This is meant to assist people looking for entry level Cybersecurity jobs. Meant to be a Swiss Army Knife for looking for Entry-level jobs (expanding to full cybersecurity in the near future). A work in progress, so if you see mistakes, please mention it in the "Issues" section.
NOTE: I DO NOT OWN ANY OF OF THIS INFORMATION. THIS IS JUST MEANT TO BE A COMPILATION OF VARIOUS RESOURCES. SOURCES ON THE BOTTOM.
- Foothold Job Titles
- Entry-Level Job Titles
- Mid-Level Job Titles
- Advanced-Level Jobs Titles
- Learning Hacking Skills
- Certifications
- Career Websites
- Sources for this Document
IT Support Techinician - Using a ticketing system for internal support requests and installing programs on computers.
IT Helpdesk Tier 1 - Using a ticketing system to provide support, as well as providing technical support over the phone.
Junior Network Technician - Assisting in adding users to the network, modifying user access, and performing basic network maintenance tasks.
System Administrator - Responsible for the configuration, upkeep and reliable operation of a company’s network and computer systems.
Data Administrator - Use specialized software to store and organize data.
Network Administrator - Manage an organization's computer networks.
IT Technician - Provide general desktop and printer support for a company and/or its clients, or they provide network support.
Security Administrator - Installs, administers, and troubleshoots an organization's security solutions.
Network Engineer - Design, build, implement and maintain the computer networks businesses and organizations use.
Information Security Analyst - Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information.
Junior Penetration Tester - Hired by a client to bypass or defeat security controls.
Cybersecurity (Security) Technician / Specialist - Protects computer assets by establishing and documenting access; maintaining files.
Cyber Crime Analyst/Investigator - Information security professionals who use their skills and background knowledge in areas like network administration or network engineering to help counter the activities of cyber criminals such as hackers and developers of malicious software.
Incident Analyst/Responder - Require an understanding of security operations, a solid foundation of technical skills related to information and network security, and strong communication skills.
IT Auditor - Responsible for analyzing and assessing a company’s technological infrastructure to ensure processes and systems run accurately and efficiently, while remaining secure and meeting compliance regulations.
Cybersecurity Analyst - Information technology professional whose primary function is to protect organizations from cyber attacks and respond swiftly to restore protection if compromised.
Cybersecurity Consultant - Responsible for keeping a client’s data suitably protected and free from the risk of cyber attacks and related problems
Penetration & Vulnerability Tester - Highly skilled security specialists that spend their days attempting to breach computer and network security systems.
Cybersecurity Manager / Admininstrator - Require an advanced understanding of information security concepts, security operations and information assurance, as well as risk management and project management skills.
Cybersecurity Engineer - Help businesses by protecting their computer and networking systems from potential hackers and cyber-attacks.
Cybersecurity Architect - Combines hardware and software knowledge with programming proficiency, research skills, and policy development.
Keep Up With Vulnerabilities:
https://portswigger.net/daily-swig
https://securitynewswire.com/index.php/Home
https://hackerone.com/hacktivity (Recent bug-bounties found)
Learn About Vulnerabilities:
https://www.hacksplaining.com/lessons
Learn About Kali Linux (Pen-testing OS):
https://kali.training/courses/kali-linux-revealed/
https://www.tutorialspoint.com/kali_linux/index.html
Learn About Parrot (Pen-testing OS):
https://www.tutorialspoint.com/parrot/index.html
Learn About BlackArch (Hacking OS):
https://uthena.com/courses/blackarch-linux (Paid)
https://blackarch.org/blackarch-guide-en.pdf
Practice Linux Skills:
https://overthewire.org/wargames/bandit/
Practice CTF (Capture The Flag) Skills:
https://www.picoctf.org/ (Free)
https://cyberskyline.com/events/ncl (Paid)
https://ctflearn.com/ (Free)
https://www.hackthissite.org/ (Free)
https://ctf.hacker101.com/ctf (Free)
Practice Penetration Testing:
https://www.hackthebox.eu/ (Free/Paid)
https://tryhackme.com/ (Free/Paid)
https://www.pentesteracademy.com/onlinelabs (Paid)
Watch Videos Related To Hacking:
https://www.youtube.com/channel/UC-8Ba047kFinfgp3sO53qcA (ITPro.tv)
https://www.youtube.com/channel/UC0ArlFuFYMpEewyRBzdLHiw (The Cyber Mentor)
https://www.youtube.com/playlist?list=PLRCfGWSPoev68hGDQlGM0DHHhpCOaIu4K (BLACK ARCH LINUX TUTORIAL)
https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w (LiveOverflow)
Watch Hackthebox Write-Ups:
https://www.youtube.com/channel/UCa6eh7gCkpPo5XXUDfygQQA (IppSec)
https://www.youtube.com/c/HackerSploit/videos (HackerSploit)
Certifications are a way to get HR's eye. From my understanding, it DOES NOT replace a College/University Degree.
(Source: https://www.pauljerimy.com/OC/Security%20Certification%20Progression%20Chart%20v7.0.png)
https://www.indeed.com/ (Jobs/Internships)
https://www.ziprecruiter.com/ (Jobs/Internships)
https://www.glassdoor.com/index.htm (Jobs/Internships)
https://www.monster.com/ (Jobs/Internships)
https://www.chegg.com/internships/ (Internships)
https://www.simplyhired.com/ (Jobs / Internships)
https://www.careerbuilder.com/ (Job / Internships)
https://www.usajobs.gov/ (Jobs / Internship) (USA only)
Google job search (etc. cybersecurity jobs [city name])
Job search on company websites
https://startacybercareer.com/best-entry-level-cyber-security-jobs/
https://www.indeed.com/career-advice/finding-a-job/what-is-an-it-technician
https://www.thebalancecareers.com/network-administrator-525818
https://en.wikipedia.org/wiki/Database_administrator
https://www.indeed.com/career-advice/careers/what-does-a-system-administrator-do
https://securityintelligence.com/how-to-land-an-entry-level-cybersecurity-job/
https://www.betterteam.com/security-administrator-job-description
https://i.lensdump.com/i/iHcJHP.png
https://www.cyberseek.org/pathway.html
https://www.indeed.com/career-advice/career-development/how-to-become-a-cyber-security-analyst
https://www.thebalancecareers.com/cyber-intelligence-analyst-2071296
https://www.infosecinstitute.com/roles/incident-responder/
https://www.cio.com/article/3346029/it-auditor-role-defined.html
https://www.fieldengineer.com/skills/cyber-security-consultant
https://www.infosecinstitute.com/roles/cybersecurity-manager/
https://www.betterteam.com/cyber-security-engineer-job-description