<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Daven Earl Bellen]]></title><description><![CDATA[Personal &amp; Tech Blog]]></description><link>https://davebellen.com</link><image><url>https://cdn.hashnode.com/res/hashnode/image/upload/v1746419007204/944fa6a5-435e-4b21-afc3-e768db58b4a7.png</url><title>Daven Earl Bellen</title><link>https://davebellen.com</link></image><generator>RSS for Node</generator><lastBuildDate>Wed, 15 Apr 2026 10:35:53 GMT</lastBuildDate><atom:link href="https://davebellen.com/rss.xml" rel="self" type="application/rss+xml"/><language><![CDATA[en]]></language><ttl>60</ttl><item><title><![CDATA[Audit Entra ID with Natural Language Using MCP and GitHub Copilot]]></title><description><![CDATA[I implemented Microsoft's MCP server for Microsoft 365 and created an automated setup script that lets you audit your Entra ID tenant using plain English through GitHub Copilot.
Ask questions like "How many Global Administrators do I have?" or "Expor...]]></description><link>https://davebellen.com/audit-entra-id-with-natural-language-using-mcp-and-github-copilot</link><guid isPermaLink="true">https://davebellen.com/audit-entra-id-with-natural-language-using-mcp-and-github-copilot</guid><category><![CDATA[Entra ID]]></category><category><![CDATA[IAM]]></category><category><![CDATA[mcp]]></category><category><![CDATA[mcp server]]></category><category><![CDATA[Microsoft]]></category><dc:creator><![CDATA[Daven Earl Bellen]]></dc:creator><pubDate>Thu, 27 Nov 2025 21:35:26 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1764282575550/75c53b91-4b43-486b-a310-6cfae7552dcd.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I implemented Microsoft's MCP server for Microsoft 365 and created an automated setup script that lets you audit your Entra ID tenant using plain English through GitHub Copilot.</p>
<p>Ask questions like "How many Global Administrators do I have?" or "Export all PIM role assignments" and get instant answers. No PowerShell scripting, no Graph API syntax, no context switching.</p>
<div class="embed-wrapper"><div class="embed-loading"><div class="loadingRow"></div><div class="loadingRow"></div></div><a class="embed-card" href="https://youtu.be/wdOfAP_fTHA?si=uJxai79lWdde_8ZH">https://youtu.be/wdOfAP_fTHA?si=uJxai79lWdde_8ZH</a></div>
<p> </p>
<h2 id="heading-why-this-matters"><strong>Why This Matters</strong></h2>
<p>The Model Context Protocol lets AI assistants connect to enterprise data sources. Microsoft's MCP server for Microsoft 365 bridges GitHub Copilot to Microsoft Graph API.</p>
<p>Traditional auditing means jumping between Azure Portal, Graph Explorer, PowerShell, and Excel. With MCP, you work entirely in VS Code and ask questions in plain English.</p>
<p>What used to take 30 minutes of scripting now takes 30 seconds.</p>
<h2 id="heading-get-it-running"><strong>Get It Running</strong></h2>
<p>I created an automated setup script that configures everything in about 10 minutes.</p>
<p><strong>Get it here:</strong> <a target="_blank" href="https://github.com/earlbellen/MSEnterpriseMCPServer">github.com/earlbellen/MSEnterpriseMCPServer</a></p>
<p>Includes setup script, VS Code configs, sample queries, and troubleshooting guide.</p>
<h2 id="heading-what-you-can-audit"><strong>What You Can Audit</strong></h2>
<p><strong>Users:</strong> Password age, account status, licenses, MFA enablement</p>
<p><strong>Groups:</strong> Types, memberships, sync status, expiration <strong>Roles:</strong> Directory assignments, PIM schedules, service principal privileges</p>
<p><strong>Governance:</strong> Access reviews, Conditional Access, administrative units</p>
<p>Ask questions, get answers, export to CSV. Done.</p>
<h2 id="heading-security-risks"><strong>Security Risks</strong></h2>
<p>Natural language makes auditing easy but also makes reconnaissance easy. If an attacker compromises an admin account, they can map your entire security posture in seconds.</p>
<p><strong>Mitigate with:</strong> Dedicated admin workstations only Conditional Access for privileged accounts PIM for just-in-time access Monitor Graph API audit logs Secure cached authentication tokens</p>
<p>This tool is powerful. Use it responsibly.</p>
<h2 id="heading-use-cases"><strong>Use Cases</strong></h2>
