Sign up for our newsletter! →

How I Used LinkedIn to Break into Cybersecurity

Written By
April blog on LinkedIn and cybersecurity with HanaByte

Real Talk

Networking is somehow simultaneously overpromoted and severely underutilized.

In some ways, you might feel like it’s too late to start growing a network on LinkedIn, and perhaps you have reconciled with the fact that expanding your connections beyond the same 50 people, half of whom are your childhood friends, maybe a distant cousin or two, and what’s-his-face from your first job at that one Italian restaurant – would probably prove to be pretty helpful. Maybe you’ve hit a wall – or thought it was useless or a waste of time up until this point because “it’s just social media,” “it’s just a popularity contest,” and in all honesty, I don’t disagree with you. Some of you may find it daunting, and it might remain a love-hate relationship with this platform.

But the truth is, “Oh wow, you know so-and-so! Now I feel a little bit more comfortable connecting with you –” is essentially the name of the game. That and learning to nurture a genuine curiosity for people to approach you first or feel inclined to respond to you. There’s a reason why LinkedIn URLs are so highly requested on job applications. A recruitment survey led by The Manifest in 2020 corroborates this as covered by PR Newswire:

67% of companies look at job candidates’ LinkedIn profiles ❞

Given my personal experience of monitoring who has viewed my profile, I’d have to agree, particularly for positions in specialized fields – like cybersecurity, of course. Whether we like it or not, point #1 is to widen your network: this helps to establish a degree of confidence in reaching out. Point #2 – deepen your network: build degrees of interconnection and become the next familiar name and face to a future connection or in a job hunt.

Welcome to “LinkedIn networking” at its bare-bones.

Having signed up for a LinkedIn account way back in June of 2013, teetering a sliver over 10 years of on and off trial and error with both basic and premium membership tiers throughout the years, I hope that this will provide you with a bit of useful insight.

If someone needs this reminder right now, here it is:

Be mindful and be considerate through it all. Don’t be a(n) _________.

The Why

My very first “what is cybersecurity and how do I get into it” moment happened a few years ago.

If I were to compare this experience to zooming into a photo between my thumb and index finger on a phone, you too may have noticed that this landscape is quite literally never-ending as you zoom in to the fine details. The late nights were filled with alt-tabbing between a minimum of five browser windows, far too many tabs open, and I’d somehow still end up with more questions than answers. 

It was information overload – I didn’t know how to sift through it all. Does this sound familiar? I struggled to understand “introductory” videos, webinars, blogs, and just about anything relevant. The jargon to explain the jargon was… still jargon. 

It wasn’t far into the first year of what felt like a hurricane of curiosity and chaos that I chose to utilize both my greatest strength and the most logical next step: 

Zoom out.

Start with people.

It always starts with people.

The more I connected with others, the more I felt heard, and learned about the different paths, diverse backgrounds and perspectives, quality recommended resources – and more focused topics to research! As I slowly immersed myself deeper into the web of cybersecurity professionals, it gave me a chance to become that person accepting connection requests and doing my best to help or chat with those who were starting out in my position. 

It’s also been incredible to make some friends along the way. The overwhelm may not subside, but a support system always helps.

#1 It Turns Out That People Actually Pay Attention

There is a lot of buzz about profile pictures and optimizing headlines, but you may be surprised at the amount of focus on LinkedIn’s “About” section that you’d think no one would take the time to read –

More leaders, founders, CTOs, VPs, etc. have initiated conversations because they found a unique commonality, related to an interest, or simply found it “refreshing” or hilarious… often ridiculous, but it made their day.

If you haven’t already done so, invest a little time in this segment. It’s proven to be a key differentiator. I’ve gone through innumerable versions, and you will surely never run out of online resources telling you what to write or what not to write here. After years of experimentation, trying to fit molds and sounding dreadfully “corporate,” or integrating suffocating buzzwords, I am delighted to report back a cliché and resounding “you should just be yourself.”

Get creative, use emojis as bullet points to make it eye-catching, tell your life story, talk about a big event or a silly memory, have it reflect your character, and optionally (in my humble opinion) feel free to tie it into how it’s landed you in your lasting intrigue for this particular field.

  • Think: can they hear what I would sound like while reading this?
  • Will they hypothetically be able to answer: “what do you remember about this candidate that we’re interested in hiring?” or “would you walk up to say ‘hello’ if you saw them at a conference?”

It’s a dedicated space to freely make yourself memorable.

In my experience, what was deemed memorable from my About section to others circled back in the forms of:

Hey, you’re the one that wrote ___

So-and-so told me about [insert a thing from the blurb]!

or even random shout-outs during live streams.

