2 YOE as a Vulnerability Analyst, focused largely on VM but also involving pen-testing and CSPM. I’ve studied grace nolan’s github religiously, done several side projects/home labs focused on devsecops, detection and monitoring, and pen-testing, and have a strong grasp of Python, Typescript, Powershell, Bash. Seem to be stuck doing a lot of non-technical work in my day to day and appear to have hit a ceiling in terms of TC from VM. I’m looking for some general advice on the best ways to pivot out of my current role and increase overall TC, but any insight people r willing to offer is great appreciated.#cybersecurity #cybersecurity #security TC 125K
After working 3 years as a vulnerability analyst, I pivot to Amazon as a security engineer working on VM. More technical and higher TC.
CI/CD Automation home-lab, focused on integrating things like Jenkins, Docker, AWS CLI, S3 buckets (for backup), Ansible, MySQL (dbs), a Gitlab server, and a few other things. Deployed a home lab network for detection and monitoring using VMware workstation - this involved pfSense (firewall), SecurityOnion as IDS/monitoring solution, Kali for pentesting hosts, Splunk as SIEM, and a Windows Server as the dc. Other side things I’ve done is gone through the Cloud Resume Challenge (Azure version), completed AZ-900/AZ-500, completed TryHackMe’s Jr Pentester, Attacking and Defending AWS, and SOC Level 2 learning paths, and started working through PortSwigger Academy during the past few weeks.