Work Experience vs Certification Pursuit

Hi all,
I am in a very interesting predicament, that I have not been before. In my new IT Security Analyst position, (and one of the reason's I went back to this former employer because, well, they are chaotic) I've been given the opportunity to touch 10-15 security tools, some of which are in our Proof of Concept phase. and some of which are in production.
I am also tasked with Creating Security Controls, Policies, Procedures, and Processes, as well as monitoring, investigating, re-mediating.
I am able to work with IPS/IDS, Malware software like Cybereason, stealth bits auditor and interceptor for monitoring pre-authentication attempts, brute force, breached passwords, sideways movement, all the while being able to create our Procedures for how to use these tools. We are also heavily involved with Securing PHI, and under review for SOC2 certification, with HIPPA to follow again in a few months and HiTrust. There is literally soo much to do with so little time that when I get off, I am having difficulty putting time to pursuing the SSCP, because I can actually do things and grow hands on experience versus the text book knowledge that going through the SCCP would provide.
I will open up some time as I do want to get my SSCP and CISSP before the end of this year, however I am wondering if pushing those back and just doing more hands on work when i'm "off the clock" would be best for my growth. I definitely know my job would appreciate it. We are creating our Security Architecture from the ground up, from access controls, hardening, application requirements, and we haven't even touched end user group policy and techniques to combat rogue software and potentially unwanted programs (our users have local admin rights
) It's more a political battle to get those things put in place.. however just wondering what everyone thinks
I am in a very interesting predicament, that I have not been before. In my new IT Security Analyst position, (and one of the reason's I went back to this former employer because, well, they are chaotic) I've been given the opportunity to touch 10-15 security tools, some of which are in our Proof of Concept phase. and some of which are in production.
I am also tasked with Creating Security Controls, Policies, Procedures, and Processes, as well as monitoring, investigating, re-mediating.
I am able to work with IPS/IDS, Malware software like Cybereason, stealth bits auditor and interceptor for monitoring pre-authentication attempts, brute force, breached passwords, sideways movement, all the while being able to create our Procedures for how to use these tools. We are also heavily involved with Securing PHI, and under review for SOC2 certification, with HIPPA to follow again in a few months and HiTrust. There is literally soo much to do with so little time that when I get off, I am having difficulty putting time to pursuing the SSCP, because I can actually do things and grow hands on experience versus the text book knowledge that going through the SCCP would provide.
I will open up some time as I do want to get my SSCP and CISSP before the end of this year, however I am wondering if pushing those back and just doing more hands on work when i'm "off the clock" would be best for my growth. I definitely know my job would appreciate it. We are creating our Security Architecture from the ground up, from access controls, hardening, application requirements, and we haven't even touched end user group policy and techniques to combat rogue software and potentially unwanted programs (our users have local admin rights

Comments
Work experience will always be more valuable that the cert when viewed side by side. However, the cert is designed to compliment and validate the work experience you already have. If you have the time to do the cert, do it. However, you're not wasting time or hurting yourself in any way by pushing it back in exchanged for more work experience/focus. You're still building on what's most important, which will benefit you down the road.
Once you have a firm grasp and experience with the policy/procedure side of security you will probably find studying for the CISSP much easier. I would focus on learning all the stuff for your new role instead of studying for a managerial type cert. I know a lot of managers and HR types use the CISSP as a screener cert but I found it helped me more as an auditor now a days than it did as a security analyst.
If you want something that complements the CISSP, I'd go for a different certification, like something from ISACA or the SANS Institute. It will diversify you a bit more and if you are going to be doing additional fees, at least they would be to different organizations.
When I did my CISSP, I was also in a tight situation where I had started a new job, but it was a job requirement to get it within six months. I read the first few chapters of the two most widely used CISSP books (the AIO from Shon Harris [RIP], and the one from ISC2). After that, I just spent time thinking about for for the next two months... how does this thing I am doing apply, what domain is it in, what jargon is associated, how does it fit into the CIA triad, etc.). Then, at the end of month 3 on the job, I went to a Training Camp bootcamp and sat the exam on the Sunday after the training (proctor setup by Training Camp). Not everyone has that sort of luxury, but it was covered by work, else I would have self-studied.
- For holding an additional credential on the (ISC)² approved list belowValid experience includes information systems security-related work performed as a practitioner, auditor, consultant, investigator, or instructor that requires information security knowledge and involves the direct application of that knowledge. The five years of experience must be the equivalent of actual full-time information security work (not just information security responsibilities for a five-year period); this requirement is cumulative, however, and may have been accrued over a much longer period of time.
I have had lots of security responsibilities in my previous roles, however other than my job as a Test Center Administrator where my jobs was to ensure testers were not cheating on test, (There were policies and procedures for that, as well as requiring testers to use two factors for identification, Signatures/ID's and biometrics.) I am very concerned that I will not be able to hold the official title. I do have criteria to get 1 year knocked off, but since I didn't have an official title as a security person before this one.. makes me think just getting SSCP would be best bet for nowFirst and foremost keep your position as that's what is paying the bills today and giving you the opportunity to learn some pretty cool stuff. Love CyberReason for one. Other pieces you simply need to use RL in order to really get comfortable with NMAP, any flavor of Metasploit, Qualysis... I can go on and on. Like getting certified in EnCase without having performed a real case - another no, no.
Ease up on the gas a bit and enjoy the ride, bumpy as it may be. If your going to be in the same position for a while suck up all the security goodness you can and apply what your learning to what the book is telling you to study. They may not always agree. Particularly, on the hands on stuff.
Enjoy!
- b/eads