{"id":2113,"date":"2022-12-20T11:30:00","date_gmt":"2022-12-20T16:30:00","guid":{"rendered":"https:\/\/theforage.wpengine.com\/?p=2113"},"modified":"2024-07-19T16:23:23","modified_gmt":"2024-07-19T20:23:23","slug":"cybersecurity-career-path","status":"publish","type":"post","link":"https:\/\/theforage.wpengine.com\/careers\/cybersecurity-career-path","title":{"rendered":"Cybersecurity Career Path: Jobs, Skills, and Outlook"},"content":{"rendered":"\n<p>A cybersecurity career path involves protecting an organization&#8217;s systems, networks, and data from cyberattacks. This can include a wide range of tasks, such as monitoring networks for security threats, implementing security measures, and responding to incidents when they occur.<\/p>\n\n\n\n<p>If you&#8217;re interested in <a href=\"https:\/\/www.theforage.com\/blog\/careers\/cybersecurity\">cybersecurity<\/a> and want to know more about the career path, this guide covers cybersecurity roles at every level, typical salaries, industry outlook, and more.<\/p>\n\n\n\n<ul>\n<li><a href=\"#h-cybersecurity-career-path\">Cybersecurity Career Path<\/a><\/li>\n\n\n\n<li><a href=\"#h-cybersecurity-certifications-skills-and-education\">Cybersecurity Certifications, Skills, and Education<\/a><\/li>\n\n\n\n<li><a href=\"#h-cybersecurity-salary\">Cybersecurity Salary<\/a><\/li>\n\n\n\n<li><a href=\"#h-cybersecurity-jobs-outlook\">Cybersecurity Jobs Outlook<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-cybersecurity-career-path\">Cybersecurity Career Path<\/h2>\n\n\n\n<p>The cybersecurity field is constantly adapting to keep up with current threats and new technology. Fortunately, this means there are a variety of roles to pursue, no matter your experience level.<\/p>\n\n\n\n<p>&#8220;The possibilities are endless!&#8221; says Jackie Flores-Bochner, director of information security and risk management at Johnson &amp; Johnson and Forage program consultant. &#8220;You normally start out as an analyst of some sort, whether it\u2019s general security or IT help desk. Eventually you start to develop a specialty or niche based on what it is you prefer to do. Perhaps you want to focus on incident response, identity and access management, or resiliency.&#8221;&nbsp;<\/p>\n\n\n\n<p>Flores-Bochner also notes that an executive cybersecurity path is available to those who want to keep advancing to the top. &#8220;The highest ranking cybersecurity professional is usually the Chief Information Security Officer and it takes years of both technical and non-technical experience to get there.&#8221;&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/www.cyberseek.org\/pathway.html\" target=\"_blank\" rel=\"noreferrer noopener\">CyberSeek<\/a>, a project from the National Initiative for Cybersecurity Education (NICE), has created an interactive career pathway site for job seekers, with information on cybersecurity jobs, average salaries, and feeder roles that are good transitions into a cybersecurity career. Jobs without feeder roles listed generally require prior cybersecurity experience.<\/p>\n\n\n\n<div class=\"wp-block-group forage__cta-pattern is-vertical is-content-justification-center is-layout-flex wp-container-core-group-is-layout-1 wp-block-group-is-layout-flex\">\n<h2 class=\"wp-block-heading has-text-align-center\">Find your career fit<\/h2>\n\n\n\n<p class=\"has-text-align-center\">Discover if this is the right career path for you with a free Forage job simulation.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.theforage.com\/course-catalog\">Get started<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-entry-level-cybersecurity-roles\">Entry-Level Cybersecurity Roles<\/h3>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-cybersecurity-specialist\">Cybersecurity Specialist<\/h4>\n\n\n\n<ul>\n<li><strong>Average salary: <\/strong>$106,810<\/li>\n\n\n\n<li><strong>Feeder roles: <\/strong>networking, systems engineering, financial and risk analysis, security intelligence, IT support<\/li>\n\n\n\n<li><strong>Moves into: <\/strong>any mid-level roles<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-cyber-crime-analyst\">Cyber Crime Analyst<\/h4>\n\n\n\n<ul>\n<li><strong>Average salary:<\/strong> $100,000<\/li>\n\n\n\n<li><strong>Feeder roles: <\/strong>networking, systems engineering, financial and risk