Interactive certification graph

Cybersecurity Career Roadmap

Looking for the best SANS certification for your current role? Use the interactive roadmap below to find your next step.

Independent guide. Verify course and certification details on the official provider pages before enrolling.


Cybersecurity Career Roadmap (DFIR, Incident Response, and Security Operations)

Most cybersecurity career advice is either too generic or too disconnected from real-world work. This roadmap is designed to solve a more practical problem: given where you are today, what should you do next to move forward in your career?

It focuses on digital forensics, incident response (DFIR), and security operations (SOC); roles where technical depth, decision-making under pressure, and real-world experience matter more than theory. Whether you’re:

  • Trying to land your first role in cybersecurity
  • Moving from SOC → incident response
  • Switching from forensics → threat hunting or leadership
  • Or deciding which SANS / GIAC certification is actually worth it for you specifically

this roadmap gives you a structured way to think about your next step.


How to Use This Roadmap

Start by identifying three things:

  1. Your current role or starting point
    (e.g. IT support, SOC analyst, junior DFIR, sysadmin)
  2. Your experience level
    (early career, developing, or experienced)
  3. The kind of work you actually want to do
    (investigations, detection, response, leadership, etc.)

From there, use the roadmap to:

  • Identify realistic next roles
  • Understand typical progression paths
  • Select relevant certifications (not just popular ones)
  • Avoid common dead-ends or unnecessary detours
A Quick Reality Check

Certifications, courses, and labs can accelerate your progress, but they’re not a substitute for real-world experience. The goal isn’t to collect certs. The goal is to:

  • Build capability
  • Develop judgement
  • Operate effectively during real incidents

This roadmap reflects that reality.


Interactive roadmap

Filter the graph, inspect a node, and follow the highlighted route.

Certification Practice Capability

Showing the full roadmap. Apply filters to highlight a recommended path.

Use the graph like a skill tree: filters narrow the route, node clicks inspect the step, and the navigation buttons pan the canvas.

1. Foundational Baseline coverage and first-principles depth.
2. Core operations Core analyst and handler capability.
3. Applied practice Role-aligned specialisation and branch points.
4. Advanced Deeper investigative and leadership depth.
5. Specialist Specialist tracks and senior capability.
6. Expert Highest-depth or function-wide outcomes.

Common Career Pathways

While every career is different, a few patterns show up repeatedly:

1. SOC Analyst → Incident Responder

One of the most common transitions.

  • Start with alert triage and basic investigations
  • Build understanding of attacker behaviour
  • Progress into containment, scoping, and response coordination

2. IT / Sysadmin → DFIR

Strong technical foundations translate well into forensics.

  • Existing knowledge of systems and infrastructure is a major advantage
  • Focus shifts to evidence, timelines, and root cause analysis

3. DFIR → Threat Hunting / Detection Engineering

A natural progression for experienced practitioners.

  • Move from reactive investigation → proactive detection
  • Requires deeper understanding of attacker TTPs and telemetry

4. Technical → Leadership (IR Lead / Incident Commander)

Less about tools, more about coordination and decision-making.

  • Communication becomes as important as technical skill
  • Responsibility shifts toward outcomes, not actions
Where Most People Get Stuck

Across all of these paths, the same issues come up repeatedly:

  • Over-indexing on certifications without applying the knowledge
  • Lack of exposure to real incidents
  • Unclear understanding of how investigations actually work end-to-end
  • Operating in environments that never properly exercise their response capability

This is the gap between: knowing what to do vs being able to do it under pressure.


From Individual Skills to Organisational Capability

As you progress in DFIR or incident response, the challenge changes.

Early in your career, the focus is on:

  • Learning tools
  • Understanding artefacts
  • Following playbooks

Later, the focus shifts to:

  • Making decisions with incomplete information
  • Coordinating multiple teams
  • Communicating clearly under pressure
  • Defending conclusions with evidence

At that point, your effectiveness is no longer just about your skills. It depends heavily on whether your organisation:


If You’re Already Working in Incident Response

One of the most common observations from real-world engagements: many teams are capable on paper, but untested in practice.

If you’re responsible for incident response, or want to move into more senior roles, it’s worth asking:

  • Would your team respond effectively to a serious incident tomorrow?
  • Are your plans and playbooks actually usable under pressure?
  • Can you confidently investigate and explain what happened?

If not, that’s a capability gap; not a knowledge gap. You can start by:


This roadmap is part of an ongoing series focused on building practical DFIR and incident response careers.


Final Thoughts

There’s no single “correct” path in cybersecurity. But there are:

  • Common patterns
  • Predictable mistakes
  • And faster ways to build capability

Use this roadmap as a guide, not a rulebook. Then focus on building the kind of experience that holds up when it matters.