More than 1 million cybersecurity jobs will be available by 2025, but less than 400,000 cybersecurity professionals will be trained by then.
Here’s how I’m preparing to be among the 400k 🙃
As a requirement for my Master’s degree in Applied Cybersecurity, I attended an intensive 4-day Masterclass with one of the most experienced CISOs out there - shout out to Bozidar (I want to say more about him, but in his words - “Do an OSINT on me and you will know who I am”)
My classmates and I were given front-row seats for an entire week to see how cybersecurity works in a real-world context. The experience was practical, detailed, and nerve-wracking.
We covered five main areas: finding your footing, incident management, vulnerability management, risk management, and business continuity.
In this article, I will try to summarise my experience during this masterclass.
Starting as a newly hired cybersecurity professional will feel overwhelming; like every new challenge, you will learn to adapt. However, initially, it won’t be self-evident; you will need to know about the company’s culture, vision, products, people, etc.
This phase was all about practical ways to hit the ground running and make a positive impact early on. We focused on strategies to integrate into the team, understand the company’s systems and culture, and establish trust with colleagues and management.
The goal was to equip us with the right mindset to face the challenges head-on while building confidence and credibility in our new role.
A cybersecurity breach can have far-reaching consequences. This phase focused on handling a simulated ransomware attack. We were tasked with managing a breach, containing the damage, and ensuring recovery.
In this phase, we stepped into the role of penetration testers at Yield Cat, a Security Learning Platform. The Yield Cat platform simulates a high-yield bond trading system embedded with numerous security flaws, providing a real-world environment to apply vulnerability management techniques.
We went through the entire vulnerability management process, using various tools to identify weaknesses and assess risks.
We used
These tools, among many others, played a crucial role in helping us understand the security posture of the system and identify areas of concern
The phase revolved around understanding and managing risks effectively. Risk management requires identifying threats, assessing their impact, and taking steps to mitigate them.
In this final phase, we focused on creating business continuity plans to keep operations running during and after a security incident. This involved working with management to design strategies that align with the company’s goals.
This masterclass was an eye-opening experience, giving me a full week-long opportunity to step into the shoes of a cybersecurity professional. It wasn’t just about learning theories—it was about applying them in real-world scenarios, solving problems on the fly, and collaborating with others in high-pressure situations.
The biggest lesson I walked away with? Technical skills are essential, but soft skills are what truly set great cybersecurity professionals apart. You can always learn to use a new tool or understand a new security framework. However, refining the ability to communicate effectively, manage your time, stay calm under pressure, and work well with a team takes time and effort. How you interact with your team members, leaders, and management in this field can make or break your success.
Sure, mastering penetration testing, risk management, and incident response is critical. Still, your knowledge isn't as impactful if you can’t explain your findings to a non-technical audience or make clear recommendations that drive action. That’s why I’ll focus just as much on improving my communication, adaptability, and decision-making as on sharpening my technical expertise.
I’m incredibly grateful to the CyberMacs team and Bozidar for organizing this masterclass—it was an invaluable experience that will shape how I approach cybersecurity moving forward.