Jerrod said: My work does not want to invest in security training but my boss has given me the go ahead to build security training for all the developers and he is pretty open about letting me pen test all our apps etc.
JDMurray said: Jerrod said: My work does not want to invest in security training but my boss has given me the go ahead to build security training for all the developers and he is pretty open about letting me pen test all our apps etc. Is your boss the sole owner of the company? Security testing (and education) requires a buy-in from the very top of the business organization. For security testing to be worthwhile, it's not something you do on-the-cheap or teach yourself on-the-job. If you do not currently perform security testing as part of your software quality assurance process, you need to invite in a professional consulting firm to get a proper security testing program started in your organization. By doing so you will save your organization much money and grief in the years to come.
paul78 said: I'll agree with @JDMurray but it's probably a bias because that's what my company does. But that said - I do believe that pent testers with a development background tend to have an edge. What I would suggest that may make more sense is for you to get a decent commercial static code analyzer and focus on the appsec portion. As a developer, I think would be more valuable then doing external app pent testing. Plus from a development cycle cost perspective, it would be a better ROI given your interest.
Meggo said: I interviewed one of our (InfoSec's) alum on a really similar topic. He's a CIO at a finance company and has some really good advice for those looking to get into the industry. Here's an excerpt from our interview you might find interesting: As CIO & Hiring Manager, What Value Do You Place on Certifications?Julian: We look for a combination of experience and certifications, and always prefer candidates with certifications. This is especially true for our systems, networking and security positions. Again, it’s a combination of both. But if all other qualifications are equal, I prefer the candidate with certifications.Do You Need a Computer Science Degree for a Security Role?Julian: In the past, it hasn’t necessarily been a need. We weren’t always looking for someone who could code their own exploit fixes or automate testing. In today’s time, however, it’s really changing. Security is a really mature market — having someone with a developer background helps you customize the tools you’ll use to defend your enterprise. I would love to see more developers getting into the security side of things. Being able to code your own remediation is a huge asset.
LionelTeo said: Sharing what i did to get better at it1) download daily malware and pcap t and analyse in VM2) Buy books from amazon and read.
paul78 said: @Jerrod - Would you mind elaborating on what you mean by transition to security from development? If you are already doing work with static code analyzers and evaluating those results - are you saying you want to get out of software engineering as a primary role?
Jerrod said: LionelTeo said: Sharing what i did to get better at it1) download daily malware and pcap t and analyse in VM2) Buy books from amazon and read. Excellent advice. In fact I didn't go the malware traffic site, but I have used some recent startups I worked for to get maleware.From there I have been using IDA Pro to disassemble the malware.I haven't been reading many books, but I have been following a bunch of tutorials online for the basic exploits in the windows environment. I really think I need to start fuzzing and finding vulnerabilities on my own. This would give me some more credability to jump into a security developer role or possibly security developer role.Any other suggestions on what I can do to show I have basic knowledge that I don't need net+ or sec+ or some of the beginner certs? With my background, is OSCP or CSSLP the more wiser choice? If, as I am hoping, this side gig pans out, I will have 5-10k to spend on some training and maybe can even get in some sans training. I sure hope that training is worth it because those courses are outragous.Thanks for all the responses.
paul78 said: @Jerrod - from your description, it sounds like you are gravitating towards offensive security roles. And it sounds like you are doing all the right things already. I read Julian's interview with @Meggo and it was very interesting. But my own belief about why I prefer to see offsec people come from software engineering background is entirely different. It's because I do expect that they understand how to develop or modify exploit code. But that's my own personal bias since I came from a software engineering background. I also don't feel the need to have someone hold any particular certification other than for marketing purposes. Since you are mostly exploring - by all means, do one or two certifications. If anything, it let's you become accustomed to the nomenclature that is used. Certifications can offer a structured approached which is nice. As for OSCP vs CSSLP - take whichever you find the most interesting or both. When certifications got my interest, I started with the CISSP because I couldn't decide where to start. As for your comment about people believing that you are qualified or passionate about this subject - that's easily remedied if you have a portfolio of work to include with your resume. We always check out a candidates public github repos for the type of security research that they do or any talks or papers that they have published. You mentioned you have been doing some malware work - publish something about the work.
UrbanBob said: This might sounds like a dumb idea but why not start by applying for jobs
basic certifications like net+ and sec+ are not necessary?
.. what exactly are hiring managers looking for in articles and at what people have on their githubs?
... I want to make videos for the material and was thinking about creating a metasploitable type VM that one could download and build. .... Do you think once my material above is complete that this would look favorable?
What would one publish in regardless to maleware work? I am not discovering brand new maleware (yet).
What are your thoughts on this versus the above I mentioned I am working on?