How to Get Into the Cyber Security Field From Any Background

Cyber security skills are in demand and apply to a wide range of tech industries. Whether you’re looking to upskill or change careers entirely, there are many ways to get into the cyber security field for those with fundamental technical experience.

In this guide, we will discuss different ways to gain the cyber security skills you’ll need to enter the cyber security field.

How to Get Into the Cyber Security Field if You Need to Gain Competitive Skills (With an IT or Technical Background)

Many of the skills involved in IT careers overlap with cyber security job roles. Most IT-focused careers center around planning, building, and maintaining computer and information systems for an organization, while cyber security roles focus on defending those systems from attacks, planning security policies and procedures, and investigating breaches. As you can see, these roles are quite complimentary, as are the associated skill sets.

IT professionals interested in switching to a cyber security role will find their existing skill sets enhance the new cyber security skills they acquire, and can help them better anticipate cyber threats and possible security issues before they occur. As a result, IT professionals will find a blend of both skill sets valuable and practical.

Resources for IT Professionals Wanting to Switch Into Cyber Security


  • CompTIA: An organization offering cyber professionals resources about cybersecurity trends and best practices, as well as information to help build an IT security practice.
  • NIST (National Institute of Standards and Technology): A federal agency helping critical infrastructure owners and operators manage their cyber risks through the use of the NIST Cybersecurity Framework.
  • The Hacker News: Provides coverage on a wide variety of data breaches, cyberattacks, vulnerabilities, malware, and other security issues.
  • Threatpost: Intended for information security professionals, this site covers such topics as enterprise security, cloud security, systems and network vulnerabilities, and more.


  • Daniel Miessler: Offers a newsletter, tutorials, and IT projects, in addition to an expert-level blog, to help aspiring cyber professionals build their skills.
  • Graham Cluley: Provides cyber security news, as well as expert opinions and advice.
  • Mashable Cybersecurity: Collects all cyber-related articles from its site, including the latest on ethical hacking, recent breaches, and more.


  • Darknet Diaries: Intended to capture, preserve, and explain the culture around hacking and cyber security in order to educate and entertain.
  • Paul’s Security Weekly: Features interviews and open discussion with folks in the security community, including technical segments and security news.
  • Security Weekly: Includes a variety of hosts covering many cyber security topics.
  • Tradecraft Security Weekly: Learn how to use the latest tools and techniques in offensive and defensive security in this hands-on hacking show.

Technical and Soft Skills You’ll Need

Cyber security is a fast-moving field that generally requires a mix of technical skills and soft skills. Here are some of the top skills required for those interested in cyber security:

Technical skills

IT skills: These skills help cyber professionals better understand all aspects of the networks they are fortifying, so as to better anticipate the types of cyber attacks they may encounter and underlying system vulnerabilities that need to be fortified.

Programming skills: These skills equip cyber professionals to better understand the inherent strengths and weaknesses of systems based on that system’s underlying code. Some of the best programming languages for cyber security include C, C++, Python, JavaScript, PHP, and SQL.

Hacking: Understanding advanced hacking tactics can help cyber professionals conduct effective penetration testing and implement proper defense measures for discovered vulnerabilities. This process is called “ethical hacking” and relies on the same skills hackers use to breach systems.

Soft skills

Written and verbal communication skills: Cyber security professionals may work with multiple teams across organizations, often communicating with managers, executives, and other key stakeholders at once. Communication skills are vital for discussing security protocols, potential threats, and incident reports.

Lifelong learning: Cyber security is a field that evolves quickly, and staying up-to-date with rapidly changing threat vectors and security best practices is a must.


Collaboration: Due to the far-reaching implications of security breaches, cyber professionals must work across functional and department lines to help protect digital assets. Gaining the cooperation and support of others in these efforts is vital to success, so the ability to collaborate with others effectively is key.

How to Gain the Skills You Need

There are several ways to gain the skills you need to break into the cyber security field. On-the-job training is a practical method for IT professionals to comfortably transition into cyber security roles. Taking on cyber security-related tasks and learning while working can help you gain relevant industry skills before shifting roles. This experience will enable a more seamless transition into a new set of responsibilities.

Aspiring career switchers may also consider learning skills through a more formal educational option. There are three primary pathways for those wishing to learn in this manner.

