š”ļø From Design to Defense: My Journey into Cybersecurity
- Shima Polo
- Jun 19
- 2 min read
When I began my career in UX design, my passion was clear: I wanted to create digital experiences that felt simple, intuitive, and meaningful. I loved researching how users think, designing flows that made sense, and building products that solved real problems. But as I became more aware of the growing risks around data, trust, and digital safety, I started asking myself ā what happens when great design isnāt enough?
That question led me to cybersecurity.

š Why I Pivoted into Cybersecurity
As a designer, I had often worked on user interfaces that encouraged trust ā login flows, password resets, data dashboards. But I started realizing that usability without security can be dangerous. What good is a beautiful app if itās vulnerable to threats?
Thatās when I knew I wanted to bridge the gap between usability and security. I didnāt want to just design safe experiences ā I wanted to understand what makes them safe in the first place.
š§Ŗ Building My Cybersecurity Foundation
I didnāt build this journey alone. I had the privilege of working alongside two amazing teammates, Pablo and Ali , as we collaborated on setting up our home cybersecurity lab. From configuring firewalls to analyzing network traffic, we supported each other through each learning milestone and celebrated our wins together. This experience not only deepened my technical skills but also reminded me of the power of teamwork in cybersecurity.
We rolled up our sleeves and got to work. We started a home cybersecurity lab using tools like:
š§± OPNsense ā to configure firewalls, manage LAN/WAN segmentation, and write custom rules
š§Ŗ Wireshark ā to capture and analyze network traffic
šµļøāāļø Kali Linux & Nmap ā to simulate reconnaissance and understand how attackers scan networks
š„ļø VMware & Linux ā to build isolated virtual environments for testing and learning
I documented every step ā the successes, the struggles, and the moments where everything finally clicked.
Iāve also completed certifications like:
ā Google Cybersecurity Certificate
ā (ISC)² Certified in Cybersecurity (CC)
ā Google UX Design Certificate
These combined give me a powerful, dual perspective: human-centered design plus hands-on technical security skills.
š Where Design Meets Defense
Now, my mission is clear: I want to build a safer digital world by combining thoughtful design with proactive security.
Iām actively looking for roles where I can contribute to:
š”ļø Cybersecurity Analysis
šÆ Security Awareness & Training
š Product Security & UX for secure systems
As a military spouse and Key Spouse Liaison, Iāve learned how to adapt quickly, solve problems on the fly, and support people through change ā skills that translate beautifully into both design and cybersecurity.
šÆ Letās Connect
If youāre working in a space where security and usability intersect ā Iād love to connect.If youāre hiring, mentoring, or collaborating in cybersecurity or human-centered security: Iām ready.
Want to know more about my background?ā”ļø Visit my Linkedin
Thank you for reading ā and thank you for supporting people like me who are breaking into tech with passion, purpose, and persistence.
1 Comment