My Cybersecurity Journey: Progress, Lessons, and Job Applications

Hello, Think Positive Cyber readers!

This week has been a whirlwind of progress in my cybersecurity journey. From managing my health to studying for the Security+ exam, troubleshooting VPN issues, and identifying job opportunities, I’ve made strides toward my goals. In this blog, I’ll share my experiences, lessons learned, and reflections on the steps I’ve taken to advance my career in cybersecurity.


Morning Routine & Health

My day began with a focus on health. I took acetaminophen, ibuprofen, benzonatate, and used my albuterol inhaler to manage my symptoms. Staying healthy is critical as I juggle learning, job applications, and personal growth. Taking care of myself ensures I can stay focused and productive throughout the day.


Cybersecurity Learning: Security+ Exam Prep

I dedicated time this week to studying for the CompTIA Security+ SY0-701 exam. Cybersecurity certifications like Security+ are essential for IT professionals looking to advance in security roles. Here are some key takeaways from my studies:

1. Impersonation Attacks

I learned about impersonation attacks through a YouTube video (link). These attacks involve fraudsters pretending to be someone they’re not—like a fake Microsoft representative or help desk agent—to extract sensitive information.

Key Lessons:

  • Never share personal information unless you verify the caller’s identity by calling back using a trusted number.
  • Be cautious of phishing attempts asking for passwords or financial details.

2. CIA and DAD Triads

In my Network Security Basics class, I revisited the CIA Triad (Confidentiality, Integrity, Availability) and its counterpart, the DAD Triad (Disclosure, Alteration, Denial). These frameworks are foundational for understanding cybersecurity risks and implementing effective controls.

3. Data Protection Techniques

I explored strategies like encryption, data loss prevention (DLP), and data minimization:

  • DLP Tools: Prevent sensitive data leaks using host-based or network-based solutions with techniques like pattern matching and watermarking.
  • Data Minimization: Use hashing, tokenization, and masking to reduce exposure of sensitive information.

These concepts reinforce the importance of safeguarding data at rest, in motion, or during processing.


Practical Troubleshooting: VPN Setup on Raspberry Pi

This week also involved hands-on learning as I set up NordVPN on my Raspberry Pi device. Initially, I encountered issues connecting via command line but resolved them by updating the Raspberry Pi following Debian’s unattended upgrades guide (link). This experience highlighted the importance of staying persistent when troubleshooting technical problems—a valuable skill in cybersecurity.


Job Applications & Progress

One of the most exciting parts of this week was identifying several promising job opportunities that align with my skills in IT support and network administration. These positions are stepping stones toward a long-term career in cybersecurity. Below is a summary of the jobs I plan to apply for:

Job TitleCompany NameDescriptionDeadline
IT Support SpecialistMainstay MedicalProvide technical support for IT systems, troubleshoot issues, and manage Active Directory accounts.2/12/2025
Service Desk AnalystMartin MariettaAct as the first point of contact for IT issues, resolve tickets, and ensure smooth IT operations.2/12/2025
Systems AdministratorSkyline DX USA IncManage IT infrastructure, including servers, networks, and security protocols for a growing company.2/12/2025
Network and Computer Systems AdministratorSonaca North AmericaOversee network systems, ensure uptime, and implement security measures for enterprise operations.2/10/2025

Reflection on Job Search Progress

Finding these roles has been both exciting and motivating. They align well with my background in IT support and network management while offering opportunities to grow into specialized cybersecurity positions over time. My next step is to refine tailored resumes and cover letters that highlight my strengths for each position.


Cybersecurity Insights from Real Life

I came across an interesting article (Fox Sports) about how NFL teams like the Chiefs and Jaguars started using iPads for their playbooks back in 2013. While this innovation improved efficiency for players and coaches, it also introduced new cybersecurity challenges—such as protecting sensitive team strategies from being leaked or stolen digitally. This example underscores how cybersecurity impacts every industry in unique ways.


Next Steps: Moving Forward with Confidence

As I continue this journey toward building a career in cybersecurity, here’s what’s next on my agenda:

  1. Finalize tailored resumes and cover letters for each job application listed above.
  2. Submit applications before their respective deadlines (starting with Sonaca North America on 2/10/2025).
  3. Continue studying for the Security+ SY0-701 certification exam to strengthen my credentials further.

I’m optimistic about these opportunities and confident that with persistence and preparation, I’ll secure a role that aligns with both my skills and career aspirations.


Thank you for following along with my progress! If you’re also pursuing a career in cybersecurity or have tips to share about certifications like Security+, job applications, or troubleshooting technical challenges, feel free to leave a comment below—I’d love to hear from you.

Stay positive and stay secure!

Jeremiah O’Neal

Citations:
[1] https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/51650955/ed9623be-f70a-4d30-9afb-95776b85a3d1/Blog-2-8-2025.txt


Answer from Perplexity: pplx.ai/share