My experience has been that security is not been an entry level job.
Traditional paths that lead to security careers include programming, systems administration, and IT audit.
For academic background, you may want to look at the NSA's
Centers of Excellence.
Best of luck,
Uno
This.
Your post is right on. It's really worth pointing out that most security work requires a broad knowledge of everything. Most GOOD security people jumped around in IT for years before getting into security. The reason is that you need to be competent at many areas of computer knowledge, beyond just a layman or user, in order to do a good job.
You need to be a pretty capable network administrator, you need to be a competent system administrator. You should be a moderately skilled programmer, or at least have a very firm understanding of it. You need to understand the basics of the hardware. You need some understanding of cryptography. You need some basic understanding of telephony. You also need a strong background in management and business process.
Here's a few questions you might need to answer during the course of a day as a security administrator (off the top of my head, these are questions I've had to answer this month, as a security expert):
What protocol layer does IPSEC operate at on the network? Describe it. Where is IPSEC normally used?
How does OSPF negotiate trust between routers?
What is DH Level 2 and how does it differ from Level 5 or Level 14? How is it used in IKE negotiations? Configure an IKE gateway for VPN connectivity.
How does 802.3q VLAN tagging (via trunking) affect the security of an ethernet wall jack? How would this differ if you were providing VOIP services? Configure a trunk port on a switch to demonstrate this.
Should we encrypt our SIP traffic? If so, why? What is the risk?
What is contained in a normal business continuity plan? Write one. Have it done by the end of the week. (bleahhhhh!!!)
What is the difference between Windows XP and Windows 7 in terms of malware and exploit resistance? (Your answer better mention something about ASLR/DEP, as well as UAC)
What happens to Windows devices that are not activated with MS, in regards to patching?
When deploying GPOs to Windows endpoints, what happens to laptops that aren't connected?
How do you protect against wireless MiTM attacks?
What is EAP-TLS and how does it differ from PEAP?
In Palo Alto firewalls, in what order are rules processed? When does rule processing stop?
In Cisco firewalls, how does rule processing differ?
Is a Cisco 2940 capable of performing firewall-like activities through ACLs? Describe the deficiencies that you might find in this configuration.
What .ini file options affect the security of PHP? How does PHP version 4 differ from Version 5?
What is SQL injection? Write a POST query to demonstrate SQL injection (assume your DBMS is Oracle).
What is cross-site scripting? Write a GET query to demonstrate reflected XSS in a nested JavaScript function (this is often tricky, fiddly JavaScript)
Write a business impact analysis for the XSS you just demonstrated.
Present this to an executive committee in 10 minutes or less. Use large words.
Off the top of your head, while standing in front of executives, answer teh following questions:
Is Ruby on Rails resistant to XSS? How about SQL Injection?
Has it ever been possible to execute SQL Injection against RoR?
Why can't I use Ruby to code iPhone apps? What language do I need to use? What are the security issues with that language?
When coding in Objective C, how much do I need to worry about security issues like SQL injection and buffer overflows?
Does my cat's breath smell like cat food?
All I'm getting at is that it's a wide variety of topics. Sure there are entry level "security" jobs, but you will be resetting people's passwords and staring at management consoles and be required to immediately escalate any flashing lights to someone with some experience.
I suggest getting into network and server administration, or coding (preferably both). Keep training with security things and getting certifications, when you can. Eventually, you can make a move into security.
At least that's how I did it....