PCTechLinc wrote: » It pains me when I talk to people that have the high-end IT Security positions and they ask me extremely basic questions about technical things. When I call them on it (professionally of course), they say "oh I haven't had to work with that for years..." or "I knew that back when I was certified in NT 4.0". Can't wait until MY salary is that high that I can forget all my technical skills... /rant
tedjames wrote: » That's cool that you're involved in those types of investigations! Also, it pays to be extremely observant if you're working in security or any profession that deals with the well being of others. We have to notice things that others don't.
the_Grinch wrote: » I do throughly enjoy my job and the work I do is very worthwhile. Buddy of mine has been pushing me to go back to the private sector because I would make vastly more, but the job satisfaction isn't there. Pay isn't horrible and the hours can be grueling, but there aren't too many jobs out there (in IT especially) where you can say you truly make a difference.
the_Grinch wrote: » Two types of companies in this world: those who have been hacked and those who just don't know they've been hacked.
tedjames wrote: » That's my feeling about working in the public sector. I just get so much more out of what I do, and many of us in state employment talk and share information. We aren't in competition; we help each other out since we're all working for the greater good of the state's citizens.
NavyMooseCCNA wrote: » One of the reasons I am looking at focusing on governance, policy, and compliance is that I have never had the opportunity to develop good hands on skills. I have theoretical knowledge from reading, but I found it almost impossible to find a position where I could develop the hands on skills.
the_Grinch wrote: » I do throughly enjoy my job and the work I do is very worthwhile. Buddy of mine has been pushing me to go back to the private sector because I would make vastly more, but the job satisfaction isn't there.
the_Grinch wrote: » Sometimes you just gotta keep trucking. I was definitely in your shoes when I started out and the industry hasn't changed much in the almost decade I've been in it. Everyone wants you to have experience, but doesn't want to give you the means by which to obtain it. I will say I very much enjoyed the policy/compliance arena, but having some hands on experience definitely assists in that sphere. The IT people you deal with will have much better respect for you when they realize you have technical skills behind you. I'd often change their views towards a policy when they saw that I understood where they were coming from and could offer a solution that would not only pass compliance, but technical muster.
NavyMooseCCNA wrote: » A lot of what I do is assessments to determine compliance with DFARS 252.204-7012 by using NIST.SP.800-171. We're thinking about doing vulnerability assessment in addition to the documentation reviews. I was asked to learn about vulnerability assessment and using some pentesting techniques to uncover vulnerabilities. I've spent the past few days reading, watching CEH videos on FedVTE, and starting to download various tools and setup a small environment to learn how to use the tools.
tedjames wrote: » If you can swing it, I recommend trying the eLearnSecurity Penetration Testing Student course. It's pretty focused, and you learn a lot about the entire process.
NavyMooseCCNA wrote: » My company won't swing paying for this. What I really need is access to a virtual testing lab where I can experiment with these tools, that is close to free. Does such a unicorn exist?
the_Grinch wrote: » Unfortunately, nothing I know of is close to free. The biggest killer is most likely the licensing of the various operating systems. Computer, storage and internet are cheap...Windows licenses (in the scope you would want/need them) are definitely not.
NavyMooseCCNA wrote: » This begs the n00b question of where someone like me can go to experiment without hurting anything. We have a handful of desktops here that haven't been used in a long time. I'm not entirely sure how useful networking them up would be as a lab to experiment.
tedjames wrote: » The eLearrnSecurity Penetration Testing Student course costs $400. It's pretty cheap considering what you learn. Just put it on a credit card. Otherwise, install Oracle VirtualBox and Kali Linux (both are free) on your personal machine and then look at some of the free, intentionally vulnerable sites that are open and legal to hack: bWAPP, Webgoat, DVWA, etc. Beyond that, there's plenty of free tutorials on YouTube and free and cheap training on Udemy and Cybrary.