• smeg@feddit.uk
    link
    fedilink
    English
    arrow-up
    112
    ·
    3 days ago

    Same principle as a former burglar who now installs security systems or a former soldier who now works as a bodyguard. You’ve got the skills, you just want to use them in a different way!

    • jol@discuss.tchncs.de
      link
      fedilink
      arrow-up
      38
      ·
      3 days ago

      Or even just a programmer that decides not to work for FAANG or whatever the acronym is now, and not use their skills for evil.

  • kreskin@lemmy.world
    link
    fedilink
    arrow-up
    12
    ·
    2 days ago

    All the security folks I’ve worked with have seemed like posers who want to be seen as hackers but can do minor ui tricks at best.

    • Thebeardedsinglemalt@lemmy.world
      link
      fedilink
      arrow-up
      3
      ·
      1 day ago

      Our last cyber security expert just kinda sat back and let the director do all the work and blindly accepted every single recommendation of Fortified…even the stuff that contradicted itself.

  • SendMePhotos@lemmy.world
    link
    fedilink
    arrow-up
    21
    ·
    3 days ago

    Is there any way to break into the field without being paid garbage? Are there part time options somewhere? Freelancing? Something so I can get that delicious xp to support my degree?

    • Mikina@programming.dev
      link
      fedilink
      arrow-up
      6
      ·
      2 days ago

      I started as part time without any experience durring my college. I was studying gamedev software engineering, but we had one voluntary class about Ethical Hacking.

      I just asked my professor if he can reffer me to someone in the field, followed OWASP Web App Testing guide to the letter when testing the interview homework website, and landed the job without much prior experience (I did attend a few CTF competitions, though).

      Just following the checklist in OWASP testing guide made my results comparable to, or even better to some of my colleagues, and I’ve slowly learned the rest (especially internal domain pentesting) from our internal documentation or shadowing seniors during pentests, and simply being interrested in the field, having initiative and looking up new tools and exploits eventually got me to a Red Team Lead role (not a very good RT, though, but it did improve eventually).

      The pay was pretty good compared to what’s usuall here in Czech, too. I could comfortably pay rent and get by even with part-time, during college.

    • png@discuss.tchncs.de
      link
      fedilink
      arrow-up
      17
      ·
      3 days ago

      I’m writing this comment from the restroom at my part time student job at a cybersec-consulting firm so that’s definitely one way.

    • Ziglin (they/them)@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      2 hours ago

      I think the message is that many cyber security experts indeed gained their expertise by doing not so legal things when they were younger.

  • Libra00@lemmy.world
    link
    fedilink
    English
    arrow-up
    18
    ·
    3 days ago

    Heh, I came by my abortive (due to disability) cybersecurity career honest - I never really did much hacking, but I built and maintained networks for years and sorta just picked it up. Course it helps that I’d had a couple friends for years before I got into it who had been in the business a long time (one was the network security head for a Tier 2 ISP that covered most of the American Southwest, and the other was on the penetration-testing red team at a US government national laboratory) and liked to talk shop.

  • RamblingPanda@lemmynsfw.com
    link
    fedilink
    arrow-up
    19
    ·
    3 days ago

    I’ve never been a black hat, so I’ll never be a white one. Maybe a white diaper. But I think I’ve missed out, I would be very interested in this stuff, but nah, I’m too old for this shit.