Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the easy-accordion-free domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the zoho-flow domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wordpress-seo domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893
{"id":1481,"date":"2023-10-25T19:06:26","date_gmt":"2023-10-25T19:06:26","guid":{"rendered":"https:\/\/jacksonholdingcompany.com\/its-by-mistake-how-i-got-into-cybersecurity-gee-mohanty-on-october-25-2023-at-1200-pm\/"},"modified":"2023-10-25T19:06:26","modified_gmt":"2023-10-25T19:06:26","slug":"its-by-mistake-how-i-got-into-cybersecurity-gee-mohanty-on-october-25-2023-at-1200-pm","status":"publish","type":"post","link":"https:\/\/jacksonholdingcompany.com\/its-by-mistake-how-i-got-into-cybersecurity-gee-mohanty-on-october-25-2023-at-1200-pm\/","title":{"rendered":"It\u2019s \u201cby mistake\u201d \u2013 How I got into Cybersecurity Gee Mohanty on October 25, 2023 at 12:00 pm"},"content":{"rendered":"

Welcome to the Cisco Women in Cybersecurity\u2019s blog series<\/a>, where we highlight the stories of the mentors who have inspired and advocated for the careers of those in our community. This series seeks t\u2026 Read more on Cisco Blogs<\/a><\/em><\/p>\n

\u200b<\/p>\n

Welcome to the Cisco Women in Cybersecurity\u2019s blog series<\/a>, where we highlight the stories of the mentors who have inspired and advocated for the careers of those in our community. This series seeks to show the importance of allyship, connection,\u00a0 and how different the journeys can be into a career in cybersecurity. <\/em><\/p>\n

\u201cIt\u2019s by mistake.\u201d<\/p>\n

That\u2019s what I thought when I first got a call from the recruiter for the Customer Success Manager role at Cisco. Having spent 10 years in software, I didn\u2019t think I had the relevant experience or expertise in cybersecurity. But one conversation with my first hiring manager changed all that.<\/p>\n

I recently sat down with that manager, David Salter, and we talked about why he looks for skills \u201coutside of the box\u201d, and the benefits that different backgrounds and experiences bring to the cybersecurity industry.<\/p>\n

Gee<\/strong>:\u00a0Why do you encourage having people from other backgrounds<\/strong>?<\/h3>\n

David<\/strong>: \u00a0The whole [customer success] team was, and is, built on complementary skills. We had strong technical people. We also had strong leaders and program managers. Everyone brought different skillsets to achieve our core aim of truly understanding the customers\u2019 challenges. Because we all had different skillsets, we would work together, and with the customer, to resolve their challenges.<\/p>\n

We can teach security and technology. But those core people skills, and customer interaction skills, are at the heart of what we do.<\/p>\n

Gee: For a job posting there are minimum qualifications, then preferred qualifications. In countries like India, there is a lot of competition, so ticking all the boxes in the job description is tough. What influenced your hiring decision to hire me?<\/strong><\/h3>\n

David:<\/strong>\u00a0You were 1 out of over 1200 candidates for this position, so yes, the competition was incredibly tough. I remember that you had a lot of the skills we were looking for, but really, it was all about that first conversation we had. \u00a0It was a very natural conversation which, when working in Customer Success, is incredibly important. Every conversation we have with the customer is an opportunity to share and listen.<\/p>\n

The conversation was\u00a0powerful. It\u00a0was an easy decision to shortlist you, based on you as a whole person, rather than the specific checklist listed in the job description.<\/p>\n

Gee: You do a lot of mentoring. Why is this important for you?<\/strong><\/h3>\n

David: <\/strong>I benefitted a lot early in career from mentors myself. As I moved into leadership, I discovered it\u2019s not about telling people what to do. It\u2019s about creating an open learning environment. If I share what I know, in an open and honest environment, that encourages others to share, and I learn something new every time.<\/p>\n

I still believe that I\u2019ve got new things to learn\u00a0every day. Mentoring helps me with that, as much as (I hope) it helps the people I\u2019m mentoring. Sharing my own mistakes and challenges helps people address their own challenges. It\u2019s also a great way to give back.<\/p>\n

Gee: What are your suggestions for people moving into Cybersecurity from a different domain?<\/strong><\/h3>\n

David:<\/strong>. Cybersecurity is such a vast industry, there are so many different types of roles you can do. If you are in a connected part of technology, lets say networking, that\u2019s incredibly relevant for security. If you worked in application development and worked in coding, that\u2019s really useful for security, particularly in the vulnerability space.<\/p>\n

