navigating cross-functional friction when the security team is seen as the &#8220;department of no&#8221; and flipping that perception by being a <strong>partner</strong>, not a blocker.</p></li><li><p>Mentoring junior engineers &amp; analysts. Holding your team accountable. Knowing how to escalate a threat <em>without</em> creating panic.</p></li></ol><p>These are the moments that make or break trust.</p><p>And trust is the currency of cybersecurity.</p><p>If your team doesn&#8217;t trust you, if your leadership doesn&#8217;t listen to you, if your partners tune you out, your technical brilliance won&#8217;t matter.</p><p>You&#8217;ll be ignored. Or worse, replaced.</p><p>Now here&#8217;s the part most people underestimate:</p><p>Soft skills aren&#8217;t just about external collaboration.</p><p>They&#8217;re also about <strong>internal regulation</strong>.</p><ul><li><p>Can you stay calm during a high-severity incident?</p></li><li><p>Can you manage your time across competing priorities?</p></li><li><p>Can you ask for help before burnout takes over?</p></li><li><p>Can you receive feedback without getting defensive?</p></li></ul><p>These are human skills.</p><p>And cybersecurity, for all the talk about code and exploits and zero-days, is a deeply <strong>human field</strong>.</p><p>We&#8217;re dealing with threat actors &#8212; humans.</p><p>We&#8217;re protecting people&#8217;s data &#8212; humans.</p><p>We&#8217;re collaborating across teams &#8212; again, humans.</p><p>So if you want to go far in this field, not just technically, but as someone others want to work with, then don&#8217;t just cultivate your knowledge.</p><p><strong>Cultivate your character.</strong></p><p>That&#8217;s what creates longevity. That&#8217;s what builds leadership. That&#8217;s what keeps you relevant in a space that&#8217;s changing faster than ever.</p><div><hr></div><h1><strong>Cyberwox Resources</strong></h1><h4><strong>Resources for your career</strong></h4><p>&#128313;<a href="https://discord.gg.cyberwoxacademy/">Join the Cyberwox Academy Discord!!</a></p><p>&#128311; <a href="https://www.cyberstoriespodcast.com/podcast">Check out the episodes of the Cyberstories Podcast on your favorite platform</a></p><p>&#128313;<a href="https://daycyberwox.gumroad.com/l/cyberlearningframework">Cyberwox Cybersecurity Notion Templates for planning your career</a></p><p>&#128313;<a href="https://daycyberwox.gumroad.com/l/cybersecurityresume">Cyberwox Best Entry-Level Cybersecurity Resume Template</a></p><p>&#128313;<a href="https://www.linkedin.com/learning/introduction-to-aws-threat-detection/">Learn AWS Threat Detection with my LinkedIn Learning Course</a></p><h1><strong>Recent Content</strong></h1><p><em>A few publications I&#8217;ve released recently</em>.</p><p><strong>My Honest Advice On Starting A Cybersecurity Career in 2025 (in less than 5 mins)</strong></p><p>Advice from my 5 years of learning, teaching, and working in the cybersecurity industry (in less than 5 mins).</p><div id="youtube2-56pS-H2h1fg" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;56pS-H2h1fg&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/56pS-H2h1fg?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p><strong>Building a DNS Server with Python - 2 (Parsing The Header)</strong></p><p>Second installment of this series, in this case we&#8217;re parsing the header.</p><div id="youtube2-xGzkDzMGECY" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;xGzkDzMGECY&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/xGzkDzMGECY?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p><strong>Detection-as-Code &amp; CI/CD for Detection Engineering with Dennis Chow | Detection Opportunities EP 9</strong></p><p>Detection as Code is one of the most importnat evolutions in modern security detection, and in this video, we break it down. </p><p>I first encountered this concept as a Cloud Threat Detection Engineer at Datadog. Today, I&#8217;m joined by <strong><a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbm0zVDJCd1lNTkJxT1JBM08zNEsxa05SRXJ4d3xBQ3Jtc0trTUlEZUd6Qjh4U0JBeEhOdEJ1akhEMldCOXZVd2hrbWRXM2ViUkx0YzNkRjRiZWJjUXVob0RxYWxzVktMS0R5MTQyWkJrUHBlcGI4cklLUWxuVGxfQlYzeV9HblZORElHVXBzdFJtNWM1enRoTTd0aw&amp;q=https%3A%2F%2Fwww.linkedin.com%2Fin%2Fdwchow%2F&amp;v=Uw0r7lGN__Q">Dennis Chow</a></strong>, a Detection Engineering specialist and author of Automating Security Detection Engineering (which I had the honor of technically reviewing). </p><p>Together, we explore what Detection as Code really means and walk through two hands-on CI/CD pipeline demos: </p><p>&#128313; Lab 1: Building SIEM detections with synthetic AI testing using Sumo Logic </p><p>&#128313; Lab 2: Policy-as-Code integration testing with Cloud Custodian on GCP. </p><p>You&#8217;ll learn how Detection as Code leverages Git, automated testing, reproducibility, collaboration, and CI/CD to make detection engineering more scalable, accountable, and reliable.</p><div id="youtube2-Uw0r7lGN__Q" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;Uw0r7lGN__Q&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/Uw0r7lGN__Q?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p><strong>My Honest Thoughts on the Cybersecurity Job Market in 2025</strong></p><p>The YouTube version of this post!</p><div id="youtube2-CReZS2SFpt4" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;CReZS2SFpt4&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/CReZS2SFpt4?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h1><strong>Closing</strong></h1><p>Once again, you made it this far :)</p><p>Feel free to reply, share your thoughts, or pass this on to someone who needs it.</p><p>Thanks for reading. If you'd like, you can subscribe and restack - it helps spread the word and encourages me to continue writing content. If not, I&#8217;ll see you around&#8230;somewhere on the internet!</p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/p/fastest-way-to-become-a-cloud-security?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share&amp;token=eyJ1c2VyX2lkIjoxNzI1NDA4MjcsInBvc3RfaWQiOjE2MjEwNzg2MiwiaWF0IjoxNzUwMDM2MzYwLCJleHAiOjE3NTI2MjgzNjAsImlzcyI6InB1Yi0xOTk2Mjk2Iiwic3ViIjoicG9zdC1yZWFjdGlvbiJ9.yefIOBQAgPrM20p1VQBblBYeHUOqudzpaRmbhfcKCa0&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading Cyberwox Unplugged! This post is public, so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/p/my-honest-thoughts-on-the-cybersecurity?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberwoxunplugged.com/p/my-honest-thoughts-on-the-cybersecurity?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div>]]></content:encoded></item><item><title><![CDATA[Fastest Way To Become a Cloud Security Engineer in 2025]]></title><description><![CDATA[A step-by-step roadmap to become a Cloud Security Engineer, without needing a college degree or prior tech experience.]]></description><link>https://www.cyberwoxunplugged.com/p/fastest-way-to-become-a-cloud-security</link><guid isPermaLink="false">https://www.cyberwoxunplugged.com/p/fastest-way-to-become-a-cloud-security</guid><dc:creator><![CDATA[Day Johnson]]></dc:creator><pubDate>Mon, 28 Apr 2025 12:15:00 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/162107862/6fe6621bf9b85fdad11b4d32b526426f.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<h1>Introductions</h1><p>In 2025, one of the fastest-growing and most in-demand roles in cybersecurity is <em>Cloud Security Engineering</em>.</p><p>But how do you actually become one, especially if you're starting from scratch?</p><p>In this newsletter, I'll provide you with a step-by-step roadmap to become a&nbsp;<strong>Cloud Security Engineer</strong>, without requiring a college degree or prior technical experience.</p><h2>About Me</h2><p>If you're new here, I'm Day, a Cybersecurity Engineer at Amazon. With five years in cybersecurity, my experience covers Detection Engineering, Cloud Security, Incident Response, Threat Hunting, and most recently, Threat Intelligence.</p><p>Before Amazon, I worked at Datadog as a cloud threat detection engineer, where I researched cloud threats and built detections for various cloud providers and SaaS applications.</p><p>I've worked my way up from SOC analyst roles, investigating everything from endpoint threats to cloud-based abuse, so I know exactly what it takes to break into this field.</p><p>I started, just like many of you, learning from scratch, asking questions, and figuring it out one step at a time. <strong>And now, I'm here to help you do the same.</strong></p><p>I personally was able to break into cybersecurity as early as my freshman year of college. I&#8217;ve secured several jobs and interviews prior to earning my college degree, and I&#8217;ve helped thousands of people achieve the same success on my various content channels and in my Discord Community.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iF0v!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" width="1456" height="570" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:570,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:188886,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/159067704?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F913f1923-04a0-4fe6-afb6-5e0fca6d78b1_2500x2500.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Join a vibrant cybersecurity community of over 6,000 people who are constantly engaging in conversations and supporting one another, covering topics from cybersecurity and college to certifications, resume assistance, and various non-professional interests like fitness, finance, anime, and other exciting subjects.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://discord.gg/cyberwoxacademy&quot;,&quot;text&quot;:&quot;Join Us!&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://discord.gg/cyberwoxacademy"><span>Join Us!</span></a></p><div><hr></div><h1>What Cloud Security Engineers Actually Do</h1><p>Let's start with the most essential question: What&nbsp;<em>is</em>&nbsp;cloud security engineering?</p><p>Many people imagine it's just monitoring dashboards, reviewing alerts, and adjusting IAM permissions. But the reality is far more complex and deeply technical.</p><p>A cloud security engineer builds and protects the systems, identities, data, and infrastructure that power cloud environments, such as AWS, Azure, and GCP.</p><p>The role involves designing secure cloud architectures, detecting cloud service abuse, automating responses to <a href="https://www.crowdstrike.com/en-us/blog/common-cloud-security-misconfigurations/">cloud misconfigurations</a>, and investigating breaches through cloud log analysis, among other tasks.</p><p>This position uniquely blends software engineering, DevOps, and cybersecurity skills.</p><p>Unlike a SOC Analyst who mainly analyzes threats, as a Cloud Security Engineer, you'll build security guardrails, write scripts, deploy infrastructure, and prevent security incidents by fixing cloud misconfigurations&#8212;one of the leading causes of cloud attacks.</p><p>If you're expecting a simple checklist job, think again. Cloud security engineering requires critical thinking, curiosity, and a genuine engineering mindset.</p><div><hr></div><h1>Understanding the Cloud Comes First</h1><p>Before diving into tools or certifications, it is essential to understand how cloud systems work.</p><p>You can't secure what you don't understand&#8212;and cloud infrastructure is truly a world of its own.</p><p>This means learning and understanding how identity works in cloud platforms&#8212;how users, services, and roles authenticate and what they can access.</p><p>You need to understand how resources, such as virtual machines, storage buckets, and containers, are deployed and managed.</p><p>You must also grasp <a href="https://media.defense.gov/2024/Mar/07/2003407861/-1/-1/0/CSI-CLOUDTOP10-NETWORK-SEGMENTATION.PDF">how cloud networks are segmented</a>, how logs are generated, and what telemetry is available for detecting suspicious behavior across different cloud planes&#8212;specifically the <a href="https://docs.aws.amazon.com/whitepapers/latest/aws-fault-isolation-boundaries/control-planes-and-data-planes.html">control plane (or management plane) and the data plane</a>.