Resume

My Journey to Cybersecurity: From Biotechnology Student to Aspiring Security Professional

Posted by Onyebuchi Iyase | January 16, 2026

The Unexpected Path

When people ask me how I got into cybersecurity, they’re often surprised by my answer. With a Bachelor’s degree in Biotechnology from Rutgers and Pre-Medicine studies at Essex County College, my career path wasn’t exactly conventional. But that’s what I love about cybersecurity—it welcomes diverse thinkers and rewards curiosity.

My journey began during my undergraduate years when I became fascinated by how healthcare systems managed sensitive patient data. I started researching data breaches in healthcare, reading about vulnerabilities in electronic health record systems, and learning about the catastrophic consequences when security fails. What started as academic curiosity evolved into genuine passion.

I realized something important: the analytical skills I was developing in biotechnology—hypothesis testing, systematic problem-solving, attention to detail—were exactly what cybersecurity needed.

Making the Leap

After completing my degree, I faced a choice: continue down the healthcare path or pursue this growing interest in security. I chose security, but I knew I needed to prove myself in a field where I had no professional experience.

So I built a roadmap:

Step 1: Build Foundational Knowledge

  • Earned CompTIA Security+ to validate my understanding of security fundamentals
  • Obtained ISC² Certified in Cybersecurity (CC) credential
  • Enrolled in a Master’s program in Cybersecurity and Information Assurance

Step 2: Develop Practical Skills

  • Joined TryHackMe in April 2025 and committed to daily practice
  • Started working through Hack The Box machines to develop offensive security skills
  • Built a home lab to experiment with security tools and techniques

Step 3: Apply Knowledge Through Projects

  • Created automated security scanning tools using Python
  • Conducted vulnerability assessments on intentionally vulnerable applications
  • Documented findings in professional penetration testing reports

Each certification and completed challenge wasn’t just a box to check—it represented late nights of study, frustration when exploits didn’t work, and the satisfaction of finally understanding complex concepts.

Learning Through Doing: My TryHackMe Journey

Since joining TryHackMe, I’ve completed over 38+ rooms covering everything from basic Linux fundamentals to advanced Active Directory attacks. Currently ranked in the top 10% of users, I’ve focused on building well-rounded skills:

Offensive Security:

  • Web application penetration testing
  • Network exploitation and privilege escalation
  • Password cracking and credential attacks
  • Post-exploitation techniques

Defensive Security:

  • Security monitoring and SIEM analysis
  • Incident response fundamentals
  • Digital forensics basics
  • Security operations center (SOC) workflows

What I’ve Learned: The most valuable lesson from TryHackMe isn’t just technical—it’s that persistence matters. Some boxes took me days to complete. I’d hit walls, research for hours, try different approaches, and sometimes start over completely. But each challenge taught me something new about both the technology and my own problem-solving approach.

Hack The Box: Where Theory Meets Reality

Hack The Box has been my training ground for realistic penetration testing scenarios. Unlike guided tutorials, HTB machines require you to think like an attacker—enumerate thoroughly, research vulnerabilities, chain exploits together, and adapt when things don’t go as planned.

Notable Achievements:

  • Successfully compromised 24 machines across various difficulty levels. I’ve been inactive on Hack the Box for the past few years.
  • Learned to exploit real-world CVEs in controlled environments
  • Developed systematic methodology for penetration testing
  • Created detailed write-ups to reinforce learning and help others

My Favorite Challenges: HTB’s “Blue” machine taught me the real-world impact of unpatched vulnerabilities through the EternalBlue exploit, while TryHackMe’s SOC Level 1 path (where I’m ranked in the top 10% with 38+ rooms completed) developed my defensive skills in SIEM analysis and alert triage—view my full progress on my TryHackMe profile: https://tryhackme.com/p/funbird009

Building Real-World Skills Through Projects

While I don’t have professional experience yet, I’ve created practical projects to demonstrate my capabilities:

Project 1: Home Network Security Hardening Built a segmented home network with VLANs, configured pfSense firewall rules, and implemented Pi-hole for DNS security. Conducted before-and-after vulnerability scans to measure improvement.

Project 2: Automated Vulnerability Assessment Tool Developed a Python script that integrates Nmap, Nikto, and other tools into a streamlined reconnaissance workflow. Generates HTML reports with findings and severity ratings. [Available on my GitHub]

Project 3: Personal SOC Lab Deployed Security Onion for network monitoring and configured Wazuh SIEM to collect logs from multiple endpoints. Practiced detecting simulated attacks and documenting incident response procedures.

These projects taught me that cybersecurity isn’t just about finding vulnerabilities—it’s about communicating findings clearly, prioritizing remediation efforts, and balancing security with usability.

