Cy Says Blog & Podcast

Posts about:

Blog (2)

Apprentice Success Story: Todd Johnson

Todd Johnson’s journey through the CyberUp Apprenticeship Program demonstrates the impact of perseverance, continuous learning, and the support of a community in cybersecurity. With a background in desktop support and a strong interest in technology, Todd joined the program to transform his career and secure a future in a fast-evolving industry through skills-based hiring.

The Beginning: A Shift from Entertainment to Technology

Before CyberUp, Todd had worked in desktop support and as a field technician. However, his career started in an unexpected place—stand-up comedy. For nearly 20 years, Todd traveled across the country performing. While the entertainment industry provided unique experiences, Todd realized that the instability of life on the road wasn’t compatible with the stability he sought in married life.

Transitioning from entertainment to cybersecurity was a significant change, but Todd found it a natural progression. His long-standing interest in computers made cybersecurity an attractive and secure field, one that evolves quickly and offers new challenges. “Technology evolves while you're sitting there,” Todd noted, explaining what drew him to the industry.


Three Months In: Gaining Confidence

At the three-month mark of his apprenticeship, Todd reflected on CyberUp’s training program. He found it essential in building the knowledge and skills needed to transition into cybersecurity. “It got me where I needed to be,” Todd said, highlighting how the program not only provided a certificate but also taught him the importance of being proactive in his learning. The training encouraged him to research on his own and deepen his understanding, a habit that proved crucial throughout his apprenticeship.

This phase also emphasized the importance of skills-based hiring, a practice CyberUp supports. Instead of focusing solely on degrees or past job titles, skills-based hiring allowed Todd to showcase his practical abilities, which were further developed through the apprenticeship. This approach was key to Todd’s successful transition into cybersecurity, proving that with the right skills, career advancement is achievable regardless of past professions.

Outside of work, Todd is a writer, with a book and several screenplays. His creative side adds a unique dimension to his role in cybersecurity, highlighting his ability to think creatively—an important skill in solving problems in the field.

Six Months In: Overcoming Challenges

At six months, Todd’s passion for cybersecurity continued to grow. He enjoyed learning new things, especially the acronyms and technical language of the field. “Investigating and digging into things is enjoyable,” Todd shared, comparing his work in cybersecurity to his previous experiences in entertainment.

The support Todd received from CyberUp was critical to his development. He appreciated the professional development opportunities and the encouragement from the community. Working from home, Todd found a balance between his personal life and his career, allowing him to fully engage in the learning process. Despite the challenges, Todd described his experience as a “roller coaster ride,” with ups and downs but ultimately rewarding as he continued to improve his skills.

Twelve Months In: Reflecting on Growth

By the end of his apprenticeship, Todd had experienced significant growth. One of his major successes was mastering the security language, which helped him become his own advocate in learning. Transitioning from desktop support to cybersecurity was like moving from high school to college—requiring Todd to navigate a more complex environment. He described this transition as one of the most challenging parts of his apprenticeship but also one of the most rewarding.

Todd’s professional goals extend beyond the apprenticeship. He plans to obtain more certificates to strengthen his security skills and improve his ability to address security issues. His desire to continue learning reflects his commitment to the field.

In reflecting on his journey, Todd offered advice to new apprentices: “Don’t be too hard on yourself. Everyone had a day one, so it’s okay to ask questions and seek help.” This advice underscores the importance of perseverance and the willingness to learn, qualities that have been central to Todd’s success.

The Road Ahead: Giving Back

Looking to the future, Todd is eager to participate in CyberUp’s alumni and mentorship programs, where he hopes to help others navigate the cybersecurity field. His willingness to mentor new apprentices reflects the support he received and his desire to give back.

Todd Johnson’s journey through the CyberUp Apprenticeship Program shows the impact of opportunity, community, and continuous learning. From his early days in desktop support to his current role as a cybersecurity analyst, Todd’s experience highlights the importance of skills-based hiring and staying committed to personal and professional growth. His story serves as inspiration for those looking to make a similar transition, proving that with the right support and mindset, success is within reach.

Read More

Five Generations, One Workforce: How Skills-Based Hiring Can Unite Talent

In my first blog about skills-based hiring, I referenced the notion of five generations entering the workforce and what role that plays in hiring for the foreseeable future. In today’s blog, I will break down the different generations by their attributes and describe the impact it has on how companies hire, provide professional development, and simply put, define soft skills. What you will see is nearly an 80-year difference in opinion on work ethic and values. What I hope you will take away is a clearer understanding of how your company can apply skills-based hiring to close the generational gap.

