Reality of US Job Market for Indian Students | MS in USA | Cybersecurity in USA
Sintesi
TLDRIn this podcast, Bala Pranit shares his journey as a cybersecurity engineer, discussing his education at UNCC Charlotte and the various career roles in cybersecurity. He emphasizes the importance of strong software engineering skills and networking for job hunting. Bala outlines his job application strategy, which included attending cybersecurity conferences and customizing resumes for specific roles. He addresses concerns about job security in the field due to AI, asserting that demand for cybersecurity professionals will continue to grow. Bala also provides practical advice for aspiring cybersecurity engineers, including essential skills and certifications to pursue.
Punti di forza
- 🎓 Bala graduated from UNCC Charlotte, emphasizing its strong cybersecurity curriculum.
- 💼 Networking is crucial; attending conferences can lead to job opportunities.
- 📄 Customizing resumes for specific roles increases chances of landing interviews.
- 🔍 Understanding both offensive and defensive security is important in cybersecurity.
- 💡 Strong fundamentals in software engineering are essential for cybersecurity roles.
Linea temporale
- 00:00:00 - 00:05:00
The discussion begins with a focus on the importance of cybersecurity education and career opportunities. The speaker emphasizes the need for strong software engineering skills as a foundation for becoming a successful cybersecurity engineer. They also touch on the job market's current state, particularly in 2023, and the challenges faced during job hunting, including the impact of AI on job availability.
- 00:05:00 - 00:10:00
The speaker elaborates on the vastness of cybersecurity, explaining their role as an information security engineer and the various domains within the field, such as red teaming, blue teaming, and software development security. They stress the importance of understanding both hardware and software aspects of cybersecurity for a well-rounded skill set.
- 00:10:00 - 00:15:00
The conversation shifts to the differences between red and blue teams, with red teams focusing on offensive security (hacking) and blue teams on defensive security (protecting systems). The speaker mentions their current role in a purple team, which combines elements of both red and blue teams, and discusses the importance of cloud security and compliance roles in the industry.
- 00:15:00 - 00:20:00
The speaker addresses the booming demand for cybersecurity professionals, reassuring listeners that AI will not eliminate jobs in the field. They emphasize the importance of passion and continuous skill development in ensuring job security and success in cybersecurity careers.
- 00:20:00 - 00:25:00
The speaker shares their personal job hunting journey, detailing their timeline and strategies for applying to internships and full-time positions. They highlight the importance of networking, customizing resumes, and the sheer volume of applications submitted to secure interviews.
- 00:25:00 - 00:30:00
The discussion includes insights into the interview process for cybersecurity roles, including online assessments and technical interviews that test candidates' knowledge of vulnerabilities and problem-solving skills. The speaker shares their experiences with different interview rounds and the types of questions asked.
- 00:30:00 - 00:35:00
The speaker provides a breakdown of typical salary ranges for cybersecurity internships and full-time positions, noting that salaries can vary based on experience, location, and company. They emphasize the potential for high earnings in the field, especially in fintech companies.
- 00:35:00 - 00:40:00
The conversation concludes with advice for aspiring cybersecurity engineers, including the importance of mastering fundamentals, gaining practical experience through platforms like Hack The Box, and pursuing relevant certifications. The speaker encourages continuous learning and building a strong professional network.
- 00:40:00 - 00:46:54
Finally, the speaker reflects on their journey, expressing gratitude for the support received and the importance of enjoying the learning process while navigating the challenges of building a career in cybersecurity.
Mappa mentale
Video Domande e Risposte
What are the different career roles in cybersecurity?
Roles include information security engineer, network engineer, security analyst, risk analyst, and more.
Is cybersecurity a booming field?
Yes, cybersecurity is in high demand and is expected to grow despite advancements in AI.
What is the typical salary range for cybersecurity engineers?
Entry-level salaries typically range from $90,000 to $140,000, depending on experience and location.
What skills should aspiring cybersecurity engineers develop?
They should focus on software fundamentals, learn programming languages like Python, and understand networking concepts.
What is the difference between red team and blue team?
Red team focuses on offensive security (hacking), while blue team focuses on defensive security (protecting systems).
Visualizza altre sintesi video
- 00:00:00first of all why do you say least famous
- 00:00:03university and what are these different
- 00:00:05career roles that people can get into if
- 00:00:08they do SEC cyber security if you want
- 00:00:10to become a good cyber security engineer
- 00:00:12I think you would have to be a very good
- 00:00:15software engineer first is cyber
- 00:00:17security booming does it have job is it
- 00:00:21going to have job with this Ai and all
- 00:00:23of I don't know for some reason I was so
- 00:00:24happy to look at that rejection mail cuz
- 00:00:28I knew I was on the right track if I'm
- 00:00:30at least getting some responses the IBM
- 00:00:32did not convert into fulltime and that's
- 00:00:34because obviously 2023 worse Market they
- 00:00:37were not hiring hiring frees and all of
- 00:00:39that so now comes the full-time hunt
- 00:00:43when did you start what was the strategy
- 00:00:45that you applied so what is the typical
- 00:00:48salary range for cyber security
- 00:00:50Engineers wait I help you save 30k
- 00:00:54how before we dive into all the
- 00:00:56strategies and stories that we're going
- 00:00:57to discuss in this podcast let me ask
- 00:00:59you this do you have a clear job hunting
- 00:01:02strategy to get an internship or
- 00:01:04full-time job most people don't and it's
