Feature
#ELLIE • 10 min read

7 Entry-Level Careers in Cyber Security and How to Land Them!

With an estimated global shortage of 3.5 million cyber security professionals, there are many opportunities for entry-level candidates to join the field. In this guide, we’ll deep dive into seven entry-level cyber security careers, and how you can land them!

Before we jump in, we recommend reading our guide to securing entry-level roles in cyber security, which lists our expert top tips for achieving an entry-level cyber security career.

We’d also like to emphasise the importance of gaining experience to build your skills and knowledge as an entry-level candidate. Check out our guide ‘9 Ways to Gain Experience in Cyber Security’ to learn more!

1. SOC Analyst

A career as a SOC Analyst can offer great rewards and benefits, including flexibility, career security, unlimited progression, opportunities to advance, and unique challenges, where no two days are the same!

Entry-level SOC Analysts, also known as Level 1 SOC Analysts, are triage specialists with the primary role of monitoring and identifying potential threats. They regularly investigate security incidents, and if necessary, escalate incidents to Level 2 SOC Analysts.

Responsibilities may include:

  • Continuously monitoring and investigating the security alerts queue
  • Monitoring the health of security sensors and SIEM (Security Information and Event Management) infrastructure
  • Collecting data and context necessary to initiate Level 2 escalation
  • Delivering scheduled and ad-hoc vulnerability assessment reports
  • Configuring and managing the security monitoring tools

How to become a SOC Analyst

You won't need a degree or certifications to become a SOC Analyst, although they can help. If you are looking to obtain a SOC Analyst certification, the CySA+ from CompTIA can be a great place to start. TryHackMe also recently launched our very first SOC Analyst certification, SAL1 (Security Analyst Level 1), designed to equip aspiring security analyst professionals with real-world, hands-on skills to stand out in a crowded job market and significantly increase their chances of getting hired!

With this being said, it’s great to demonstrate creative thinking, dedication to making an impact, essential soft skills, and an understanding of the fundamental technologies, such as:

  • Network Fundamentals - the core concepts of how computers communicate with each other are important to understand before learning how to attack and defend networks
  • Web Application Technologies - learn the building blocks of the World Wide Web to understand how to attack web applications
  • Linux Fundamentals - Many servers and security tools use Linux. Learn how to use the Linux operating system, a critical skill in cyber security
  • Windows Fundamentals - Get hands-on access to Windows and its security controls. These basics will help you identify, exploit and defend Windows

To cover all bases, we also suggest completing our Pre-Security Training learning path and SOC Level 1 learning path, which can help you on your route to becoming an entry-level SOC Analyst! For inspiration, we also suggest checking out our SOC Analyst success stories from Konstantinos and Hayden, and our SOC Analyst interview guide for our expert tips.

2. Security Administrator

Security Administrators are responsible for managing and overseeing an organisation's security infrastructure, policies, and procedures to protect against cyber threats and ensure compliance with security standards and regulations. Their primary role is to safeguard the organisation's sensitive information, systems, and networks from unauthorised access, data breaches, and cyber attacks.

Some key responsibilities of a Security Administrator include:

  • Configuring, deploying, and maintaining security technologies such as firewalls, intrusion detection/prevention systems (IDS/IPS), antivirus software, data encryption solutions, and security information and event management (SIEM) systems
  • Developing and implementing security policies, procedures, and guidelines to ensure the confidentiality, integrity, and availability of the organisation's data and systems
  • Conducting regular vulnerability assessments and penetration testing to identify security weaknesses and risks in the organisation's infrastructure and applications
  • Developing and maintaining incident response plans and procedures to effectively respond to security incidents, breaches, and cyber attacks
  • Providing security awareness training and education to employees and stakeholders to raise awareness of threats, best practices, and policies
  • Ensuring compliance with relevant security standards, regulations, and industry best practices
  • Monitoring security logs, alerts, and incidents to detect and respond to security threats in real-time
  • Performing risk assessments to identify and prioritise security risks and threats to the organisation's assets, systems, and data

How to become a Security Administrator

Becoming an entry-level security administrator typically involves a combination of education, gaining practical experience, and developing key skills.

While some entry-level Security Administrator positions require at least a bachelor's degree in computer science, information technology, cyber security, or a related field, this isn’t always essential! To gain the education and hands-on skills for the role, we suggest completing our Security Engineer learning path.