Let’s start with a quick rundown of each generation:

Baby Boomers (Born 1946-1964)

  • Technology: Adapted to digital tools later in their careers. Often prefer in-person meetings and phone calls over digital communication.
  • Work Habits: Highly dedicated and loyal to their employers. They often prioritize job security and stability and are used to working long hours.
  • Communication Style: Prefer face-to-face communication or phone calls. They value personal interaction and direct communication.
  • Values: Emphasize a strong work ethic, discipline, and respect for hierarchy and authority.

Generation X (Born 1965-1980)

  • Technology: Comfortable with both analog and digital technologies. Often acts as a bridge between older and younger generations in terms of tech use.
  • Work Habits: Independent and resourceful. They value work-life balance and often prefer flexibility in their work arrangements.
  • Communication Style: Favor straightforward communication. They are comfortable with email and other forms of digital communication.
  • Values: Pragmatic and self-reliant. They are often skeptical of authority and value personal development and autonomy.

Millennials (Born 1981-1996)

  • Technology: Digital natives who grew up with the internet and mobile technology. They are highly proficient with digital tools and social media.
  • Work Habits: Collaborative and team-oriented. They value meaningful work and often seek employers with strong corporate social responsibility.
  • Communication Style: Prefer digital communication methods such as instant messaging and video calls. They value feedback and continuous communication.
  • Values: Prioritize work-life balance, flexibility, and purpose-driven work. They often seek a sense of community and work-life integration.

Generation Z (Born 1997-2012)

  • Technology: True digital natives, having grown up with smartphones, social media, and instant access to information. They are highly adept at using new technologies.
  • Work Habits: Value diversity and inclusion, and are comfortable with remote work and flexible schedules. They are entrepreneurial and value opportunities for growth and learning.
  • Communication Style: Prefer short, instant communication methods like texting and social media. They are accustomed to rapid information exchange.
  • Values: Emphasize authenticity, diversity, and mental health. They seek meaningful and impactful work and value transparency from employers.

Generation Alpha (Born 2013-present)

  • Technology: Growing up with advanced technology, including AI and IoT. They will be the most digitally immersed generation.
  • Work Habits: Still developing as they are currently very young, but they are expected to prioritize technology integration, continuous learning, and adaptability.
  • Communication Style: Likely to prefer immersive and interactive communication methods, leveraging augmented and virtual reality.
  • Values: Anticipated to value sustainability, innovation, and global connectivity. They will likely seek work environments that align with these values.

These generational differences shape how individuals approach their careers, interact with colleagues, and prioritize in their work environments, but it also is important to consider when building out hiring programs for companies. We recently covered 7 steps to building a skills-based hiring program. In that discussion, we provided some basic best practices to evaluate hires and the skills they bring but we have to take that one step further and focus on culture development.

Here are 4 ways a company can create a supportive work environment for all 5 generations that supports skills-based hiring programs and fosters a culture of respect and inclusion: 

Facilitate Knowledge Sharing and Mentorship

  • Mentorship Programs: Pair younger workers with experienced employees to foster knowledge transfer and professional growth.
  • Reverse Mentoring: Encourage younger employees to share their expertise, particularly in technology, with older colleagues.
  • Collaborative Projects: Create opportunities for multi-generational teams to work together on projects, leveraging diverse perspectives.

Provide Flexible Work Arrangements & Programs

  • Flexible Scheduling: Offer flexible work hours and remote work options to cater to different life stages and personal needs.
  • Wellness Programs: Implement health and wellness programs that address the needs of all age groups.
  • Diverse Benefits Packages: Offer a range of benefits that appeal to different generations, such as childcare support, eldercare assistance, or retirement planning

Tailor Training and Development Programs

  • Continuous Learning: Implement training programs that address the learning preferences and needs of different generations.
  • Technology Training: Provide tech training to older employees to help them stay current with new tools and platforms.
  • Professional Development: Offer career development opportunities that cater to the aspirations of employees at various stages of their careers.

Encourage Collaboration and Team Building

  • Team Building Activities: Organize activities that foster team spirit and understanding among different age groups.Intergenerational 
  • Employee Resource Groups (ERGs): Create ERGs that focus on bridging generational gaps and fostering mutual support.
  • Celebration of Milestones: Recognize and celebrate milestones and achievements of employees from all generations.

This isn’t an inclusive list of course but with the suggestions here and in the prior blogs a talent team can lead the way for companies to embrace skills-based hiring. Of course, CyberUp’s team of apprenticeship and skills-based hiring experts are always ready to support. Please reach out to me directly or to our team if you would like to learn more. 

