{"id":85972,"date":"2024-08-20T13:41:55","date_gmt":"2024-08-20T02:41:55","guid":{"rendered":"https:\/\/www.institutedata.com\/blog\/from-curiosity-to-cyber-security-maria-kims-path-to-protecting-the-digital-world\/"},"modified":"2024-08-20T13:49:20","modified_gmt":"2024-08-20T02:49:20","slug":"from-curiosity-to-cybersecurity-maria-kims-path-to-protecting-the-digital-world","status":"publish","type":"post","link":"https:\/\/www.institutedata.com\/us\/blog\/from-curiosity-to-cybersecurity-maria-kims-path-to-protecting-the-digital-world\/","title":{"rendered":"From Curiosity to Cybersecurity: Maria Kim\u2019s Path to Protecting the Digital World"},"content":{"rendered":"<p><b>Maria Kim\u2019s journey into cybersecurity began with a spark of curiosity and a desire to make a difference. She now works as a Cybersecurity Governance Specialist <\/b><b>at Steadfast Group and its equity businesses in Sydney.\u00a0<\/b><b><br \/>\n<\/b><b><br \/>\n<\/b><b>After years of working in the educational and corporate sectors, Maria decided to pivot her career toward a field where she could help protect organizations from cyber threats. She enrolled in the Institute of Data\u2019s <\/b><a href=\"https:\/\/www.institutedata.com\/us\/courses\/cyber-security-program\/\"><b>Cybersecurity Program<\/b><\/a><b>, a decision that would set her on a path to success in this rapidly evolving industry.\u00a0<\/b><b><br \/>\n<\/b><b><br \/>\n<\/b><b>Now, Maria is thriving in her new role, where she manages user cybersecurity training <\/b><b>and cybersecurity awareness programs<\/b><b>, ensures compliance, and conducts phishing simulation campaigns, all while being part of a supportive and dynamic team in the heart of the CBD.<\/b><\/p>\n<p><b>Discover how Maria&#8217;s determination and her passion for cybersecurity paved the way for her exciting new career.\u00a0<\/b><\/p>\n<h2><span style=\"font-weight: 400;\">1. Hi Maria, please tell me a little bit about yourself.\u00a0<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">My name is Maria Kim, and I&#8217;m very curious. I like learning about different cultures, taking long walks by the ocean, and meeting my friends. I also really enjoy traveling around New Zealand because it is such a beautiful place.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There are many stunning hikes here, and even just driving around is relaxing and enjoyable.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">I also love learning new recipes and cooking meals for my family and friends. My favorite dish to cook is kimchi soup, made with fermented cabbage, pork, onions, tofu, and a special kimchi paste \u2013 it\u2019s delicious! It&#8217;s also good for your gut and body because it contains probiotics and natural bacteria, providing a lot of Vitamin C and boosting your energy.\u00a0\u00a0<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">2. What did you do before you studied cybersecurity?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">During my time at university, I studied Business Studies and majored in Management, which was a highly research-based degree. I learned a great deal about how people, new organizations, and business innovations work. <\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">I chose to pursue this field of study because I&#8217;m very oriented toward working with people. I have accumulated over 12 years of experience in New Zealand&#8217;s educational and corporate sectors, working in various administrative<\/span><span style=\"font-weight: 400;\">, <\/span><span style=\"font-weight: 400;\">coordination, and research roles. <\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">Before enrolling in the <\/span><a href=\"https:\/\/www.institutedata.com\/us\/courses\/cyber-security-program\/\"><span style=\"font-weight: 400;\">Cybersecurity Program<\/span><\/a><span style=\"font-weight: 400;\">, I worked for a government agency and also served as a business researcher.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">3. Why did you switch careers to cybersecurity?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">While I was working at my previous role, a significant <\/span><a href=\"https:\/\/www.institutedata.com\/us\/blog\/case-studies-in-cybersecurity-learning-from-notable-incidents-and-breaches\/\"><span style=\"font-weight: 400;\">cybersecurity incident<\/span><\/a><span style=\"font-weight: 400;\"> occurred within another government organisation, making headlines and highlighting the substantial impact a cyberattack can have on an organisation. <\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">This cyber incident sparked my interest in learning about cybersecurity. I did my research and discovered that there is a significant gap in <\/span><a href=\"https:\/\/securitybrief.co.nz\/story\/aotearoas-cyber-skills-shortage-the-tug-of-war-between-talent-supply-demand\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">cybersecurity skills that is not being addressed in New Zealand<\/span><\/a><span style=\"font-weight: 400;\"> or globally.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">I also saw a significant cyber-knowledge gap affecting many industries.