Polymath vs Specialization

March 9, 2022 · 4 min read

I've been on both sides of this. Early in my career I went deep into pentesting. I knew network protocols, exploit development, and vulnerability research inside and out. That depth got me into rooms I wouldn't have entered otherwise. But later, when I moved into cloud security, then presales, then AI security, it was the breadth that made me useful.

So which path is better? It depends on where you are and what you're trying to do. But the honest answer is more nuanced than "pick one."

The Case for Going Deep

Specialists get hired first. When a company needs someone who understands kernel exploitation or AWS IAM policy evaluation at a deep level, they're not looking for a generalist. They need someone who has spent years in that specific trench.

Think about the people who built their careers around Kubernetes security, or the researchers who spend months fuzzing a single protocol. That depth produces the kind of insight you can't get from surface-level knowledge. It's how zero-days get found. It's how complex architectures get secured properly.

The risk? Technologies shift. If you spent a decade becoming the world's best Flash security researcher, 2020 was a rough year. Specialization pays well right up until the market moves under your feet.

The Case for Going Wide

The most interesting security problems I've worked on required pulling from multiple domains. Understanding how an application vulnerability chains with a cloud misconfiguration and a weak identity policy to create a real breach scenario... that's not something a single-domain specialist sees easily.

People like Jeff Bezos and Elon Musk get cited as polymaths, but you don't need to be a billionaire for this to apply. In security, the folks who can talk to developers about code, explain risk to executives, and still get hands-on with infrastructure are incredibly valuable. They connect dots that specialists miss.

The downside is real though. When you spread yourself across five domains, you might not go deep enough in any of them to be the person who gets called for the hard problems. You end up knowing a little about a lot, which can feel like you're always playing catch-up.

What Actually Works

The best security professionals I've met over 25 years follow a pattern. They go deep in one area first. They build real expertise, earn credibility, and develop strong fundamentals. Then they expand outward, using that foundation to learn adjacent domains faster than someone starting from scratch.

A pentester who learns cloud architecture becomes a cloud security specialist who actually understands attacker methodology. A developer who learns security becomes the person who builds secure systems from the ground up, not as an afterthought.

The key is that the breadth is built on top of depth, not instead of it. Start with a strong foundation. Get really good at one thing. Then let your curiosity pull you into the next area. That's not being a generalist or a specialist. It's being someone who compounds knowledge over time.

Don't stress about picking the "right" path. Pick something that genuinely interests you, go deep, and stay curious about everything around it. The rest tends to sort itself out.

← Back to all posts