
Sign up to save your podcasts
Or


Join ECA Cyber Range: https://www.skool.com/eca-cyber-range-4625/about?ref=ec3abb3a3b014ed2a08e060ef406fb98
RMF Academy: https://www.rmfacademy.io/
Please Rate the Podcast: https://ratethispodcast.com/techwoke
Timestamps:
00:00 Chris's early career struggles
04:28 Explaining SIM systems basics
09:07 Daily routine in cybersecurity job
10:20 Understanding backend log generation
15:12 Skills and mindset for IT roles
17:53 Starting to charge for classes
20:39 Helping IT and cybersecurity professionals
23:36 Learning cloud and certifications
26:04 Discussion on AI in cybersecurity
29:44 Asking for favors and help
Description:
In this episode, Christopher sits down with Kenneth Ellington, a senior threat analyst and cybersecurity trainer, to break down what threat hunting actually is and how you can get into this space.
If you’ve been trying to break into cybersecurity but feel lost after getting certifications like Security+, this episode gives you a real-world understanding of what the job actually looks like and how to position yourself to get in.
In this episode, we cover:
• What threat hunting is in simple terms
• The difference between reactive vs proactive cybersecurity
• What a day in the life of a threat hunter looks like
• How SIEM tools like Splunk are used in real environments
• What skills you actually need to get into threat hunting
• Why certifications alone are not enough
• How to build hands-on experience without a job
• The role of AI in cybersecurity and automation
• Salary expectations and career growth in cyber
Whether you're coming from IT, trying to transition into cybersecurity, or stuck after getting certified, this episode will give you clarity on your next steps.
Subscribe for more content on cybersecurity, GRC, RMF, GovTech, and real tech career paths.
Like, comment, and share if this helped you.
By Christopher OkpalaJoin ECA Cyber Range: https://www.skool.com/eca-cyber-range-4625/about?ref=ec3abb3a3b014ed2a08e060ef406fb98
RMF Academy: https://www.rmfacademy.io/
Please Rate the Podcast: https://ratethispodcast.com/techwoke
Timestamps:
00:00 Chris's early career struggles
04:28 Explaining SIM systems basics
09:07 Daily routine in cybersecurity job
10:20 Understanding backend log generation
15:12 Skills and mindset for IT roles
17:53 Starting to charge for classes
20:39 Helping IT and cybersecurity professionals
23:36 Learning cloud and certifications
26:04 Discussion on AI in cybersecurity
29:44 Asking for favors and help
Description:
In this episode, Christopher sits down with Kenneth Ellington, a senior threat analyst and cybersecurity trainer, to break down what threat hunting actually is and how you can get into this space.
If you’ve been trying to break into cybersecurity but feel lost after getting certifications like Security+, this episode gives you a real-world understanding of what the job actually looks like and how to position yourself to get in.
In this episode, we cover:
• What threat hunting is in simple terms
• The difference between reactive vs proactive cybersecurity
• What a day in the life of a threat hunter looks like
• How SIEM tools like Splunk are used in real environments
• What skills you actually need to get into threat hunting
• Why certifications alone are not enough
• How to build hands-on experience without a job
• The role of AI in cybersecurity and automation
• Salary expectations and career growth in cyber
Whether you're coming from IT, trying to transition into cybersecurity, or stuck after getting certified, this episode will give you clarity on your next steps.
Subscribe for more content on cybersecurity, GRC, RMF, GovTech, and real tech career paths.
Like, comment, and share if this helped you.