Cybersecurity Mentors Podcast

Cybersecurity Mentors
undefined
Sep 11, 2025 • 1h 2min

Ask Us Anything: Cybersecurity Career Q&A — Season 4 Finale

In the Season 4 finale of The Cybersecurity Mentors Podcast, Steve and John wrap up an incredible season with a special listener-driven Q&A. The episode opens with a recap of Episodes 1–7, revisiting key lessons on soft skills, leadership, resume pitfalls, networking strategies, and inspiring career journeys. From there, they dive into your most pressing questions about breaking into cybersecurity — from whether college or certifications matter most, to the projects that truly prove you’re job-ready, to building home labs that tackle real-world problems. Along the way, they share behind-the-scenes reflections, practical advice, and set the stage for an exciting Season 5. Send us fan mail via textCheck out our Networking is King Course: How to Build a Career Through Real Connections
undefined
Sep 4, 2025 • 51min

The Networking Do’s and Don’ts in Cybersecurity

In this episode of The Cybersecurity Mentors Podcast, Steve and John explore one of the most powerful career accelerators in cybersecurity: networking. While a strong resume might get you noticed, it’s meaningful relationships that truly open doors. Together, we unpack the key do’s — being genuine, consistent, and adding value — and highlight the common mistakes to avoid, like spamming, ghosting, or only showing up when you need something. You’ll also hear real-world examples and actionable tips you can start using right away.If you’re ready to transform connections into career opportunities, this episode is a must-listen.Send us fan mail via textCheck out our Networking is King Course: How to Build a Career Through Real Connections
undefined
Aug 28, 2025 • 51min

Land the Job: The 10 Resume Mistakes Holding You Back in Cybersecurity

Are you applying for cybersecurity jobs but not getting interviews? The problem might be your resume. In this episode of The Cybersecurity Mentors Podcast, we break down the Top 10 Resume Mistakes holding you back from landing your first cybersecurity role—and show you exactly how to fix them.From weak objectives to cluttered skills sections, irrelevant job history, and missing proof of hands-on experience, we’ll cover the resume traps that stop recruiters in their tracks. Whether you’re just starting out or looking to make your next move in cybersecurity, this episode is packed with practical resume tips and career advice you can apply immediately.Send us fan mail via textCheck out our Networking is King Course: How to Build a Career Through Real Connections
undefined
Aug 21, 2025 • 37min

Interview with Grant Adams: How Picking Locks Opened the Door to a Cybersecurity Career

In this episode of the Cybersecurity Mentors Podcast, Grant Adams returns to share his journey over the past year, focusing on his job search experience, the importance of networking, and insights from his interview process. One highlight of his story is how a conversation at a lock-picking table during an in-person conference led directly to his current role. Grant also discusses the skills he developed, how AI is being integrated into cybersecurity practices, and personal updates such as his recent engagement. He emphasizes the value of work-life balance, soft skills, and building authentic connections in the cybersecurity field.++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++Grant Adams LinkedIn: https://www.linkedin.com/in/grantadams3/Send us fan mail via textCheck out our Networking is King Course: How to Build a Career Through Real Connections
undefined
Aug 14, 2025 • 1h 7min

Interview with Dr. TJ O'Connor: Enthusiasm is common, endurance is rare.

In this episode of the Cybersecurity Mentors Podcast, Dr. TJ O'Connor shares his journey from West Point to a retired U.S. Army Lieutenant Colonel and cybersecurity educator. He discusses his experiences at West Point, his military career, and the importance of hands-on learning in cybersecurity. Dr. O'Connor emphasizes the value of competitions in fostering growth and resilience, and he offers advice for aspiring cybersecurity professionals, highlighting the significance of endurance and continuous learning in the field.Violent Python - Book: https://a.co/d/0L4nJIiDr. TJ O’Connor’s LinkedIn: https://www.linkedin.com/in/tj-oconnor/Send us fan mail via textCheck out our Networking is King Course: How to Build a Career Through Real Connections
undefined
Aug 7, 2025 • 52min

Interview with Evan Reiser: Founder & CEO of Abnormal AI

In this episode of the Cybersecurity Mentors Podcast, John, Steve, and Evan Reiser, Founder & CEO of Abnormal AI, discuss Evan's journey from a gaming enthusiast to a leader in cybersecurity. We explore the evolution of email security, the impact of AI on the industry, and the importance of mentorship and continuous learning. Evan shares valuable lessons from his early startups, the significance of asking questions, and how to prepare for an AI-driven future in cybersecurity. The conversation emphasizes the need for curiosity, accountability, and the ability to adapt to new technologies.Send us fan mail via textCheck out our Networking is King Course: How to Build a Career Through Real Connections
undefined
Aug 1, 2025 • 56min

Leadership Principles for Cybersecurity

In this episode of the Cybersecurity Mentors Podcast, we discuss the critical role of leadership in cybersecurity, emphasizing the principles of Extreme Ownership as outlined in Jocko Willink's book. We explore how effective leadership goes beyond technical skills, focusing on communication, team dynamics, and the importance of humility. The conversation highlights the need for cybersecurity professionals to develop leadership skills, build relationships across teams, and prioritize tasks effectively in high-pressure situations. We encourage listeners to take ownership of their roles and invest in their leadership development for personal and professional growth.If you want to join the conversation about leadership in cybersecurity, leave us a comment below. Check out our swag shop to represent the podcast, and don't forget about our new "Networking is King" training to help you build professional relationships.Extreme Ownership Book: https://a.co/d/i3OqhSRJocko Podcast: https://jockopodcast.com/Send us fan mail via text
undefined
Jul 24, 2025 • 1h 2min