</p><p>This goes beyond memorizing terminology. It's about developing a deep understanding of how cloud environments are built and how data flows through them. When something breaks&#8212;or worse, when someone breaks in&#8212;you need to recognize the signs and distinguish between normal, risky, and malicious behavior.</p><p>Starting with AWS, Azure, or Google Cloud doesn't matter at first. What's important is choosing one platform and committing to learn it from the ground up.</p><p><em>A previous video on how to become a Cloud Security Engineer:</em></p><div id="youtube2-5M7HZJxunQc" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;5M7HZJxunQc&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/5M7HZJxunQc?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h1>Mastering Networking Fundamentals</h1><p>After you've started to understand how cloud services are structured, the next piece of the puzzle is networking.</p><p>This is one of the skills I strongly advocate cybersecurity professionals learn early on&#8212;and while many people tend to skip ahead or zone out here, trust me, you won't want to ignore this.</p><p>Networking is the lifeblood of everything in security, especially in the cloud. Without it, you'll be flying blind.</p><p>You need to understand how devices communicate with each other over the internet.</p><p>This includes concepts like IP addressing, subnets, and Network Address Translation (NAT).</p><p>You'll want to become familiar with how public and private networks function in a cloud context, as well as how traffic is routed between services and across regions.</p><p>You'll also need to understand protocols because when an attacker probes your cloud environment, they often use protocols like HTTP, SSH, or DNS in abnormal ways.</p><p>If you can't recognize what "normal" looks like, you'll never be able to spot the subtle signs of an intrusion or ongoing attack.</p><p>But beyond detection and investigation, <a href="https://docs.aws.amazon.com/vpc/latest/userguide/vpc-security-best-practices.html">networking also helps you build better cloud architecture</a>.</p><p>It helps you segment services to reduce your blast radius and design environments that are harder to exploit and move through laterally.</p><p>So don't rush this step. It will pay off over and over again in your career.</p><p><em>How To Learn Computer Networking:</em></p><div id="youtube2-cOI-a5vWzYs" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;cOI-a5vWzYs&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/cOI-a5vWzYs?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p><em>Computer Networking Mini-Course</em></p><div id="youtube2-o99nZlTNGqQ" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;o99nZlTNGqQ&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/o99nZlTNGqQ?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h1>Understand the System Before You Secure It</h1><p>Once you've started to grasp cloud infrastructure and networking, you might be tempted to jump right into learning tools like SIEMs or EDRs.</p><p>While these tools are essential, they are <em>not</em> where you should start.</p><p>Why? Because every security tool relies on the underlying telemetry and behavior of the system it monitors.</p><p>Without understanding how a system works, knowing which buttons to click won't be of much help.</p><p>You won't recognize architectural problems, spot anomalies, or even build meaningful detections.</p><p>When I started working on cloud detections professionally, I encountered a cloud provider with which I had no prior experience.</p><p>Within a few months, I transformed from a novice in this cloud platform to writing multiple detections, supporting customers during a large-scale cloud incident, and presenting my research on company blogs and at major cybersecurity conferences.</p><p>The takeaway is simple: master the system first. Always. Once you do, every tool you learn afterward will click into place.</p><p><em><a href="https://securitylabs.datadoghq.com/articles/google-cloud-threat-detection/">My Research on Google Cloud Threat Detection</a>.</em></p><p><em>My fwd:cloudsec talk on Google Cloud Threat Detection:</em></p><div id="youtube2-orNBBHKayiY" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;orNBBHKayiY&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/orNBBHKayiY?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h1>Learn Cloud Security Tooling Intentionally, Not Impulsively</h1><p>Now that you&#8217;ve built a strong foundation in how cloud systems and networks operate, you&#8217;re ready to start exploring the tools that cloud security engineers use on the job.</p><p>However, I want you to approach this with intention, rather than impulse or guesswork.</p><p>Security tools are designed to&nbsp;<em>enhance</em> your understanding, not replace it.</p><p>Whether it&#8217;s a log analysis platform, a threat detection engine, or a cloud-native monitoring service, these tools help you find, investigate, and respond to threats.</p><p>But they&#8217;re only as powerful as your understanding of what you&#8217;re looking at.</p><p>Instead of trying to learn every tool out there, focus on learning how to think like a cloud defender. Understand what telemetry is available.</p><p>Learn how to follow the trail of an attacker moving through a cloud account. Practice reading logs, correlating events, and writing detection logic that isn&#8217;t just copy-pasted from a playbook.</p><p>Tools are essential, but they're only effective when paired with a cloud security engineering mindset, deep contextual understanding, strong problem-solving skills, and sharp analytical reasoning.</p><div class="pullquote"><p><em><strong>TRYHACKME DEFENDING AZURE LEARNING PATH</strong></em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!8ko6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ea86daa-9b14-4f77-a053-a4bb329aefa2_439x247.svg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8ko6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ea86daa-9b14-4f77-a053-a4bb329aefa2_439x247.svg 424w, https://substackcdn.com/image/fetch/$s_!8ko6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ea86daa-9b14-4f77-a053-a4bb329aefa2_439x247.svg 848w, https://substackcdn.com/image/fetch/$s_!8ko6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ea86daa-9b14-4f77-a053-a4bb329aefa2_439x247.svg 1272w, https://substackcdn.com/image/fetch/$s_!8ko6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ea86daa-9b14-4f77-a053-a4bb329aefa2_439x247.svg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8ko6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ea86daa-9b14-4f77-a053-a4bb329aefa2_439x247.svg" width="439" height="247" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4ea86daa-9b14-4f77-a053-a4bb329aefa2_439x247.svg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:247,&quot;width&quot;:439,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;TryHackMe&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="TryHackMe" title="TryHackMe" srcset="https://substackcdn.com/image/fetch/$s_!8ko6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ea86daa-9b14-4f77-a053-a4bb329aefa2_439x247.svg 424w, https://substackcdn.com/image/fetch/$s_!8ko6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ea86daa-9b14-4f77-a053-a4bb329aefa2_439x247.svg 848w, https://substackcdn.com/image/fetch/$s_!8ko6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ea86daa-9b14-4f77-a053-a4bb329aefa2_439x247.svg 1272w, https://substackcdn.com/image/fetch/$s_!8ko6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ea86daa-9b14-4f77-a053-a4bb329aefa2_439x247.svg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Rather than just covering surface-level cloud concepts, gain foundational knowledge through hands-on experience in real Azure cloud environments, including key Azure security tools such as Microsoft Sentinel, KQL, and Defender, with TryHackMe's Defending Azure Learning Path.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://bit.ly/cwx-thm-defending-azure&quot;,&quot;text&quot;:&quot;Learn How To Defend Azure!&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://bit.ly/cwx-thm-defending-azure"><span>Learn How To Defend Azure!</span></a></p></div><h1>Real-World Practice Is What Separates Theory From Skill</h1><p>Reading articles and watching videos like this can provide knowledge, but knowledge alone doesn't build confidence.</p><p>That's why hands-on experience is essential if you want to become a cloud security engineer.</p><p>You need to simulate real-world scenarios.</p><p>This may involve setting up a mock cloud environment, deliberately misconfiguring it, and then identifying and resolving those issues.</p><p>Or it could mean working through labs where you analyze logs, triage alerts, and respond to simulated attacks.</p><p>Again, <strong>TryHackMe&#8217;s</strong> learning platform is perfect for precisely this kind of progression.</p><p>The defending Azure learning path will walk you through deploying, breaking, and defending systems in a safe environment.</p><p>The key is not just to study cloud security. <strong>Do</strong> cloud security and get your hands dirty.</p><div><hr></div><h1>Learning to Automate with Code</h1><p>In the cloud, things move fast. And if you try to secure everything manually, you will fall behind.</p><p>That&#8217;s why automation isn&#8217;t just a nice-to-have skill&#8212;it&#8217;s a requirement.</p><p>If you want to scale your impact, reduce noise, and respond to threats efficiently, you need to learn how to write code.</p><p>Python is a fantastic starting point. It&#8217;s easy to learn, widely used in security, and perfect for tasks like:</p><ul><li><p>Parsing logs</p></li><li><p>Querying APIs</p></li><li><p>Automating responses</p></li><li><p>Writing detection logic</p></li></ul><p>Once you&#8217;ve built a foundation in Python, you can expand into scripting languages like Bash or PowerShell, depending on your environment.</p><p>However, the most important thing is to begin writing code that solves real-world problems.</p><p>That could be anything from a cloud function to a remediation workflow that disables misconfigured users, or a bash script on a virtual machine to install specific tooling on deployment.</p><p>Remember&#8212;you&#8217;re not trying to be a software developer. You&#8217;re building tools that make you a more effective security engineer.</p><p>This also ties closely to Infrastructure as Code.</p><div><hr></div><h1>Learning Infrastructure-as-Code</h1><p>One of the most significant shifts in modern cloud environments is the transition to Infrastructure-as-Code.</p><p>Instead of clicking buttons in a web console, engineers are deploying resources using declarative templates and scripts. This has significant implications for security.</p><p>If you understand how Infrastructure as Code works, you can detect misconfigurations before they go live.</p><p>You can review changes in source control. You can build security guardrails into development workflows.</p><p>And you can make sure that security isn&#8217;t just something that happens <em>after</em> deployment&#8212;it&#8217;s baked in from the start.</p><p>You don&#8217;t need to master every IaC tool out there, but you should be comfortable reading, reviewing, and writing templates for the cloud environments you work with.</p><div><hr></div><h1>Build Projects That Showcase Your Skills</h1><p>All of this learning&#8212;cloud, networking, systems, scripting&#8212;needs to be tangible.</p><p>That&#8217;s why projects are so important.</p><p>If you can build a small cloud environment, configure it securely, simulate an attack, and then detect and respond to that attack, you are almost job-ready.</p><p>If you can automate policy enforcement or build dashboards highlighting risky behavior, you are also almost job-ready.</p><p>Your projects don&#8217;t need to be flashy. They need to be <em>real</em>.</p><p>They need to demonstrate that you understand how to think, investigate, and solve cloud security problems.</p><p>And they need to be documented&#8212;on your GitHub, in your portfolio, or on your resume.</p><p>When you start applying for jobs, those projects are what set you apart from everyone else with a certificate and a list of buzzwords.