paul78 wrote: » There's a lot to infosec than just pen testing, the practice includes forensics, incident management, sdlc security, etc., etc.. Threat vectors change, bad guys adapt.
contentpros wrote: » It makes all the long hours totally worth it.
contentpros wrote: » Paul is spot on. I'm lucky in the respect that our company has fair sized information security and compliance teams. The pen testing is definitely the fun/sexy part of the job but the reporting and documentation is the part of the job most people seem to forget about. We also handle vulnerability scanning, threat/risk analysis and management and validation that the identified risks are remediated by the appropriate teams. We work with the compliance teams to create policy and procedure documents. I work with the training teams to keep our security awareness training current. Then we have to work with the developers for code analysis, testing, beating them with a stick to follow best practices, and teaching them some of the ways we break err test their code. Once that is done we have vendor compliance and assessments to be completed. We do a ton of testing on vendor patches and we submit a number of vendor bug disclosures which have to be tested multiple times and submitted through legal for approval prior to contacting the vendor. Then if you're bored we work as an escalation point for the SOC teams and incident handlers as the need arises. But after all of that the part of the job I really love is when we setup a lab and host a brown bag lunch for the people that want to learn some of the basics of ethical hacking. When you send out the event invite with limited space and 15 minutes later all seats are full is a great feeling. Almost as great as the feeling you get to see the look on the executive assistant's face when he/she gets their first xss message to pop and they realized what they just did. It makes all the long hours totally worth it.
lister wrote: » Hi just wondering if people here work part time/ full time or freelance? I guess I ask because I figure that once you have done a full security audit with pen testing - you essentially (at least for that moment in time) solve the potential weaknesses and problems of an organization IT system. Does that mean that for the other 80% of the time you just sit around? I mean, if you were employed on a full time basis then surely once you are confident that the IT infrastructure and integrity is solid - then what do you do with the rest of your time? Thanks
sexion8 wrote: » ... quote on quote "know" ...