Cybersecurity is constantly evolving as technology advances – and your career in cyber will grow just as quickly! Springboard curriculum expert and long-time cybersecurity professional Mark Adams breaks down the cyber security career path, how to progress from entry-level cybersecurity analyst roles to senior cybersecurity engineering roles, and the average cybersecurity salaries that bootcamp graduates can expect. Plus, Mark shares how Springboard’s Cyber Security Bootcamp is preparing students with the skills employers expect from cybersecurity analysts today, and what you need to know to pass CompTIA certification exams.
Meet the Expert: Mark Adams
There are a few key traits you need to possess if you would like to become a cybersecurity professional. You should have:
The career path in cybersecurity can be broken down into three steps: entry-level, mid-level, and senior-level.
Typically, entry-level roles are listed as analyst positions, mid-level roles are architect positions, and senior-level roles are engineer positions.
Some cybersecurity professionals (like myself!) actually kickstart their cybersecurity careers in IT before moving on to entry-level cybersecurity analyst positions. IT positions that can be a good first step into cybersecurity, include IT Technician and Desktop Support where you are dealing with software and hardware support. Help Desk or Service Desk positions where you are troubleshooting issues with clients can also be a good place to begin your tech career.
|Mark’s Tip: Companies may use the names of cybersecurity positions interchangeably, so make sure to read the cybersecurity job description to determine the skills and level of experience actually needed to apply.|
Cyber security analyst and Security Operations Center (SOC) analyst positions are entry-level cybersecurity jobs. These entry-level positions require 1-2 years of experience. People typically spend 3-5 years in a junior position before moving up to mid-level cybersecurity roles.
What does a cyber security analyst do?
A cybersecurity analyst's responsibilities include: monitoring computer systems, looking for anomalies and potential abnormal events, and then escalating them to resolve those anomalies. An analyst monitors network systems and logs to root out anything of concern after which they route it to the appropriate individual on their team.
Do cybersecurity analysts need to know how to code?
Cybersecurity analysts do not need to have any programming background. Some analysts may have a programming background, but it is absolutely not a requirement to apply for analyst positions and be effective on the job.
Cyber Security Analyst Salary
The average cybersecurity analyst salary is $89,000, but the entry-level cybersecurity salary range is $75-104K! Keep in mind that salaries are affected by geographical location, personal background, educational experience, professional experience, and military experience.
After working as a cybersecurity analyst for 2-5 years, most cybersecurity professionals move up to mid-level cybersecurity roles as architects. Cybersecurity architect roles include Penetration Tester (also known as Pen Testers), Certified Ethical Hacker, and Threat Hunter. Cybersecurity professionals can expect to spend 5-8 years in mid-level cybersecurity roles before moving on to senior-level roles.
What are the responsibilities of a mid-level cybersecurity professional?
As an architect, mid-level cybersecurity professionals design security systems. They also review, audit, and assess those systems for gaps and then recommend solutions.
Mid-level cybersecurity professionals are trained to ethically hack into systems. This is done by dividing up into red and blue teams:
It’s good to have a healthy knowledge and experience of both blue and red teams, especially if you are looking to become a cybersecurity consultant.
What technologies should a cybersecurity architect know?
By the time you reach mid-level in your cybersecurity career, you should have familiarity with scripting languages like Python, and understand PowerShell, Perl, and Linux scripting languages. These languages are important for automation and performing assessments. Pen Testers like to use programming to automate their scanning, clean up data, and parse data they can pull back.
The main concern when hiring mid-level roles is that the scanning tools can take systems down; the number one concern is that they don't want someone to break anything.
Mid-level cybersecurity salaries
Mid-level cybersecurity professionals, like Pen Testers and Ethical Hackers, can expect salaries around $110K.
This is the most advanced level in the cybersecurity career path and on average it takes at least 15 years of experience to reach this level. The most common titles for senior-level cybersecurity roles include Senior Manager of IT & Security Compliance, Director of IT Security, Senior Manager, and Senior Director. A Chief Information Security Officer (CISO) position can be seen as a senior-level or an upper mid-level role.
