With the shortage of qualified tech professionals in the cybersecurity industry and increasing demand for trained experts, it can take time to find the right candidate with the necessary skill set. However, while searching for specific technical skill sets, many professionals in other industries may be an excellent fit for transitioning into a cybersecurity team. In fact, considering their unique, specialized skill sets, some roles are a better match than what is traditionally expected of a cybersecurity professional.

This article explores six different types of professionals with the skills to successfully transition into a cybersecurity team and how they can be repurposed appropriately while remaining in their comfort zone.

1. Software Engineers

A software engineer is a professional who creates and maintains software applications. They are responsible for designing, developing, testing and debugging software applications.

Why the Skill Set is a Match

Software engineers possess various technical skills, including coding and software development. They also understand the complexities involved in developing a secure application. This makes them well-suited for different types of cybersecurity tasks. As an example, they can be used to create applications that are more resistant to cyber-attacks by introducing security features at the code level.

What Additional Training do Software Engineers Need?

While software engineers already possess a strong foundation for cybersecurity, they may need additional training in cryptography and network security. They should also be familiar with various cyber threats, such as malware and phishing. Additionally, since software development is constantly evolving, software engineers should be prepared to keep up with the latest trends to remain competitive.

2. Network Architects

Network architects are responsible for designing, planning and implementing computer networks. They understand the complexities of network security and how to keep data safe from external threats.

Why the Skill Set is a Match

Network architects possess a strong knowledge of networking technologies and are proficient in setting up secure networks. While not all security roles require a deep technical understanding, network architects are well-suited to design secure networks and implement protection measures. They can also review existing systems for vulnerabilities and recommend solutions to mitigate risks.

What Additional Training do Network Architects Need?

Although security is typically hardwired into the DNA of network architects, they should understand the various cyber threats that exist today. They should also be familiar with emerging technologies and techniques related to cybersecurity, such as artificial intelligence (AI) and machine learning (ML). Another important skill for network architects is identifying and differentiating between legitimate and malicious traffic signals.

3. IT Support Specialists

IT support specialists are responsible for troubleshooting and resolving technical issues related to computers and other electronic devices. They typically have a broad knowledge of different hardware and software systems.

Why the Skill Set is a Match

IT support specialists possess strong analytical skills, allowing them to quickly identify problems and devise solutions. Their ability to think critically makes them well-suited to investigate security incidents and hunt for malicious actors. Additionally, they are knowledgeable in different hardware and software systems, which is essential in understanding the implications of cyber threats.

What Additional Training do IT Support Specialists Need?

IT support specialists should understand the various cyber threats and how to respond effectively. They should also be knowledgeable in risk assessment techniques and security architectures, such as access control protocols and identity management solutions. Most IT support teams subscribe to a broad understanding of security risks; however, additional training may be necessary for more specialized positions.

4. AI Developers

AI developers are responsible for developing applications that leverage AI and ML technologies. They possess a strong knowledge of data engineering and programming languages such as Python, C++ and Java.

Why the Skill Set is a Match

AI developers understand the power of machine-learning algorithms to detect patterns in large datasets. As a result, they can be used to detect and respond to security threats in real-time. AI developers can use specialized skills to create and maintain powerful penetration testing tools and build AI-assisted security solutions.

What Additional Training do AI Developers Need?

Although AI developers possess strong programming knowledge, they may need to become more familiar with various cyber threats. They should understand different attack surfaces and concepts, such as malware analysis and intrusion detection systems. Additionally, they should be knowledgeable in ethical hacking principles and network security protocols to develop secure applications.

5. Cloud Specialists

Cloud specialists are responsible for managing cloud-based applications and infrastructure. They typically possess a strong knowledge of cloud platforms and technologies, such as Amazon Web Services (AWS), Microsoft Azure and IBM Cloud. Cloud specialists also understand storage technologies, such as relational databases and big data solutions.