analysis, security intelligence, IT support<\/li>\n\n\n\n<li><strong>Moves into: <\/strong>any mid-level roles<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-incident-and-intrusion-analyst\">Incident and Intrusion Analyst<\/h4>\n\n\n\n<ul>\n<li><strong>Average salary: <\/strong>$86,428<\/li>\n\n\n\n<li><strong>Feeder roles: <\/strong>networking, systems engineering, financial and risk analysis, security intelligence, IT support<\/li>\n\n\n\n<li><strong>Moves into: <\/strong>any mid-level roles<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-it-auditor\">IT Auditor<\/h4>\n\n\n\n<ul>\n<li><strong>Average salary: <\/strong>$110,000<\/li>\n\n\n\n<li><strong>Feeder roles: <\/strong>networking, systems engineering, financial and risk analysis<\/li>\n\n\n\n<li><strong>Moves into:<\/strong> cybersecurity consultant or penetration and vulnerability tester roles<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-mid-level-cybersecurity-roles\">Mid-Level Cybersecurity Roles<\/h3>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-cybersecurity-analyst\">Cybersecurity Analyst<\/h4>\n\n\n\n<ul>\n<li><strong>Average salary:<\/strong> $107,500<\/li>\n\n\n\n<li><strong>Feeder roles:<\/strong> networking, <a href=\"https:\/\/www.theforage.com\/virtual-internships\/prototype\/JMcJbndBmiDBvy9pj\/Software-Development\">software development<\/a>, systems engineering<\/li>\n\n\n\n<li><strong>Moves into: <\/strong>any advanced-level roles<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-cybersecurity-consultant\">Cybersecurity Consultant<\/h4>\n\n\n\n<ul>\n<li><strong>Average salary: <\/strong>$93,067<\/li>\n\n\n\n<li><strong>Moves into:<\/strong> any advanced-level roles<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-penetration-and-vulnerability-tester\">Penetration and Vulnerability Tester<\/h4>\n\n\n\n<ul>\n<li><strong>Average salary: <\/strong>$101,662<\/li>\n\n\n\n<li><strong>Feeder roles:<\/strong> networking, software development, systems engineering<\/li>\n\n\n\n<li><strong>Moves into: <\/strong>cybersecurity engineer or cybersecurity architect roles<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-advanced-level-cybersecurity-roles\">Advanced-Level Cybersecurity Roles<\/h3>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-cybersecurity-manager\">Cybersecurity Manager<\/h4>\n\n\n\n<ul>\n<li><strong>Average salary: <\/strong>$136,236<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-cybersecurity-engineer\">Cybersecurity Engineer<\/h4>\n\n\n\n<ul>\n<li><strong>Average salary:<\/strong> $113,758<\/li>\n\n\n\n<li><strong>Feeder roles:<\/strong> networking, software development, systems engineering<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-cybersecurity-architect\">Cybersecurity Architect<\/h4>\n\n\n\n<ul>\n<li><strong>Average salary: <\/strong>$163,121<\/li>\n\n\n\n<li><strong>Feeder roles: <\/strong>networking, software development, systems engineering<\/li>\n<\/ul>\n\n\n\n<p>According to CyberSeek, the most job openings are for advanced-level cybersecurity engineers, followed by mid-level cybersecurity analysts, penetration and vulnerability testers, and cybersecurity consultants.<\/p>\n\n\n\n<p><strong>&gt;&gt;MORE:<\/strong> <a href=\"https:\/\/www.theforage.com\/fast-track\/mastercard-cybersecurity-virtual-experience-program\/overview\">Mastercard Cybersecurity Virtual Experience Program<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-cybersecurity-certifications-skills-and-education\">Cybersecurity Certifications, Skills, and Education<\/h2>\n\n\n\n<p>While education and certifications are vital for cybersecurity careers, skills and work experience are starting to pull ahead in terms of what employers are looking for.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-certifications\">Certifications<\/h3>\n\n\n\n<p>When it comes to certifications, &#8220;It depends on what route you want to take,&#8221; says Flores-Bochner. &#8220;Initial certifications for people looking to start out would be the <a href=\"https:\/\/www.comptia.org\/certifications\/security\" target=\"_blank\" rel=\"noreferrer noopener\">CompTIA Security +<\/a> or <a href=\"https:\/\/www.isaca.org\/credentialing\/csx-p\" target=\"_blank\" rel=\"noreferrer noopener\">CSX-P<\/a>.