Tony Bryan

 

Read More

Why Right Now is the Perfect Time to Explore Skills-Based Hiring

Reimagining Entry-Level Cybersecurity Hiring: Why Now is the Perfect Time to Embrace Skills-Based Hiring

In today's rapidly evolving job market, the need for innovative hiring practices has never been more critical, especially in the cybersecurity sector. The traditional recruitment methods, heavily reliant on degrees and formal qualifications, are increasingly being called into question. At CyberUp, right now is the perfect time for companies to reimagine their hiring strategies and fully embrace skills-based hiring for entry-level cybersecurity roles.

The Growing Demand for Cybersecurity Talent

The cybersecurity landscape is more dynamic than ever, with threats becoming more sophisticated and frequent. As organizations across all sectors bolster their cybersecurity defenses, the demand for skilled professionals continues to outpace supply. According to recent reports, over 500,000 unfilled cybersecurity positions exist in the United States alone. This talent gap presents both a challenge and an opportunity for employers.

The Limitations of Traditional Hiring Practices

Historically, entry-level positions in cybersecurity have required candidates to possess a four-year degree in computer science or a related field. However, this approach has several limitations:

  1. Exclusion of Talented Individuals: Many capable individuals who have the necessary skills but lack formal degrees are often overlooked.
  2. Slow Adaptation to Industry Changes: Degree programs may not always keep pace with the rapidly changing cybersecurity landscape, leaving graduates underprepared for current threats.
  3. Barrier to Diversity: Traditional hiring practices can perpetuate a lack of diversity in the field by excluding candidates from non-traditional backgrounds.

The Changing Educational and Workplace Landscape

The landscape of education and the workforce is changing significantly, and these changes are reshaping the way we should approach hiring in cybersecurity:

  1. Lower College Attendance Rates: College enrollment rates have been declining over the past decade. Many potential candidates are opting for alternative education pathways, such as boot camps, online courses, and self-study, which can provide them with the specific skills needed for cybersecurity roles without the time and financial investment required for a traditional degree. This trend is particularly evident among younger generations who are questioning the value of a four-year degree in an era where knowledge and skills can be acquired more flexibly and affordably.
  2. Multi-Generational Workforce: The modern workplace is more age-diverse than ever before, encompassing Baby Boomers, Generation X, Millennials, and Generation Z. Each generation brings unique perspectives and skills to the table. Embracing a skills-based hiring approach allows organizations to leverage the strengths of a multi-generational workforce, ensuring that teams are well-rounded and capable of tackling the complex challenges of cybersecurity.

The Advantages of Skills-Based Hiring

Skills-based hiring focuses on a candidate's abilities and practical experience rather than their educational background. This approach offers several benefits:

  1. Wider Talent Pool: By prioritizing skills, employers can tap into a broader and more diverse talent pool, including career changers, self-taught individuals, and those who have gained expertise through non-traditional pathways.
  2. Improved Job Performance: Candidates selected based on their demonstrated skills are often more prepared to tackle real-world cybersecurity challenges from day one.
  3. Enhanced Diversity, Equity, and Inclusion (DEI) Programs: Skills-based hiring can significantly improve DEI initiatives. By removing the emphasis on formal degrees, companies can attract candidates from a variety of backgrounds, including underrepresented groups who may not have had access to traditional education pathways. This leads to a more diverse workforce that reflects a range of experiences, cultures, and perspectives, which is crucial for fostering innovation and problem-solving in cybersecurity.
  4. Better Diversity of Thought and Perspective: When teams are composed of individuals with different backgrounds and experiences, they bring a wider range of ideas and approaches to the table. This diversity of thought can drive creative solutions to complex cybersecurity issues, enhancing the overall effectiveness of the team. A varied team is better equipped to anticipate and address the myriad threats that organizations face today.
  5. More Loyal Team and Workforce: Employees who are hired based on their skills and potential often feel more valued and recognized for their contributions. This can lead to higher job satisfaction and loyalty. Moreover, providing opportunities for continuous learning and growth can further enhance employee engagement and retention, creating a dedicated and motivated cybersecurity workforce.
  6. Faster Hiring Process: Evaluating candidates based on their skills can streamline the hiring process, reducing time-to-hire and enabling organizations to fill critical positions more quickly.

Success Stories and Industry Trends

Many forward-thinking organizations have already begun to adopt skills-based hiring practices with great success. For example, companies like Centene, First Bank, and SSM Health have removed degree requirements for many of their tech roles, focusing instead on candidates' practical skills and experience. Even some states like Colorado have embraced the idea and eliminated degree requirements for state employment. These organizations have reported improved employee performance, higher retention rates, and increased diversity as a result. Over the next several months we will share and deep dive into examples and the impact they have had on each company. 

Conclusion

The cybersecurity field is at a critical juncture, and the traditional hiring paradigm no longer meets the industry's needs. By embracing skills-based hiring, companies can access a wider talent pool, improve job performance, and create a more inclusive workforce. Now is the perfect time to reimagine entry-level cybersecurity hiring and ensure we have the skilled professionals needed to protect our digital future.