  • Cyber security bootcamp: Cyber security bootcamps are an excellent way to gain in-demand cyber security credentials quickly and thoroughly. University of Denver Cybersecurity Boot Camp, for instance, provides two weeks of test prep for the Security+ certification and one year of access to CompTIA’s CertMaster test prep platform for the exam — all while offering project-based learning tailored to real-world cyber security scenarios and responsibilities. Though intensive and fast-paced, bootcamps are flexible and predicated on personalized learning.
  • Traditional degrees: Alternatively, related degree programs in fields like computer science, engineering, or programming commonly teach crucial cyber security skills pertaining to different tech industries, giving students the chance to learn in a gradual, comprehensive manner while exploring other topics of interest as well.
  • Independent learning: Independent learning options, such as free courses and educational mobile apps, are also a viable pathway for learning cyber security. These outlets allow learners to gain crucial skills at their own pace, simultaneously fostering technical industry knowledge and applicable soft skills such as time management, accountability, and task compartmentalization.

IT Jobs That Make the Transition Into Cyber Security Easier

System administrators

System administrators are responsible for the day-to-day operations of an organization’s computer network and information technology infrastructure. They typically have a wide range of knowledge about how computer systems operate — from both a technical and user-facing standpoint. Many systems administrators focus on computer security as part of these responsibilities, providing an array of valuable, transferable skills that can help them seamlessly pivot into cyber security roles if desired.

Computer systems analysts

Computer systems analysts study an organization’s current computer systems and policies, and design solutions that help an organization work more effectively and efficiently. They document these systems to understand, upgrade, and help rebuild them. These responsibilities result in numerous transferable skills between computer systems analysis and cyber security. For instance, both positions involve developing procedures, researching emerging technologies, and presenting plans to stakeholders within an organization. The content might differ — cyber security professionals focus on security, while computer systems analysts focus on implementing computer systems more broadly — but the remaining facets of the jobs enjoy a reasonable amount of cross-pollination in this regard.

Network engineers

Network engineers (also commonly known as network architects) focus on building and maintaining valuable communication infrastructure for an organization. Many network engineering roles commonly entail developing and implementing security procedures and systems, making it easy for network engineers to pivot into a cyber security career through transferable skills such as network back end fluency, technical critical thinking, and adaptability to a multitude of fast-moving challenges.

How to Get Into the Cyber Security Field if You Want to Switch Careers (Coming From a Non-Technical Background)

Many new cyber security professionals can also comfortably transfer skills from non-technical backgrounds. For starters, merely having a passion for technology and critical thinking can go a long way in this field. While someone coming from a non-technical background may not have strong practical tech skills, there are still many entry-level, cyber security-adjacent roles that can help you get your foot in the door.

For example, someone interested in cyber security may find success in a less technical cyber security-focused role, such as technical writing or cyber policy analysis. Once on the job, this employee may express interest in learning additional technology skills and earning certifications, which can help broaden their horizons for higher-level cyber security jobs in the future. Picking up technical skills in this fashion could provide a wealth of hands-on experience for those entering the field.

Broadly speaking, those with non-technical backgrounds should research and establish a list of potential roles that don’t require specific hard skills. Once you have your bearings, it helps to know as much as you can about each company on your list. Try to tailor your resume to emphasize as many soft and relevant non-technical skills as possible. Also, know that many of these roles will likely be entry-level in nature, so patience will be key as you learn practical industry fundamentals and build credentials for higher-level roles.

Technical and Soft Skills You’ll Need

Computer systems: Knowing the basics of computer system administration is vital in most cyber security roles. Two of the most common systems are Windows and Linux, and fluency in such systems will increase your chances of having a seamless role transition.

Networking: Networks are groups of computers or other devices that communicate with each other. Learning how a network functions is an important skill for many cyber security professionals, as fortifying networks against potential attacks, auditing networks for existing weaknesses, and responding efficiently to network security breaches are all key elements of their jobs.

Coding: Understanding the basics of coding is helpful for a wide range of cyber security roles, as they help cyber professionals understand a network’s functionality at a deep technical level. With such baseline knowledge, it is easier to oversee the construction of technical security measures and protocols. Applicable programming languages in this space include Python, HTML, or JavaScript — all of which possess a versatile range of uses across different digital entities.