&#8221; For the risk management side, she recommends the <a href=\"https:\/\/www.isaca.org\/credentialing\/crisc\" target=\"_blank\" rel=\"noreferrer noopener\">CRISC<\/a> or <a href=\"https:\/\/www.isaca.org\/credentialing\/cism\" target=\"_blank\" rel=\"noreferrer noopener\">CISM<\/a> certification offered by ISACA.&nbsp;<\/p>\n\n\n\n<p>Flores-Bochner notes that <a href=\"https:\/\/www.isc2.org\/Certifications\/CISSP\" target=\"_blank\" rel=\"noreferrer noopener\">CISSP<\/a> is a great certification across the board but may not be for everyone due to its very technical nature. Indeed, CyberSeek includes CISSP as a top certification for advanced-level positions.<\/p>\n\n\n\n<p>However, employers aren&#8217;t prioritizing certifications as much as they used to. The <a href=\"https:\/\/www.isc2.org\/\/-\/media\/ISC2\/Research\/2022-WorkForce-Study\/ISC2-Cybersecurity-Workforce-Study.ashx\" target=\"_blank\" rel=\"noreferrer noopener\">(ISC)<sup>2<\/sup> Cybersecurity Workforce Study 2022<\/a> results indicate that relevant IT and cybersecurity work experience is now more important to employers than cybersecurity certifications.&nbsp;<\/p>\n\n\n\n<p>Flores-Bochner concurs. &#8220;While certifications are great and prove your dedication to the craft, nothing will surpass real experience so always seek to supplement your certificates with experience when you can.&#8221;<\/p>\n\n\n\n<p><strong>&gt;&gt;MORE:<\/strong> <a href=\"https:\/\/www.theforage.com\/virtual-internships\/prototype\/5L6aBHz9ZYCs4eibk\/SAP-Cybersecurity-Virtual-Internship-Program\">SAP Cybersecurity Virtual Internship Program<\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-skills\">Skills<\/h3>\n\n\n\n<p>Strong strategic thinking and <a href=\"https:\/\/www.theforage.com\/blog\/skills\/adaptability\">adaptability skills<\/a> are essential as cybersecurity professionals must continually adapt to prevent and respond to new threats. <a href=\"https:\/\/www.theforage.com\/blog\/skills\/problem-solving-skills\">Problem-solving skills<\/a> are also crucial <a href=\"https:\/\/www.theforage.com\/blog\/basics\/what-are-soft-skills-definition-and-examples\">soft skills<\/a> \u2014&nbsp;and are ranked in the (ISC)<sup>2<\/sup> survey as the second most important qualification for those looking for cybersecurity employment.<\/p>\n\n\n\n<p>However, <a href=\"https:\/\/www.theforage.com\/blog\/skills\/communication-skills\">communication<\/a> skills are paramount, not just for aspiring cybersecurity workers, but for those who are already in the field and want to advance their careers. &#8220;The ability to communicate with non-technical professionals is what sets a security professional apart from their peers,&#8221; explains Flores-Bochner.&nbsp;<\/p>\n\n\n\n<p>&#8220;At the end of the day, security functions are funded by nontechnical business units, so you will find yourself in situations where you are requesting funding for a critical project but the person approving the funds doesn\u2019t necessarily understand what you do. If you can successfully explain what you do and why it\u2019s critical to the business you will quickly find yourself moving up the ladder,&#8221; she continues.<\/p>\n\n\n\n<p>Some of the top specific <a href=\"https:\/\/www.theforage.com\/blog\/basics\/hard-skills\">hard skills<\/a> for entry-level cybersecurity positions are:<\/p>\n\n\n\n<ul>\n<li>Information security\/assurance<\/li>\n\n\n\n<li>Security operations<\/li>\n\n\n\n<li>Cryptography<\/li>\n\n\n\n<li>Risk assessment and management<\/li>\n\n\n\n<li>Threat analysis<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-education\">Education<\/h3>\n\n\n\n<p>Your college education can help you gain the skills you need to find entry-level cybersecurity jobs, such as &#8220;a solid understanding of technology and what we call the technology stack,&#8221; notes Flores-Bochner. &#8220;Cybersecurity will always have some sort of technical component or implication so knowing what you are protecting is important.&#8221;<\/p>\n\n\n\n<p>Slightly more than half (51%) of surveyed cybersecurity professionals pursued bachelor&#8217;s degrees in computer and information sciences, followed by engineering degrees (19%) and non-IT degrees (30%), according to (ISC)<sup>2<\/sup>.<\/p>\n\n\n\n<p>However, younger generations are forging new cybersecurity career paths. Just 50% of cybersecurity professionals under age 30 started with a career in IT before moving into cybersecurity, compared to 77% of those aged 50-54.