There Isn't One Path — There Are Six
"Cybersecurity" is not a job — it's a category. The six tracks that hire most consistently:
- SOC analyst / threat detection — alert triage, SIEM, IR. Strong entry path.
- AppSec / product security — code reviews, threat modeling, vulnerability remediation. Best for people with software engineering background.
- Cloud security — IAM, configuration, container hardening. Strong demand, fast-growing.
- Offensive security — penetration testing, red teaming, bug bounty. Hardest to break into; most romanticized.
- GRC (governance, risk, compliance) — policy, audit, framework work. Often overlooked, very hireable.
- Detection & response engineering — building the pipelines and detections that SOC analysts use. The fastest-growing track.
Pick one to start. You can move laterally later — the field rewards generalists, but you need depth somewhere first.
Which Certifications Are Actually Worth It?
Certs help with HR filters and visa applications, less so with hiring managers who can read a GitHub. The shortlist that meaningfully helps:
- Security+ (CompTIA) — broad foundation. Decent first cert.
- OSCP (Offensive Security) — hands-on offensive cert that hiring managers respect.
- CISSP (ISC²) — required for many senior roles, especially government/finance. Demands 5 years of experience.
- AWS / Azure / GCP security specialty — cloud-native employers care about these.
- Certified Kubernetes Security Specialist (CKS) — niche but valued.
"Five years in, your certs matter a lot less than your last three projects."
Building Real Experience Before Your First Job
The chicken-and-egg problem ("need experience to get a job, need a job to get experience") is solvable. What actually moves the needle:
- Home lab — spin up a vulnerable VM, attack it, then defend it. Document the work publicly.
- CTF competitions — picoCTF, HackTheBox, TryHackMe. Free, well-structured, hiring managers love them.
- Open-source contributions — submit detection rules to Sigma, security plugins, fix CVEs in libraries.
- Bug bounty programs — even one valid finding on a HackerOne program is a real signal.
- Write things down. A blog with 5 well-written technical posts beats 5 certs on a resume.
What the 2026 Hiring Landscape Actually Looks Like
The job market shifted in 2025 and the new shape held into 2026:
- Junior roles got harder. AI ate the easiest tier-1 SOC work. Entry-level postings dropped ~25%.
- Mid-level demand exploded. Detection engineers, cloud security engineers, AppSec engineers — these are the hottest titles.
- Generalists win in startups, specialists win in enterprises. Pick your environment accordingly.
- Remote is normalized but not universal. Government and finance still pull people back to offices.
Pay Ranges (Be Skeptical of Anyone Who Quotes Exact Numbers)
Compensation varies wildly by geography, employer type, and specialization. Rough ranges in 2026 USD-equivalent for engineering-track roles:
- Junior SOC analyst — $55k–$85k
- Mid-level security engineer — $110k–$170k
- Senior detection / cloud / AppSec engineer — $160k–$240k
- Staff/principal security engineer — $220k–$400k+ (especially at FAANG and well-funded startups)
- CISO — $250k–$700k+ depending on company size and risk profile
GRC tracks are typically 10–20% lower at the same seniority. Offensive security is bimodal — strong consultants do well, in-house red-teamers underearn.