

Ep 18 - How To Become A Cybersecurity Analyst With Tyrone Boyd
On this episode of #WorkinginTech, we're chatting with Tyrone Boyd. Tyrone is a Senior Security Analyst based in Tampa, Florida. He graduated from the University of South Florida in 2019 with a degree in Information Technology. After working as a Mail Carrier with no tech experience, Tyrone transitioned into the cybersecurity field in 2021 as an Associate Security Analyst. In his current role, Tyrone has gained invaluable experience and insights that he believes can benefit others looking to break into the industry. With a passion for helping others, he is eager to share his journey and provide guidance to those in similar situations, as he firmly believes there is room for anyone willing to pursue a career in cybersecurity. Today, Tyrone will share his inspiring story of transitioning from a non-tech background into a thriving cybersecurity career. Get ready for an engaging discussion filled with practical advice and insights on navigating the cybersecurity job market and overcoming barriers to entry. 𝕏 CONNECT WITH ME ON SOCIALS 𝕏 Facebook: https://www.facebook.com/juwonthetechie/ Twitter: https://twitter.com/JuwonTheTechie Threads: https://www.threads.net/@juwonthetechie IG: https://www.instagram.com/juwonthetechie/ LinkedIn: https://www.linkedin.com/in/juwon-io/ Tiktok: https://www.tiktok.com/@juwonthetechie CONNECT WITH TYRONE LinkedIn: https://www.linkedin.com/in/tyroneboyd/ CHAPTERS 0:00 - Intro 1:42 - Why Tech? 4:12 - Transitioning between Industries 7:40 - Importance of Mentorship 8:59 - Securing the First Role 11:42 - Continuous Learning 12:53 - Engineering vs Analysis 15:00 - Top 3 Skills 19:33 - Salary Progression 22:07 - Certifications 24:37 - Mistakes 28:32 - Starting All Over Again 35:10 - Exciting Trends in Cybersecurity 37:00 - Climbing the Ranks 41:03 - Getting into Cybersecurity Without a Cert 43:43 - A Day in The Life 46:03 - Worst Nightmare 47:18 - DON’T DO THIS 48:46 - Stopping Big Security Threats 51:54 - Threat of A.I 54:40 - Coding in Cybersecurity 57:11 - Final Words 58:30 - Conclusion