&nbsp;<\/p>\n\n\n\n<p>In addition, 23% of under-30s pursued cybersecurity education before getting their first cybersecurity job, 14% moved into cybersecurity from a different field, and 12% explored cybersecurity training on their own before being recruited \u2014 vs. 4%, 13%, and 4%, respectively, for ages 50-54.<\/p>\n\n\n\n<p><strong>&gt;&gt;MORE:<\/strong> <a href=\"https:\/\/www.theforage.com\/fast-track\/aig-cybersecurity-virtual-experience-program\/overview\">AIG Shields Up: Cybersecurity Virtual Experience Program<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-cybersecurity-salary\">Cybersecurity Salary<\/h2>\n\n\n\n<p>The median annual salary for cybersecurity professionals in 2022 was $134,800 in North America, according to (ISC)<sup>2<\/sup>. Cybersecurity workers in the U.S. earn up to $150,000 a year with a doctorate, $142,00 with a master&#8217;s degree, $130,000 with a bachelor&#8217;s degree, and $127,750 with an associate degree.<\/p>\n\n\n\n<p>Information security analysts earned annual average salaries of <a href=\"https:\/\/www.bls.gov\/oes\/current\/oes151212.htm\" target=\"_blank\" rel=\"noreferrer noopener\">$113,270<\/a> in 2021, with the top 10% earning more than $165,920. California and New York are the top-paying states for this role.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-cybersecurity-jobs-outlook\">Cybersecurity Jobs Outlook<\/h2>\n\n\n\n<p>As innovation in technology progresses at a dizzying pace and the threat landscape continues to grow, cybersecurity jobs are sure to remain in high demand. For example, the Bureau of Labor Statistics estimates that job openings for information security analysts will grow by <a href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-analysts.htm#tab-6\" target=\"_blank\" rel=\"noreferrer noopener\">35%<\/a> from 2021 to 2031 \u2014 much faster than average.<\/p>\n\n\n\n<p>According to <a href=\"https:\/\/www.cyberseek.org\/heatmap.html\" target=\"_blank\" rel=\"noreferrer noopener\">CyberSeek<\/a>, there were 1.1 million cybersecurity workers in the U.S. in 2022. However, there are only enough U.S. cybersecurity professionals to fill 65% of available jobs.&nbsp;<\/p>\n\n\n\n<p>This &#8220;cybersecurity workforce gap&#8221; left more than 410,000 cybersecurity jobs unfilled in the U.S. (3.4 million worldwide) in 2022, explains (ISC)<sup>2<\/sup>. Globally, the gap has grown over twice as much as the workforce, and Cybersecurity Ventures estimates there will be <a href=\"https:\/\/cybersecurityventures.com\/jobs\/\" target=\"_blank\" rel=\"noreferrer noopener\">3.5 million<\/a> unfilled cybersecurity positions by 2025.<\/p>\n\n\n\n<p>Ready to kick off your cybersecurity career path? Learn a variety of foundational technology skills with <a href=\"https:\/\/www.theforage.com\/course-catalog\/Tech\">Forage&#8217;s tech virtual experience programs<\/a>.&nbsp;<\/p>\n\n\n\n<p><em>Image credit: Gorodenkoff \/ Depositphotos.com<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A cybersecurity career path involves protecting an organization&#8217;s systems, networks, and data from cyberattacks. This can include a wide range of tasks, such as monitoring networks for security threats, implementing security measures, and responding to incidents when they occur. If you&#8217;re interested in cybersecurity and want to know more about the career path, this guide &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/theforage.wpengine.com\/careers\/cybersecurity-career-path\"> <span class=\"screen-reader-text\">Cybersecurity Career Path: Jobs, Skills, and Outlook<\/span> Read More &raquo;<\/a><\/p>\n","protected":false},"author":1,"featured_media":2114,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"forage_sticky_bar_enabled":false,"forage_sticky_bar_content":"","forage_sticky_bar_button_text":"","forage_sticky_bar_button_url":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"forage_editor_id":15,"forage_reviewer_id":0,"forage_authors":[],"veps":[3978,4724],"forage_sidebar":0,"forage_related_disabled":false,"forage_toc_enabled":false,"forage_toc_level":0,"modified":"2023-05-22T13:25:17","footnotes":""},"categories":[5],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.5 (Yoast SEO v24.