October 4, 2019 By Jasmine Henry 5 min read

Is a cybersecurity degree worth it? The answer is yes, but it also depends on who’s asking. Higher education could be a profitable pathway, especially if you’re already a student. However, school isn’t the only way to get your foot in the door. You can land a job in cybersecurity with a curious mindset and a solid cybersecurity resume.

A tiny percentage of today’s security professionals have an academic background in cyber. Just 64,405 college students earned a bachelor’s degree in computer and information sciences in 2016, according to the National Center for Education Statistics. Even if all these new grads got a job in cybersecurity, it wouldn’t come close to solving the talent pipeline problem. In fact, it would only solve for 3 percent of the industry’s 2 million unfilled jobs.

Nearly half of today’s chief information security officers (CISOs) majored in something unrelated, such as economics or business. Today’s security leaders have earned their seats by demonstrating leadership, curiosity and adaptability. You don’t need a degree in information science to write a winning cybersecurity resume.

10 Cybersecurity Resume Do’s and Don’ts

What’s the difference between a nontraditionally qualified candidate who scores a cybersecurity interview and someone who gets passed over? It comes down to the cybersecurity resume. Specifically, it falls on the nontraditional candidate to demonstrate they can succeed even if they lack some qualifications. If you’ve already mastered the basics of professional resume writing, dig into these intermediate insights to score a security job.

1. Include Unrelated Work Experience

Work experience outside of security and IT fields belongs on your resume, especially if you’re early in your career. According to a recent survey from Yoh, some of the most sought-after characteristics for security hires include:

  • Attention to detail;
  • Persistence;
  • Working well under pressure; and
  • Passion.

Candidates with a proven ability to avoid crumbling under pressure and persist have the personality to succeed in high-stress security roles, such as a security operations center (SOC) analyst. Military experience can also be a massive advantage. Even positions in restaurants or retail could communicate that you’re a candidate with grit, a strong work ethic and interpersonal skills. Many cyber jobs are service-oriented, so don’t scrap any customer service roles you’ve held in the past 10–15 years.

2. Don’t Wait for Workplace Experience

Being underqualified can be a huge advantage, especially if you’re willing to take charge. You can build an impressive resume free of cost.

“Start researching, start tinkering and start learning. Build yourself a home network and home lab,” recommended one security pro on Reddit. “Pick up a general-purpose language like Python … Learn to automate.”

Take advantage of opportunities like the 20-hour Introduction to Cybersecurity Tools & Cyber Attacks class offered by IBM on Coursera. Upload your coding projects to a Github account and include a link on your resume. Experience can be further built through networking and volunteer work. Initiative is attractive to cyber recruiters. Candidates must be armed with “curiosity … and a strong passion for learning and research,” wrote Robert Ackerman, founder of Allegis Capital, for TechCrunch.

3. Emphasize Soft Skills

Employers are struggling to find candidates who have both hard and soft skills, according to a recent survey from the Northern Virginia Technology Council. In fact, the crisis of soft skills is the second biggest industry pain point.

“In many cases, technology is actually easier to teach than soft skills,” said James Christopher, executive vice president for operations and engineering at 1901 Group.

Ideally, show these strengths in your experiences. For example, managing a global project team shows powerful communication and teamwork.

4. Don’t Skip the Basics

Don’t underestimate the importance of any tech skill or experience you bring to the table, especially if it proves a foundational knowledge of computers, hardware, data management or networking. Entry-level IT jobs, such as help desk operator or junior system administrator, are a solid launchpad to more senior cyber roles, especially if you can demonstrate an interest in cybersecurity and soft skills.

5. Show That You’re Coachable

Showing that you’re coachable and ready to learn is crucial, especially if you’ll need to learn key skills and responsibilities on the job. Use work experience to demonstrate times when you’ve acquired new skills with short notice or taken the initiative to pursue education on your own. Use your resume to tell a story about how you’ve grown and excelled in the face of change in the workplace or volunteer commitments.