Presentation skills: Many cyber security roles also require strong presentation skills. These roles not only entail network fortification and security-based analysis, but also the clear and concise communication of related information (including key findings stemming from network audits and similar measures). With a proper set of presentation skills, you’ll have a better chance of justifying new security programs, procedures, or upgrades.

How to Gain the Skills You Need

Cyber security bootcamps are a great option for gaining in-demand prerequisite industry skills. University of Denver Cybersecurity Boot Camp, for instance, is a demanding but rewarding experience, and having some baseline technical skills can be helpful during instruction. However, intensive programming skills aren’t required — the bootcamp also offers pre-course tutorials to bring students up to speed with the basics.

If you are forging technical skills from the ground up, however, self-taught options may be a great prelude to a cyber security bootcamp or related college degree program. There are many resources and tutorials available on coding, networking, computer administration, and more. Studying for an IT certification can provide another avenue for picking up valuable skills.

See our guide on becoming a cyber security analyst for more information.

Non-Technical Job Experience and Skills That May Be Beneficial

Many cyber security roles require strong communication and presentation skills. For example, penetration testers work with organizations to identify weaknesses in physical or digital defenses. After testing and identifying vulnerabilities, a penetration tester typically compiles a report and presents findings to key stakeholders within their organization. As a result, knowing how to structure and present information is a significant component of the position.

Transparency and teamwork are also crucial for many cyber security professionals. Security is only one component of an organization, and organizations must balance resources between departments and weigh the benefits of implementing new security measures or protocols. Being able to work closely with other departments is crucial for many cyber security professionals, and there are numerous nontechnical roles that may provide transferable skills. For example, those coming from leadership or managerial backgrounds have likely taken steps to improve their leader-employee transparency, which can translate well to a cyber security team management or administration role.

How to Get Into the Cyber Security Field if You Plan to Start From Scratch (No Relevant Work Experience or Degree)

If you lack applicable work or education experience — not to worry! You can still pursue a job in cyber security. Consider leaning into broader soft skills that may transfer into cyber security roles: communication, collaboration, and high-level problem solving are just a few great starting points. What’s more, certifications are a good option for getting started without a degree. Relevant certifications like CompTIA Security+ or Certified Ethical Hacker (CEH) serve as strong proof of knowledge and can help fill gaps in your prior experience.

At the same time, consider finding other hands-on ways to show your competence and knowledge, such as working on volunteer projects or participating in local hackathons. These efforts can simultaneously teach you valuable skills and establish a body of work to show potential employers.

Do You Need a College Degree?

Earning a college degree in cyber security can help launch a successful career in the field. Cyber security-related degrees often offer a technology-focused curriculum touching on computer science, network construction, cryptography, and ethical hacking. Cyber security bachelor’s degrees typically involve earning 120 credits, equating to around four years of full-time study. Masters degree programs usually involve approximately 60 credit hours, or about two additional years of full-time study after your bachelor’s degree is complete.

Earning a college degree can be worthwhile if you have the time and financial resources to focus on classwork. College programs are often viewed as rich, rewarding experiences thanks to their availability of a wide variety of additional courses that may be of interest to learners as they pursue their cyber security education.

However, due to its considerable time commitment and less specialized nature (cyber security will likely have to be learned within a broader major like computer science), this approach may not be for everyone. Those with time or financial resource constraints may prefer a less structured method of study.

While a college degree can help someone get started in cyber security, it’s not the only way for someone to enter the field. According to CompTIA, around half (49 percent) of the job postings in IT-related fields don’t list a degree as a job requirement. Earning certifications, completing a bootcamp, or volunteering on cyber security projects can help you get started in the field.

Advanced Degrees vs. Alternative Pathways

While not always necessary, an advanced degree in cyber security can benefit someone pursuing an industry career from scratch. According to the U.S. Bureau of Labor Statistics (BLS), some cyber security employers prefer candidates with advanced degrees, and such credentials can be a huge advantage in diversifying job options and catching the attention of certain employers.

However, advanced degrees are not the only way to gain a competitive edge. Other effective methods of study for industry newcomers include bootcamps and self-guided options. Bootcamps, while quick and intensive, are often more accessible and tailor their instruction to accommodate an array of experience levels. For example, University of Denver Cybersecurity Boot Camp teaches valuable cyber security concepts in a real-world, hands-on format over the course of just 24 weeks. And, for non-technical learners, there are pre-bootcamp lessons to help them start the program on firm footing.

