Cybersecurity & IT
Security operations, entry-level cyber roles, and frontline IT support - monitoring, triage, and keeping users and systems safe.
Career path patterns
How people actually get into these roles
The big picture
Information security is one of the fastest-growing career fields internationally — US labour projections cite roughly 29% growth for security analysts through 2034, nearly three times the average for all occupations. In the UK, government skills surveys report persistent gaps at every level. Critically, 51% of hiring managers now actively seek candidates from non-traditional backgrounds. This is genuinely one of the most accessible high-earning fields for career changers right now.
Key stat
New entrants to cybersecurity are trending older — 39- to 49-year-olds made up 35% of those entering the profession within the past year, up from 18% in 2022. It is never too late to make this move.
Source: ISC2 workforce study
Common path patterns
- Military / policeSOC Analyst
Veterans and ex-law enforcement bring discipline, threat assessment, and the ability to operate under pressure — all highly valued in security operations centres and digital forensics. This is one of the most consistently cited career-change paths into cybersecurity.
- IT helpdesk / sysadminSOC Analyst
The most well-trodden path on this site. If you have worked in IT support, you already understand systems, user behaviour, and network basics — you are leveraging existing skills rather than starting from zero.
Typical entry certs: CompTIA Security+, then build toward CISSP or vendor SIEM training.
- Software developerJunior Cybersecurity Analyst
Developers who pivot into security (often called AppSec) are in huge demand. They can think like both the attacker and the builder — a combination employers struggle to hire.
- Compliance / auditGRC (governance, risk & compliance)
If you have worked in any regulated industry — banking, insurance, healthcare, legal — your understanding of policy, risk frameworks, and audit trails maps directly into cybersecurity compliance roles. No deep technical skills required to get started.
- Teaching / trainingSecurity awareness & education
Increasingly in demand as companies struggle with the human side of security. Trainers who can communicate risk clearly and build internal education programmes are a growing hire — often sitting alongside SOC and GRC teams.
Notable examples
Kevin Mitnick
Once the FBI's most-wanted hacker after convictions for computer crimes, he rebuilt his career as one of the most respected security consultants in the world before his death in 2023.
Brian Krebs
After a cybergang hacked his home network, he became so engrossed in cybersecurity that he left mainstream journalism to report exclusively on cybercrime. KrebsOnSecurity is now one of the foremost sources in the field.
Kevin Poulsen
Built a journalism career on breaking down complex technical subjects, drawing on his background as a convicted hacker — access and perspective traditional reporters lacked.
Roles in this industry
- SOC AnalystView role →
A Security Operations Centre (SOC) Analyst is responsible for the continuous monitoring, detection, and response to cybersecurity threats across an organisation's infrastructure. Working within a SOC — which may operate 24/7 — analysts triage security alerts, investigate incidents, contain threats, and document findings. They work with SIEM platforms, endpoint detection tools, network monitoring systems, and threat intelligence feeds to identify and respond to attacks in real time. SOC Analysts are typically tiered (L1, L2, L3) by experience and responsibility. L1 analysts handle initial alert triage; L2 analysts conduct deeper investigation and correlation; L3 analysts lead complex incident response and may contribute to threat hunting. The role demands strong technical knowledge of networks, operating systems, and attacker techniques, as well as the ability to work calmly under pressure during active incidents.
- Junior Cybersecurity AnalystView role →
A Junior Cybersecurity Analyst monitors an organisation's systems and networks for signs of intrusion, malware, or policy violations. Core tasks include reviewing security alerts from SIEM platforms (e.g. Splunk, Microsoft Sentinel), triaging incidents, conducting initial investigations, escalating confirmed threats, and maintaining security documentation. The role sits within a Security Operations Centre (SOC) or a wider IT security team and typically involves shift-based working at larger organisations. Entry-level analysts are expected to develop their understanding of the threat landscape, attacker techniques (MITRE ATT&CK framework), and defensive tools quickly. The role is deliberately hands-on — it is the primary entry point into a cybersecurity career — and progression into specialisms like penetration testing, incident response, threat intelligence, or cloud security is well-defined.
- IT SupportView role →
An IT Support professional provides technical assistance to end users and maintains the hardware, software, and network infrastructure an organisation depends on. Responsibilities range from first-line helpdesk triage — resetting passwords, troubleshooting connectivity issues, resolving software errors — to second and third-line work involving system administration, device deployment, network configuration, and infrastructure maintenance. Support analysts log all issues via ticketing systems (e.g. ServiceNow, Jira Service Management) and work to SLA targets. The role is the foundation of a technology career and provides exposure to a wide range of systems, including Windows and macOS environments, Active Directory, Microsoft 365, VPNs, and increasingly cloud platforms such as Azure and AWS. IT Support professionals are expected to communicate clearly with non-technical users, manage competing priorities, and escalate issues appropriately while maintaining service continuity.
- Penetration TesterView role →
A Penetration Tester — often called an ethical hacker — is hired to attack an organisation's systems, networks, and applications before malicious actors can. Day-to-day work involves scoping engagements with clients, running structured attacks using tools such as Metasploit, Burp Suite, and Nmap, documenting vulnerabilities discovered, and writing clear reports that translate technical findings into business risk. Penetration testers work across web applications, internal networks, cloud infrastructure, and increasingly physical and social engineering scenarios. Most roles sit inside specialist security consultancies, in-house red teams at large enterprises, or government-adjacent bodies. The role demands a hacker mindset combined with methodical reporting discipline. Junior testers typically support senior colleagues on engagements and focus on web application testing before broadening into network and infrastructure work. In the UK, demand is driven by regulatory requirements, cyber insurance obligations, and the growing volume of high-profile breaches. Testers who can communicate risk clearly to board-level stakeholders — not just write technical reports — progress fastest.
- Cloud Security EngineerView role →
A Cloud Security Engineer designs, implements, and maintains the security controls that protect an organisation's cloud infrastructure — typically across AWS, Microsoft Azure, or Google Cloud Platform. Day-to-day work involves configuring identity and access management (IAM), reviewing infrastructure-as-code for security misconfigurations, monitoring cloud environments for threats, responding to security incidents, and working closely with DevOps and platform engineering teams to embed security into the build pipeline. The role sits at the intersection of traditional security operations and modern cloud-native engineering, requiring both an understanding of attacker techniques and the ability to build automated controls at scale. Entry-level positions often carry titles such as Junior Cloud Security Engineer, Cloud Security Analyst, or Associate Security Engineer, and typically involve supporting more senior engineers on implementation projects and monitoring tasks. The UK cloud security market is expanding rapidly as organisations complete multi-year migration programmes and face increasing regulatory scrutiny of cloud configurations. Engineers who can speak both security and infrastructure — understanding Terraform, Kubernetes, and CI/CD pipelines as well as threat modelling and compliance frameworks — are among the most sought-after professionals in the sector.