homepage
Menu
Open menu
  • Training
    Go one level top Back

    Training

    • Courses

      Build cyber prowess with training from renowned experts

    • Hands-On Simulations

      Hands-on learning exercises keep you at the top of your cyber game

    • Certifications

      Demonstrate cybersecurity expertise with GIAC certifications

    • Ways to Train

      Multiple training options to best fit your schedule and preferred learning style

    • Training Events & Summits

      Expert-led training at locations around the world

    • Free Training Events

      Upcoming workshops, webinars and local events

    • Security Awareness

      Harden enterprise security with end-user and role-based training

    Featured

    Get a Free Hour of SANS Training

    Free Course Demos

    Can't find what you are looking for?

    Let us help.
    Contact us
  • Learning Paths
    Go one level top Back

    Learning Paths

    • By Focus Area

      Chart your path to job-specific training courses

    • By NICE Framework

      Navigate cybersecurity training through NICE framework roles

    • DoDD 8140 Work Roles

      US DoD 8140 Directive Frameworks

    • By European Skills Framework

      Align your enterprise cyber skills with ECSF profiles

    • By Skills Roadmap

      Find the right training path based on critical skills

    • New to Cyber

      Give your cybersecurity career the right foundation for success

    • Leadership

      Training designed to help security leaders reduce organizational risk

    • Degree and Certificate Programs

      Gain the skills, certifications, and confidence to launch or advance your cybersecurity career.

    Featured: Solutions for Emerging Risks

    New to Cyber resources

    Start your career
  • Community Resources
    Go one level top Back

    Community Resources

    Watch & Listen

    • Webinars
    • Live Streams
    • Podcasts

    Read

    • Blog
    • Newsletters
    • White Papers
    • Internet Storm Center

    Download

    • Open Source Tools
    • Posters & Cheat Sheets
    • Policy Templates
    • Summit Presentations
    • SANS Community Benefits

      Connect, learn, and share with other cybersecurity professionals

    • CISO Network

      Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders

  • For Organizations
    Go one level top Back

    For Organizations

    Team Development

    • Why Partner with SANS
    • Group Purchasing
    • Skills & Talent Assessments
    • Private & Custom Training

    Leadership Development

    • Leadership Courses & Accreditation
    • Executive Cybersecurity Exercises
    • CISO Network

    Security Awareness

    • End-User Training
    • Phishing Simulation
    • Specialized Role-Based Training
    • Risk Assessments
    • Public Sector Partnerships

      Explore industry-specific programming and customized training solutions

    • Sponsorship Opportunities

      Sponsor a SANS event or research paper

    Interested in developing a training plan to fit your organization’s needs?

    We're here to help.
    Contact us
  • Talk with an expert
  • Log In
  • Join - it's free
  • Account
    • Account Dashboard
    • Log Out
  1. Home >
  2. Blog >
  3. The Role of Cybersecurity Mentorship in Cyber Threat Intelligence (Part 1)
John_Doyle_370x370.png
John Doyle

The Role of Cybersecurity Mentorship in Cyber Threat Intelligence (Part 1)

Everyone can benefit from mentorship and finding a mentor earlier in one’s career can help springboard their career journey

July 26, 2023

Blog authors: John Dolye, Selena Larson, Fletus PostonFletus Poston

“It can be hard to know where to start in the #cybersecurity field. Good news is there isn't just one way in. Listen to the 2022 New2Cyber Panel for success stories from renowned industry experts for inspiration on how to start your journey in cyber security.” -Fletus Poston, SANS Instructor Candidate
BLUF:

  • Mentorship is a critically important career aid designed to empower individuals looking to grow professionally.
  • The most successful mentorship opportunities rely on the mentee driving the relationship; identifying and recruiting the right mentor; establishing mentorship goals and objectives; and taking follow up actions between mentoring sessions.
  • Most individuals benefit from having multiple mentors, some of which within one’s immediate team or business unit while others outside of it and at varying levels to impart wisdom and provide alternative perspective that otherwise is inaccessible.
  • Mentorship often requires individuals to operate outside their social and professional comfort zones.
  • Mentors and mentees should approach the process with empathy, remembering that asking for help isn’t easy and we all were new at one point.
  • Finding the right mentor can be tricky. Sometimes prospective mentors are already over committed and will politely decline your request. Don’t take rejection personally! It gets easier over time.