<p><strong>Incident Response:</strong> "Which accounts have Global Admin right now?"</p>
<p><strong>Compliance:</strong> "List privileged users and their last sign-in"</p>
<p><strong>Hygiene:</strong> "Show service principals with expired credentials"</p>
<p><strong>PIM Tracking:</strong> "What percentage of roles are eligible vs permanent?"</p>
<p>Next step: Extend this to Azure RBAC for subscription-level role auditing across your entire Azure estate.</p>
<h2 id="heading-bottom-line"><strong>Bottom Line</strong></h2>
<p>Auditing Entra ID no longer requires PowerShell expertise or Graph API memorization. MCP and GitHub Copilot make it conversational.</p>
<p>But power requires responsibility. The same queries that help you audit can help attackers reconnaissance. Use proper controls: PAWs, Conditional Access, PIM, and audit monitoring.</p>
<p><strong>Try it:</strong> <a target="_blank" href="https://github.com/earlbellen/MSEnterpriseMCPServer">github.com/earlbellen/MSEnterpriseMCPServer</a></p>
<hr />
<p><strong>Dave Bellen</strong><br />Connect: <a target="_blank" href="https://github.com/earlbellen">GitHub</a> | <a target="_blank" href="https://linkedin.com/in/davebellen">LinkedIn</a></p>
<p><em>Tech for Good.</em></p>
<h3 id="heading-resources"><strong>Resources</strong></h3>
<p><a target="_blank" href="https://learn.microsoft.com/en-us/graph/mcp-server/get-started?tabs=http%2Cvscode">Microsoft Learn: Get started with the MCP server for Microsoft Graph</a></p>
<p><a target="_blank" href="https://learn.microsoft.com/en-us/entra/id-governance/privileged-identity-management/">Microsoft Entra ID Privileged Identity Management</a></p>
<p><a target="_blank" href="https://modelcontextprotocol.io/">Model Context Protocol</a></p>
<p><a target="_blank" href="https://github.com/earlbellen/MSEnterpriseMCPServer">My GitHub Repository</a></p>
]]></content:encoded></item><item><title><![CDATA[n8n AI Automation – Slack Assistant with Google Sheets Integration]]></title><description><![CDATA[I recently completed the LinkedIn Learning course Build AI Agents and Automate Workflows with n8n by Morten Rand-Hendriksen. The course introduced me to the fundamentals of workflow automation with n8n, along with advanced concepts for building AI-po...]]></description><link>https://davebellen.com/n8n-ai-automation-slack-assistant-with-google-sheets-integration</link><guid isPermaLink="true">https://davebellen.com/n8n-ai-automation-slack-assistant-with-google-sheets-integration</guid><category><![CDATA[n8n]]></category><category><![CDATA[AI-automation]]></category><category><![CDATA[AI Workflows]]></category><category><![CDATA[ai agents]]></category><category><![CDATA[TechForGood]]></category><category><![CDATA[google sheets]]></category><category><![CDATA[slack]]></category><dc:creator><![CDATA[Daven Earl Bellen]]></dc:creator><pubDate>Wed, 24 Sep 2025 09:59:39 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1758709152792/fa77053c-0c74-4f3c-a61d-7e26149e9ff5.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I recently completed the LinkedIn Learning course <em>Build AI Agents and Automate Workflows with n8n</em> by <strong>Morten Rand-Hendriksen</strong>. The course introduced me to the fundamentals of workflow automation with n8n, along with advanced concepts for building AI-powered agents that can connect with existing tools.</p>
<p>As a capstone activity, I built an <strong>AI-powered Slack chatbot</strong> that integrates with <strong>Google Sheets</strong>. The chatbot works as an intelligent assistant, retrieving and referencing records from a spreadsheet while interacting naturally with users inside <strong>Slack</strong>.</p>
<div class="embed-wrapper"><div class="embed-loading"><div class="loadingRow"></div><div class="loadingRow"></div></div><a class="embed-card" href="https://youtu.be/FnUHldR9C6E">https://youtu.be/FnUHldR9C6E</a></div>
<p> </p>
<hr />
<h2 id="heading-what-is-n8n">What is n8n?</h2>
<p>n8n is an open-source workflow automation platform that allows users to connect applications, APIs, and AI models together with low-code workflows. It can be run in the cloud, on-premises, or locally for full control.</p>
