SBN

Degree vs. certification: Advanced-career cybersecurity engineer

Introduction

Versatile solutions are an attractive option in today’s world. Why incorporate something new that only does one thing when you can incorporate something that has multifunctionality? This idea extends into cybersecurity careers and is perfectly embodied by the cybersecurity engineer role. 

This role wears many, if not all, of the hats on a security team and is currently a very in-demand job, to the point that it is hard to fill. Like many other cybersecurity roles, this one can be reached via two general paths — by earning a degree or earning certifications. This article will detail both paths and conclude with a well-founded recommendation for which path you should take for the advanced-career-stage cybersecurity engineer.

What is a cybersecurity engineer?

Cybersecurity engineers are sort of like the Swiss Army knife of the cybersecurity career world. This role touches on about every sub-discipline within the cybersecurity field. From network and system security to troubleshooting information security breaches and penetration testing, this role will require a well-rounded, comprehensive cybersecurity skill set. 

What’s more, more than a few cybersecurity engineers make it to this proverbial pinnacle of their respective career. There are approximately 29% of all cybersecurity engineers at the advanced level, making this level a popular destination for many on their career path.

Degree path

One thing that can be stated almost universally about the role of cybersecurity engineer: a degree of some kind is required to get your foot in the door in the early stages of their career (not to mention in advanced career). 

Below is a breakdown for which degrees are requested by hiring organizations. 

  • Sub-bachelor’s (AA) — 11%
  • Bachelor — 67%
  • Graduate — 23%

As with most other cybersecurity roles, there is no one major preferred over all others. With this said, (Read more...)

*** This is a Security Bloggers Network syndicated blog from Infosec Resources authored by Greg Belding. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/hMsHyaEQMws/