At CyberUp, we are committed to supporting organizations in this transition and advocating for hiring practices that recognize and value skills over 4-year degrees and traditional hiring practices. Together, we can build a stronger, more resilient cybersecurity workforce.

 

Read More

The Future of Cyber Talent Acquisition: How Skills-Based Hiring Works for Companies

In today's rapidly evolving job market, traditional hiring methods based on degrees and previous job titles are becoming less effective. With the rise of new technologies and changing industry demands, companies are increasingly turning to skills-based hiring to find the best talent. But what exactly is skills-based hiring, and how does it work for companies? Let's explore.

What is Skills-Based Hiring?

As a quick refresher, here is our definition of skills-based hiring. Skills-based hiring is an approach that focuses on evaluating a candidate's specific abilities, practical experience, and demonstrated performance rather than their educational background or formal qualifications. This method assesses what a candidate can do and how well they can do it, making it a more inclusive and effective way to identify top talent.

Implementing Skills-Based Hiring in Your Company

How we have hired talent for the past 30 years requires a reset. Why might you ask? That’s a discussion for another blog but for today let’s focus on the how. As you will learn, transitioning to a skills-based hiring approach requires careful planning and execution. It does not have to be a challenging task but it requires a creative approach and open-mindedness to implement successfully. 

Here's a detailed guide on 7 steps to implement skills-based hiring effectively:

  1. Identify Key Skills
  • Role Analysis: Begin by thoroughly analyzing each role within your organization. Engage with current employees and managers to understand the specific tasks and responsibilities of each position.
  • Skill Mapping: Identify the essential technical and soft skills required for each role. This might include understanding firewalls and network security best practices, communication skills for customer-facing roles, or problem-solving abilities for management positions.
  • Prioritization: Determine which skills are critical and which are desirable. This will help in creating a focused assessment process.
  1. Develop Skills Assessments
  • Practical Tests: Design practical tests that reflect real-world tasks related to the job. For example, a coding challenge for a developer role or a project simulation for a project manager role. Finding a cybersecurity assessment has proven difficult but companies like Crowdstrike leverage capture the flag types of challenges when hiring candidates to accurately assess skills.
  • Behavioral Assessments: Include assessments that measure soft skills such as teamwork, leadership, and adaptability. These can be situational judgment tests or behavioral interviews.
  • Tools and Resources: Utilize online platforms and tools that offer pre-built assessments or the ability to create custom tests. Ensure these tools provide reliable and valid measures of the required skills.
  1. Revise Job Descriptions
  • Skill-Focused Listings: Rewrite job descriptions to highlight the skills and competencies needed rather than focusing on degrees or specific job titles. Use clear and concise language to describe the key responsibilities and required skills.
  • Inclusive Language: Use inclusive language that encourages a diverse range of candidates to apply. Avoid jargon and unnecessary requirements that might deter qualified applicants.
  1. Train Hiring Managers
  • Educational Workshops: Conduct workshops and training sessions to educate hiring managers on the principles of skills-based hiring. Explain the benefits and guide how to evaluate skills effectively.
  • Bias Reduction: Train hiring managers to recognize and mitigate biases in the hiring process. This includes understanding the impact of unconscious biases and using structured interview techniques.
  • Interview Techniques: Teach hiring managers how to conduct skills-based interviews. This includes asking open-ended questions that allow candidates to demonstrate their skills and using standardized scoring rubrics.
  1. Use Technology
  • Applicant Tracking Systems (ATS): Implement an ATS that supports skills-based hiring. Look for systems offering integrated skills assessments that help automate the screening process. A gold star for companies who assess for transferable skills.
  • Data Analytics: Use data analytics to track and measure the effectiveness of your skills-based hiring process. Analyze metrics such as time-to-hire, quality of hire, and employee performance to make data-driven improvements.
  • Virtual Assessments: Leverage virtual assessment tools to facilitate remote hiring. This can include video interviews, online skill tests, and collaborative platforms for team-based exercises.
  1. Pilot Programs
  • Small-Scale Implementation: Start with a pilot program in one department or for a specific role. This allows you to test the skills-based hiring approach on a smaller scale and make adjustments before a company-wide rollout.
  • Feedback Loop: Collect feedback from both candidates and hiring managers involved in the pilot program. Use this feedback to refine your assessment tools, interview processes, and overall approach.
  1. Evaluate and Iterate
  • Performance Metrics: Continuously monitor the effectiveness of your skills-based hiring approach. Track key performance indicators (KPIs) such as employee retention, job performance, and satisfaction levels.
  • Regular Reviews: Conduct regular reviews of your hiring process and make necessary adjustments based on the data collected. Stay updated with industry trends and best practices to ensure your approach remains relevant and effective.
  • Employee Development: Use the insights gained from the hiring process to inform employee development and training programs. This helps in aligning current employees’ skills with evolving job requirements.