<p>More than a simple connector, n8n enables the creation of <strong>AI agents</strong> that understand natural language, interact with external data sources, and execute automated tasks. This flexibility makes it suitable for both simple automations and more advanced AI-driven solutions.</p>
<hr />
<h2 id="heading-key-learnings-from-the-course">Key Learnings from the Course</h2>
<p>The course covered a range of concepts and practical applications, including:</p>
<ul>
<li><p><strong>Understanding n8n:</strong> How it functions as a workflow automation tool.</p>
</li>
<li><p><strong>Creating workflows:</strong> Designing processes with standard integrations in the low-code interface.</p>
</li>
<li><p><strong>Building AI-powered agents:</strong> Using AI models from major vendors to process natural language inputs.</p>
</li>
<li><p><strong>Custom MCP servers:</strong> Extending automation capabilities through multi-agent tool use and coordination.</p>
</li>
</ul>
<p>These learnings provided me with both the foundation and practical steps needed to design a working AI assistant.</p>
<hr />
<h2 id="heading-technologies-used">Technologies Used</h2>
<ul>
<li><p><strong>n8n</strong> – The automation engine for building and running workflows.</p>
</li>
<li><p><strong>Google Sheets</strong> – The structured data source for storing and retrieving records.</p>
</li>
<li><p><strong>Slack</strong> – The communication platform where users interact with the assistant.</p>
</li>
<li><p><strong>AI Models</strong> – For natural language understanding and task execution.</p>
</li>
<li><p><strong>MCP Server</strong> – To enable multi-agent tool use and extend the functionality of the workflow.</p>
</li>
</ul>
<hr />
<h2 id="heading-the-solution-slack-chatbot-with-google-sheets-integration">The Solution: Slack Chatbot with Google Sheets Integration</h2>
<p>The project output is a <strong>Slack chatbot</strong> that assists team members in accessing spreadsheet records quickly and accurately. The workflow operates as follows:</p>
<ol>
<li><p>A user sends a query in Slack.</p>
</li>
<li><p>The chatbot processes the input with an AI model.</p>
</li>
<li><p>n8n connects to Google Sheets to retrieve the requested information.</p>
</li>
<li><p>The MCP Server manages communication between tools for enhanced agent capabilities.</p>
</li>
<li><p>The chatbot responds in Slack with structured and clear information.</p>
</li>
</ol>
<p>This automation eliminates the manual step of opening and searching spreadsheets. Instead, users can rely on a natural conversation with the Slack bot to get the data they need.</p>
<hr />
<h2 id="heading-why-this-matters">Why This Matters</h2>
<p>The project demonstrates how <strong>AI, workflow automation, and MCP servers</strong> can be combined to solve practical problems. Many organizations use Slack for communication and Google Sheets for data management. By integrating the two with an AI-powered agent, repetitive tasks like lookups and record checks become faster and more efficient.</p>
<p>During this process, I also discovered that <strong>n8n has a built-in connector for Microsoft Entra</strong>. As someone who works with identity and access management, this excites me because it opens opportunities to create automations that directly integrate with Entra workflows.</p>
<hr />
<h2 id="heading-final-thoughts">Final Thoughts</h2>
<p>Completing this course gave me both the confidence and practical skills to start building AI-powered automations with n8n. The Slack chatbot integrated with Google Sheets, enhanced by an MCP server, is just one example of what is possible with this toolset.</p>
<p>This learning journey reinforced the importance of designing workflows that are simple for users while leveraging AI and automation to handle the complexity in the background. With the discovery of Entra integration in n8n, I look forward to pushing these experiments further into the identity and access management space.</p>
<p><em>Tech for Good.</em></p>
]]></content:encoded></item><item><title><![CDATA[SAML vs OIDC: What Really Happens Behind the Scenes]]></title><description><![CDATA[A few days ago, a peer asked me a question:

“You often integrate SSO in Entra ID, right? But do you actually know what happens behind the scenes in SAML or OIDC?”

