Personal Narrative Essay

By Prince Damte


There is a particular kind of clarity that comes with starting over. When I arrived in the United States from Ghana in 2019, in my early twenties, I carried with me little more than ambition and a lifelong fascination with technology. I did not know exactly what my path would look like. I only knew that America represented possibility, and that technology — in all its complexity and power — was the world I wanted to inhabit. What I could not have predicted then was that I would find my place not just in technology broadly, but in one of its most critical and urgent corners: cybersecurity.

Growing up in Ghana, technology was never far from my curiosity. I was drawn to computers the way some people are drawn to music or sport — instinctively, almost inexplicably. I tinkered. I watched. I asked questions that adults around me sometimes could not answer. The internet felt like a vast territory waiting to be explored, and I was always looking for the edges of it, the places where things worked in ways that were not immediately obvious. That curiosity, I would later learn, is one of the most important qualities a cybersecurity professional can have. The field rewards people who cannot help but ask why and how — people who are not satisfied with the surface of things.

When I made the decision to move to the United States, the choice to pursue technology formally felt natural. But it was not until I began my studies that I understood how many directions technology could take me. Software development, data science, IT management — the options were broad. It was during my early coursework that I encountered cybersecurity in a way that felt different from everything else. Not just as a technical discipline, but as something with real stakes. Every system I learned about had vulnerabilities. Every network had a perimeter that someone, somewhere, was trying to breach. And behind every breach was a real organization, real data, real people whose lives could be disrupted. That weight — the understanding that this work matters — is what drew me in and has kept me engaged ever since.

My journey into the hands-on side of cybersecurity began modestly. I started learning Kali Linux, the operating system that has become something of a home base for security professionals and ethical hackers. Working through its tools for the first time, I felt the same excitement I had felt as a child poking at computers in Ghana — the thrill of discovery, of learning how systems could be tested and understood from the inside out. Python followed, and with it a new appreciation for automation and scripting. Writing code to interact with systems, to scan them, to parse their outputs, opened up a new dimension of what cybersecurity work could look like. These were not just theoretical skills. They were the building blocks of a professional identity I was beginning to construct.

I have made mistakes along the way — tools that did not behave as expected, concepts that took weeks to click into place, moments where the complexity of the field felt genuinely overwhelming. But I have come to understand that struggle is not a sign of failure in this discipline. It is, in fact, the job. Cybersecurity is an adversarial field. The threats evolve, the tools change, and the only way to stay relevant is to stay curious and stay humble. Every difficult lab, every failed attempt followed by a successful one, has reinforced something in me: the belief that persistence is as important as any technical skill.

Today, I am working toward two professional certifications — CompTIA Security+ and a Microsoft certification — both of which represent my commitment to building a credential base that employers in this field recognize and respect. These are not just items on a résumé. They are proof of study, of dedication, and of a standard met. Pursuing them while also completing my degree has required discipline and time management that I did not know I had when I first arrived in this country. But that is part of the story, too. Immigration is an exercise in reinvention. You learn, quickly, that you are more capable than you thought.

My goal is to become a Security Operations Center (SOC) analyst — a role that sits at the intersection of everything I find compelling about cybersecurity. SOC analysts are the defenders. They monitor systems in real time, detect threats before they become disasters, and respond when breaches occur. The role demands exactly the combination of skills I have been developing: an understanding of networks, the ability to analyze threats quickly and accurately, and the technical grounding to take meaningful action. It is a career that is never static, never routine, and never without consequence. That suits me perfectly.

This e-portfolio is a record of that journey. It is a collection of the work I have done, the skills I have developed, and the thinking that has shaped me as a cybersecurity student and emerging professional. The three skills at its core — network security and defense, threat analysis and incident response, and ethical hacking and penetration testing — are not arbitrary categories. They are the pillars of the career I am building, chosen because they reflect both what I have learned and where I am going. Each artifact in this portfolio tells a piece of that story.

I came to America with a love of technology and a willingness to work. I leave this chapter of my education with something more specific: a discipline, a direction, and a set of skills that I believe can contribute meaningfully to a field that the world genuinely needs. Cybersecurity is not a background concern anymore. It is front-page news. It is national infrastructure. It is personal privacy. It is, in many ways, the defining technical challenge of our era. I am proud to be preparing myself to meet it — and this portfolio is where that preparation lives.

Leave a Reply

Your email address will not be published. Required fields are marked *