2 answers
Updated
721 views
What are the hours like in the digital forensics field?fall
I am a highschool senior who is curious on my future in cyber defense/cyber crime. Looking for others to help me find oppurtunities and jobs in the workforce after my bachelors at Bloomsburg.
Login to comment
2 answers

Edmond Momartin ☁️
Public Cloud Security & Compliance AT&T | MBA InfoSec | OWASP-LA Board
82
Answers
Los Angeles, California
Updated
Edmond’s Answer
It's like any other job - employed at a large company and doing 9-5 or work for yourself as a consultant and no set hours. There should be a lot of opportunities in your area to do internships. My advice: don't wait until you graduate.
If not already, you should find and attend in-person meetings of cybersecurity related non-profit orgs. Most have local chapters in major metro areas, which you can find on their websites: OWASP (owasp.org), ISC2 (isc2.org), ISSA (issa.org).
If not already, you should find and attend in-person meetings of cybersecurity related non-profit orgs. Most have local chapters in major metro areas, which you can find on their websites: OWASP (owasp.org), ISC2 (isc2.org), ISSA (issa.org).
Updated
Wes’s Answer
Bloomsbury appears to have a strong cyber program so congratulations on being accepted. Cybersecurity is a skill that builds on understanding the underlying layers like networking and coding so make sure you learn the other layers deeply and look for opportunities for practical experience. Be sure to take classes on relevant coding and be able to automate your own tasks. Always good to work as an intern while in college as soon as possible to make sure you enjoy the work and start to build relationships with companies. Any successful career also requires significant soft skills development like leadership, teamwork, and initiative. Lastly as social engineering is such a successful method in breaches, it would be good to take classes like psychology to have a well rounded perspective.
Join a cyber club in College
Start the process to intern
Following 3-5 news sources in the cyber field, e.g. Krebs on Security, Wired, Threatpost, The Hacker News, CSO Magazine
Wes recommends the following next steps: