Skip to content
Updated: 21 min read

Cybersecurity Career Path - From Security Analyst to CISO

Complete cybersecurity career path. From Security Analyst through Pentester and Security Engineer to CISO — discover roles, skills, certifications and salaries.

Łukasz Szymański Author: Łukasz Szymański

If you’re considering entering the cybersecurity industry or already work in it and are wondering how to develop your career, this article is for you. In no other IT segment does demand for specialists exceed supply to the extent it does in security. The skills gap grows every year, salaries in 2026 are amongst the highest in the entire industry, and development paths are diverse — you can specialise in defence (blue team), attack (red team), risk management, regulatory compliance or security architecture.

In practice, however, many people don’t know where to start, what roles await at different career stages and what skills and certifications genuinely open the next doors. The cybersecurity industry differs from typical development or DevOps paths — it requires not only technical knowledge, but also understanding of business context, legal regulations and the psychology of attackers. This article presents a complete career map from the first steps as a Security Analyst to the CISO position — with specific roles, skills, certifications and realistic salary ranges in the Polish market.

Why is cybersecurity the fastest-growing career path in IT?

Let’s begin with a fundamental question: why consider a career in cybersecurity right now? There are several reasons, mutually reinforcing.

Demand dramatically exceeds supply. According to the ISC2 Cybersecurity Workforce Study report from 2025, the global talent gap in cybersecurity exceeds 4 million specialists. In Poland, as in most European markets, the situation is similar — companies are desperately searching for experienced security professionals, often unsuccessfully. This directly translates into salaries and working conditions. Companies compete for available specialists, giving candidates a negotiating position incomparable with most other IT specialisations.

Regulations enforce security investments. The NIS2 Directive, which came into force in Poland in 2024, imposes cybersecurity obligations on thousands of organisations — from risk management to the obligation to report incidents. The DORA Regulation for the financial sector, growing GDPR and ISO 27001 compliance requirements — all this generates structural demand for specialists who can understand and implement these requirements. This isn’t a trend that will pass — regulations will only tighten in the coming years.

Attacks are becoming increasingly sophisticated. Ransomware-as-a-Service, supply chain attacks on software, the use of AI by attackers — contemporary cyber threats require advanced defence. Companies realise they cannot afford weak security. One serious incident can cost an organisation millions of pounds in business losses, regulatory fines and reputation damage. This means that investments in cybersecurity cease to be perceived as a cost and begin to be treated as essential protection of company value.

Diversity of career paths. Unlike many other IT specialisations, cybersecurity offers a wide range of roles — from deeply technical (pentesting, reverse engineering) through operational (SOC analyst, incident responder) to business-oriented (GRC, CISO). You can be the person who hacks systems with the company’s permission, or the person who builds security policies and talks to the board. This diversity means that practically every competency profile will find something suitable.

What are the key roles in cybersecurity and how do they relate to each other?

The career path in cybersecurity isn’t linear. Unlike the typical progression Junior → Mid → Senior → Lead, in security you have several parallel specialisations to choose from, between which you can move during your career. Below I present the main roles in order of increasing seniority, but remember — some people enter directly at higher levels with experience from other IT areas.

Security Analyst / SOC Analyst (Junior-Mid) is the most common entry point to the industry. The work involves monitoring security logs, analysing alerts from SIEM systems, initial classification of incidents and escalating threats to higher levels. It requires understanding cybersecurity basics, knowledge of tools such as Splunk, QRadar or Microsoft Sentinel, and the ability to distinguish false alarms from genuine threats. In practice, these are roles where you learn through observation and responding to real incidents. Salaries in Poland: 8,000 - 14,000 PLN gross monthly for juniors, 12,000 - 18,000 PLN for mid-levels.

Penetration Tester / Ethical Hacker (Mid-Senior) is a specialist in the offensive approach — testing security through simulated attacks. Pentesters attempt to break into the client’s systems (with consent and in a controlled environment) to find vulnerabilities before real attackers do. This requires deep technical knowledge of networks, operating systems, web applications and exploitation techniques. Key tools include Metasploit, Burp Suite, Nmap, Kali Linux. This is a specialisation where experience and continuous practice are crucial. Salaries: 14,000 - 22,000 PLN gross for mid-levels, 20,000 - 35,000 PLN for seniors with certifications such as OSCP.