6. Don’t Sell Yourself Short

Don’t assume that you’re underqualified for a job. Be conscious of the confidence gap. Women apply for 20 percent fewer jobs than men and are 16 percent less likely to apply for a job after viewing it on LinkedIn. Minority candidates are also impacted by a similar confidence gap and tendency to self-select fewer job postings. The confidence gap is dangerous when building diverse security teams and could harm your potential in the immediate term.

“It would be ideal if I could find a 70 percent match to job postings based on candidate resumes,” said security executive Suzan Nascimento. She often settles for well-rounded candidates with a lot of potential but only 50 percent of the required skills and experience.

7. Consider Your Career Path

Maybe you’re not cut out to be an engineer or pen tester. That certainly doesn’t exclude you from a cybersecurity career. Get familiar with the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework to see where your strengths fit in the bigger picture.

A passion for investigation could mean you’d thrive in a digital forensics role, while strong interpersonal skills could prepare you for sales or security awareness training. The talent pipeline needs candidates with diverse strengths to fill a variety of roles as cybersecurity expands.

8. Be Authentic

Pumped-up job titles or exaggerated achievements could hurt your quest to land a cybersecurity job. Be authentic, because it shows you’re honest with yourself and others, which is an important characteristic in coachable employees. Just as importantly, an authentic resume is a sign of personal ethics, which is a critical trait in a field where employees are tasked with protecting sensitive data.

9. Don’t Forget Problem-Solving

A problem-solving mindset is desirable to cybersecurity recruiters.

“We call it a hacker mindset,” Nina Wang, CEO of cybersecurity training firm OffSec, told TechTarget. “You have to actually do it, and struggle through it, and get stuck.”

Individuals with a hacker mindset are, according to Wang, “the people that can do anything in security. It doesn’t matter if they have the tools or not, because they know what to look for.” Problem-solving can be demonstrated in prior job or volunteer experiences, or efforts to level-up your skills in your home lab.

10. Do the 6-Second Test

Recruiters decide to greenlight or redlight a candidate’s resume in just six seconds. As such, your cybersecurity resume needs to be visibly great. Keep it basic, simple and format with traditional bold headers.

“Unless you’re applying for a job such as a designer or an artist, your focus should be on making your resume clean and legible,” said former HR executive Laszlo Bock.

Proofread your resume carefully and avoid catching notice for the wrong reasons, such as an outdated AOL or Hotmail email address.

Landing Your Dream Job in Cybersecurity

There is no perfect candidate, so don’t worry about making your cybersecurity resume fit how you perceive the perfect threat researcher or engineer. Use your resume to show your authentic self and the steps you’ve taken to develop cybersecurity skills inside or outside traditional classrooms and workplaces.

More from CISO

Why security orchestration, automation and response (SOAR) is fundamental to a security platform

3 min read - Security teams today are facing increased challenges due to the remote and hybrid workforce expansion in the wake of COVID-19. Teams that were already struggling with too many tools and too much data are finding it even more difficult to collaborate and communicate as employees have moved to a virtual security operations center (SOC) model while addressing an increasing number of threats.  Disconnected teams accelerate the need for an open and connected platform approach to security . Adopting this type of…

The evolution of a CISO: How the role has changed

3 min read - In many organizations, the Chief Information Security Officer (CISO) focuses mainly — and sometimes exclusively — on cybersecurity. However, with today’s sophisticated threats and evolving threat landscape, businesses are shifting many roles’ responsibilities, and expanding the CISO’s role is at the forefront of those changes. According to Gartner, regulatory pressure and attack surface expansion will result in 45% of CISOs’ remits expanding beyond cybersecurity by 2027.With the scope of a CISO’s responsibilities changing so quickly, how will the role adapt…

X-Force Threat Intelligence Index 2024 reveals stolen credentials as top risk, with AI attacks on the horizon

4 min read - Every year, IBM X-Force analysts assess the data collected across all our security disciplines to create the IBM X-Force Threat Intelligence Index, our annual report that plots changes in the cyber threat landscape to reveal trends and help clients proactively put security measures in place. Among the many noteworthy findings in the 2024 edition of the X-Force report, three major trends stand out that we’re advising security professionals and CISOs to observe: A sharp increase in abuse of valid accounts…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today