Hello, Think Positive Cyber readers!
This week has been a whirlwind of progress in my cybersecurity journey. From managing my health to studying for the Security+ exam, troubleshooting VPN issues, and identifying job opportunities, I’ve made strides toward my goals. In this blog, I’ll share my experiences, lessons learned, and reflections on the steps I’ve taken to advance my career in cybersecurity.
Morning Routine & Health
My day began with a focus on health. I took acetaminophen, ibuprofen, benzonatate, and used my albuterol inhaler to manage my symptoms. Staying healthy is critical as I juggle learning, job applications, and personal growth. Taking care of myself ensures I can stay focused and productive throughout the day.
Cybersecurity Learning: Security+ Exam Prep
I dedicated time this week to studying for the CompTIA Security+ SY0-701 exam. Cybersecurity certifications like Security+ are essential for IT professionals looking to advance in security roles. Here are some key takeaways from my studies:
1. Impersonation Attacks
I learned about impersonation attacks through a YouTube video (link). These attacks involve fraudsters pretending to be someone they’re not—like a fake Microsoft representative or help desk agent—to extract sensitive information.
Key Lessons:
- Never share personal information unless you verify the caller’s identity by calling back using a trusted number.
- Be cautious of phishing attempts asking for passwords or financial details.
2. CIA and DAD Triads
In my Network Security Basics class, I revisited the CIA Triad (Confidentiality, Integrity, Availability) and its counterpart, the DAD Triad (Disclosure, Alteration, Denial). These frameworks are foundational for understanding cybersecurity risks and implementing effective controls.
3. Data Protection Techniques
I explored strategies like encryption, data loss prevention (DLP), and data minimization:
- DLP Tools: Prevent sensitive data leaks using host-based or network-based solutions with techniques like pattern matching and watermarking.
- Data Minimization: Use hashing, tokenization, and masking to reduce exposure of sensitive information.
These concepts reinforce the importance of safeguarding data at rest, in motion, or during processing.
Practical Troubleshooting: VPN Setup on Raspberry Pi
This week also involved hands-on learning as I set up NordVPN on my Raspberry Pi device. Initially, I encountered issues connecting via command line but resolved them by updating the Raspberry Pi following Debian’s unattended upgrades guide (link). This experience highlighted the importance of staying persistent when troubleshooting technical problems—a valuable skill in cybersecurity.
Job Applications & Progress
One of the most exciting parts of this week was identifying several promising job opportunities that align with my skills in IT support and network administration. These positions are stepping stones toward a long-term career in cybersecurity. Below is a summary of the jobs I plan to apply for:
| Job Title | Company Name | Description | Deadline |
|---|---|---|---|
| IT Support Specialist | Mainstay Medical | Provide technical support for IT systems, troubleshoot issues, and manage Active Directory accounts. | 2/12/2025 |
| Service Desk Analyst | Martin Marietta | Act as the first point of contact for IT issues, resolve tickets, and ensure smooth IT operations. | 2/12/2025 |
| Systems Administrator | Skyline DX USA Inc | Manage IT infrastructure, including servers, networks, and security protocols for a growing company. | 2/12/2025 |
| Network and Computer Systems Administrator | Sonaca North America | Oversee network systems, ensure uptime, and implement security measures for enterprise operations. | 2/10/2025 |
Reflection on Job Search Progress
Finding these roles has been both exciting and motivating. They align well with my background in IT support and network management while offering opportunities to grow into specialized cybersecurity positions over time. My next step is to refine tailored resumes and cover letters that highlight my strengths for each position.
Cybersecurity Insights from Real Life
I came across an interesting article (Fox Sports) about how NFL teams like the Chiefs and Jaguars started using iPads for their playbooks back in 2013. While this innovation improved efficiency for players and coaches, it also introduced new cybersecurity challenges—such as protecting sensitive team strategies from being leaked or stolen digitally. This example underscores how cybersecurity impacts every industry in unique ways.
Next Steps: Moving Forward with Confidence
As I continue this journey toward building a career in cybersecurity, here’s what’s next on my agenda:
- Finalize tailored resumes and cover letters for each job application listed above.
- Submit applications before their respective deadlines (starting with Sonaca North America on 2/10/2025).
- Continue studying for the Security+ SY0-701 certification exam to strengthen my credentials further.
I’m optimistic about these opportunities and confident that with persistence and preparation, I’ll secure a role that aligns with both my skills and career aspirations.
Thank you for following along with my progress! If you’re also pursuing a career in cybersecurity or have tips to share about certifications like Security+, job applications, or troubleshooting technical challenges, feel free to leave a comment below—I’d love to hear from you.
Stay positive and stay secure!
Jeremiah O’Neal
Citations:
[1] https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/51650955/ed9623be-f70a-4d30-9afb-95776b85a3d1/Blog-2-8-2025.txt
Answer from Perplexity: pplx.ai/share