- 00:01:06costing them opportunities I've helped
- 00:01:08over 1100 students with their strategies
- 00:01:11through my ultimate job hunting course
- 00:01:14and trust me I'm not even kidding I
- 00:01:16could see so many recruiters viewing my
- 00:01:19profile and it's been the best
- 00:01:20investment I've ever made the content is
- 00:01:23incredibly practical filled with tips
- 00:01:25and strategies that make you stand out
- 00:01:27to recruiters uh it was one of the best
- 00:01:29courses that I had have done till this
- 00:01:31this course covers everything that you
- 00:01:33need to stand out you will get ultimate
- 00:01:35resume course you will get ultimate
- 00:01:36LinkedIn course networking strategy
- 00:01:39access to 1100 plus job Seekers for
- 00:01:42support and personal support from me
- 00:01:44through WhatsApp group I will walk you
- 00:01:46through every single step that you need
- 00:01:48with real examples and the tools that
- 00:01:50will give you an edge I don't want you
- 00:01:52to miss any other opportunity to land
- 00:01:54your next job or an internship so check
- 00:01:57the link in the description and now I
- 00:01:59will let you enjoy the podcast thank you
- 00:02:01Bala for doing this I am excited to talk
- 00:02:05about first there's not many security
- 00:02:08engineering content on my channel so
- 00:02:11thank you for saying yes to me and I'm
- 00:02:13excited to share your journey with
- 00:02:15everybody on your unique job hunting
- 00:02:18tips and how you got the job as well but
- 00:02:21before we get to that let's do like a
- 00:02:23quick intro starting off with myself uh
- 00:02:25my name is Bala pranit and I came to the
- 00:02:28US in the year 21 especially during the
- 00:02:32fall semester I've studied uh Masters in
- 00:02:36cyber security from one of the least
- 00:02:39famous I would say universities called
- 00:02:41UNCC Charlotte it's in North Carolina
- 00:02:45okay and uh during my Ms U I've been U
- 00:02:50exposed to a lot of different cyber
- 00:02:51security topics and domains so I think
- 00:02:54that uh helped me further in my career
- 00:02:58to learn a lot of skills also one more
- 00:03:00thing well so two questions first of all
- 00:03:02why do you say least famous
- 00:03:05university and the second one did you
- 00:03:08have any experience in
- 00:03:10India uh yeah sure so alansa with the
- 00:03:13first one uh I mention it as least
- 00:03:16famous because uh I think it's the
- 00:03:20curriculum itself for cyber security
- 00:03:22over there in the UNCC is absolutely
- 00:03:27topnotch if you want to learn really
- 00:03:29good skills get your fundamentals right
- 00:03:32I think that is where the place you
- 00:03:34would have to look into especially in in
- 00:03:36that University and I personally wanted
- 00:03:39to bring this up just to make people
- 00:03:42aware that if you are interested in
- 00:03:44cyber security then you got to check it
- 00:03:47out UNC Charlotte the work experience
- 00:03:50part I would say a little bit on and off
- 00:03:53because I was doing a bit of freelancing
- 00:03:56and also I was working on a real time
- 00:03:59project so I work for like a corporate
- 00:04:03company as called but I do have some
- 00:04:06kind of experience while uh being in
- 00:04:09India espe during the year of like 2020
- 00:04:12so okay got it so some Prof you do have
- 00:04:17like a overall profile and a port
- 00:04:19portfolio about security stuff but you
- 00:04:22don't like have a a internship like a
- 00:04:25legal not legal but like a corporate
- 00:04:28full-time job that uh you had as a
- 00:04:31security engineer so that'll be
- 00:04:33interesting to kind of dissect further
- 00:04:35but before we dive into your job hunting
- 00:04:39I am noob in in security engineering
- 00:04:42like I I know I keep hearing so many
- 00:04:45terms network engineer security analyst
- 00:04:48risk analyst cyber security engineer
- 00:04:51what what is your role and what are
- 00:04:54these different career roles that people
- 00:04:56can get into if they do secure cyber
- 00:04:59security
- 00:05:00so yeah uh one of the important aspects
- 00:05:04in cyber security is it's very vast okay
- 00:05:08and my current role is I work as an
- 00:05:11information security engineer for a
- 00:05:13financial
- 00:05:15institution and then generally speaking
- 00:05:18of cyber security people assume red
- 00:05:20teaming and then blue teaming only two
- 00:05:22sides of it but then I would say there
- 00:05:26is a lot of domains especially looking
- 00:05:29onto be supply chain security or might
- 00:05:32be a software development security right
- 00:05:34Che your code you have to know have the
- 00:05:37knowledge of writing secure code right
- 00:05:40and
- 00:05:41then if any of the vulnerabilities are
- 00:05:44there in your code right you would also
- 00:05:46have to know what kind of
- 00:05:49packages or other different software
- 00:05:52Frameworks have vulnerabilities so I
- 00:05:55would say not diving into depth but if
- 00:05:59you you want to become a good cyber
- 00:06:01security engineer I think you would have
- 00:06:03to be a very good software engineer
- 00:06:06first
- 00:06:07CU understand how systems
- 00:06:12work it's going to be a painful job for
- 00:06:15the security Engineers so but what about
- 00:06:18like I also hear about the network uh
- 00:06:21Engineers network security Engineers do
- 00:06:24they have to really understand how the
- 00:06:27coding works because I don't think they'
- 00:06:28really care right like it's all about
- 00:06:30firewall and again I don't know this I'm
- 00:06:33asking you this question so again yud
- 00:06:36here the concept comes like if you are
- 00:06:39interested in the hardware side of
- 00:06:41things or the software side of things
- 00:06:43right you look at a network engineer you
- 00:06:45can look at it in two perspectives one
- 00:06:48in a very Hardware perspective and
- 00:06:50another in a very above Hardware that's
- 00:06:53software like right so if you trying to
- 00:06:58become a network engineer for an example
- 00:07:00correct you would have to know the
- 00:07:02fundamentals of networking like what are
- 00:07:05ports what protocols are there right
- 00:07:08what is HTTP what is htps these are very
- 00:07:11fundamental things right once people
- 00:07:15have grip on these fundamentals they can
- 00:07:19easily pivot into another domain what
- 00:07:21you're going to watch is an amazing
- 00:07:23story but before you watch that I just
- 00:07:24want to quickly say that all of these
- 00:07:26story I compile the key insights from
- 00:07:29the these stories and all the podcast
- 00:07:30that I do and I put this in my free
- 00:07:33exclusive newsletter Community every
- 00:07:34week more than 16,000 people receive my
- 00:07:37newsletter and they love it and here are
- 00:07:40some of the examples you can see this
- 00:07:41was a podcast on George Mason
- 00:07:43universities and you can see how to
- 00:07:45network and 10% cold emailing powerful
- 00:07:49LinkedIn techniques and so and so forth
- 00:07:51so if you interested in becoming part of
- 00:07:53this exclusive newsletter Community
- 00:07:55absolutely free link is in the
- 00:07:57description or you can go to YouTube
- 00:07:59dj.com
- 00:08:01newsletter uh you also mentioned red
- 00:08:03team blue team what's the
- 00:08:05difference so to Simply tell you red
- 00:08:09consider red team as hackers who
- 00:08:14actively hack into systems right and
- 00:08:19then these are good hackers
- 00:08:22again so yeah I mean they're
- 00:08:24intentionally trying to hack so it can
- 00:08:26show that hey look your system is
- 00:08:29hackable
- 00:08:30correct yeah right and this helps uh the
- 00:08:34red team hackers to solve and find out
- 00:08:37vulnerabilities before the bad guys
- 00:08:39actually hack into the
- 00:08:41network yeah that is simple way of
- 00:08:45explaining red teaming but then if you
- 00:08:47consider blue teaming it's like you're
- 00:08:50Defending Your Castle right you are
- 00:08:53defending your network
- 00:08:55and if the red team is attacking you
- 00:08:58have to know how to defend your network
- 00:09:00so that's like oh so if the virus has
- 00:09:04been come to your system now you have to
- 00:09:06figure out like how to get out of it
- 00:09:08exactly right got it got it so what is
- 00:09:11which team are you in uh I am in again
- 00:09:15currently a team called Purple team so
- 00:09:18what purple team does is basically a bit
- 00:09:22of red teaming and as well as blue
- 00:09:24teaming so you have to have an idea of
- 00:09:28the red team fundament
- 00:09:30the you know tactics and
- 00:09:33methodologies at the same time it's
- 00:09:35important to have that blue team mindset
- 00:09:38wherein you know how to manage your
- 00:09:41assets defend your assets at the same
- 00:09:44time so yeah there's a it's a special U
- 00:09:48domain that's called Dev seop cud for
- 00:09:51this one so okay and and then there is
- 00:09:55cloud security as well uh which I'm
- 00:09:58assuming falls under the network
- 00:10:00software side of things because it's
- 00:10:02it's in the cloud but then there's whole
- 00:10:05another Deo and KPMG these people also
- 00:10:08hire from cyber security to write
- 00:10:10compliance uh policies and sock to
- 00:10:13compliance and sock compliance so what
- 00:10:15are what are these areas sure so mostly
- 00:10:19these are defined these are defined as
- 00:10:22GRC roles right so what these roles do
- 00:10:27in real time is let's say they give you
- 00:10:30best practices guide to follow to
- 00:10:34implement a certain technology stack
- 00:10:37right think of it as it as a safe guard
- 00:10:41rails for your technology technology
- 00:10:44stack before you actually architect the
- 00:10:46entire solution
- 00:10:48like to put it up in a simple way
- 00:10:50consider a house right you always have
- 00:10:53to lock your house lock your doors right
- 00:10:55make sure everything is like clean and
- 00:10:58neat so these are all compliances like
- 00:11:00it's mandatory that you have to do it
- 00:11:03yeah and and the companies like Deo KPMG
- 00:11:07and all these people uh they obviously
- 00:11:10they are getting hired by the clients to
- 00:11:13make sure they are sock compliant love
- 00:11:15it one last question before we dive into
- 00:11:18the job hunting is is cyber security
- 00:11:21booming does it have job is it going to
- 00:11:24have job with this Ai and all of this a
- 00:11:26lot of people are scared that AI is
- 00:11:28going to take away cber security
- 00:11:29Engineers job so is this true or is is
- 00:11:34there a demand of this field yeah uh
- 00:11:38this is actually a very huge question
- 00:11:41for me to answer UD I'm just a small
- 00:11:43small part of this entire puzzle but
- 00:11:47uh I think if you're really passionate
- 00:11:50and interested in cyber security or in
- 00:11:52any kind of domain you will find your
- 00:11:55way
- 00:11:56out all it requires is to have a bit of
- 00:11:59of craziness like yes do you like it or
- 00:12:01not yes if you you'll find your way out
- 00:12:05so yeah I and so I the reason I was
- 00:12:08asking was I did a podcast last week
- 00:12:11with
- 00:12:12someone they work in apple as a security
- 00:12:16network engineer and uh so they
- 00:12:19mentioned that this field is never going
- 00:12:23to die and no matter of AI is not going
- 00:12:26to take away the jobs uh as long as like
- 00:12:28you said you have the skills and he also
- 00:12:32said something interesting he said the
- 00:12:34thing with the security is like you just
- 00:12:36have to know the basic concepts and
- 00:12:38fundamentals if your core is strong you
- 00:12:41will be fine and the bar is like that
- 00:12:44low I'm like wow that is interesting is
- 00:12:47that true would you agree uh I would
- 00:12:50agree and disagree at the same time
- 00:12:52because one thing what you said right is
- 00:12:54U the fundamentals are core pillars
- 00:12:57right you have to make sure that
- 00:12:59fundamentals are right but at the same
- 00:13:01time if you build your skills on the
- 00:13:04fundamentals right I think it will take
- 00:13:06you a long way ahead don't just for like
- 00:13:09one two years of time look at a long
- 00:13:12journey where you want to sustain in
- 00:13:13this
- 00:13:15field so I would say keep building up
- 00:13:18your skills and then you're in a very
- 00:13:20good place to go nice okay great let's
- 00:13:23dive into the job hunting journey of
- 00:13:26yours um you came in fall when did you
- 00:13:29graduate so I graduated in
- 00:13:342023
- 00:13:35May which is the worst job market ever
- 00:13:39uh there were no one no one was hiring
- 00:13:42uh but something interesting you also
