career-readiness
The Reality Check
TryHackMe and HackTheBox alone won’t get you hired - but they’re important pieces of the puzzle.
What Platforms Actually Provide
- Hands-on skills training
- Familiarity with security tools
- Problem-solving methodology
- Proof of dedication and self-learning
What They Don’t Provide
- Professional certifications (exception: HackTheBox offers CPTS, CBBH, CDSA)
- Real-world incident response experience
- Understanding of corporate security environments
- Compliance and policy knowledge
Platform Ranking Reality
- Top percentile rankings on platforms aren’t meaningful to employers
- Logging in 15 minutes daily for a few months can put you in the top 5%
- Completing rooms doesn’t prove job readiness
- Employers want to know what you learned, not just what you completed
Entry-Level Job Requirements
SOC Analyst (Tier 1) - Most Accessible Entry Point
The SOC Analyst role is the most widely available entry-level security position. According to HackTheBox’s survey of 11,498 community members, SOC analyst, system administrator, and IT support received the most votes for best entry-level roles.
| Requirement | Details |
|---|---|
| Experience | 0-2 years (internships count) |
| Education | Bachelor’s preferred, but experience can substitute |
| Certifications | Security+, CEH, CCNA, or similar entry-level cert |
| Technical Skills | SIEM tools, network protocols, log analysis |
| Salary Range |
Core Technical Skills Employers Want
Network Knowledge:
- TCP/IP, UDP, ICMP, SNMP
- HTTP, FTP, DNS protocols
- Understanding of network attacks and vectors
Security Tools:
- SIEM platforms (Splunk, ELK, QRadar)
- EDR tools (CrowdStrike, Carbon Black, SentinelOne)
- Network analysis (Wireshark, tcpdump)
- IDS/IPS (Snort, Suricata)
Operating Systems:
- Windows event logs and administration
- Linux command line proficiency
- Basic scripting (Python, Bash, PowerShell)
Soft Skills That Matter
- Analytical thinking
- Attention to detail
- Written communication (for reports)
- Ability to explain technical concepts clearly
The Job-Ready Formula
Based on successful job seekers, you need a combination of these elements:
1. Platform Learning (3-6 months intensive)
TryHackMe Paths to Complete:
- Pre-Security (if no IT background)
- SOC Level 1 (for defensive roles)
- Cyber Defense
- Complete Beginner
HackTheBox Academy Modules:
- Tier 0 and Tier 1 modules (free)
- Incident Handling Process
- Security Monitoring Fundamentals
Key Point: Be able to explain what you learned, not just that you finished it. Interviewers will ask questions like:
- “Walk me through how you’d investigate a suspicious login”
- “What’s your process for triaging an alert?”
- “Explain what Kerberoasting is and how to detect it”
2. At Least One Certification
| Certification | Difficulty | Cost | Employer Recognition |
|---|---|---|---|
| CompTIA Security+ | Entry | ~$400 | Very High (most common requirement) |
| CompTIA CySA+ | Intermediate | ~$400 | High |
| CEH | Intermediate | ~$1,200 | Medium-High |
| HackTheBox CPTS | Advanced | ~$490 | Growing |
| HackTheBox CBBH | Intermediate | ~$490 | Growing |
| OSCP | Advanced | ~$1,600 | Very High (for pentest roles) |
Recommendation: Start with Security+ - it’s the most commonly listed requirement in entry-level job postings.
3. Home Lab Experience
A home lab differentiates you from other candidates who only did CTFs. It shows:
- Real-world understanding
- Self-motivation
- Ability to troubleshoot and configure systems
Basic Home Lab Setup:
Components:- Virtualization: VirtualBox, VMware, or Proxmox- SIEM: Splunk Free, ELK Stack, or Wazuh- Vulnerable VMs: Metasploitable, DVWA, VulnHub machines- Windows AD: Windows Server eval + Windows 10 VMs- Detection: Snort/Suricata, Sysmon
Projects to Document:- Set up Splunk and ingest Windows/Linux logs- Create detection rules for common attacks- Simulate attacks and create incident reports- Build an Active Directory lab and practice attacks4. Portfolio & Documentation
Write-ups:
- Document CTF solutions (methodology, not just answers)
- Explain your thought process
- Include screenshots and tool usage
- Wait appropriate time before publishing (respect platform rules)
GitHub:
- Scripts you’ve written (Python, PowerShell, Bash)
- Detection rules (Sigma, YARA, Snort)
- Automation tools
- Documented home lab configurations
Blog/Notes:
- Explain concepts in your own words
- Document your learning journey
- Share lessons learned
5. Networking & Community
Online:
- LinkedIn connections with security professionals
- TryHackMe Discord (has job posting channel)
- Twitter/X infosec community
- Reddit: r/cybersecurity, r/netsec, r/SecurityCareerAdvice
In-Person:
- Local security meetups
- BSides conferences (affordable, beginner-friendly)
- OWASP chapter meetings
- DEF CON groups (DC groups)
Timeline Expectations
| Starting Point | Realistic Timeline to Entry-Level Job |
|---|---|
| Zero IT background | 12-18 months |
| IT/Helpdesk experience | 6-12 months |
| CS degree, no security focus | 3-6 months focused study |
| Already have Security+ | 1-3 months (add hands-on to resume) |
Sample 12-Month Plan (from zero IT)
Months 1-3: Foundations
- TryHackMe Pre-Security path
- TryHackMe Complete Beginner path
- Study for CompTIA A+ (optional but helpful)
- Learn basic Linux and Windows commands
Months 4-6: Security Fundamentals
- Study for Security+ certification
- TryHackMe SOC Level 1 path
- Start setting up home lab
- Begin networking on LinkedIn/Discord
Months 7-9: Hands-On Skills
- Pass Security+ exam
- Complete TryHackMe Cyber Defense path
