Key To A Successful Cybersecurity Career At Agio
In the spirit of National Cybersecurity Awareness Month, weย gatheredย membersย from Agio’sย trailblazingย cybersecurity team to understand what drives their success. Here, theyย discuss industry challenges and rewards,ย theirย unique backgrounds,ย and howย together theyโre working to make the world moreย secure.ย ย
In what profession or field did you work prior to entering cybersecurity?
Carrie Bowers, Director ofย Extendedย Detection &ย Response:ย I started out as a counterintelligence agent in the U.S. Army for eight yearsโenlisting after 9/11. When I left the military, I moved into nursing. I workedย as a home nurse aide providing dignified end-of-life care while studying to be a physician assistant. After a few years, I found my way into cybersecurity.ย
Eva Lorenz, Senior Cybersecurity Consultant:ย I worked as a researcher in genomics, studying the genetic modifier of environmental lung diseases and developing models for studying such diseases. As part of the training and work I worked with a lot with NIH-maintained databases, did 3-D modeling of proteins, and regularlyย submitted jobs to organizations such as CERN that had the computing power most universities could not afford back then.ย
Seamus OโReilly, Associate Director of Cybersecurity Testing:ย I started off as a Desktop Technician building desktops and PCs.ย I quickly moved into networking and building large enterprise networks, and after five years as a senior network engineer delivering service to Hospital Trusts and Local Government, I took a leap of faith and moved into Government Contracting, which ultimately led to my career in cybersecurity.ย ย
Clark Rahman, Cybersecurity Consultant:ย My first job out of college was as an Account Manager selling IT services and equipment to businesses for an Internet Service Provider. I was also an IT specialist within the Army Reservesย whichย provided a great foundation to build on before I transitioned to cybersecurity. This all fed intoย my eventualย cybersecurityย careerย and helped me understand certainย industryย aspects I wouldnโt have known if I had not gone down this path.ย
Gina Yacone, Senior Cybersecurity Consultant: For close to 14 years, I worked as a licensed private investigator for a law firm in Tampa, FL.ย In that role, I specialized in high-profile, complex, trial litigation.ย I worked on hundreds of cases, mainly in criminal defense. I had the honor of factually working up cases, proving and disproving the legal theories of the case based on facts. I successfully obtained critical evidence by interviewing witnesses, conducting exhaustive research, and analyzing documentary evidence. My goal was to leave no stone left unturned. My favorite parts of case investigations were the human elements, how fast things moved, the puzzles, and jury selection.ย
Shelly Harvill, Business Development Manager:ย I spent the first several years of my career inย radiology on the patient care side as a Radiology and MRI Technologist. I alsoย workedย with organizations like GE Healthcare and Cerner Corporation in the strategy and implementation of clinical information systems.ย
Cathyย Olieslaeger, Customer Success Manager:ย I worked in telecommunications at Belgacom and Orange Business Services which led toย global communications at Orange and Verizon Business. Back in those days I sold Frame Relay services, then MPLS and all the integrations that came with the explosion of the internet as a business platform.ย
Kirk Samuels, Executive Directorย of Cybersecurity:ย Prior to working in cybersecurity, like many others I worked in information technology.ย My career evolved from general IT support, to network, systems, and database administration, to web and ecommerce management. Throughout my IT career, cybersecurity became more and more important as the potential impact that attackers had on systems grew.ย
Olivia Stone, Program Manager:ย I was previously in the Elevator Manufacturing Industry, working as aย Manager of Project Engineering within Research and Innovation.ย
Learn More
ย 
How were you introduced to the cybersecurity industry?ย
Clark:ย Through the military. As an Army Reservist who was an IT specialist at the time, this new branch of the Army, โThe Cyber Corpsโ was created when I returned from Afghanistan in 2014. I knew I wanted to get into a more technical field than what I was studying in college and what I was doing in the Army, so I applied and was accepted to become a Cyber Operator. The Army then put me through a tough pipeline of courses that began my cybersecurity career, leading to a Senior Cybersecurity Analyst role supporting Special Operations Command (SOCOM) within my civilian career.ย
Gina:ย I was introduced to a technology recruiter who told me to explore being a cybersecurity professional. He stated that there were not enough women in the industry, and he thought I could be a trailblazer. My goal is that I make him proud, and I hope to become a trailblazer to the future women in our industry.ย
Carrie:ย My interest in cybersecurity really sparked while in the military. On one deployment I worked in an intelligence fusion cell where I was exposed to different technologies and special access programs that were cyber-focused and very fascinating to me. I also found that the counterintelligence investigations I conducted were becoming more cybersecurity related.ย ย ย ย ย
Eva:ย As part of my law school curriculum, I did an internship for the University Counsel at UNC-CH and was assigned, among other projects, a policy research project for the IT Security office. Based on the presentation, I was offered a job to work on compliance and act as a go-between IT Security and University Counsel.ย
Kirk:ย Throughout my IT career, cybersecurity became more and more important as the potential impact that attackers had on systems grew. As is still the case today, many organizations wrongly believed cybersecurity is solely the responsibility of IT. While working for a large ecommerce company I took on responsibility to oversee our PCI compliance to secure our customersโ credit card data.ย This along with other activities to secure our web sitesย piquedย my interest in cyber and led me to wanting to focus on it.ย
Seamus:ย While in Government Contracting, I held and maintainedย UK and NATO Security Clearance. I started working on larger projects, designing and securing critical infrastructure and after a combined 10 years working in this space, I moved into mainstream private cybersecurity, take roles as compliance officer, SOC Manager, Senior Research Engineer and finally a position as Security Manager of list X site.ย