Conclusion

Skills-based hiring is a powerful approach that can help companies find the best talent in an increasingly competitive job market. By prioritizing practical skills over traditional credentials, companies can build diverse, innovative, and high-performing teams. As the future of work continues to evolve, skills-based hiring will play a crucial role in shaping the workforce of tomorrow.

Implementing this approach requires a strategic shift in how companies evaluate and select candidates, but the benefits are well worth the effort. Embrace skills-based hiring and unlock the full potential of your talent pool. 

Read More

What is Skills-Based Hiring? The Building Blocks to Success

Over the past several years, there has been considerable discussion around the cybersecurity talent pipeline and hiring practices. We are now at a pivotal moment where five generations of workers are concurrently in the workforce, college enrollment is declining, and non-traditional skill paths are gaining momentum. The time is ripe for companies to reimagine how they recruit and hire talent. At CyberUp, we recognize that skills-based hiring is the model needed for the future.

In the coming weeks, we will define and illustrate the skills-based hiring model to establish a baseline set of expectations. Our goal is to inspire hiring managers and talent teams to embrace this practice because staying ahead of threats requires an agile, knowledgeable, and innovative workforce. Traditional hiring practices prioritize degrees/certifications and must evolve to recognize candidates with practical experience and the skills necessary to excel. Enter skills-based hiring—a transformative approach that prioritizes a candidate's abilities over formal credentials. Let’s explore what skills-based hiring means and why it's a game changer for cybersecurity.

Defining Skills-Based Hiring

Skills-based hiring is an approach that focuses on evaluating a candidate's specific abilities, practical experience, and demonstrated performance rather than their educational background or formal qualifications. This method assesses what a candidate can do and how well they can do it, making it a more inclusive and effective way to identify top talent.

We have been talking about the model for quite some time. Check out CyberUp’s early take on the concept.

The Building Blocks of Skills-Based Hiring

  1. Practical Assessments

Practical assessments are at the heart of skills-based hiring. These evaluations mimic real-world tasks and scenarios candidates will encounter in their roles. For cybersecurity positions, this could include challenges like identifying vulnerabilities in a system, performing penetration tests, or developing secure code. These tasks provide employers with a clear and concrete understanding of a candidate's technical prowess and problem-solving abilities, offering insights that go beyond a resume.

  1. Portfolio Review

A portfolio showcases a candidate’s hands-on work and projects, offering tangible evidence of their skills. In cybersecurity, this might include contributions to open-source projects, code samples, security research publications, or documented bug reports. Reviewing a portfolio allows employers to see the depth and breadth of a candidate’s experience, their ability to complete projects, and their commitment to the field. This element also highlights continuous learning and innovation, which are crucial traits for cybersecurity professionals.

  1. Relevant Experience

Skills-based hiring places a strong emphasis on relevant experience, including internships, freelance work, volunteer projects, and self-initiated endeavors. This experience is often more indicative of a candidate’s ability to perform in a real-world setting than traditional qualifications. For instance, a candidate who has actively participated in cybersecurity competitions or hackathons demonstrates both their passion and practical skills. By valuing these experiences, employers can identify candidates who have proven their abilities outside conventional pathways.

  1. Continuous Learning and Development

The cybersecurity landscape is constantly changing, with new threats and technologies emerging regularly. Skills-based hiring recognizes the importance of continuous learning and professional development. Candidates who stay updated with the latest trends, tools, and techniques—whether through online courses, certifications, workshops, or self-study—are highly valued. This element underscores a candidate's proactive approach to their career and their ability to adapt to new challenges, which is essential in the fast-paced world of cybersecurity.

  1. Soft Skills Evaluation

While technical skills are critical, soft skills such as communication, teamwork, and critical thinking are equally important in cybersecurity roles. Skills-based hiring includes the evaluation of these attributes through behavioral interviews, situational judgment tests, and collaborative tasks. For example, a candidate might be asked to explain complex security concepts to a non-technical audience or work with a team to devise a security strategy. These assessments help determine if the candidate can effectively contribute to and thrive within a team environment.

  1. Role-Specific Simulations

Role-specific simulations provide a realistic preview of the day-to-day responsibilities candidates will face. These simulations involve responding to a simulated security breach, analyzing security logs for potential threats, or developing a risk management plan. By engaging candidates in these scenarios, employers can assess not only their technical skills but also their decision-making process, stress management, and ability to prioritize tasks under pressure.