Skills That Set Me Apart

Technical Competencies:

  • Network security fundamentals and architecture
  • Penetration testing methodologies (PTES, OWASP)
  • Linux and Windows system administration
  • Cloud security basics (AWS)
  • Security automation with Python and Bash
  • Vulnerability assessment and management

Transferable Skills from Biotechnology:

  • Methodical analysis: Just like troubleshooting failed experiments, I approach security challenges systematically
  • Documentation: Scientific research taught me to document everything—critical for security reporting
  • Research skills: Finding obscure CVEs is similar to reviewing scientific literature
  • Attention to detail: In both biology and security, small oversights can have major consequences

Soft Skills:

  • Clear technical communication (translating complex concepts for different audiences)
  • Self-directed learning and problem-solving
  • Persistence in the face of difficult challenges
  • Collaborative mindset and willingness to learn from others

Current Focus: Academic Capstone Project

As part of my Master’s program, I’m working on a network merger and implementation plan as an academic case study. The project involves:

Scenario: Integrating networks for a financial products company acquiring a medical software provider

Challenges:

  • Designing secure network architecture that serves both organizations
  • Addressing compliance requirements (financial regulations and HIPAA)
  • Implementing security controls within budget constraints
  • Creating comprehensive documentation and security policies

What I’m Learning: This project is teaching me to think strategically about security—not just from a technical perspective, but considering business requirements, regulatory compliance, cost constraints, and stakeholder needs.

Where I Am Today

I’ll be honest: I’m still building my career. I work a non-technical job during the day to support myself, but every evening and weekend, I’m in my home lab or grinding through TryHackMe rooms. I’ve invested my own money in certifications, lab equipment, and training resources because I’m committed to this path.

What I’m Actively Doing:

  • 📚 Completing Master’s in Cybersecurity and Information Assurance (Expected: 2026)
  • 💻 Daily hands-on practice on TryHackMe and Hack The Box
  • 🔧 Building and documenting personal security projects
  • 📖 Staying current with security news, CVEs, and threat intelligence
  • 🤝 Participating in cybersecurity communities and forums

What I’m Preparing For:

  • CompTIA CySA+ certification
  • AWS Solutions Architect or Security Specialty certification
  • Offensive Security Certified Professional (OSCP) – long-term goal

Lessons Learned Along the Way

1. Your “Non-Traditional” Background Is an Asset My biotechnology degree isn’t irrelevant—it’s given me a unique lens for approaching security problems. The same analytical thinking that helped me understand cellular processes helps me understand attack chains.

2. Certifications Provide Structure, But Practice Builds Skill Security+ gave me the vocabulary and concepts, but TryHackMe and HTB taught me how to actually do security work. Both are essential.

3. Documentation Matters Whether it’s a lab report or a penetration testing report, the ability to clearly document your findings is what separates hobbyists from professionals.

4. The Community Is Incredibly Supportive The cybersecurity community has been welcoming and helpful. Write-ups, Discord servers, Reddit forums—there are countless people willing to help newcomers learn.

5. Imposter Syndrome Is Real, But Don’t Let It Stop You There were many times I felt like I didn’t know enough to call myself a “cybersecurity professional.” Then I realized everyone starts somewhere, and the best way to learn is by doing.

Advice for Others Making the Transition

If you’re coming from a non-traditional background and want to break into cybersecurity:

Start with certifications – Security+ or CC are great entry points that provide structured learning

Get hands-on immediately – TryHackMe, Hack The Box, and similar platforms are invaluable

Build projects you can show – GitHub repositories and documented projects demonstrate capability

Network authentically – Connect with people on LinkedIn, attend local security meetups (virtual or in-person), ask thoughtful questions

Be honest about your level – You don’t need to pretend to have experience you don’t have; employers value honesty and potential

Stay persistent – Breaking into the field takes time, but consistency pays off

What’s Next for Me

My immediate goal is simple: land my first professional cybersecurity role.

I’m targeting entry-level positions like:

  • SOC Analyst
  • Security Analyst
  • Junior Penetration Tester
  • Vulnerability Analyst
  • IT Security Specialist
  • Open to Internship

I’m particularly interested in opportunities within healthcare technology, where I can leverage both my biotechnology background and security skills to protect sensitive patient data.

Long-term vision:

  • Develop deep expertise in penetration testing or cloud security
  • Earn advanced certifications (OSCP, CISSP)
  • Eventually mentor others making similar career transitions
  • Contribute meaningfully to securing critical infrastructure

Let’s Connect

I’m always open to connecting with:

  • Hiring managers looking for motivated entry-level talent
  • Security professionals willing to share advice or mentorship
  • Fellow career changers navigating similar transitions
  • Anyone interested in discussing cybersecurity, biotechnology, or the intersection of healthcare and security

📧 Email: Completeness2025@protonmail.com
💼 LinkedIn: https://www.linkedin.com/in/onyebuchi-iyase-6975a6350/
🔗 GitHub: https://github.com/royalpriest07
🎯 TryHackMe: https://tryhackme.com/p/funbird009
📍 Location: Newark, NJ (Open to on-site opportunities)


If you’ve read this far, thank you. Whether you’re a recruiter considering taking a chance on someone without traditional experience, a fellow aspiring security professional looking for encouragement, or just someone curious about cybersecurity careers—I appreciate you taking the time to learn about my journey.

The path from biotechnology to cybersecurity hasn’t been straightforward, but it’s been incredibly rewarding. I’m ready for the next chapter.