There is a Cybersecurity aspect is to every part of IT. It\u2019s not just Firewall and Anti-Virus anymore. We are looking at how a device authenticates to the network, how a user interacts with that device and how they access applications. A good grounding in Information Technology would be very relevant. An understanding of Product Marketing and technical writing can also be relevant\u2026there are so many skillsets that can be adapted to cybersecurity. And the industry needs them.<\/p>\n

For somebody starting out, my advice would be to get really curious. Think about what aspect of the industry that fascinates you, and start from there. We should never be scared to think outside of the box.<\/p>\n

We\u2019d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Secure on social!<\/em><\/p>\n

Cisco Secure Social Channels<\/strong><\/p>\n

Instagram<\/a><\/strong>Facebook<\/a><\/strong>Twitter<\/a><\/strong>LinkedIn<\/a><\/strong><\/p>\n

\n\t\tShare\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n
Share:<\/div>\n
\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n

\u00a0\u00a0Gee interviews David, a hiring manager, to discuss why he looks for skills \u201coutside of the box\u201d, his mentoring experience, and more.\u00a0\u00a0Read More<\/a>\u00a0Cisco Blogs\u00a0<\/p>","protected":false},"excerpt":{"rendered":"

<\/p>\n

Welcome to the Cisco Women in Cybersecurity\u2019s blog series<\/a>, where we highlight the stories of the mentors who have inspired and advocated for the careers of those in our community. This series seeks t\u2026 Read more on Cisco Blogs<\/a><\/em><\/p>\n

\u200b<\/p>\n

Welcome to the Cisco Women in Cybersecurity\u2019s blog series<\/a>, where we highlight the stories of the mentors who have inspired and advocated for the careers of those in our community. This series seeks to show the importance of allyship, connection,\u00a0 and how different the journeys can be into a career in cybersecurity. <\/em><\/p>\n

\u201cIt\u2019s by mistake.\u201d<\/p>\n

That\u2019s what I thought when I first got a call from the recruiter for the Customer Success Manager role at Cisco. Having spent 10 years in software, I didn\u2019t think I had the relevant experience or expertise in cybersecurity. But one conversation with my first hiring manager changed all that.<\/p>\n

I recently sat down with that manager, David Salter, and we talked about why he looks for skills \u201coutside of the box\u201d, and the benefits that different backgrounds and experiences bring to the cybersecurity industry.<\/p>\n

Gee<\/strong>:\u00a0Why do you encourage having people from other backgrounds<\/strong>?<\/h3>\n

David<\/strong>: \u00a0The whole [customer success] team was, and is, built on complementary skills. We had strong technical people. We also had strong leaders and program managers. Everyone brought different skillsets to achieve our core aim of truly understanding the customers\u2019 challenges. Because we all had different skillsets, we would work together, and with the customer, to resolve their challenges.<\/p>\n

We can teach security and technology. But those core people skills, and customer interaction skills, are at the heart of what we do.<\/p>\n

Gee: For a job posting there are minimum qualifications, then preferred qualifications. In countries like India, there is a lot of competition, so ticking all the boxes in the job description is tough. What influenced your hiring decision to hire me?<\/strong><\/h3>\n

David:<\/strong>\u00a0You were 1 out of over 1200 candidates for this position, so yes, the competition was incredibly tough. I remember that you had a lot of the skills we were looking for, but really, it was all about that first conversation we had. \u00a0It was a very natural conversation which, when working in Customer Success, is incredibly important. Every conversation we have with the customer is an opportunity to share and listen.<\/p>\n

The conversation was\u00a0powerful. It\u00a0was an easy decision to shortlist you, based on you as a whole person, rather than the specific checklist listed in the job description.<\/p>\n

Gee: You do a lot of mentoring. Why is this important for you?<\/strong><\/h3>\n

David: <\/strong>I benefitted a lot early in career from mentors myself. As I moved into leadership, I discovered it\u2019s not about telling people what to do. It\u2019s about creating an open learning environment. If I share what I know, in an open and honest environment, that encourages others to share, and I learn something new every time.<\/p>\n

I still believe that I\u2019ve got new things to learn\u00a0every day. Mentoring helps me with that, as much as (I hope) it helps the people I\u2019m mentoring. Sharing my own mistakes and challenges helps people address their own challenges. It\u2019s also a great way to give back.<\/p>\n

Gee: What are your suggestions for people moving into Cybersecurity from a different domain?<\/strong><\/h3>\n