</p><div><hr></div><h1>Staying Current and Never Stopping</h1><p>Cloud security is not a static field; it is constantly evolving. It changes every single day.</p><p>New services launch. Old ones get deprecated. Attackers find new weaknesses. Teams build new defenses.</p><p>It&#8217;s just simply evolving.</p><p>Therefore, your role as a cloud security engineer is to evolve with the industry.</p><p>That means reading blogs or newsletters, reviewing vendor changelogs, joining security communities, and practicing regularly.</p><p>Not out of fear, but out of a commitment to being excellent at your craft.</p><p>This is a career, not just a class. And the more you treat it like a long-term journey, the more you&#8217;ll get out of it.</p><div><hr></div><h1>Cyberwox Resources</h1><h4>Resources for your career</h4><p>&#128313;<a href="https://discord.gg.cyberwoxacademy/">Join the Cyberwox Academy Discord!!</a></p><p>&#128311; <a href="https://www.cyberstoriespodcast.com/podcast">Check out the episodes of the Cyberstories Podcast on your favorite platform</a></p><p>&#128313;<a href="https://daycyberwox.gumroad.com/l/cyberlearningframework">Cyberwox Cybersecurity Notion Templates for planning your career</a></p><p>&#128313;<a href="https://daycyberwox.gumroad.com/l/cybersecurityresume">Cyberwox Best Entry-Level Cybersecurity Resume Template</a></p><p>&#128313;<a href="https://www.linkedin.com/learning/introduction-to-aws-threat-detection/">Learn AWS Threat Detection with my LinkedIn Learning Course</a></p><h1>Recent Content</h1><p><em>A few publications I&#8217;ve released recently.</em></p><p><strong>Cybersec Caf&#233; #59 - 03/18/25</strong></p><p>This was a great conversation I had with Ryan Cox from The Cyber Cafe. Ryan and I sat down this past month and dove into my journey in cybersecurity, my path from beginner to established professional, how I&#8217;ve built my online business, and more. Since we&#8217;ve both specialized in Detection and Incident Response, it was great to see how our experiences compared and share my perspective on the industry.</p><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:159102708,&quot;url&quot;:&quot;https://www.cyberseccafe.com/p/cyber-chat-day-johnson&quot;,&quot;publication_id&quot;:2446386,&quot;publication_name&quot;:&quot;The Cybersec Caf&#233;&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe06b04bc-8e40-416a-aa85-7b5d3dbaa335_1080x1080.png&quot;,&quot;title&quot;:&quot;Cyber Chat: Day Johnson&quot;,&quot;truncated_body_text&quot;:&quot;I&#8217;m super excited to share my latest Cyber Chat with Day Johnson - a Cybersecurity Engineer and Content Creator.&quot;,&quot;date&quot;:&quot;2025-03-18T13:03:34.568Z&quot;,&quot;like_count&quot;:2,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:217992854,&quot;name&quot;:&quot;Ryan G. Cox&quot;,&quot;handle&quot;:&quot;ryangcox&quot;,&quot;previous_name&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/90758dea-47ea-43aa-bb14-29ef01e5d5c1_1080x1080.png&quot;,&quot;bio&quot;:&quot;Cybersecurity Engineer, Author of the Cybersec Cafe. Sharing my experiences with you!&quot;,&quot;profile_set_up_at&quot;:&quot;2024-03-21T22:09:23.758Z&quot;,&quot;reader_installed_at&quot;:&quot;2024-03-21T22:40:35.206Z&quot;,&quot;publicationUsers&quot;:[{&quot;id&quot;:2473736,&quot;user_id&quot;:217992854,&quot;publication_id&quot;:2446386,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:true,&quot;publication&quot;:{&quot;id&quot;:2446386,&quot;name&quot;:&quot;The Cybersec Caf&#233;&quot;,&quot;subdomain&quot;:&quot;cyberseccafe&quot;,&quot;custom_domain&quot;:&quot;www.cyberseccafe.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Get ahead in cybersecurity with curated insights, strategies, solutions, and deep dives. Weekly - straight to your inbox.&quot;,&quot;logo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e06b04bc-8e40-416a-aa85-7b5d3dbaa335_1080x1080.png&quot;,&quot;author_id&quot;:217992854,&quot;primary_user_id&quot;:217992854,&quot;theme_var_background_pop&quot;:&quot;#FF5CD7&quot;,&quot;created_at&quot;:&quot;2024-03-21T22:10:31.576Z&quot;,&quot;email_from_name&quot;:null,&quot;copyright&quot;:&quot;Ryan G. Cox&quot;,&quot;founding_plan_name&quot;:&quot;Founding Member&quot;,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false,&quot;payments_state&quot;:&quot;enabled&quot;,&quot;language&quot;:null,&quot;explicit&quot;:false,&quot;homepage_type&quot;:&quot;magaziney&quot;,&quot;is_personal_mode&quot;:false}}],&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:&quot;newsletter&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://www.cyberseccafe.com/p/cyber-chat-day-johnson?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!ga51!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe06b04bc-8e40-416a-aa85-7b5d3dbaa335_1080x1080.png" loading="lazy"><span class="embedded-post-publication-name">The Cybersec Caf&#233;</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">Cyber Chat: Day Johnson</div></div><div class="embedded-post-body">I&#8217;m super excited to share my latest Cyber Chat with Day Johnson - a Cybersecurity Engineer and Content Creator&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">a year ago &#183; 2 likes &#183; Ryan G. Cox</div></a></div><p><strong>Community College to Microsoft Cybersecurity Internship with Carl David | Cyber Stories Podcast EP 25</strong></p><p>A conversation with Carl David, a rising cybersecurity professional who started as an Incident Response Intern with Microsoft&#8217;s world-renowned DART team. Carl, originally from Rwanda, shares how he broke into the field after studying at Collin College, where I also began my journey. </p><p>He&#8217;s now making waves as an Intelligence Analyst Intern at Semperis and will be joining USAA as a Cybersecurity Intern in Summer 2025. We explore Carl's journey of landing his first internship at Microsoft, which subsequently opened doors to two more offers, various certifications, clear college pathways, and career insights. </p><p>We also discuss the significance of deliberate networking and developing cybersecurity projects. Additionally, we address the hardships that come with immigration and the obstacles faced by international students, along with strategies for overcoming them. </p><p>Carl&#8217;s journey serves as a blueprint for aspiring cyber professionals, particularly those starting from humble beginnings.</p><div id="youtube2-h457QYCQxMk" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;h457QYCQxMk&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/h457QYCQxMk?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:161610923,&quot;url&quot;:&quot;https://www.cyberstoriespodcast.com/p/community-college-to-microsoft-cybersecurity-245&quot;,&quot;publication_id&quot;:2973795,&quot;publication_name&quot;:&quot;Cyber Stories Podcast&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00a8c60c-50a7-4a5b-a9fb-49554d9197e8_1280x1280.png&quot;,&quot;title&quot;:&quot;Community College to Microsoft Cybersecurity Internship with Carl David&quot;,&quot;truncated_body_text&quot;:&quot;A conversation with Carl David, a rising cybersecurity professional who started as an Incident Response Intern with Microsoft&#8217;s world-renowned DART team.&quot;,&quot;date&quot;:&quot;2025-04-18T14:14:16.000Z&quot;,&quot;like_count&quot;:1,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:172540827,&quot;name&quot;:&quot;Day Johnson&quot;,&quot;handle&quot;:&quot;cyberwox&quot;,&quot;previous_name&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/320cfa44-ac32-40b3-8e06-97497673fd1f_4096x4096.jpeg&quot;,&quot;bio&quot;:&quot;&#10013;&#65039; | Cybersecurity Engineer @Amazon (Ex-Datadog &amp; Optiv). Building a fulfilling cybersecurity engineering career.&quot;,&quot;profile_set_up_at&quot;:&quot;2023-10-02T06:56:32.769Z&quot;,&quot;reader_installed_at&quot;:&quot;2023-10-31T20:35:37.346Z&quot;,&quot;publicationUsers&quot;:[{&quot;id&quot;:1994687,&quot;user_id&quot;:172540827,&quot;publication_id&quot;:1996296,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:true,&quot;publication&quot;:{&quot;id&quot;:1996296,&quot;name&quot;:&quot;Cyberwox Unplugged&quot;,&quot;subdomain&quot;:&quot;cyberwox&quot;,&quot;custom_domain&quot;:&quot;www.cyberwoxunplugged.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Sharing my cybersecurity engineering career learnings with anecdotes from life.&quot;,&quot;logo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8f98062e-b3db-4b1d-9b38-1525ae2212c9_1280x1280.png&quot;,&quot;author_id&quot;:172540827,&quot;primary_user_id&quot;:172540827,&quot;theme_var_background_pop&quot;:&quot;#9A6600&quot;,&quot;created_at&quot;:&quot;2023-10-02T06:56:50.705Z&quot;,&quot;email_from_name&quot;:&quot;Day Johnson from CYBERWOX&quot;,&quot;copyright&quot;:&quot;Dayspring Johnson&quot;,&quot;founding_plan_name&quot;:&quot;Founding Member&quot;,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false,&quot;payments_state&quot;:&quot;disabled&quot;,&quot;language&quot;:null,&quot;explicit&quot;:false,&quot;homepage_type&quot;:&quot;newspaper&quot;,&quot;is_personal_mode&quot;:false}},{&quot;id&quot;:3024612,&quot;user_id&quot;:172540827,&quot;publication_id&quot;:2973795,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:2973795,&quot;name&quot;:&quot;Cyber Stories Podcast&quot;,&quot;subdomain&quot;:&quot;cyberstoriespodcast&quot;,&quot;custom_domain&quot;:&quot;www.cyberstoriespodcast.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Conversations with Tech &amp; Cybersecurity Professionals from diverse backgrounds, experiences, and points of view on building a successful career.&quot;,&quot;logo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/00a8c60c-50a7-4a5b-a9fb-49554d9197e8_1280x1280.png&quot;,&quot;author_id&quot;:172540827,&quot;primary_user_id&quot;:null,&quot;theme_var_background_pop&quot;:&quot;#FF6719&quot;,&quot;created_at&quot;:&quot;2024-09-04T05:36:02.914Z&quot;,&quot;email_from_name&quot;:&quot;Day Johnson from CYBERWOX&quot;,&quot;copyright&quot;:&quot;Day Johnson&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false,&quot;payments_state&quot;:&quot;disabled&quot;,&quot;language&quot;:null,&quot;explicit&quot;:false,&quot;homepage_type&quot;:&quot;newspaper&quot;,&quot;is_personal_mode&quot;:false}}],&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:&quot;podcast&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://www.cyberstoriespodcast.com/p/community-college-to-microsoft-cybersecurity-245?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!Y3kp!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00a8c60c-50a7-4a5b-a9fb-49554d9197e8_1280x1280.png" loading="lazy"><span class="embedded-post-publication-name">Cyber Stories Podcast</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title-icon"><svg width="19" height="19" viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg">
  <path d="M3 18V12C3 9.61305 3.94821 7.32387 5.63604 5.63604C7.32387 3.94821 9.61305 3 12 3C14.3869 3 16.6761 3.94821 18.364 5.63604C20.0518 7.32387 21 9.61305 21 12V18" stroke-linecap="round" stroke-linejoin="round"></path>
  <path d="M21 19C21 19.5304 20.7893 20.0391 20.4142 20.4142C20.0391 20.7893 19.5304 21 19 21H18C17.4696 21 16.9609 20.7893 16.5858 20.4142C16.2107 20.0391 16 19.5304 16 19V16C16 15.4696 16.2107 14.9609 16.5858 14.5858C16.9609 14.2107 17.4696 14 18 14H21V19ZM3 19C3 19.5304 3.21071 20.0391 3.58579 20.4142C3.96086 20.7893 4.46957 21 5 21H6C6.53043 21 7.03914 20.7893 7.41421 20.4142C7.78929 20.0391 8 19.5304 8 19V16C8 15.4696 7.78929 14.9609 7.41421 14.5858C7.03914 14.2107 6.53043 14 6 14H3V19Z" stroke-linecap="round" stroke-linejoin="round"></path>
</svg></div><div class="embedded-post-title">Community College to Microsoft Cybersecurity Internship with Carl David</div></div><div class="embedded-post-body">A conversation with Carl David, a rising cybersecurity professional who started as an Incident Response Intern with Microsoft&#8217;s world-renowned DART team&#8230;</div><div class="embedded-post-cta-wrapper"><div class="embedded-post-cta-icon"><svg width="32" height="32" viewBox="0 0 24 24" xmlns="http://www.w3.org/2000/svg">
  <path classname="inner-triangle" d="M10 8L16 12L10 16V8Z" stroke-width="1.5" stroke-linecap="round" stroke-linejoin="round"></path>