Security Engineer (Mid-Senior) is the person responsible for designing, implementing and maintaining security systems and tools. Unlike the Security Analyst who monitors, the Security Engineer builds the protection infrastructure — configures firewalls, implements EDR/XDR systems, automates incident response processes, integrates security tools. It requires a combination of knowledge from security, networks, operating systems and often DevOps/cloud as well. A good Security Engineer can look at a system architecture and identify weak points before they become problems. Salaries: 15,000 - 24,000 PLN gross for mid-levels, 22,000 - 38,000 PLN for seniors.

Security Architect (Senior) is the person who designs the organisation’s overall security architecture — from network segmentation through authentication strategies to identity management policies. The Security Architect works closely with infrastructure and application architects, ensuring that security is built into projects from the start (security by design). This requires broad technical knowledge, experience in many security areas and the ability to view the organisation holistically. A good Security Architect understands not only technology, but also business context and can justify security decisions in terms of risk and business value. Salaries: 25,000 - 45,000 PLN gross.

Security Manager / SOC Manager (Senior-Lead) is a management position responsible for leading a security team or SOC (Security Operations Centre). The Manager deals with building processes, managing incidents at a strategic level, cooperating with other departments and reporting to senior management. This requires both technical knowledge and managerial skills — recruitment, team building, conflict management, business communication. This is a path for people who want to develop towards managing people and processes, not just technology. Salaries: 22,000 - 40,000 PLN gross.

CISO (Chief Information Security Officer) is the highest position in the cybersecurity hierarchy — the person responsible for the organisation’s entire security strategy. The CISO reports directly to the board or CEO, manages the security budget, defines the risk management strategy, oversees regulatory compliance and communicates cyber risk in business terms. This is no longer a purely technical position — the CISO must understand business, finance, law and be able to translate technical threats into language understandable to the board. In large organisations, the CISO manages teams numbering dozens of people. Salaries: 35,000 - 80,000+ PLN gross depending on organisation size.

What technical skills are crucial at different levels?

Each role in cybersecurity requires a different set of technical competencies. The table below shows which skills are essential at different career levels.

LevelTechnical skillsToolsSoft skills
Security AnalystNetwork basics (TCP/IP, DNS, HTTP), Windows/Linux systems, logging and SIEM basics, basic attack techniques (phishing, malware), incident response basicsSplunk, Microsoft Sentinel, QRadar, Wireshark, PowerShell/Bash basicsAnalytical thinking, concentration, written communication (incident documentation)
Penetration TesterAdvanced network knowledge, exploitation techniques, web app security (OWASP Top 10), privilege escalation, post-exploitation, reverse engineering basicsMetasploit, Burp Suite, Nmap, Kali Linux, Cobalt Strike, custom scripting (Python, Bash)Creativity, perseverance, patience, ability to think like an attacker
Security EngineerNetwork security (firewalls, IDS/IPS), endpoint security (EDR/XDR), cloud security (AWS/Azure), SIEM deployment, automation (Python, Ansible), DevSecOpsPalo Alto, Cisco ASA, CrowdStrike, Microsoft Defender, Terraform, GitLab CI/CDPragmatism, ability to balance security and usability, cooperation with DevOps
Security ArchitectEnterprise security architecture, Zero Trust, IAM (Identity and Access Management), security frameworks (NIST, ISO 27001), threat modelling, cloud security architectureEnterprise Architecture tools, AWS/Azure security services, diagram tools, risk assessment frameworksStrategic thinking, stakeholder communication, ability to simplify complexity
Security ManagerBroad technical background, incident management, vendor management, IT security budgeting, security metricsITSM platforms, GRC tools, dashboarding (PowerBI, Tableau), project managementLeadership, delegation, crisis management, negotiation, internal politics
CISOBroad understanding of security technologies, risk management frameworks, compliance and regulations, business continuity, cyber insuranceGRC platforms, board reporting tools, ERP budgeting, threat intelligence platformsStrategic leadership, board communication, change management, politics, business orientation

Note the evolution: at initial levels technical and hands-on skills dominate, whilst at higher levels the importance of strategic, business and managerial skills increases. The CISO must understand technology, but doesn’t spend time analysing logs — instead they translate cyber risk into the language of quarterly financial results.

Which certifications genuinely open doors in a security career?

Certifications in cybersecurity have particular significance — considerably greater than in most other IT areas. The reason is simple: in security, a mistake can cost an organisation millions, which is why companies seek formal confirmation of competence. Below I present key certifications in the order worth obtaining them on the path from junior to CISO.

CompTIA Security+ ($404) is a fundamental entry-level certification. It doesn’t require prior security experience but confirms basic knowledge of threats, cryptography, risk management and compliance. It’s a good starting point for people entering the industry with IT experience (e.g., from helpdesk, network admin, DevOps). In Poland the certification doesn’t have the same significance as in the USA, where it’s often required for government positions, but it provides a solid knowledge foundation. Preparation: 2-3 months of study.