Conclusion

Skills-based hiring redefines how cybersecurity professionals are recruited, emphasizing what candidates can do rather than where they’ve been. This approach ensures that the best-suited candidates are identified by incorporating practical assessments, portfolio reviews, relevant experience, continuous learning, soft skills evaluation, and role-specific simulations. As the cybersecurity landscape evolves, skills-based hiring will play a crucial role in building a robust, capable, and forward-thinking workforce. Embrace the change and watch your team—and your organization—thrive.

Reach out today and see how CyberUp's team of apprenticeship experts can help you!

Read More

Apprentice Success Story: Nate Miller

Nate Miller's journey from a military cyber operation specialist to an Information Security Analyst at Swirlds Labs is a testament to his determination and passion for technology. Completing the CyberUp apprenticeship program, Nate's path was filled with learning, challenges, and significant achievements.

Discovering CyberUp

Nate began his career in the military, gaining foundational cybersecurity knowledge. As a National Guard member for the Army, his dedication was clear. Although he didn't have a degree, Nate earned a Cisco Certified Networking Associate certification, showcasing his technical skills. Nate chose CyberUp to further enhance his cybersecurity skills; the support and guidance from CyberUp made the field more accessible for him. His enthusiasm for learning and technology made cybersecurity a natural progression.

During the initial three months of his apprenticeship, Nate found himself enthralled by the learning opportunities at CyberUp. He appreciated the structured support system, which made the complex world of cybersecurity more accessible. This period laid the groundwork for his future advancements and achievements within the program.


Evolving Skills and Responsibilities

Nate's role at Swirlds Labs quickly advanced from basic tasks to more complex solo projects, such as phishing campaigns. He began working independently, gaining confidence and competence. His standout accomplishment was executing a phishing campaign using voice AI technology to clone the CEO's voice. This innovative approach not only demonstrated his technical skills but also earned him recognition and a bonus from the company. It showcased his ability to leverage new tools and technologies effectively.

Throughout the apprenticeship, Nate continued to acquire new skills and knowledge. He learned to use tools like KnowBe4 for training and phishing campaigns, gaining hands-on experience that integrated these tools into the company's processes. His evolving responsibilities and solo projects highlighted his growing expertise and readiness for more advanced tasks.

Balancing Work and Life

Nate maintained a healthy work-life balance throughout his apprenticeship. The flexibility of remote work allowed him to integrate his professional responsibilities with personal commitments, such as accompanying his girlfriend to a conference in Orlando. This balance was crucial in enabling him to pursue additional certifications outside of work hours, further enhancing his expertise.

Nate's ability to manage work-life balance effectively contributed significantly to his success. By working remotely, he could work from various locations, ensuring that his personal life did not interfere with his professional commitments. This flexibility also allowed him to focus on completing certifications, fully engaging in work tasks during work hours.

Advice for Future Apprentices

With the apprenticeship program behind him, Nate aims to delve deeper into red team cybersecurity, focusing on cyber attacks and prevention methods. The foundation laid during his time with CyberUp and Swirlds Labs will benefit this pursuit. Nate advises future apprentices to be trainable, flexible, and ready for challenges. His journey is a reminder that success in cybersecurity is about continuous learning and growth.

Nate Miller's story through the CyberUp program shows how structured learning and real-world experience can transform a passionate individual into a cybersecurity expert. His journey from soldier to cybersecurity professional is an inspiring example of how dedication and the right support can lead to success in the ever-evolving field of cybersecurity.

Read More

Apprentice Success Story: Laura Ohanian

 

Beginning a New Chapter

Laura Ohanian's transition into cybersecurity began with a strong foundation in psychology and web design, and a determination to find a more stable and lucrative career to support her role as a single mom. Before joining CyberUp, Laura worked as an engraver at Scott Air Force Base and held diverse roles including a licensed esthetician. Her decision to shift careers was fueled by the growing demand in cybersecurity and the support structure provided by CyberUp’s apprenticeship program. Laura's journey in cybersecurity started with gaining her CompTIA Security+ certification, which equipped her to take on her new role as an associate information security analyst.

Growth and Learning

By the three-month mark, Laura had already taken charge of critical tasks such as managing the phishing email inbox and handling service requests for access to applications and workstations. Despite feeling occasionally behind her peers with IT degrees, Laura’s dedication and constant learning kept her job enjoyable and fulfilling. Six months into her role, she appreciated the never-ending learning curve in cybersecurity and expressed a desire to delve deeper into Governance, Risk, and Compliance (GRC), reflecting her passion for understanding the broader implications of cybersecurity measures.