- 00:13:44told me that you had IBM Co-op as well
- 00:13:50for which was like a pretty big like
- 00:13:53almost 12 months Co-op right so is that
- 00:13:56so sorry I know we are going to talk
- 00:13:58about job but because I have the
- 00:14:00question so onee Co-op uh does UNCC
- 00:14:03allow you to do one-ear
- 00:14:05co-op so uh there is a very tricky way
- 00:14:09of putting this out Yi uh to simply
- 00:14:12answer yes it does right and then Co-op
- 00:14:16doesn't necessarily have to be 40 hours
- 00:14:19it can also be 20 hours of time okay so
- 00:14:22I have done is uh I did get an
- 00:14:25internship during the summer for my
- 00:14:28first year
- 00:14:29right I've worked really hard on this
- 00:14:32one and then I've learned a lot of new
- 00:14:35skills so the manager had seen something
- 00:14:39in me and he then extended that offer to
- 00:14:43the next December that's the next fall
- 00:14:46semester okay so what happened here is I
- 00:14:49was working only 20 hours with
- 00:14:52IBM consider it as like a part-time job
- 00:14:55while being a student right yeah yeah
- 00:14:57yeah I did the same thing yes
- 00:14:59yeah yeah but then instead of working on
- 00:15:01campus I was working for
- 00:15:04IBM that's how I continued the next 6
- 00:15:08months or whatever the time period is
- 00:15:11and then that got extended into another
- 00:15:1420 hours in the next
- 00:15:17semester this was again done by
- 00:15:20replacing a subject what I done is we
- 00:15:23have to complete 10 subjects in order to
- 00:15:27get a degree right so I did only nine
- 00:15:30subjects and then the last subject had
- 00:15:33switched it with that internship and
- 00:15:35then did a one full year of that
- 00:15:39internship yeah yeah interesting yeah I
- 00:15:42did the same I got my project management
- 00:15:45internship in summer and then uh they
- 00:15:48extended it they wanted me to continue
- 00:15:51um they wanted me to work more but they
- 00:15:55said like 20 hours is fine too so then I
- 00:15:57did not end up doing on campus job I
- 00:16:00started doing this but I had to take one
- 00:16:03CPT credit to do that like it's not like
- 00:16:07I you can do off-campus job you still
- 00:16:09have to enroll into a credit to show
- 00:16:12that that is helping you with your
- 00:16:14education so I'm guessing it's a similar
- 00:16:17concept yeah it's exactly the same yeah
- 00:16:19yeah got it okay cool so how did you get
- 00:16:22it um what was the timeline when did you
- 00:16:25apply when did you start your job
- 00:16:27hunting Journey was the first thing you
- 00:16:29did okay so most of my friends started
- 00:16:33applying in the month of uh right when
- 00:16:35they landed in the US but I was just
- 00:16:38trying to enjoy you know actually taking
- 00:16:41that happens in the US right and then I
- 00:16:43started off my
- 00:16:45applications exactly in the month of
- 00:16:49January so you skipped the first
- 00:16:51semester completely yep and then uh you
- 00:16:54started applying in January but what did
- 00:16:57you work on your resume LinkedIn and all
- 00:17:00of that in the first semester or no so I
- 00:17:04had worked on all of these things while
- 00:17:06I was in India okay gave me advantage of
- 00:17:09that you know first semester try to
- 00:17:12enjoy you know meet new people
- 00:17:14experience yeah okay so started applying
- 00:17:18uh in January and then I was doing just
- 00:17:22two three applications per day and I
- 00:17:25started noticing a pattern wherein
- 00:17:29if let's say I applied today for a
- 00:17:31particular job role I would get a
- 00:17:34response which is obviously rejected in
- 00:17:38minimum time span of like let's say 20
- 00:17:40days so I started reling this pattern
- 00:17:44and then what I've done is actually
- 00:17:48applied properly I would say in the
- 00:17:50month of February okay applying in
- 00:17:53February again I did 30 applications per
- 00:17:56day w from 3 to 30 okay right uh the way
- 00:18:02I've uh again thought about this
- 00:18:05isud I've consider this as my part-time
- 00:18:08job so I used to sit down four hours 3
- 00:18:11hours straight try to apply as many
- 00:18:14applications as possible among that 30
- 00:18:1820 quality applications and 10 random so
- 00:18:23that that's my strategy of applying it
- 00:18:26so I kept on applying it uh I used to
- 00:18:28get a lot of rejection males and I don't
- 00:18:32know for some reason I was so happy to
- 00:18:34look at that rejection maale cuz I knew
- 00:18:37I was on the right track if I'm at least
- 00:18:39getting some responses yeah yeah yeah
- 00:18:42complete ghosting is like a feeling like
- 00:18:44I don't even know if if if like what's
- 00:18:46going on so yeah 100% agree getting a
- 00:18:50reject is is at least a good sign that
- 00:18:52okay you can change the direction but
- 00:18:55not getting anything is
- 00:18:57frustrating exactly L right so and I've
- 00:19:01started applying like this long story
- 00:19:04short I've applied around 800 to 900
- 00:19:08applications wow yeah and then I've got
- 00:19:13calls from at least I think around 20
- 00:19:15companies among all of these and then
- 00:19:18out of these 20 companies I remember
- 00:19:22clearing four interviews which had four
- 00:19:26rounds for
- 00:19:27internships and among that I had landed
- 00:19:30one from
- 00:19:33IBM
- 00:19:35wow all the students who are watching
- 00:19:37this they should do the math in their
- 00:19:39head that rough like I know some there
- 00:19:43are obviously exceptional cases where
- 00:19:45people apply to 10 and they get it and
- 00:19:48some apply to thousands and then they
- 00:19:50ultimately get one offer so just don't
- 00:19:54give up keep added is ultimately what
- 00:19:56I'm trying to get at that uh you never
- 00:19:59know like the thousandth application you
- 00:20:02did and that was going to turn into an
- 00:20:04offer yeah totally agree on yeah uh
- 00:20:09so I want to Deep dive into something
- 00:20:13you said uh quality application what
- 00:20:16I've done is made up around s to eight
- 00:20:19resumes one for redeeming as again since
- 00:20:22I'm in cyber security one for blue
- 00:20:24teaming one for purple teaming one for
- 00:20:26network engineer all of these fields
- 00:20:29right I did make certain resumes keep on
- 00:20:33applying and changing every resume for a
- 00:20:36particular role for exactly these 10
