I often see people in several security threads remarking that in order to enter the InfoSec field, you must first have a good understanding of programming languages (these are probably mostly made by just students or people in niche roles). This often drives those who’re genuinely interested to focus on being good at programming instead of learning the more important skills: networking, sysad, security/risk mgmt., etc. In the real world, information security work is mostly setting up and monitoring controls to comply with policies/regulations, use of tools such as scanners and SIEMs, analyzing output from those tools, responding to suspected incidents, and then basically documenting everything. Depending on your role as well, parricularly within a SOC setting, Python and bash or powershell could come in handy. But that’s basically it for most security work. Sure you can be a better cyber guy if you’re good at programming – but then again it still depends on your role (Most GRC folks don’t know how to code but are paid very well and work fewer hours).
Unless you want to focus exclusively on writing secure software, doing pentests, or reverse engineering (these roles are often found within cybersecurity firms), then you are not expected to be fluent in multiple languages.
TL:DR InfoSec is an enormous field where you can dedinitely find roles that don’t require extensive programming skills like you were led to believe. Most infosec work is really compliance and utilizing security tools rather than coding.