CEH (Certified Ethical Hacker) ($1199) from EC-Council is a certification focused on offensive security — penetration testing and ethical hacking techniques. It covers an extensive range of attack techniques — from reconnaissance through exploitation to post-exploitation. The exam format is multiple choice, which makes CEH easier to obtain than OSCP, but simultaneously less valued by practitioners. Nevertheless, in Poland CEH is often required in job offers for pentester positions, particularly in larger corporations. Preparation: 3-4 months of practice and study.

OSCP (Offensive Security Certified Professional) ($1599 including laboratory access) is a genuine test of practical pentesting skills. The exam format — 24 hours of practical penetration testing in a laboratory, followed by 24 hours to write a report — makes OSCP one of the most demanding and valued certifications in the industry. You won’t pass OSCP by learning theory — you must genuinely be able to hack systems. In the security community, OSCP has cult status. Preparation: 4-6 months of intensive lab practice.

CISSP (Certified Information Systems Security Professional) ($749) from ISC2 is the gold standard in the cybersecurity industry. It requires a minimum of five years of professional experience in at least two of eight security domains (can be reduced to four years by possessing an appropriate certification or education). CISSP isn’t a hands-on technical certification — it’s a management certification, covering risk management, governance, compliance, operational security, architecture and many other areas. CISSP is often required or strongly preferred for Senior Security Engineer, Security Manager and CISO positions. CISSP holders’ salaries are amongst the highest in the entire IT industry. Preparation: 3-6 months for people with experience.

CISM (Certified Information Security Manager) ($575 for ISACA members, $760 for non-members) is a certification from ISACA focused on information security management. Unlike CISSP, which is technically broad, CISM concentrates on managing security programmes, risk management and governance. It’s a natural choice for people heading towards Security Manager or CISO roles. It requires five years of experience in security management. In the financial sector and large corporations, CISM is often valued equally to CISSP. Preparation: 3-5 months.

ISO 27001 Lead Implementer / Lead Auditor (price depends on accredited training centre, usually 3000-5000 PLN for training + exam) are certifications for people specialising in information security management systems. ISO 27001 is an international standard, and the Lead Implementer certificate confirms the ability to implement this standard in an organisation. This is a particularly valuable certification in the context of compliance and governance. Lead Auditor confirms the ability to conduct ISO 27001 audits. Preparation: 1-2 months + accredited training (usually 5 days).

CCSP (Certified Cloud Security Professional) ($599) from ISC2 is a certification for cloud security specialists. It covers cloud security architecture, compliance, data management, application security and incident response in the cloud context. In the era of cloud migration, CCSP is becoming increasingly valued. It requires five years of IT experience, including three years in information security and one year in cloud security. Preparation: 2-4 months for people with cloud experience.

What are realistic salaries at different levels in Poland in 2026?

Salaries in cybersecurity are amongst the highest in the entire IT industry, but vary significantly depending on position, location, company size and certifications held. The table below shows realistic ranges in the Polish market at the beginning of 2026, based on offers from Just Join IT, No Fluff Jobs and Bulldogjob portals.

PositionExperienceSalary (gross/month)Salary with certificationKey certifications
Security AnalystJunior (1-2 years)8,000 - 14,000 PLN10,000 - 16,000 PLNSecurity+, CEH
Security AnalystMid (2-4 years)12,000 - 18,000 PLN14,000 - 20,000 PLNCEH, GCIH
Penetration TesterMid (2-4 years)14,000 - 22,000 PLN18,000 - 26,000 PLNCEH, OSCP
Penetration TesterSenior (4+ years)20,000 - 35,000 PLN25,000 - 40,000 PLNOSCP, OSCE
Security EngineerMid (2-4 years)15,000 - 24,000 PLN18,000 - 27,000 PLNCISSP Associate, cloud certs
Security EngineerSenior (4+ years)22,000 - 38,000 PLN26,000 - 42,000 PLNCISSP, CCSP
Security ArchitectSenior (5+ years)25,000 - 45,000 PLN30,000 - 50,000 PLNCISSP, TOGAF, cloud certs
Security Manager / SOC ManagerSenior (5+ years)22,000 - 40,000 PLN26,000 - 45,000 PLNCISSP, CISM
CISOExecutive (8+ years)35,000 - 80,000+ PLN40,000 - 90,000+ PLNCISSP, CISM

A few contextual notes: salaries in Warsaw are usually 20-30% higher than in other cities. Companies from the financial sector (banks, fintechs), cybersecurity vendors and Big Tech pay significantly more than average. B2B contracts usually give 30-50% higher rates than employment contracts, but of course without benefits. Having a certification isn’t a guarantee of higher remuneration — but in practice, people investing in certifications often also have more experience, which translates into higher ranges.