A Year of Achievements and Aspirations

Approaching her one-year anniversary with CyberUp, Laura highlighted the emotional support and hands-on training that were instrumental in her professional development. Her ability to overcome challenges, especially in solitary study, was significantly aided by the resources and mentoring provided by CyberUp. Looking ahead, Laura aims to deepen her expertise in the GRC field and acquire further certifications to advance her career.

During this transformative year, Laura also made significant contributions to cybersecurity initiatives at SSM Health, where her role involved safeguarding sensitive medical data and ensuring compliance with healthcare regulations. Her involvement in developing and implementing security measures has been critical in protecting patient information and enhancing the organization's overall security framework. This experience at SSM Health not only sharpened her skills but also reinforced her commitment to the field, setting a solid foundation for her future aspirations in cybersecurity.

Contributing Back to the Community

Laura is not just committed to her own growth but is also eager to give back to the community that supported her. She has expressed interest in mentoring within CyberUp’s youth and alumni programs, hoping to guide others through their cybersecurity journey.

Laura’s story is a compelling example of how resilience, continuous learning, and community support can transform careers and lives. Her experience inspires current and prospective CyberUp candidates to pursue their goals with determination and seek the support they need to succeed.

Read More

Apprentice Success Story: Tia Harris

 

Embarking on a Cybersecurity Adventure

Tia Harris began her cybersecurity journey with experience in security from roles at Boeing and the Illinois Army National Guard, despite having no degree. Her pivot was sparked by a CyberUp career development session, highlighting the alignment between her experience and the demands of cybersecurity. Tia valued the transparency and relevance in CyberUp’s training, quickly applying her new skills at the Federal Reserve Bank, embracing projects across various sectors.

Early Realizations and Growth

Within three months, Tia excelled in her role, supported by CyberUp in areas like resume building and interview prep. Her enthusiasm for cybersecurity grew, viewing the field as full of opportunities for professional advancement. By six months, Tia had embraced her role not just as an analyst but as an educator within her organization, teaching cybersecurity awareness with creativity.

A Year of Transformation and Achievement

Approaching one year, Tia's role evolved to Associate Information Security Analyst, focusing on compliance and awareness. Her projects involved cross-team collaboration, enriching her experience.. Tia found that CyberUp’s study tips and professional development played a pivotal role in her success today. Her goal is to continue growing in the Federal Reserve Bank’s security assurance team.

In reflecting on her first year, Tia is particularly proud of her contributions to a major compliance project that improved the company’s security posture. Her ability to bridge technical knowledge with practical application has not only enhanced her team's capabilities but also positioned her as a key player in her department. This success, coupled with her ongoing commitment to learning and development, underscores the significant strides she has made in her career and the potential she has to influence the future of cybersecurity.

Legacy and Mentorship

Committed to giving back, Tia is enthusiastic about mentoring in CyberUp’s youth program and participating as a volunteer speaker. Her journey demonstrates the power of seizing opportunities in cybersecurity.

Tia’s story is an inspiration to those considering cybersecurity, showing that success is achievable with the right guidance and resources.

Read More

Apprentice Success Story: Michael Hall

 

In the fast-paced world of cybersecurity, it's rare to find individuals passionate about technology and committed to continuous learning. Michael Hall's journey, supported by CyberUp, showcases how dedication, education, and ongoing support lead to remarkable career growth.

Embarking on a Cybersecurity Adventure

Michael's cybersecurity journey started with a strong foundation, drawing from his experience as a high IT analyst at a small non-profit and his academic studies in Business Administration and Cybersecurity. A recommendation from a professor at Webster University led him to CyberUp, transforming his career path. Michael's diverse interests, including fitness, 3D printing, and family time, highlight his versatile personality and eagerness to explore the cybersecurity field.

Early Realizations and Growth

Only three months into his apprenticeship, Michael appreciated the comprehensive nature of CyberUp's training programs, such as ITProTV, and the hands-on practice quizzes that sharpened his skills. His initial role as a security analyst set the stage for his aspirations to expand into testing roles or red team penetration testing, reflecting his desire to master the intricacies of cybersecurity.

Midway Milestones

At the six-month milestone, Michael embraced the dynamic world of cybersecurity, aligning with his love for tech and ongoing learning. The supportive atmosphere at CyberUp and balancing work-life demands showcased his personal and professional growth. He kept himself updated on the ever-changing cybersecurity field through podcasts, blogs, and Reddit, aiming to become a threat intelligence analyst or threat hunter.

A Year of Transformation and Achievement

Approaching his one-year mark, Michael reflected on bridging education with hands-on experience. Starting as an apprentice and swiftly becoming a full-time employee, his journey symbolized progress. He played a key role in implementing a new data loss prevention tool, focusing on email security and incident response. His advice to future CyberUp candidates: stick with it for career advancement.