David:<\/strong>. Cybersecurity is such a vast industry, there are so many different types of roles you can do. If you are in a connected part of technology, lets say networking, that\u2019s incredibly relevant for security. If you worked in application development and worked in coding, that\u2019s really useful for security, particularly in the vulnerability space.<\/p>\n

There is a Cybersecurity aspect is to every part of IT. It\u2019s not just Firewall and Anti-Virus anymore. We are looking at how a device authenticates to the network, how a user interacts with that device and how they access applications. A good grounding in Information Technology would be very relevant. An understanding of Product Marketing and technical writing can also be relevant\u2026there are so many skillsets that can be adapted to cybersecurity. And the industry needs them.<\/p>\n

For somebody starting out, my advice would be to get really curious. Think about what aspect of the industry that fascinates you, and start from there. We should never be scared to think outside of the box.<\/p>\n

We\u2019d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Secure on social!<\/em><\/p>\n

Cisco Secure Social Channels<\/strong><\/p>\n

Instagram<\/a><\/strong>Facebook<\/a><\/strong>Twitter<\/a><\/strong>LinkedIn<\/a><\/strong><\/p>\n

\n\t\tShare<\/p>\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n
Share:<\/div>\n
\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n

\u00a0\u00a0Gee interviews David, a hiring manager, to discuss why he looks for skills \u201coutside of the box\u201d, his mentoring experience, and more.\u00a0\u00a0Read More<\/a>\u00a0Cisco Blogs\u00a0<\/p>\n