What does a cybersecurity engineer do?
Senior-level roles like cybersecurity engineers are less technical and more strategic. They create security road maps, negotiate and review contracts, and handle vendors. From their previous experience as cybersecurity analysts and architects, they have an understanding of administering systems; they also manage teams to make sure those systems are efficiently monitored. A cybersecurity engineer will often have a programming background.
Cybersecurity engineer salary
Senior-level cybersecurity salaries are typically around $180K - $220K.
Show initiative! Keep learning by taking courses, writing your own security tools on GitHub, testing your penetration skills on Hack the Box, and getting cyber security certifications. By taking initiative, you will show your employer that you're serious about your cybersecurity career.
Network! Your network is a portable asset: no matter where you go, you are always going to have your network with you. But your network does require care and feeding. Reach out to cybersecurity professionals, and ask them about their jobs, certifications, and career path. People are usually willing to share information, plus it could lead to a job down the road.
If you’re new to the cybersecurity field, find a mentor to support you as you develop your cybersecurity career.
The goal of Springboard’s self-paced, online cybersecurity bootcamp is not to make students experts in 6 months, but to introduce them to key concepts and get them comfortable working in cybersecurity through assignments based on real-world scenarios.
Overall, the bootcamp is a combination of subject-expert approved learning content that includes videos and articles, mini projects and projects, as well as labs hosted by InfoSec Institute. Students will learn the cybersecurity foundational skills and be introduced to today’s newest cybersecurity concepts, tools, and technologies. Weekly mentor calls give students extra support.
The curriculum covers topics related to Windows and Linux, such as how to secure systems, networking technologies, encryption, application security, identity, and access management, asset security, digital forensics, and software testing. Springboard students will learn Kali, Wireshark, EnMAP, Metasploit, Openvas (an open-source security scanner), Python, Perl, and PowerShell. Students will be introduced to new concepts like Zero Trust Architecture as well as ACID test and PCI DSS.
What kinds of projects will Springboard students work on?
Many of the projects included in the cybersecurity curriculum are based on real-world scenarios that I’ve encountered in my career. Here are a few examples of what students can expect to work on in the bootcamp:
Which cyber security certifications are Springboard students prepared for?
Springboard’s cybersecurity program was developed with CompTIA Security+ certification in mind in order to prepare students for launching their careers. Students will be prepared for CompTIA’s Security + certification, and with Springboard’s bonus material, students can begin thinking about adding further certifications to their names, such as CySA+, Network+, and SSCP.
Is there an ideal student for Springboard’s cybersecurity bootcamp?
Although we do not require previous technical experience to apply to the bootcamp, this program is not for everyone. The students who get the most out of this program will have the capacity to learn as well as a passion for cybersecurity.
Cybersecurity is an ever-changing field! Here are 3 tips for staying sharp throughout your cybersecurity career:
Find out more and read Springboard reviews on Course Report. This article was produced by the Course Report team in partnership with Springboard. Reserve your spot for Springboard’s Cyber Security Career Track (with a job guarantee!) now.
Jess is the Content Manager for Course Report as well as a writer and poet. As a lifelong learner, Jess is passionate about education, and loves learning and sharing content about tech bootcamps. Jess received a M.F.A. in Writing from the University of New Hampshire, and now lives in Brooklyn, NY.
How Lighthouse Labs ensures all students get the support they need...
All of the coding bootcamp news that happened this October!
Roger from Springboard answers this reader's question!
How Codesmith helps students find the best Software Engineer roles for them!
All the biggest news about tech apprenticeships, new coding bootcamps, and more!
BrainStation breaks down what you need to know!
Find out how to use federal financial aid to cover your Westcliff University Bootcamp tuition!
Nancy from Sabio answers a reader's question about freelance and contract-to-hire jobs!
Can I work in Cyber Security with no technical background?
How these 10 classroom teachers made a career pivot into tech jobs!
Just tell us who you are and what you’re searching for, we’ll handle the rest.