</svg></div><span class="embedded-post-cta">Listen now</span></div><div class="embedded-post-meta">a year ago &#183; 1 like &#183; Day Johnson</div></a></div><p><strong>Fastest Way To Become a Cloud Security Engineer in 2025</strong></p><p>The YouTube version of this post!</p><div id="youtube2-iwejcfsVVFY" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;iwejcfsVVFY&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/iwejcfsVVFY?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h1>Closing</h1><p>Once again, you made it this far :)</p><p>Feel free to reply, share your thoughts, or pass this on to someone who needs it.</p><p>Thanks for reading. If you'd like, you can subscribe and restack - it helps spread the word and encourages me to continue writing content. If not, I&#8217;ll see you around&#8230;somewhere on the internet!</p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/p/fastest-way-to-become-a-cloud-security?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading Cyberwox Unplugged! This post is public, so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/p/fastest-way-to-become-a-cloud-security?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberwoxunplugged.com/p/fastest-way-to-become-a-cloud-security?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p></p>]]></content:encoded></item><item><title><![CDATA[23 Things I Have Learned As a 23 Year Old Cybersecurity Engineer]]></title><description><![CDATA[Reflections from a cybersecurity engineer, creator, and Gen Z professional.]]></description><link>https://www.cyberwoxunplugged.com/p/23-things-i-have-learned-as-a-23</link><guid isPermaLink="false">https://www.cyberwoxunplugged.com/p/23-things-i-have-learned-as-a-23</guid><dc:creator><![CDATA[Day Johnson]]></dc:creator><pubDate>Fri, 11 Apr 2025 12:00:56 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/160686405/a53c82c67466b38d0296d8b99715cb34.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>In today&#8217;s newsletter, I&#8217;m reflecting on 23 things I&#8217;ve learned at 23. Some are about cybersecurity, others are about life, mindset, and values. All of it is from my personal experience &#8212; take what resonates.</p><p>Let&#8217;s get into it.</p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cyberwox Unplugged! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><h3>1. <strong>Enjoy Work &amp; Embrace Discipline</strong></h3><p>As Gen Z, we&#8217;re often labeled as lazy or lacking discipline. But I&#8217;ve come to love the grind &#8212; not just in theory, but in action. I&#8217;ve learned to build a career I enjoy, and that makes all the difference. Work doesn&#8217;t feel like a burden when it aligns with purpose.</p><p><strong>Discipline? It&#8217;s the multiplier. It fuels your work, your habits, your life.</strong></p><div><hr></div><h3>2. <strong>Take Care of Your Physical Health</strong></h3><p>Your health is the foundation of everything, especially in a high-stress industry like cybersecurity. </p><p>Over the years, I&#8217;ve dialed in my sleep, diet, and training. Whether I&#8217;m cutting, bulking, lifting, or running, it helps me stay sharp. </p><p><strong>Fitness isn&#8217;t about looking a certain way &#8212; it&#8217;s about feeling your best so you can </strong><em><strong>be</strong></em><strong> your best.</strong></p><div><hr></div><h3>3. <strong>Relationships Matter More Than You Think</strong></h3><p>There was a season I didn&#8217;t prioritize friendships. I was isolated, anxious, and depressed. </p><p>But building meaningful connections with friends and family changed everything. </p><p><strong>You don&#8217;t always need deep talks &#8212; sometimes a FaceTime call or gym session with your best friend can recharge your whole spirit.</strong></p><div><hr></div><h3>4. <strong>Slow Progress Is Still Progress</strong></h3><p>I used to think speed was everything. But I&#8217;ve learned that consistent, steady progress &#8212; even if it&#8217;s slow &#8212; gets you further than burnout cycles.</p><p>The tortoise wins for a reason. </p><p><strong>Stay in your lane, keep showing up, and trust the compound effect.</strong></p><div><hr></div><h3>5. <strong>Procrastination Leads to Frustration</strong></h3><p>I&#8217;ve mastered the art of procrastination &#8212; and hated how it made me feel. The longer you delay a task, the more it hangs over you. </p><p>That mental weight turns into frustration, and it&#8217;s rarely worth it. </p><p><strong>Get it done. Get it off your mind.</strong></p><div><hr></div><h3>6. <strong>Be Present With Yourself</strong></h3><p>There&#8217;s power in silence. In not reaching for your phone. In driving without music. In sitting without distraction. Our brains are overstimulated. Presence gives you peace, clarity, and creativity. Practice being still. It changes how you work and how you think.</p><p>I&#8217;ve started doing small things: no music during drives, no podcast in the shower, no background noise while waiting in line. It helps me notice the world, my thoughts, and my environment. </p><p><strong>Stillness isn&#8217;t empty &#8212; it&#8217;s clarity.</strong></p><div><hr></div><h3>7. <strong>The Future Is Closer Than You Think</strong></h3><p>You blink and it&#8217;s five years later. I can vividly remember being 18, 19, 20 &#8212; it wasn&#8217;t that long ago. </p><p>You realize you could&#8217;ve started that project, changed that habit, made that move. Life moves fast. Time moves fast &#8212; faster than we think. Goals that feel far away will arrive quicker than you expect. </p><p><strong>If you&#8217;ve been delaying something, start now. The future is around the corner.</strong></p><div><hr></div><h3>8. <strong>The Future Is Also Further Than You Think</strong></h3><p>At the same time, one year is a lot of time. You can change your career, health, and relationships in a year. Heck, you can change your life in 6 months.</p><p>Two years is enough to break cycles, learn new skills, or move across the world. Don&#8217;t underestimate how much can be built slowly, with intention. </p><p><strong>Keep your head down and build. Let time work for you &#8212; and be consistent.</strong></p><div><hr></div><h3>9. <strong>If You Don&#8217;t Stand for Something, You&#8217;ll Fall for Everything</strong></h3><p>My dad said this to me growing up, and now it fully clicks. Without strong values, you become easily swayed by opinions, trends, and noise. </p><p>Stand firm in your beliefs, your ethics, your purpose &#8212; or risk living by someone else&#8217;s. </p><p><strong>Stay grounded. You can be open-minded and firm at the same time.</strong></p><div><hr></div><h3>10. <strong>You Rise to the Level of Your Standards</strong></h3><p>Set high standards for yourself. I do &#8212; in work, relationships, and goals. Not everyone will meet your standards, and that&#8217;s okay. Just don&#8217;t lower them to make others comfortable. </p><p><strong>Hold yourself accountable, and let others meet you where you are.</strong></p><div><hr></div><h3>11. <strong>Choose What You Let Stress You Out</strong></h3><p>Stress is inevitable; however, not all stress is equal. But you can <em>choose</em> what kind of stress you accept. </p><p>For me, I&#8217;m okay with my work stressing me out because I understand it and I can manage it. But unnecessary personal stress? That&#8217;s a no. </p><p><strong>Learn to say no to draining situations and yes to peace.</strong></p><div><hr></div><h3>12. <strong>Learn to Say &#8220;No&#8221; More</strong></h3><p>As someone who creates content and leads a community, I always want to help everyone. But I&#8217;ve learned I can&#8217;t &#8212; and that&#8217;s okay.  </p><p>I&#8217;ve had to learn to say no, even to good things, to focus on the right things. So, say no to things that don&#8217;t align with your capacity or priorities. </p><p><strong>Time and energy are finite. Protect them.</strong> </p><div><hr></div><h3>13. <strong>Say &#8220;Yes&#8221; More (To The Right Things)</strong></h3><p>On the flip side, say yes to opportunities that stretch you. </p><p><strong>Early in my journey, I said yes to everything &#8212; and it taught me what to say no to later.</strong> </p><p>Saying yes to jobs, projects, and partnerships helped me grow, collaborate, and build something meaningful.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iF0v!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" width="1456" height="570" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:570,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:188886,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/159067704?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F913f1923-04a0-4fe6-afb6-5e0fca6d78b1_2500x2500.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Join a vibrant cybersecurity community of around 6,000 people who are constantly engaging in conversations and supporting one another&#8212;covering topics from cybersecurity and college to certifications, resume assistance, and various non-professional interests like fitness, finance, anime, and other exciting subjects.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://discord.gg/cyberwoxacademy&quot;,&quot;text&quot;:&quot;Join Us!&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://discord.gg/cyberwoxacademy"><span>Join Us!</span></a></p><div><hr></div><h3>14. <strong>Do Something Outrageous Every Year</strong></h3><p>Push the limits. Not recklessly &#8212; but intentionally. Try something bold: a solo trip, a skydiving session, a new challenge. </p><p><strong>Remind yourself you&#8217;re capable of more than you think.</strong></p><div><hr></div><h3>15. <strong>Build Systems, Not Just Routines</strong></h3><p>Routines can become rigid. Life changes. But systems? Systems adapt. </p><p>When I shifted from evening workouts to morning kettlebell sessions, my system stayed the same &#8212; just the timing changed. </p><p><strong>Build adaptable structures around your life. Build frameworks that survive chaos.</strong></p><div><hr></div><h3>16. <strong>Read More</strong></h3><p>Most content today is diluted. Books go deeper. They give you the full picture, not just the summary. </p><p>Reading has helped me slow down, think clearer, and understand complex ideas. </p><p><strong>If you want to grow, read like it&#8217;s your job.</strong></p><div><hr></div><h3>17. <strong>Become a Better Communicator</strong></h3><p>Communication is one of the most underrated skills in both life and cybersecurity. Whether it's how you talk to your team, present in meetings, explain ideas, or connect with strangers &#8212; clear communication makes a massive difference.</p><p>Five years ago, I wasn&#8217;t as effective at communicating as I am now. Creating content, working in tech, and navigating corporate environments helped me learn how to listen better, ask better questions, and present myself more confidently. </p><p><strong>If you want to grow your influence, impact, or network &#8212; become a better communicator.</strong></p><div><hr></div><h3>18. <strong>Procrastination Robs You of the Life You Could&#8217;ve Lived</strong></h3><p>This one hit me hard. Procrastination isn&#8217;t just a delay &#8212; it's a thief. It steals potential. It quietly holds back the life you could be living right now. </p><p>I&#8217;ve had moments where I was like, &#8220;Man, if I had done this earlier, who knows where I&#8217;d be today?&#8221; I don&#8217;t want to live with that regret.</p><p>So I&#8217;m learning: Take action when the idea is fresh. </p><p><strong>Do the thing now, not someday. &#8220;Someday&#8221; often turns into &#8220;never.&#8221;</strong></p><div><hr></div><h3>19. <strong>You Can&#8217;t Always Be Present for Everyone</strong></h3><p>When you&#8217;re someone who genuinely cares about people, you want to be there for everyone &#8212; reply to every DM, support every friend, show up for every event.</p><p>But you can&#8217;t pour from an empty cup. I&#8217;ve learned to set boundaries. Some people only know how to take, and if you&#8217;re not careful, you&#8217;ll burn out trying to give them more than you have. </p><p><strong>Be present for the people who matter &#8212; but protect your own peace too.