I’ll admit, the comical blurbs that I experimented with about Parks and Rec (a breakdown of similar traits to each character) really, really hit home for a lot of higher-ups. Fun facts of ”the only Asian girl in her Hebrew class” and being a World Rugby fan have long been close runners-up.

Do not underestimate the influence of this section. Soft skills, authenticity, and personality are heavily sought after, and will never go out of style.

Oh and of course, don’t forget to fill out the rest of your profile.

#2 Sometimes It’s What You Say, Mostly It’s How You Say It

Not enough people take advantage of the art of conveying tone; it makes a world of a difference ranging from LinkedIn networking to basics of communication. People appreciate tones as it gives them a better understanding of your intentions.

Can you “feel” the difference?:
  1. Hey Michelle – it was so nice to chat and get to know you at X Conference! Would greatly appreciate keeping in touch, and I’m excited to follow more of your content on LinkedIn. Thanks so much!
  2. Good seeing you at X Conference. Looking forward to keeping in touch. Thanks.

Personally, #2 does not sound like someone I would respond to or have conversations with. You may be inclined to disagree, and that’s okay. You will have to go through your own trial and error of what prompts responsiveness – this is merely what has worked for me.

I further practiced my own “online tone and delivery” by actively engaging with posts. Many hours were clocked in on LinkedIn, searching relevant keywords, perhaps verbiage from the latest cybersecurity headlines, to find posts regarding said topic.
  • Do take advantage of the filters available, such as sorting by “latest” posts or discovering thought leaders with certain hashtags or keywords listed on their headlines.

If that’s too much to take on at the moment (which is totally understandable), you can start with “reacting” to content (like, celebrate, support, love, insightful, funny) or clicking the “+Follow” button to get more of the individual or thought leader’s content on your feed; these actions can get you noticed as well!

Let’s say that you officially request to “Connect” – this will be crucial in building up those mutual 1st degree connections as you continue to expand your network; in short, this is key to becoming an increasingly familiar face in your targeted industry.

I quickly learned that personalizing the “Add a note” box when sending a connection request can be the luck of the draw; it’s certainly possible to have your request drowned out due to “inbox” competition. Take a minute or so instead to scan the profiles to see if these individuals are usually proactive in engaging with their community updates.

A follow-up message with your new network upon the acceptance of your connection request does not guarantee a response or any level of engagement.

A few other things that I learned the hard way:

  • Your intention for outreach may be good, but the questions, comments or messaging might sound… unintentionally obtuse.
    • Ex: don’t make others do your work and answer your “answerable” questions for you. I say this fully knowing that information overload is a very real thing, but Google should and will be your best friend. Learning to ask informed questions is an invaluable skill.
  • Some people just aren’t responsive and choose not to be, or they’re selective and that’s valid. Let them be. Nobody owes you a response.

Keep in mind that this will be a slow build, but once you gain a few lovely connections and learn who engages with you, this whole process will start to gain momentum.

#3 Oh Right, And It Certainly Matters When You Say It

Here is what made the biggest impact in developing a network and ultimately shimmying my way into cybersecurity: investigating and identifying peak times specific to my network and audience.

Goal: Ideally be within the first few to leave a relevant and meaningful comment on recent industry-related posts (while others are actively engaging). This –

  • Magnifies the likelihood of people seeing your face pop up [first] in the comments and clicking on your profile.
  • Increases the likelihood of people requesting to connect with you after looking at your profile and your super cool bio.
  • Most definitely increases the chances of growing your network → higher probability of future mutual connections with someone else that you would want to connect with.

You can find “Best times to post on ____” types of articles everywhere for some basic overview into your time zone, but I’ve concluded that they’re still too general and there are often so many variables that affect these reports. This somewhat mindless process that I developed in identifying times required just a wee bit of time commitment and attention to detail, perhaps a little note taking, but I found this very doable.

By creating a quick table on Google Docs, listing each day across the top row (Monday through Sunday), and leaving space in each column to notate active times between morning, afternoon, and evenings, I made observations only when I happened to be signed on for a few minutes – I did not follow any strict time tables.

Your LinkedIn feed will show both posts authored by your immediate (1st degree) connections and some of those that they have each reacted to within their own networks or have been tagged in. Take note of the times of each post – located at the right of the profile pictures and below names and titles / headlines.

If it was posted less than 15 minutes ago, I’d usually read through it and write a thoughtful comment; the sooner, the better.

So – What Exactly Happened & How Did It Work Out?