<\/p>\n","protected":false},"author":0,"featured_media":1482,"comment_status":"","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[],"class_list":["post-1481","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cisco-learning"],"yoast_head":"\nIt\u2019s \u201cby mistake\u201d \u2013 How I got into Cybersecurity Gee Mohanty on October 25, 2023 at 12:00 pm - JHC<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jacksonholdingcompany.com\/its-by-mistake-how-i-got-into-cybersecurity-gee-mohanty-on-october-25-2023-at-1200-pm\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"It\u2019s \u201cby mistake\u201d \u2013 How I got into Cybersecurity Gee Mohanty on October 25, 2023 at 12:00 pm\" \/>\n<meta property=\"og:description\" content=\"Welcome to the Cisco Women in Cybersecurity\u2019s blog series, where we highlight the stories of the mentors who have inspired and advocated for the careers of those in our community. This series seeks t\u2026 Read more on Cisco Blogs \u200b Welcome to the Cisco Women in Cybersecurity\u2019s blog series, where we highlight the stories of the mentors who have inspired and advocated for the careers of those in our community. This series seeks to show the importance of allyship, connection,\u00a0 and how different the journeys can be into a career in cybersecurity. \u201cIt\u2019s by mistake.\u201d That\u2019s what I thought when I first got a call from the recruiter for the Customer Success Manager role at Cisco. Having spent 10 years in software, I didn\u2019t think I had the relevant experience or expertise in cybersecurity. But one conversation with my first hiring manager changed all that. I recently sat down with that manager, David Salter, and we talked about why he looks for skills \u201coutside of the box\u201d, and the benefits that different backgrounds and experiences bring to the cybersecurity industry. Gee:\u00a0Why do you encourage having people from other backgrounds? David: \u00a0The whole [customer success] team was, and is, built on complementary skills. We had strong technical people. We also had strong leaders and program managers. Everyone brought different skillsets to achieve our core aim of truly understanding the customers\u2019 challenges. Because we all had different skillsets, we would work together, and with the customer, to resolve their challenges. We can teach security and technology. But those core people skills, and customer interaction skills, are at the heart of what we do. Gee: For a job posting there are minimum qualifications, then preferred qualifications. In countries like India, there is a lot of competition, so ticking all the boxes in the job description is tough. What influenced your hiring decision to hire me? David:\u00a0You were 1 out of over 1200 candidates for this position, so yes, the competition was incredibly tough. I remember that you had a lot of the skills we were looking for, but really, it was all about that first conversation we had. \u00a0It was a very natural conversation which, when working in Customer Success, is incredibly important. Every conversation we have with the customer is an opportunity to share and listen. The conversation was\u00a0powerful. It\u00a0was an easy decision to shortlist you, based on you as a whole person, rather than the specific checklist listed in the job description. Gee: You do a lot of mentoring. Why is this important for you? David: I benefitted a lot early in career from mentors myself. As I moved into leadership, I discovered it\u2019s not about telling people what to do. It\u2019s about creating an open learning environment. If I share what I know, in an open and honest environment, that encourages others to share, and I learn something new every time. I still believe that I\u2019ve got new things to learn\u00a0every day. Mentoring helps me with that, as much as (I hope) it helps the people I\u2019m mentoring. Sharing my own mistakes and challenges helps people address their own challenges. It\u2019s also a great way to give back. Gee: What are your suggestions for people moving into Cybersecurity from a different domain? David:. Cybersecurity is such a vast industry, there are so many different types of roles you can do. If you are in a connected part of technology, lets say networking, that\u2019s incredibly relevant for security. If you worked in application development and worked in coding, that\u2019s really useful for security, particularly in the vulnerability space. There is a Cybersecurity aspect is to every part of IT. It\u2019s not just Firewall and Anti-Virus anymore. We are looking at how a device authenticates to the network, how a user interacts with that device and how they access applications. A good grounding in Information Technology would be very relevant. An understanding of Product Marketing and technical writing can also be relevant\u2026there are so many skillsets that can be adapted to cybersecurity. And the industry needs them. For somebody starting out, my advice would be to get really curious. Think about what aspect of the industry that fascinates you, and start from there. We should never be scared to think outside of the box. We\u2019d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Secure on social! Cisco Secure Social Channels InstagramFacebookTwitterLinkedIn Share Share: \u00a0\u00a0Gee interviews David, a hiring manager, to discuss why he looks for skills \u201coutside of the box\u201d, his mentoring experience, and more.