After this, we recommend the following modules:

  • Security Operations and Monitoring - Learn how to configure and utilise tooling to ensure that suspicious activity is quickly identified and dealt with in your environment
  • Threat and Vulnerability Management - Identify how attackers are developing their techniques to use in your defensive strategy
  • Incident Response and Forensics - Incidents are inevitable. Learn how to identify and respond to them
  • Advanced Splunk - Understand advanced Splunk capabilities to search data for anomalies by creating complex search queries, applying regex, and creating presentable reports and dashboards
  • Advanced ELK - Learn about the main components of the ELK stack by going through the installation and configuring process and linking them together to form an effective log analysis utility

3. Junior Penetration Tester

A junior penetration tester is an entry-level professional in the field of cyber security who is responsible for assessing the security of computer systems, networks, and applications. Penetration testing, also known as ethical hacking, involves simulating cyber attacks to identify vulnerabilities that malicious hackers could exploit.

As a junior penetration tester, you would typically work under the supervision of more experienced penetration testers or security professionals. Their responsibilities may include:

  • Perform penetration tests on networks, applications and computer systems
  • Perform physical security assessments to identify vulnerabilities
  • Identify attacker entry points used to exploit vulnerabilities and weaknesses
  • Identify areas needed for improved awareness and education
  • Identify improvements for existing security solutions (policies, hardware, software, etc.)
  • Research, document and discuss findings
  • Review and provide feedback for security fixes
  • Create new testing methods to identify vulnerabilities
  • Keep updated on the latest malware and security threats

How to become a Junior Penetration Tester

Training serves as a foundation for any pentesting career, while employers also search for exceptional problem-solving skills, dedication to detail, and a desire to remain continually educated on the latest trends in the field. For this reason, we advise keeping up with the latest exploits, alongside recent threats and techniques!

TryHackMe also has you covered with four learning paths dedicated to ethical hacking and penetration testing. These paths include our CompTIA Pentest+ learning path, Jr Penetration Tester learning path, Offensive Pentesting learning path, and our Red Teaming learning path.

We also recommend checking out our guide ‘Preparing for a Junior Penetration Tester Interview’ to discover interview tips and advice from our experts!

4. Incident Responder

An incident responder is responsible for managing and mitigating security incidents within an organisation. Their primary role is to detect, investigate, and respond to security breaches, cyber attacks, or other incidents that threaten the confidentiality, integrity, or availability of data and systems.

Incident Responder responsibilities include:

  • Developing and maintaining incident response plans
  • Utilising advanced tools for early detection of security incidents
  • Continuously monitor and analyse the organisation's networks and systems for security breaches or intrusions
  • Document incidents thoroughly from discovery to resolution, including the creation of detailed incident reports which may be shared internally or with external stakeholders
  • Conduct forensic analysis to gather evidence, which might be used in legal proceedings, and to understand the incident's cause and ramifications
  • Develop and implement strategies to contain the incident and prevent further damage, while preserving evidence for future analysis and potential legal action

How to become an Incident Responder

Incident Responders require a strong understanding of cyber security incidents and the ability to analyse and contain them. As the field of cyber security is constantly evolving, it's essential to stay updated on emerging threats, new technologies, and evolving best practices. To get started, we recommend taking our Pre-Security learning path, SOC Level 1 learning path, our Incident Response module, and our Digital Forensics and Incident Response module.

While cyber security certifications aren’t always needed in entry-level positions, if you do choose to undergo certifications, we would recommend CompTIA Security+ or CompTIA Cybersecurity Analyst (CySA+).

5. Network Administrator

A network administrator is responsible for managing and maintaining an organisation's computer networks. Their primary duties typically include installing, configuring, and supporting network infrastructure, such as routers, switches, firewalls, and wireless access points. Network Administrators also monitor network performance, troubleshoot network issues, and ensure network security measures are implemented and maintained.

While network administration may not be a cyber security role in itself, many Network Administrators use their experience as a route into cyber security roles. Network administration provides valuable skills, knowledge, and experience that can serve as a strong foundation for entry-level cyber security positions. Individuals with a background in network administration are well-positioned to pursue rewarding careers in cyber security!

Some typical responsibilities of a Network Administrator include:

  • Installing, configuring, and maintaining network hardware (routers, switches, firewalls, etc.)
  • Managing network security measures, including firewalls, intrusion detection systems (IDS), and virtual private networks (VPNs)
  • Monitoring network performance and troubleshooting network issues
  • Configuring and maintaining network services such as DNS, DHCP, and IP addressing
  • Implementing and managing network policies and access controls
  • Performing regular backups and disaster recovery planning for network infrastructure
  • Conducting security audits and vulnerability assessments to ensure network security
  • Collaborating with other IT staff and departments to resolve network-related issues
  • Providing technical support and assistance to end-users for network-related problems
  • Documenting network configurations, procedures, and troubleshooting steps
  • Keeping up-to-date with advances in network technology and security best practices

How to become a Network Administrator

While a bachelor's degree in computer science, information technology, or a related field is beneficial, a formal degree is not always required.