Michael's cherished quote, "Comparison is the thief of all joy," which stresses the importance of personal growth. His future aspirations lean towards a technical role like a security engineer, fueled by gratitude for CyberUp's support and a drive for continuous improvement in the cybersecurity community.

Legacy and Mentorship

Apart from his professional achievements, Michael's willingness to volunteer with CyberUp’s youth program and participate in the alumni program as a volunteer speaker shows his commitment to giving back and motivating the next generation of cybersecurity professionals.

Michael's journey, from starting his CyberUp apprenticeship to becoming a cybersecurity analyst, is a tale of dedication, ongoing learning, and the impactful support of educational programs. His story inspires aspiring cybersecurity professionals, showing that reaching career goals is possible with the right resources, guidance, and determination.

Read More

April Fools' Cybersecurity: Don't Let Phishing Lines Reel You In!

On this April Fool’s Day, it's not just pranksters and jokesters who are gearing up for mischief. Cybercriminals also see this day as an opportunity to unleash their tricks and scams on unsuspecting individuals and organizations. In this blog post, we'll delve into the importance of cybersecurity awareness during April Fool's Day and explore strategies to protect yourself and your organization from falling victim to cyber threats.

 

The Significance of Cybersecurity Awareness:

Cybersecurity awareness is crucial year-round, but it takes on added importance during times like April Fool's Day when cybercriminals may attempt to exploit the jovial atmosphere to carry out malicious activities. By raising awareness about common cyber threats and promoting best practices for online safety, individuals and organizations can minimize their risk of falling victim to cyber-attacks.

 

Understanding Cyber Threats:

Before diving into specific cybersecurity tips for April Fool's Day, it's essential to understand the types of cyber threats that may arise during this time. These threats can include phishing attacks, social engineering scams, malware distribution, and misinformation campaigns. Cybercriminals may capitalize on the spirit of April Fool's Day to send deceptive emails, create fake websites, or spread false information through social media channels.

 

Tips for Protecting Yourself:

  1. Verify Before You Click: Exercise caution when encountering suspicious links or emails, especially if they seem too good to be true or come from unfamiliar sources. Before clicking on any links or downloading attachments, verify the sender's identity and ensure that the website is legitimate.
  2. Strengthen Password Security: Use strong, unique passwords for all your online accounts and consider enabling two-factor authentication for an added layer of security. Avoid using easily guessable passwords or sharing them with others, as this can leave you vulnerable to unauthorized access.
  3. Stay Updated on Security Patches: Keep your software, operating system, and antivirus programs up to date with the latest security patches and updates. Regularly check for software updates and install them promptly to protect against known vulnerabilities and exploits.
  4. Be Skeptical of Unsolicited Offers: Be wary of unsolicited emails, messages, or phone calls promising prizes, discounts, or other incentives. If something sounds too good to be true, it probably is. Trust your instincts and avoid providing personal or sensitive information to unknown entities.
  5. Educate Your Team: If you're part of an organization, take the opportunity to educate your team members about cybersecurity best practices. Conduct training sessions, share relevant resources, and encourage a culture of vigilance and accountability when it comes to cybersecurity.

 

Protecting Your Organization:

  1. Implement Robust Security Measures: Ensure that your organization has robust cybersecurity measures in place, including firewalls, antivirus software, intrusion detection systems, and data encryption. Regularly assess your network security posture and address any vulnerabilities or weaknesses promptly.
  2. Monitor for Suspicious Activity: Implement monitoring tools and protocols to detect and respond to suspicious activity on your network. Monitor for signs of unauthorized access, unusual login attempts, or inconsistent behavior that may indicate a potential security breach.
  3. Backup Your Data: Regularly back up your organization's data and ensure that backups are stored securely and regularly tested for reliability. In the event of a cyber-attack or data breach, having backup copies of your critical data can help minimize disruption and facilitate recovery.
  4. Foster a Culture of Security Awareness: Promote cybersecurity awareness and best practices among your employees through regular training, awareness campaigns, and ongoing communication. Encourage employees to report any security incidents or concerns promptly and provide them with resources and support to stay vigilant online.
  5. Collaborate with Security Partners: Consider partnering with trusted cybersecurity vendors or experts to enhance your organization's security posture. Leverage their expertise and resources to identify and mitigate potential threats, assess your cybersecurity readiness, and develop a comprehensive security strategy tailored to your organization's needs.

This April Fool’s Day, it's essential to remain vigilant and proactive about cybersecurity. By staying informed about common cyber threats, adopting best practices for online safety, and implementing strong security measures, individuals and organizations can minimize their risk of falling victim to cyber-attacks. Remember, the best defense against cyber threats is a combination of awareness, preparedness, and proactive action.

Read More