Are there any popular tags used by junior/mid-level #cybersecurity people?
seeing the expert toots and blog posts are great, but it would also be nice to connect with and see what people are doing around my own experience level 😅​

#infosec #security

@bearByte If you want people bad at their job I’m right here!
@vertana not "bad" exactly, more like 'masterfully creating unintentional mishaps'
@bearByte Ah, yes. Like when I run my scripts against the test network which also happens to be the prod network.
@vertana @bearByte fantastic I’m right here too!
@bearByte I can only think of snarky answers and that isn't helpful. Fwiw, I'm happy to answer any intro or mid level questions
@ConsoleWitch thanks a lot I appreciate it, I'm sure i'll take you up on the offer sometime​😁​
@bearByte Alas, I don't have an answer just a direction that I use to find one; hitting up hashtag search for things that I hypothesize the newer folks are talking about (e.g. #secuityplus) and walking it up by topics while reading the replies from other folks therein. The hashtag is rarely what I'm really after but it gets me in the area to search something more on the nose as I find it.
@bearByte I'm not sure of any existing specific hashtags used, though I feel like you may see people from different skill levels responding to the more experienced individuals' posts.

Many of us feel junior/mid-level regardless of where we're at in our careers but can understand wanting to have conversations focused more on development and current experiences of people just starting to explore the field - without people trying to sell you certifcations or gatekeeping.

Makes me think there's some opportunities for creating specific tags?
@bearByte @jerry I (~5 years of experience) usually use the #cybersecuity tag if any. Otherwise I rely on following and followers. ☺️
@bearByte I'm a bit old, but a CFP that didn't get up I had was busting up security tools by targeting their secrets management. As a solid gold example, Hashicorp products use a file backed token for access. The hashi response is just use a TPM and then they literally back it with nothing and so no one does it, making all their products vulnerable to just routine theft of creds. Pile into that for tonnes of fun.
@bearByte I'm not sure where I fall on the spectrum being an infosec engineer, but certainly not an expert. But hello!