How to get into InfoSec Career

I have been asked this question a few many times, on how can i get started or get into infosec / cyber security? My answer it depends đŸ™‚

It depends what path you want to travel through to your destionation – technical or non-technical.


I will start with technical path, there are couple of field for technical path including penetration tester, appplication security SME, and sec ops, just naming a few.

For example to be a pentester, you will need to have basics in Networking, Operating System (*nix, Windows, Mobile,) Database, Application, etc. This role need to have breath knowledge in order to understand how the technology is made, operate and then one can go deeper intp specific area of testing e.g. application testing or infrastructure testing. So my advice to start or to get into this field, one need to get understand of the technologies mentioned for started.

on the next post, I will speak on the other technical path.

Author: kinyoka

A certified Information Security professional, with demonstrated experience spanned more than 10 years in financial, banking, consulting, and payment card industries in managing Information Security System Management ISMS. A post graduate degree holder in Information Security Management (M.Sc); Certified Information Security Manager (CISM), Payment Card Industry Qualified Security Assessor (PCI QSA), SABSA Chartered Security Architect (SCF), ISO 27001 Lead Auditor, CREST Registered Technical Security Architect (TSA), CREST Registered Penetration Tester (CRT), and a member of ISACA. Demonstrated to be reliable, trustworthy, and meticulous person; working in a controls-focused environment, multinational, and multicultural organisation over the years and gained a good understanding of what is required of the Information Security professional. . Specialties: ISMS based on ISO/IEC 27001/2 Payment Card Industry (PCI) DSS - QSA led services - PCI Scoping, Gap Analysis and Formal Assessment (RoC) IT Governance, Risk and Compliance (GRC) Management Cyber Security Penetration Testing Enterprise Security Architecture Technical Security Architecture

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: