{"id":209,"date":"2020-08-10T00:00:03","date_gmt":"2020-08-10T00:00:03","guid":{"rendered":"https:\/\/alibkaba.com\/?p=209"},"modified":"2025-11-14T01:14:36","modified_gmt":"2025-11-14T01:14:36","slug":"my-proven-1-year-journey-tech-support-to-vulnerability-management","status":"publish","type":"post","link":"https:\/\/alibkaba.com\/index.php\/2020\/08\/10\/my-proven-1-year-journey-tech-support-to-vulnerability-management\/","title":{"rendered":"My Proven 1-Year Journey: Tech Support to Vulnerability Management"},"content":{"rendered":"\n<p id=\"ember53\">The definition of success is the accomplishment of a goal. If your goal is to transition into the cybersecurity space, I&#8217;ll provide the steps but first I&#8217;ll share my own story.<\/p>\n\n\n\n<p id=\"ember54\">At the time that I was looking into pivoting diagonally from a support role into the cybersecurity role, everything seemed daunting but I was set to make it happen. Getting certified was a must, so I reviewed various roadmaps, including <a href=\"https:\/\/pauljerimy.com\/security-certification-roadmap\/\">Paul Jerimy&#8217;s roadmap<\/a> to help build my own.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"640\" height=\"427\" src=\"https:\/\/alibkaba.com\/wp-content\/uploads\/2025\/11\/1595816390040.jpeg\" alt=\"\" class=\"wp-image-213\" srcset=\"https:\/\/alibkaba.com\/wp-content\/uploads\/2025\/11\/1595816390040.jpeg 640w, https:\/\/alibkaba.com\/wp-content\/uploads\/2025\/11\/1595816390040-300x200.jpeg 300w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/figure>\n<\/div>\n\n\n<p id=\"ember56\">To do this, you <strong>must<\/strong> be passionate about the field. I loved it which is why I pursued my <a href=\"https:\/\/www.sacredheart.edu\/majors--programs\/cybersecurity---ms\/\">Cybersecurity MS<\/a>. If you don&#8217;t have any formal education on the subject, don&#8217;t let that stop you from moving forward. Find your thirst and fuel it, also make this a journey and not just the destination. You will get there, trust me.<\/p>\n\n\n\n<p id=\"ember57\"><strong>December, 2022 update<\/strong>: I&#8217;m updating my steps to accommodate the recent program changes.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Complete all courses\/certs in <a href=\"https:\/\/www.offensive-security.com\/fundamentals\/\">Offsec&#8217;s Learn Fundamentals<\/a> in three months.<\/li>\n\n\n\n<li>Take the necessary steps to complete <a href=\"https:\/\/www.offensive-security.com\/pwk-oscp\/\">PWK OSCP<\/a> within 6 months. Find labs to sharping your skills, here are some examples <a href=\"https:\/\/www.offensive-security.com\/labs\/\">OffSec&#8217;s PG<\/a>, <a href=\"https:\/\/www.hackthebox.eu\/\">HackTheBox<\/a>, and <a href=\"https:\/\/www.virtualhackinglabs.com\/\">VirtualHackingLabs<\/a>.<\/li>\n\n\n\n<li>Like the previous step, but this time with <a href=\"https:\/\/www.isc2.org\/Certifications\/CISSP\">CISSP<\/a> but within three months.<\/li>\n<\/ol>\n\n\n\n<p id=\"ember59\">Once last piece of advice is to keep this <strong>within a year<\/strong> and not to push it out further, otherwise you increase the risk of falling behind or worst, not completing it.<\/p>\n\n\n\n<p id=\"ember60\">That&#8217;s it, by the time you&#8217;re done with all these steps, plenty of recruiters will be looking to hire you for a role in the cybersecurity space.<\/p>\n\n\n\n<p id=\"ember61\">If you liked this write up, let me know on LinkedIn.<\/p>\n\n\n\n<p id=\"ember62\">Good luck!<\/p>\n\n\n\n<p id=\"ember63\">Photo by <a href=\"https:\/\/unsplash.com\/@randalynhill?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Randalyn Hill<\/a> on <a href=\"https:\/\/unsplash.com\/s\/photos\/passion?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash<\/a><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The definition of success is the accomplishment of a goal. If your goal is to transition into the cybersecurity space,&#8230;<\/p>\n","protected":false},"author":2,"featured_media":213,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-209","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"_links":{"self":[{"href":"https:\/\/alibkaba.com\/index.php\/wp-json\/wp\/v2\/posts\/209","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/alibkaba.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/alibkaba.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/alibkaba.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/alibkaba.com\/index.php\/wp-json\/wp\/v2\/comments?post=209"}],"version-history":[{"count":3,"href":"https:\/\/alibkaba.com\/index.php\/wp-json\/wp\/v2\/posts\/209\/revisions"}],"predecessor-version":[{"id":231,"href":"https:\/\/alibkaba.com\/index.php\/wp-json\/wp\/v2\/posts\/209\/revisions\/231"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/alibkaba.com\/index.php\/wp-json\/wp\/v2\/media\/213"}],"wp:attachment":[{"href":"https:\/\/alibkaba.com\/index.php\/wp-json\/wp\/v2\/media?parent=209"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/alibkaba.com\/index.php\/wp-json\/wp\/v2\/categories?post=209"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/alibkaba.com\/index.php\/wp-json\/wp\/v2\/tags?post=209"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}