Americas

  • United States

Asia

Oceania

joltsik
Contributing Writer

IT experience can be beneficial for a cybersecurity career

Opinion
Mar 01, 20173 mins
CareersData and Information SecurityInternet Security

Most cybersecurity professionals come from IT. This experience serves as a strong foundation and helps them s쳮d in cybersecurity.

Given my interest in cybersecurity skills and training, I’m contacted by academic institutions, professional organizations and training companies with news about some type of cybersecurity education curriculum. This isn’t surprising given the global shortage of cybersecurity skills. In fact, new ESG research discloses that 45% of organizations report a “problematic shortage” of cybersecurity skills in 2017.

Clearly we need more smart and well-prepared people to enter the cybersecurity ranks, but it’s important to note that most cybersecurity professionals don’t enter the workforce directly from college or training programs. According to research conducted in 2016 by ESG and the Information Systems Security Association (ISSA), 78% of cybersecurity professionals follow a more indirect route. These folks start their careers as IT professionals and make their way into cybersecurity as their careers progress.

This circuitous route to cybersecurity comes with some added benefits, as IT professionals arrive with plenty of organizational and technical experience. This begs the question: Which experiences are most helpful as IT professionals transition to cybersecurity. The ESG/ISSA research reveals:

  • 46% of those who transitioned from IT to cybersecurity say their IT career helped them gain experience with different types of technologies. This is certainly worthwhile, as cybersecurity pros need to understand everything from identity management, to networking concepts, to application development. Hands-on IT experience can only help provide a well-rounded education in multiple areas.
  • 44% of those who transitioned from IT to cybersecurity say their IT career helped them gain IT operations knowledge and skills. Security teams work closely with IT operations in areas such as configuration management, change management and risk mitigation. It is extremely useful when you understand the challenges and responsibilities of your collaboration partners.
  • 28% of those who transitioned from IT to cybersecurity say their IT career helped them understand collaboration between IT and business units on business initiatives, processes and strategic planning. This is an important point—IT personnel have had to develop a close relationship with business management over the past 25 years or so. Alternatively, security personnel were viewed as backroom geeks until the past few years. IT’s business experience and acumen could be a crucial addition to most cybersecurity teams.
  • 18% of those who transitioned from IT to cybersecurity say their IT career helped them with software programming knowledge and skills. Another important qualification, as there is a lot of insecure software out there. Understanding programming can help security teams anticipate and address common software vulnerabilities and configuration errors.

With the uptake in cloud computing, a lot of old-school IT infrastructure personnel will likely find themselves on the chopping block over the next few years. These folks would certainly be well served by leveraging their valuable IT experience in a cybersecurity career. My advice to this group is to pursue training, watch market developments and actively manage your careers. This could turn a dead-end IT job into a lucrative cybersecurity career over the next 12 to 18 months. 

joltsik
Contributing Writer

Jon Oltsik is a distinguished analyst, fellow, and the founder of the ESG’s cybersecurity service. With over 35 years of technology industry experience, Jon is widely recognized as an expert in all aspects of cybersecurity and is often called upon to help customers understand a CISO's perspective and strategies. Jon focuses on areas such as cyber-risk management, security operations, and all things related to CISOs.

More from this author