That question made me pause. I knew how to add the application, configure the IdP, ex...]]></description><link>https://davebellen.com/saml-vs-oidc-what-really-happens-behind-the-scenes</link><guid isPermaLink="true">https://davebellen.com/saml-vs-oidc-what-really-happens-behind-the-scenes</guid><category><![CDATA[#cybersecurity]]></category><category><![CDATA[IAM]]></category><category><![CDATA[SSO]]></category><category><![CDATA[OIDC]]></category><category><![CDATA[SAML]]></category><category><![CDATA[Entra ID]]></category><dc:creator><![CDATA[Daven Earl Bellen]]></dc:creator><pubDate>Thu, 21 Aug 2025 07:04:55 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/stock/unsplash/RMIsZlv8qv4/upload/632a596043b5b22604b56a896c28a5b5.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>A few days ago, a peer asked me a question:</p>
<blockquote>
<p><em>“You often integrate SSO in Entra ID, right? But do you actually know what happens behind the scenes in SAML or OIDC?”</em></p>
</blockquote>
<p>That question made me pause. I knew how to add the application, configure the IdP, exchange certificates, assign roles, and test the login. But if I’m being honest, I hadn’t really thought deeply about <strong>how these protocols actually worked</strong> once the user clicked “Sign in.”</p>
<p>So I decided to dig in. And here’s what I learned about <strong>SAML and OIDC</strong>—two of the most widely used Single Sign-On (SSO) protocols.</p>
<hr />
<h2 id="heading-why-sso-matters">Why SSO Matters</h2>
<p>SSO exists to make life easier: users log in once, and they gain access to multiple apps without typing their password again and again (Microsoft Learn – SSO basics).</p>
<p>In Entra ID, this looks seamless. But underneath that convenience are <strong>protocols handling trust, tokens, and identity exchange</strong>.</p>
<p>The two most common protocols? <strong>SAML</strong> (older, XML-based) and <strong>OIDC</strong> (newer, JSON-based, built on OAuth 2.0).</p>
<hr />
<h2 id="heading-the-high-level-flow">The High-Level Flow</h2>
<p>No matter which protocol you use, the flow has the same main actors:</p>
<ul>
<li><p><strong>User</strong> – the person trying to log in.</p>
</li>
<li><p><strong>Identity Provider (IdP)</strong> – the trusted authority (like Entra ID).</p>
</li>
<li><p><strong>Service Provider (SP)</strong> or <strong>Relying Party (RP)</strong> – the application the user wants to access.</p>
</li>
</ul>
<p>The flow looks like this:</p>
<ol>
<li><p>The user requests access to an app.</p>
</li>
<li><p>The app redirects them to the IdP.</p>
</li>
<li><p>The IdP verifies the user and issues a token or assertion.</p>
</li>
<li><p>The app validates it.</p>
</li>
<li><p>The user is logged in.</p>
</li>
</ol>
<p>Simple on the surface, but the details differ between SAML and OIDC.</p>
<hr />
<h2 id="heading-deep-dive-saml">Deep Dive: SAML</h2>
<p>SAML (Security Assertion Markup Language) is XML-based and has been around since the early 2000s. It shines in enterprise environments with legacy apps (Microsoft SAML docs).</p>
<ul>
<li><p>The IdP sends an <strong>Assertion</strong> (in XML) containing who the user is and sometimes their role or group membership.</p>
</li>
<li><p>The Service Provider validates the Assertion using the configured certificate.</p>
</li>
<li><p>If it checks out, the user is authenticated.</p>
</li>
</ul>
<p>Think of it as: <strong>“Here’s a signed document proving this person is who they say they are.”</strong></p>
<hr />
<h2 id="heading-deep-dive-oidc">Deep Dive: OIDC</h2>
<p>OIDC (OpenID Connect) is the modern cousin. Built on top of OAuth 2.0, it uses <strong>JSON Web Tokens (JWTs)</strong> (Microsoft OIDC docs).</p>
<ul>
<li><p>The IdP issues an <strong>ID Token</strong> (JWT) after the user signs in.</p>
</li>
<li><p>The token is compact, base64-encoded, and easier for developers to work with.</p>
</li>
<li><p>Apps can also request <strong>Access Tokens</strong> to call APIs.</p>
</li>
</ul>
<p>Think of it as: <strong>“Here’s a lightweight badge with your photo and details, easy for apps and APIs to scan.”</strong></p>
<hr />
<h2 id="heading-comparing-saml-and-oidc">Comparing SAML and OIDC</h2>
<p>Here’s a quick side-by-side:</p>
<div class="hn-table">
<table>
<thead>
<tr>
