What Idaho’s experts recommend to break into this rapidly growing field

Are you a transitioning military member, veteran, or military spouse interested in learning what it takes to make cybersecurity your next career? We sat down with 2 of Idaho’s top cybersecurity experts that made the transition from military to civilian cybersecurity professionals to find out more about steps to take to make yourself more marketable in this fast-paced, in-demand industry.

Nick Emmerling, System Security Engineer at Idaho Scientific provides tips on that topic.


“>


You have to really want to learn about computers… down to a fundamental level. You’ve got to understand how they work, how they function.
— Nick Emmerling

Having a mentor can be a crucial step in breaking into any field, but what if you don’t have any direct contacts in this industry? Mission43 employment pillar partners, Hire Heroes USA offer a variety of services, to include one-on-one career coaching and a network of volunteers to provide guidance and mentorship in the area you’re interested in. 

Shawn Scott, VP of Success at PlexTrac provides more tips on that topic.


“>


You’ve demonstrated a desire to learn, you’ve taken part in something they’re offering the community because they’re trying to grow the next generation [of cyber professionals]. That’s really what all of these CONS are about.
— Shawn Scott

You may be familiar with some of the bigger conferences, like DEF CON or ShmooCon, but here in Idaho, you can participate in BSides conferences in Twin Falls and Boise. BSides events encourage collaboration and build a stronger cybersecurity community in Idaho.

Build Your Portfolio

When it comes to setting yourself apart from the competition and getting hired, there is no better way than to tangibly showcase your skills in a digital portfolio. Even if you are just beginning to develop your skills, you can use platforms like Github to publicly share your code. Some employers will not only want to see your work, but expect to see your work.

EDUCATION DISCOVERY SERIES: CYBERSECURITY


“>