LeviathanHunt

74 Followers
124 Following
86 Posts
MSSP professional that loves threat hunting.
PronounsHe/Him
Open forSecurity Engineering

Saw on LinkedIn that Defcon 32 is finished and it brings back somber nostalgia.

When I first joined the industry one of my major goals was to see Defcon. I had a list of every conference I wanted to visit.

After several years of worsening burn out I've decided to leave the industry behind and find a better role in SWE. I am actively interviewing and feeling better in the last few weeks than I ever had at any of my infosec roles.

It's bittersweet leaving it all behind but sometimes that is the right choice.

lots of great advice in this thread.

a few notes:

1. due to my role (security analyst) its hard showcasing my credentials for what i actually do. ive been interviewing for 1 position but it is a challenge getting noticed for more engineering / automation based roles.

2. i have the savings to last 2 years in most major metro's.

3. my partner is a state away so my on-site positions are highly limited, which has reduced my search

my main focus is just crunching out a portfolio showcasing tools I can build from scratch since I can't provide anything I built internally.

Want to take a $4000 course? Look at the syllabus and copy it over to a word doc and spend an hour a day researching each topic.
It's such a terrible practice but I love tweaking code in prod and getting that immediate feedback.

So many bad takes on TikTok today.

The truth of the matter is besides serving state interests, it's poisoning an entire generation.

Feels like this is the year I'll launch a #cybersecurity #startup while maintaining my full time job.

Only issue is narrowing down which problem in the industry to solve.

There are many "experience mills" that tend to hire people from the same region.

It is likely that many of these people were tricked into paying for experience and are taught to lie in exchange for roles so they can pay off their bootcamp.

If you are #hiring in #cybersecurity and want to know what red flags to look for in candidates, go no further than "employees" at CyberNow Labs. 620 security analysts with identical resumes, made-up SOC experience, and strange ties to the Turkish military.
Always love it when sketchy recruiters reach out to you.

Helped a family member set up "wired" internet for their WFH office. Employer demanded they cannot use wifi and even disabled WiFi access. This would not be an issue but the ISP line is in an entirely different room.

Solution? WiFi repeater "wired" into the workstation.