Question about best training for CNA/CNE Jobs?

in GIAC
TLDR: At bottom
I have a senior level background in network engineering ie routers/switches/firewalls and within the past 2-3 years I've been migrating over to a more cyber security focused role. I need assistance in pinning down where I need to round out my skills. I have been to multiple SANS courses (GCIA,GCIH,GPEN) and I want to know if CNE/CNA work is similar to the CTF/Netwars events that they put on. I basically am trying to get a foot in the door for some CNE/CNA jobs but most job openings are for highly specific roles, ie Mobile Malware Reverse Engineer.
I had a broad range of Cisco Certs and I currently hold the CEHv9, GCIA, GCIH and GPEN. My alst two years have been mainly blue team work, IDS/IPS etc. My biggest issue is I have 0 experience with pentesting outside of test/lab environments. While my jobs are in the related fields I am somewhat told to stay in my swimlane.
It was my assumption that CNE/CNA work would revolve around teamwork where most people had a specialty, ie one guy was the mobile dude, one was forensics, one was networking, one was pentesting web apps etc and they came together to work on projects, like if I dont know mobile I can talk to the mobile dude. Is this not the case, do you need to be an expert in all of these to get one of these jobs? Given my background which SANS course would be recommended to round out my skills. The SANS is given to me via work so I do not have to pay for it.
TLDR: I want a CNA/CNE job (can be govt), background is senior network engineering, obtained CEHv9, GCIA, GCIH and GPEN. Been doing blue team work past 2 years IDS/IPS. Very little coding experience (I can read code, but would have to google tons of stuff for syntax), familiar with broad range of pentest tools nmap metasploit kali linux etc etc. Very little forensic experience, 0 mobile experience, 0 reverse engineering. What SANS course would be recommended to give me a leg up?
Options.
GWAPT - WebApp Pen Testing - Build off of what I learned in GPEN
GMOB - Mobile Pen Testing - I know 0 about mobile apps.
GXPN - Advanced Pen Testing - Dunno if I would be overwhelmed by this.
GCFE - Forensics Baseline. - Basic forensic baseline.
CISSP - Resume Boost - I already have CEH which covers some DoD specs but CISSP would be just for resume boost.
Dunno where to really go here, I really enjoy doing netwars and downloading CTF VMS and trying to figure out how to get flags people have setup but I dont know where I want to "end up" career wise. Any ideas, suggestions?
I have a senior level background in network engineering ie routers/switches/firewalls and within the past 2-3 years I've been migrating over to a more cyber security focused role. I need assistance in pinning down where I need to round out my skills. I have been to multiple SANS courses (GCIA,GCIH,GPEN) and I want to know if CNE/CNA work is similar to the CTF/Netwars events that they put on. I basically am trying to get a foot in the door for some CNE/CNA jobs but most job openings are for highly specific roles, ie Mobile Malware Reverse Engineer.
I had a broad range of Cisco Certs and I currently hold the CEHv9, GCIA, GCIH and GPEN. My alst two years have been mainly blue team work, IDS/IPS etc. My biggest issue is I have 0 experience with pentesting outside of test/lab environments. While my jobs are in the related fields I am somewhat told to stay in my swimlane.
It was my assumption that CNE/CNA work would revolve around teamwork where most people had a specialty, ie one guy was the mobile dude, one was forensics, one was networking, one was pentesting web apps etc and they came together to work on projects, like if I dont know mobile I can talk to the mobile dude. Is this not the case, do you need to be an expert in all of these to get one of these jobs? Given my background which SANS course would be recommended to round out my skills. The SANS is given to me via work so I do not have to pay for it.
TLDR: I want a CNA/CNE job (can be govt), background is senior network engineering, obtained CEHv9, GCIA, GCIH and GPEN. Been doing blue team work past 2 years IDS/IPS. Very little coding experience (I can read code, but would have to google tons of stuff for syntax), familiar with broad range of pentest tools nmap metasploit kali linux etc etc. Very little forensic experience, 0 mobile experience, 0 reverse engineering. What SANS course would be recommended to give me a leg up?
Options.
GWAPT - WebApp Pen Testing - Build off of what I learned in GPEN
GMOB - Mobile Pen Testing - I know 0 about mobile apps.
GXPN - Advanced Pen Testing - Dunno if I would be overwhelmed by this.
GCFE - Forensics Baseline. - Basic forensic baseline.
CISSP - Resume Boost - I already have CEH which covers some DoD specs but CISSP would be just for resume boost.
Dunno where to really go here, I really enjoy doing netwars and downloading CTF VMS and trying to figure out how to get flags people have setup but I dont know where I want to "end up" career wise. Any ideas, suggestions?
Comments
Based on DoD Approved 8570 Baseline Certifications
GCIH, covers me for IAT level 3, and then CEH gives me CNDSP Analyst, infrastructure support, Incident responder and auditor. The only thing I cant do would be Manager or the IAM level 3.
I am based in washington DC and already have a high level security clearance so that is not an issue, my biggest issue I am running into is ive been working Senior level network engineer / security engineer jobs with senior pay, and im trying to transition over to a mid level job due to my lack of experience, to do this I want to expand my background but I am only seeing highly specific expert job offerings. I am not really sure what the job title is im looking for and what is required. Should I be looking for Pentesting jobs, vulnerabilty research/exploit dev? I thought CNA/CNE had teams of people that did this, is that not how it works? Like if I went to clearancejobs or usajobs, most of the ones I see use the keyword infosec, but then it turns out to be like a sysadmin job. What keywords should I be searching on.