EANx wrote: » Are you able to explain the "why" behind your actions?
snokerpoker wrote: » I have dealt with a few 3rd party "Pen Testers" that really didn't know WTF they were doing. They asked me questions about my clients but it was clear they did not know basic network architecture or even simple things about normal IT operations. One of the guys even told me- Look man, we just go in and run our software to produce reports.
Sheiko37 wrote: » Let's say I can't. What's your solution to this?
EANx wrote: » People with experience in other areas of IT before getting into the technical side of IT security. How are you supposed to detect or secure the things a user might leave vulnerable if you have no experience with them? How are you supposed to detect or secure the things an admin might leave vulnerable if you've never been an admin? You can depend on pre-built scripts but that's following the 80/20 rule. Anyone can do the 80% by following instructions and clicking a few buttons then copy/paste. The real value in IT security is found in the 20% most people don't strive for.
paul78 wrote: » I had been noticing that myself as well. It's kinda interesting because I know a lot of software engineers and devops engineers who are very seasoned who have zero interest in moving into security. In fact, most actively despise the work. And several of the non-tech security people that I know would rather move into risk management or compliance.
paul78 wrote: » I guess there is probably a perception that security work is more exciting.
McxRisley wrote: » I think the problem is people acting like security is this all inclusive club that only the elite are allowed into. There is nothing wrong with people who have 0 experience and wanting to jump straight into security. In some cases, it is best to higher these people because they are easier to train than someone who has been in the industry for 10+ years and is stuck in thier ways.
volfkhat wrote: » Dios Mio! No No No. Security can not be somewhere that you start; it has to be somewhere you go after you have attained a solid foundational base. At the MSP i just left, the Security team was made of former Linux folk, and Windows folk (ironically, no network folks, but whatever). Anyway, these were people who were pretty good at what they did... and decided to transition into Security. okay Great. no problem. Fast forward a few years.. new management... New Philosophy: Now all you need to be promoted up to the SOC is a Security+. Seriously, they started pulling people off the helpdesk who mainly reset passwords all day; "Congratulations! you are now a SOC engineer." A few of them don't know how to wipe/reload their own laptops. They honestly can't explain the difference between a Switch & a Router. They really don't understand the difference between TCP & UDP. Hell, they probably can't spell Linux correctly. And yet, the company gave them full access to the firewalls. /facepalmYou gotta Walk before you Run folks....
paul78 wrote: » Great topic! I had been noticing that myself as well. It's kinda interesting because I know a lot of software engineers and devops engineers who are very seasoned who have zero interest in moving into security. In fact, most actively despise the work. And several of the non-tech security people that I know would rather move into risk management or compliance.
paul78 wrote: » Anecdotally, I have a few colleagues and friends who are excellent pen testers with decades of experience. And several of them have gotten out of pent testing because they didn't like it any more. The blue team folks that I know do tend to stay in security a bit longer, but they eventually move out to non-tech security like grc work. I guess there is probably a perception that security work is more exciting.
snokerpoker wrote: » Anyone else notice a growing trend (For a couple years now) of all these entry level type people trying to start out in IT in the security field? I can't tell you how many posts, etc. I see on Reddit and the like where people ask- How do I get int IT security? I'm 18 and have 0 experience. I have dealt with a few 3rd party "Pen Testers" that really didn't know WTF they were doing. They asked me questions about my clients but it was clear they did not know basic network architecture or even simple things about normal IT operations. One of the guys even told me- Look man, we just go in and run our software to produce reports. I don't want to seem like I'm ranting or putting all IT security folks under a bad light. I've just noticed there are a ton of people getting CEH and landing jobs where they don't really understand networks or IT. To me it seems backwards. I think people should start off in helpdesk or a NOC, work their way up, and then get into security. That way you can learn the industry.
McxRisley wrote: » ..Here we have some people that just run Nessus scans and apply patches most of the time....
LeBroke wrote: » Which is weird because IMO only consulting is fun. Mostly because you're never doing the exact same thing every day and there's a social element.
UnixGuy wrote: 3) They're humble and have people skills (know how to interact with others)
UnixGuy wrote: » quickest way to lose credibility is to go to System admins with a list of recommended patches/fixes from Nessus report without knowing what they mean. Some system admins will eat the poor security analyst alive if they're don't know what they're asking. I've seen Security teams lose credibility this way, go to sysadmins and give them a list of fixes that are not applicable to their systems
McxRisley wrote: » This is why our analysts who perform those duties work with the sys admins (or in some cases they are the sys admins) so that they can figure out what can and cant be patched. If something cant be patched, they would just POAM it. You guys are so stuck on the elitist mentality that you cant even think logically on this issue.
kaiju wrote: » That is my biggest issue with POA&M. Many " seasoned professionals" use it as a fix-all band-aid instead of actually mitigating the weakness. Getting a bit OT but most people do not realize how much happens before actions are taken. In a proper environment, the Cybersecurity department should consult with the sys admin and/or network department(s) prior to implementing a mitigating action along with change management. But we all know, this rarely happens in emergency situations. I have seen too many instances were a POA&M is thrown on a weakness just to get past C&A and then they forget about it leaving a glaring hole in the system.
McxRisley wrote: » I think the problem is people acting like security is this all inclusive club that only the elite are allowed into. There is nothing wrong with people who have 0 experience and wanting to jump straight into security.
TechGromit wrote: » If you want to hire someone with no experience to pen test you network, good luck with that. Personally I'll stick with someone know knows enough that if they get in they are not going to screw up my production environment. Security isn't "an inclusive club", but I see nothing wrong with asking for some experience in other areas of IT before jumping right into security.