<td><strong>Aspect</strong></td><td><strong>SAML</strong></td><td><strong>OIDC</strong></td></tr>
</thead>
<tbody>
<tr>
<td>Format</td><td>XML</td><td>JSON (JWT)</td></tr>
<tr>
<td>Built on</td><td>Custom XML protocol</td><td>OAuth 2.0</td></tr>
<tr>
<td>Best suited for</td><td>Legacy enterprise web apps</td><td>Modern apps, APIs, mobile</td></tr>
<tr>
<td>Token type</td><td>Assertion</td><td>ID Token (JWT)</td></tr>
<tr>
<td>Complexity</td><td>Heavy, verbose</td><td>Lightweight, developer-friendly</td></tr>
</tbody>
</table>
</div><p>A nice overview of how these protocols compare is also available in Auth0’s Identity Protocols Explained.</p>
<hr />
<h2 id="heading-the-risks-of-mishandling">The Risks of Mishandling</h2>
<p>This is where it gets serious. If you misconfigure or mishandle SSO, the impact is huge: one compromise could open doors to multiple apps.</p>
<ul>
<li><p><strong>SAML Risks</strong></p>
<ul>
<li><p>Assertion replay attacks if assertions aren’t time-bound.</p>
</li>
<li><p>Forgetting to validate digital signatures.</p>
</li>
<li><p>Poor certificate management.</p>
</li>
</ul>
</li>
<li><p><strong>OIDC Risks</strong></p>
<ul>
<li><p>Treating ID Tokens as proof of authorization (they’re not).</p>
</li>
<li><p>Not validating signatures, issuers, or expiration times.</p>
</li>
<li><p>Storing tokens insecurely (e.g., localStorage → XSS risk).</p>
</li>
</ul>
</li>
<li><p><strong>Common Risks</strong></p>
<ul>
<li><p>Weak security at the IdP = compromise everywhere.</p>
</li>
<li><p>Insecure redirect URIs → attackers hijack sessions.</p>
</li>
<li><p>Over-permissioned apps trusting SSO blindly.</p>
</li>
</ul>
</li>
</ul>
<p>Many of these pitfalls are also highlighted in the OWASP Authentication Cheat Sheet, which is a must-read if you work with identity.</p>
<p>In other words: <strong>SSO doesn’t remove risk, it centralizes it.</strong></p>
<hr />
<h2 id="heading-closing-thoughts">Closing Thoughts</h2>
<p>That question—“Do you actually know what happens behind the scenes?” was a wake-up call.</p>
<p>Integrating SSO in Entra ID is easy. But understanding what’s going on with <strong>SAML and OIDC</strong> helps me appreciate both the power and the responsibility that comes with it.</p>
<p>These protocols are the silent backbone of modern authentication. And as identity professionals, it’s not enough to just wire them up. We need to know the risks, validate tokens properly, and configure them securely.</p>
<p>Because when SSO breaks, it’s not just one app at risk.</p>
<hr />
<h2 id="heading-references">References</h2>
<ul>
<li><p><a target="_blank" href="https://learn.microsoft.com/en-us/entra/identity/enterprise-apps/what-is-single-sign-on">Microsoft Learn – SSO basics</a></p>
</li>
<li><p><a target="_blank" href="https://learn.microsoft.com/en-us/entra/identity/enterprise-apps/single-sign-on-saml-protocol">Microsoft Learn – SAML protocol</a></p>
</li>
<li><p><a target="_blank" href="https://learn.microsoft.com/en-us/entra/identity-platform/v2-protocols-oidc">Microsoft Learn – OIDC protocol</a></p>
</li>
<li><p><a target="_blank" href="https://auth0.com/docs/authenticate/protocols">Auth0 – Identity Protocols Explained</a></p>
</li>
<li><p><a target="_blank" href="https://cheatsheetseries.owasp.org/cheatsheets/Authentication_Cheat_Sheet.html">OWASP – Authentication Cheat Sheet</a></p>
</li>
</ul>
]]></content:encoded></item><item><title><![CDATA[Timeline: My Career Shift from Mechanical Engineer to Cybersecurity]]></title><description><![CDATA[What This Blog Is About
In this second blog, I want to look back on my work journey—from my early days as a mechanical engineer to where I am now in cybersecurity. I’ll walk you through the timeline of my roles, highlight the key skills and decisions...]]></description><link>https://davebellen.com/timeline-my-career-shift-from-mechanical-engineer-to-cybersecurity</link><guid isPermaLink="true">https://davebellen.com/timeline-my-career-shift-from-mechanical-engineer-to-cybersecurity</guid><category><![CDATA[Blogging]]></category><category><![CDATA[careershift]]></category><category><![CDATA[#cybersecurity]]></category><dc:creator><![CDATA[Daven Earl Bellen]]></dc:creator><pubDate>Sun, 04 May 2025 21:31:37 GMT</pubDate><content:encoded><![CDATA[<h2 id="heading-what-this-blog-is-about">What This Blog Is About</h2>