Unlocking the Power of Soft Skills in Cybersecurity

In this episode of the Cyber Security Mentors Podcast, we discuss the critical role of soft skills in the cybersecurity field. We emphasize that while technical skills are essential, soft skills such as communication, empathy, adaptability, critical thinking, and teamwork are equally important for career growth and success. We provide insights on how to improve these skills and their relevance in various cybersecurity roles. We also introduce a new networking course aimed at helping individuals build meaningful professional relationships.Networking is King CourseConnect with us and leave us feedback:Cybersecurity Mentors Podcast SwagSign up for our NewsletterMentorship - Sign up for a FREE sessionJoin us on DiscordFollow our LinkedIn pageCheck out our YouTube channel for more contentTCM Affiliate LinkSend us fan mail via text
undefined
Jun 5, 2025 • 1h 2min

Can a Mentor or Coach Really Help You Succeed in Cybersecurity?

Can a cybersecurity mentor or coach really help you break into or grow your career? In this episode, we break down the difference between mentorship and coaching, why investing in guidance matters, and what a structured 6-month mentorship journey looks like.We also share real success stories from our mentees—and why going it alone might be slowing you down.Plus, we’re running a limited-time offer: Get our coaching Plus Plan ($119/month) for the price of the Starter Plan ($69/month) for six months—available to the first 10 sign-ups. Sign-up link provided below. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++Connect with us and leave us feedback:● Cybersecurity Mentors Podcast Swag: https://the-cybersecurity-mentors-pod.myspreadshop.com ● Mentorship - Sign up for a FREE session: https://www.cyberprofessionalservices.com/scheduling-free-consultation● Sign up for our Newsletter: https://sendfox.com/lp/m2vx85 ● Join us on Discord: https://discord.com/invite/g4yRKjnD78● Follow our LinkedIn page: https://www.linkedin.com/company/cybersecurity-mentors-podcast● Check out our YouTube channel for more content: https://www.youtube.com/@CybersecurityMentorsPodcast● TCM Affiliate Link: https://certifications.tcm-sec.com/?ref=198===========================================================================Episode Resources: ● Mentorship and Coaching Promotional Sign Up #FIRST10  Link: https://www.cyberprofessionalservices.com/first-10 ● CPS Mentorship/Coaching Pricing PlansLink: https://www.cyberprofessionalservices.com/pricingSend us fan mail via textCheck out our Networking is King Course: How to Build a Career Through Real Connections
undefined
May 29, 2025 • 36min

Mastering Cybersecurity: Part 3 - Hack to Defend: Why Offensive Knowledge Matters

In Part 3 of our Mastering Cybersecurity series, we explore why learning how to hack isn’t just for red teamers — it’s a critical skill for defenders, too. Understanding offensive tactics can sharpen your defensive abilities, improve threat detection, and help you shift from reactive to proactive security.Plus, having both offensive and defensive skills makes you more marketable in today’s cybersecurity job market, especially for roles that value versatility and hands-on experience.We’ll also share practical ways to start learning these skills safely using your own home lab — no red team experience required.++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++Connect with us and leave us feedback:● Cybersecurity Mentors Podcast Swag: https://the-cybersecurity-mentors-pod.myspreadshop.com ● Mentorship - Sign up for a FREE session: https://www.cyberprofessionalservices.com/scheduling-free-consultation● Sign up for our Newsletter: https://sendfox.com/lp/m2vx85 ● Join us on Discord: https://discord.com/invite/g4yRKjnD78● Follow our LinkedIn page: https://www.linkedin.com/company/cybersecurity-mentors-podcast● Check out our YouTube channel for more content: https://www.youtube.com/@CybersecurityMentorsPodcast● TCM Affiliate Link: https://certifications.tcm-sec.com/?ref=198++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++Episode Resources:Recommended CertificationsPEH – Practical Ethical HackingWhy recommend it:Covers the full pentesting pipeline—network scanning, exploitation, privilege escalation, and more—with hands-on tools and labs.Enroll here: https://certifications.tcm-sec.com/practical-ethical-hacking/?ref=198 PNPT – Practical Network Penetration TesterWhy recommend it:TCM’s flagship certification simulates a real-world pentest engagement—from external recon to internal exploitation—and includes a full report and video walkthrough.Enroll here: https://certifications.tcm-sec.com/pnpt/?ref=198 Hands-On Practice PlatformsTryHackMe – Offensive Path Learn offensive security with guided, hands-on labs. Link: https://tryhackme.com/Hack The Box Pentesting labs and real-world CTF challenges for all skill levels. Link: https://www.hackthebox.com/Tools to ExploreKali Linux A Linux distro made for penetration testing. Link: https://www.kali.org/Metasploit Framework A powerful framework for exploitation and post-exploitation. Link: https://docs.rapid7.com/metasploit/NmapPowerful network scanning toolLink: Send us fan mail via textCheck out our Networking is King Course: How to Build a Career Through Real Connections

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app