- 00:20:39roles okay right and for the remaining
- 00:20:4220 of them I used the best resume which
- 00:20:46I think fits for that particular role
- 00:20:48kept on applying
- 00:20:50it all it so you customize the quality
- 00:20:55application in your opinion is
- 00:20:56customizing your resume for that role
- 00:20:59that you are applying and even spending
- 00:21:01extra time in answering those
- 00:21:03application questions correct
- 00:21:06100% uh so is that so you mentioned that
- 00:21:09you did 800 to 900 application and you
- 00:21:12got 20 interview calls and you know
- 00:21:15ultimately four final rounds and one
- 00:21:17offer uh was that the only way you ended
- 00:21:21up getting calls did you try networking
- 00:21:24referal route at all or does that did
- 00:21:26not work at all for you yeah I mean I
- 00:21:29was a bit naive on this one uh so for
- 00:21:33internships I didn't want to use that
- 00:21:35referral because I wanted to keep it for
- 00:21:38a full-time job okay interesting okay
- 00:21:41right and my actual strategy of job
- 00:21:44hunting starts when it comes to
- 00:21:47full-time and then that's how I'm going
- 00:21:49to share that in a while though so but
- 00:21:51yeah intership side kept it simple you
- 00:21:54know rather go the traditional way keep
- 00:21:57applying give it track it yeah the
- 00:22:00managers hiring managers and the
- 00:22:01managers would test you on your
- 00:22:04fundamentals and if you deep dive into
- 00:22:07technical skills I think it's important
- 00:22:10to understand the top web
- 00:22:14vulnerabilities for example right and
- 00:22:17then going a bit further understand what
- 00:22:20is active directory and what attacks you
- 00:22:24can do in Windows environment especially
- 00:22:27for teaming side of it but if you're on
- 00:22:30Blue teaming side of it I would say
- 00:22:33understand how you can resolve a
- 00:22:36particular bug ticket right and then
- 00:22:40have different methodologies of solving
- 00:22:44one
- 00:22:45problem and then once you have this kind
- 00:22:47of technical skills and that mindset to
- 00:22:51solve it I think you'll be in a pretty
- 00:22:53good shape to get and learn those skills
- 00:22:57as you progress
- 00:22:59got it and so is there like an online
- 00:23:02assessment so you know how software
- 00:23:04Engineers have an OA or online
- 00:23:07assessments before even they get to the
- 00:23:09interview round is that true for uh
- 00:23:13security internships or no yes that is
- 00:23:16uh correct some companies do use this
- 00:23:19kind of uh approach so the the way it
- 00:23:22works is they give you a web application
- 00:23:25okay and they are going to tell you hey
- 00:23:29look try to find out as many as
- 00:23:31vulnerabilities you can prepare a very
- 00:23:35well documented approach of how You'
- 00:23:37actually found those vulnerabilities and
- 00:23:40submit that document to
- 00:23:42us once the hiring manager or the panel
- 00:23:46looks at the documents reviews it then
- 00:23:50they will decide if the candidate is you
- 00:23:53know well vered for that role or not but
- 00:23:56yes assessments do exist is for the
- 00:23:58security Engineers got it okay sweet so
- 00:24:02you got the IBM stuff what's the typical
- 00:24:05salary range for security
- 00:24:08internships so uh typical salary range
- 00:24:12would be around uh 38 to
- 00:24:16$65 nice yeah talking about this uh got
- 00:24:20it okay but if in general if you had a
- 00:24:23loan which was pretty high percentage
- 00:24:2615% interest rate
- 00:24:28you would have been able to pay off with
- 00:24:30with your Co-op that's correct I would
- 00:24:32have easily paid off with that Co-op for
- 00:24:35got it okay nice um that is crazy right
- 00:24:39that is so crazy but did your IBM
- 00:24:43internship you said you have a full-time
- 00:24:45strategy and that was separate which
- 00:24:47tells me that the IBM did not convert
- 00:24:49into full-time is that correct
- 00:24:52absolutely and that's because obviously
- 00:24:542023 worst Market they were not hiring
- 00:24:57hiring free and all of that so now comes
- 00:25:00the full-time hunt when did you start
- 00:25:03what was the strategy that you applied
- 00:25:06so for the full-time uh job strategy uh
- 00:25:10I started applying in the month of
- 00:25:14December okay so you are graduating in
- 00:25:16May 2023 you started in December 2022 so
- 00:25:20roughly six months uh before you started
- 00:25:23working on it Go and this was while I
- 00:25:27while I had the cop offer in my hand
- 00:25:29because I knew since it's the worst
- 00:25:32Market we cannot take any kind of
- 00:25:35risks yeah yeah going to that one
- 00:25:37company so what I've done and my
- 00:25:40strategy was to attend lot of security
- 00:25:43meetups in the US so security Community
- 00:25:48has a very vast conferences in the USA
- 00:25:52right one of it is called
- 00:25:55bsides which is very active all over
- 00:25:58even in India even in the US every state
- 00:26:02and city has it almost like that b s i d
- 00:26:06s b and sides okay yes I see it uh go so
- 00:26:13there are a lot of places like uh
- 00:26:16besides rale besides Charlotte and then
- 00:26:19besides even San Antonio and places like
- 00:26:24that so what I have done is uh I used to
- 00:26:28find some time during the especially
- 00:26:30most of these conferences are during the
- 00:26:32weekends so what I used to do was attend
- 00:26:35a lot of conferences I think the EXT and
- 00:26:38me had come out attend these conferences
- 00:26:42so upon attending these conferences I
- 00:26:45noticed that it's a two-day conference
- 00:26:47right my simple thing is I love to make
- 00:26:50friends so I love to learn from people
- 00:26:53on the first day I I would interact with
- 00:26:57every person out there whom I think we
- 00:27:00can replicate right it's just it goes
- 00:27:03with the flow like what activities you
- 00:27:04do and then how do you network it out
- 00:27:07all these skills matter
- 00:27:08again so the second day what I did is I
- 00:27:12was just I don't know why I had this
- 00:27:15idea I just printed out my resumes and
- 00:27:18then on the second day it was a bit like
- 00:27:21chilled out it's not that rush so I used
- 00:27:23to go to these uh friends of mine and
- 00:27:27these would be the people of like