</strong></p><div><hr></div><h3>20. <strong>Obedience &gt; Sacrifice</strong></h3><p>This one comes from my faith. It&#8217;s possible to be doing &#8220;good&#8221; things &#8212; helping others, building things, making moves &#8212; and still be out of alignment with what God has called you to do.</p><p>I've learned that obedience to that purpose brings more peace than any sacrifice ever could.</p><p><strong>Sometimes the most powerful thing you can do isn&#8217;t to hustle harder &#8212; it&#8217;s to listen and follow the path you&#8217;re meant to walk.</strong></p><div><hr></div><h3>21. <strong>Embrace Chaos and Disruption</strong></h3><p>I like structure. I thrive in routine. But life doesn&#8217;t always play by your rules. Chaos happens &#8212; burnout, career shifts, heartbreak, unexpected opportunities.</p><p>In the past, those seasons would shake me. Now, I lean into them. I look at chaos as a chance to learn, adapt, and grow.</p><p><strong>Resilience isn&#8217;t built in comfort &#8212; it&#8217;s built when everything feels uncertain, and you keep showing up anyway.</strong></p><div><hr></div><h3>22. <strong>Don&#8217;t Prolong Unhealthy Relationships</strong></h3><p>Sometimes we hold on to relationships &#8212; friendships, romantic, or even family &#8212; because of history or guilt. But I&#8217;ve learned that if something is consistently unhealthy, it&#8217;s okay to let go.</p><p>You don&#8217;t have to hate them. You don&#8217;t have to make it dramatic. But you do have to protect your peace.</p><p><strong>Not every relationship is meant to last forever &#8212; and that&#8217;s okay.</strong></p><div><hr></div><h3>23. <strong>Keep God First</strong></h3><p>This is the foundation of everything for me. Every time I drift away from my faith, I feel it &#8212; mentally, spiritually, emotionally.</p><p>But when I&#8217;m aligned with God, everything falls into place. I don&#8217;t mean life becomes easy. I mean, life becomes <em>anchored</em>. I feel rooted and established. Unshakeable. Untouchable.</p><p>If I&#8217;ve learned one thing that will always guide me, it&#8217;s this: <strong>When I keep God first, I walk with peace, clarity, and confidence &#8212; no matter what season I&#8217;m in.</strong></p><div><hr></div><h1>Cyberwox Resources</h1><h4>Resources for your career</h4><p>&#128313;<a href="https://discord.gg.cyberwoxacademy/">Join the Cyberwox Academy Discord!!</a></p><p>&#128311; <a href="https://www.cyberstoriespodcast.com/podcast">Check out the episodes of the Cyberstories Podcast on your favorite platform</a></p><p>&#128313;<a href="https://daycyberwox.gumroad.com/l/cyberlearningframework">Cyberwox Cybersecurity Notion Templates for planning your career</a></p><p>&#128313;<a href="https://daycyberwox.gumroad.com/l/cybersecurityresume">Cyberwox Best Entry-Level Cybersecurity Resume Template</a></p><p>&#128313;<a href="https://www.linkedin.com/learning/introduction-to-aws-threat-detection/">Learn AWS Threat Detection with my LinkedIn Learning Course</a></p><h1>Recent Content</h1><p><em>A few publications I&#8217;ve released recently.</em></p><p><strong>Governance, Risk &amp; Compliance (GRC) Engineering with Ayoub Fandi | Cyber Stories Podcast EP 24</strong></p><p>A conversation with Ayoub Fandi, a Staff Security Assurance Engineer at Gitlab and host of the GRC Engineering Podcast, as we discuss transforming GRC from a cost center into a strategic product through automation and engineering. </p><p>Ayoub shares his journey from aspiring economist to successful cybersecurity professional. We explore whether GRC is technical and introduce GRC engineering, which uses engineering practices to enhance governance, risk, and compliance. We highlight the shift in GRC professionals' backgrounds and how technical skills improve GRC workflows. </p><p>We also emphasize the importance of cybersecurity knowledge in GRC roles and what it means to operate at the staff level. </p><p>This conversation offers invaluable insights for aspiring staff engineers, including advice on getting into GRC and building a career in GRC Engineering.</p><div id="youtube2-bPpnRVj-Xy0" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;bPpnRVj-Xy0&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/bPpnRVj-Xy0?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:159477334,&quot;url&quot;:&quot;https://www.cyberstoriespodcast.com/p/governance-risk-and-compliance-grc-3bd&quot;,&quot;publication_id&quot;:2973795,&quot;publication_name&quot;:&quot;Cyber Stories Podcast&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00a8c60c-50a7-4a5b-a9fb-49554d9197e8_1280x1280.png&quot;,&quot;title&quot;:&quot;Governance, Risk &amp; Compliance (GRC) Engineering with Ayoub Fandi&quot;,&quot;truncated_body_text&quot;:&quot;A conversation with Ayoub Fandi, a Staff Security Assurance Engineer at Gitlab and host of the GRC Engineering Podcast, as we discuss transforming GRC from a cost center into a strategic product through automation and engineering. Ayoub shares his journey from aspiring economist to successful cybersecurity professional. We explore whether GRC is technic&#8230;&quot;,&quot;date&quot;:&quot;2025-03-20T12:00:00.000Z&quot;,&quot;like_count&quot;:1,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:172540827,&quot;name&quot;:&quot;Day Johnson&quot;,&quot;handle&quot;:&quot;cyberwox&quot;,&quot;previous_name&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/320cfa44-ac32-40b3-8e06-97497673fd1f_4096x4096.jpeg&quot;,&quot;bio&quot;:&quot;&#10013;&#65039; | Cybersecurity Engineer @Amazon (Ex-Datadog &amp; Optiv). Building a fulfilling cybersecurity engineering career.&quot;,&quot;profile_set_up_at&quot;:&quot;2023-10-02T06:56:32.769Z&quot;,&quot;publicationUsers&quot;:[{&quot;id&quot;:1994687,&quot;user_id&quot;:172540827,&quot;publication_id&quot;:1996296,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:1996296,&quot;name&quot;:&quot;Cyberwox Unplugged&quot;,&quot;subdomain&quot;:&quot;cyberwox&quot;,&quot;custom_domain&quot;:&quot;www.cyberwoxunplugged.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Sharing my cybersecurity engineering career learnings with anecdotes from life.&quot;,&quot;logo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8f98062e-b3db-4b1d-9b38-1525ae2212c9_1280x1280.png&quot;,&quot;author_id&quot;:172540827,&quot;theme_var_background_pop&quot;:&quot;#9A6600&quot;,&quot;created_at&quot;:&quot;2023-10-02T06:56:50.705Z&quot;,&quot;email_from_name&quot;:&quot;Day Johnson from CYBERWOX&quot;,&quot;copyright&quot;:&quot;Dayspring Johnson&quot;,&quot;founding_plan_name&quot;:&quot;Founding Member&quot;,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false,&quot;payments_state&quot;:&quot;disabled&quot;,&quot;language&quot;:null,&quot;explicit&quot;:false,&quot;homepage_type&quot;:&quot;newspaper&quot;,&quot;is_personal_mode&quot;:false}},{&quot;id&quot;:3024612,&quot;user_id&quot;:172540827,&quot;publication_id&quot;:2973795,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:2973795,&quot;name&quot;:&quot;Cyber Stories Podcast&quot;,&quot;subdomain&quot;:&quot;cyberstoriespodcast&quot;,&quot;custom_domain&quot;:&quot;www.cyberstoriespodcast.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Conversations with Tech &amp; Cybersecurity Professionals from diverse backgrounds, experiences, and points of view on building a successful career.&quot;,&quot;logo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/00a8c60c-50a7-4a5b-a9fb-49554d9197e8_1280x1280.png&quot;,&quot;author_id&quot;:172540827,&quot;theme_var_background_pop&quot;:&quot;#FF6719&quot;,&quot;created_at&quot;:&quot;2024-09-04T05:36:02.914Z&quot;,&quot;email_from_name&quot;:&quot;Day Johnson from CYBERWOX&quot;,&quot;copyright&quot;:&quot;Day Johnson&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false,&quot;payments_state&quot;:&quot;disabled&quot;,&quot;language&quot;:null,&quot;explicit&quot;:false,&quot;homepage_type&quot;:&quot;newspaper&quot;,&quot;is_personal_mode&quot;:false}}],&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:&quot;podcast&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://www.cyberstoriespodcast.com/p/governance-risk-and-compliance-grc-3bd?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!Y3kp!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00a8c60c-50a7-4a5b-a9fb-49554d9197e8_1280x1280.png" loading="lazy"><span class="embedded-post-publication-name">Cyber Stories Podcast</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title-icon"><svg width="19" height="19" viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg">
  <path d="M3 18V12C3 9.61305 3.94821 7.32387 5.63604 5.63604C7.32387 3.94821 9.61305 3 12 3C14.3869 3 16.6761 3.94821 18.364 5.63604C20.0518 7.32387 21 9.61305 21 12V18" stroke-linecap="round" stroke-linejoin="round"></path>
  <path d="M21 19C21 19.5304 20.7893 20.0391 20.4142 20.4142C20.0391 20.7893 19.5304 21 19 21H18C17.4696 21 16.9609 20.7893 16.5858 20.4142C16.2107 20.0391 16 19.5304 16 19V16C16 15.4696 16.2107 14.9609 16.5858 14.5858C16.9609 14.2107 17.4696 14 18 14H21V19ZM3 19C3 19.5304 3.21071 20.0391 3.58579 20.4142C3.96086 20.7893 4.46957 21 5 21H6C6.53043 21 7.03914 20.7893 7.41421 20.4142C7.78929 20.0391 8 19.5304 8 19V16C8 15.4696 7.78929 14.9609 7.41421 14.5858C7.03914 14.2107 6.53043 14 6 14H3V19Z" stroke-linecap="round" stroke-linejoin="round"></path>
</svg></div><div class="embedded-post-title">Governance, Risk &amp; Compliance (GRC) Engineering with Ayoub Fandi</div></div><div class="embedded-post-body">A conversation with Ayoub Fandi, a Staff Security Assurance Engineer at Gitlab and host of the GRC Engineering Podcast, as we discuss transforming GRC from a cost center into a strategic product through automation and engineering. Ayoub shares his journey from aspiring economist to successful cybersecurity professional. We explore whether GRC is technic&#8230;</div><div class="embedded-post-cta-wrapper"><div class="embedded-post-cta-icon"><svg width="32" height="32" viewBox="0 0 24 24" xmlns="http://www.w3.org/2000/svg">
  <path classname="inner-triangle" d="M10 8L16 12L10 16V8Z" stroke-width="1.5" stroke-linecap="round" stroke-linejoin="round"></path>
</svg></div><span class="embedded-post-cta">Listen now</span></div><div class="embedded-post-meta">a year ago &#183; 1 like &#183; Day Johnson</div></a></div><p><strong>FAANG Cybersecurity Engineer Reacts to Cybersecurity TikTok Advice</strong></p><p>Bringing some cybersecurity reaction content back to the timeline...this one was a mixed bag. Lots of really great advice and some really bad</p><div id="youtube2-eYo_CIsvJOI" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;eYo_CIsvJOI&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/eYo_CIsvJOI?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p><strong>How To Learn Cybersecurity Fundamentals - Computer Networking (Breakdown)</strong></p><p>For the longest time, I've been a strong proponent of learning cybersecurity fundamentals, especially computer networking. This video demonstrates how to approach this.</p><div id="youtube2-cOI-a5vWzYs" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;cOI-a5vWzYs&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/cOI-a5vWzYs?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p><strong>23 Things I Have Learned As a 23 Year Old Cybersecurity Engineer ~ Day's Engineering Diary EP14</strong></p><p>The YouTube version of this post!</p><div id="youtube2-sJ9Liz3K1e4" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;sJ9Liz3K1e4&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/sJ9Liz3K1e4?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h1>Closing</h1><p>Once again, you made it this far :)</p><p>These aren&#8217;t just things I&#8217;ve learned &#8212; they&#8217;re things I&#8217;m living through. 23 has already come with its own challenges and lessons, but I&#8217;ve never felt more grounded, focused, and expectant. If anything here resonated with you, thank you for reading.</p><p>Feel free to reply, share your own lesson, or pass this on to someone who needs it.</p><p>Thanks for reading. If you so desire, subscribe and restack - it helps spread the word and keeps me writing content. If not, I&#8217;ll see you around&#8230;somewhere on the internet!