Why Im Transitioning to Cybersecurity
Table of Contents
The Beginning#
Working in financial crime (FinCrime), I spend my days investigating patterns, identifying anomalies, and piecing together fragments of information to understand the bigger picture. It’s investigative work that requires attention to detail and a methodical approach.
Over time, I realised these skills translate directly into cybersecurity - particularly into areas like threat intelligence and OSINT (Open Source Intelligence). The more I explored, the more I found that cybersecurity scratches the same puzzle-solving itch that drew me to investigation work in the first place.
Why Cybersecurity?#
The OSINT Revelation#
When I discovered OSINT, something clicked. The process of gathering publicly available information and connecting dots to reveal insights felt like a natural extension of what I already do. Watching investigators at Bellingcat piece together complex stories from scattered fragments of data was genuinely inspiring.
There’s something deeply satisfying about:
- Finding the piece of information that ties everything together
- Using creative thinking to approach problems from new angles
- The detective-like nature of the work
Skills That Transfer#
My FinCrime background provides a foundation that’s surprisingly relevant:
- Pattern Recognition - Spotting anomalies in data and behaviour
- Investigation Methodology - Systematic approaches to complex problems
- Attention to Detail - Small details often matter most
- Analytical Thinking - Drawing conclusions from incomplete information
My Learning Path#
I’m approaching this transition with a structured plan:
Certifications in Progress#
- CompTIA Security+ - Building foundational security knowledge
- CompTIA Network+ - Understanding the networking fundamentals
Focus Areas#
- OSINT & Threat Intelligence - Primary interest, aligns with my investigative background
- Penetration Testing - Understanding offensive techniques to better understand defence
Hands-On Practice#
- TryHackMe - My main learning platform for guided paths
- OverTheWire - Practising Linux and security fundamentals
- CTF Challenges - Applying skills in capture-the-flag competitions
What to Expect on This Blog#
This blog will document my journey:
- Learning journal entries - What I’m studying, what’s challenging me
- Lab write-ups - Documenting TryHackMe rooms and OverTheWire progress
- OSINT explorations - Techniques and tools I’m learning
- Resource recommendations - Courses, channels, and tools I find valuable
Let’s Connect#
If you’re on a similar path, or if you have advice for someone making this transition, I’d love to hear from you. The security community - especially the OSINT community - has been incredibly welcoming.
Here’s to the journey ahead.
This is the first post documenting my transition into cybersecurity. Follow along as I learn, fail, and grow.