Self-learning, on the other hand, allows learners to hone select skills at their own pace. You can learn cyber security fundamentals, after work, or whenever you have free time. There are many resources available for people who want to teach themselves cyber security concepts, including free online courses, instructional videos, and educational apps. Self-taught options are a great way to develop both technical knowledge and broad time management and accountability skills, but require strong self-discipline and a good understanding of which skills are most valuable.

Finding the Right Cyber Security Role For You

There are many cyber security career paths, so it can be beneficial to take your time and evaluate your options.

For example, suppose you want to become a security architect — a consistently senior-level role that manages the network and computer security for an organization. In that case, you’ll want to consider the path that most people take to reach such a role. This could include completing a bootcamp, working as an entry-level security analyst, and gaining the experience needed to move up the career ladder. Keeping your “eye on the prize” can be important in cyber security, and the decisions you make early on can have a significant impact down the line.

Entry-Level Positions

Entry-level cyber security positions can be a great fit for someone with prior technical experience, someone who recently completed a cyber security bootcamp, or a recent graduate from a degree program. If you’re interested in learning more about entry-level positions in cyber security, read our guide on entry-level jobs in the field.

Here are a few potential entry-level cyber security roles to consider:

Information Security Analyst

Information security analysts protect an organization’s computer networks by planning and executing security measures. Job responsibilities include monitoring networks for security breaches, installing and updating security software, reporting on information or security breaches, and keeping up-to-date on industry best practices.
According to the U.S. Bureau of Labor Statistics, the 2020 median pay for Information Security Analysts was $103,590 per year. Expected job growth for the field is strong, as the BLS projects a 31 percent increase in open roles between 2019-2029. This growth is primarily due to an uptick in advanced cyberattacks and an increased need for cyber security services — particularly in healthcare and finance, where data protection is especially crucial. This role often requires a bachelor’s degree (or equivalent form of education, training, or employment) in a cyber security-related field.

Security Auditor

Security auditors are generally viewed as an offshoot of the broader information security analysis industry. They work with companies and organizations to audit security systems and detect any flaws or issues present within those systems. Overall, this position focuses on providing insight into where procedures are sufficient and how an organization can make changes to increase its information security.

People working as security auditors must understand threats and tactics used against computer systems, identify risks, and communicate those risks to other departments, such as network administrators or other levels of management. This communication allows for a quicker, more cohesive problem-solving process resulting in more informed solutions. Someone working as a security auditor needs a mix of technical, communication, and presentation skills to effectively interpret security-related technical matters, properly communicate them to the appropriate parties, and present potentially complex information in a manner that is both understandable and actionable.

Penetration Tester

Another specific role within information security analysis is penetration tester. This role focuses on identifying existing security issues for a company or organization. Penetration testers can be considered “ethical hackers,” as they attempt to break a company’s security protocols to identify vulnerabilities.

Penetration testers use a variety of methods to test an organization’s security practices and infrastructure. These methods can include testing wireless network security, attempting to attain unauthorized access to a facility’s physical space, or social engineering, which tries to fool people in the organization into breaching security protocols.

The penetration tester’s findings are summarized in a report and presented to the organization in a debrief meeting. Like security auditors, penetration testers must bring a mix of technical and soft skills, as they are regularly tasked with testing an organization’s security and summarizing key findings identified during this process. Working as a system administrator, network engineer, or system architect can prepare someone for work in this role.

Senior Positions

While pursuing entry-level roles, it helps to establish a higher job goal for the future — namely in a senior-level position. Forward-thinking can help you find the right fit for an entry-level position and properly kick off your journey.

Here are a few senior-level cyber security positions to consider:

Chief Information Security Officer (CISO)

The CISO is a senior-level executive role within information security analysis. It focuses on developing and implementing security processes that protect an organization from cyber attacks and risks. The CISO creates and maintains a high-level strategy to protect vital information from attacks, allowing organizations to proactively plan for breaches while preemptively fortifying existing infrastructure.