</p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cyberwox Unplugged! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div>]]></content:encoded></item><item><title><![CDATA[Fastest Way To Become a Cybersecurity Engineer ]]></title><description><![CDATA[A guide through process for becoming a cybersecurity engineer, with a special focus on Defensive Security Operations Engineering.]]></description><link>https://www.cyberwoxunplugged.com/p/fastest-way-to-become-a-cybersecurity</link><guid isPermaLink="false">https://www.cyberwoxunplugged.com/p/fastest-way-to-become-a-cybersecurity</guid><dc:creator><![CDATA[Day Johnson]]></dc:creator><pubDate>Fri, 14 Mar 2025 15:45:20 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/159067704/edb0e6eeac5dfabb603095c2eea51a91.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<h1>Introductions</h1><p>I'm going to guide you through the process of becoming a cybersecurity engineer, with a special focus on Defensive Security Operations Engineering, which includes high-demand roles like threat detection and incident response.</p><p>These roles are crucial in defending organizations from cyber threats and are highly technical and among the most demanded and well-compensated in the cybersecurity field.</p><h2>About Me</h2><p>If you&#8217;re new here, my name is Day, and I&#8217;m a Security Engineer at Amazon with a previous focus on Incident Response Engineering and a current focus on Proactive Security Operations covering Threat Hunting, Threat Intelligence, &amp; Adversarial Emulation.</p><p>In the past, I&#8217;ve worked as a Detection Engineer at Datadog, where I focused on Cloud, Network, Endpoints, and SaaS Applications. And have also previously worked as a Tier 1/Tier 2 Analyst at various SOCs &amp; MDRs.</p><p>With all of this experience, I will give you a step-by-step road map to get you to become a cyber security engineer even if you don't have a degree or any technical knowledge yet; as a matter of fact, this newsletter has no college education requirements.</p><p>I personally was able to break into cybersecurity as early as my freshman year of college. I&#8217;ve gotten several jobs and interviews prior to ever having a college degree, and I&#8217;ve helped thousands of people do the same on my various content channels and in my Discord Community.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iF0v!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png" width="2500" height="979" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:979,&quot;width&quot;:2500,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:188886,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/159067704?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F913f1923-04a0-4fe6-afb6-5e0fca6d78b1_2500x2500.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!iF0v!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 424w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 848w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1272w, https://substackcdn.com/image/fetch/$s_!iF0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba71e4f8-2d28-4fd6-9a78-c966708c46a6_2500x979.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Join a vibrant cybersecurity community of over 6,000 people who are constantly engaging in conversations and supporting one another&#8212;covering topics from cybersecurity and college to certifications, resume assistance, and various non-professional interests like fitness, finance, anime, and other exciting subjects.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://discord.gg/cyberwoxacademy&quot;,&quot;text&quot;:&quot;Join Us!&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://discord.gg/cyberwoxacademy"><span>Join Us!</span></a></p><div><hr></div><h1>Establishing a Foundation</h1><p>When you&#8217;re getting started on your journey to becoming a Security Engineer, this journey can start from various points, whether you're currently in an IT role, such as a network engineer or a systems administrator, or even in a Security Role, like a SOC analyst, or entirely outside the tech industry, such as nursing or retail.</p><p>The critical first step you need to take is understanding the fundamental concepts of cybersecurity, which will form the backbone of your expertise in threat detection or incident response.</p><h2>Educational Pathways and Certifications</h2><p>To build a strong foundation in cybersecurity, I recommend pursuing certifications &amp; training that provide a blend of theoretical knowledge and practical experience.</p><h3>Cybersecurity Basics</h3><p>Opt for industry-recognized certifications like Google&#8217;s cybersecurity certificate or Microsoft&#8217;s cybersecurity analyst certification.</p><p>These programs are specifically designed to equip you with essential skills and include hands-on labs, which are crucial for grasping the intricacies of security operations.</p><p>The great thing about the hands-on labs is you get to practice what you learn, so things make a lot more sense when you&#8217;re using those skills in the real world as a cybersecurity engineer.</p><p>The <a href="https://imp.i384100.net/B0Kz3J">Google Cybersecurity Training</a> includes labs that teach you Linux, which is a core skill for any cybersecurity engineer; MySQL, which will help you understand the basics of data analytics; and Python, which will be super important for scripting and automation - more on this later in the newsletter.</p><p>I also like that this program prepares you for CompTIA Security+, which is a staple foundational certification in the security industry.</p><div><hr></div><p><em>My first impressions of the Google Cybersecurity Professional Certificate:</em></p><div id="youtube2-2VD6zvkgVfw" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;2VD6zvkgVfw&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/2VD6zvkgVfw?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><p>On the other hand, the <a href="https://imp.i384100.net/baPM4v">Microsoft Cybersecurity Analyst</a> Training will introduce you to the Microsoft Azure cloud and the Microsoft Sentinel platform - this is great because you get an introduction to a top cloud provider and, on the other hand, atop SIEM (Security Information &amp; Event Management).</p><p>This program also prepares you for the Microsoft Security Operations Analyst Certification, which is also another great certification.</p><div><hr></div><p><em>Is the Microsoft Cybersecurity Analyst Certificate Worth It?:</em></p><div id="youtube2-LHSDy97CtVw" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;LHSDy97CtVw&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/LHSDy97CtVw?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h3>Computer Networking</h3><p>Another foundational skill that you need to give significant consideration to and should never be overlooked if you want to become a proficient and effective cybersecurity engineer is an understanding of computer networking.</p><p>This skill is integral to cybersecurity as it provides the necessary knowledge to comprehend how data moves and communicates across systems.</p><p>You&#8217;ll need to understand the basics of IP addressing, Public &amp; Private IP addresses, Network Address Translation or NAT, CIDR Notation, routing, network ports &amp; protocols like HTTP, DNS, SSH, LDAP, etc.</p><p>You&#8217;ll also need to know the basics of Network Types &amp; Topologies like peer-to-peer, client-to-server, Local Area Networks or LAN, Wide Area Networks or WAN, and so on.</p><p>All these can be learned from a good CompTIA Network+ course like the one from Professor Messer here on YouTube or paid ones on Udemy from Jason Dion.</p><p>Now, you don&#8217;t necessarily have to take this certification, but the knowledge you&#8217;ll gain from understanding how networks work will be extremely invaluable to your cybersecurity career.</p><p>I&#8217;ve landed several jobs, including my current job, just because of how I showed my strong understanding of networking during my interviews - do not overlook this skill at all.</p><p>Heck, dare I say you can not be a competent Cybersecurity Engineer without the basics of networking.</p><div><hr></div><p><em>In this mini-course, we're going back to the basics. Many cybersecurity professionals don't fully understand how standard protocols and networking concepts work, largely because they've never interacted with these protocols beyond the theoretical level.</em></p><p><em>Think about it&#8212;have you ever seen how DHCP or ARP packets work? Do you genuinely understand packet encapsulation and decapsulation? Have you seen how TCP sessions end with reset packets or witnessed a TCP 3-way handshake? You'll find this mini-course valuable if you answered no to any of these questions. </em></p><p><em>In just over an hour, you'll level up your networking and protocol knowledge. My goal is to transform your theoretical knowledge from CompTIA Network+ or Security+ into practical understanding by showing you how to interact with these protocols and demystifying the complexities of computer networking.</em></p><div id="youtube2-o99nZlTNGqQ" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;o99nZlTNGqQ&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/o99nZlTNGqQ?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div class="pullquote"><p><strong>ANY.RUN Security Training Lab</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!QHnK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcaf355a3-b7d7-45c4-8613-5c0bd4277ffa_1600x500.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!QHnK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcaf355a3-b7d7-45c4-8613-5c0bd4277ffa_1600x500.png 424w, https://substackcdn.com/image/fetch/$s_!QHnK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcaf355a3-b7d7-45c4-8613-5c0bd4277ffa_1600x500.png 848w, https://substackcdn.com/image/fetch/$s_!QHnK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcaf355a3-b7d7-45c4-8613-5c0bd4277ffa_1600x500.png 1272w, https://substackcdn.com/image/fetch/$s_!QHnK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcaf355a3-b7d7-45c4-8613-5c0bd4277ffa_1600x500.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!QHnK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcaf355a3-b7d7-45c4-8613-5c0bd4277ffa_1600x500.png" width="1456" height="455" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/caf355a3-b7d7-45c4-8613-5c0bd4277ffa_1600x500.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:455,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:22296,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberwoxunplugged.com/i/159067704?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcaf355a3-b7d7-45c4-8613-5c0bd4277ffa_1600x500.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!QHnK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcaf355a3-b7d7-45c4-8613-5c0bd4277ffa_1600x500.png 424w, https://substackcdn.com/image/fetch/$s_!QHnK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcaf355a3-b7d7-45c4-8613-5c0bd4277ffa_1600x500.png 848w, https://substackcdn.com/image/fetch/$s_!QHnK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcaf355a3-b7d7-45c4-8613-5c0bd4277ffa_1600x500.png 1272w, https://substackcdn.com/image/fetch/$s_!QHnK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcaf355a3-b7d7-45c4-8613-5c0bd4277ffa_1600x500.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Gain practical knowledge, examine real-life scenarios, and become a cyber defense specialist with ANY.RUN's malware analysis course.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://bit.ly/cwx-anyrun-security-training-yt&quot;,&quot;text&quot;:&quot;Learn Malware Analysis!&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://bit.ly/cwx-anyrun-security-training-yt"><span>Learn Malware Analysis!</span></a></p></div><h1>Specialized Learning in Threat Detection</h1><p>Now, let&#8217;s talk about specializing in Threat Detection Engineering or Incident Response Engineering.</p><p>If your interest lies in any of these roles, you&#8217;ll typically be told that it's super important to become proficient in using monitoring and detection tools like Splunk or Crowdstrike, and while I think that is somewhat right, it is a half-truth.