How do you enter cybersecurity from another IT specialisation?

Good news: you don’t have to start from scratch. Many people transition to cybersecurity from other IT areas, and often their previous experience becomes a tremendous asset. Below I describe typical transition paths.

From development to security. Programming experience is an excellent foundation for many security roles — particularly Application Security Engineer, Security Engineer (automation), Penetration Tester (web apps) and Malware Analyst. You understand how applications work, which makes it easier to identify vulnerabilities. If you were a backend developer, a natural path might be AppSec (application security) or cloud security engineering. If you were full-stack, web application pentesting might be ideal. What to do: participate in CTF (Capture The Flag), take an OWASP Top 10 course, start reading bug bounty reports, obtain CEH or eWPT (eLearnSecurity Web Application Penetration Tester) certification.

From Ops/DevOps to security. Experience in system administration, networks or DevOps is an excellent starting point for Security Engineering, SOC, incident response or cloud security. You understand infrastructure, which is crucial in defence. If you managed Linux, a natural step might be Security Engineer or SOC Analyst. If you worked with AWS/Azure, cloud security engineering or architect awaits. What to do: learn SIEM (Splunk, Sentinel), review the MITRE ATT&CK framework, obtain Security+ or CISSP Associate certification, practise on TryHackMe (Blue Team paths).

From zero to security. If you don’t have previous IT experience, the road will be longer, but not impossible. Security requires fundamental IT understanding — systems, networks, applications — so you must build this foundation. Recommended path: first gain basic IT experience (helpdesk, junior sysadmin, junior network admin) — this will give you genuine infrastructure understanding. Then obtain Security+ and move to a SOC Analyst position. Alternatively, if you prefer an intensive approach: cybersecurity bootcamp + home laboratory + TryHackMe/HackTheBox + Security+ certification. Important: don’t expect to be a pentester after a 3-month bootcamp. Security is knowledge built over years. A bootcamp is an accelerator, not a shortcut.

How does EITT support cybersecurity career development?

At EITT we understand that development in cybersecurity requires a combination of solid theoretical knowledge with intensive practice. Our team of over 500 experts includes security practitioners with active CISSP, OSCP, CEH, CISM certifications and years of practice in SOC, pentesting and security architecture.

We offer complete training paths tailored to career stage:

  • Cybersecurity Fundamentals — for people entering the industry, covering security basics, networks, systems and OWASP Top 10
  • CEH Preparation — intensive hands-on ethical hacking and penetration testing training, leading to Certified Ethical Hacker certification
  • CISSP Preparation — comprehensive review of the eight CISSP domains with emphasis on risk management and governance, for experienced people heading towards senior roles
  • Cloud Security (AWS/Azure) — cloud security, from IAM through network security to compliance, preparing for certifications such as AWS Security Specialty or CCSP
  • Security Architecture — designing enterprise security architecture, threat modelling, Zero Trust, for architects and seniors

Our approach is practice, not theory. Training conducted by EITT includes hands-on laboratories, attack simulations, analysis of real incidents and case studies from trainers’ experiences. We don’t teach security from presentations — we teach by doing. Trainers are practitioners who work in SOC on a daily basis, conduct pentests for clients or manage security in large organisations. They share not only knowledge from textbooks, but also experience from the trenches.

For companies planning to build or develop security teams, we offer development programmes tailored to organisation specifics — from competency gap analysis through designing development paths to support in obtaining certifications. We cooperate with hundreds of organisations in Poland — from banks through telecommunications operators to software houses — helping them build teams capable of defending against contemporary threats. Our previous experience includes over 2500 completed training courses with a quality rating of 4.8/5.

What are the key challenges in a security career that are rarely discussed?

The cybersecurity industry is full of challenges you won’t learn about from job offers or certification descriptions. It’s worth knowing them before you decide on this career path.

Continuous pressure and responsibility. In security there’s no room for error. A missed incident, misconfigured firewall, overlooked vulnerability — every mistake can result in serious consequences for the organisation. The pressure is real, particularly in operational roles (SOC, incident response) and management positions. If you don’t cope well with stress, some security roles may be challenging.

