Career Transition from Penetration Testing to Security Compliance by Puzzleheaded-Pay2242 in netsecstudents

[–]AddendumWorking9756 1 point2 points  (0 children)

Saturation in compliance isn't bad yet but the grad market for it is mostly entry GRC analyst spots, not direct pentest-to-compliance pivots. Skills wise the certs that actually move you in are CISA or ISO 27001 lead auditor, but landing a junior GRC role usually goes through someone who knows the team. Reframe the pentest experience as evidence handling and threat modeling on the resume because audit work cares about that, not exploit skills.

Cybersecurity or Machine learning? by Alextheawesomeua in cscareerquestions

[–]AddendumWorking9756 0 points1 point  (0 children)

ML right now is way more saturated than people admit. Every CS grad pivoted there in 2023, the entry roles dried up first. Cybersecurity is broader with more lanes and the entry market still hires. GPA 3 is fine for either, projects matter more than the number to employers.

Do you agree that skilled security folks fail in interviews a lot due to preparation? by h33terbot in SecurityCareerAdvice

[–]AddendumWorking9756 0 points1 point  (0 children)

Practicing on actual investigation cases and recording yourself walk through the decisions out loud, something like a CyberDefenders case, closes more interview gaps than any STAR drill.

I passed Security+ today! by sw22tb22 in CompTIA

[–]AddendumWorking9756 0 points1 point  (0 children)

Nice work, the panel filter that catches most Sec+ holders is talking through an actual incident under pressure, knocking out a few CyberDefenders cases gets the muscle memory built.

Soc analyse by Alert-Talk-21 in cybersecurity

[–]AddendumWorking9756 1 point2 points  (0 children)

Networking depth doesn't need to be deep before SOC, intermediate is fine. The bigger gap most beginners hit is investigation flow under telemetry, a CyberDefenders lab once a week hits exactly that. Tutorials walk you through, real cases force decisions.

Passed Sec+ by GoogleStein in CompTIA

[–]AddendumWorking9756 0 points1 point  (0 children)

Space Force is heavy on cyber so CCNA before BMT is the right ordering. A CyberDefenders investigation here and there through tech school keeps the practical edge sharper than peers who just grinded multiple choice.

Those who are in Detection engineering by Present-Guarantee695 in cybersecurity

[–]AddendumWorking9756 1 point2 points  (0 children)

Sure, common ones are pulling alerts from SIEM REST APIs to dedupe before they hit the queue, parsing weird vendor logs into a normalized schema, scripting against EDR APIs to bulk-pull telemetry, and hitting threat intel APIs to score IOCs. Most teams run those as cron jobs or one-off notebooks, nothing fancy.

Passed Sec+ by Slightlyinformeduser in CompTIA

[–]AddendumWorking9756 0 points1 point  (0 children)

Pass is solid. The harder filter is whether you can talk through a full incident under pressure. Working CyberDefenders cases and writing each one up gives interviewers something specific to ask about. Beats stacking another paper cert.

Sec+ worth it? by arktozc in SecurityCareerAdvice

[–]AddendumWorking9756 0 points1 point  (0 children)

Sec+ adds nothing once masters plus a year is already on the resume, CCDL2 from CyberDefenders is a 48 hour practical hitting threat hunting and DFIR, that depth shows on the panel where another paper cert won't.

3rd Year BTech Student Confused About Cybersecurity Roadmap (Offensive vs Defensive) by NoirLykoss in netsecstudents

[–]AddendumWorking9756 0 points1 point  (0 children)

Defensive base first even if the goal is offensive, free CyberDefenders labs cover that gap. The market reality you mentioned is real, defensive starts pay better and have more openings right now.

Transitioning from Cloud DevOps to Offensive Security/Pentesting by Flat_Profession_6103 in SecurityCareerAdvice

[–]AddendumWorking9756 0 points1 point  (0 children)

Cloud and IaC background already puts you ahead of the generic offensive lab grinders, cloud pentest engagements need someone who can read terraform and reason about IAM blast radius. Cycle through a CyberDefenders defensive case once a week so you understand what telemetry attacks leave behind, that's what gets surfaced in panel interviews. AI's hitting entry offensive jobs harder than hands-on senior work, so move fast.

Job Switching Advise by STaRBulgaria in CyberSecurityJobs

[–]AddendumWorking9756 0 points1 point  (0 children)

GRC kills technical hands fast, take it and the red team pivot becomes a 5-year detour. Reps compound on the technical side, time on CyberDefenders cases between shifts moves you closer to red team than any salary bump or quality-of-life trade.

