shellsharks

joined 1 year ago
MODERATOR OF
[–] shellsharks@infosec.pub 2 points 1 week ago (1 children)

Overall, yes. Day to day y'know it varies. Pure "security work" is, for me, genuinely interesting and I spend legit personal time learning and working on projects, for no other reason than they are kinda fun. What I do as a security engineer for a corporation day-to-day and week-to-week doesn't always translate to the "fun stuff". So my answer is somewhat nuanced. Yes, I do like cybersecurity. But no, I don't always like the work in terms of how it manifests in corporate life.

 

Wanna chat about something non-infosec amongst those of us who frequent /c/cybersecurity? Here’s your chance! (Keep things civil & respectful please)

[–] shellsharks@infosec.pub 2 points 2 weeks ago (1 children)
[–] shellsharks@infosec.pub 2 points 2 weeks ago (1 children)

Got a bunch of house projects coming up myself... What kinda renos you up to?

 

Weekly thread to discuss whatever you’re working on, big or small, at work or in your free time.

[–] shellsharks@infosec.pub 1 points 2 weeks ago

Yeah $400 is too rich for me at this point in my life. But maybe one day 🤷‍♂️

[–] shellsharks@infosec.pub 2 points 2 weeks ago (2 children)
 

Weekly thread for any and all career, learning and general guidance questions. Thinking of taking a training or going for a cert? Wondering how to level up your career? Wondering what NOT to do? Got other questions? This is the time and place to ask!

 

Wanna chat about something non-infosec amongst those of us who frequent /c/cybersecurity? Here’s your chance! (Keep things civil & respectful please)

[–] shellsharks@infosec.pub 2 points 3 weeks ago

I wouldn't worry about certs to start, especially not OSCP. Since you are in the software/dev space, I would consider security roles in the AppSec or CloudSec space as places to jump first. For that, consider going through PortSwigger's web security academy (free) training online to learn more about web vulns, their impact, how to mitigate, etc... If you want a cert, consider one from a cloud vendor and apply to jobs that use that vendor. If you can do even basic scripting, understand app-related vulns and use a few appsec tools then you should be an easy hire for a lot of places. (That said, I've been hearing the market for infosec is atrocious right now).

 

Weekly thread for any and all career, learning and general guidance questions. Thinking of taking a training or going for a cert? Wondering how to level up your career? Wondering what NOT to do? Got other questions? This is the time and place to ask!

 

Weekly thread to discuss whatever you’re working on, big or small, at work or in your free time.

 

Weekly thread for any and all career, learning and general guidance questions. Thinking of taking a training or going for a cert? Wondering how to level up your career? Wondering what NOT to do? Got other questions? This is the time and place to ask!

 

Wanna chat about something non-infosec amongst those of us who frequent /c/cybersecurity? Here’s your chance! (Keep things civil & respectful please)

 

Weekly thread to discuss whatever you’re working on, big or small, at work or in your free time.

[–] shellsharks@infosec.pub 2 points 1 month ago

Never been in the QA world myself, but as someone who has spent a fair bit of time in AppSec, I've encountered Selenium the most. 🤷‍♂️

 

Weekly thread for any and all career, learning and general guidance questions. Thinking of taking a training or going for a cert? Wondering how to level up your career? Wondering what NOT to do? Got other questions? This is the time and place to ask!

 

Wanna chat about something non-infosec amongst those of us who frequent /c/cybersecurity? Here’s your chance! (Keep things civil & respectful please)

[–] shellsharks@infosec.pub 2 points 1 month ago (2 children)

When you say "transferrable in QA" do you mean, languages useful for QA folks that transfer out? I'd argue any/all of them would be for appsec folks.

 

Weekly thread for any and all career, learning and general guidance questions. Thinking of taking a training or going for a cert? Wondering how to level up your career? Wondering what NOT to do? Got other questions? This is the time and place to ask!

[–] shellsharks@infosec.pub 2 points 1 month ago (1 children)

Not a bug bounty hunter myself, but it seems like one of those things that you just have to jump into and start trying to do. So many bounties seem to be pretty low-hanging fruit type of stuff. The payouts might be either LOW or non-paid, just recognition type stuff, but seeing an accepted bounty submission come back does a lot for your confidence. It's like CTFs in a way. Getting into CTFs seems intimidating at first, but then when you go actually do one and you have some level of success, it starts to feel a bit more approachable, you get more XP and you do better the next time.

You could also check this out https://www.bugbountyhunter.com/zseano/ and anything/everything from https://portswigger.net as that team is the best I know in terms of cutting-edge web app research.

[–] shellsharks@infosec.pub 1 points 1 month ago

That's a loaded question 😅. One that can be answered in a few different ways... From a technical perspective, "infosec" is a relatively vast field comprised of a lot of sub-disciplines, so from a tooling and procedural perspective, it varies from job to job. Some would argue a lot of what we do is just theater, and for many orgs and many "pros", this may very well be true. At the root of it all though, you could say our job is to ensure the Confidentiality, Integrity and Availability (classic CIA triad) of data/systems, keeping in mind the balance/tradeoffs between security needs and business requirements. To do so, we employ a variety of tactics, techniques, tools, methodologies, frameworks, etc... Another way to boil down what security folks do is in the lens of "risk". Most business and IT decisions in general come down to risk-based decision making and security is no different. Security teams should understand the risk introduced by the threat landscape coupled with the respective data, attack surface, business assets, etc... to help inform the business how to reduce security risk to acceptable levels.

Hopefully this answer isn't too vague and non-answer-ey!

[–] shellsharks@infosec.pub 2 points 1 month ago (1 children)

Titles in the security world are kinda a mess. Generally I just look for "-security engineer" titles. So in this case you would probably find "Cloud Security Engineer" or something. Look for security engineer roles that have anything cloud-related in the job req and you are probably on to something.

view more: next ›