Finding ValueThis is essentially a recap of my SimplyCyber Community Challenge post over on Linkedin with some thoughts I picked up after Christian Hyatt of risk3sixty‘s talk at BSides Atlanta (2023) titled “The Art of Service: 5 Lessons Learned About Life, Leadership, and Business From Building a Cybersecurity Company.” Cybersecurity is often portrayed as reserved for those with a linear, tech-heavy background requiring a Comp Sci degree. My journey, however, took an unconventional path that not only led to a fulfilling career in cybersecurity but also revealed the unique value I bring to the field. My first flirtations with computer science in high school involved tinkering with networks, building PCs, and dabbling in code. Despite being steered away from this path by the public school system, the spark never died. It manifested in hobbies that danced around the edges of hard tech, from crafting USB hacking tools to war-driving setups. Little did I know these experiments would resurface a decade later. At West Virginia University, I majored in international studies and geography, focusing on intelligence & national security, which introduced me to the power of open-source intelligence (OSINT). Here, I discovered a passion for the innovative and novel applications of tech for security. This interest would later become the cornerstone of my cybersecurity career in the form of script automation and spreadsheets. Case in point: utilizing GIS for the statistics of terrorism and conflict, which evolved into a capstone project called “Visualizing Terrorism from 1970 to 2013,” was successful in large part due to having to learn Python and advanced Excel tricks to process the raw amount of data and functions within ArcGIS. After a few failed GIS interviews after graduation, my career trajectory detoured through Texas. I navigated roles that seemed light-years away from my tech interests. Yet, each position, from admin duties to database management, was oblivious to me, building a toolkit of skills that would become gold in cybersecurity, especially the soft skills of communicating with non-tech types. I was catapulted into a “Supply-Chain Data Manager” role in D.C. during a start-up’s chaotic “restructuring,” during which the supply-chain manager was fired, and his duties landed on my Data Analyst desk. While unrelated to cyber, this mixed bag of experience exposed me to more complex data intricacies, process efficiency, and the importance of a well-oiled operational machine. Unfortunately, the start-up did what most start-ups do: implode. During the, very rough, 18-month interlude that followed, I ping-ponged between temp gigs and a relentless, albeit fruitless, interview grind. Accommodations often meant crashing on a friend’s couch or roughing it in a car in a gym parking lot across Texas and the Virginias. I eventually boomeranged back to WV and picked up day work when I could deliver furniture. Amidst this chaos, I started dusting off my Python skills on Coursera and prepping for the Sec+ and CCNA certifications. Unfortunately, the financial burden of the exams kept them out of reach. I finally found my footing in a supply chain gig in D.C., which required me to sleep on a bed roll in the office closet in a friend’s apartment just to accept the job. While I never loved or wanted to be in supply-chain or procurement, this role exposed me to Lean Six and Kaizen process improvement training, concepts I often reflect on in cybersecurity processes. This position was a game-changer, as my physical proximity to the cybersecurity and networking team in the cube farm, coupled with supportive management, led to a career pivot. The arrival of the COVID-19 pandemic and the shift to WFH were the catalysts for me to enroll in WGU’s cybersecurity and information assurance program. This culminated in my current role on the security team during a corporate restructuring. Imposter Syndrome might be my oldest friend. It took some time and I still deal with it, but as I transitioned into my security team role, it clicked: my value in cybersecurity was rooted in my Frankensteined together background. My ability to dissect complex data, understand operational workflows, manage crises, and (perhaps most importantly) communicate effectively with the non-technical crowd wasn’t just an asset; it was a differentiator that allowed me to tackle challenges with a fresh perspective.
The epiphany came when I recognized the parallels between my experiences and the various aspects and niches of cybersecurity. My analytical chops from GIS, the crisis management skills I picked up in the reserves, the soft skills polished in the UTD media office, and the operational insights gained through supply-chain management all formed a Swiss army knife of insights, tools, tricks, and experiences that been useful during my transition into cybersecurity. Value often lies hidden in the sum of our experiences. Discovering my value, the “what makes me relevant” in cybersecurity, wasn’t a lightning bolt moment but a gradual process. It was the realization that the skills and experiences I had collected along the way weren’t random or useless; they were the building blocks of my unique professional identity that could maybe even be defined as a brand. We all know it by now, but finding your place in cybersecurity (and life) is a messy, chaotic journey. My path has been a wild patchwork of experiences, but it’s taught me that value in this field goes beyond mere technical prowess. It’s about the unique combination of skills, perspectives, and hard-won wisdom each person brings. Consider this a continuation of my musings on discovering your value and relevance with a dash of philosophy via the Japanese concept of Ikigai. Let’s be honest; most of us didn’t walk easily into cyber via some smooth, traditional path. Your journey likely meandered through a menagerie of industries, roles, and existential crises. But here’s the thing: each of those experiences armed you with a one-of-a-kind toolkit and perspective. The sum total of your story, like a mosaic or a patchwork of GitHub snippets and ancient Stack Overflow lore, makes you invaluable. Embrace the twists and turns because they’ve forged your approach to problem-solving and innovation. Certifications and courses are important milestones. However, the real value is a commitment to lifelong learning in a field where the tech landscape is shifting rapidly. Whether you went the traditional brick-and-mortar route or are a self-taught savant, your drive to stay current and adaptable showcases your worth. Every gig you’ve had, every mundane retail stint, six months working at Panera, or four years bouncing at a nightclub imparted lessons that translate to cybersecurity. Wrangling complex projects, putting out fires, and managing teams were experiences that forged pure gold soft skills. Mine your work history for the abilities you’ve honed and consider how they can be transformed into fresh methods, sharper leadership, or effective communication. Cybersecurity isn’t a solo gig, nothing really is. It thrives on collaboration and the ability to navigate cross-disciplinary teams. Forget the lone wolf fantasy; that path leads to burnout and disillusionment. Suppose you’ve juggled different departments and steered cross-functional projects in the military, retail, or hospitality. In that case, you’ve laid the groundwork for the collaboration skills vital in cyber, or really anything. The cyberworld is a vast, deep ocean with countless niches to explore. Your golden ticket could be discovering a specialty that capitalizes on your unique background. Maybe you’ve got a knack for OSINT or a burning passion for threat intel. Lean into those interests to unearth a bespoke role where your talents shine brightest. Pinpointing your value demands some serious soul-searching. It’s about assembling your experiences, skills, and curiosities into a crystal-clear picture of where you slot into the grand puzzle. My odyssey has taught me that value isn’t some generic commodity; it’s deeply personal. Your past isn’t just filler in your resume; it’s chapters that make your story gripping and your contribution priceless.
0 Comments
|
Details
AuthorI'm Luke Canfield, a cybersecurity professional. My personal interests revolve around OSINT, digital forensics, data analytics, process automation, drones, and DIY tech. My professional background experience includes data analytics, cybersecurity, supply-chain and project management. Archives
January 2025
Categories |