<p>In this second blog, I want to look back on my work journey—from my early days as a mechanical engineer to where I am now in cybersecurity. I’ll walk you through the timeline of my roles, highlight the key skills and decisions that shaped my path, and share what I would do differently if I were just starting my transition today. My hope is that anyone looking to shift into tech or cybersecurity can take something useful from this.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1746393737368/d07cb1ef-da21-4d7c-a4e4-9dfda51673ab.png" alt="Left: Just before kicking off a client project as an Identity &amp; Access Management Engineer—outside their building in Sydney. Right: Unwinding after work—on a boat to Manly Beach in my One Piece costume, with the Sydney Opera House quietly in the background." class="image--center mx-auto" /></p>
<p><em>Left: Just before kicking off a client project as an Identity &amp; Access Management Engineer—outside their building in Sydney.</em><br /><em>Right: Unwinding after work—on a boat to Manly Beach in my One Piece costume, with the Sydney Opera House quietly in the background.</em></p>
<h2 id="heading-game-changing-moments-timeline-from-mechanical-engineer-to-cybersecurity">Game-Changing Moments: Timeline from Mechanical Engineer to Cybersecurity</h2>
<p>As you look at the diagram below, you’ll see a visual representation of the key milestones in my journey from mechanical engineering to cybersecurity. The timeline highlights not only the different roles I’ve taken on but also key initiatives and skills that helped shape my career.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1746393802907/225a1442-fa3a-47c6-8fd1-a52f991bebeb.png" alt class="image--center mx-auto" /></p>
<p>My path into cybersecurity wasn’t a straight highway—it was shaped by pivots, <strong>initiatives</strong> (especially initiatives!), and accumulating transferable skills across different fields.</p>
<ul>
<li><p><strong>2017</strong> – I became a licensed Mechanical Engineer. This trained me in problem-solving, systems thinking, and analytical discipline.</p>
</li>
<li><p><strong>2018–2020</strong> – As an Equipment and Technical Sales Engineer, I learned to connect technical concepts with client needs—strengthening my communication and business acumen.</p>
</li>
<li><p><strong>2020–2021</strong> – While in Property Management, I initiated a COVID-19 contact tracing solution using Microsoft Power Platform. This was my first real experience applying low-code automation to a real-world problem.</p>
</li>
<li><p><strong>2021</strong> – I formally shifted into tech as a Power Platform Developer. I built automated workflows, Power BI dashboards, and even deployed solutions using Azure Data Factory—bridging into cloud technologies.</p>
</li>
<li><p><strong>2022–Present</strong> – As an Identity and Access Management Engineer, I support enterprise clients using Entra ID and PowerShell. I led a UAR remediation project in Sydney and now help train new hires—closing the loop on my transition.</p>
</li>
</ul>
<p>The journey wasn’t linear, but each chapter gave me tools and experiences that now power my role in cybersecurity.</p>
<h2 id="heading-how-its-going">How It's Going</h2>
<p>The journey hasn’t stopped at landing a cybersecurity role—I’m still in the thick of building strong foundations.</p>
<p>I continue to strengthen my grasp on <strong>Linux, Bash, PowerShell, and Networking</strong>—essentials in this field that, for me, have been recurring stumbling blocks. Progress isn’t always fast, but I’ve learned to lean into <strong>“learning by teaching.”</strong> Guiding new hires motivates me to stay sharp and deepen my understanding.</p>
<p>Even as I work through the fundamentals, I’ve seen meaningful progress. I had the opportunity to contribute to a remediation project overseas, and I’m now part of a team that supports large-scale identity systems. It reminds me that you don’t need to have everything mastered to make an impact.</p>
<p>One of my superiors once joked that I’m like <strong>Orochimaru</strong> from <em>Naruto anime series</em>—a character known for collecting countless techniques and mastering many abilities. It was meant as a compliment about my range of skills across different fields. In a way, that’s the long-term goal in cybersecurity too: to become “Orochimaru” by building a deep and wide skillset across IT and using that to approach security holistically.</p>