Overview

Mentorship means different things to different people and is an area not often appreciated until a later point in one's career. Mentorship, however, is an easily accessible tool that new, junior or transitioning cyber security professionals can use to jumpstart their career.

Often, little emphasis is placed on mentorship during most organizations’ on-boarding processes and is often subjectively left to individual managers to explain, encourage, and sometimes help establish a mentor-mentee connection. The lack of organizational prioritization inadvertently understates the importance of mentorship, instead leaving individuals who seek to grow professional skills and organizational reach, spending more effort over longer time horizons to find champions to help them identify development pathways, develop growth roadmaps, and foster meaningful professional connections.

In this first blog post in our two-part mentorship series, we seek to raise awareness on the benefits of mentoring and how identifying mentors from different disciplines can help further your career ambitions. We also address common barriers to mentorship that exist – some self-imposed and some organizationally imposed. In the second blog post, will provide a list of resources and areas where individuals seeking mentorship can turn to as a starting point in their journey.

Defining Mentorship

Mentorship can be defined as the relationship between two individuals -- a mentor and a mentee -- to drive professional growth, provide insights, offer perspective diverse from one's existing frame of reference, flag opportunities, or open figurative doors through introductions. Mentors draw on their experience and professional experience and, in effect, act as a combination of a coach and cheerleader while acting as an accountability mechanism to the mentee.

  • Mentors and mentees should define expectations during an introductory meeting, which can serve as an informational interview to understand a mentee's aspirational goals, identify areas the mentor can assist, and determine the cadence and frequency of upcoming meetings. Often in subsequent meetings action items or homework assignments are defined then discussed.

Mentors can be within one's organization, inside or outside one's team, or can be an industry peer. Categorizing mentors by type can help a mentee identify potential gaps such as a peer mentor or senior leader. Having a mentor within the same job role in an organization can lend itself naturally to building skills to be successful in that current role while also identifying organizational dynamic worth knowing like career ladders, growth pathways, and what training opportunities exist. Expanding beyond the current organizational team or department provides additional perspective on other verticals the company operates in; how the roles, responsibilities, and culture vary; and potential integration points for collaboration and innovation.

  • For example, to the variety of skills and experience applicable to cyber threat intelligence (CTI), valuable mentors can be found outside CTI or digital forensics and incident response (DFIR) teams. This can include those with experience in national security, customer relations, writing and editing, engineering, or communications. Such relationships can help develop or improve skills and provide unique insight or feedback applicable to a CTI role.
  • Having a mentor in a  management or leadership role outside of your existing reporting chain of command can provide historical perspective and context on the inner workings of the organization to help better plan for what comes next, explaining elements that are often not codified like what transpires in promotion panel discussions, why certain career tracks were defined the way they are, and how to align idea pitches to resonate with the business' direction. It is beneficial particularly later in one's career to have mentors at multiple organizational levels and across different parts of an organization or industry. Mentors at this level can assist by recalling stories from their experience, providing general advice, or can be a partner in sound boarding to devise one or more solutions to a particular problem set.

Irrespective of the mentor's role, it is incumbent upon the mentee to drive the relationship. This is often one of the more misunderstood elements when one is initially introduced to the concept of mentorship. To get the most out of a mentor-mentee relationship, it will require the mentee being open, transparent, and sometimes vulnerable, addressing existing deficiencies to determine strategies and pathways to address them. The cyber security industry has no shortage of talented individuals in it that take pride in their work, which makes this sometimes a bit of a challenge because a deficiency is perceived as a weakness, though it shouldn't be. In any of the sub-disciplines in cyber security it takes years to amass the knowledge base and experience across its breadth and depth. This stigma of imposter syndrome fades the further one gets in their career and, instead is used as a form of self-awareness, allowing individuals to engage peers with complementary skills that augment their own.