\u00a0\u00a0Read More\u00a0Cisco Blogs\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jacksonholdingcompany.com\/its-by-mistake-how-i-got-into-cybersecurity-gee-mohanty-on-october-25-2023-at-1200-pm\/\" \/>\n<meta property=\"og:site_name\" content=\"JHC\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-25T19:06:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/10\/16386298-hCk1uh.gif\" \/>\n\t<meta property=\"og:image:width\" content=\"1\" \/>\n\t<meta property=\"og:image:height\" content=\"1\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/gif\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/its-by-mistake-how-i-got-into-cybersecurity-gee-mohanty-on-october-25-2023-at-1200-pm\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/its-by-mistake-how-i-got-into-cybersecurity-gee-mohanty-on-october-25-2023-at-1200-pm\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"It\u2019s \u201cby mistake\u201d \u2013 How I got into Cybersecurity Gee Mohanty on October 25, 2023 at 12:00 pm\",\"datePublished\":\"2023-10-25T19:06:26+00:00\",\"dateModified\":\"2023-10-25T19:06:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/its-by-mistake-how-i-got-into-cybersecurity-gee-mohanty-on-october-25-2023-at-1200-pm\/\"},\"wordCount\":799,\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/its-by-mistake-how-i-got-into-cybersecurity-gee-mohanty-on-october-25-2023-at-1200-pm\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/10\/16386298-hCk1uh.gif\",\"articleSection\":[\"Cisco: Learning\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/its-by-mistake-how-i-got-into-cybersecurity-gee-mohanty-on-october-25-2023-at-1200-pm\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/its-by-mistake-how-i-got-into-cybersecurity-gee-mohanty-on-october-25-2023-at-1200-pm\/\",\"name\":\"It\u2019s \u201cby mistake\u201d \u2013 How I got into Cybersecurity Gee Mohanty on October 25, 2023 at 12:00 pm - JHC\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/its-by-mistake-how-i-got-into-cybersecurity-gee-mohanty-on-october-25-2023-at-1200-pm\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/its-by-mistake-how-i-got-into-cybersecurity-gee-mohanty-on-october-25-2023-at-1200-pm\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/10\/16386298-hCk1uh.gif\",\"datePublished\":\"2023-10-25T19:06:26+00:00\",\"dateModified\":\"2023-10-25T19:06:26+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/its-by-mistake-how-i-got-into-cybersecurity-gee-mohanty-on-october-25-2023-at-1200-pm\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jacksonholdingcompany.com\/its-by-mistake-how-i-got-into-cybersecurity-gee-mohanty-on-october-25-2023-at-1200-pm\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/its-by-mistake-how-i-got-into-cybersecurity-gee-mohanty-on-october-25-2023-at-1200-pm\/#primaryimage\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/10\/16386298-hCk1uh.gif\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/10\/16386298-hCk1uh.gif\",\"width\":1,\"height\":1},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/its-by-mistake-how-i-got-into-cybersecurity-gee-mohanty-on-october-25-2023-at-1200-pm\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jacksonholdingcompany.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"It\u2019s \u201cby mistake\u201d \u2013 How I got into Cybersecurity Gee Mohanty on October 25, 2023 at 12:00 pm\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"name\":\"JHC\",\"description\":\"Your Business Is Our Business\",\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\",\"name\":\"JHC\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"width\":452,\"height\":149,\"caption\":\"JHC\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"It\u2019s \u201cby mistake\u201d \u2013 How I got into Cybersecurity Gee Mohanty on October 25, 2023 at 12:00 pm - JHC","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jacksonholdingcompany.com\/its-by-mistake-how-i-got-into-cybersecurity-gee-mohanty-on-october-25-2023-at-1200-pm\/","og_locale":"en_US","og_type":"article","og_title":"It\u2019s \u201cby mistake\u201d \u2013 How I got into Cybersecurity Gee Mohanty on October 25, 2023 at 12:00 pm","og_description":"Welcome to the Cisco Women in Cybersecurity\u2019s blog series, where we highlight the stories of the mentors who have inspired and advocated for the careers of those in our community. This series seeks t\u2026 Read more on Cisco Blogs \u200b Welcome to the Cisco Women in Cybersecurity\u2019s blog series, where we highlight the stories of the mentors who have inspired and advocated for the careers of those in our community. This series seeks to show the importance of allyship, connection,\u00a0 and how different the journeys can be into a career in cybersecurity. \u201cIt\u2019s by mistake.\u201d That\u2019s what I thought when I first got a call from the recruiter for the Customer Success Manager role at Cisco. Having spent 10 years in software, I didn\u2019t think I had the relevant experience or expertise in cybersecurity. But one conversation with my first hiring manager changed all that. I recently sat down with that manager, David Salter, and we talked about why he looks for skills \u201coutside of the box\u201d, and the benefits that different backgrounds and experiences bring to the cybersecurity industry. Gee:\u00a0Why do you encourage having people from other backgrounds? David: \u00a0The whole [customer success] team was, and is, built on complementary skills. We had strong technical people. We also had strong leaders and program managers. Everyone brought different skillsets to achieve our core aim of truly understanding the customers\u2019 challenges. Because we all had different skillsets, we would work together, and with the customer, to resolve their challenges. We can teach security and technology. But those core people skills, and customer interaction skills, are at the heart of what we do. Gee: For a job posting there are minimum qualifications, then preferred qualifications. In countries like India, there is a lot of competition, so ticking all the boxes in the job description is tough. What influenced your hiring decision to hire me? David:\u00a0You were 1 out of over 1200 candidates for this position, so yes, the competition was incredibly tough. I remember that you had a lot of the skills we were looking for, but really, it was all about that first conversation we had. \u00a0It was a very natural conversation which, when working in Customer Success, is incredibly important. Every conversation we have with the customer is an opportunity to share and listen. The conversation was\u00a0powerful. It\u00a0was an easy decision to shortlist you, based on you as a whole person, rather than the specific checklist listed in the job description. Gee: You do a lot of mentoring. Why is this important for you? David: I benefitted a lot early in career from mentors myself. As I moved into leadership, I discovered it\u2019s not about telling people what to do. It\u2019s about creating