<p>I’m still overwhelmed by how much there is to learn—but I remind myself that growth in this field comes from consistent curiosity, not overnight mastery. I’m staying hungry and looking ahead. <strong>DevSecOps</strong> and <strong>AI Security</strong> are directions I’m actively considering as I shape the next chapter of this journey.</p>
<h2 id="heading-if-i-could-start-over-smarter-ways-to-transition">If I Could Start Over: Smarter Ways to Transition</h2>
<p>If I could start over, I’d take a more structured and realistic approach—one that includes <strong>two types of networking</strong> from the beginning:</p>
<h3 id="heading-1-technical-networking-the-it-foundations-you-cant-skip">1. Technical Networking (the IT foundations you can’t skip)</h3>
<p>Before diving into cybersecurity-specific courses or certifications, I’d start with the <strong>core systems and tools that security work is built on</strong>:</p>
<ul>
<li><p><strong>Operating Systems</strong>: Learn the basics of <strong>Linux</strong> and <strong>Windows</strong>—how they work, how to navigate them, and how they’re secured.</p>
</li>
<li><p><strong>Scripting Skills</strong>: Get hands-on with <strong>Bash</strong> and <strong>PowerShell</strong>—two powerful tools for automation, analysis, and system management.</p>
</li>
<li><p><strong>Computer Networking</strong>: Understand IP addressing, ports, protocols, DNS, firewalls, and how the internet works.</p>
</li>
<li><p><strong>Cloud Fundamentals</strong>: Once the above are solid, move into <strong>cloud platforms like Azure and AWS</strong>—this is where a lot of modern security happens.</p>
</li>
<li><p><strong>Cybersecurity Role Tracks</strong>: Only then would I start choosing a path—SOC Analyst, IAM, DevSecOps, etc.—and look for focused training.</p>
</li>
</ul>
<p>Starting here would have saved me a lot of rework and confusion later on. These are the building blocks that often become stumbling blocks when skipped too early.</p>
<h4 id="heading-where-to-start-learning">Where to start learning</h4>
<p>If you are willing to spend some on learning, I recommend subscribing to <a target="_blank" href="http://tryhackme.com"><strong>tryhackme.com</strong></a>. For me, they have the best materials for beginners. If you are on a budget, you may start looking for cybersecurity roadmap in <a target="_blank" href="http://roadmap.sh"><strong>roadmap.sh</strong></a>. They curate roadmaps for many IT careers and within nodes are free learning sources.</p>
<h3 id="heading-2-social-networking-the-kind-that-builds-your-career">2. Social Networking (the kind that builds your career)</h3>
<p>Just as important: <strong>build your circle early</strong>. Join Discord groups, take part in local or online tech meetups, follow cybersecurity folks on LinkedIn, ask questions, and offer help when you can.<br />Connecting with people accelerates your learning, keeps you accountable, and exposes you to opportunities you won’t find on job boards. In my case, I might not have landed my current role if I hadn’t reached out to the hiring manager <strong>two years before</strong> I even applied. That early connection was a key factor in getting my foot in the door when the opportunity came up.</p>
<h2 id="heading-parting-thoughts-amp-next-steps">Parting Thoughts &amp; Next Steps</h2>
<p>Looking back on this journey, it’s clear that success isn’t about having everything figured out from the start—it’s about continuously learning, adapting, and seizing opportunities as they come. My transition from mechanical engineering to cybersecurity wasn’t a straightforward path, but each twist and turn has shaped who I am today.</p>
<p>For anyone considering a similar shift, my advice is simple: <strong>stay curious, be proactive, and don’t be afraid to reach out to others</strong>. The tech world moves fast, but there’s always room for problem solvers. Keep learning, whether through formal courses, hands-on experience, or teaching others. Build your network early and engage with the community—it’s more important than you might realize.</p>
<p>As I look ahead, I’m excited about the potential in DevSecOps and AI security, but there’s still so much more to learn.</p>