Typically, the CISO is a top executive at an organization that focuses on information security and cyber security. CISOs set the tone and pace for security initiatives in the organization. Most CISO positions require around 7-10 years of experience in the field, and they usually have broad skills like high-level IT knowledge, team management, and critical thinking. Specifically, CISOs should have an eye for potentially complex solutions — balancing the ability to properly communicate plans and spearhead multifaceted initiatives in pursuit of stronger security systems.

Security Architect

Security architects are senior-level employees responsible for maintaining a company’s computer systems and security protocols. This requires high-level knowledge surrounding security frameworks, vectors of attack, and network security. Their experience and skill sets usually include critical thinking, high-level troubleshooting (typically amidst ongoing projects), and the ability to upgrade and maintain a variety of hardware and software. This is a “big picture” role focused on overseeing broad security programs and policies for a company or organization.

Most security architects have five or more years of experience in the field and command high salaries. According to the BLS, computer network architects had a median salary of $116,780 in 2020, and the number of jobs in the field is projected to grow by 5 percent between 2019 and 2029. Demand for these professionals has grown as more firms expand their IT networks, creating additional job opportunities for architects to build new digital infrastructure and upgrade existing networks.

Cyber Security Engineer

Cyber security engineers build and oversee security systems and procedures, identifying threats and vulnerabilities in computer systems and software. They apply their skills to develop solutions to defend against threats and are responsible for implementing associated changes to software and computer systems on an ongoing basis. Job responsibilities include planning, managing, and implementing security measures; troubleshooting security issues; and responding to security breaches as they occur. As savvy auditors and problem solvers, engineers are vital to businesses because they keep networks up-to-date while actively mitigating both budding and existing security threats.

Cyber security engineers tend to have a strong background in software development, broad cyber security protocol, and computer administration and networking. Typically, cyber security engineers also bring several years of experience in relevant technical roles before starting in this position, and applicable skills usually include high-level web development, specific knowledge of security-related digital structures like firewalls, and a strong understanding of network functionality.

How to Tailor Your Resume to a Cyber Security Position

Generally, the most important information to include in any cyber security resume is work experience. Potential employers will want to see what you’ve done and how your experience is applicable to the role you’re considering. This information can consist of experience in cyber security, various IT-focused positions, or other applicable roles. Now is also the time to highlight your cyber security skill-building activities such as hackathon participation, volunteer work, or freelance projects. Also be sure to include any prior education, whether that’s a college degree, bootcamp, or other relevant IT or cyber security coursework. Including any technical certifications, security clearances, or other credentials that can help you stand out as well.

Also, avoid including a headshot, as this won’t help you land a position and wastes valuable space on your page. In the same vein, forgo passions, hobbies, and other non-work-related information — unless it might aid your chances within the context of the role or interview in question.

Cyber Security Employers

In considering your personal career goals and where to begin your cyber security job search, it’s important to research a variety of cyber security employers to determine which may be the right fit for you.

This list of cyber security employers can help get you started your search.

