Article wrote: "I push back on the idea that there is not enough talent out there," he says. "We don't need to train a new generation; we need to do a better job of breaking down the wall that HR and tech managers put up as an excuse to not bring people in."
gespenstern wrote: » The Ptacek guy is a former appsec pentester (at least he claims that he is) and now he's a recruiter. He has a long history of sh!tting on CISSP from a pentester viewpoint, thus OSCP instead of CISSP. Nowadays he seems to be pretty busy tweeting tens of tweets a day on political issues, such as demands to disarm majority of police force, sh!tting on Trump and protecting Hillary in email scandal.
I could of passed my CompTIA certifications without ever touching a computer
goatama wrote: » I also realized that we implemented that exam *specifically* because we hired someone with a CISSP that was a complete tool.
Ritual wrote: » The article brings up a good point though. I just started in IT certifications and I would say 80% of the people I met so far were using braindumps.
ZzBloopzZ wrote: » Also, a family friend is incredibly hard working and he was in security at a large company for many years. However, no one took him seriously until he obtained the CISSP.
ITHokie wrote: » Perfect case study. This, in a nutshell, is the issue with CISSP. It's HR/Management/Leadership perception that is the problem (not the cert itself).
gespenstern wrote: » With the CISSP? That's a problem with any cert, including the OSCP, that is being put by this article author on the same place the CISSP is holding.
OctalDump wrote: » But who is using CISSP as their sole selection criteria? Given that CISSP implicitly means that the candidate has 5 years of experience, I'm sure that whoever is hiring would be interested in that as well. The article as a whole is rather unsatisfactory. CISSP isn't meant to be proof of specific technical competence or the ability to perform penetration testing or incident handling. It is basically a generalist Info Sec certification, albeit relatively more in depth.
ramrunner800 wrote: » Your point might be valid if it was used in hiring as you describe, but unfortunately it isn't. It only takes a few minutes of perusing jobs to see that there are plenty of companies who require CISSP for any security position whatsoever. It is not uncommon to see jobs requesting two years of experience, but a CISSP is required. I've heard plenty of people advised to get their CISSP in order to make a career transition to IT.
OctalDump wrote: » CISSP isn't meant to be...
OctalDump wrote: » Personally, I'd much rather have organisations get to grips with what the actual skills/knowledge a job requires, and then look for those necessary attributes in candidates. I'd also rather have organisations that can train up staff internally and manage them properly. In that circumstance, an organisation could take more risks in who it hires to start with. But that seems like some kind of fantasy world.
goatama wrote: » None of them could get a single question on the written exam.
Danielm7 wrote: » Ouch! I'm curious if you want to share a few of the written questions that no one could answer?
goatama wrote: » Write a powershell script that loops through something. Small snippet of code to identify the security weakness. Here's this code, where would you put a SQi statement? Write a basic SQL injection. Here are some SIEM log entries, which entry is the most dangerous and why. Here's a pcap, where would you start.
goatama wrote: » I'm not sure if you read my original responses before you went about telling me I was "doing it wrong", but maybe you should before responding? At no time did I say we were hiring "CISSPs". I said we were hiring for a security engineer. Someone with hands on experience. I didn't list here all of the requirements in the job posting, more a general idea. My point was also that someone with five years of *actual* security experience in two or more of the domains should be able to do all of those things. Or at least provide an educated response. Again, they didn't have to get all of the questions right, but more often than not they couldn't get ANY of them right. None. I also didn't list all of the questions (since, you know, Idk if any of you guys are ever going to apply for the next one that opens up). So no, I'm not "doing it wrong", my point is that the CISSP is not the end-all-be-all cert that a lot of people seem to think it is.