Cybersecurity

Moving to Cybersecurity from a Software Developer Role

Moving to Cybersecurity from a Software Developer Role

Moving to a new field is always a challenge. But when I joined Neuraltrust, a cybersecurity company, I realized that my "standard" developer security skills were simply not enough. 😅

I have been a developer for years. I thought I understood security because I knew the standard practices: hash passwords, use HTTPS, sanitize database inputs, and never commit secrets to GitHub.

But during my first week of meetings, the heavy use of acronyms like SIEM. IPA. IDP. PII. SPII. made me feel completely lost. It felt like I was learning a new language.

After about a month, I started to understand. I realized these are not just complex business words—they are the foundation of trust. As developers, we focus on building features. Cybersecurity focuses on protecting those features.

If you are moving to Cybersecurity from a developer role, this post is for you. It is the guide I wish I had on my first day. Here is a simple explanation of these terms from a developer's perspective. Instead of seeing them as hurdles, I began to see them as layers of a defense strategy.

Let’s start with how we handle the "noise" and security events.

SIEM: More Than Just Logs

We love logs, right? Logging is for fixing bugs. If the app crashes, we check the logs to see the error.

But in Cybersecurity, logs are much more than that, you will hear the term SIEM very often. But what SIEM is? To make short, it is a Security Information and Event Management, but what does it mean?

Imagine your application is a house. You check the locks (authentication) and maybe install a camera (logging).A SIEM is like a central security station that watches every camera in the neighborhood at the same time. It collects logs from your app, but also from firewalls, servers, databases, and routers. It uses logic and AI to find connections between events.

If a user fails to login 5 times in your app, that is a simple log. If that same IP address tried to access the database server 2 seconds earlier, the SIEM connects these two events and alerts the team of an attack.

Your logs are not just for you; they are data for the SIEM. If you create bad logs (like console.log("error here")), the SIEM cannot understand them. To fix this, you should structure your logs using JSON format and include key context like the User ID, IP address, Action, and Timestamp. Just be careful not to log sensitive data, which leads us to the critical topic of Data Protection.

The most common tools you will encounter are Splunk, which is popular for analyzing massive amounts of log data, and Google Chronicle, which is built for speed and feels like searching Google for your logs.

However, knowing what happened in the logs is only half the battle. You also need to know who did it, which brings us to identity and compliance.

IdP & HIPAA: Identity vs. Compliance

If I need to create a feature for user authentication, like a login page, I will create a users table and I am done, but in the real world it is much more complex.

What IdP ?

In a large system, you do not want every app to manage its own passwords. You want one central place to manage users. An IdP (like Okta, Auth0, or Microsoft Entra ID) is that central place. It confirms who the user is and gives your app a token.

Break Glass or The Emergency Key

What happens if the login system (IdP) stops working? Or if the admin loses their phone and cannot use 2FA? This is why we need a Break Glass account. In simple terms, it is a special account with full power that we never use for normal work. It is kept in a safe place and only used during a real emergency. It is like an emergency key to enter your house. It ensures that if everything else fails, we are not locked out of our own system.

What HIPAA ?

I thought this was "HIPPA" or just some medical rule. It stands for Health Insurance Portability and Accountability Act. If you touch any health-related data, you must follow this. It dictates how data is encrypted, who can access it, and how you audit it.

Recognizing who is accessing the system and what regulations apply is just the first step. The next is understanding the nature of the data itself.

PII vs. SPII: Data Types Matter

What PII (Personally Identifiable Information) is

Any data that can identify a specific person, such as their name, email, phone number, or IP address.

What SPII (Sensitive PII) ?

This is even more critical. If stolen, it can cause severe harm. We are talking about Social Security Numbers, passport details, biometric data like fingerprints, medical records, or financial account numbers.

I used to treat a "Notes" field as a simple text box. But if a user types their credit card number into that "Notes" field and I save it to the database, I have created a serious security problem. The key is to know what you are storing. SPII must be encrypted (database passwords aren't enough), and PII must be masked in logs so you never expose a user's email or phone number in plain text.

Once you understand the sensitivity of the data you're handling, you need a philosophy to protect it. This is where the core philosophy of security comes in.

The CIA Triad: The Core Principles

Before this job, my security checklist was random. Now I know that everything connects to three main concepts: C-I-A. It stands for Confidentiality (only authorized people see data), Integrity (data hasn't been tampered with), and Availability (the system is actually online).

When you build a feature, ask yourself: Does this affect Confidentiality, Integrity, or Availability?

The CIA triad gives us our goals, but how do we actually achieve them at scale? We use established frameworks to guide our processes.

The Frameworks: NIST CSF & Security Controls

My mindset as a developer was that security policies were just boring documents. Since I come from frameworks like Angular, I thought, "Hey, this is going to be some cool code!" — well, it turns out it's more about structure, processes, and strategy.

What NIST CSF (Cybersecurity Framework) is

It is a guide that breaks security down into five simple steps. I realized my job involves the whole cycle: we start by Identifying what we have and Protecting it with standard measures like auth and encryption. But we also need to Detect when something goes wrong, Respond with a plan, and Recover the system after an attack.

What CISSP ?

This is a major certification for security professionals. For developers, Domain 8: Software Development Security is the most important. It teaches that security must be part of the design, not added at the end.

This fundamentally changed how I view typical security requests. When a security engineer asks for a "Software Bill of Materials" (SBOM), they are simply following the Identify step of the framework. When they require Two-Factor Authentication, they are implementing a standard Security Control. Seeing the bigger picture turns these from annoying tasks into necessary architecture.

But even the best architecture can fail, and when it does, you need a plan.

The Playbook: Response Plans

My mindset as a developer was: If we get hacked, everyone just starts fixing things randomly.

What a Playbook ?

A playbook is a recipe for handling a specific type of attack. For example, a Phishing Playbook might instruct the team to isolate the affected computer and reset the user's password immediately. Then, they check the logs (via Splunk or Chronicle) to see what was accessed and notify the legal team.

As a developer, your job is often to provide the tools or logs that make these playbooks possible. And when the playbook says "Access the backup server," you might be the one reaching for the Break Glass credentials to save the day.

Quick Recap

If you are in the middle of an interview process or just stepping into the world of Cybersecurity, here is a quick summary of the key concepts:

  • SIEM: The "security camera system" for your logs (like Splunk or Chronicle).
  • IdP & Break Glass: Your centralized login system and your emergency backup keys.
  • PII vs. SPII: Distinguish between personal data (to protect) and sensitive data (to encrypt).
  • HIPAA: The strict rulebook you must follow if you touch medical data.
  • CIA Triad: The core principles of Confidentiality, Integrity, and Availability.
  • NIST CSF: The primary framework used to Identify, Protect, Detect, Respond, and Recover.
  • CISSP & Playbooks: The gold standard certification and your step-by-step recipes for responding to attacks.

The biggest change for me was realizing that security is a process, not a feature. As developers, we are naturally optimists; we build for the "Happy Path" where everything works perfectly. In contrast, Cybersecurity looks at the "Unhappy Path"—where someone is actively trying to break the system.

My first two months I'm not fighting or hacking but I'm building systems that are easy to monitor (SIEM), have secure users (IdP), and protect data properly (PII). And honestly? It changes the way I think and solve my coding challenges.


Real Software. Real Lessons.

I share the lessons I learned the hard way, so you can either avoid them or be ready when they happen.

User avatar
User avatar
User avatar
User avatar
+13K

Join 13,800+ developers and readers.

No spam ever. Unsubscribe at any time.

Discussion