Phone Number +1-202-802-9399 (US)
The Lockdown

Thycotic’s Cyber Security Blog

Give Your Cyber Security Career a Boost

Written by Joseph Carson

August 3rd, 2021

While the shortage of qualified cyber security professionals continues to grow exponentially and ransomware attacks grab international headlines, many mid-career IT professionals with cyber security job experience are evaluating their options.

Maybe a year of working remotely has given you pause to think about your career goals and take some time to learn new skills. Or, perhaps you’ve been shifted to a position that focuses much more on cyber security operations and management than before.

You are in a rapidly growing, evolving, and challenging field

In any case, you’ll find lots of advice about how to get into a cyber security career as a beginner, but not so much on what you should be looking at as you move into mid-career mode. Here are a few suggestions to consider as you review your options going forward. Just know you are in a rapidly growing, evolving, and challenging field—a great place to be as a knowledge worker in 2021.

Look for management role opportunities

Most professionals recognize that moving into a management role supervising others is an advancement in both pay and recognition. Getting beyond the frontlines of security administration into the ranks of management means first and foremost understanding the responsibilities around a specific position such as supervising monitoring or being responsible for a security incident response plan.

Beyond the specifics of any one position, honing management skills involves digging deeper into how your business operates, and how decisions are made. Are you in a fairly strict hierarchical management structure, or does your organization tend to work in collaboration?  Does collaboration extend beyond the IT security team to involve other divisions or work groups?

Cyber security certifications and training platforms

Cyber security certifications are a good way to enhance your skills and demonstrate your depth of knowledge. While certifications are not mandatory for most positions, they are a good indicator of your dedication to continuous learning and help prove your skills. I highly recommend looking at some of the following certifications and training platforms.

  1. Cybrary

Cybrary is an online learning platform with a growing community of people and companies delivering training.

  1. (ISC)2 CISSP (Certified Information Systems Security Professional)

The CISSP is one of the highest-level certifications in the industry and being a CISSP proves the depth of knowledge and experience in cyber security.


GIAC Certifications provide the highest and most rigorous assurance of cyber security knowledge and skill available to industry, government, and military clients across the world.

  1. Offensive Security OSCP

The industry-leading Penetration Testing with Kali Linux (PWK/PEN-200) course. This online ethical hacking course is self-paced. It introduces penetration testing tools and techniques via hands-on experience. PEN-200 trains not only the skills, but also the mindset required to be a successful penetration tester.


ISACA’s Certified Information Security Manager (CISM) certification indicates expertise in information security governance, program development and management, incident management, and risk management. Take your career out of the technical realm to management!

Show how cyber security impacts the business

A strong cyber security professional displays an understanding of how cyber security impacts other functions of the company and communicates ways in which employees can not only meet compliance mandates but improve their productivity. Research shows that the most successful leaders take a strong interest in how the business operates and how cyber security can enable safer and better work processes.

Educate employees and customers about the benefits of cyber security

While some individuals may be reluctant to place themselves in the spotlight, moving up the career ladder typically requires a higher profile within your organization. You can raise your visibility by contributing blog content, volunteering for special committees, studying security issues, or helping to educate employees and customers about the benefits of cyber security through training or speaking engagements. Showing your commitment to improving your job performance can serve as a major motivator for your colleagues as well.

If possible, find a mentor within your organization that serves as a model for how an effective manager operates. Asking questions and seeking their advice helps you to envision how you will perform as a manager, highlighting your own strengths to cultivate and weaknesses to overcome.

While you may have exhausted all the professional certifications available, you may also want to consider enrolling in a master’s degree program in business. Your employer may even contribute to the costs of higher education, knowing that strengthening business acumen is a proven way to enhance professional leadership skills.

Working through a global pandemic has placed a premium on managers who can quickly adapt to changing conditions

These days, cultivating “softer” professional capabilities typically involves developing a combination of technology, business, and interpersonal skills. This past year, working through a global pandemic has placed a premium on managers who can quickly adapt to changing conditions, sensitive to the pressures that remote workers face.

Know that every organization, regardless of its size, needs mid-level professionals to step up and assume leadership roles wherever possible. High turnover, burnout, and other stressors will test all IT professionals in the months and years ahead. Advancing your career in cyber security has perhaps never presented so many opportunities for those who rise to the challenge.

Thycotic Educational Content and Webinars

If you are interested in learning new skills, take a look at some of Thycotic’s free resources to help you get started. These guides will walk you through an ethical hacker’s guide to protecting systems including Windows devices and Active Directory.

Download “How Secure Are Your Endpoints? An Ethical Hacker’s Guide to Protecting Windows Machines”

How Secure are your Endpoints | Protect Windows Machines

Like this post?

Get our top blog posts delivered to your inbox once a month.