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity Career Path: Jobs, Skills, and Outlook - Forage<\/title>\n<meta name=\"description\" content=\"A cybersecurity career path involves protecting an organization&#039;s networks and systems from cyberattacks. Learn about a cybersecurity career.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/theforage.wpengine.com\/careers\/cybersecurity-career-path\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Career Path: Jobs, Skills, and Outlook\" \/>\n<meta property=\"og:description\" content=\"A cybersecurity career path involves protecting an organization&#039;s networks and systems from cyberattacks. Learn about a cybersecurity career.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/theforage.wpengine.com\/careers\/cybersecurity-career-path\" \/>\n<meta property=\"og:site_name\" content=\"Forage\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/theforage1\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-20T16:30:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-22T09:25:17-04:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/theforage.wpengine.com\/wp-content\/uploads\/2022\/12\/cybersecurity-career-path.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1125\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Forage\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theforage_\" \/>\n<meta name=\"twitter:site\" content=\"@theforage_\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Forage\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.theforage.com\/blog\/careers\/cybersecurity-career-path#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.theforage.com\/blog\/careers\/cybersecurity-career-path\"},\"author\":{\"name\":\"Forage\",\"@id\":\"https:\/\/www.theforage.com\/blog\/#\/schema\/person\/f4f5ff79a4a4ae737224cd7b4e1930a5\"},\"headline\":\"Cybersecurity Career Path: Jobs, Skills, and Outlook\",\"datePublished\":\"2022-12-20T11:30:00-05:00\",\"dateModified\":\"2023-05-22T09:25:17-04:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.theforage.com\/blog\/careers\/cybersecurity-career-path\"},\"wordCount\":1276,\"publisher\":{\"@id\":\"https:\/\/www.theforage.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.theforage.com\/blog\/careers\/cybersecurity-career-path#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.theforage.com\/blog\/wp-content\/uploads\/2022\/12\/cybersecurity-career-path.jpg\",\"articleSection\":[\"Careers\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.theforage.com\/blog\/careers\/cybersecurity-career-path\",\"url\":\"https:\/\/www.theforage.com\/blog\/careers\/cybersecurity-career-path\",\"name\":\"Cybersecurity Career Path: Jobs, Skills, and Outlook - Forage\",\"isPartOf\":{\"@id\":\"https:\/\/www.theforage.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.theforage.com\/blog\/careers\/cybersecurity-career-path#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.theforage.com\/blog\/careers\/cybersecurity-career-path#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.theforage.com\/blog\/wp-content\/uploads\/2022\/12\/cybersecurity-career-path.jpg\",\"datePublished\":\"2022-12-20T11:30:00-05:00\",\"dateModified\":\"2023-05-22T09:25:17-04:00\",\"description\":\"A cybersecurity career path involves protecting an organization's networks and systems from cyberattacks. Learn about a cybersecurity career.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.theforage.com\/blog\/careers\/cybersecurity-career-path#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.theforage.com\/blog\/careers\/cybersecurity-career-path\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.theforage.com\/blog\/careers\/cybersecurity-career-path#primaryimage\",\"url\":\"https:\/\/www.theforage.com\/blog\/wp-content\/uploads\/2022\/12\/cybersecurity-career-path.jpg\",\"contentUrl\":\"https:\/\/www.theforage.com\/blog\/wp-content\/uploads\/2022\/12\/cybersecurity-career-path.jpg\",\"width\":2000,\"height\":1125,\"caption\":\"Cybersecurity career path\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.theforage.com\/blog\/careers\/cybersecurity-career-path#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.theforage.