  • Appgate: This Miami-based secure access vendor recently updated its software-defined perimeter offering and went public, kicking off a 32 percent increase in headcount that is still climbing.
  • Cloudflare: Offering zero-trust cybersecurity to the federal government to help agencies modernize their infrastructure, this San Francisco-based company increased revenue by 50 percent in 2021 and is actively looking for security professionals globally.
  • CyberArk: Providing an advanced Identity Security Platform to help secure high-risk access and broaden protection across cloud and hybrid environments, this Newton, Mass.-based identity security vendor has grown its employee base by 21 percent — mostly in engineering and IT.
  • Everbridge: This Boston-based Critical Event Management (CEM) services provider boasts a majority share of U.S. airports, U.S.-based investment banks, the largest global consulting firms, the largest global automakers, the largest U.S.-based health care providers, and 7 of the 10 largest technology companies in the world as clients.
  • Fortinet: This Sunnyvale, Calif.-based platform security vendor delivers consistent security for all networks, endpoints, and clouds via SASE and zero-trust network access. Experiencing 29 percent sales growth YOY in 2021, recruiting in all areas of IT is a priority for this company.
  • LogRhythm: Designing, developing, and delivering AWE-SIEM solutions that defend and respond to cyberthreats, this Colorado-based cybersecurity firm is a strong competitor in the sector.
  • Palo Alto Networks: This Santa Clara, Calif.-based platform security giant is one of the world’s largest pure-play cybersecurity vendors, and experienced 27 percent YOY growth in its 2021 fiscal year. As a result, they’re continuing to expand their workforce (24 percent increase in 2021) with the most aggressive hiring in support and engineering.
  • Qualys: This Foster City, Calif.-based cloud security vendor provides a continuous assessment of an organization’s security and compliance posture, along with response capabilities such as threat prioritization and patching. New capabilities and tech have increased sales and stock price considerably, prompting a 20 percent expansion in their workforce.
  • Rapid7: Acquiring such cyber innovators as IntSights, Kubernetes’s security startup Alcide, and Velociraptor, this Boston-based cybersecurity company experienced 29 percent YOY sales increases in 2021 and a 20 percent increase in workforce. Aggressive hiring is still taking place in engineering and IT functions.
  • SentinelOne: Recently rolling out its Singularity Mobile product (a new AI-powered mobile security offering delivering autonomous threat protection, detection, and response for iOS, Android, and Chrome OS devices) this Mountain View, Calif.-based endpoint security vendor anticipates 114 percent YOY sales growth in its fiscal 2022 year, and is aggressively hiring.
  • The Central Intelligence Agency (CIA): The CIA hires a variety of cyber security and IT-related positions.
  • The Department of Homeland Security (DHS): The DHS employs cyber security personnel to combat terrorism both domestically and internationally.
  • The Federal Bureau of Investigation (FBI): The FBI employs cyber professionals to help detect and combat crime within the United States.
  • The National Security Agency (NSA): The NSA is consistently looking for candidates in a number of cyber security roles.
  • The U.S. Office of Personnel Management: The federal government continues to seek cyber security professionals for a variety of roles across a variety of departments and agencies.

Summing Up

In addition to being in demand, cyber security careers are engaging, dynamic, and typically lucrative for individuals at almost all skill levels. Today, cyber security is an equally viable career option for workers in related fields, industry upskillers, and those wishing to enter the field from scratch.

What’s more, aspiring cyber security professionals can access a variety of effective educational pathways. Completing a cyber security bootcamp, for example, provides hands-on experience with cyber security concepts. It can be helpful for a wide variety of aspiring cyber security professionals, including those wanting to get started in the field or professionals looking to grow in their current role.


  • How do I get into cyber security?

There are many ways for someone to enter the cyber security industry. Many schools offer traditional bachelor’s and master’s degrees in the field. Some skills can also be self-taught or picked up on the job at an existing organization. Completing a cyber security bootcamp typically provides in-demand skills and hands-on, practical experience in 24 weeks.

  • Is cyber security a good career?

Working in cyber security is a good career for anyone who wants to work in a dynamic, fast-paced environment. Technology changes quickly, so a learner’s mindset is key. The field is set to continue expanding quickly over the next few years — according to the U.S. Bureau of Labor Statistics, the job market for information security analysts is expected to grow by 31 percent by 2029.

  • What is the cyber security salary range?

Salaries differ, depending on the role’s industry and required level of experience. According to the U.S. Bureau of Labor Statistics, the median wage for information security analysts was $103,590 in 2020, with the lowest 10 percent earning $60,060 and the highest 10 percent earning $163,300.

  • Which certifications do I need?

There are many certifications related to cyber security that can be beneficial for job seekers. Some of the most popular professional certifications include CompTIA Security +, Certified Ethical Hacker (CEH), GIAC Security Essentials, Certified Information Systems Security Professional (CISSP), and Certified Information Security Manager (CISM).

Guides to Related Careers

Are you interested in technology careers in general? Here are some of our other guides to consider:

Career Paths for UX Designers: Your Best Options — This guide explains how to get started in the field of UX design.

Tips to Start a Career in UI Design — UI design is a great option for artistic and design-minded people. What is UI design, and how do you get started? Check out this guide to learn more.

18 Skills All Programmers Need to Have (2022 List) — Programming is a great career path for people interested in technology. Here, you’ll find some of the most important skills for programmers in 2022.

The Best Way to Learn Coding From Scratch in 2022 (For Beginners) — Want to learn to code without any previous experience? Here’s how to get started.

Get Program Info


Step 1 of 6