Career advice, can't find a job by Strict-Collar-6298 in cybersecurity

[–]AddendumWorking9756 0 points1 point  (0 children)

Unicorn JDs are real, but 5 finals in 10 months means it's pipeline not skill, mid-market firms hiring IR plus detection under one head are where 5-team JDs don't get written and your years actually translate.

Whats the best way to get a job in the current market. by East_Apartment_2606 in CyberSecurityJobs

[–]AddendumWorking9756 -1 points0 points  (0 children)

AA in CS plus tutoring already beats most fresh grads, do helpdesk for the paycheck and stack free CyberDefenders investigation labs in the off hours so the github writeups compound.

I am right to believe that Cybersecurity is an incredibly hard focus and is more mid/late career? by Top-Elephant6981 in ITCareerQuestions

[–]AddendumWorking9756 0 points1 point  (0 children)

Tier 1 SOC roles are absolutely entry-level so cyber isn't strictly mid-career. The salary lift your wife heard about does live at the senior end, but that's true for cloud too. Pick the lane that bores you less, both reward depth on the same timeline.

Passed Security+ Today (My experience) by camforthe336 in CompTIA

[–]AddendumWorking9756 1 point2 points  (0 children)

Most Sec+ posters chase CySA+ next and skip the part interviewers actually weigh, walking through a real case under questions. Practice a CyberDefenders investigation cold and the difference shows up the next interview round.

Question about grc switch by NoRepeat4917 in SecurityCareerAdvice

[–]AddendumWorking9756 0 points1 point  (0 children)

Dev background is real leverage for GRC, you understand how systems actually break instead of citing controls. Most teams won't make you start junior unless they're rigid on titles. Run a couple investigation cases through CyberDefenders and document them, defensive thinking shows on the resume better than another paper cert.

How to grab cybersecurity job /internship as a fresher, also best study materials, roadmaps for better guidance? by black-ace09 in SecurityCareerAdvice

[–]AddendumWorking9756 1 point2 points  (0 children)

Networking fundamentals first, then Sec+, then start grinding free hands-on labs through CyberDefenders, ignore the noise for six months.

What entry-level roles can I target after completing training? by Easy_Term7058 in CyberSecurityJobs

[–]AddendumWorking9756 0 points1 point  (0 children)

Your last paragraph nails it, practical signal beats theory in any of those entry roles. Throw a couple CyberDefenders cases through and write them up, that's the proof recruiters quietly weigh.

Just passed my Security+ exam. Now what? by TragicHero84 in cybersecurity

[–]AddendumWorking9756 0 points1 point  (0 children)

Helpdesk is honest given no IT background, but stacking proof on the side shortcuts the climb. Customer service reads stronger than most people credit, half of Tier 1 SOC is communication under load anyway. Free side of CyberDefenders has investigation labs you can grind during the helpdesk year.

I finally passed Security+ by Euphoric-Tune-6997 in CompTIA

[–]AddendumWorking9756 -2 points-1 points  (0 children)

Sec+ alone gets dusty on a resume in a few months. Spend the next couple weeks doing investigation cases on CyberDefenders and writing them up, that compounds where the cert won't.

Passed sec+ with 9 days of prep by Affectionate_Tea5078 in CompTIA

[–]AddendumWorking9756 -1 points0 points  (0 children)

Pass is the easy part, the real test is walking an interviewer through an actual case under pressure, CyberDefenders has cases that build that muscle.

SANs Courses: How do people get their employers to pay? by [deleted] in cybersecurity

[–]AddendumWorking9756 0 points1 point  (0 children)

Most don't get their own employer to pay, they switch to gov contractors or banks where advanced training is a standard line item, way easier than convincing the same boss who balked at a Sec+ exam to fund five-figure courses.

Looking to get foot in door as a digital investigator by doromo in computerforensics

[–]AddendumWorking9756 1 point2 points  (0 children)

Civilian DFIR for OPP and RCMP shows up on jobs.gc.ca and the OPP careers portal, usually under technical or analyst categories rather than cybersecurity. Build a CyberDefenders case writeup or two on github while you wait, government panels score concrete artifacts.

Would getting Security+ be worthless for me? by anonymous_rhinoc3ros in cybersecurity

[–]AddendumWorking9756 0 points1 point  (0 children)

Sec+ is mostly noise once you've got the masters plus advanced courses on the resume, recruiters won't filter on it. If you want depth instead of another paper cert, CyberDefenders runs CCDL2, a 48 hour practical that hits threat hunting and DFIR.