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Careers\",\"item\":\"https:\/\/www.theforage.com\/blog\/careers\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity Career Path: Jobs, Skills, and Outlook\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.theforage.com\/blog\/#website\",\"url\":\"https:\/\/www.theforage.com\/blog\/\",\"name\":\"Forage\",\"description\":\"Virtual job simulations produced by and for the world\u2019s largest employers\",\"publisher\":{\"@id\":\"https:\/\/www.theforage.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.theforage.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.theforage.com\/blog\/#organization\",\"name\":\"Forage\",\"url\":\"https:\/\/www.theforage.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.theforage.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.theforage.com\/blog\/wp-content\/uploads\/2023\/04\/Navy-Stacked-Logo.jpg\",\"contentUrl\":\"https:\/\/www.theforage.com\/blog\/wp-content\/uploads\/2023\/04\/Navy-Stacked-Logo.jpg\",\"width\":878,\"height\":893,\"caption\":\"Forage\"},\"image\":{\"@id\":\"https:\/\/www.theforage.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/theforage1\/\",\"https:\/\/x.com\/theforage_\",\"https:\/\/www.instagram.com\/theforage_\/\",\"https:\/\/www.linkedin.com\/school\/theforage\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.theforage.com\/blog\/#\/schema\/person\/f4f5ff79a4a4ae737224cd7b4e1930a5\",\"name\":\"Forage\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.theforage.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.theforage.com\/blog\/wp-content\/uploads\/2023\/05\/Avatar-Diamond-96x96.png\",\"contentUrl\":\"https:\/\/www.theforage.com\/blog\/wp-content\/uploads\/2023\/05\/Avatar-Diamond-96x96.png\",\"caption\":\"Forage\"},\"sameAs\":[\"https:\/\/www.theforage.com\/blog\"],\"url\":\"https:\/\/www.theforage.com\/blog\/author\/theforage\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity Career Path: Jobs, Skills, and Outlook - Forage","description":"A cybersecurity career path involves protecting an organization's networks and systems from cyberattacks. Learn about a cybersecurity career.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/theforage.wpengine.com\/careers\/cybersecurity-career-path","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Career Path: Jobs, Skills, and Outlook","og_description":"A cybersecurity career path involves protecting an organization's networks and systems from cyberattacks. Learn about a cybersecurity career.","og_url":"https:\/\/theforage.wpengine.com\/careers\/cybersecurity-career-path","og_site_name":"Forage","article_publisher":"https:\/\/www.facebook.com\/theforage1\/","article_published_time":"2022-12-20T16:30:00+00:00","og_image":[{"width":2000,"height":1125,"url":"https:\/\/theforage.wpengine.com\/wp-content\/uploads\/2022\/12\/cybersecurity-career-path.jpg","type":"image\/jpeg"}],"author":"Forage","twitter_card":"summary_large_image","twitter_creator":"@theforage_","twitter_site":"@theforage_","twitter_misc":{"Written by":"Forage","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.theforage.com\/blog\/careers\/cybersecurity-career-path#article","isPartOf":{"@id":"https:\/\/www.theforage.com\/blog\/careers\/cybersecurity-career-path"},"author":{"name":"Forage","@id":"https:\/\/www.theforage.com\/blog\/#\/schema\/person\/f4f5ff79a4a4ae737224cd7b4e1930a5"},"headline":"Cybersecurity Career Path: Jobs, Skills, and Outlook","datePublished":"2022-12-20T11:30:00-05:00","dateModified":"2023-05-22T09:25:17-04:00","mainEntityOfPage":{"@id":"https:\/\/www.theforage.com\/blog\/careers\/cybersecurity-career-path"},"wordCount":1276,"publisher":{"@id":"https:\/\/www.theforage.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.theforage.com\/blog\/careers\/cybersecurity-career-path#primaryimage"},"thumbnailUrl":"https:\/\/www.theforage.com\/blog\/wp-content\/uploads\/2022\/12\/cybersecurity-career-path.jpg","articleSection":["Careers"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.theforage.com\/blog\/careers\/cybersecurity-career-path","url":"https:\/\/www.theforage.com\/blog\/careers\/cybersecurity-career-path","name":"Cybersecurity Career Path: Jobs, Skills, and Outlook - Forage","isPartOf":{"@id":"https:\/\/www.theforage.