this post was submitted on 12 Jul 2023
29 points (100.0% liked)

cybersecurity

64 readers
1 users here now

An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!

Community Rules

Enjoy!

founded 1 year ago
MODERATORS
 

Hello! My name is Mike and I am an infosec engineer with 10+ years experience. I've worked in GRC, Vulnerability Management, PenTesting & AppSec. I have 17 SANS certs (I have a serious problem) and I'm also an infosec community enthusiast and creator/mod for /c/cybersecurity. AMA!

top 34 comments
sorted by: hot top controversial new old
[–] jerry@infosec.pub 5 points 1 year ago (2 children)

This is great! I should do one of these

[–] shellsharks@infosec.pub 1 points 1 year ago

I think that'd be frighteningly popular. You definitely should!

[–] wop@infosec.pub 4 points 1 year ago* (last edited 1 year ago) (1 children)

Thank you for the AMA.

Do you regularly feel overwhelmed? - Keeping up with the sec news and patch accordingly, firewall/ips and endpoint alarms, logs, meetings, and more. It shouldn't be the case, but it seems that everything in security is prio 1.

EDIT: and being the party pooper and saying no to everything, bc people do not think about security.

[–] shellsharks@infosec.pub 4 points 1 year ago (1 children)

Honestly I don't get overwhelmed by infosec. Though my personality is to take on more projects than I can chew and that can sort of overwhelm my time - I don't get emotionally overwhelmed easily though. Some of that I credit to my personality but I also credit how organized I am, it helps me keep track of everything on my plate and daily prioritization. Inbox Zero, using a task manager, having a personal Wiki (i.e. Obsidian/Simplenote) all help with this.

In the early days of my career I heard that sec people were the "no"-sayers in the group. I have learned over time that we don't need to be. Instead, we become the - "let us find a way to do that securely"-sayers. It's about creating that we're-a-team mentality.

[–] wop@infosec.pub 1 points 1 year ago (1 children)

Good points and thank you for your input. What kind of TaskManager do you use? Any system, or just simple list?

[–] shellsharks@infosec.pub 1 points 1 year ago

I mostly use Todoist

[–] iamak@infosec.pub 3 points 1 year ago (1 children)

I'm new to the field (I'll start masters in Sept). What all topics should I focus on to improve my resume? My previous exposure to the field is 1 ctf competition that's all.

[–] shellsharks@infosec.pub 4 points 1 year ago (1 children)

Having a CTF on your resume and being able to speak to that experience is great imo. Early-career is always a bit difficult for resumes since you wanna beef it up but you don't want to fill it with things that don't matter. CTFs, trainings, content you've created (blog, podcast, write-ups, GitHub), etc.. are all great things to put on there imo. If you have any coding projects or cloud experience (easy enough to get) you can put that on there too. Will you be looking to get a job while pursuing your masters?

[–] iamak@infosec.pub 2 points 1 year ago (1 children)

I'll go for something like a TA maybe. I have some job experience already (sde, not cybersec) so idk if it counts.

things that don't matter

Can you give some examples so that I can avoid that

[–] shellsharks@infosec.pub 3 points 1 year ago (1 children)

Mostly non-tech experience. This is subjective and will vary hiring team to hiring team but in this field I have always glossed over any non-tech things on a resume. There's so much opportunity for people to learn and get involved with IT/security that there's no excuse to not just focus on those competencies on the resume. Just my opinion.

[–] iamak@infosec.pub 2 points 1 year ago (1 children)

Okay. So my experience as a software developer while not the main thing being judged will still be relevant?

[–] shellsharks@infosec.pub 2 points 1 year ago (1 children)

Absolutely still relevant!

[–] iamak@infosec.pub 1 points 1 year ago (1 children)

Thanks a lot! Also any certifications I should start doing rn?

[–] shellsharks@infosec.pub 1 points 1 year ago (1 children)

Kinda depends what you want to get into. If you’ve let to land your first security job maybe something like Sec+ to help get your foot in the door. If you know what discipline you want to get into (appsec, endpoint-sec, etc…) this could help further filter down what cert/training might be best to shoot for. Do you know what you think you want to do?

[–] iamak@infosec.pub 0 points 1 year ago (1 children)

I was thinking Network Security. But I'm not sure about it. Sec+ will help me decide that?

[–] shellsharks@infosec.pub 1 points 1 year ago (1 children)

Depends what you mean by “Network Security”. A lot of companies have adopted cloud-first environments so traditional netsec is more so cloud infra. In this case there are cloud-specific certs from Azure, AWS, GCP you can take that would be great. If you’re considering traditional network security it may be different. (Though a lot is very much shared).