- 00:27:29managers directors and like hardcore
- 00:27:32programmers and stuff like that I used
- 00:27:34to go to these people hand out my
- 00:27:36resumes and be like hey buddy uh you
- 00:27:39know can you please review my resume and
- 00:27:41they' be like yeah sure why not you know
- 00:27:44people will agree for some and people
- 00:27:46might not agree so be cool with that no
- 00:27:49no offense on that respect people's time
- 00:27:52and then if people say yes right sit
- 00:27:55down I used to sit with them 10 minutes
- 00:27:58give my resume and explain my story of
- 00:28:02why I love cyber security and they would
- 00:28:05actually review it and then tell me the
- 00:28:07points and then I used to not out the
- 00:28:09points then and
- 00:28:10there that's how we already made a
- 00:28:12connection professionally as well we've
- 00:28:16a connection personally which is very
- 00:28:18amazing we've also got to know each
- 00:28:20other sharing our stories and talking
- 00:28:22about Security in general and then once
- 00:28:25this was
- 00:28:26done I think if it's important to
- 00:28:30validate the person's efforts and
- 00:28:33appreciate them their time what I used
- 00:28:35to do is drop them a LinkedIn message
- 00:28:39right then and there thanking them for
- 00:28:41their time so in this way what happens
- 00:28:45is they actually remember you that oh
- 00:28:48you know what I actually know this
- 00:28:50person like we've interacted with them
- 00:28:53and then I know him in person right so
- 00:28:57that's how I did it and then as I kept
- 00:29:00doing this it was a rough Journey but I
- 00:29:03don't know for some reason I loved it as
- 00:29:05I kept doing this uh one person noticed
- 00:29:09something in me and he's like uh Hey
- 00:29:11Bala I think uh I have a job role coming
- 00:29:14up you want to interview for it I was
- 00:29:17like yeah sure why not so I got the
- 00:29:21interview and then attended that one
- 00:29:26shot cleared it
- 00:29:28landed a
- 00:29:30job but this is the end of the story now
- 00:29:34going
- 00:29:35back while doing this strategy I had got
- 00:29:39a lot of calls from the
- 00:29:42companies because while doing the
- 00:29:45strategy at the end of the day all it
- 00:29:47takes is like one person to watch for
- 00:29:49you yeah
- 00:29:52yeah if one person believes in you you
- 00:29:54are in the company M so I think as I was
- 00:29:58doing the strategy I had received a lot
- 00:30:00of calls but then unfortunately I wasn't
- 00:30:03up to their Mark I had
- 00:30:07uh I would say not that good skills
- 00:30:10which the company
- 00:30:12expected but I did eventually land a job
- 00:30:16in this process of like networking you
- 00:30:19know reviewing my resumes build legit
- 00:30:23good connections don't build connections
- 00:30:26for your job or for personal sake build
- 00:30:29connections so that you can contribute
- 00:30:32and as well as they can help you out so
- 00:30:34it's a two-way
- 00:30:36process look at my professional and
- 00:30:39personal connections so yeah
- 00:30:42yeah now that you know that this works
- 00:30:46uh going back in time would you have now
- 00:30:50started instead of December 2022 would
- 00:30:53you have started when you landed because
- 00:30:56by then you would have so much more
- 00:30:58opportunities than starting 6 months
- 00:31:00before you are graduating would you
- 00:31:02agree or no uh I don't agree on the cud
- 00:31:05uh because I personally wanted to enjoy
- 00:31:08the exposure and the culture change you
- 00:31:10know coming back from India so I
- 00:31:13wouldn't like start right away once I
- 00:31:16landed in the US I you enjoyed the
- 00:31:20conferences and meeting
- 00:31:21people yeah but what I'm trying to say
- 00:31:24is I wouldn't want to do that right when
- 00:31:27I landed into the
- 00:31:28US right I would I would want to get
- 00:31:32some time to settle down and actually
- 00:31:35understand like the culture changes the
- 00:31:37people over here and then you know how
- 00:31:38to talk it's important to communicate
- 00:31:42well right yeah so once I have all of
- 00:31:45these things down then maybe yes yeah
- 00:31:48yeah I mean if I I would 100% double
- 00:31:52down on what you said the strategy which
- 00:31:55you used um I didn't know there were so
- 00:31:57many sec maity conferences but that's
- 00:31:59good I'm assuming it's the same for
- 00:32:01product as well and software engineer I
- 00:32:04know there are many conferences out
- 00:32:06there for software people there GHC as
- 00:32:09well which is Grace Hooper
- 00:32:11conference I yeah I would I agree like
- 00:32:15land but not like the next day you go to
- 00:32:18a conference but I wouldn't wait until
- 00:32:20like two semesters gone uh I mean sure
- 00:32:23and you can still enjoy because it
- 00:32:25sounds like it just happened on weekend
- 00:32:27so you can still go and it sounds like
- 00:32:29it was more fun I would still go and
- 00:32:32have fun while you are networking
- 00:32:35because again the ultimate goal is not
- 00:32:37to get a job is to build relationship so
- 00:32:39it shouldn't feel like you're doing a
- 00:32:41job and it shouldn't feel like stressful
- 00:32:43it should just feel oh this is I'm going
- 00:32:46to a fun conference I'm going to get to
- 00:32:48learn I'm going to get to meet people
- 00:32:50instead of eating attending a college
- 00:32:52event I'm going to do this hopefully
- 00:32:54it's free I mean lot of conferences are
- 00:32:56not free so so that's different story
- 00:33:00yeah and the only uh I'd agree on this
- 00:33:03one because I personally hadn't had like
- 00:33:08a very good U what do you say I wanted
- 00:33:11to enjoy that first 6 months or whatever
- 00:33:14time enjoy like what do you what do you
- 00:33:16do when you say Enjoy I I tell you what
- 00:33:19what happens you uh in UNCC
- 00:33:23right uh especially our room is like a
- 00:33:26party house
- 00:33:28okay right so we' actually uh invite
- 00:33:33people over and then in that way we also
- 00:33:37make good friends so we so that we don't
- 00:33:39feel left out in the us when we first
- 00:33:42land yeah we don't have anyone here in
- 00:33:45the US right it's one for one so I was
- 00:33:49just it took me personally took me a lot
- 00:33:52of time to just accept that I'm in the
- 00:33:56US cuz I'm the first person in my family