</p><p>All monitoring tools or detection tools are built on the foundation of native telemetry already provided by the system, be it cloud or Linux Windows - whatever the case is.</p><p>If you do not understand how these systems work or the threat against them, it does not matter how great you are at Splunk; you&#8217;ll never be able to detect anything.</p><p>This is precisely why I recommend understanding how a system works before trying to learn how to detect threats to it.</p><p>Let me give you a real-life example.</p><p>I was very new to the cloud when I first got my last job at Datadog. I had never done cloud detection engineering, but I had worked on some cloud security investigations in my previous roles as a SOC analyst.</p><p>However, in order to build detection rules and mechanisms for cloud threats, I first had to understand how the cloud worked.</p><p>One of my main projects was expanding our detection ruleset for Google Cloud, but I had never worked with Google Cloud in my life, so what did I do?</p><p>I dove into the documentation of Google Cloud, how IAM works, how the projects and organizations work, how resources are configured, service accounts, and several other things.</p><p>And you know how that helped me? In a matter of weeks, I was able to start building and testing detections for Google Cloud; I co-wrote an article on <a href="https://securitylabs.datadoghq.com/articles/google-cloud-threat-detection/">Google Cloud threat detection</a> and even gave multiple talks on <a href="https://youtu.be/orNBBHKayiY?si=Kuve0OcGTKE8mR3v">Google Cloud Threat Detection</a>.</p><p>The moral of the story here is to replace Google Cloud with anything here - it could be Linux, windows, IOT, heck, it could be iPhones or Androids; the point I&#8217;m trying to get across is you need to understand the system, its intended use, and its weaknesses before you can detect any threats against it.</p><p>After this, you can then start learning tools like Splunk or Crowdstrike. The great thing about Splunk is that they offer free training that can take you from knowing nothing about it to becoming pretty decent at it.</p><p>You can also go through various tryhackme rooms that help guide you on Splunk and investigating with it. You can even deploy your own Splunk instance and ingest logs into it, as I&#8217;ve outlined in my cybersecurity home lab project.</p><p>I&#8217;ve made some videos on this, which you can find in my SecOps &amp; Investigations playlist <a href="https://www.youtube.com/playlist?list=PLDqMNdDvMsRnxDcvhn6axOZ-8vP6LLkWo">here</a>.</p><p>A combination of strong system understanding and Splunk (or other SIEM tool) engineering will make you very suitable for detection engineering or threat detection roles.</p><p>The same thing applies to incident response. This specialization requires a thorough understanding of response processes and recovery strategies, and learning to manage and respond to security incidents effectively is key, but you&#8217;ll still need to understand the underlying system.</p><div><hr></div><p><em>Deciding between Threat Detection and Incident Response:</em></p><div id="youtube2-8E92UG3Vw0A" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;8E92UG3Vw0A&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/8E92UG3Vw0A?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p><em>Transitioning between Threat Detection &amp; Incident Response:</em> </p><div id="youtube2-oPgdzt23XSI" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;oPgdzt23XSI&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/oPgdzt23XSI?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h1>Advanced Training in Incident Response</h1><p>Now, how do you begin to build the core skills for these roles? This in itself is a whole breakdown, which I&#8217;ve covered in a previous video, covering several certifications and training to consider for various skills you might be looking to learn.</p><p>Everything from the BTL1 to the CDSA, BTL2, CCD and others.</p><p>In regards to training providers like Constructing Defense,13 Cubed, TCM Security DFIR DIVA, Purple Labs, XINTRA, and several others.</p><p><em>I highly suggest watching the video:</em></p><div id="youtube2-7fzLaywQixY" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;7fzLaywQixY&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/7fzLaywQixY?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><h1>Hands-on practice and continuous learning</h1><p>Now let&#8217;s talk about practice and labbing.</p><p>It is crucial to master the tools specific to your chosen specialization&#8212;whether threat detection systems like SIEM for detecting attacks or incident response techniques for mitigating them.</p><p>Each tool and technique requires a deep understanding of specific aspects of cybersecurity, such as network traffic analysis or log analysis for threat detection or forensics and crisis management for incident response.</p><p>So here are some platforms to help you practice these skills:</p><ul><li><p>ACE Defender</p></li><li><p>BTLO</p></li><li><p>THM</p></li><li><p>Pwned Labs</p></li><li><p>HackTheBox Sherlocks</p></li><li><p>LetsDefend</p></li><li><p>Cyber Defenders</p></li><li><p>RangeForce</p></li></ul><p>Applying your knowledge through these real-world simulations and practical labs is essential.</p><p>Start with foundational training on platforms like TryHackMe, which covers everything from basic security principles to complex system and application security tasks.</p><p>Then, advance to more specialized modules that focus on the intricacies of network and system security, malware analysis, incident management, etc.</p><h1>Building Scripting and Automation Skills</h1><p>The next thing you need to build on is your scripting and automation skills. In threat detection and incident response, having scripting and automation skills is very important.</p><p>You&#8217;ll need to automate redundant processes or make things more efficient, and scripting helps with this.</p><p>One of the best languages to start with is Python due to its simplicity and powerful capabilities.</p><p>Python is widely used in cybersecurity for automating repetitive tasks, parsing large amounts of data, and developing software tools.</p><p>With Python, you can automate boring or repetitive tasks and focus more on the strategic aspects of your job, such as threat analysis and incident response.</p><p>Starting with the basics, there are many online resources available to learn Python. I personally recommend learning Python the hard way through Zed Shaw, Code with Mosh&#8217;s Python course, and&nbsp;<a href="https://app.codecrafters.io/join?via=daycyberwox">Code Crafters</a>.</p><p>However, Codecademy, Coursera, and edX offer beginner-friendly courses that teach you Python programming fundamentals.</p><p>The key thing here is to pick a course and stick with it long enough to build your Python skills.</p><p>Once you have a good grasp of the basics, you can start exploring modules and libraries used explicitly in cybersecurity, such as Scapy for network analysis, pandas for data analysis, JSON for parsing JSON files, requests for making web requests, or BeautifulSoup for web scraping.</p><p>Also, various platforms provide cybersecurity-focused Python challenges that allow you to apply your newly acquired skills in practical scenarios.</p><p>For example, HackInScience&#8217;s Python challenges or Programming Hero&#8217;s 100-plus Python coding challenges are great resources for learning and practicing Python in cybersecurity.</p><p>Remember, the goal is not to become a software developer but to use Python to enhance your threat detection and incident response capabilities.</p><p>Therefore, focus on practical applications of Python in cybersecurity, such as automating data analysis, building simple tools, or integrating different security solutions using APIs.</p><p>Some other languages to consider will be Golang &amp; Javascript, as they also help in various cybersecurity automation and integration workflows.</p><p>For scripting, Powershell for Windows and Bash for Linux.</p><h1>Auxiliary Skills - Cloud &amp; IaC</h1><p>In addition to learning a programming language, understanding cloud and Infrastructure-as-Code is a crucial auxiliary skill for cybersecurity engineers focused on threat detection or incident response.</p><p>Cloud knowledge is essential because many organizations are shifting their operations and data storage to cloud-based solutions.</p><p>Therefore, cybersecurity engineers need to understand how to deploy and build security tools in the cloud, secure cloud-based infrastructure, how the data flow is managed, and how access controls work in a cloud environment.</p><p>They should be familiar with platforms such as AWS, Google Cloud, or Azure.</p><p>In addition to this, Infrastructure-as-Code (IaC) is a key concept in modern IT operations. It involves managing and provisioning computing infrastructure through machine-readable scripts rather than manual processes.</p><p>For a cybersecurity engineer, understanding IaC can help in automating security controls and policies.</p><p>It allows them to integrate security earlier in the development lifecycle, enabling a 'shift-left' in security that results in more secure and scalable systems.</p><p>Tools commonly used for IaC include Terraform, Ansible, Chef, Puppet, and many others.</p><h1>Projects</h1><p>In order to bring everything together, working on a few personal projects relating to cybersecurity can be an excellent way to strengthen and solidify these skills.</p><p>This can involve utilizing a range of tools such as Security Information and Event Management systems (SIEMs), Cloud technologies, Python programming, and Infrastructure as Code (IaC).</p><p>By actively building out these projects, you are able to gain hands-on experience and a deeper understanding of the intricacies involved in these various cybersecurity tools and how they work together.</p><p>Furthermore, these projects can serve as tangible evidence of your skills and knowledge, which can be outlined on your resume, and this not only enhances your professional profile but also provides you with concrete examples and experiences to draw upon during job interviews.</p><p>Ultimately, these personal projects can significantly boost your confidence and competence as a cybersecurity engineer.</p><h1>Choosing a Pathway in Security Operations Engineering</h1><p>Now, once you&#8217;ve established a solid foundation and gained some hands-on experience, it's time to choose a specific pathway within Security Operations Engineering.</p><p>Whether you decide to focus on threat detection or incident response, your path should be guided by both your interests and the specific needs of the job market.</p><p>Bear in mind that Cybersecurity is a field defined by rapid evolution and constant change.</p><p>Continuing your professional development through ongoing education, staying updated on the latest threats, and continually refining your practical skills are going to be necessary for your growth as a cybersecurity engineer.</p><h1>Cyberwox Resources</h1><h4>Resources for your career</h4><p>&#128313;<a href="https://discord.gg.cyberwoxacademy/">Join the Cyberwox Academy Discord!!</a></p><p>&#128311; <a href="https://www.cyberstoriespodcast.com/podcast">Check out the episodes of the Cyberstories Podcast on your favorite platform</a></p><p>&#128313;<a href="https://daycyberwox.gumroad.com/l/cyberlearningframework">Cyberwox Cybersecurity Notion Templates for planning your career</a></p><p>&#128313;<a href="https://daycyberwox.gumroad.com/l/cybersecurityresume">Cyberwox Best Entry-Level Cybersecurity Resume Template</a></p><p>&#128313;<a href="https://www.linkedin.com/learning/introduction-to-aws-threat-detection/">Learn AWS Threat Detection with my LinkedIn Learning Course</a></p><h1>Recent Content</h1><p><em>A few publications I&#8217;ve released recently.