Security CareerNov 20, 2018
NewNiG

Security engineer

I’ve worked in IT for over 10 years with security+ and network+ certifications. My undergraduate degree is in biochemistry. I did a post-bacc in computer science taking nearly all the computer science course with a 3.81 GPA. I am finishing my masters in Cybersecurity with a 3.92 GPA. What do I need to do to get my foot in the door as a security engineer? Thanks.

Add a comment
Illumina mPPF36 Nov 20, 2018

What part of the country are you in?

New
NiG OP Nov 20, 2018

I’m in California

This comment was deleted by the original commenter.
New
NiG OP Nov 20, 2018

Thanks for input.

Target SeaTC Nov 20, 2018

Security Engineer is really broad. What specifically are you looking to do? Incident Response, Infrastructure Security, Threat Detection?

New
NiG OP Nov 20, 2018

To be honest I’m not sure. I have a lot of experience in web application and network security so I’d probably go down that route.

eBay Hyofevcxdg Nov 20, 2018

Interview at companies that you don’t care for, for roles you like. You’ll quickly learn where your weaknesses and strengths are. This will help you focus your studies. Go to conferences, create your own tools. If you’re still learning, look into doing the OSCP.

New
NiG OP Nov 20, 2018

Thanks for the advice

Target SeaTC Nov 20, 2018

OSCP. That’s more for offensive security. Pentesting, and red teaming.

Google Pfjhebs Nov 20, 2018

I work in security and I’ll say when I see someone with a “security” degree that’s not PhD (note different than comp sci w/ security focus) it default turns me off, but I try not to let it affect any decisions by itself. Get recognized somehow to prove you have expertise in an area that you want to work in. If you still find it hard to get interviews, network at your local bsides to get referrals.

Google Pfjhebs Nov 20, 2018

Certs don’t mean anything.

New
NiG OP Nov 20, 2018

What kind of things do people do to get recognition?

Red Hat exdesiNluv Nov 21, 2018

Recognition = create or contribute to relevant tools/projects. Your github profile will speak volumes on your behalf. Certs are garbage.

Target SeaTC Nov 21, 2018

Certs certainly aren’t garbage but they don’t necessarily mean you have the required skills. They do show you take the initiative to learn about something though and sometimes that’s more important than the cert itself. GitHub and commits are more so if you want to go into development, IMO, or if you are motivated to contribute to open source projects, which is also important. If you’re interested in Entry/Mid level roles for Incident Response please PM me. My current company is hiring at multiple levels, however it is based in MN

Google Pfjhebs Nov 21, 2018

If you have time to study for cert, you have time to produce research, interesting blog posts, tooling, etc

Target SeaTC Nov 21, 2018

Producing research and blog posts isn’t always indicative of skills. And tooling isn’t always required if you’re an Analyst vs an Engineer. Not sure what type of security role you’re in but it seems like you’re more focused on AppSec.

Oracle redvsblue Dec 28, 2018

It’s very hard to get security engineer positions right off the bat unless you’re a rock star and contributed to some open source project or spoke at some conference and discovered some 0 day. I would suggest you find a SWE position where you write security tools. I get so many recruiters trying to recruit me for that. It’s not a pure security engineer position but will get security on your resume and will get you a high TC at FAANG because it’s a SWE position. From there you will get respect enough to try to transfer to a security engineer position you want except maybe not intense offensive security positions. If you can’t code for shit (or hate it like me) then you must take a pay cut and start as a security analyst of some sort at a no name or consulting company. FAANG (and other tier 1-2 companies) don’t usually hire security analysts because they want engineers and if you want engineer in your title you must know how to code. For analyst positions, easiest is go into incident response or forensics/logging. You will work with many ex military people and the job will involve a lot of policy and compliance, a Hell hole you want to get out of to reach FAANG but need to suck it up for a few years to get some industry security experience (in lieu of being some rock star leet hacker). Policy and compliance is a Hell hole because even though it’s security related, the jobs in that area are not very technical and you deal with a lot of project management crap, paperwork, and government policies. This is not what security engineers do so get your exp and get out ASAP. Before the interview, read some books and be familiar with infosec concepts and impress someone at an interview and you can get your foot in the door to get a tech interview. Add some tools to your resume like netcat, wireshark, nmap, burp suite. Go play some CTFs so you can say you have experience using these tools. Book knowledge or school knowledge is not good enough and interviewers will not be impressed. You don’t need github or blog or whatever but having those things doesn’t hurt. At minimum to get a security engineer position, you must know how to script (python, Perl, shell script). That’s the difference between security engineer and security analyst. The pay difference is not trivial either which is why I suggest go the security SWE route.

Oracle redvsblue Dec 28, 2018

Everyone else is right. Certs are not worth anything except OSCP. I’m also biased against anyone with some kind of IT cyber security degree because it just does not sound rigorous like an engineering degree where you’re actually learning computer system fundamentals. IT security degrees sound more like information system business degrees hence I believe the type of jobs you would get are more policy and compliance related. Also please stop using “cyber security”. Any real security professional would not use that buzz word and it makes you sound like a noob. Use infosec, netsec, or appsec instead.