- 00:33:58to land in the US and me took some time
- 00:34:01to digest and accept like okay I'm here
- 00:34:05let's see look around what is there
- 00:34:07enjoy and then I
- 00:34:11lle coming out of Co I think this was a
- 00:34:13much needed break for me especially for
- 00:34:16me yeah you wanted to celebrate and be
- 00:34:19in the moment that you've made it I want
- 00:34:22to live this moment and not be in the
- 00:34:25rush of like I need to find a job kind
- 00:34:27of thing correct because see it's simple
- 00:34:30just take a moment cherish the little
- 00:34:33wins that you are in the US enjoy the
- 00:34:36little moments and then go
- 00:34:39around job hunt coming back to the
- 00:34:41fulltime is that the only strategy you
- 00:34:44applied or did you also do the cold
- 00:34:46application as well no that's the only
- 00:34:49strategy have applied I have not return
- 00:34:52any cold emails to any and is that the
- 00:34:55only conferences strategy or like you
- 00:34:57were also doing online events or online
- 00:35:01uh networking through Linkedin Etc so I
- 00:35:04was the networking on LinkedIn was going
- 00:35:07parall UD it's not like that is the only
- 00:35:10strategy I would say try to combine the
- 00:35:13network in aspect through Linkedin and
- 00:35:17as well as try to attend conferences
- 00:35:19learn a lot of stuff I learn visually so
- 00:35:22when I attend conferences you can learn
- 00:35:24stuff you know meet people there and
- 00:35:27learn from them so I would say combine
- 00:35:29LinkedIn online applications as well at
- 00:35:32the same time attend conferences get
- 00:35:35that new exposure of like what happens
- 00:35:37in a conference and learn a lot
- 00:35:41so in security
- 00:35:43conferences they teach you particularly
- 00:35:46like there'll be Villages for example
- 00:35:50these are called as Villages where you
- 00:35:51can go to a particular Village and they
- 00:35:53will teach you in person like how a
- 00:35:55process is being done like in
- 00:35:58was there any difference in the
- 00:36:00interview process for full-time or was
- 00:36:02it pretty much the same I think
- 00:36:05full-time was uh a bit grilling to be
- 00:36:10honest yeah uh generally people would
- 00:36:14want to know that how you actually solve
- 00:36:18a problem and then do you really have
- 00:36:21the knowledge or are you just blabbering
- 00:36:24around to be honest with you like
- 00:36:26firstly as I mentioned the web
- 00:36:28application stuff like companies hand
- 00:36:30over an application to you you attack it
- 00:36:34document it give that report to the
- 00:36:36managers right the second round once
- 00:36:39you've cleared that and uh the second
- 00:36:42round would be
- 00:36:44actually diving deep into every
- 00:36:47vulnerability that you've attacked let's
- 00:36:49say for example uh there is a
- 00:36:52vulnerability called csrf right so it
- 00:36:55stands for cross-side request forgery
- 00:36:57the managers would want to know how how
- 00:37:00much depth of knowledge you have in this
- 00:37:03particular vulnerability so they would
- 00:37:06dive dive deep into
- 00:37:09it and once you keep
- 00:37:12answering again and again and again it
- 00:37:16goes a way a long way and they would
- 00:37:19want to test how far you can break H
- 00:37:23like that that's how you actually know
- 00:37:25that you're knowledgeable right uh
- 00:37:28look at how much depth you can go and
- 00:37:30once they hit that melting point they're
- 00:37:32like okay it's cool if you've cleared at
- 00:37:35least like three to four levels of their
- 00:37:38depthness and the questions I think you
- 00:37:40are pretty good to go so that would be
- 00:37:42the second round and the third would be
- 00:37:45scenario based right let's say they
- 00:37:48would they can ask you questions like u
- 00:37:51in security ctfs are very common UD
- 00:37:54these are capture the flag events oh
- 00:37:57yeah yeah yeah yeah and I took uh sorry
- 00:38:00the reason I remember I took a security
- 00:38:03course in my masters because I did my
- 00:38:05masters in computer science and we had
- 00:38:07to participate in the competition which
- 00:38:10was completely based on Capture the Flag
- 00:38:13kind of thing and they would have
- 00:38:16problems and I would have to solve like
- 00:38:18once you solve it then you cap like you
- 00:38:20basically capture the flag and they were
- 00:38:23we were divided into multiple teams and
- 00:38:26uh it was fun it was a fun course I I
- 00:38:28would like recommend people to get that
- 00:38:30course if they going to GCO state but
- 00:38:31regardless sorry yes uh it just reminded
- 00:38:34me about that that so CTF in the
- 00:38:37interview process is it the same or is
- 00:38:39it different so during this is a bit
- 00:38:42different generally what security
- 00:38:44Engineers do is play a CDF
- 00:38:48but the interviews what I've given these
- 00:38:52questions are like architecture design
- 00:38:53and system designs they ask me in a
- 00:38:56reverse way of how how do you actually
- 00:38:58create a CTF for security
- 00:39:01engineers and then this involves again
- 00:39:05software development you would have to
- 00:39:06know a bit of cloud where do you host
- 00:39:08your services and how you actually
- 00:39:11create that architecture itself so a
- 00:39:15system design knowledge is also
- 00:39:16important I would say that architectural
- 00:39:19patterns and knowing studying these
- 00:39:22would definitely help so these would
- 00:39:25generally be the three rounds
- 00:39:28of when you are interviewing for a
- 00:39:30security engineer Ro nice and then you
- 00:39:33get the offer which is million dollar
- 00:39:35offer no sorry just
- 00:39:37kidding
- 00:39:39I uh but I've heard security people in
- 00:39:42the fintech company which you are gets a
- 00:39:45lot more money than the typical product
- 00:39:48manager so what is the typical salary
- 00:39:50range for cyber security
- 00:39:52Engineers so yeah again this will vary
- 00:39:56upon experience
- 00:39:57uh so I would say let's say consider
- 00:40:01start a person with like two and plus
- 00:40:03years of experience or one plus year of
- 00:40:05experience right the entry level
- 00:40:07person for them I would say typically it
- 00:40:11ranges between 90 to
- 00:40:16140k and you're talking about base pay
- 00:40:19yeah just the base yeah you're like just