What skills from your previous professional roles proved most valuable in cybersecurity?ย
Gina:ย Research, writing and presenting skills are part of my day-to-dayย responsibilities.ย The abilityย to communicate is a powerful tool to have. Itโs vital to be able to speak and write clearly on cybersecurity strategyย and policy to individuals of different levels of technical competencies. Additionally, for me, having a background in legal allows me to translate risk well to business leaders.ย
Oliva:ย The ability to understand and communicate technical information across different levels of technical knowledge is a skill I workedย hardย to hone as I transitioned from more technical roles to project management. In cybersecurityย โ andย here at Agio specificallyย โย clientsย often have multiple service offerings and comprehending howย theyย interconnect is beneficial. Also, attention to detail andย problem-solvingย are critical.ย ย ย
Carrie:ย Intelligence analysis, as well asย technical report writing experienceย haveย proved helpfulย โย same skills, different data sets. Leadership experienceย andย trainingย areย alsoย very useful. Understanding how to take care of your people, prioritize tasks and manage time are universally valuable in any role.ย Additionally, empathy skills honed from working in healthcare are part of that universal toolkit,ย along with being able to build strong teams that can work as a cohesive unit.ย
Eva:ย Conceptional thinking, the ability to research items and work independently,ย technical writing,ย and figuring out how applications work.ย
What new skills did you have to learn?ย
Seamus:ย Attention to detail.ย Being able to design and build secure and reliable systemsย โ orย break into (hack) some of the worldโs most secure systemsย โ requiresย time, effort and motivation.ย But without attention to detail andย the ability toย find that one small insignificant control or incorrectly configured systems is whatย allowsย meย (and my team)ย to stay in the game.ย ย ย
Carrie:ย Besides becoming technically proficient in multiple cybersecurity toolsย andย platforms,ย the biggest skill to hone was effective business communications. Itโsย truly aย test of your knowledge when you can takeย complex, extremely technical information and synthesize it into actionable intelligence to any audience at any elevation.ย
Shelly:ย Moving into cybersecurity I had to learn the terminology and compliance drivers (requirements) such as the HIPAA Security Rule and how a cybersecurity program meets those requirements.ย ย ย
Cathy: I learned so much over the yearsย working with Agio! I learned about the various security and compliance frameworks (NIST, PCI, HIPAA, SEC, NY DFS, GDPR, CCPA, HITRUST, etc.);ย how to tailor our security solutions to our clientsโ unique makeup (vertical, size, complexity, internal IT and security resources, security maturity, risk tolerance, business priorities and budget); andย I constantly learn new things about security operations and theย ever-evolvingย threat landscape and security technology. The alphabet soup keeps growing and my head keeps spinning. Never a dull moment is an understatement in cybersecurity.ย
Whatโs your advice to individuals considering a career in cybersecurity?ย
Seamus:ย Do it.ย There is noย โwax on,ย wax offโย for who is going to be a good pen-tester or ifย you willย like cybersecurity.ย But if you wake up in the morning and the first thing you think about is protecting people from malicious actors and threats, then do it.ย We all have one life, live it. None of us are getting out alive.ย
Kirk:ย I recommend getting exposure to all areas to figure out what most appeals to you.ย If youโre more technical,ย thenย pen testing, forensics, or threat hunting may be a good choice. If youโre more organizationally focused, policy and governanceย may beย interestingย areas toย focus on.ย
Gina:ย Network, network, network! Go to conferences, connect with people on social media, join cybersecurity professional organizations. Not onlyย can your networkย be vital to your professional success, but it also helps you stayย up to dateย on industry trends and new technology.ย ย ย
Cathy:ย Imposter syndrome is a real thing in cybersecurity. Everybody starts with little or no knowledge or experience in cybersecurity and sometimes the climb or the โbreaking intoโ cybersecurity seems very daunting. As you apply for a role in cybersecurity, donโt underestimate or negate your education or work experience of any kind. Skills like communication, collaboration, empathy, listening, investigative and critical thinkingย andย self-awarenessย are critical. Your ability to build trust with your colleagues and customers is the most important quality you can bring to the table.ย

What is most rewarding about working in cybersecurity?ย
Seamus:ย Every day I make a difference, I protect people, I keep familiesย safe,ย and I stop businesses from going under, by being the best I can be.ย I find holes that the bad guys are going toย useย and I help your teams patch them.ย
Clark:ย I enjoy the constant challenge of the always evolving cybersecurity field. Being able to solve problems and help others prepare toย defendย againstย something that may not even exist yet but has the potential to cause significant financial and reputation damage is a rewarding feeling. I love learning and despise becoming complacent, so cybersecurity meets my needs by continuing to feed my appetite for more.ย
Carrie:ย Helping people. Iโve always found myself drawn to fields focused on serving others and helping them with important issues. Itโs a fast-paced and stressful line of work to be in, but also immensely rewarding to know you had a positive impact through the hard work and dedication you put into your job every single day.ย
Shelly:ย I take immense pride in the work our Agio Cybersecurity Government team does in educating and securing ourย clientsโย everyย day,ย andย knowing that on the other end of our work there is a customer, consumer,ย or patient whose life or data is more secure today because we did our job.ย
ย Agio is hiring! If youโre looking to evolve your cybersecurity career, find our more about our open positions, benefits, and culture here.ย
Learn More
Share post
Featured Posts
Connect with us.
Need a solution? Want to partner with us? Please complete the fields below to connect with a member of our team.