Cybersecurity Growth: Troubleshooting Portainer, Studying for Security+, and Landing IT Jobs

Mastering Cybersecurity: Troubleshooting, Job Search, and Security+ Study Progress

The road to becoming a cybersecurity professional is filled with challenges that require a mix of technical problem-solving, continuous learning, and job-hunting persistence. This week, I found myself troubleshooting Docker networking issues with Portainer, diving deeper into Security+ SY0-701 study topics, and continuing my cybersecurity job search.

Each challenge reinforced the importance of hands-on experience and structured study in my journey toward a cybersecurity career.


Unraveling a Portainer Mystery: When SSH Works but HTTP Doesn’t

While setting up Portainer on a Raspberry Pi, I encountered an unusual issue. My SSH connection over a private VPN network worked perfectly, but Portainer’s web interface on port 9000 refused to load when accessed remotely. However, it worked fine on my local network.

At first, I suspected the service wasn’t running properly, but a quick docker ps check confirmed Portainer was up. Testing locally returned a 200 OK response, proving the service was live. Yet, when I attempted to connect externally via my VPN, my browser spun endlessly before timing out.

Diving deeper, I realized the VPN likely allows SSH traffic but restricts web-based traffic on non-standard ports. To confirm, I checked firewall rules and verified that Docker was properly configured to accept connections. As a temporary solution, I set up SSH tunneling, which successfully forwarded the Portainer UI to my local machine.

For now, I’ll continue accessing Portainer locally, but next week, I plan to explore Cloudflare Tunnel or Tailscale for secure remote access without VPN restrictions.


Advancing My Security+ Studies: Breaking Down Cyber Threats

Beyond troubleshooting network issues, I dedicated time to my Security+ SY0-701 studies. This week’s focus was on threat actors, vulnerabilities, and mitigation strategies, essential knowledge for identifying and defending against cyberattacks.

Understanding threat actors is critical—ranging from opportunistic script kiddies to highly sophisticated nation-state attackers. While some hackers exploit weak passwords and unpatched systems, others use social engineering, supply chain attacks, and insider threats to bypass security defenses.

In addition to threat actors, I studied attack methodologies and how cybercriminals move through a system—from initial reconnaissance and privilege escalation to lateral movement and exfiltration. This reinforced why layered security defenses, such as multi-factor authentication (MFA) and least privilege access, are essential in cybersecurity operations.

Next, I’ll shift my focus to cryptographic solutions (3.0) and identity & access management (4.0), diving deeper into encryption, authentication mechanisms, and secure access controls.


Pushing Forward in My Cybersecurity Job Search

In between studying and technical troubleshooting, I continued my cybersecurity job search, applying for roles in SOC analysis, IT support, and security operations. This week, I submitted applications for:

  • Information Technology Analyst – A growing aerospace company
  • IT Support Specialist – A global medical technology firm
  • Service Desk Analyst – A Fortune 500 construction and materials company

While applying, I also took the time to refine my resume and job tracking system, ensuring I stay organized and improve my application process. The key lesson here? Job hunting is a skill in itself, requiring persistence, adaptation, and continuous improvement.


Takeaways and What’s Next

This week reinforced a fundamental truth: Cybersecurity isn’t just about theory—it’s about solving real-world problems. Whether it’s debugging VPN networking issues, dissecting cyber threats, or refining my job application strategy, every challenge is a learning opportunity.

Looking ahead, I plan to:
✔ Continue Security+ studies with cryptography and access management.
✔ Explore Cloudflare Tunnel or Tailscale for remote Portainer access.
✔ Keep refining my job applications and resume strategy.

Cybersecurity is a field where hands-on experience matters as much as knowledge. Every issue solved, every job applied for, and every new concept learned brings me closer to my goal.

Have you encountered VPN-related networking issues? Let’s discuss in the comments!