]]></content:encoded></item><item><title><![CDATA[From Mechanical Engineer to Cybersecurity Beginner - My Ongoing Career Shift]]></title><description><![CDATA[Four years ago, I was working as a mechanical engineer, focused on systems, machines, and processes that you could physically see and touch. It was a solid career—and one I’m still proud of—but something inside me felt restless. I was curious about t...]]></description><link>https://davebellen.com/from-mechanical-engineer-to-cybersecurity-beginner-my-ongoing-career-shift</link><guid isPermaLink="true">https://davebellen.com/from-mechanical-engineer-to-cybersecurity-beginner-my-ongoing-career-shift</guid><category><![CDATA[careershift]]></category><category><![CDATA[Blogging]]></category><category><![CDATA[gym]]></category><dc:creator><![CDATA[Daven Earl Bellen]]></dc:creator><pubDate>Sun, 27 Apr 2025 18:55:04 GMT</pubDate><content:encoded><![CDATA[<p>Four years ago, I was working as a <strong>mechanical engineer</strong>, focused on systems, machines, and processes that you could physically see and touch. It was a solid career—and one I’m still proud of—but something inside me felt restless. I was curious about tech, fascinated by the digital world, and increasingly drawn to the idea of working in <strong>cybersecurity</strong>.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1745779939055/edb74e42-0825-4225-b211-374c604f5314.png" alt /></p>
<p>Today, I work as an <strong>IAM (Identity and Access Management) Engineer</strong>. I won’t pretend I have it all figured out. Most days, I still feel like a <strong>beginner</strong>—and in many ways, I am. But I’ve come far enough to look back and say: I’m glad I took the leap.</p>
<h3 id="heading-why-i-took-the-leap">Why I Took the Leap</h3>
<p>Like a lot of career shifters, I didn’t start with a degree in Computer Science or any formal training in IT. What I had was <strong>curiosity</strong> and a desire to build something different for myself. I started learning online, asking questions, saying yes to small tasks at work, and leaning into the uncomfortable feeling of not knowing.</p>
<p>When I landed my first opportunity in IT, I kept going. I slowly found my way into <strong>Cybersecurity</strong>, specifically in <strong>IAM</strong>, where I help manage who gets access to what in an organization. It’s a mix of logic, security, and structure—and while I’m still growing into the role, I love where it's heading.</p>
<h3 id="heading-what-this-blog-is-about">What This Blog Is About</h3>
<p>I’m starting this blog not as an expert, but as a <strong>fellow learner</strong>. If you're thinking of switching careers, starting fresh, or just curious about tech—I’m writing this for you.</p>
<p>You’ll find posts about:</p>
<ul>
<li><p>What it’s like to shift into tech from a different field</p>
</li>
<li><p>Tips for beginners learning cybersecurity and IAM</p>
</li>
<li><p>Study resources, small wins, and lessons from my journey</p>
</li>
<li><p>A bit of lifestyle too—especially fitness, which keeps me grounded</p>
</li>
</ul>
<h3 id="heading-the-gym-and-the-journey">The Gym and the Journey</h3>
<p>I’ve always enjoyed going to the gym. In fact, lifting weights played a huge role in shaping my mindset during the career shift. It taught me about <strong>consistency, delayed gratification, and showing up even when it’s hard</strong>. I don’t hit personal records every day—but I show up. The same goes for my tech journey.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1745780043232/3975d213-0503-4ae0-8524-ac133ff3ba3c.jpeg" alt /></p>
<h3 id="heading-you-dont-have-to-be-an-expert-to-start">You Don’t Have to Be an Expert to Start</h3>
<p>This blog is about starting, not arriving. I’m not here to teach from a podium—I’m here to <strong>walk alongside</strong> those who are figuring it out, just like I am.</p>
<p>So if you’ve been hesitating to try something new, to learn a new skill, or to start over—consider this your sign. You don’t have to be an expert. You just have to start.</p>
<p>Let’s figure it out together.</p>
<p>—<br /><em>Thanks for reading. If you’re on a similar journey, I’d love to connect. Let’s share notes, lessons, and support each other along the way.</em></p>
]]></content:encoded></item></channel></rss>