[–] iamak@infosec.pub 1 points 1 year ago

Okay. Thanks a lot! :)

[–] humanreader@infosec.pub 2 points 1 year ago (2 children)

Hi Mike, I recently started working as programming intern for a company doing webapps. I've worked part-time gigs in a completely different field before, that means I got no certs, no job experience in IT to speak of, I'm not the young guy fresh out of school anymore. However, my interests have always been to break into cybersecurity and have slowly added some relevant knowledge as bare minimum... linux bash scripting, selfhosting, networking and etc. I've been checking out the certs usually recommended plus all the specializations out there and gotta say this is no easy commitment, but I do want to learn.

The thing is, what I'm currently seeing as intern is very different from what people in this field usually speak of online: For example, I was expecting the latest tools and whistles, but the company I'm at uses very old (10 years) frameworks for maintenance and support for corporate clients, windows only, proprietary stuff with very little documentation online. It gets... demotivating? It's still a job and I have bills to pay, but I'm wondering how many years of experience do I need as a regular web developer (if my contract is renewed, even) to even attempt branching into infosec?

I know this gets asked a lot. Sorry for the long text. TL;DR: just started as intern programmer, company works with ancient dinosaurs instead of latest stuff, years of experience needed to become hackerman (or jumping from first one to others shown here)?

[–] Doe@infosec.pub 2 points 1 year ago (1 children)

If anything that’s a great learning environment. Offensive security is a lot of reverse engineering, figuring out how stuff works based off (extremely) limited information and understanding how best to attack it.

Moreover, as these are old systems, they’re more likely to be outdated and vulnerable - not that you should try without permission or a clear understanding of what you are doing, particularly on production gear.

At any rate, no company will pay you to learn a completely different job to the one they hired you for. So you’re going to have to spend some of your own time learning about security. Where to start has been repeated ad nauseam online so I won’t attempt it.

[–] humanreader@infosec.pub 1 points 1 year ago

Sorry for the late answer.

I haven't thought of it that way - if I can convince my boss to test my skills on the legacy systems the company is running, it could be beneficial for both... assuming I get permission and enough actual skills to assess vulnerabilities.

Thank you for the perspective. I agree that intro posts are repeated ad nauseam, I will find my own way.

[–] shellsharks@infosec.pub 2 points 1 year ago (1 children)

I don’t think there’s some minimum XP (in terms of YoE) bar to hit. You just need to be able to demonstrate your practical XP in some manner. Some people get this through work in IT/cyber, others through academics and others still through personal projects and doing things at home. There is a TON of self-teaching options these days through online trainings, CTFs, cons, meet-ups, etc… And lots of ways to document and market your experience and know-how (blogs, social media, podcast, etc…). Personally, I suggest learning a bit of coding, some cloud XP, start a small blog or post about what you’re learning on a micro-blogging platform and network network network.

As for your current place of employment, having a VERY legacy environment can actually be somewhat good for security as it may be “easier” in some respects to find misconfigurations and Vulns. Does your company have any security resources? If not, try to volunteer to help in that area, if they do, introduce yourself and ask to shadow/help/learn from them.

[–] humanreader@infosec.pub 2 points 1 year ago

I see. I will have to document my progress and remind myself the company isn't actually financing this. I should start by creating a blog.

Haven't personally talked to the IT dep yet - I am in a small dev team for internal webapps and the last time we contacted them was because of printer problems, hah. Will try contacting them once I feel ready.

Thank you for the insights. Sorry I took too long to respond.

[–] Penguincoder 2 points 1 year ago (1 children)

Did you pay for all those SANS certs yourself, or company foot the bill?

What's been most memorable incident or PenTest finding?

[–] shellsharks@infosec.pub 4 points 1 year ago (1 children)

I'd be either very broke or have to be very rich to have paid for all of those haha. Fortunately, I worked for a company that had a very generous training allotment. I've also managed to take quite a few entirely free by being part of their vTA (virtual TA) community, whereby I help instructors throughout the week of the course with student questions, lab setup, etc...

I can't go into too much detail on vulns specifically but I've found a number of high impact vulns in public-facing websites for companies I have worked for as well as one vuln in a popular proxy appliance that I should have submitted a CVE for but never did at the time.

[–] Penguincoder 2 points 1 year ago

We may have crossed paths if you TA for SANS... Pretty sure I know some other details for that proxy appliance vuln, or maybe it's just a real common vector.

[–] thundergun@infosec.pub 2 points 1 year ago (1 children)

Hey there Mike. Thanks for doing this. With AI/ML changing the face of infosec, what do you predict infosec will look like in 5 years?