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n[su_quote]I wanted to close this skills gap by upskilling myself and entering the cybersecurity industry. [\/su_quote]\n<p><span style=\"font-weight: 400;\">I want to help people and organizations stay cyber-safe and protect their sensitive information, available data, and assets.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This is why I decided to sign up for the <\/span><a href=\"https:\/\/www.institutedata.com\/us\/courses\/cyber-security-program\/\"><span style=\"font-weight: 400;\">Cybersecurity Program.<\/span><\/a><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">4. How did you land on studying cybersecurity with the Institute of Data?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">One of my friends mentioned the <\/span><a href=\"https:\/\/www.institutedata.com\/us\/courses\/cyber-security-program\/\"><span style=\"font-weight: 400;\">Cybersecurity Program<\/span><\/a><span style=\"font-weight: 400;\"> to me, and she sent me a link.\u00a0<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">I did my own research, read <\/span><a href=\"https:\/\/www.institutedata.com\/us\/courses\/cyber-security-program\/\"><span style=\"font-weight: 400;\">the whole website<\/span><\/a><span style=\"font-weight: 400;\">, and then contacted a career advisor for a one-on-one call to address the questions I had. That was very helpful \u2014 speaking to professionals who knew the program thoroughly.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-weight: 400;\">I decided to enroll in a Cybersecurity Program after speaking with the program advisors, who acknowledged that my research skills would be valuable in the cyber industry.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-weight: 400;\">I trusted the program advisors and agreed that my research background would make me a great fit to become an investigator in the cyberspace. They suggested that my research background could make me well-suited to work as an investigator in the cyberspace, and I agreed.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-weight: 400;\">I was worried that not having an IT scripting background would prevent me from entering the program. <\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">However, the advisors assured me that the program is designed to be accessible to people without an IT background, including all the foundational skills.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-weight: 400;\">[su_quote]I liked that the program could be completed on campus or online, full-time or part-time and that I could choose a program that would fit my schedule and lifestyle.[\/su_quote]<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Also, <\/span><span style=\"font-weight: 400;\">i<\/span><span style=\"font-weight: 400;\">t was really important to get hands-on experience from industry professionals. That was one of the main selling points of the program for sure.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">5. What was your experience with the program like?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">At the very beginning, I struggled a lot. I spent many hours after class revising my labs and taking additional labs on the TryHackMe Platform.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The main challenge for me was the intensity of the program. Every day, I learned something new, and I spent a few hours studying before and after the program. <\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">I conducted my own research to better understand the many concepts we covered. This was actually a helpful exercise as it reflected the reality of the cybersecurity world, where many processes are new or non-existent and require proactive problem-solving and investigation to find solutions.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">[su_quote]I took this program very seriously, and I took full responsibility for passing my labs at the highest level possible.[\/su_quote]\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">I utilized a lot of help from my peers and the trainer\u2019s assistants, and ultimately, they supported me and helped me pass all of the labs.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-weight: 400;\">[su_quote]That is why the highlight of the program was definitely the people. From the lead trainer to the trainer\u2019s assistants to the job outcomes team.[\/su_quote]<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The people were exceptional professionals who really wanted to help me get through the program and prepare me for the industry. <\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">For example, the lead trainer provided his own study notes to help extend the boundaries of the program. He gave us many useful in-class exercises, such as designing and subnetting an organizational network, presenting case studies, and using tools related to GRC (governance<\/span><span style=\"font-weight: 400;\">, <\/span><span style=\"font-weight: 400;\">risk and compliance work). <\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">Also, while the full-time <\/span><a href=\"https:\/\/www.institutedata.com\/us\/courses\/cyber-security-program\/\"><span style=\"font-weight: 400;\">Cybersecurity Program<\/span><\/a><span style=\"font-weight: 400;\"> was intense and tough, I really enjoyed it. I was so glad I could dedicate myself to the full-time program where I could give all my attention to the courses and labs we were working on. I wouldn&#8217;t have wanted to enroll in the part-time program because I don&#8217;t believe I would have been as focused throughout.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">6. Do you have any advice for those beginning the program?<\/span><\/h2>\n[su_quote]My advice is to be curious and eager to acquire new knowledge and build good connections with your trainers.[\/su_quote]\n<p><span style=\"font-weight: 400;\">Also, contact the Job Outcome Program team as soon as possible if you want to secure a job more quickly. <\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">They can assist you in revising your CV, cover letter, and LinkedIn profile and provide advice on how to prepare for an interview. <\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">They are incredible supporters, and engaging with them made me feel supported and never alone. <\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">The job outcome team connected me with real professionals from the cybersecurity industry, one of whom became my mentor.\u00a0<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">7. What was the job hunt process like?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">After three months of job hunting, I decided to reach out to the Job Outcomes Team. <\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">Together with Kate and Komal (career coaching professionals working on the Job Outcomes Team), we discussed various topics related to my job-hunting journey. <\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">Komal is an outstanding professional, and she was always there for me. <\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">I felt very supported as she provided a lot of emotional encouragement to help me stay positive and on track &#8211; I highly recommend contacting Kate and Komal during your studies, as they can share a lot of tips and tricks on how to be better prepared for your job interviews.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-weight: 400;\">My advice for those looking for work in the industry is to be prepared for a tough market and tough competition. <\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">[su_quote]To land your first cybersecurity role, invest time in the process and reach out to the job outcome team. Remember to conduct thorough research about the companies you are interested in applying to.[\/su_quote]\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">Also, engage with industry professionals, attend workshops and seminars, and try to find cybersecurity communities on the Meetup app.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The job hunt journey is a comprehensive package.\u00a0<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">8. Can you tell me about your new role?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">I am still relatively new to my role. I am a Cybersecurity Governance Specialist at the Steadfast Group, <\/span><span style=\"font-weight: 400;\">and I look after its equity businesses<\/span><span style=\"font-weight: 400;\">. <\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">My responsibilities include managing user cybersecurity training and cybersecurity awareness programs, ensuring compliance consent, and conducting phishing simulation campaigns. I really look forward to these tasks. <\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">I\u2019m currently undergoing training and learning new tools and software. <\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">What I like about this job is, first and foremost, my team. They have been so supportive and hospitable. I also like that our office is located in the heart of the CBD area in Sydney &#8211; it\u2019s very vibrant. I\u2019m just so grateful to be <\/span><span style=\"font-weight: 400;\">a <\/span><span style=\"font-weight: 400;\">part of this company.\u00a0\u00a0<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">9. How does it feel to be working in the cybersecurity industry finally?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">[su_quote]I feel like my dream has come true! I&#8217;m closer to contributing to this industry and making a difference &#8211; which is what I set out to do.[\/su_quote]<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">I know I\u2019m part of a great community focused on protecting people in organizations from cyber threats, and this certainly keeps me excited about this field.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">I am part of an amazing team, and I am constantly learning from my experienced colleagues. It&#8217;s a great opportunity to collaborate and learn from them.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">10. You mentioned that you\u2019re passionate about advocating for women in cybersecurity. Can you tell me more about that?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">It struck me that I was the only female in my program&#8217;s cohort. There is also a significant <\/span><a href=\"https:\/\/www.terranovasecurity.com\/blog\/shrinking-the-gender-gap-in-cyber-security\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">gender gap in the cybersecurity industry.