All the points mentioned were on loop – rinse and repeat, while regularly revamping my LinkedIn profile as I gained insights from others, and refining who and where I wanted to be in the field. Developing my network only opened more doors to different events, new rapports to build upon, respectable causes to support, interesting resources, and amazing cybersecurity thought leaders and trailblazers to engage with and learn from. (You can obviously apply the same points to your own career interests!)

It’s gotten me more exposed and now familiar with some jargon that intimidated me in the past – along with an even longer, growing list of ones that I don’t understand – yet. These methods actually provided little boosts along the road to obtaining my AWS Cloud Practitioner Certification on the first try without prior background knowledge about Amazon Web Services. I solidified my foundation of familiarity, regularly listening and reading non-textbook, non-course style content, simply by filtering relevant posts and newsletters, and following cloud / AWS thought leaders.

During your own process, take into account that specific paths and roles may benefit from additional forms of media like other platforms, personal websites, and blogs. This ongoing journey of connecting with others over LinkedIn helped me find both new and existing cybersecurity organizations, and ultimately proved to be an incredibly valuable tool in the last few job hunts. I did not start with a technical background, rather reverse engineering the approach: meet the people first, then learn about the space, and continue to nurture that curiosity, narrowing things down along the way, until I find my place.

“Examples or It Didn’t Happen.”

#1

In the midst of gaining some traction in expanding my network and people were starting to request connecting with me from within the cybersecurity industry, a figure with specialization in drone hacking reached out. He was so kind and asked me how I was doing on my journey – he’d felt a level of authenticity in my bio. We shared talks of anxiety, overwhelm, and information overload as well as commonalities in how we got started. Bookmarking probably in the hundreds of PDFs and books on LinkedIn, signing up for classes that were promoted by cybersecurity leaders and never finishing them… He offered to be a mentor and show me all the introductory red team things. Through his presence, patience, and kindness, I learned what I know now about setting up a homelab, virtual machines, dabbling in Kali Linux, bash scripting, and all the might I say – super cool stuff. He’d throw me a challenge and give me the space to figure things out. He invited me to his Discord server with a massive and supportive community, shared courses with me, and kept my anxiety in check. The connection with him brought on another wave of wonderful people my way on LinkedIn. Of all things, this platform sent me an epic mentor. (Thank you, Tony!)

#2

There is an awesome connection that I made back when I first started my deep dives into all things cybersecurity, and we will call her Bon Qui Qui for the sake of this blog (because “saCURRRRITY”).

It might’ve been an update to Bon Qui Qui’s new job or some kind of announcement post on my newsfeed as I was scrolling as usual, but I noticed an individual and company name (in the headline) within the congratulatory comments thread that I hadn’t seen before. 

Sound the alarms! This was a new degree of connections in the making – and a magnificent German Shepherd was sitting as Head of Security.

To clarify, I’m an ardent believer of multilingualism’s power to deepen empathy and understanding in individuals, allowing more doors to open in creative thinking, collaborating, and strategizing.

Upon some casual sleuthing, I quickly noticed that the CEO, Kat Evans, spoke both Thai and Lao (and Japanese!) – and having lived in Laos for some time and fallen in love with Southeast Asia – I felt an instant connection. We all know that tech (and cyber) can feel a bit homogeneous, so I was elated to find a diverse team and quite frankly, the most impressive ratio of polyglot employees that I’ve ever seen in one organization. 

Imagine endlessly wandering and feeling extremely homesick – and then reaching a familiar and inviting doorstep. 

That’s what this felt like and I knew I had to stay in touch. 

Nearly four months later at the time of writing this, I have no doubt in my mind that I fully optimized LinkedIn as the tool that it was meant to be to find my place in cybersecurity. It was thanks to that one Bon Qui Qui post and a comment left in the thread by the one and only CTO of HanaByte, Eric Evans.

Relevant Blogs

HanaByte blog compliant Operating System with HanaByte consultant Simon Abisoye
Compliance

Compliant Operating System (OS)

A compliant operating system is any operating system that meets specific standards established by an entity. For example, if an organization wanted to create a CIS-compliant operating system, it would need to meet the standards set forth by the Center for Information Security, whose sole purpose is to “create confidence” in the connected world. A virtual machine image (VMI or image for short) is a bootable copy of the operating system of a virtual machine in the cloud…

Read More →
HanaByte, HashiTalks, Boundary, HashiCorp, HanaByte Blog
Automation

Beyond the Boundaries, Exploring How You Can Better Protect Your Home

Co-founder and senior consultant, Michael Greenlaw, had the opportunity to present at HashiTalks: Secure in February of 2023. His presentation addressed “HashiPass – Vault and Boundary; Managing Secrets at Home” which was a dissection of the ways that you can be better aware of your security when it comes to access and password management…

Read More →