Loading
Blog
Recent ActivityRecent Activity
3 minute read

Engineering to Cybersecurity: A Career Pivot

A background in engineering and hardware prepared product security leader Kristin Roth for a pivot to a cybersecurity career.

Share This:

LinkedInLinkedIn
XX
FacebookFacebook
PrintPrint
EmailEmail
Kristin Roth, product safety manager, poses at Rockwell's headquarters in Milwaukee.

There was a moment in Kristin Roth’s college career where she had to choose her field of study, determining her career path. Based on a frustrating first experience with coding and computer science, she declared an electrical engineering major instead and headed on a path toward hardware design.

But she didn’t end up avoiding computer science after all. Years later, Kristin, Product Security Manager at Rockwell Automation, realized how much of the engineering field is based on software.

“Rather than a regret, I would call this part of my learning journey,” Kristin said. And she took those learnings to heart, recognizing the power of her skillset to evolve and translate to other positions as she grew her career.

Cybersecurity as a career possibility

Kristin spent the earliest parts of her career in hardware design and waterfall methodology, a linear project management approach. She then joined Rockwell, where she was introduced to a whole new world and the Agile project management approach.

“I was comfortable with hardware and then I joined a hardware and firmware team with new concepts and ways of thinking,” Kristin said. “This also was my first brush with cybersecurity.”

Personally, she was interested in the practical and consumer side—identity theft, bank fraud, and the things you read about in the news.

“Professionally, I was working with a team that was developing security features for RA products, and I got an opportunity for a stretch assignment," Kristin said. “This gave me exposure and proximity to the world of cybersecurity, and I knew this is where I wanted to take my career.”

Career pivot: Looking for opportunities

Kristin explained, “With my history in hardware, I was cautious about jumping into this space because I thought it was only software-driven, and that’s not the case. I clearly can see how these worlds intertwine and how my work in one area can positively impact other areas, and vice versa. We need support from many different domains, including communications and awareness, project and program management, risk management, just to name a few.”

Cybersecurity careers are one of the fastest-growing and most in-demand professions in the job market. At Rockwell, cybersecurity professionals work across many areas of the business – in IT; in product safety (where Kristin works); in OT, or operational technology, where employees are focused on protecting customers’ manufacturing and plant floor environments; and in Cybersecurity Services, where IT and OT converge.

“I am a practical person,” Kristin added, “and part of my attraction to this role is the practicality of what we do. Cybersecurity offers an exciting future for people with various professional backgrounds, including people with experience in project and program management.”

Kristin is a great example of a successful uncharted path, applying her hardware and program management experience and thirst for learning to each new opportunity. 

“Even if you don’t have experience in a certain area, at Rockwell there are so many opportunities to create connections and take assignments outside of your role, to try new things, that learning is always available. You never are restricted to just your space. I do not have a degree in software, yet I am succeeding because this isn’t about the degree; it’s about how everything comes together.”

Supportive culture creates cybersecurity careers

Kristin appreciates Rockwell’s cyber-aware culture.

“We have an ecosystem of passionate, talented and skilled people interested in cybersecurity,” she said. “This career, at this company, is for people who want to learn, who enjoy change, who are intellectually curious.”  

When she first considered the move to cybersecurity, negative self-talk almost convinced her that she wasn’t qualified.

“It’s easy to convince yourself what you do not have, versus what you do,” Kristin said. “It’s important to remember that in a constantly evolving field like cybersecurity, we need diversity of people, skills, and interest. We’re all developing together. What’s most important is a growth mindset. Instead of thinking about why you don’t belong, think about the ways your unique background, skills and mentality can contribute. That will make the difference.”

Bring your unique skills

Want to learn more and explore the many career opportunities at Rockwell? Check out our Cybersecurity Careers page and create your own story, like Abhishek, an engineering manager focused on technology to strengthen the environment where Information Technology (IT) and Operations Technology (OT) converge. Or Ofek and Maty, where every day is different, full of problem-solving opportunities, challenging work, and career growth.

Published February 12, 2024

Topics: Cybersecurity Hardware Software

Carol Jors
Carol Jors
Storyteller, Rockwell Automation
Subscribe

Subscribe to Rockwell Automation and receive the latest news, thought leadership and information directly to your inbox.

Subscribe
Recommended for You
Loading
Top OT Security Challenges and How to Address Them
Top OT Security Challenges and How to Address Them
Blog
Blog
Top OT Security Challenges and How to Address Them
Learn how to identify and overcome the biggest OT security challenges. Explore strategies for asset visibility, legacy systems, and IT/OT alignment.
OT Patch Management: A Step-by-Step Guide
OT Patch Management: A Step-by-Step Guide
Blog
Blog
OT Patch Management: A Step-by-Step Guide
Learn how to simplify OT patching with a 6-step workflow that improves cybersecurity, minimizes risk, and supports compliance in industrial environments.
OT SIEM vs IT SIEM: What's the difference?
OT SIEM vs IT SIEM: What's the difference?
Blog
Blog
OT SIEM vs IT SIEM: What's the difference?
Compare OT and IT SIEM systems and learn why purpose-built OT SIEM delivers the visibility, context, and control industrial organization need.
  1. Chevron LeftChevron Left Rockwell Automation Home Chevron RightChevron Right
  2. Chevron LeftChevron Left Com... Chevron RightChevron Right
  3. Chevron LeftChevron Left News Chevron RightChevron Right
  4. Chevron LeftChevron Left Blogs Chevron RightChevron Right
  5. Chevron LeftChevron Left Engineering to Cybersecurity: A Career Pivot Chevron RightChevron Right
Please update your cookie preferences to continue.
This feature requires cookies to enhance your experience. Please update your preferences to allow for these cookies:
  • Social Media Cookies
  • Functional Cookies
  • Performance Cookies
  • Marketing Cookies
  • All Cookies
You can update your preferences at any time. For more information please see our Privacy Policy
CloseClose