an open learning environment. If I share what I know, in an open and honest environment, that encourages others to share, and I learn something new every time. I still believe that I\u2019ve got new things to learn\u00a0every day. Mentoring helps me with that, as much as (I hope) it helps the people I\u2019m mentoring. Sharing my own mistakes and challenges helps people address their own challenges. It\u2019s also a great way to give back. Gee: What are your suggestions for people moving into Cybersecurity from a different domain? David:. Cybersecurity is such a vast industry, there are so many different types of roles you can do. If you are in a connected part of technology, lets say networking, that\u2019s incredibly relevant for security. If you worked in application development and worked in coding, that\u2019s really useful for security, particularly in the vulnerability space. There is a Cybersecurity aspect is to every part of IT. It\u2019s not just Firewall and Anti-Virus anymore. We are looking at how a device authenticates to the network, how a user interacts with that device and how they access applications. A good grounding in Information Technology would be very relevant. An understanding of Product Marketing and technical writing can also be relevant\u2026there are so many skillsets that can be adapted to cybersecurity. And the industry needs them. For somebody starting out, my advice would be to get really curious. Think about what aspect of the industry that fascinates you, and start from there. We should never be scared to think outside of the box. We\u2019d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Secure on social! Cisco Secure Social Channels InstagramFacebookTwitterLinkedIn Share Share: \u00a0\u00a0Gee interviews David, a hiring manager, to discuss why he looks for skills \u201coutside of the box\u201d, his mentoring experience, and more.\u00a0\u00a0Read More\u00a0Cisco Blogs\u00a0","og_url":"https:\/\/jacksonholdingcompany.com\/its-by-mistake-how-i-got-into-cybersecurity-gee-mohanty-on-october-25-2023-at-1200-pm\/","og_site_name":"JHC","article_published_time":"2023-10-25T19:06:26+00:00","og_image":[{"width":1,"height":1,"url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/10\/16386298-hCk1uh.gif","type":"image\/gif"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jacksonholdingcompany.com\/its-by-mistake-how-i-got-into-cybersecurity-gee-mohanty-on-october-25-2023-at-1200-pm\/#article","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/its-by-mistake-how-i-got-into-cybersecurity-gee-mohanty-on-october-25-2023-at-1200-pm\/"},"author":{"name":"","@id":""},"headline":"It\u2019s \u201cby mistake\u201d \u2013 How I got into Cybersecurity Gee Mohanty on October 25, 2023 at 12:00 pm","datePublished":"2023-10-25T19:06:26+00:00","dateModified":"2023-10-25T19:06:26+00:00","mainEntityOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/its-by-mistake-how-i-got-into-cybersecurity-gee-mohanty-on-october-25-2023-at-1200-pm\/"},"wordCount":799,"publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/its-by-mistake-how-i-got-into-cybersecurity-gee-mohanty-on-october-25-2023-at-1200-pm\/#primaryimage"},"thumbnailUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/10\/16386298-hCk1uh.gif","articleSection":["Cisco: Learning"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/jacksonholdingcompany.com\/its-by-mistake-how-i-got-into-cybersecurity-gee-mohanty-on-october-25-2023-at-1200-pm\/","url":"https:\/\/jacksonholdingcompany.com\/its-by-mistake-how-i-got-into-cybersecurity-gee-mohanty-on-october-25-2023-at-1200-pm\/","name":"It\u2019s \u201cby mistake\u201d \u2013 How I got into Cybersecurity Gee Mohanty on October 25, 2023 at 12:00 pm - JHC","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/its-by-mistake-how-i-got-into-cybersecurity-gee-mohanty-on-october-25-2023-at-1200-pm\/#primaryimage"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/its-by-mistake-how-i-got-into-cybersecurity-gee-mohanty-on-october-25-2023-at-1200-pm\/#primaryimage"},"thumbnailUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/10\/16386298-hCk1uh.gif","datePublished":"2023-10-25T19:06:26+00:00","dateModified":"2023-10-25T19:06:26+00:00","breadcrumb":{"@id":"https:\/\/jacksonholdingcompany.com\/its-by-mistake-how-i-got-into-cybersecurity-gee-mohanty-on-october-25-2023-at-1200-pm\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jacksonholdingcompany.com\/its-by-mistake-how-i-got-into-cybersecurity-gee-mohanty-on-october-25-2023-at-1200-pm\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/its-by-mistake-how-i-got-into-cybersecurity-gee-mohanty-on-october-25-2023-at-1200-pm\/#primaryimage","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/10\/16386298-hCk1uh.gif","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/10\/16386298-hCk1uh.gif","width":1,"height":1},{"@type":"BreadcrumbList","@id":"https:\/\/jacksonholdingcompany.com\/its-by-mistake-how-i-got-into-cybersecurity-gee-mohanty-on-october-25-2023-at-1200-pm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jacksonholdingcompany.com\/"},{"@type":"ListItem","position":2,"name":"It\u2019s \u201cby mistake\u201d \u2013 How I got into Cybersecurity Gee Mohanty on October 25, 2023 at 12:00 pm"}]},{"@type":"WebSite","@id":"https:\/\/jacksonholdingcompany.com\/#website","url":"https:\/\/jacksonholdingcompany.com\/","name":"JHC","description":"Your Business Is Our Business","publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jacksonholdingcompany.com\/#organization","name":"JHC","url":"https:\/\/jacksonholdingcompany.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","width":452,"height":149,"caption":"JHC"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/1481","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/comments?post=1481"}],"version-history":[{"count":0,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/1481\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media\/1482"}],"wp:attachment":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media?parent=1481"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/categories?post=1481"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/tags?post=1481"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}