- HackTheBox starting point machines
- Document everything in write-ups
Months 10-12: Job Hunt
- Polish resume with projects section
- Apply to SOC Analyst, Security Analyst roles
- Continue learning while applying
- Practice interview questions
How to Present on Resume
Add a “Labs & Projects” Section
LABS & PROJECTS
TryHackMe SOC Level 1 Path (Completed)• Analyzed 500+ security alerts using Splunk SIEM• Performed incident triage and escalation procedures• Tools: Wireshark, Snort, Splunk, TheHive
Home Lab - Security Operations Center• Built SIEM environment using Splunk Free and ELK Stack• Configured Sysmon and Windows Event Forwarding• Created custom detection rules for ransomware indicators• Documented incident response procedures
HackTheBox Machines (15+ completed)• Practiced web exploitation, privilege escalation, AD attacks• Wrote detailed methodology reports for each machine• Ranked in top 20% of active usersWhat NOT to Do
- Don’t just list “TryHackMe - 150 rooms completed”
- Don’t emphasize rankings without context
- Don’t claim expertise you can’t back up in an interview
- Don’t copy/paste write-ups without understanding them
Resume Tips
Do:
- Quantify when possible (number of alerts analyzed, machines completed)
- List specific tools and technologies used
- Explain what you learned, not just what you did
- Tailor to the job description
Don’t:
- Overstate your experience
- Use vague language (“familiar with security concepts”)
- Forget to include soft skills
- Submit the same resume to every job
Interview Preparation
Common Technical Questions
Alert Triage:
- “Walk me through how you’d investigate a phishing alert”
- “What would you do if you saw unusual login activity?”
- “How do you prioritize multiple alerts?”
Tool Knowledge:
- “What SIEM platforms have you used?”
- “How would you search for failed login attempts in Splunk?”
- “What’s the difference between IDS and IPS?”
Concepts:
- “Explain the CIA triad”
- “What is defense in depth?”
- “Describe the incident response lifecycle”
How TryHackMe/HTB Helps
Reference specific rooms and what you learned:
- “In the Splunk room on TryHackMe, I learned to create queries for detecting brute force attacks…”
- “During the HackTheBox Forensics challenges, I practiced analyzing malware samples using…”
- “My home lab mirrors what I learned in the SOC Level 1 path, where I…”
Job Market Reality (2025)
The Good News
- 4.8 million unfilled cybersecurity positions globally (2024)
- 35% projected job growth through 2031 (Bureau of Labor Statistics)
- High demand for entry-level SOC analysts
- Remote work opportunities increasing
The Challenge
- Many “entry-level” jobs list 2-3 years experience
- Competition for truly entry-level roles is high
- Hiring managers receive hundreds of applications
- Breaking in requires standing out
Strategies That Work
Apply Anyway:
- Apply to jobs requiring 1-2 years experience even without it
- Worst case is rejection; best case is an interview
- Your projects and learning can substitute for some experience
Consider Adjacent Roles:
- IT Support / Help Desk (stepping stone)
- System Administrator
- Network Administrator
- GRC Analyst (governance, risk, compliance)
Internships:
- Many companies hire interns with less experience
- Can lead to full-time offers
- Good for building real-world experience
Contract/Temp Work:
- Staffing agencies place entry-level security roles
- Short-term contracts can become permanent
- Builds resume experience quickly
Success Stories
Example 1: Bank of America Malware Analyst
- Background: No degree, no prior certifications
- Timeline: 4 years of full-time self-study
- Platforms used: TryHackMe, HackTheBox, PicoCTF, Crackmes.one, Udemy
- Key factors: Deep focus on reverse engineering, extensive practice
Example 2: Common Path
Many successful candidates report:
- 6-12 months of dedicated study
- Security+ certification
- 1-2 completed learning paths
- Home lab with documented projects
- 50-100+ job applications before landing first role
Checklist: Are You Ready to Apply?
Minimum Viable Candidate:
- 1+ completed learning path (SOC Level 1, Cyber Defense, etc.)
- 1 entry-level certification (Security+ recommended)
- Home lab or personal projects you can discuss
- Write-ups or documentation of your learning
- Ability to explain how you’d approach a real alert/incident
- Updated LinkedIn with connections in the field
- Resume tailored to security roles
Don’t Wait for Perfect:
- You’ll never feel “ready enough”
- Start applying at 60-70% of this list
- Many entry-level jobs train on their specific tools
- Rejection is feedback, not failure
- Every interview is practice
Key Takeaways
- Platforms are training tools, not job tickets - They’re necessary but not sufficient
- Certifications matter - Security+ is the most common entry requirement
- Home labs differentiate you - Show you can apply knowledge beyond CTFs
- Document everything - Write-ups, GitHub, blog posts prove your skills
- Network actively - Many jobs come through connections, not applications
- Apply before you’re ready - The cybersecurity talent shortage is real
- Combine multiple approaches - TryHackMe + certs + home lab + networking = success
Sources
- How I Landed A Job In Cyber Security With No Experience
- TryHackMe On Resume: How To List Platform Mastery
- SOC Analyst Career Guide: Roles, Tiers, Salaries 2025
- 4 of the Best Entry-Level Cybersecurity Jobs - HackTheBox
- How to Transition Into a Cybersecurity Career in 2025
- 7 Entry-Level Careers in Cyber Security - TryHackMe
- Are TryHackMe courses enough to get a job?