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.theforage.com\/blog\/careers\/cybersecurity-career-path#primaryimage"},"image":{"@id":"https:\/\/www.theforage.com\/blog\/careers\/cybersecurity-career-path#primaryimage"},"thumbnailUrl":"https:\/\/www.theforage.com\/blog\/wp-content\/uploads\/2022\/12\/cybersecurity-career-path.jpg","datePublished":"2022-12-20T11:30:00-05:00","dateModified":"2023-05-22T09:25:17-04:00","description":"A cybersecurity career path involves protecting an organization's networks and systems from cyberattacks. Learn about a cybersecurity career.","breadcrumb":{"@id":"https:\/\/www.theforage.com\/blog\/careers\/cybersecurity-career-path#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.theforage.com\/blog\/careers\/cybersecurity-career-path"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.theforage.com\/blog\/careers\/cybersecurity-career-path#primaryimage","url":"https:\/\/www.theforage.com\/blog\/wp-content\/uploads\/2022\/12\/cybersecurity-career-path.jpg","contentUrl":"https:\/\/www.theforage.com\/blog\/wp-content\/uploads\/2022\/12\/cybersecurity-career-path.jpg","width":2000,"height":1125,"caption":"Cybersecurity career path"},{"@type":"BreadcrumbList","@id":"https:\/\/www.theforage.com\/blog\/careers\/cybersecurity-career-path#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.theforage.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Careers","item":"https:\/\/www.theforage.com\/blog\/careers"},{"@type":"ListItem","position":3,"name":"Cybersecurity Career Path: Jobs, Skills, and Outlook"}]},{"@type":"WebSite","@id":"https:\/\/www.theforage.com\/blog\/#website","url":"https:\/\/www.theforage.com\/blog\/","name":"Forage","description":"Virtual job simulations produced by and for the world\u2019s largest employers","publisher":{"@id":"https:\/\/www.theforage.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.theforage.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.theforage.com\/blog\/#organization","name":"Forage","url":"https:\/\/www.theforage.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.theforage.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.theforage.com\/blog\/wp-content\/uploads\/2023\/04\/Navy-Stacked-Logo.jpg","contentUrl":"https:\/\/www.theforage.com\/blog\/wp-content\/uploads\/2023\/04\/Navy-Stacked-Logo.jpg","width":878,"height":893,"caption":"Forage"},"image":{"@id":"https:\/\/www.theforage.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/theforage1\/","https:\/\/x.com\/theforage_","https:\/\/www.instagram.com\/theforage_\/","https:\/\/www.linkedin.com\/school\/theforage\/"]},{"@type":"Person","@id":"https:\/\/www.theforage.com\/blog\/#\/schema\/person\/f4f5ff79a4a4ae737224cd7b4e1930a5","name":"Forage","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.theforage.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/www.theforage.com\/blog\/wp-content\/uploads\/2023\/05\/Avatar-Diamond-96x96.png","contentUrl":"https:\/\/www.theforage.com\/blog\/wp-content\/uploads\/2023\/05\/Avatar-Diamond-96x96.png","caption":"Forage"},"sameAs":["https:\/\/www.theforage.com\/blog"],"url":"https:\/\/www.theforage.com\/blog\/author\/theforage"}]}},"featured_image_src":"https:\/\/theforage.wpengine.com\/wp-content\/uploads\/2022\/12\/cybersecurity-career-path-600x400.jpg","featured_image_src_square":"https:\/\/theforage.wpengine.com\/wp-content\/uploads\/2022\/12\/cybersecurity-career-path-600x600.jpg","author_info":{"display_name":"Forage","author_link":"https:\/\/theforage.wpengine.com\/author\/theforage"},"_links":{"self":[{"href":"https:\/\/theforage.wpengine.com\/wp-json\/wp\/v2\/posts\/2113"}],"collection":[{"href":"https:\/\/theforage.wpengine.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/theforage.wpengine.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/theforage.wpengine.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/theforage.wpengine.com\/wp-json\/wp\/v2\/comments?post=2113"}],"version-history":[{"count":0,"href":"https:\/\/theforage.wpengine.com\/wp-json\/wp\/v2\/posts\/2113\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/theforage.wpengine.com\/wp-json\/wp\/v2\/media\/2114"}],"wp:attachment":[{"href":"https:\/\/theforage.wpengine.com\/wp-json\/wp\/v2\/media?parent=2113"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/theforage.wpengine.com\/wp-json\/wp\/v2\/categories?post=2113"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/theforage.wpengine.com\/wp-json\/wp\/v2\/tags?post=2113"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}