TryHackMe offers several training paths and rooms that can help you on your way to becoming a Network Administrator, including our Network Fundamentals and Network Security modules. To widen your knowledge of the analysis and tool side of network administration, we also suggest completing our Network Security and Traffic Analysis and Wireshark modules.

6. IT Support Engineer

An IT Support Engineer is a professional responsible for providing technical assistance, support, and troubleshooting for computer systems, software, hardware, and networking issues within an organisation. Their primary role is to ensure that end-users have access to the necessary resources and assistance to resolve IT-related problems promptly and effectively.

While this role may not seem entirely relevant to cyber security, it’s a role often used as a stepping stone to more specialised roles within cyber!

IT Support Engineer responsibilities include:

  • Providing front-line technical support and assistance to end-users regarding IT-related inquiries, requests, and incidents promptly and professionally
  • Diagnosing and troubleshooting hardware, software, and networking issues reported by end-users
  • Installing, configuring, and deploying computer hardware, peripherals, operating systems, applications, and software updates as needed
  • Creating, modifying, and managing user accounts, access permissions, and security settings in various IT systems, applications, and directories
  • Performing routine maintenance tasks such as system updates, patches, and backups to ensure the reliability, performance, and security of IT systems and infrastructure
  • Maintaining accurate documentation of IT systems, procedures, configurations, troubleshooting steps, and resolutions
  • Providing remote technical support and assistance to end-users working in remote locations or off-site offices
  • Escalating complex or unresolved technical issues to higher-level support teams, vendors, or IT specialists as necessary

How to become an IT Support Engineer

Becoming an entry-level IT Support Engineer typically involves a combination of technical skills, certifications, practical experience, and education.

If you are looking to obtain certification, the CompTIA A+ or CompTIA Network+ can be a great place to start!

As for gaining experience, you’ll need a great understanding of troubleshooting and system administration. Additionally, we suggest completing our Pre-Security, Complete Beginner, and Introduction to Cyber Security learning paths.

7. Compliance Analyst

Compliance Analysts ensure that an organisation's cyber security practices align with relevant laws, regulations, industry standards, and internal policies. Their primary focus is on assessing, monitoring, and managing adherence to cyber security compliance requirements to mitigate risks and protect sensitive information and systems from cyber threats.

Compliance Analyst responsibilities include:

  • Staying updated with relevant cyber security laws, regulations, and standards applicable to the organisation
  • Assisting in developing, reviewing, and updating cyber security policies, procedures, and guidelines to align with regulatory requirements and industry best practices
  • Conducting cyber security risk assessments to identify and prioritise risks, vulnerabilities, and threats to the organisation's information assets and systems
  • Planning, executing, and overseeing cyber security audits and assessments to evaluate compliance with policies, standards, and regulations
  • Maintaining comprehensive documentation of cyber security compliance activities, findings, and remediation efforts
  • Participating in cyber security incident response activities, including investigating security incidents and breaches, analysing root causes, and implementing corrective actions to prevent recurrence
  • Advocating for cyber security policy improvements and educating stakeholders on the importance of compliance
  • Identifying opportunities for improving compliance processes, controls, and practices
  • Developing and delivering cyber security training and awareness programs for employees to promote understanding of cyber security policies, procedures, and best practices

How to become a Compliance Analyst

Becoming an entry-level Compliance Analyst typically involves a combination of education, relevant skills, and experience.

While many entry-level Compliance Analyst positions require at least a bachelor's degree in finance, business, accounting, economics, or a related field, possessing certifications or demonstrating skills and knowledge can also work.

Through TryHackMe, you can gain hands-on experience and knowledge of compliance standards, learn fundamental security principles, develop strong problem-solving skills, and engage with a community of like-minded enthusiasts, learners, and even professionals in the field of compliance.

Some training we recommend include our Planning and Scoping, Managing Incidents, Incident Response, and Threats and Risks modules, and our Governance & Regulation and Auditing & Monitoring rooms.


And there we have it! With hands-on, interactive cyber security learning, TryHackMe makes it easier to launch into entry-level cyber security roles and continually upskill based on new threats and trends. Our real-world training prepares you for work responsibilities and achieving sought-after skills for all cyber security roles!

TryHackMe courses are suited to all users - from the complete beginner to the seasoned hacker - making learning engaging, entertaining, accessible, and affordable. TryHackMe experience is also a brilliant addition to CVs and experience to help you stand out from the crowd, which is why many employers actively search for candidates with TryHackMe experience.

We also recommend checking out our guide to securing entry-level roles in cyber security, which includes our top tips for achieving an entry-level role!

authorBen Spring
Mar 25, 2024

Join over 640 organisations upskilling their
workforce with TryHackMe

We use cookies to ensure you get the best user experience. For more information contact us.

Read more