Barriers to Mentorship

At its core, there are three primary factors that act as impediments to mentoring: awareness, accessibility, and approachability. Common reasons we have come across on why individuals don’t engage in mentoring corroborate this line of thought:

  • “I don't know where to begin though it sounds important.”
  • “I've never had one, so I don't know how to approach it.” (Authors’ note: You probably have, but just not coined it as such.)
  • “It sounds like it will take effort and planning.”
  • “It's hard; it's scary.”
  • “What if I don't carry my own weight.”
  • ”What if I am not  good enough to have a mentor?”

As practitioners, especially starting a new job, it is natural to emplace a bulk of one's focus on learning the role; its responsibilities; the technologies and systems used; team members and team operating processes. If you are lucky, there will be a team on-boarding guide that acts as a documented, knowledge capture designed to help new members integrate effectively, reducing time needed to otherwise spin up to become an active contributor.

  • Such a guide may contain links to organization centric websites that could include communities of interest, such as Employee Resource Groups (ERGs). which can be used to build informal mentorship. More often than not on-boarding guides won't contain much on mentorship and, in the rare cases they do, it won't be representative of industry community, organizational, and organic mentorship conduits. 

One common barrier to mentorship is imposter syndrome. This manifests in self-doubt, uncertainty, and anxiety in one’s role and career progression despite typically being a high-performing individual. Imposter syndrome can cause negative self-talk and beliefs including someone thinking they are not deserving of mentorship or time spent with a leader in an organization. There are many ways to manage and overcome imposter syndrome, and in fact having a positive mentor/mentee relationship can be one of them. Just remember, we all started at the same place, and everyone is on their own journey of personal and professional growth and development.

Finding individuals that can serve as mentors and then approaching them tend to be the hardest part of the mentorship process. While we save the discussion on opportunities to find them for the next blog post, it is worth spending a moment on approachability.

Smart individuals, particularly those who may have very deep knowledge that you want to figure out how to grow in may sometimes appear unapproachable due to mannerisms or because they are socially obtuse. Try not to let this turn you off. John, one of the authors of the blog, has been told he is very stoic and hard to read and sometimes not the best at conveying himself in written text; however, he is quite passionate and always willing to help others how he can.

  • You are likely to find others like John within your organization or at industry events. Your best bet is to not let it dissuade initial contact and gauge a feel for their character, willingness to help out, or your desire to interact based on one or more direct interactions.
  • One thing we all share in this field is that we did not magically find ourselves with deeply rooted skills overnight. Instead, most of us spent several years working to hone our craft and, as such, empathize with the plight others face to do the same. That lends itself naturally towards having an altruistic drive towards helping grow the next generation of practitioners. If you are interested in exploring this and related elements of the role of empathy in this field, check out thisblog post.

Conclusion

Mentorship is a critically important career aid designed to empower individuals looking to grow professionally, irrespective of if you are just starting your career journey or are a seasoned practitioner. Everyone can benefit from mentorship and finding a mentor earlier in one’s career can help springboard their career journey. Often having multiple mentors in different places and at different levels will provide an array of perspective to help inform your career decisions. The focus of the second blog in this will be on how to find opportunities to meet mentors with a particular eye towards those in the cyber threat intelligence field.