Also as a fellow SANS enjoyer, it's great training. What are your top 5 SANS courses and why is GREM number 1?

[–] shellsharks@infosec.pub 4 points 1 year ago

Good Q, I'm no AI/ML expert by any means but I do think it's effects on the infosec industry will be muted to some extent, at-least in the 5 year time scale. I can see companies toying with the idea of AI-based capabilities replacing junior staff but from what I've seen from these tools thus far I don't think it would be particularly efficient to do so. Instead, I see AI being a force-multiplier / filling in existing gaps in the security workforce. Beyond 5 years who knows. The tech could progress to a point where it truly is capable of replacing human operators, even for cyber roles. The beauty of infosec though (as opposed to other tech disciplines like software engineering) is that too often we are thinking of ways to circumvent human thinking, and for AI models that were trained on how humans have traditionally thought, they are innately poor at this.

Top 5 SANS courses oh man... I'll give it a shot.

  1. SEC503 / GCIA (Intrusion Detection)
  2. FOR610 / GREM (Reverse Engineering)
  3. SEC564 (Red Team Ops)
  4. SEC460 / GEVA (T&VM)
  5. SEC450 / GSOC (Sec Ops)

I think 503 is the most valuable SANS course and I had a great instructor during my run. GREM was super technical and really fun. Not something I get to do with my day job. SANS Red Team course was really cool to learn the distinction between Red Teaming and Pen Testing, though it was only a 2-day course at the time. Both 460/450 were actually really amazing curriculums both with top notch instructors/course authors. Can't recommend them enough despite the fact they are 400 level courses.

[–] s1l3ntk1ll3r@infosec.pub 1 points 1 year ago (1 children)

Hi Mike, I'm a big fan of your blog and know you're a SCA (SANS Cert Addict) haha. Thanks for doing this AMA!

For someone who's been on the offensive security side of the house for a few years and now getting into more Application Security Engineer focused roles, what would be some recommendations in terms of a skills roadmap? (certs/study/training etc.). Thanks!

[–] shellsharks@infosec.pub 2 points 1 year ago (1 children)

Roadmaps are such a double-edged sword imo. I'm as guilty of trying to come up with roadmaps as anyone but have often round it get's me too focused on future activities when I really need to focus on the task at hand. It's of course important to have a destination in mind, and often that destination involves having multiple steps to get there (hence the roadmap), but you have to be cautious in biting off more than you can chew (as I have done a lot).

AppSec is, imo, the most interesting security discipline to be in right now. It's sort of all-encompassing and exposes you to a lot of things, coding, cloud, devops, modern frameworks, etc... Given your proximity to devs, learning as much as you can about coding is/will always be super valuable. Plus, if you can code you can automate which is a skill many in infosec don't have which can set you apart. There's so many specific directions to go in in terms of languages to learn, frameworks to master or sub-disciplines to focus on that it's hard to recommend any specific next step or path though. With coding chops, you have a lot of translatable and easily applicable skills for any job though.

Where do your interests lie? Building, breaking or defending?

[–] s1l3ntk1ll3r@infosec.pub 1 points 1 year ago (1 children)

Thank you! Yeah, I see myself in that deathtrap of trying to build out roadmaps and taking on way too many things a little too often haha. I definitely agree with you that AppSec is one of the most interesting security disciplines out there atm.

Given my background, I tend to gravitate towards breaking and a fair bit of defending but I'm fairly green when it comes to building. That said, I'm trying to improve my dev skills to be able to understand a developers mindset and be able to design and build an AppSec program from that PoV. On the same note, I've been looking into the CSSLP cert as a reference to help me along this journey, any thoughts on the cert or the material?

Appreciate the response and I look forward to your new content.

[–] shellsharks@infosec.pub 2 points 1 year ago

Haven't taken the CSSLP nor have I seen it asked for very much on job reqs. It wouldn't hurt to have but ISC^2 doesn't exactly have the reputation for practical learning.

[–] cooopsspace@infosec.pub 1 points 1 year ago* (last edited 1 year ago) (1 children)

How do you get your work to pay for certs? 17 certs would be like 100k for me. And I don't mean salary.

[–] shellsharks@infosec.pub 1 points 1 year ago

My old work place had a relatively progressive training policy and a decently healthy budget. The real beauty of it was that the budget was a departmental pool. The IT department did NOT take a lot of training so those few of us who did want to take advantage of it had access to a huge pool of money. Think, 10 people accessing money meant for 100 people kinda thing…

load more comments
view more: next ›