devxlogo

6 Cybersecurity Career Tips – Insights from the Experts

Cybersecurity Career Tips
Cybersecurity Career Tips

From the company featured.com, we asked industry experts to share one piece of advice they wish they’d received earlier in their cybersecurity careers and how it would have benefitted them. Here are their strategies for managing human error, balancing security measures, and proactively managing risk.

6 Cybersecurity Career Tips – Insights from the Experts

  • Technical Skills Open Doors, Communication Keeps Them Open
  • Adopt an Agnostic Approach to Tech Solutions
  • Human Error Management is Critical in Cybersecurity
  • Balance Server and Application Security
  • Learn to Build Before You Learn to Break
  • Proactive Risk Assessment is Crucial

Technical Skills Open Doors, Communication Keeps Them Open

One piece of advice I wish I had received earlier in my cybersecurity career is that technical skills will open doors, but communication skills will keep them open.

Early on, I was focused on mastering the latest tools, threat detection methods, and compliance frameworks. While that knowledge was critical, I later realized that the ability to clearly explain risks, justify security investments, and align cybersecurity goals with business objectives was just as important.

This is especially important for those exploring how to get into cybersecurity without a degree. Building a foundation of strong communication, practical knowledge, and self-driven learning can open career paths that don’t rely solely on formal education.

If I had embraced this earlier, I could have built stronger relationships with leadership, accelerated buy-in for security initiatives, and avoided situations where technical insights were overlooked due to poor messaging. This understanding ultimately shaped how I built my company, ensuring that cybersecurity professionals are hired for their technical expertise and evaluated on their ability to influence and collaborate.

Amit DoshiAmit Doshi
Founder & CEO, MyTurn

See also  The Expanding Link Between Software Engineering And Cyber Security

Adopt an Agnostic Approach to Tech Solutions

One piece of advice I wish I had received earlier in my cybersecurity career is the importance of adopting an agnostic approach to tech solutions. This approach has been central to how we operate. By not binding ourselves to a single vendor, we reduced our clients’ technology costs by over 30%. We avoided being caught off guard by security threats that a more limited tech stack might have exacerbated.

An example of this approach’s success was when we guided a healthcare provider through a serious security breach. By leveraging multiple security providers, we reduced the mean time to respond by 40% without needing an expensive 24/7 SOC team. This mitigated the immediate threat and saved the organization significant costs in manpower and infrastructure.

By fostering an agnostic strategy, we can tailor solutions to specific security needs, such as deploying Managed Detection and Response (MDR) technology. This proactive security measure cut incident response times to just 15 minutes and resulted in over 80% savings in security costs, demonstrating how adapting flexible and diverse technological approaches can be highly effective in managing and mitigating risks.

Ryan CarterRyan Carter
CEO/Founder, NetSharx


Human Error Management is Critical in Cybersecurity

I wish we had realized earlier that humans are the most critical step in the cybersecurity chain. Most cybersecurity experts will agree that human error is a vital thing to manage, so on reflection, doing more training, allowing people to understand more about why certain things were necessary, and then helping people to manage their own knowledge and training at a higher level, would be a great way to help everyone stop the surge of cybersecurity issues. In this regard, I think a “change management” focus for cybersecurity companies early on would have been a great thing to do earlier.

See also  The Expanding Link Between Software Engineering And Cyber Security

Andrew LanceAndrew Lance
CEO, Sidechain Security


Balance Server and Application Security

Early on, I wish someone had emphasized the importance of a dual focus on server and application security. While at my current company and Cleanspeak, I learned that neglecting either aspect can lead to glaring vulnerabilities. For instance, the Milwaukee Bucks incident and LinkedIn hacks underscored the necessity of robust, multi-layered security strategies that address varied attack vectors, from brute force to phishing.

By carefully balancing server hardening with application defenses, our teams could protect user data even when faced with evolving cyber threats. Utilizing Purple Teams, our approach proved effective by fostering collaboration and maximizing cybersecurity efforts without straining resources. This strategy notably fortified our systems against breaches and saved resources over time.

As demonstrated by OWASP guidelines, recognizing the necessity of evolving security protocols, like frequently increasing the work factor for password hashing, is also essential. This knowledge allowed us to adapt our systems swiftly, maintaining both scalability and security, averting potential disasters that can stem from underestimated vulnerabilities.

Brian PontarelliBrian Pontarelli
CEO, FusionAuth


Learn to Build Before You Learn to Break

If there’s one piece of advice I wish I had received earlier, it’s this: Learn to build before you learn to break.

Early on, I was like every other script kiddie—firing up prebuilt tools, running exploits, and thinking that was the game. It worked, but only to a point. The real shift happened when I learned data engineering, full-stack development, and system architecture. Once I understood how things were built, breaking them became second nature. Debugging systems exposed vulnerabilities before I even had to test for them.

See also  The Expanding Link Between Software Engineering And Cyber Security

And then there’s the data. If you can’t sift logs, parse anomalies, and wrangle massive datasets, you’re just another player in the game. The best red teamers, the best blue teamers—they beat AI, not just other humans. AI-driven attacks are scaling. Defensive AI is advancing. If you can’t out-think it, you’re obsolete.

So if you want to elevate your cybersecurity game? Stop just breaking things—start building.

Dr. James Utley MSc, PhDDr. James Utley MSc, PhD
Scientist, Biohacker, Transhumanist, Engineer, Syndicate Laboratories


Proactive Risk Assessment is Crucial

Early in my cybersecurity career, I wish someone had stressed the importance of a proactive risk assessment approach. Understanding and applying a custom cybersecurity framework drastically reduced breach attempts by over 70%. This proactive risk assessment allows businesses to anticipate vulnerabilities and align their security strategies with operational demands, ensuring compliance as both business needs and threats evolve.

Another indispensable insight would have been the critical role of integrating AI into security operations. Implementing an AI-driven incident response system reduced our alert response times by 60%, freeing up resources to focus on strategic initiatives rather than being mired in manual processes. Using AI for triaging has proven to be a game-changer, preventing threats before they cause significant harm.

These experiences underline a lesson: that staying ahead in cybersecurity requires embracing innovative technologies and aligning security measures with business needs. Considering both technological advancements and organizational demands, a custom approach improves resilience and promotes seamless operational growth.

Ali KhanAli Khan
Founder & CEO, MOATiT

 

Featured Image Credit: Photo by Christina Morillo; Pexels

 


About Our Editorial Process

At DevX, we’re dedicated to tech entrepreneurship. Our team closely follows industry shifts, new products, AI breakthroughs, technology trends, and funding announcements. Articles undergo thorough editing to ensure accuracy and clarity, reflecting DevX’s style and supporting entrepreneurs in the tech sphere.

See our full editorial policy.