Share:
TwitterLinkedInFacebook
Copy url Url was copied to clipboard
Subscribe to SANS Newsletters
Receive curated news, vulnerabilities, & security awareness tips
United States
Canada
United Kingdom
Spain
Belgium
Denmark
Norway
Netherlands
Australia
India
Japan
Singapore
Afghanistan
Aland Islands
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua and Barbuda
Argentina
Armenia
Aruba
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belize
Benin
Bermuda
Bhutan
Bolivia
Bonaire, Sint Eustatius, and Saba
Bosnia And Herzegovina
Botswana
Bouvet Island
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cambodia
Cameroon
Cape Verde
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos (Keeling) Islands
Colombia
Comoros
Cook Islands
Costa Rica
Cote D'ivoire
Croatia (Local Name: Hrvatska)
Curacao
Cyprus
Czech Republic
Democratic Republic of the Congo
Djibouti
Dominica
Dominican Republic
East Timor
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Eswatini
Ethiopia
Falkland Islands (Malvinas)
Faroe Islands
Fiji
Finland
France
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Germany
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guernsey
Guinea
Guinea-Bissau
Guyana
Haiti
Heard And McDonald Islands
Honduras
Hong Kong
Hungary
Iceland
Indonesia
Iraq
Ireland
Isle of Man
Israel
Italy
Jamaica
Jersey
Jordan
Kazakhstan
Kenya
Kiribati
Korea, Republic Of
Kosovo
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Liechtenstein
Lithuania
Luxembourg
Macau
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia, Federated States Of
Moldova, Republic Of
Monaco
Mongolia
Montenegro
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands Antilles
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
North Macedonia
Northern Mariana Islands
Oman
Pakistan
Palau
Palestine
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Reunion
Romania
Russian Federation
Rwanda
Saint Bartholemy
Saint Kitts And Nevis
Saint Lucia
Saint Martin
Saint Vincent And The Grenadines
Samoa
San Marino
Sao Tome And Principe
Saudi Arabia
Senegal
Serbia
Seychelles
Sierra Leone
Sint Maarten
Slovakia
Slovenia
Solomon Islands
South Africa
South Georgia and the South Sandwich Islands
South Sudan
Sri Lanka
St. Helena
St. Pierre And Miquelon
Suriname
Svalbard And Jan Mayen Islands
Sweden
Switzerland
Taiwan
Tajikistan
Tanzania, United Republic Of
Thailand
Togo
Tokelau
Tonga
Trinidad And Tobago
Tunisia
Turkey
Turkmenistan
Turks And Caicos Islands
Tuvalu
Uganda
Ukraine
United Arab Emirates
United States Minor Outlying Islands
Uruguay
Uzbekistan
Vanuatu
Vatican City State
Venezuela
Vietnam
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis And Futuna Islands
Western Sahara
Yemen
Zambia
Zimbabwe

By providing this information, you agree to the processing of your personal data by SANS as described in our Privacy Policy.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Recommended Training

  • SEC541: Cloud Security Threat Detection™
  • LDR514: Security Strategic Planning, Policy, and Leadership™
  • FOR608: Enterprise-Class Incident Response & Threat Hunting™