Perpetual technological race. Cybersecurity evolves faster than any other IT area. New attack techniques, new defence tools, new regulations — if you stop learning, within a year your knowledge will become outdated. You must be prepared for continuous learning — reading incident reports, tracking CVE, testing new tools, updating certifications. This isn’t a career where you can rest on your laurels.

Frustration related to compliance over security. In many organisations, security is treated as compliance checklists, not actual defence. You’ll encounter situations where your recommendations are ignored due to budget constraints, internal politics or lack of risk understanding by management. Learning how to communicate risk in business language and building relationships with stakeholders are skills equally important as technical ones.

Burnout in SOC. Work in a Security Operations Centre, particularly on the front line (Tier 1), can be monotonous and exhausting. Monitoring hundreds of alerts daily, most of which are false positives, working in shift patterns (often at night and weekends) — it’s not for everyone. If you’re entering security through SOC, treat it as a stop, not a destination — develop skills and move on.

Frequently asked questions

Can I enter cybersecurity without computer science studies?

Yes. The security industry values experience and certifications more than formal education. Many recognised professionals don’t have computer science degrees — but they have years of practice, certifications and problem-solving ability. If you don’t have IT studies, invest in certifications (Security+, CEH, CISSP) and build a portfolio (own projects, CTF, bug bounty) — this will be your proof of competence.

How long does it take to transition from another IT specialisation to first security job?

For a person with IT experience (e.g., 2-3 years as sysadmin or developer) a realistic time is 6-12 months of intensive learning and preparation — Security+ or CEH certification, practice on TryHackMe/HackTheBox, building a home lab, completing several CTFs. For a person without IT experience, a realistic time is 18-24 months — first IT foundation, then security.

Is pentesting a good entry point to the security industry?

Not for most people. Pentesting requires advanced technical knowledge and practice — it’s rather mid-senior level, not junior. The typical entry point is SOC Analyst or Security Analyst, where you learn defensive security basics. After 2-3 years you can move to pentesting if that interests you. Exception: if you have a strong technical background (e.g., you were a senior developer or network admin) and intensively practise in labs, you can enter directly as a junior pentester.

Is it worth obtaining certifications if I already have security experience?

Yes, particularly CISSP and CISM. These certifications don’t so much teach new technical skills (they assume you already have them) as standardise knowledge and formally confirm competencies. In practice, for Security Manager, Security Architect and CISO positions, certifications such as CISSP are often required or very strongly preferred. It’s not only a question of knowledge — it’s a signal to the market and a negotiating tool.

What are the biggest differences between a security career and development career?

In security you work with continuous uncertainty and pressure — you never know when the next incident will arrive. In development you build — in security you defend. In development success is a working feature — in security success is an incident that didn’t happen (difficult to measure). Security requires broader knowledge — you must understand systems, networks, applications, regulations and attacker psychology. Development allows deeper specialisation. Salaries in security at senior level are higher than in development, but the entry path is more difficult.

Does working in security mean working at night and weekends?

It depends on the role. SOC Analyst often works in shift patterns (24/7 coverage), which means night shifts and weekends. Incident Responder may be on-call (duty), which means readiness to respond at any moment. Security Engineer, Security Architect, pentester, CISO — usually work standard hours (except for incidents or crisis projects). If work-life balance is important to you, avoid first-line SOC and choose project or architectural roles.

What does the future of a security career look like — will AI replace specialists?

No, but it will change the nature of work. AI will automate routine tasks — log analysis, alert classification, initial incident response. This means that the value of security specialists will shift towards tasks requiring creativity, business context and strategy — threat hunting, threat modelling, security architecture, risk management. Juniors will have it harder (fewer routine tasks at entry), but seniors will be even more valuable. Key skills of the future aren’t only technical, but also business-oriented — ability to communicate risk, strategic thinking and ability to adapt.

Next step in your security career with EITT

If you’re considering entering cybersecurity or want to develop your security career, EITT offers comprehensive support — from fundamentals to advanced certifications. Our team of experts will help you design a development path tailored to your experience and goals — whether it’s transitioning from another IT specialisation, preparing for CISSP certification, or developing competencies in pentesting or cloud security.

For companies building or developing cybersecurity teams, we offer training programmes adapted to organisation specifics — from competency gap analysis through designing development paths to support in obtaining certifications. Contact us to find out how we can help you or your team build a career in one of the most dynamic and best-paid IT specialisations.

Read Also

Develop Your Skills

This article is related to the training SC-200T00: Microsoft Security Operations Analyst. Check the program and sign up to develop your skills with EITT experts.

Read also

Request a quote

Develop Your Competencies

Check out our training and workshop offerings.

Request Training
Call us +48 22 487 84 90