Hacker News new | past | comments | ask | show | jobs | submit login

I am totally into this field as a bystander. When many people would watch late night TV or listen to music or a podcast, I'll scour YouTube for defcon and CCC talks I haven't seen yet. I am good with python, Javascript, web and graphic design, technical writing, all kinds of stuff. I live in rural neighbor-island Hawaii and the only tech jobs I ever see out here are military, which I deeply respect but don't think would be a good culture fit for me. I've just transitioned to working part time and intend to dive in to some open source projects with my extra time. Is there a good path of entry for someone with a deep natural curiosity about the field, self-trained in coding but with no industry connections or much in the way of related professional experience?



1) Schneier's advice from a few years ago is still accurate:

https://www.schneier.com/blog/archives/2012/07/how_to_become...

2) The Reddit NetSec FAQ has a good list of resources for beginners (and those starting to specialize):

https://www.reddit.com/r/netsec/wiki/start

3) Finally, each of these popular "Getting Started in Security" guides has a slightly different, but useful, opinion on the specifics of the path to take:

https://medium.freecodecamp.org/so-you-want-to-work-in-secur...

https://danielmiessler.com/blog/build-successful-infosec-car...

https://www.trustwave.com/Resources/SpiderLabs-Blog/Getting-...

https://tisiphone.net/2015/10/12/starting-an-infosec-career-...


Correct URL for Reddit NetSec FAQ: https://www.reddit.com/r/netsec/wiki/start


Thanks for the correction - fixed the typo!


Hit some bounties. Earn some income and it generally looks good on a CV that you can deliver real world results. Just try and go deeper.


Fastest way would be OSCP cert.


OSCP, red teaming, possibly CISM or CISSP for upward mobility.


I would not waste time and money on certifications.


As someone not in the field, but curious of getting in, could you explain why not?


There is a bias against certifications by some (but by no means all) professionals in InfoSec, since it is a heavily "hands-on" field. There is more emphasis on demonstrating actual ability through CTFs, bug bounties, published exploits, etc.

However, unlike Certified Ethical Hacker, CISSP, and other "mile wide, but inch deep" certs, the OSCP is a heavily hands-on certification that tests actual ability. No knowledgeable employer would discriminate against you for earning it.

And CISSP or CISSM are valuable if you're applying for a management job. For government defense-sector jobs, they are often required.


I saw a talk by the founder of this company: https://radicallyopensecurity.com/

They're based in Amsterdam, but she said that a lot of their pentesters and engineers are remote (all over the world).

Might be worth reaching out!


Try the military. It's usually better than people imagine.


Military are the best at exploiting cybersecurity skills for their advantage




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: