The Beginning#

Working in financial crime (FinCrime), I spend my days investigating patterns, identifying anomalies, and piecing together fragments of information to understand the bigger picture. It’s investigative work that requires attention to detail and a methodical approach.

Over time, I realised these skills translate directly into cybersecurity - particularly into areas like threat intelligence and OSINT (Open Source Intelligence). The more I explored, the more I found that cybersecurity scratches the same puzzle-solving itch that drew me to investigation work in the first place.

Why Cybersecurity?#

The OSINT Revelation#

When I discovered OSINT, something clicked. The process of gathering publicly available information and connecting dots to reveal insights felt like a natural extension of what I already do. Watching investigators at Bellingcat piece together complex stories from scattered fragments of data was genuinely inspiring.

There’s something deeply satisfying about:

  • Finding the piece of information that ties everything together
  • Using creative thinking to approach problems from new angles
  • The detective-like nature of the work

Skills That Transfer#

My FinCrime background provides a foundation that’s surprisingly relevant:

  1. Pattern Recognition - Spotting anomalies in data and behaviour
  2. Investigation Methodology - Systematic approaches to complex problems
  3. Attention to Detail - Small details often matter most
  4. Analytical Thinking - Drawing conclusions from incomplete information

My Learning Path#

I’m approaching this transition with a structured plan:

Certifications in Progress#

  • CompTIA Security+ - Building foundational security knowledge
  • CompTIA Network+ - Understanding the networking fundamentals

Focus Areas#

  • OSINT & Threat Intelligence - Primary interest, aligns with my investigative background
  • Penetration Testing - Understanding offensive techniques to better understand defence

Hands-On Practice#

  • TryHackMe - My main learning platform for guided paths
  • OverTheWire - Practising Linux and security fundamentals
  • CTF Challenges - Applying skills in capture-the-flag competitions

What to Expect on This Blog#

This blog will document my journey:

  • Learning journal entries - What I’m studying, what’s challenging me
  • Lab write-ups - Documenting TryHackMe rooms and OverTheWire progress
  • OSINT explorations - Techniques and tools I’m learning
  • Resource recommendations - Courses, channels, and tools I find valuable

Let’s Connect#

If you’re on a similar path, or if you have advice for someone making this transition, I’d love to hear from you. The security community - especially the OSINT community - has been incredibly welcoming.

Here’s to the journey ahead.


This is the first post documenting my transition into cybersecurity. Follow along as I learn, fail, and grow.