Why the Skill Set is a Match

Cloud specialists are familiar with the powerful security services offered by cloud providers, such as identity and access management (IAM). They can leverage these services to ensure that only authorized personnel can access sensitive information stored in the cloud. Additionally, cloud specialists understand the various security risks associated with cloud technologies and can provide valuable insights into how to mitigate them.

What Additional Training do Cloud Specialists Need?

Cloud specialists have a comprehensive understanding of different cloud services and technologies; however, when needing to adapt to strictly on-premise security infrastructure, they may need to adjust their skill set. They should become knowledgeable in on-premise security solutions, such as host-based firewalls and endpoint protection systems. Additionally, they should understand the different types of cyber threats and how to design secure architectures within an organization and with external parties.

6. Data Analysts

Data analysts are responsible for analyzing large amounts of data and providing insights into business processes. They possess strong knowledge in areas such as statistical analysis, predictive modeling and machine learning algorithms.

Why the Skill Set is a Match

Data analysts understand how to identify patterns in datasets that may not be immediately visible to the human eye. They can leverage these skills to detect and respond to advanced cyber threats such as zero-day exploits or insider threats. Data analysts can also develop predictive models that help organizations anticipate future security risks and take preventive measures accordingly.

What Additional Training do Data Analysts Need?

Data analysts may need additional training in areas such as data privacy regulations and compliance standards. They should understand different security tools and processes to ensure that data is securely stored, transmitted and processed. Additionally, they need to have a strong understanding of threat models and attack vectors to detect malicious activity as early as possible.

The Demand for New Cybersecurity Workers Remains High

Overall, transitioning from various roles, such as AI developers, cloud specialists or data analysts, into the field of cybersecurity is possible. With the right training and expertise, professionals from these backgrounds can become invaluable cybersecurity team members. As attackers become more sophisticated, organizations need individuals with a strong combination of technical knowledge and analytical skills to stay ahead of the curve. Organizations can build and grow their cybersecurity teams without suffering from a shortage of highly specialized professionals.

More from CISO

CEO, CIO or CFO: Who Should Your CISO Report To?

As we move deeper into a digitally dependent future, the growing concern of data breaches and other cyber threats has led to the rise of the Chief Information Security Officer (CISO). This position is essential in almost every company that relies on digital information. They are responsible for developing and implementing strategies to harden the organization's defenses against cyberattacks. However, while many organizations don't question the value of a CISO, there should be more debate over who this important role…

Everyone Wants to Build a Cyber Range: Should You?

In the last few years, IBM X-Force has seen an unprecedented increase in requests to build cyber ranges. By cyber ranges, we mean facilities or online spaces that enable team training and exercises of cyberattack responses. Companies understand the need to drill their plans based on real-world conditions and using real tools, attacks and procedures. What’s driving this increased demand? The increase in remote and hybrid work models emerging from the COVID-19 pandemic has elevated the priority to collaborate and…

Why Quantum Computing Capabilities Are Creating Security Vulnerabilities Today

Quantum computing capabilities are already impacting your organization. While data encryption and operational disruption have long troubled Chief Information Security Officers (CISOs), the threat posed by emerging quantum computing capabilities is far more profound and immediate. Indeed, quantum computing poses an existential risk to the classical encryption protocols that enable virtually all digital transactions. Over the next several years, widespread data encryption mechanisms, such as public-key cryptography (PKC), could become vulnerable. Any classically encrypted communication could be wiretapped and is…

Laid Off by Big Tech? Cybersecurity is a Smart Career Move

Big technology companies are laying off staff as market conditions change. The move follows a hiring blitz initially triggered by the uptick in pandemic-powered remote work — according to Bloomberg, businesses are now cutting jobs at a rate approaching that of early 2020. For example, in November 2022 alone, companies laid off more than 52,000 workers. Companies like Amazon and Meta also plan to let more than 10,000 staff members go over the next few years. As noted by Stanford…