</em></p><p><strong>The Cybersecurity Bootcamp Industry &amp; Level Effect w/ Anthony Bendas | Cyber Stories Podcast EP 23</strong></p><p>A conversation with Anthony Bendas - Co-Founder at Level Effect, where he designs and delivers cutting-edge cybersecurity training programs, including the Cyber Defense Analyst Program. With over a decade of experience spanning penetration testing, security consulting, and engineering, he has built a reputation for translating complex security concepts into practical, real-world applications.</p><div id="youtube2-_Amglqhmg2E" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;_Amglqhmg2E&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/_Amglqhmg2E?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:157966414,&quot;url&quot;:&quot;https://www.cyberstoriespodcast.com/p/the-cybersecurity-bootcamp-industry-47d&quot;,&quot;publication_id&quot;:2973795,&quot;publication_name&quot;:&quot;Cyber Stories Podcast&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00a8c60c-50a7-4a5b-a9fb-49554d9197e8_1280x1280.png&quot;,&quot;title&quot;:&quot;The Cybersecurity Bootcamp Industry &amp; Level Effect with Anthony Bendas&quot;,&quot;truncated_body_text&quot;:&quot;A conversation with Anthony Bendas - Co-Founder at Level Effect, where he designs and delivers cutting-edge cybersecurity training programs, including the Cyber Defense Analyst Program. With over a decade of experience spanning penetration testing, security consulting, and engineering, he has built a reputation for translating complex security concepts &#8230;&quot;,&quot;date&quot;:&quot;2025-02-26T14:54:38.000Z&quot;,&quot;like_count&quot;:1,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:172540827,&quot;name&quot;:&quot;Day Johnson&quot;,&quot;handle&quot;:&quot;cyberwox&quot;,&quot;previous_name&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/320cfa44-ac32-40b3-8e06-97497673fd1f_4096x4096.jpeg&quot;,&quot;bio&quot;:&quot;Christian | Cybersecurity Engineer @Amazon (Ex-Datadog &amp; Optiv). Helping you build a fulfilling cybersecurity engineering career.&quot;,&quot;profile_set_up_at&quot;:&quot;2023-10-02T06:56:32.769Z&quot;,&quot;publicationUsers&quot;:[{&quot;id&quot;:1994687,&quot;user_id&quot;:172540827,&quot;publication_id&quot;:1996296,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:1996296,&quot;name&quot;:&quot;Cyberwox Unplugged&quot;,&quot;subdomain&quot;:&quot;cyberwox&quot;,&quot;custom_domain&quot;:&quot;www.cyberwoxunplugged.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Sharing my cybersecurity engineering career learnings with anecdotes from life.&quot;,&quot;logo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8f98062e-b3db-4b1d-9b38-1525ae2212c9_1280x1280.png&quot;,&quot;author_id&quot;:172540827,&quot;theme_var_background_pop&quot;:&quot;#9A6600&quot;,&quot;created_at&quot;:&quot;2023-10-02T06:56:50.705Z&quot;,&quot;email_from_name&quot;:&quot;Day Johnson from CYBERWOX&quot;,&quot;copyright&quot;:&quot;Day Johnson&quot;,&quot;founding_plan_name&quot;:&quot;Founding Member&quot;,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false,&quot;payments_state&quot;:&quot;disabled&quot;,&quot;language&quot;:null,&quot;explicit&quot;:false,&quot;is_personal_mode&quot;:false}},{&quot;id&quot;:3024612,&quot;user_id&quot;:172540827,&quot;publication_id&quot;:2973795,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:2973795,&quot;name&quot;:&quot;Cyber Stories Podcast&quot;,&quot;subdomain&quot;:&quot;cyberstoriespodcast&quot;,&quot;custom_domain&quot;:&quot;www.cyberstoriespodcast.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Conversations with Tech &amp; Cybersecurity Professionals from diverse backgrounds, experiences, and points of view on building a successful career.&quot;,&quot;logo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/00a8c60c-50a7-4a5b-a9fb-49554d9197e8_1280x1280.png&quot;,&quot;author_id&quot;:172540827,&quot;theme_var_background_pop&quot;:&quot;#FF6719&quot;,&quot;created_at&quot;:&quot;2024-09-04T05:36:02.914Z&quot;,&quot;email_from_name&quot;:&quot;Day Johnson from CYBERWOX&quot;,&quot;copyright&quot;:&quot;Day Johnson&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false,&quot;payments_state&quot;:&quot;disabled&quot;,&quot;language&quot;:null,&quot;explicit&quot;:false,&quot;is_personal_mode&quot;:false}}],&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:&quot;podcast&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://www.cyberstoriespodcast.com/p/the-cybersecurity-bootcamp-industry-47d?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!Y3kp!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00a8c60c-50a7-4a5b-a9fb-49554d9197e8_1280x1280.png" loading="lazy"><span class="embedded-post-publication-name">Cyber Stories Podcast</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title-icon"><svg width="19" height="19" viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg">
  <path d="M3 18V12C3 9.61305 3.94821 7.32387 5.63604 5.63604C7.32387 3.94821 9.61305 3 12 3C14.3869 3 16.6761 3.94821 18.364 5.63604C20.0518 7.32387 21 9.61305 21 12V18" stroke-linecap="round" stroke-linejoin="round"></path>
  <path d="M21 19C21 19.5304 20.7893 20.0391 20.4142 20.4142C20.0391 20.7893 19.5304 21 19 21H18C17.4696 21 16.9609 20.7893 16.5858 20.4142C16.2107 20.0391 16 19.5304 16 19V16C16 15.4696 16.2107 14.9609 16.5858 14.5858C16.9609 14.2107 17.4696 14 18 14H21V19ZM3 19C3 19.5304 3.21071 20.0391 3.58579 20.4142C3.96086 20.7893 4.46957 21 5 21H6C6.53043 21 7.03914 20.7893 7.41421 20.4142C7.78929 20.0391 8 19.5304 8 19V16C8 15.4696 7.78929 14.9609 7.41421 14.5858C7.03914 14.2107 6.53043 14 6 14H3V19Z" stroke-linecap="round" stroke-linejoin="round"></path>
</svg></div><div class="embedded-post-title">The Cybersecurity Bootcamp Industry &amp; Level Effect with Anthony Bendas</div></div><div class="embedded-post-body">A conversation with Anthony Bendas - Co-Founder at Level Effect, where he designs and delivers cutting-edge cybersecurity training programs, including the Cyber Defense Analyst Program. With over a decade of experience spanning penetration testing, security consulting, and engineering, he has built a reputation for translating complex security concepts &#8230;</div><div class="embedded-post-cta-wrapper"><div class="embedded-post-cta-icon"><svg width="32" height="32" viewBox="0 0 24 24" xmlns="http://www.w3.org/2000/svg">
  <path classname="inner-triangle" d="M10 8L16 12L10 16V8Z" stroke-width="1.5" stroke-linecap="round" stroke-linejoin="round"></path>
</svg></div><span class="embedded-post-cta">Listen now</span></div><div class="embedded-post-meta">a year ago &#183; 1 like &#183; Day Johnson</div></a></div><p><strong>Building a DNS Server with Python - 1 (Repo &amp; UDP Server Setup)</strong></p><p>Starting a series on building a DNS Server with Python - guided by <a href="https://app.codecrafters.io/join?via=daycyberwox">Code Crafters</a>.</p><div id="youtube2-D5QrZLy1zIo" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;D5QrZLy1zIo&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/D5QrZLy1zIo?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p><strong>The Truth About The TryHackMe SAL1 Certification (Complete Review)</strong></p><p>A breakdown of <a href="https://tryhackme.com/certification/security-analyst-level-1?utm_source=youtube&amp;utm_medium=social&amp;utm_campaign=daycyberworx_sal1">TryHackMe&#8217;s new SAL1 Certification</a>.</p><div id="youtube2-w0Fq0BvteyA" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;w0Fq0BvteyA&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/w0Fq0BvteyA?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p><strong>Fastest Way To Become a Cybersecurity Engineer in 2025</strong></p><p>The YouTube version of this post!</p><div id="youtube2-b-JAs3hBXII" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;b-JAs3hBXII&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/b-JAs3hBXII?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><h1>Closing</h1><p>Once again, you made it this far :)</p><p>Thanks for reading. If you so desire, subscribe and restack - it helps spread the word and keeps me writing content. If not, I&#8217;ll see you around&#8230;somewhere on the internet!</p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/p/shiny-object-syndrome-in-cybersecurity?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share&amp;token=eyJ1c2VyX2lkIjoxNzI1NDA4MjcsInBvc3RfaWQiOjE1NzM5MTc0NSwiaWF0IjoxNzQxOTY1MzIzLCJleHAiOjE3NDQ1NTczMjMsImlzcyI6InB1Yi0xOTk2Mjk2Iiwic3ViIjoicG9zdC1yZWFjdGlvbiJ9.mPl5PBnc-9Wt6Gw5YAJoBgP0sFPnQ4c6cRhY1ZOmSXU&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading Cyberwox Unplugged! This post is public, so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberwoxunplugged.com/p/fastest-way-to-become-a-cybersecurity?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberwoxunplugged.com/p/fastest-way-to-become-a-cybersecurity?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div>]]></content:encoded></item><item><title><![CDATA[Shiny Object Syndrome in Cybersecurity]]></title><description><![CDATA[Think twice before pulling the plug on the &#8220;next best thing&#8221;.]]></description><link>https://www.cyberwoxunplugged.com/p/shiny-object-syndrome-in-cybersecurity</link><guid isPermaLink="false">https://www.cyberwoxunplugged.com/p/shiny-object-syndrome-in-cybersecurity</guid><dc:creator><![CDATA[Day Johnson]]></dc:creator><pubDate>Mon, 24 Feb 2025 14:03:07 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/5a60fcd8-15b3-401e-9a2a-46577034f0de_1024x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>"Shiny object syndrome" is a metaphor for being drawn to new, alluring things at the expense of completing current tasks. This is particularly prevalent in the tech industry&#8212;and even more so in cybersecurity&#8212;due to the rapid evolution of tools, training programs, technologies, frameworks, and attacker behaviors.</p><p>Having spent the last half-decade immersed&#8230;</p>
      <p>
          <a href="https://www.cyberwoxunplugged.com/p/shiny-object-syndrome-in-cybersecurity">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[The Underrated Cybersecurity Skill of Writing]]></title><description><![CDATA[Why I've been writing more as a cybersecurity engineer.]]></description><link>https://www.cyberwoxunplugged.com/p/the-underrated-cybersecurity-skill</link><guid isPermaLink="false">https://www.cyberwoxunplugged.com/p/the-underrated-cybersecurity-skill</guid><dc:creator><![CDATA[Day Johnson]]></dc:creator><pubDate>Mon, 17 Feb 2025 13:03:11 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/53aa3656-9fe6-40fd-b345-53dbcac30327_1024x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>It&#8217;s 2025, and I&#8217;ve been doing a lot more writing. Not because it&#8217;s a New Year&#8217;s resolution but because I see how essential it is to my growth as a cybersecurity engineer. </p><p>Writing has become a critical skill&#8212;one that&#8217;s shaping my journey toward becoming a staff or principal-level engineer. And if you&#8217;re not writing yet, you should start.</p><p><em>Here&#8217;s a video I&#8230;</em></p>
      <p>
          <a href="https://www.cyberwoxunplugged.com/p/the-underrated-cybersecurity-skill">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Cybersecurity Career Game Plan for 2025]]></title><description><![CDATA[Let's build the foundations of a strong cybersecurity career together.]]></description><link>https://www.cyberwoxunplugged.com/p/cybersecurity-career-game-plan-for</link><guid isPermaLink="false">https://www.cyberwoxunplugged.com/p/cybersecurity-career-game-plan-for</guid><dc:creator><![CDATA[Day Johnson]]></dc:creator><pubDate>Wed, 12 Feb 2025 15:41:39 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/45299c99-fdf9-4dd0-bc80-8b2ee487c0ee_1024x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>If you clicked open on this newsletter, you&#8217;ve already made the decision to break into one of the most exciting, fast-growing, and&#8212;let&#8217;s be honest&#8212;lucrative industries of our time: <em>cybersecurity</em>. And let me tell you, if you&#8217;re just getting started, this is <strong>the most important cybersecurity newsletter you&#8217;ll read in 2025</strong>.</p><p>Why? In this newsletter issue, I&#8217;m&#8230;</p>
      <p>
          <a href="https://www.cyberwoxunplugged.com/p/cybersecurity-career-game-plan-for">
              Read more
          </a>
      </p>
   ]]></content:encoded></item></channel></rss>