Tags:
  • Digital Forensics, Incident Response & Threat Hunting

Related Content

Blog
DFIR - Blog - SANS Threat Analysis Rundown in Review- Breaking Down March 2025’s Discussion_340 x 340 (1).jpg
Digital Forensics, Incident Response & Threat Hunting
April 4, 2025
SANS Threat Analysis Rundown in Review: Breaking Down March 2025’s Discussion
Datadog’s Zack Allen joined to share threat intelligence resources and discuss tools and methodologies for analysts.
370x370_katie-nickels.jpg
Katie Nickels
read more
Blog
340x340.png
Digital Forensics, Incident Response & Threat Hunting
January 27, 2025
A Visual Summary of SANS CTI Summit 2025
Check out these graphic recordings created in real-time throughout the event for SANS CTI Summit 2025
No Headshot Available
Alison Kim
read more
Blog
OO - Blog - November 2024's Top Threats_340 x 340.jpg
Digital Forensics, Incident Response & Threat Hunting
November 25, 2024
SANS Threat Analysis Rundown in Review: Breaking Down November 2024’s Top Threats
There’s always plenty of news on cyber threats to discuss, and this month was no exception.
370x370_katie-nickels.jpg
Katie Nickels
read more
  • Company
  • Mission
  • Instructors
  • About
  • FAQ
  • Press
  • Contact Us
  • Careers
  • Policies
  • Training Programs
  • Work Study
  • Academies & Scholarships
  • Public Sector Partnerships
  • Law Enforcement
  • SkillsFuture Singapore
  • Degree Programs
  • Get Involved
  • Join the Community
  • Become an Instructor
  • Become a Sponsor
  • Speak at a Summit
  • Join the CISO Network
  • Award Programs
  • Partner Portal
Subscribe to SANS Newsletters
Receive curated news, vulnerabilities, & security awareness tips
United States
Canada
United Kingdom
Spain
Belgium
Denmark
Norway
Netherlands
Australia
India
Japan
Singapore
Afghanistan
Aland Islands
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua and Barbuda
Argentina
Armenia
Aruba
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belize
Benin
Bermuda
Bhutan
Bolivia
Bonaire, Sint Eustatius, and Saba
Bosnia And Herzegovina
Botswana
Bouvet Island
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cambodia
Cameroon
Cape Verde
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos (Keeling) Islands
Colombia
Comoros
Cook Islands
Costa Rica
Cote D'ivoire
Croatia (Local Name: Hrvatska)
Curacao
Cyprus
Czech Republic
Democratic Republic of the Congo
Djibouti
Dominica
Dominican Republic
East Timor
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Eswatini
Ethiopia
Falkland Islands (Malvinas)
Faroe Islands
Fiji
Finland
France
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Germany
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guernsey
Guinea
Guinea-Bissau
Guyana
Haiti
Heard And McDonald Islands
Honduras
Hong Kong
Hungary
Iceland
Indonesia
Iraq
Ireland
Isle of Man
Israel
Italy
Jamaica
Jersey
Jordan
Kazakhstan
Kenya
Kiribati
Korea, Republic Of
Kosovo
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Liechtenstein
Lithuania
Luxembourg
Macau
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia, Federated States Of
Moldova, Republic Of
Monaco
Mongolia
Montenegro
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands Antilles
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
North Macedonia
Northern Mariana Islands
Oman
Pakistan
Palau
Palestine
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Reunion
Romania
Russian Federation
Rwanda
Saint Bartholemy
Saint Kitts And Nevis
Saint Lucia
Saint Martin
Saint Vincent And The Grenadines
Samoa
San Marino
Sao Tome And Principe
Saudi Arabia
Senegal
Serbia
Seychelles
Sierra Leone
Sint Maarten
Slovakia
Slovenia
Solomon Islands
South Africa
South Georgia and the South Sandwich Islands
South Sudan
Sri Lanka
St. Helena
St. Pierre And Miquelon
Suriname
Svalbard And Jan Mayen Islands
Sweden
Switzerland
Taiwan
Tajikistan
Tanzania, United Republic Of
Thailand
Togo
Tokelau
Tonga
Trinidad And Tobago
Tunisia
Turkey
Turkmenistan
Turks And Caicos Islands
Tuvalu
Uganda
Ukraine
United Arab Emirates
United States Minor Outlying Islands
Uruguay
Uzbekistan
Vanuatu
Vatican City State
Venezuela
Vietnam
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis And Futuna Islands
Western Sahara
Yemen
Zambia
Zimbabwe

By providing this information, you agree to the processing of your personal data by SANS as described in our Privacy Policy.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
  • Privacy Policy
  • Terms and Conditions
  • Do Not Sell/Share My Personal Information
  • Contact
  • Careers
© 2025 The Escal Institute of Advanced Technologies, Inc. d/b/a SANS Institute. Our Terms and Conditions detail our trademark and copyright rights. Any unauthorized use is expressly prohibited.
  • Twitter
  • Facebook
  • Youtube
  • LinkedIn