<\/span><\/a><span style=\"font-weight: 400;\"> So, I want women to know that they can excel in a career in cybersecurity just like anyone else.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Through my career, I want to inspire other women and show them that they can break into the industry.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If I succeed in my cybersecurity journey, I might inspire other women to join the field.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">I personally know many women who are excellent researchers with strong soft skills, great communication abilities, and attention to detail. These skills are invaluable when investigating cybersecurity attacks, and women with these skills can be a great asset to the industry.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As a newcomer, I am eager to support other women from the Institute of Data <\/span><a href=\"https:\/\/www.institutedata.com\/us\/courses\/cyber-security-program\/\"><span style=\"font-weight: 400;\">Cybersecurity Program<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">I met a female cybersecurity professional who served as one of the lead trainers at the Institute of Data. As I got to know her, I found her to be an exceptional cybersecurity professional. She accepted me and took me under her wing as a mentor. I believe that if other women can find a mentor like her in the industry, it would be incredibly beneficial. <\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">I would gladly serve as a mentor for any women graduating from the program.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">11. What excites you about your future now that you&#8217;re in the cybersecurity industry?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">I am excited that I have the opportunity to contribute to protecting our cyber world, and I am dedicated to becoming a cyber professional and making our world a better place to live.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">I believe that my journey and my skills and experience have led me to the right place where I can add significant value, while also advancing my career and broadening my perspectives and opportunities. <\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">[su_quote]What I find particularly appealing about cybersecurity is that it knows no limits. In certain jobs, you may hit a ceiling, but in cybersecurity, there are always opportunities to enhance your skills and progress further.[\/su_quote]<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Reflecting back, I would like to express my heartfelt gratitude to all the staff members involved in the program. Their dedication and hard work have not gone unnoticed. The instructors and lead trainers demonstrated a wealth of industry knowledge and remained up-to-date with the latest technologies, which greatly benefitted me and my experience in the industry.<\/span><\/p>\n<p><b>If you\u2019d like to learn more about our <\/b><a href=\"https:\/\/www.institutedata.com\/us\/courses\/cyber-security-program\/\"><b>Cybersecurity Program<\/b><\/a><b>, please download <\/b><a href=\"https:\/\/www.institutedata.com\/us\/courses\/cyber-security-program\/\"><b>a course outline<\/b><\/a><b>. <\/b><b><br \/>\n<\/b><b><br \/>\n<\/b><b>Alternatively, you can speak about the program directly with a team member by booking a <\/b><a href=\"https:\/\/www.institutedata.com\/us\/consultation\/\"><b>career consultation<\/b><\/a><b> to start your journey with an actionable plan.<\/b><\/p>\n<p><b>You can connect with <\/b><a href=\"https:\/\/www.linkedin.com\/in\/maria-kim-b81b8662\/\" target=\"_blank\" rel=\"noopener\"><b>Maria and follow her professional journey<\/b><\/a><b> on LinkedIn.<\/b><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Maria Kim\u2019s journey into cybersecurity began with a spark of curiosity and a desire to make a difference. She now works as a Cybersecurity Governance Specialist at Steadfast Group and its equity businesses in Sydney.\u00a0 After years of working in the educational and corporate sectors, Maria decided to pivot her career toward a field where&hellip;<\/p>\n","protected":false},"author":1,"featured_media":85962,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2779,588,2711],"tags":[2187,862,1249],"class_list":["post-85972","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-case-studies-us","category-cyber-security-us","category-personal-development-us","tag-personal-development-us","tag-software-development-us","tag-software-engineering-us"],"_links":{"self":[{"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/posts\/85972","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/comments?post=85972"}],"version-history":[{"count":4,"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/posts\/85972\/revisions"}],"predecessor-version":[{"id":85982,"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/posts\/85972\/revisions\/85982"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/media\/85962"}],"wp:attachment":[{"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/media?parent=85972"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/categories?post=85972"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/tags?post=85972"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}