- 00:40:22just the base okay uh keep going yeah
- 00:40:26and then upon this you would have a
- 00:40:29different kind of you know perks that
- 00:40:32would from the company like relocation
- 00:40:35bonus annual bonus and things like that
- 00:40:38okay great and then uh most of it would
- 00:40:41again also be on the location as well
- 00:40:44with state in the US are you from and
- 00:40:48where you work from do you work remote
- 00:40:49do you travel so even all of these come
- 00:40:52into picture but I would say if you're
- 00:40:55skilled enough right you would
- 00:40:57definitely make good Chun of money but
- 00:40:59if you the same let's say if you take
- 00:41:02the same security engineer in Netflix
- 00:41:04that
- 00:41:06goes that's that's the same thing uh
- 00:41:09sorry the last guy I interviewed for
- 00:41:11from Apple he's told me the same thing
- 00:41:13that Netflix pay crazy to their Network
- 00:41:17Engineers uh and I didn't know until
- 00:41:20then he explained me why and all of that
- 00:41:22was very interesting yeah uh if you were
- 00:41:26to give like a quick crash course on
- 00:41:30aspiring cyber security engineer uh who
- 00:41:32wants to do what you are doing they
- 00:41:34don't have any work experience um just
- 00:41:37like you and they don't know how to
- 00:41:40build a profile what are the things they
- 00:41:43should be doing during Masters during
- 00:41:45The Bachelors whenever they watching
- 00:41:46this what are some of the skills they
- 00:41:49should be doing to build so that their
- 00:41:51profile is can stand
- 00:41:55out okay I would say say talking about
- 00:41:59the skills keep your F fundamentals
- 00:42:00right the basic software fundamentals
- 00:42:03right Learn Python I recomend I'm a very
- 00:42:08huge fan of python so I'm just watching
- 00:42:10for it but learn at least one
- 00:42:12programming language right once you're
- 00:42:15good with
- 00:42:16these understand how the windows
- 00:42:19environment work understand what is
- 00:42:21active directory what are domains right
- 00:42:25all those concepts of it and how you can
- 00:42:27attack active territories once you're
- 00:42:30good with that start off uh with web
- 00:42:33hacking like there are a lot of
- 00:42:35different platforms called as Buck
- 00:42:37hacker one and just make a profile in
- 00:42:41these they are called as there there's
- 00:42:43some programs called as vdps where you
- 00:42:45can just go and Hunt vulnerabilities for
- 00:42:48free this you get a very practical
- 00:42:51approach and experience you get hands on
- 00:42:54actual real-time hacking so try these
- 00:42:57try these Buck R
- 00:42:59programs and I would say I would also
- 00:43:02recommend to
- 00:43:03upskill you as you're progressing this
- 00:43:06journey the various platforms like try
- 00:43:08hack me hack the Box let's defend. right
- 00:43:12all of these cover red taming and blue
- 00:43:14taming
- 00:43:15aspects they have a special roles for
- 00:43:19security engineer or a red team attacker
- 00:43:22and blue teaming side of it going to
- 00:43:25these
- 00:43:26websites take one of their courses read
- 00:43:30and then learn upon it right so track me
- 00:43:35hack the Box let's defend. once you're
- 00:43:38good with these if you want to level up
- 00:43:41start pursuing offensive security
- 00:43:44certifications and TCM security
- 00:43:47certifications these are very good to
- 00:43:51get you into the industry I would highly
- 00:43:53recommend TCM security over offensive
- 00:43:56security
- 00:43:57because
- 00:43:59uh I think the value what it brings
- 00:44:02especially in terms of
- 00:44:04learning it's really good offensive
- 00:44:07security tests you a lot of resilience I
- 00:44:11think even that's good but I am more
- 00:44:13aligned towards TCM Security in general
- 00:44:17so yeah what about um the Cisco's the
- 00:44:22certifications
- 00:44:24NWS right so one thing we have to
- 00:44:27understand UD is that there are certain
- 00:44:30vendor neutral certifications and there
- 00:44:33are certain generalized certifications
- 00:44:35yeah so as we talk about the Cisco and
- 00:44:38AWS
- 00:44:39certifications these CTS will tell you
- 00:44:42that you have certain
- 00:44:43knowledge that products right yeah if
- 00:44:48you take Cisco CCNA that's a base it
- 00:44:51only covers the base of the Cisco
- 00:44:53products in the majority M but but if
- 00:44:57you want to look at General Security I
- 00:45:00think certifications like TCM security
- 00:45:03offensive security these do add up a lot
- 00:45:06of value in your
- 00:45:09profile nice great I love it um is there
- 00:45:15anything else would you like to say to
- 00:45:18aspiring cyber security Engineers one
- 00:45:20last words of wisdom before we wrap I
- 00:45:23think the important part is embrace your
- 00:45:28hurdles and enjoy your journey while
- 00:45:31you're learning lot of
- 00:45:33skills it simple don't over complicated
- 00:45:37keep it simple and it goes up so yeah
- 00:45:41and keep watching my videos too you
- 00:45:42should say that
- 00:45:45too without saying you youve helped me
- 00:45:48save 30k and that I helped you save 30k
- 00:45:52how right so this this is a very funny
- 00:45:55story again I don't know if you're
- 00:45:57remember it or not so what happened was
- 00:45:59while I was back in India I was filling
- 00:46:01up my ds160 form which is required to
- 00:46:04come to views right I saw a video
- 00:46:07wherein you posted the entire DS1 160
- 00:46:11filling it up right and Lally used to
- 00:46:14pause that video and look oh did he get
- 00:46:18this did I get this right and then I
- 00:46:19filled out the
- 00:46:21ds160 and then I did not opt for a
- 00:46:24consultant if I had I had opted for
- 00:46:26consultant that
- 00:46:29would thanks to you for making this
- 00:46:31videos and nice so when when I come to
- 00:46:34your place you can treat me for a dinner
- 00:46:36now oh yeah it's it's on me nice cool uh
- 00:46:41sweet I love it thank you so much for
- 00:46:44doing this I can't wait to now Deep dive
- 00:46:46into your UNCC Journey because I know
- 00:46:49that's what we're going to be filming
- 00:46:50next but until our next one keep smiling
- 00:46:52and keep hustling
- cybersecurity
- job hunting
- networking
- software engineering
- career roles
- red team
- blue team
- salary
- skills
- certifications